CRMS Documentation
CRMS Documentation
Prepared by Id
Abel Gezahegn 218069
Adama, Ethiopia
DECLARATION
We, undersigned declare that this research paper entitled “Crime report and record management
system using finger printer” is our original work and has not been presented for award of any degree
or diploma to any university or institution and all the material required for the study has been duly
acknowledged.
NAME SIGNATURE
Abel Gezahegn ________________
Bonsa Wakuma ________________
Genet Merid ________________
Nahom Mulugeta ________________
Senait Abebe ________________
Tigist Tufa ________________
i
APROVE SHEET
As University advisor, I, hereby certify that I have read and evaluated the senior essay undertaken
by Abel Gezahegn, Bonsa Wakuma, Genet Merid, Nahom Tesfaye , Senayit Abebe and Tigist Tufa
under my guidance, which is entitled “Crime report and record management system using finger
printer”. I recommend the paper to be submitted to department of Computer Science with my
approval as it fulfilled the requirements to award BA degree in Computer Science.
ii
ABSTRACT
Crime Report and Management System using finger printer is a Completely Web Based Application
which is applies to all police stations, court and airlines across the country. Nowadays, Crimes are
happened over the world, and it is in maximum case. Crime Report and Management System is
available offline as well as online with the active participation of the system. The main purpose of
Crime Report and Management System using finger printer is to reduce the cases of crime because of
recording criminal scenario with integrate user fingerprint and store on database. The project specially
moves towards crime record and verification. This study is help to provide an investigation of crime
and provide effective and efficient approaches to the investigation. The development of software
includes the process of planning, requirement analysis, system analysis and deployment and
maintenance Crime Record and management would really help the complainant and the authority to
communicate privately. This software provides a facility for reporting crimes online, registering
complaints, entering missing persons, showing most wanted person details, news reporting. Police and
police will receive the complaint can send a message regarding the status of the complaint to the user
who filed the complaint. Police can use this software to manage different crimes, judge use for
applying sentence and modifying criminal status and airline officer can see specific criminal that not
allow to move other country. Police, judge and airline officers gets their login password from the
admin directly. A MongoDB must be maintained for the temporary storage of the database to enable
the processing facilities. This paper describes how simple react coding has been used to design the
website. Finger print reader available on every police stations for verification purpose. Then we took
a look at the challenges ahead and opportunities in this fundamental technology that is all set to
revolutionize our digital world.
iii
ACKNOWLEDGEMENT
First and above all, we would like to thanks the almighty God, for helping and strengthen us in all
situations to accomplish this study in a good manner and for all the blessings in our life. Our
heartfelt thanks and sincere appreciation go to my advisor Mr. Dawit for his insightful comments,
support and continual guidance throughout my research work.
Finally, we would like to express our gratefulness for all members of our family, for their moral and
financial support and to all my friends those who directly or indirectly contributed for the successful
completion of our study.
