Figure 1 - uploaded by Simon Tembo
Content may be subject to copyright.
Use Case Diagram for Fingerprint Biometrics Verification and Vetting Management system  

Use Case Diagram for Fingerprint Biometrics Verification and Vetting Management system  

Source publication
Article
Full-text available
This paper presents the development of fingerprint biometrics verification and vetting management system for Sensitive Organization. The idea behind this study is to improve security in sensitive institutions through integration of fingerprint biometrics into identity database. A fingerprint is a very recognized and acceptable security feature. It...

Contexts in source publication

Context 1
... vetting process requires the total in biometric system, input fingerprint image is processed to skeleton image levels and then features are extracted from the said thinned image. Biometrics fingerprint image processing (Digital image processing) stages includes fingerprint capturing, normalisation, segmentation, enhancement, thinning and minutiae extraction as shown in figure 4 [11]. ...
Context 2
... guest identity may either be Verification or rejected as shown figure 10. ...
Context 3
... is done by recounting the numbers of image pixels if equal to the one recorded in the database table and respected timestamp. Figure 11 illustrates fingerprint analysis screen. ...
Context 4
... criminal vetting requirement was implemented in an integrated system as presented in figure 12. Criminal vetting requires capturing of ten fingerprints together with human biographical details. ...
Context 5
... secret key is extracted from date of birth, national registration card number and district code where the national registration card was issued. Figure 13 shows the proposed digitalized organisation identity card. ...

