DESIGN AND IMPLEMENTATION OF BIO SECURITY SYSTEM (A CASE STUDY OF FIRST BANK PLC OWERRI)

  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1743
  • Access Fee: ₦5,000 ($14)
  • Pages: 25 Pages
  • Format: Microsoft Word
  • Views: 270
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

ABSTRACT

Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in skin and impression conditions. Thus, image enhancement techniques are employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations. Minutiae extraction yielded many minutiae resulting from fingerprint irregularities. The aim of this work is the development of a biometric access control system for restricted areas based on individual fingerprint and Gabor filter for enhancement process, the development system architecture, demonstrating the components, enhancement, minutiae and thatching techniques are presented. A software application is written in Python to implement algorithms for enhancement, minutiae extraction and matching processing. The resulting minutiae information will be used as a method of identifying matching fingerprints. Also it will be used to register this fingerprint in system database. Finally, verification system, and identification system are implemented. Registration system has facilities namely; automatic registration, manual registration and update for the database to help the administrator to update required information. Based on that processing, an integrated secure system for biometric access control is developed for restricted area with acceptable security level.


TABLE OF CONTENTS

Title page                                                                                                                                i

Approval Page                                                                                                                        ii

Dedication                                                                                                                               iii

Acknowledgement                                                                                                                  iv

Table of Contents                                                                                                                   v

List of Tables                                                                                                                          ix

List of Figures                                                                                                                         x

Abstract                                                                                                                                  xi        

CHAPTER ONE                                                                                                                  

INTRODUCTION                                                                                                               

1.1.      Introduction                                                                                                               

1.2.      Background of the Study                                                                                           

1.3.      Statement of Problem                                                                                                

1.4.      Aim and Objective of the Study                                                                                

1.5.      Significance of the Study                                                                                          

1.6.      Scope of the Study                                                                                                     

1.7.      Limitations of the Study                                                                                            

1.8.      Definition of Terms                                                                                                   

CHAPTER TWO                                                                                                                 

REVIEW OF RELATED LITERATURE                                                                       

2.1.      Introduction

2.2       Biometric

2.2.1    Biometric functionality 

2.2.3    History of biometric

2.3       Biometric device

2.3.1    Application areas of biometric device

2.3.2    Problems with present day biometric

2.5       Biometric tokenization

2.5.1    Information security

2.6       Bank

2.6       Bank verification number

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1.     Introduction

3.2.    Detailed analysis of the existing system

3.2.1. Problems of the existing system

3.3.    Research methodology

3.4.   Objective of the new system

3.4.1. Feasibility study 

3.4.2. Technical feasibility

3.4.3. Operational feasibility 

3.4.4. Economic feasibility

3.5.1. Dataflow diagram

3.5.2. Modularity

3.5.3. System flowchart

3.5.4. Program flowchart

3.6.    System design

3.6.1. Output design specification

3.6.2. Input design specification

3.6.4    Database specification

3.6.5 Security design specification

CHAPTER FOUR

IMPLEMENTATION, RESULT AND DISCUSSION

4.1.      Introduction

4.2.      Software development tools and justification

4.3.      System requirements

4.3.1.   Software requirements

4.3.2.   Hardware requirements

4.3.3        People requirements

4.4       Implementation details

4.4.1.   Coding

4.4.2.   End user training and manual

4.4.3.   File conversion

4.4.4.   Changeover procedure

4.4.5.   Commissioning

4.4.6.   Maintenance details

4.5.     Results

4.6.     System testing

4.7.     Discussion  

CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1.   Summary

 5.3.   Recommendation

REFERENCE


 



DESIGN AND IMPLEMENTATION OF BIO SECURITY SYSTEM (A CASE STUDY OF FIRST BANK PLC OWERRI)
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Science
  • Project ID: CPU1743
  • Access Fee: ₦5,000 ($14)
  • Pages: 25 Pages
  • Format: Microsoft Word
  • Views: 270
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1743
    Fee ₦5,000 ($14)
    No of Pages 25 Pages
    Format Microsoft Word

    Related Works

    ABSTRACT Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and... Continue Reading
    ABSTRACT The computer system has become a handy tool that can be conveniently applied to all fields of human endeavor. It has even become essential for solution of problem ion moist spheres of life. The main objective of this study is to develop a system that will document and record the names and activities of the of tourism destination in... Continue Reading
    ABSTRACT The computer system has become a handy tool that can be conveniently applied to all fields of human endeavor. It has even become essential for solution of problem ion moist spheres of life. The main objective of this study is to develop a system that will document and record the names and activities of the of tourism destination in... Continue Reading
    ABSTRACT The computer system has become a handy tool that can be conveniently applied to all fields of human endeavor. It has even become essential for solution of problem ion moist spheres of life. The main objective of this study is to develop a system that will document and record the names and activities of the of tourism destination in... Continue Reading
    ABSTRACT The computer system has become a handy tool that can be conveniently applied to all fields of human endeavor. It has even become essential for solution of problem ion moist spheres of life. The main objective of this study is to develop a system that will document and record the names and activities of the of tourism destination in... Continue Reading
                             ABSTRACT   The computer system has become a handy tool that can be conveniently applied to all fields of human endeavor. It has even become essential for solution of problem ion moist spheres of life. The main objective of this study is to develop a system that will document and record the names... Continue Reading
    ABSTRACT The computer system has become a handy tool that can be conveniently applied to all fields of human endeavor. It has even become essential for solution of problem ion moist spheres of life. The main objective of this study is to develop a system that will document and record the names and activities of the of tourism destination in... Continue Reading
    TABLE OF CONTENTS Title Page Approval Page………………………………………………………………..i Certification Page…………………………………………………………… ii Dedication……………………………………………………………………iii... Continue Reading
    TABLE OF CONTENTS Title Page- - - Approval page- - Certification- - Dedication - - Acknowledgement - Table of contents- List of figures- List of tables- - Abstract- - - CHAPTER ONE - - - - - - - -i - - - - - - - -ii - - - - - - - -iii - - - - - - - -iv - - - - - - - -v - - - - - - - -vi - - - - - - - -x - - - - - - - -xi - - - - - - - -xii 1.0... Continue Reading
    DESIGN AND IMPLEMENTATION OF A SECURITY INFORMATION SYSTEM (A CASE STUDY OF THE NIGERIAN POLICE) ABSTRACT The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area they encounter problems in securing security data-processing and efficient information system.... Continue Reading
    Call Us
    whatsappWhatsApp Us