iv
Table of Contents
May, 2024.......................................................................................................................................... 1
DECLARATION ............................................................................................................................... i
APROVE SHEET ............................................................................................................................. ii
ACKNOWLEDGEMENT ............................................................................................................... iv
Table of Contents .............................................................................................................................. v
List of Tables .................................................................................................................................... 7
CHAPTER ONE ............................................................................................................................. 1
INTRODUCTION........................................................................................................................... 1
1.1. Background of the Study ......................................................................................................... 1
1.2. Statement of the Problem ........................................................................................................ 2
1.3. Objective of Project ................................................................................................................. 2
1.3.1. General objective ............................................................................................................................ 2
1.3.2. Specific Objective ............................................................................................................................ 3
1.4. Significance of Project ............................................................................................................. 3
1.5. Scope and Limitations of a Project......................................................................................... 4
1.5.1. Scope................................................................................................................................................. 4
1.5.2. Limitation ........................................................................................................................................ 4
CHAPTER TWO .............................................................................................................................. 5
LITRETURE REVIEW .................................................................................................................... 5
2.1. Overview .................................................................................................................................... 5
2.2. History of Fingerprint ................................................................................................................ 6
2.2.1. Types of Fingerprints Patterns .......................................................................................................... 7
2.3. Digital image processing............................................................................................................ 8
2.3.1. Low-level processes .......................................................................................................................... 8
2.3.2. Mid-level processes .......................................................................................................................... 8
2.3.3. High-level processes ......................................................................................................................... 9
2.4. Fundamental Steps of Digital Image Processing ....................................................................... 9
2.4.1. Image Acquisition ............................................................................................................................. 9
2.4.2. Image Pre-processing ...................................................................................................................... 10
2.4.3. Fingerprint Image Enhancement ..................................................................................................... 10
2.4.4 Binarization ...................................................................................................................................... 11
2.5. Fingerprint Representation....................................................................................................... 11
v
2.5.1. Image-based representation............................................................................................................. 11
2.5.2. Global Ridge Pattern representation ............................................................................................... 11
2.5.3. Local Ridge Detail representation................................................................................................... 12
2.5.4. Intra-ridge Detail representation ..................................................................................................... 12
2.9. Review of Related Works ........................................................................................................ 12
CHAPTER THREE ...................................................................................................................... 15
METHODOLOGY ....................................................................................................................... 15
3.1. Project design ......................................................................................................................... 15
3.2. Data collection ........................................................................................................................ 16
3.3. Data Analysis .......................................................................................................................... 16
3.4. Tools to use ............................................................................................................................. 17
3.4.1. Tools for front end development.................................................................................................. 17
3.4.2. Tools for back end development .................................................................................................. 17
3.5. Risk and Constraints ............................................................................................................. 17
3.5.1. Risk ................................................................................................................................................. 17
3.5.2. Action Taken ................................................................................................................................. 18
3.6. Software and Hardware Specification ................................................................................. 18
3.6.1. Software requirements ................................................................................................................. 18
3.6.2. Hardware requirements ............................................................................................................... 18
Teams compositions ...................................................................................................................... 18
CHAPTER FOUR ........................................................................................................................... 19
SYSTEM DESIGN ......................................................................................................................... 19
4.1 System Modeling Using Object-Oriented Paradigm ................................................................ 19
4.2 Use Case Diagram..................................................................................................................... 19
User and Criminal Management: .............................................................................................................. 19
User Management: .................................................................................................................................... 19
Content Management: ............................................................................................................................... 20
Additional Considerations: ....................................................................................................................... 20
4.2.1 Identified Use Cases of This System ............................................................................................... 23
......................................................................................................................................................... 23
Fig 4.3 manage use case.................................................................................................................. 23
4.2.2 The manage criminal information use case ..................................................................................... 23
......................................................................................................................................................... 24
4.2.3 The manage criminal information use case ........................................................................... 24
......................................................................................................................................................... 24
vi
5.3 Sequence Diagram .................................................................................................................... 24
......................................................................................................................................................... 25
5.4 Activity Diagram ...................................................................................................................... 25
......................................................................................................................................................... 25
......................................................................................................................................................... 26
5.5 State chart Diagram................................................................................................................... 26
......................................................................................................................................................... 26
......................................................................................................................................................... 27
CHAPTER FIVE ............................................................................................................................ 28
SYSTEM IMPLEMENTATION AND TESTING ......................................................................... 28
5.1 System Implementation .......................................................................................................... 28
5.2 The Process of Coding .............................................................................................................. 29
5.2.1. Install Necessary Software .............................................................................................................. 29
5.2.2. Backend Development .................................................................................................................... 29
5.2.3. Frontend Development.................................................................................................................... 29
5.2.5. Running the Application .............................................................................................................. 29
Sample project source code ............................................................................................................ 30
Sample Web UI ............................................................................................................................... 31
5.2 Testing Techniques: .................................................................................................................. 33
CHAPTER SIX ............................................................................................................................... 34
CONCLUSION AND RECOMMENDATION .............................................................................. 34
5.1 Conclusion ............................................................................................................................... 34
5.2 Recomendations ........................................................................................................................ 34
Reference ........................................................................................................................................ 35
List of Tables
Table 1: teams compositions .......................................................................................................... 18
vii
CHAPTER ONE
INTRODUCTION
1.1. Background of the Study
In recent years, the rapid advancement of technology has significantly impacted various fields,
including law enforcement and crime management. One such technological innovation is the
integration of biometric systems, particularly fingerprint recognition, into crime management
systems. This study focuses on the implementation of a crime management system utilizing
fingerprint technology within the Ethiopian Federal Police. The objective is to enhance the
efficiency, accuracy, and security of crime data management and to support the overall law
enforcement efforts in Ethiopia.
