Professional Documents
Culture Documents
TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
TABLE OF CONTENTS
LIST OF TABLES
LIST OF FIGURES
ABSTRACT
CHAPTER ONE
INTRODUCTION
1.1. INTRODUCTION
CHAPTER TWO
2.2. CRIME
2.4.1.1 GEOGRAPHICAL
2.4.1.2 SOCIOLOGICAL
CHAPTER THREE
3.1. INTRODUCTION
3.5.2. MODULARITY
CHAPTER FOUR
IMPLEMENTATION, RESULT AND DISCUSSION
4.1. INTRODUCTION
4..4.1. CODING
4.4.5. COMMISSIONING
4.5. RESULTS
4.7. DISCUSSION
CHAPTER FIVE
5.1. SUMMARY
5.2. CONCLUSION
5.3. RECOMMENDATION
REFERENCES
APPENDIX I
APPENDIX II
CHAPTER ONE
INTRODUCTION
1.1 INTRODUCTION
The traditional and age-old system of intelligence and criminal record maintenance has failed to
live up to the requirements of the existing crime scenario. Manual processes neither provide
accurate, reliable and comprehensive data round the clock nor does it help in trend prediction and
decision support. It also results in lower productivity and ineffective utilization of manpower.
The solution to this ever-increasing problem lies in the effective use of Information Technology.
Computerized Biological Verification System for crime control uses computer-generated records
Verification which is the process of establishing the truth, accuracy, or validity of something, we
often get verified on having access to bank accounts, entering a protected site, logging into a
computer and in police station base on crime Unfortunately, passport, keys, access cards and
major problems to all concerned. For example, hackers often disrupt computer networks, credit
card fraud is estimated at billions dollars per year worldwide. Therefore, robust, reliable and
foolproof personal identification solutions must be sought in order to address the deficiencies of
the conventional techniques, something that could verify that someone is physically the person
he/she claims to be. A biological verification system is a unique, measurable characteristic or
Crime tracking system allows police personnel to plan effectively for emergency response,
determine mitigation priorities, analyze historical events, and predict future events. Crime
tracking system helps identify potential suspects to increase investigators suspect base when no
leads are evident. The ability to access and process information quickly while displaying it in a
spatial and visual medium allows agencies to allocate resources quickly and more effectively. In
the ‘mission-critical’ nature of law enforcement, information about the location of a crime,
incident, suspect, or victim is often crucial to determine the manner and size of the response.
Crime tracking software helps co-ordinate vast amounts of location-based data from multiple
sources. It enables the user to layer the data and view the data most critical to the particular issue
or mission. It is used world over by police departments, both large and small, to provide
solutions for crime analysis, criminal tracking, traffic safety, community policing,
Crime tracking system helps crime officers determine potential crime sites by examining
complex seemingly unrelated criteria and displaying them all in an interface. It also helps them
map inmate populations, fixtures, and equipment to provide for the safety of inmates by
separating gang members, identifying high-risk or potentially violent inmates, and identifying
hazardous locations in an area. It reduces the potential for internal violence by providing better
command and control. Traditionally, these activities have been supported by paper and pen.
Police officers now have the ability to immediately generate crime report directly relevant to the
situation at hand. Police agencies collect vast amounts of data from many sources including
called-for-services, arrests, first information reports and daily report. The same information
provides a powerful decision making tool for investigators, supervisors, and administrators.
In this chapter, the study will be discussing the following sub headings; the background of study,
statement of the problem, the aim and objectives of the study, significance, scope and limitations
of the study as well as the definitions of technical terminologies used in the study.
Crime which is an offence that merits community condemnation and punishment, usually by way
of fine or imprisonment. This is different from a civil wrong (a tort), which is an action against
civil action to court. It is also possible for an individual to begin criminal proceedings, but this is
very rare. Some matters, such as assault, can be both crimes and civil wrongs at the same time.
The police can prosecute for assault and the victim can take civil action to recover money (or
Personal identification is ever present in our daily lives. For example we often have to prove our
identity for getting access to bank accounts, entering a protected site, withdrawing cashing from
an ATM machine, logging into a computer, and so on. Conventionally, we identity ourselves and
gain access by physically carrying passports, keys, access cards or by remembering passwords,
secret codes, and Personal Identification numbers (PINs). Unfortunately, passport, keys, access
cards can be lost, duplicated, stolen, or forgotten; and password, secret codes and Personal
Identification Numbers (PINs) can easily be forgotten, compromised, shared or observed. Such
deficiencies of conventional personal identification techniques have caused major problems to all
concerned. For example, hackers often disrupt computer networks, credit card fraud is estimated
at billions dollars per year worldwide. Therefore, robust, reliable and foolproof personal
identification solutions must be sought in order to address the deficiencies of the conventional
techniques, something that could verify that someone is physically the person he/she claims to
being for automatically recognized or verifying identity. By using a biological identification, the
individual verification can be done by doing the statistical analysis of biological characteristic.