Citations

... As per their assessment technique, the typical achievement rate for opening/shutting entryways in ACS was seen to be 87%, while the typical achievement rate for right fingerprint matching in attendance recording for CAMS was estimated at 92%. Joseph Kalunga and Simon Tembo [12] presented the progression of finger impression biometrics affirmation and actually taking a look at the chiefs framework and showed 99.99% biometric accuracy levels with goof settlement of 0.001% (FAR) and 0.001% (FRR). [13] proposed a short proximity biometric recognition procedure using point based highlights. ...
Chapter
This book series aims to provide a forum for researchers from both academia and industry to share their latest research contributions in the area of computing technologies and Data Sciences and thus to exchange knowledge with the common goal of shaping the future. The best way to create memories is to gather and share ideas, creativity and innovations.
... The basic block diagram for biometric authentication architecture is shown in figure 1.6. In this section, four major building blocks of a generic biometric system will be discussed [10][11][12]. ...
... This data cannot be easily retrieved if compromised, it is important to note that security and privacy requirements are two different things. An accurate system must minimize both False Acceptance Rate and False Rejection Rate, thus achieving the maximum performance possible [13]. ...
... FRR is a measure of the percentage of genuine users that are incorrectly rejected. This number should be kept as low as possible to avoid causing inconvenience to the legitimate user [13,26]. As a general rule, this error is more acceptable since a second attempt can be made. ...
... In addition to reducing false-acceptance rates, false-rejection rates can also be increased. This makes it essential to understand how vendors calculate FARs and FRRs [13,28]. As a result of their interdependence, plotting them against each other provides meaningful insights. ...
Preprint
Full-text available
Biometric systems involve security assurance to make our system highly secured and robust. Nowadays, biometric technology has been fixed into new systems with the aim of enforcing strong privacy and security. Several innovative system have been introduced, and most of them have biometrics installed to protect military bases, banking machines, and other sophisticated systems, such as online tracking systems. Businesses can now focus on their core functions and feel confident about their data security. Despite the benefits and enhancements in security that biometrics offer, there are also some vulnerabilities. This study aimed to investigate the biometric vulnerabilities in a healthcare facility and propose possible countermeasures for biometric system vulnerabilities.
... In [15], a Cyber-Physical Access Control Mechanism was proposed based on fingerprint biometric optical sensor device and traditional national identity document to provide an access control for human unauthorized entry into Military CI industry like physical military base or installations. The proposed Access Control mechanism was based on role based Access Control (RBAC) Model [16]. ...
Article
Full-text available
This paper presents the development of environmental monitoring mechanism based on Arduino Sensor Technology for Industrial Internet of Things (Industrial IoT) Critical Infrastructure (CI) Protection in an Access Control role. Access control of hazardous substances is one of the most vulnerable aspects of Industrial IoT CI. The idea behind this study is to harden environmental security through live ecological monitoring of Temperature, Humidity and emitted hazardous substances or gases due to Industrial activities and processes in Smart CI places such as Nuclear Processing Plant, Thermal Generation Power Industries, Fossil Processing Plant, Military Chemical warfare plant, food processing factory, Agriculture Chemical Manufacturing Plant and many other CI industries. Live monitoring is one of the most important security requirements for any cyber-Access Control Mechanism. The literature revealed that similar systems were developed and implemented in different organizations and with different System Requirements and specifications. However, most CI industries have not automated environmental monitoring requirements and integrated the requirement into a broad institution security continuum. The consequence of neglecting environmental security is climate change. Furthermore, Toxic gas pollution affects millions of people around the world and contributes to about 5.4 percent of deaths worldwide. Pollution kills more people than the combination of malaria, AIDS, and tuberculosis hence the development of security mechanisms to monitor pollutants in the atmosphere. The main objective of this study was to develop a computer-based application for monitoring environmental hazardous substances such as extreme temperature, humidity, carbon dioxide (CO2), carbon monoxide (CO), and Smoke in the atmosphere surrounding Industrial IoT CI Industries. The system development approach employed was the Arduino engineering process model. To achieve this objective, cheaper ecological sensor Networks that include MQ2 and DHT11 Arduino Sensors are connected to Arduino Uno Microcontroller through a solderless breadboard Arduino component. The backend database was MySQL Relational database management system. The developed prototype application produced a number of results including live monitoring of temperature, humidity, CO2, CO, Smoke, and many others. A system evaluation process was conducted and the result indicated 99.999% accuracy levels. The results, it evidence that the developed prototype application can improve environmental security in Industrial IoT CI institutions.
... Biometrics is an automated method of authenticating a person identity based on biological or behavioral characteristics [6]. Biometrics technologies measure and analyze living human body characteristics for human authentication and identification purposes. ...
... This could provide a drastic shift in human identity modalities which are currently dominated by biometrics and other traditional techniques. Biometrics identification modalities may be categorized in to behavioral or physiological [6]. Physiological human characteristics refers to the measurement of human body parts which may include but not limited to fingerprint, hand geometry, face, iris, and retina and foot configuration [24]. ...
... The main components of ERD are entities (things) and their relationships. An entity in [6] is defined as any person, place, thing, or event of interest to an institution or organization about which data are captured, stored, or processed. ...
Article
Full-text available