The need for good record-keeping and information-sharing practices has taken on great significance
in today's global environment. Not only do well-organized records provide important internal
information (i.e., business operations and case management support— not to forget the official
memory of an agency's investigations), law enforcement agencies are now required to communicate
agency-to-agency and across continents to protect the Nation's citizens. Nothing is more necessary
to accomplishing that mission than having accessibility to accurate and timely records. Calls for
service records and investigative, arrest, criminal identification, detention, and even civil records
hold data that by themselves mean little; however, once pieced together with information from other
jurisdictions, the result can help with all levels of investigations and aid in safeguarding the Nation.
In Ethiopia there is no any advance and integrated computer based method to handle day to day
activities of crimes happen. Since now we are trying to develop a system that conveys good ways
to handle those things. The Crime Report and Management System (CRMS) provides optimal as
possible as plan for crime reports and managements. So many countries are faced with these
problems of crime reporting and managements of handlings. Now days the members of peoples
make crime are highly developed and educated than police officers. To make more peoples are
concerned to this and help to stop crimes this system can improve knowledge methods of all citizen
become crime fighter.
The Ethiopian Federal Police is responsible for maintaining law and order, preventing and
investigating crimes, and ensuring the safety of citizens across the country. Given the diverse and
expansive nature of Ethiopia, with its varying regional contexts and challenges, the integration of a
sophisticated crime management system is essential.
Ethiopia has been undergoing significant socio-economic transformations, which also bring about
1
changes in the nature and complexity of crimes. The traditional methods of crime management are
increasingly inadequate in addressing these evolving challenges. Therefore, there is a critical need
for modern, technology-driven solutions to enhance the capabilities of the Ethiopian Federal Police.
Several initiatives have been undertaken to modernize the Ethiopian Federal Police, including
training programs, international collaborations, and the introduction of new technologies. However,
comprehensive studies focusing on the integration of fingerprint technology in crime management
are limited.
Existing literature highlights the benefits of biometric systems in various law enforcement contexts
globally, but there is a gap in research specifically tailored to the Ethiopian context. This study aims
to fill that gap by providing a detailed analysis of the potential benefits, challenges, and
implementation strategies for a fingerprint-based crime management system in Ethiopia.
1.2. Statement of the Problem
Since the current system is file based, not using fingerprint reader for integrate criminal data and
not computerized ways it faces so many problems include technological, transport, material and
lack of moderate knowledge those all problems are listed under the following. Those are:
✓ Hard to gather information concerning crimes
✓ Lack moderated materials
✓ Collecting the crime effect is very hard
✓ Lack of evidences after suspected criminal
✓ Unable to generated automatic crimes report
✓ To design and implement a computer and web-based system for managing crime records,
replacing the current paper-based system.
✓ To create a secure and centralized database for storing and retrieving crime-related
information.
✓ To enhance data accessibility and minimize the risk of information loss in crime
management.
