American Journal of Computer Science and Technology

| Peer-Reviewed |

Evaluation of a Fingerprint Recognition Technology for a Biometric Security System

Received: 05 November 2018    Accepted: 27 November 2018    Published: 26 December 2018
Views:       Downloads:

Share This Article

Abstract

Authentication is a fundamental component of human interaction with computers. Traditional means of authentication, primarily password and personal identification numbers (PINs), have until recently dominated computing, and are likely to remain essential for the years to come. Over the years, passwords are kept simple to avoid them being easily forgotten. This has subjected them to higher vulnerability to much compromise by unauthorized persons. Thus, computers are forced to manage more and more passwords which imply that the likelihood of password being forgotten increases. Hence, biometrics is becoming more convenient and distinctly more precise than traditional methods such as passwords and PINs. Biometrics link the event to a particular individual, requires nothing to remember or carry, provides positive confirmation by verifying individuals are who they claim to be, and is becoming an inexpensive solution. This research work aims to evaluate fingerprint recognition technology for a biometric security system using the implementation at the Council for the Regulation of Engineering in Nigeria (COREN) as a case study; to reveal the enormous benefits of using or deploying biometrics which may include the increased security, increased convenience, reduce fraud, or delivery of enhanced services. An evaluation of the said system as deployed in COREN was advanced by the use of quantitative method which design administered a survey instrument in the form of a questionnaire among 20 employees of Council for Regulation of Engineering in Nigeria (COREN). Therefore, upon analyzing the responses from the field work conducted, it is evident that fingerprint recognition system is secured due to fingerprints uniqueness. The outcome of the system suggests that fingerprints, sensors and papillary line provide enough entropy on biometric security.

DOI 10.11648/j.ajcst.20180104.11
Published in American Journal of Computer Science and Technology (Volume 1, Issue 4, December 2018)
Page(s) 74-84
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Fingerprint Recognition Technology, Biometric Security System, Benefits of Biometric Security System

References
[1] Jain, A., Dass, S. C. & Nandakumar, K. (2004). “Soft biometric traits for personal recognition system,” in Proc. ICBA, 2004, vol. 3072, LNCS, pp. 731–738.
[2] Opara, E. U., Rob, M. & Etnyre, V. (2016). Biometric and Systems Security: An Overview of End-To-End Security System. Communications of the IIMA Vol. 6, no. 2, pp. 53-57. Retrieved November 23, 2018 from https://www.researchgate.net/publication/265260378_Biometric_and_Systems_Security_An_Overview_of_End-To-End_Security_System
[3] Kumar, A., Berg, A. C., Belhumeur, P. N. & Nayar, S. K. (2009). “Attribute and simile classifiers for face verification,” in IEEE Int. Conf. Computer Vision (ICCV), 2009, pp. 1–8.
[4] Pierrard, B. S. & Vetter, T. (2007). “Skin detail analysis for face recognition,” in Proc. CVPR, 2007, pp. 1–8.
[5] Faundez-Zanuy, M. (2016). Biometric security technology. IEEE Aerospace and Electronic Systems Magazine, Vol. 21 no 6, pp. 15-26, ISSN: 0885-8985. June 2006.
[6] Bontrager, P., Roy, A., Togelius, J., Memon, N, & Ross, A. (2018). DeepMasterPrints: Generating MasterPrints for Dictionary Attacks via Latent Variable Evolution. Retrieved November 23, 2018 from https://arxiv.org/pdf/1705.07386.pdf
[7] Roy, A., Memon, N., Togelius, J., & Ross, A. (2018). Evolutionary methods for generating synthetic masterprint templates: Dictionary attack in fingerprint recognition. In International Conference on Biometrics, pages 1–8, 2018.
[8] Bose, P. K. & Kabir, M. J. (2017). Fingerprint: A Unique and Reliable Method for Identification. Journal of Enam Medical College Vol 7 No 1 January 2017. Retrieved November 23, 2018 from doi: http://dx.doi.org/10.3329/jemc.v7i1.30748
[9] Thompson, W. C., Vuille, J., Taroni, F. & Biedermann, A. (2018). After Uniqueness: The Evolution of Forensic-Science Opinions. Judicature. Vol. 102 No 1 Spring 2018. Retrieved November 23, 2018 from https://judicialstudies.duke.edu/wp-content/uploads/2018/04/JUDICATURE102.1-THOMPSON-etal-1.pdf
[10] Hu, Y., Li, M., Ma, W. & Zhang, H. (2004). “Efficient propagation for face annotation in family albums,” in Proc. ACM Int. Conf. Multimedia, 2004, pp. 716–723.
[11] Beslay, L. Galbally, J. & Haraksim, R. (2018). Automatic fingerprint recognition: from children to elderly. Ageing and age effects. JRC Technical Report, the European Commission’s science and knowledge service. ISBN 978-92-79-87179-5 ISSN 1831-9424. Retrieved November 23, 2018 from doi: 10.2760/809183.
[12] Muchtar, M. A., Seniman, D Arisandi, D. & Hasanah, S. (2018). Attendance fingerprint identification system using arduino and single board computer. IOP Conf. Series: Journal of Physics: Conf. Series 978 (2018) 012060 doi : 10.1088/1742-6596/978/1/012060.
[13] Choi, J. Y., Yang, S., Ro, Y. M. & Plataniotis, K. N. (2008). “Face annotation for personal photos using context-assisted face recognition,” in Proc.ACM Int. Conf. Multimedia Information Retrieval, 2008, pp. 44–51.
[14] Jaewon- Sung, T. Takeo, K., & Daijin, K. (2007). “A Unified Gradient-Based Approach for Combining ASM into AAM” International Journal of Computer Vision 75 (2), 297–309, 2007.
[15] ŐSZI, A. & RUIZ, L. S. (2016). Biometric Uses in Occupational Safety and Health. Vol. 11 no 4, December 2016. Retrieved November 23, 2018 from http://hadmernok.hu/164_01_arnold.pdf
Author Information
  • Department of Information Technology, National Open University of Nigeria (NOUN), Abuja, Nigeria

