Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control

Fatai Olawale W. , Oluwade Bamidele A., Awotunde Joseph B. Published in Security

International Journal of Applied Information Systems
Year of Publication: 2014
© 2013 by IJAIS Journal
10.5120/ijais14-451187
Download full text
  1. Fatai Olawale W., Oluwade Bamidele A. and Awotunde Joseph B.. Article: Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control. International Journal of Applied Information Systems 7(4):22-27, June 2014. BibTeX

    @article{key:article,
    	author = "Fatai Olawale W. and Oluwade Bamidele A. and Awotunde Joseph B.",
    	title = "Article: Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control",
    	journal = "International Journal of Applied Information Systems",
    	year = 2014,
    	volume = 7,
    	number = 4,
    	pages = "22-27",
    	month = "June",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

A growing security issue today in Nigeria is the increased occurrence of identity fraud. Research shows that perpetrators of this act are foreigners who enter the country without any document and are employed as security officers, thereby posing security treats to lives and properties. It has been noted that these foreigners device a means of beating security devices put in place at the border. The Nigerian Immigration uses Automated Fingerprint identification system (AFIS) which is minutiae base and it's less noise tolerant unlike the correlation base approach. This paper therefore proposes a novel fingerprinting method that can help identify identity fraud. The method combines two approaches namely minutiae and correlation approaches, the idea is to see how the shortcomings of one is complemented by the other and the two approaches processes extraction and matching so as to get good and reliable images. Each of the approaches computes the matching score and the mean of the two resulting scores is taken. The mean is compared with the established threshold such that the system provides response by indicating whether the verification is successful or not. It follows that the adoption of this new method by organizations like the Nigerian Immigration Service will drastically reduce, if not totally eradicate, the level of insecurity in the country.

Reference

  1. B. Roli, S. Priti & B. Punam, (2011). Minutia Extraction from Fingerprint Image: A review, International Journal of Computer Science Issues Vol. 8, Issue 5, No3, "001.
  2. Frank Laczko, Abye Makonnen (2009). Migration in Nigeria: Thematic Document 2009 National Security and Migration: towards an Effective Cross-border management in Nigeria, © 2009 International Organization for Migration (IOM), International Organization for Migration, 17 route des Morillons 1211 Geneva 19, Switzerland.
  3. ICAO, (2006). "Machine readable travel documents", Technical report, ICAO 2006.
  4. Jagadeesan, (2010). Secured Cryptographic key Generation from Multimodal Biometrics: Feature level Fusion of Fingerprint and Iris, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1.
  5. J, K. Ravi, B. Raja, & K. R Venugopal, (2009). International Journal of Engineering Science and Technology, Fingerprint recognition using minutia score Matching, Vol. 1 (2), 35-42
  6. K. Nandakumar and A. K. Jain, (2004). Local Correlation-based Fingerprint Matching, Proceedings of Indian Conference on Computer Vision, Graphics & Image Processing, pp. 1-6, Kolkata.
  7. L. Hong, Y. Wan & A. Jain, (1998). Fingerprint Image Enhancement: Algorithm and Performance Evaluation, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 777-789.
  8. Patric, Ebele and Chinedu, (2012). Terrorist activities and economic development in Nigeria: An early warning signal OIDA international Journal of sustainable development Vol 5, No. 4, pp. 69-78, 2012.
  9. S. Prabhakar, A. K. Jain, J. Wang, S. Pankanti, & R. Bolle, (2000). Minutia Verification and Classification for Fingerprint Matching, In Proc. ICPR2000, 15th Int. Conf. Pattern Recognition, Barcelona, Spain.

Keywords

Security, Immigration, Control, Identity fraud, Threshold