4
CHAPTER TWO
LITRETURE REVIEW
2.1. Overview
The evolution of crime reporting and management systems has greatly enhanced the capabilities of
law enforcement agencies. While modern systems offer significant benefits in terms of efficiency,
accuracy, and collaboration, they also present challenges related to technology integration, data
security, and ethical considerations. As these systems continue to evolve, it will be essential to
address these challenges through technological innovations, regulatory measures, and ongoing
research.
Fingerprint identification and verification system is one of the biometric methods that are very
reliable identification methods for every person. Due to the rapid development on technology,
fingerprint recognition had successfully implemented to some applications for use in verification
and identification. Reason of implementation of fingerprint recognition in fingerprint identification
and verification system is because of it can obtain easily, unalterable and unique. The research paper
main objectives had concerned about to apply the biometric to fingerprint identification and
verification system forensic science to support criminal investigation and in biometric systems, such
as civilian and commercial identification devices to make the user’s more easily and effectively.
Fingerprints have been used for over a century and are one of many forms of biometric to identify an
individual and to verify their identity. Fingerprint identification is commonly employed in forensic
science to support criminal investigations and in biometric systems, such as civilian and commercial
identification devices. Hence, there is a widespread use of fingerprints. Fingerprint recognition is
being widely applied for personal identification with the purpose 12 of high degree of security by
matching processes between two human fingerprints. However, some fingerprint images captured in
variant applications are poor in quality, which corrupted the accuracy of fingerprint recognition.
With identity fraud in our society reaching unprecedented proportions and an increasing emphasis
on the emerging personal automatic identification applications, biometric based verification,
especially fingerprint-based identification, is receiving a lot of attention. Fingerprint matching
techniques can be classified into three types.Correlation-based matching, minutiae-based matching
and non minutiae. Minutiae-based matching is the most popular and most widely used technique,
being the basis of the fingerprint comparison. The widely used minutiae-based representation does
not utilize a significant component of the rich discriminatory information available in the
fingerprints. Local ridge structures cannot be completely characterized by minutiae. Further,
5
minutiae-based matching has difficulty in quickly matching two fingerprint images containing
different numbers of unregistered minutiae points. Algorithm is designed to recognize fingerprint
images using a Gabor filter to capture both local and global details in a fingerprint with eight
different directions.
2.2. History of Fingerprint
There is archaeological evidence that fingerprints as a form of identification have been used at least
since 7000 to 6000 BC by the ancient Assyrians and Chinese. Clay pottery from these times
sometimes contains fingerprint impressions placed to mark the potter. Chinese documents bore a
clay seal marked by the thumbprint of the originator. Bricks used in houses in the ancient city of
Jericho were sometimes imprinted by pairs of thumbprints of the bricklayer. However, though
fingerprint individuality was recognized, there is no evidence this was used on a universal basis in
any of these societies. In the mid-1800's scientific studies were begun that would established two
critical characteristics of fingerprints that are true still to this day: no two fingerprints from different
fingers have been found to have the same ridge pattern, and fingerprint ridge patterns are
unchanging throughout life.
These studies led to the use of fingerprints for criminal identification, first in Argentina in 1896,
then at Scotland Yard in 1901, and to other countries in the early 1900's.Computer processing of
fingerprints began in the early 1960s with the introduction of computer hardware that could
reasonably process these images. Since then, automated fingerprint identification systems (AFIS)
have been deployed widely among law enforcement agencies throughout the world. In the 1980s,
innovations in two technology areas, personal computers and optical scanners, enabled the tools to
make fingerprint capture practical in non-criminal applications such as for ID-card programs. Now,
in the late 1990s, the introduction of inexpensive fingerprint capture devices and the development of
fast, reliable matching algorithms have set the stage for the expansion of fingerprint matching to
personal use. Why include a history of fingerprints in this chapter? This history of use is one that
other types of biometric do not come close to. Thus there is the 14 experience of a century of
forensic use and hundreds of millions of fingerprint matches by which we can say with some
authority that fingerprints are unique and their use in matching is extremely reliable.
