CFP last date
15 March 2024
Reseach Article

Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control

by Fatai Olawale W., Oluwade Bamidele A., Awotunde Joseph B.
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 4
Year of Publication: 2014
Authors: Fatai Olawale W., Oluwade Bamidele A., Awotunde Joseph B.
10.5120/ijais14-451187

Fatai Olawale W., Oluwade Bamidele A., Awotunde Joseph B. . Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control. International Journal of Applied Information Systems. 7, 4 ( June 2014), 22-27. DOI=10.5120/ijais14-451187

@article{ 10.5120/ijais14-451187,
author = { Fatai Olawale W., Oluwade Bamidele A., Awotunde Joseph B. },
title = { Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control },
journal = { International Journal of Applied Information Systems },
issue_date = { June 2014 },
volume = { 7 },
number = { 4 },
month = { June },
year = { 2014 },
issn = { 2249-0868 },
pages = { 22-27 },
numpages = {9},
url = { https://www.ijais.org/archives/volume7/number4/637-1187/ },
doi = { 10.5120/ijais14-451187 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:54:59.051822+05:30
%A Fatai Olawale W.
%A Oluwade Bamidele A.
%A Awotunde Joseph B.
%T Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 7
%N 4
%P 22-27
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A growing security issue today in Nigeria is the increased occurrence of identity fraud. Research shows that perpetrators of this act are foreigners who enter the country without any document and are employed as security officers, thereby posing security treats to lives and properties. It has been noted that these foreigners device a means of beating security devices put in place at the border. The Nigerian Immigration uses Automated Fingerprint identification system (AFIS) which is minutiae base and it's less noise tolerant unlike the correlation base approach. This paper therefore proposes a novel fingerprinting method that can help identify identity fraud. The method combines two approaches namely minutiae and correlation approaches, the idea is to see how the shortcomings of one is complemented by the other and the two approaches processes extraction and matching so as to get good and reliable images. Each of the approaches computes the matching score and the mean of the two resulting scores is taken. The mean is compared with the established threshold such that the system provides response by indicating whether the verification is successful or not. It follows that the adoption of this new method by organizations like the Nigerian Immigration Service will drastically reduce, if not totally eradicate, the level of insecurity in the country.

References
  1. B. Roli, S. Priti & B. Punam, (2011). Minutia Extraction from Fingerprint Image: A review, International Journal of Computer Science Issues Vol. 8, Issue 5, No3, "001.
  2. Frank Laczko, Abye Makonnen (2009). Migration in Nigeria: Thematic Document 2009 National Security and Migration: towards an Effective Cross-border management in Nigeria, © 2009 International Organization for Migration (IOM), International Organization for Migration, 17 route des Morillons 1211 Geneva 19, Switzerland.
  3. ICAO, (2006). "Machine readable travel documents", Technical report, ICAO 2006.
  4. Jagadeesan, (2010). Secured Cryptographic key Generation from Multimodal Biometrics: Feature level Fusion of Fingerprint and Iris, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1.
  5. J, K. Ravi, B. Raja, & K. R Venugopal, (2009). International Journal of Engineering Science and Technology, Fingerprint recognition using minutia score Matching, Vol. 1 (2), 35-42
  6. K. Nandakumar and A. K. Jain, (2004). Local Correlation-based Fingerprint Matching, Proceedings of Indian Conference on Computer Vision, Graphics & Image Processing, pp. 1-6, Kolkata.
  7. L. Hong, Y. Wan & A. Jain, (1998). Fingerprint Image Enhancement: Algorithm and Performance Evaluation, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 777-789.
  8. Patric, Ebele and Chinedu, (2012). Terrorist activities and economic development in Nigeria: An early warning signal OIDA international Journal of sustainable development Vol 5, No. 4, pp. 69-78, 2012.
  9. S. Prabhakar, A. K. Jain, J. Wang, S. Pankanti, & R. Bolle, (2000). Minutia Verification and Classification for Fingerprint Matching, In Proc. ICPR2000, 15th Int. Conf. Pattern Recognition, Barcelona, Spain.
Index Terms

Computer Science
Information Sciences

Keywords

Security Immigration Control Identity fraud Threshold