  • Department of Information Technology, National Open University of Nigeria (NOUN), Abuja, Nigeria

  • Department of Maths and Computer Science, National Open University of Nigeria (NOUN), Abuja, Nigeria

Cite This Article
  • APA Style

    Chinedu Paschal Uchenna, Adegher Pascal, Ogundu Prince. (2018). Evaluation of a Fingerprint Recognition Technology for a Biometric Security System. American Journal of Computer Science and Technology, 1(4), 74-84. https://doi.org/10.11648/j.ajcst.20180104.11

    Copy | Download

    ACS Style

    Chinedu Paschal Uchenna; Adegher Pascal; Ogundu Prince. Evaluation of a Fingerprint Recognition Technology for a Biometric Security System. Am. J. Comput. Sci. Technol. 2018, 1(4), 74-84. doi: 10.11648/j.ajcst.20180104.11

    Copy | Download

    AMA Style

    Chinedu Paschal Uchenna, Adegher Pascal, Ogundu Prince. Evaluation of a Fingerprint Recognition Technology for a Biometric Security System. Am J Comput Sci Technol. 2018;1(4):74-84. doi: 10.11648/j.ajcst.20180104.11

    Copy | Download

  • @article{10.11648/j.ajcst.20180104.11,
      author = {Chinedu Paschal Uchenna and Adegher Pascal and Ogundu Prince},
      title = {Evaluation of a Fingerprint Recognition Technology for a Biometric Security System},
      journal = {American Journal of Computer Science and Technology},
      volume = {1},
      number = {4},
      pages = {74-84},
      doi = {10.11648/j.ajcst.20180104.11},
      url = {https://doi.org/10.11648/j.ajcst.20180104.11},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.ajcst.20180104.11},
      abstract = {Authentication is a fundamental component of human interaction with computers. Traditional means of authentication, primarily password and personal identification numbers (PINs), have until recently dominated computing, and are likely to remain essential for the years to come. Over the years, passwords are kept simple to avoid them being easily forgotten. This has subjected them to higher vulnerability to much compromise by unauthorized persons. Thus, computers are forced to manage more and more passwords which imply that the likelihood of password being forgotten increases. Hence, biometrics is becoming more convenient and distinctly more precise than traditional methods such as passwords and PINs. Biometrics link the event to a particular individual, requires nothing to remember or carry, provides positive confirmation by verifying individuals are who they claim to be, and is becoming an inexpensive solution. This research work aims to evaluate fingerprint recognition technology for a biometric security system using the implementation at the Council for the Regulation of Engineering in Nigeria (COREN) as a case study; to reveal the enormous benefits of using or deploying biometrics which may include the increased security, increased convenience, reduce fraud, or delivery of enhanced services. An evaluation of the said system as deployed in COREN was advanced by the use of quantitative method which design administered a survey instrument in the form of a questionnaire among 20 employees of Council for Regulation of Engineering in Nigeria (COREN). Therefore, upon analyzing the responses from the field work conducted, it is evident that fingerprint recognition system is secured due to fingerprints uniqueness. The outcome of the system suggests that fingerprints, sensors and papillary line provide enough entropy on biometric security.},
     year = {2018}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Evaluation of a Fingerprint Recognition Technology for a Biometric Security System
    AU  - Chinedu Paschal Uchenna
    AU  - Adegher Pascal
    AU  - Ogundu Prince
    Y1  - 2018/12/26
    PY  - 2018
    N1  - https://doi.org/10.11648/j.ajcst.20180104.11
    DO  - 10.11648/j.ajcst.20180104.11
    T2  - American Journal of Computer Science and Technology
    JF  - American Journal of Computer Science and Technology
    JO  - American Journal of Computer Science and Technology
    SP  - 74
    EP  - 84
    PB  - Science Publishing Group
    SN  - 2640-012X
    UR  - https://doi.org/10.11648/j.ajcst.20180104.11
    AB  - Authentication is a fundamental component of human interaction with computers. Traditional means of authentication, primarily password and personal identification numbers (PINs), have until recently dominated computing, and are likely to remain essential for the years to come. Over the years, passwords are kept simple to avoid them being easily forgotten. This has subjected them to higher vulnerability to much compromise by unauthorized persons. Thus, computers are forced to manage more and more passwords which imply that the likelihood of password being forgotten increases. Hence, biometrics is becoming more convenient and distinctly more precise than traditional methods such as passwords and PINs. Biometrics link the event to a particular individual, requires nothing to remember or carry, provides positive confirmation by verifying individuals are who they claim to be, and is becoming an inexpensive solution. This research work aims to evaluate fingerprint recognition technology for a biometric security system using the implementation at the Council for the Regulation of Engineering in Nigeria (COREN) as a case study; to reveal the enormous benefits of using or deploying biometrics which may include the increased security, increased convenience, reduce fraud, or delivery of enhanced services. An evaluation of the said system as deployed in COREN was advanced by the use of quantitative method which design administered a survey instrument in the form of a questionnaire among 20 employees of Council for Regulation of Engineering in Nigeria (COREN). Therefore, upon analyzing the responses from the field work conducted, it is evident that fingerprint recognition system is secured due to fingerprints uniqueness. The outcome of the system suggests that fingerprints, sensors and papillary line provide enough entropy on biometric security.
    VL  - 1
    IS  - 4
    ER  - 

    Copy | Download

  • Sections