Forensic scientists have used fingerprints in criminal investigations as a means of identification for
centuries. Fingerprint identification is one of the most important criminal investigation tools due to
two features: their persistence and their uniqueness. A person’s fingerprints do not change over time.
The friction ridges which create fingerprints are formed while inside the womb and grow
6
proportionally as the baby grows. Permanent scarring is the only way a fingerprint can change. In
addition, fingerprints are unique to an individual. Even identical twins have different fingerprints.
7
database. A computer can rapidly compare this function with that of anyone else in the world whose
finger image has been scanned.
2.3. Digital image processing
Image Processing is processing of images using mathematical operations by using any form of
signal processing for which the input is an image, a series of images, or a video, such as a
photograph or video frame; the output of image processing may be either an image or a set of
characteristics or parameters related to the image. Most image-processing techniques involve
treating the image as a two-dimensional signal and applying standard signal-processing techniques
to it. Images are also processed as three-dimensional signals where the third dimension being time or
the z-axis. Image processing usually refers to digital image processing, but optical and analog image
processing are also possible.
The acquisition of images (producing the input image in the first place) is referred to as imaging. In
modern sciences and technologies, images also gain much broader scopes due to the ever growing
importance of scientific visualization (of often large-scale complex scientific/experimental data).
Examples include microarray data in genetic research, or real-time multi-asset portfolio trading in
finance. Image analysis is the extraction of meaningful information from images; mainly from
digital images by means of digital image processing techniques. Image analysis tasks can be as
simple as reading bar coded tags or as sophisticated as identifying a person from their face.
Computers are indispensable for the analysis of large amounts of data, for tasks that require complex
computation, or for the extraction of quantitative information. On the other hand, the human visual
cortex is an excellent image analysis apparatus, especially for extracting higher-level information,
and for many applications-including medicine, security, and remote sensing - human analysts still
cannot be replaced by computers. For this reason, many important image analysis tools such as edge
detectors and neural networks are inspired by human visual perception models.
There are no clear-cut boundaries in the continuum from image processing at one end to computer
vision at the other. However, one useful paradigm is to consider three types of computerized
processes in this continuum: low- level processes, mid- level processes, and high level processes.
8
Mid-level processing on images involves tasks such as segmentation (partitioning an image into
regions or objects), description of those objects to reduce them to a form suitable for computer
processing, and classification (recognition) of individual objects. A mid-level process is
characterized by the fact that its inputs generally are images, but its outputs are attributes extracted
from those images (e.g., edges, contours, and the identity of individual objects).
9
smaller and can be easily embedded. On the other hand, silicon sensors are expensive, so the sensing
area of solid-state sensors is typically small.
b) Optical scanner: The finger touches a glass prism and the prism is illuminated with diffused light.
The light is reflected at the valleys and absorbed at the ridges. The reflected light is focused onto a
CCD or CMOS sensor. Optical fingerprint sensors provide good image quality and large sensing
area but they cannot be miniaturized because as the distance between the prism and the image sensor
is reduced, more optical distortion is introduced in the acquired image.
c) Ultrasound: Acoustic signals are sent, capturing the echo signals that are reflected at the
fingerprint surface. Acoustic signals are able to cross dirt and oil that may be present in the finger,
thus giving good quality images. On the other hand, ultrasound scanners are large and expensive,
and take some seconds to acquire an image. A new generation of touch less live scan devices that
generate a 3D representation of fingerprints is appearing. Several images of the finger are acquired
from different views using a multi camera system, and a contact-free 3D representation of the
fingerprint is constructed. This new sensing technology overcomes some of the problems that
intrinsically appear in contact-based sensors such as improper finger placement, skin deformation,
sensor noise or dirt.
10
true minutiae points it is essential to incorporate the enhancement algorithm used Gabor filter and
FFT.
