A Framework for Nation-Wide Integration of Biometric Information

ABSTRACT

Having a central database for Nigeria which organizations can rely on for identification/verification purposes, has been a plan in the pipeline for many years now. This has become urgent because of the nation’s current security challenges and the problem of multiple enrolments across various organizations. All of these organizations collect data, but the data collected is not useful outside the collecting organizations.

According to various reports, the Nigerian government has been trying to create a central database to contain Nigerian nationals’ basic and biometric information, to be managed by the Nigerian Identity Management Commission (NIMC), but to no avail. The project ‘National Identity Database’ creation was started in 2007 and has not yet been successful.

This thesis aims to create a central platform for integrating all of these biometric data to curb these problems while considering the security of access control. In this work, we created four web applications and databases to represent information from four organizations; the Nigerian Immigration System, the Independent National Electoral Commission, Bank, and NIMC, with NIMC as the central point. The data represented include their enrollees’ basic and biometric information (fingerprints). The web applications were designed using C#.net on visual studio IDE alongside supporting software like MySQL connector, Adobe Fireworks and database access with PhpMyAdmin. Each application includes four modules, enrolment, admin, query and verification. The verification module serves as the platform where different organizations’ applications can interface with the central database, allowing individuals to be identified from any point.

The overall system developed provides a platform to curb multiple and indiscriminate collections of biometric (fingerprint) data, a major challenge in the country.

Keywords: Biometric, Central database, Fingerprint, Verification and Identification

REFERENCES

Ahuja, M. S., & Chabbra, S. (2011). Biometric encryption: Combining fingerprints and cryptography. Communications in Computer and Information Science, 169 CCIS, 505–514. https://doi.org/10.1007/978-3-642-22577-2_69

Bala, D. (2008). Biometrics and information security. Proceedings of the 5th Annual Conference on Information Security Curriculum Development – InfoSecCD ’08, 64–66. https://doi.org/10.1145/1456625.1456644

Bamigbade, K., & Onifade, O. (2014). Gehe : a Mul Tif Actored Model of Soft and Hard Biometric Trait for Ease of. IEEE.

Bolade, P. (2015). Active Telephone Lines In Nigeria Hit 145.4 Million – NCC. Retrieved January 1, 2001, from http://techcabal.com/2015/06/05/active-telephone-lines-in-nigeria-hit-145-4- million-ncc/

Breedt, M., & Martin, O. (2004). Using A Central Data Repository For Biometric Authentication In Passport Systems. Issa, (2054024), 1–12. Retrieved from http://dblp.uni- trier.de/db/conf/issa/issa2004.html#Breedt04

Charles, W., Patrick, G., & Ramaswamy, C. (2007). SP 800-76-1. Biometric Data Specification for Personal Identity Verification.

Chaurasia, O. P. (2012). An Approach to Fingerprint Image Pre-Processing. International Journal of Image, Graphics and Signal Processing, 4(6), 29–35. https://doi.org/10.5815/ijigsp.2012.06.05

Clement, I. (2017). FG to merge BVN, driver’s licence, National Identity card. Retrieved October 20, 2017, from http://www.tribuneonlineng.com/fg-merge-bvn-drivers-licence-national- identity-card/

Daugman, J. (2000). Biometric decision landscapes. Technical Report-University of Cambridge Computer Laboratory, (482), 13. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.14.3071&rep=rep1&ty pe=pdf

De Luis-García, R., Alberola-López, C., Aghzout, O., & Ruiz-Alzola, J. (2003). Biometric identification systems. Signal Processing, 83(12), 2539–2557. https://doi.org/10.1016/j.sigpro.2003.08.001

Deepika, & Soni, N. (2013). Database Security: Threats and Challenges. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5), 810–813. Retrieved from http://www.ijarcsse.com/docs/papers/Volume_3/5_May2013/V3I5-0309.pdf

A Framework for Nation-Wide Integration of Biometric Information

A Study of Customary...

ABSTRACT This study is aimed at studying the customary land...

Determining the Proper Law...

ABSTRACT Where a dispute arises from the breach of a...

The Criminal Liability of...

ABSTRACT This is an attempt to look at the corporation's...

A Critical Appraisal of...

A critical appraisal of uniform, personal income tax system...

An Assessment of the...

ABSTRACT In its 50-year history as an independent nation, Nigeria...

Search and Seizure in...

Search and seizure in Nigerian law with particular reference...

A Study of Customary Land Law and Tenure Practices of Six Communities of the Lower Benue River Valley of Nigeria

ABSTRACT This study is aimed at studying the customary land laws and tenurial practices of the communities of the Nigerian Lower Benue River valley. These...

Determining the Proper Law of Contract Under Private International Law

ABSTRACT Where a dispute arises from the breach of a term or terms of a contract between 'A' a Nigerian, and 'B' an Italian, the...

The Criminal Liability of Corporations

ABSTRACT This is an attempt to look at the corporation's liability for its own acts and those of Its organs or agents and servants. The...

A Critical Appraisal of Uniform Personal Income Tax System Within the Context of Nigerian Federalism

A critical appraisal of uniform, personal income tax system within the context of Nigerian federalism. Download this dissertation in PDF for Free.

An Assessment of the Legal and Institutional Framework for the Prevention and Mitigation of Ethno-Religious Conflicts in Nigeria

ABSTRACT In its 50-year history as an independent nation, Nigeria has experienced over two hundred recorded violent ethno-religious disturbances. The first major ethno-religious disturbance exploded...

Search and Seizure in Nigerian Law With Particular Reference to the Northern States

Search and seizure in Nigerian law with particular reference to the Northern States.

An Appraisal of the Role of ECOWAS Court of Justice in the Protection of Human Rights Under the ECOWAS Treaty

ABSTRACT This study examined the role of the ECOWAS Community Court of Justice (ECCJ) in the protection of human rights in the West African sub-region,...

The Imperatives of International Criminal Tribunals and International Criminal Court on Crime of Genocide

ABSTRACT The idea of a strong standing tribunal to try serious violations of international law has been around since the end of World War II....

An Analysis of the Concept of Negotiation and Arbitration as Methods of Alternative Dispute Resolution in International Law

ABSTRACT Disputes or disagreements are unarguably and necessarily an inevitable part of human existence, flowing directly from communication, inter-reaction and relationships. This can occur at...