A Novel System of Fingerprint Recognition Approach for Immigration Control
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract : Insecurity is a pressing and important issue that needs urgent attention in Nigeria. The dramatic increase in worldwide flow of people, goods, and ideas has created a new group of threats. These are global organized crimes such as smuggling, trafficking, terrorism; cross‐border crimes, illegal migration, amongst others. It has been noted that these foreigners device a means of beating security devices put in place at the border. The Nigerian Immigration uses Automated Fingerprint identification system (AFIS) minutiae base, which is the most popular and extensively used method for fingerprint identification. It show poor performance for real time authentication and it has less noise tolerant unlike the correlation base approach. The authors therefore proposes an hybrid fingerprinting method that combines two approaches namely minutiae and correlation methods that can help identify identity fraud. The sole idea behind this is that one technique makes up for the deficiency of the other by so doing we obtain a reliable and efficient result and provide a more secured environment where immigrants will not be able to beat the system with their fraudulent tactics or acts as currently experienced. Java programming language is used because of its platform independence, scalability, easy integration, implementation and upgrade.
Authors and Affiliations
Fatai . O. Waheed , Awotunde . J. Bamidele , Matiluko . E. Opeyemi
A Novel Wrapper-filter Hybrid Method for Candidate SNPs Selection
Abstract: Genomic studies provide massive amount of data including thousands of Single Nucleotide Polymorphisms (SNPs). The analysis of SNPs helps to identify genetic variants related to complex traits. Therefore, it is...
Comparative Study and Analysis of Image Inpainting Techniques
Image inpainting is a technique to fill missing region or reconstruct damage area from an image.It removes an undesirable object from an image in visually plausible way.For filling the part of image, it use  ...
Automatic Ontology Creation for Research Paper Classification
Abstract: As a large number of research proposals are received at different journal or research institute, it is common to group them according to their similarities in research disciplines and the grouped proposals are...
Mathematical Modeling of Image Steganographic System
Image based steganography is a dangerous technique of hiding secret messages in the image in such a way that no one apart from the sender and intended recipient suspects the existence of the message. It is based...
Public conveyance system for shortest path nding for real road network
Abstract: This article analyzes problems of determining the shortest path and optimal route amongst the given stoppages. The model of the problem is presented as a directional graph, where nodes are pickup points (termed...