2.4.4 Binarization
Binarization method and direct gray-level enhancement. Binarization method is preferred since the
image is only represented using 0 and 1 and most of the Matlab functions work on binary images. It
is possible to develop an enhancement algorithm that exploits these visual clues to improve the
clarity of ridge structures in corrupted fingerprint images. The fingerprint enhancement techniques
proposed by Jain is based on the convolution of the image with Gabor filters which has the local
ridge orientation and ridge frequency. The algorithm includes normalization, ridge orientation
estimation, ridge frequency estimation and filtering Gabor filters are band pass filters that have both
frequency-selective and orientation selective properties, thus the ridge are enhanced. The goal of
image processing stage is to binarize, enhance and skeletonized the original gray level image.
2.5. Fingerprint Representation
There are mainly three different kinds of fingerprint representations that are used in fingerprint
recognition systems and each has its own advantages and drawbacks. When observing the patterns
that the ridges of a fingerprint form together created a classification of fingerprints into five classes.
These classes are, arch, tented arch, left loop, right loop and whorl.
There are two main features that define the shape of a fingerprint. These are cores and deltas also
collectively known as macro-singularities. A core is often described as a point where a single ridge
line turns through 180 degrees. Similarly, a delta is described as a point where three ridge lines form
a triangle. These core and delta points characterize the overall shape. Arches can be easily identified
through the lack of any delta or core points. Also, whorls can be easily identified through the
presence of two core and two delta points. Differentiating the right loop, left loop and tented arch is
slightly more difficult, as all three have one core and one delta point.
12
component analysis (PCA) for fingerprint enhancement and feature extraction. This method aimed
to reduce noise and enhance the ridge structure in fingerprint images, leading to improved
recognition performance. Testing on a proprietary database, the system achieved an accuracy of
92%, with a false acceptance rate (FAR) of 2.1% and a false rejection rate (FRR) of 5.4%. The
approach, however, struggled with high-dimensional data processing, which increased
computational overhead .
Facial Recognition
Chen et al. (2019) presented a novel facial recognition system using deep residual networks
(ResNets). Their approach focused on improving feature representation by using residual learning to
mitigate the degradation problem in deep networks. Evaluated on the LFW and MegaFace datasets,
their model achieved a recognition accuracy of 98.6% and 97.4% respectively. Despite its high
accuracy, the model's deep architecture resulted in high memory usage, making it less suitable for
mobile applications .
Wang et al. (2020) explored the use of generative adversarial networks (GANs) for augmenting
training data in facial recognition systems. By generating realistic synthetic images, their method
addressed the issue of data scarcity and imbalance. The enhanced dataset led to an improved
recognition accuracy of 96.8% on the VGGFace2 dataset. However, the GAN-based approach
required substantial training time and was sensitive to training instability .
Nguyen and Tran (2022) developed a lightweight facial recognition model based on MobileNetV2
architecture for deployment on mobile devices. The model aimed to balance performance and
computational efficiency, achieving an accuracy of 95.2% on the CASIA-WebFace dataset while
maintaining a low inference time suitable for real-time applications. The trade-off was a slight
reduction in accuracy compared to more complex models .
Iris Recognition
Gupta et al. (2021) proposed an iris recognition system using a combination of histogram
equalization and discrete cosine transform (DCT) for feature extraction. Their system was designed
to enhance the contrast and extract distinctive features from iris images. Tested on the CASIA-
IrisV3 database, the system achieved an accuracy of 91.5%, with a FAR of 1.5% and an FRR of
6.2%. One limitation was the sensitivity to variations in illumination and occlusion .
Zhao and Liu (2022) introduced a deep learning-based iris recognition model leveraging a capsule
network (CapsNet). Their approach focused on capturing spatial hierarchies and relationships within
the iris patterns. The model was evaluated on the UBIRIS.v2 database, achieving a recognition
accuracy of 93.8%. The primary challenge faced was the requirement for a large annotated dataset
13
for effective training .
