DESIGN AND IMPLEMENTATION OF BIO SECURITY SYSTEM (A CASE STUDY OF FIRST BANK PLC OWERRI)

ABSTRACT

Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in skin and impression conditions. Thus, image enhancement techniques are employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations. Minutiae extraction yielded many minutiae resulting from fingerprint irregularities. The aim of this work is the development of a biometric access control system for restricted areas based on individual fingerprint and Gabor filter for enhancement process, the development system architecture, demonstrating the components, enhancement, minutiae and thatching techniques are presented. A software application is written in Python to implement algorithms for enhancement, minutiae extraction and matching processing. The resulting minutiae information will be used as a method of identifying matching fingerprints. Also it will be used to register this fingerprint in system database. Finally, verification system, and identification system are implemented. Registration system has facilities namely; automatic registration, manual registration and update for the database to help the administrator to update required information. Based on that processing, an integrated secure system for biometric access control is developed for restricted area with acceptable security level.


TABLE OF CONTENTS

Title page                                                                                                                                i

Approval Page                                                                                                                        ii

Dedication                                                                                                                               iii

Acknowledgement                                                                                                                  iv

Table of Contents                                                                                                                   v

List of Tables                                                                                                                          ix

List of Figures                                                                                                                         x

Abstract                                                                                                                                  xi        

CHAPTER ONE                                                                                                                  

INTRODUCTION                                                                                                               

1.1.      Introduction                                                                                                               

1.2.      Background of the Study                                                                                           

1.3.      Statement of Problem                                                                                                

1.4.      Aim and Objective of the Study                                                                                

1.5.      Significance of the Study                                                                                          

1.6.      Scope of the Study                                                                                                     

1.7.      Limitations of the Study                                                                                            

1.8.      Definition of Terms                                                                                                   

CHAPTER TWO                                                                                                                 

REVIEW OF RELATED LITERATURE                                                                       

2.1.      Introduction

2.2       Biometric

2.2.1    Biometric functionality 

2.2.3    History of biometric

2.3       Biometric device

2.3.1    Application areas of biometric device

2.3.2    Problems with present day biometric

2.5       Biometric tokenization

2.5.1    Information security

2.6       Bank

2.6       Bank verification number

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1.     Introduction

3.2.    Detailed analysis of the existing system

3.2.1. Problems of the existing system

3.3.    Research methodology

3.4.   Objective of the new system

3.4.1. Feasibility study 

3.4.2. Technical feasibility

3.4.3. Operational feasibility 

3.4.4. Economic feasibility

3.5.1. Dataflow diagram

3.5.2. Modularity

3.5.3. System flowchart

3.5.4. Program flowchart

3.6.    System design

3.6.1. Output design specification

3.6.2. Input design specification

3.6.4    Database specification

3.6.5 Security design specification

CHAPTER FOUR

IMPLEMENTATION, RESULT AND DISCUSSION

4.1.      Introduction

4.2.      Software development tools and justification

4.3.      System requirements

4.3.1.   Software requirements

4.3.2.   Hardware requirements

4.3.3        People requirements

4.4       Implementation details

4.4.1.   Coding

4.4.2.   End user training and manual

4.4.3.   File conversion

4.4.4.   Changeover procedure

4.4.5.   Commissioning

4.4.6.   Maintenance details

4.5.     Results

4.6.     System testing

4.7.     Discussion  

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1.   Summary

 5.3.   Recommendation

REFERENCE


 



Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Kingsley, O. & Youtube channel, 1. (2022). DESIGN AND IMPLEMENTATION OF BIO SECURITY SYSTEM (A CASE STUDY OF FIRST BANK PLC OWERRI). Afribary. Retrieved from https://tracking.afribary.com/works/design-and-implementation-of-bio-security-system-a-case-study-of-first-bank-plc-owerri

MLA 8th

Kingsley, Oparaugo, and 123 Youtube channel "DESIGN AND IMPLEMENTATION OF BIO SECURITY SYSTEM (A CASE STUDY OF FIRST BANK PLC OWERRI)" Afribary. Afribary, 12 Sep. 2022, https://tracking.afribary.com/works/design-and-implementation-of-bio-security-system-a-case-study-of-first-bank-plc-owerri. Accessed 21 Nov. 2024.

MLA7

Kingsley, Oparaugo, and 123 Youtube channel . "DESIGN AND IMPLEMENTATION OF BIO SECURITY SYSTEM (A CASE STUDY OF FIRST BANK PLC OWERRI)". Afribary, Afribary, 12 Sep. 2022. Web. 21 Nov. 2024. < https://tracking.afribary.com/works/design-and-implementation-of-bio-security-system-a-case-study-of-first-bank-plc-owerri >.

Chicago

Kingsley, Oparaugo and 123 Youtube channel . "DESIGN AND IMPLEMENTATION OF BIO SECURITY SYSTEM (A CASE STUDY OF FIRST BANK PLC OWERRI)" Afribary (2022). Accessed November 21, 2024. https://tracking.afribary.com/works/design-and-implementation-of-bio-security-system-a-case-study-of-first-bank-plc-owerri