This paper details the development of an access control mechanism based on fingerprint biometrics and mobile phone International Mobile Equipment Identity (IMEI) modalities for the industrial internet of thing (Industrial IoT) Critical Infrastructure (CI) protection. The idea behind this study is to harden physical security through human identification and authentication processes to Smart CI places such as buildings, military bases, hospitals, airports and other important infrastructure. Fingerprint and mobile phone IMEI are very recognized and accepted identities hence used in police criminal investigation and legal community. Other uses of mobile phone identities include e-medicine, mobile banking, mobile money and remote machine operation. The main objective of this study is to develop a prototype application for authentication and identification of legitimate Industrial IoT human entities/objects based on the mentioned two identities as opposed to traditional knowledge (password, phrase or personal identification number (PIN) etc.,) and possession (token, smart card, identity card etc.,) based Access Control instruments. To achieve this, the study based on eXtreme programming methodology was conducted using visual studio 2010 on DotNet framework 4.0 with C# object oriented programming language. The backend database employed was MySQL open-source Relational database management system (RDMBS). The research produced a number of key results include the development of fingerprint biometric and mobile phone IMEI human identity security layers (modules) and many others. The developed prototype application performance was evaluated by enrolled some fingerprints, IMEI and captured related individual personal information. The result indicated 99.999% accuracy levels. In conclusion, the study shows that the integration of fingerprint and mobile phone IMEI identities in access control roles can improve the security of the Industrial IoT institution and alleviate problems associated with traditional identity authentication methods.
... Hence, the health sector in any economy forms the backbone of its growth and development [1] to [3]. However, the healthcare system is experiencing many problems among others is the medical record issue involving patient having multiple records, records loss as a result of fire, difficulty in retrieving patient data, and errors due to manual calculations. ...
... This is because, biometric identification systems employ user's biological data, in the form of voice, face and signature scans. Issues of identity theft, human errors and security breaches [3] using biometric identification will certainly become thing of the past. ...
Article
Full-text available
The poor efficiency of the present manual management system in hospitals today results from the inordinate length of time it takes to search for and locate patient folders and the ineffective filling system adopted. The purpose of this study is to develop a computerized Health Centre Management System that will upgrade the quality of information management and efficiency of the hospital employees by adopting two-way authentication system involving the use of fingerprints. As every cooperate organization, institution or government agency requires data and good quality information to function effectively, It is however not an over statement to say that many organizations, institutions or government agencies have become critically dependent on the use of database system for their successes especially in the hospital. This research paper uses the Waterfall methodology model that followed a linear structure starting from preliminary investigation, requirement analysis, design phase, implementation, and maintenance. This study produced the module that would administer patient registration and admission details, a module that could monitor medicine inventory of the Health Centre Pharmacy, etc.; thereby resulting to a better improvement of the hospital transactions. However, it has been recommended in this research need to enhance the front end design of the system; add modules for the laboratory and billing module, generate hospital reports that could help the users to provide an overview of the hospital transaction within specific date.
... A new approach has been presented in [10] for unique mark biometrics improvement and screening the board framework for Touchy Association. The idea behind this examination is to increase the security in touchy establishments through the coordination of unique mark biometrics into the personality databases. ...
... Software tools include python flask 3.72, Sublime as a text editor, 500dpi Optical Fingerprint Sensor and System Development Kit (SDK) version 5.0. In terms of Software development methodology, the study adopted an agile software development tactic (Kalunga & Tembo, 2016). The hardware tools and the specifications are presented in Table 1. ...
Article
Currently, the adoption rate of biometric technology has speedily grown in all applications. The technology is considered as an effective measure for the protection against crime. However, there is a concern that it violates the privacy and rights of the individuals. For instance, the possibility of fraud, identity theft, civil liberty violations, and inaccuracy of data. As a result, create the conflicts between service provider and public as they may be accused of a crime or become a victim of discrimination. This study constitutes exploratory research and is restricted to the usage of the biometric application system within the passport. It aims at discovering the substantial acceptance of users in implementing the biometric application for the East African passport (Uganda). Factor influencing users’ opinions regarding the acceptance of the biometric application, User willingness, trust and techniques for securing the biometric information are presented. Strategies aimed at regulating the protection of biometric data on the usage of the application are explained. The findings suggested encryption techniques as the most favorable tactic of protecting the biometric data application. Therefore, best practices such as individual desirability, practical accurateness, and eagerness are required.
... Fingerprint was also used in intrusion detection system (IDS), which was to recognize whether a person has the right to access a computer system or not [14]. Fingerprint was also reported to have high accuracy in identifying personal when implemented in a management system in an organization [15]. ...
Article
Full-text available
Cases of motorcycle theft by breaking mechanical key are still a serious problem in some countries. Therefore, this article discusses the process of development, implementation, and evaluation of a fingerprint-based ignition key for motorcycles. To prevent theft, a motorcycle can only be turned on by a registered fingerprint, and an alarm will ring if the sensor receives an unregistered fingerprint. This prototype used the main component of the SEN0188 fingerprint sensor, Arduino Uno microcontroller, LM317 voltage regulator, and the buzzer alarm module. The test results in shaded place showed that the proposed key successfully ignited the engine by 80% with a dry and clean thumb. However, if the thumb is oily or dirty, the success scanning rate is only 36% of 25 attempts. The proposed key also successfully activates a warning alarm if a fingerprint scan attempt fails three times in a row. Test results on potholes, bumpy, dusty, and puddles roads indicate that no hardware has been disturbed or damaged. Therefore, this prototype has the potential to be further developed and implemented on a large scale in an effort to reduce motorcycle theft rates.
... Joseph Kalunga and Simon Tembo [5] have proposed a biometric fingerprint system for verification and vetting management. In this project, many features were modeled and implemented such as Criminal Vetting, Fingerprint enrolment , Criminal Investigation, Identity Verification . ...
Chapter
In the vast majority of authentication systems, biometric techniques are used to verify the identity of the person authorized to cross the authorized zone. The biometric fingerprint remains among the most used solutions to meet this need. Several implementations of biometric-based systems exist in the research field due to the variety of fingerprint biometric readers and SDKs available in the market. As a result, each implementation can be largely modified or re-built just by changing the biometric reader. In this work, we propose a model of system less coupled to the type of reader and the SDK used. This approach reduce the cost of development while adding a new fingerprint reader or using an heterogeneous SDK.