Hassan et al. (2023) developed a multi-modal biometric system combining iris and periocular
recognition to enhance security and accuracy. By integrating features from both modalities using a
deep fusion network, their system improved robustness against occlusions and variations in lighting
conditions. The evaluation on the MICHE-I dataset showed an accuracy of 96.1%. The complexity
of the multi-modal approach resulted in increased processing time and resource consumption.
14
CHAPTER THREE
METHODOLOGY
3.1. Project design
Integrating fingerprint technology with a crime report management system on a website involves
several steps, from selecting the appropriate hardware and software to ensuring data security and
compliance with legal standards. Here's a detailed guide:
Step-by-Step Guide to Integrate Fingerprint Technology with a Website Management System
1. Hardware Selection and Setup
Choose a Fingerprint Scanner: Select a reliable fingerprint scanner that is compatible with your
system requirements. Ensure it has the necessary drivers and SDKs (Software Development Kits) for
integration.
Install Drivers: Install the necessary drivers for the fingerprint scanner on the devices that will be
used to access the crime report management system.
2. Software Integration
SDK Integration: Use the SDK provided by the fingerprint scanner manufacturer to integrate the
hardware with your website. The SDK typically includes libraries and APIs that facilitate
communication between the scanner and your application.
Develop Backend Services: Create backend services to handle fingerprint data. This includes
capturing, processing, and storing the fingerprint data securely.
Capture Fingerprint: Write code to capture fingerprint data from the scanner.
Process Data: Implement algorithms to process and match fingerprint data. This could involve using
existing libraries or developing custom solutions.
Store Data Securely: Use encryption to store fingerprint data in a secure database.
3. Web Application Development
User Interface (UI) Development: Design and develop a user-friendly interface for the crime report
management system. This includes forms for crime reporting and fingerprint scanning.
Fingerprint Scanning UI: Add a section in your web application for fingerprint scanning where users
can place their finger on the scanner to authenticate or register their fingerprint.
JavaScript Integration: Use JavaScript to interact with the fingerprint scanner on the client-side. This
15
might involve using WebSockets or other real-time communication methods to capture and send
fingerprint data to the server.
4. Security and Compliance
Data Encryption: Ensure all fingerprint data is encrypted both in transit and at rest to protect against
unauthorized access and breaches.
Access Control: Implement robust access control mechanisms to ensure only authorized personnel
can access fingerprint data and crime reports.
Compliance: Ensure your system complies with legal and regulatory standards for biometric data
handling and privacy, such as GDPR or CCPA.
5. Testing and Deployment
Testing: Conduct thorough testing of the system to ensure accuracy, reliability, and security. This
includes functional testing, security testing, and user acceptance testing.
Deployment: Deploy the system on a secure server. Ensure that the fingerprint scanner is correctly
configured and accessible to users.
6. Maintenance and Support
Regular Updates: Keep the fingerprint scanner firmware, drivers, and your web application updated
to address any security vulnerabilities and improve performance.
User Training: Provide training for law enforcement personnel and other users on how to use the
fingerprint scanning feature effectively.
Technical Support: Set up a support system to address any issues or challenges users may face with
the fingerprint integration.
3.2. Data collection
Data collection is the most important part of the project to find the main requirement of the system
and to understand how the system works. We are going to use different methods to collect data.
Among the methods, we use the following:
✓ Observations:- to analyze the organization the previous crime management system
✓ Document analysis: - to get information about ways of crime managements from Oromia
police based on adama
✓ Interview:- for gathering direct information from the Commanders, judges and other polices
3.3. Data Analysis
We are going to use functional programming paradigms because JavaScript has strong support for
functional programming concepts. The main reason behind using FP is:
16
✓ In order to check reusability of the current crime management system in Ethiopia
✓ In order to define new or modify objects that can be combine with the current system
17
3.5.2. Action Taken
As a problems exist the solution as well be exists. Some solutions for problems are:
✓ Scanning the computer with antivirus and recovering the files
✓ Using additional laptop and working with them
✓ Searching companies that use similar hardware
3.6. Software and Hardware Specification
3.6.1. Software requirements
The CRMS uses VS code for the purpose of writing the codes and other required are listed below:
OS: Linux/Windows 7/8/8.1/10
Development tools: React, Node.js, MongoDB, Express.js and other libraries
3.6.2. Hardware requirements
Hardware requirement includes hardware required for developing the system. Those are:
Laptop or desktop with specification of
✓ Processor: Intel core i3 or more
✓ Hard disk: 50GB or more
✓ RAM: 6GB or more
Other hardware device
✓ Arduino UNO
✓ Fingerprint module
✓ Bread board
Teams compositions
The team that develops the project consists of six persons.