This measurable characteristic can be physical, e.g. eye, face, finger image and hand, or
behavioral, e.g. signature and typing rhythm. Besides bolstering security, the systems also
enhance user convenience by alleviating the need to design and remember multiple complex
passwords.
In spite of the fact that automatic recognition systems based on fingerprints have been used by
law enforcement agencies worldwide for over 40years, biological recognition continues to
remain a very difficult pattern of recognition problem. Therefore, a proper system design is
needed to verify a person quickly and automatically (Uludag et al 2004). In this project, a
biological system is proposed for human verification i.e. authenticating the identity of an
individual. The software uses human features for verification process. Biological verification
system authorizes humans. It covers issues such as how users are given an identity, the
protection of that identity and the technologies supporting that protection, the term identity is a
more abstract concept that will always be difficult to define in way that satisfies everyone. It is a
concept that is fluid and contextual depending on a number of factors including culture. Thus the
term management is appended to “identity” to indicate that there is technological and best
practice framework around a somewhat intractable philosophical concept. Digital identity can be
interpreted as the codification of identity names and attributes of a physical instance in a way
that facilitates processing. In each organization there is normally a role or department that is
responsible for managing the scheme of digital identities of their staff and their own objects.
Historically, fingerprints have been used as the most authoritative method of authentication, but
recent court cases in the US and elsewhere have raised fundamental doubt about fingerprint
reliability. Outside of the legal system as well, fingerprint have been shown to be easily spoof
able, with British Telecom’s top computer-security official noting that “few” fingerprint readers
have not already been tricked by one spoof or another Hybrid or two-tired authentication
methods offers a compelling solution, such as private keys encrypted by fingerprint inside of a
USB device. In a computer data context, cryptographic methods have been developed which are
currently not spoof able if and only if the originator’s key has not been compromised. That the
originator (or anyone other than an attacker) knows (or doesn’t know) about a compromise is
irrelevant. It is not known whether these cryptographically based authentication methods are
provably secure since unanticipated mathematical development may make them vulnerable to
attack in future. If that were to occur, it may call into question much of the authentication in the
past. In particular, a digitally signed contract may be questioned when a new attack and the
Imo State Police command is saddled with the responsibility of eradicating crime, protecting
life/property of the masses, inculcating good moral standards, and enforcement of law. Statistics
shows that the commission receives approximately two hundred to three hundred suspects per
day ranging from rape, cybercrime, Arm rubbery, Murder and etc. These criminals are been
arraigned/prosecuted at the station or awaiting trials. These have posed a lot of stress/challenges
to the police officers due to the manual method of verifying criminals on the other hand.
Further investigation shows that sometimes the suspects stay all day/months without been tried
or verified, for instance whenever a suspect/ex-convict is arraigned in the custody for trial the
commission starts afresh to try the suspect again which is more tedious. What constitutes these
problems are; lack of automated system for verification, limited man power, and poor knowledge
of crime investigation.
It is against this background that the researcher decided to embark on this study with the aim of
designing biological verification system that can be used to reduce identified challenges in the
existing system.
The new system will provide a medium whereby statistical analysis of biological characteristic
can be used to detect a criminal, this measurable characteristic can be physical, e.g. eye, face,
finger image and hand, or behavioral, e.g. signature and typing rhythm. Besides bolstering
security, the systems also enhance user convenience by alleviating the need to design and
1.3STATEMENTS OF PROBLEM
1. In the existing system the command officers pass through stress in process of crime
verification.
2. The manual process of crime verification in the existing system is prone to time wastage
3. In the existing system there is Poor storage of data in times of retrieving a suspect
information
Imo state police command. In achieving this aim the following specific objectives will be
1. Reduce the amount of stress the command officers pass through during crime
verification
2. To ensure speed and accurate crime verification by using characteristic can be physical,
The new system when completed and implemented will enable the commission and similar
organization to improve in their mode of operation in terms of security. Besides, the study will
This research will only concentrate on using behavioral characteristics in crime verification for
In the course of the project work, certain constraints restrained the researcher from achieving the
Time constraint: Due to tedious academic activities like practical, assignment submission/
defense and exam preparation, the researcher was unable to complete the project requirement
process.
Inadequate funds: Due to inadequate funds, the researcher was unable to purchase the sublime
editor which could be used to make the programming process faster; therefore the researcher
For easier understanding of unfamiliar words used in the research work, their meanings are as
follows;
CCTV: Closed Circuit Television, a system used for broadcasting TV signals captured from
security cameras
DN: A nucleic acid molecule in the form of a twisted double strand double helix that is the major
POLICE: a civil organization whose members are given special legal powers by the government
and whose task is to maintain public order and to solve and prevent crimes
something illegal