Name of Group Members Roles
Abel Gezahegn Programming
Bonsa Wakuma UX/UI design
Nahom Tesfaye Hardware integration
Genet Merid Data Analysis
Senait Abebe Documentation
Tigist Tufa Data Analysis
Table 1: teams composition
18
CHAPTER FOUR
SYSTEM DESIGN
4.1 System Modeling Using Object-Oriented Paradigm
Object-oriented modeling is essential for creating a clear and organized representation of the
system's structure and behavior. This paradigm uses classes and objects to model real-world entities
and their interactions.
User Management:
1. Travel Ban Criminal: Possibly a specific action related to imposing travel bans on
criminals.
2. Criminal Info: Retrieve detailed information about a criminal.
3. Add User: Add a new user to the system.
4. List User: Retrieve a list of users registered in the system.
5. User Management: Administer user accounts, possibly including roles and permissions.
19
Content Management:
1. Create Post: Create new posts, likely related to case updates or information sharing.
2. Edit Post: Modify existing posts, possibly for updates or corrections.
3. Search Post: Search for posts based on specific criteria.
4. Delete Post: Remove posts from the system, possibly to manage outdated or incorrect
information.
Additional Considerations:
• Permissions and Security: Ensure appropriate access control for different users (e.g.,
administrators, law enforcement personnel, general users).
• Integration: Consider integration with other systems or databases for comprehensive
criminal information management.
• Reporting: Possibly include reporting capabilities for generating insights or summaries of
criminal data.
20
Functionality: Capture detailed data such as personal information, criminal history, etc.
2. Check Criminal:
Description: Retrieve information about a specific criminal.
Functionality: Allow authorized users to access detailed criminal records and history.
3. Travel Ban:
Description: Manage or impose travel bans on individuals (possibly criminals).
Functionality: Implement and enforce travel restrictions through the system.
4. List Criminal:
Description: Retrieve a list of criminals stored in the system.
Functionality: Provide a comprehensive list of all individuals categorized as criminals in the
system.
5. Add Sentence:
Description: Record sentencing information for criminals.
Functionality: Document details of court sentences, penalties, and terms for convicted individuals.
6. Notification:
Description: Send notifications, possibly related to updates on criminals or cases.
Functionality: Notify users about important updates, changes in criminal status, or system-related
messages.
User Management:
1. Travel Ban Criminal:
Description: Possibly a specific action related to imposing travel bans on criminals.
Functionality: Execute travel restrictions for individuals marked for travel bans.
2. Criminal Info:
Description: Retrieve detailed information about a criminal.
Functionality: Provide in-depth criminal profiles and historical data for authorized users.
3. Add User:
Description: Add a new user to the system.
Functionality: Register new users with appropriate roles and permissions.
4. List User:
Description: Retrieve a list of users registered in the system.
Functionality: Display all active users along with their roles and contact information.
5. User Management:
Description: Administer user accounts, possibly including roles and permissions.
21
Functionality: Manage user accounts, permissions, and access levels within the system.
Content Management:
1. Create Post:
Description: Create new posts, likely related to case updates or information sharing.
Functionality: Publish updates, announcements, or case-related information for users.
2. Edit Post:
Description: Modify existing posts, possibly for updates or corrections.
Functionality: Allow authorized users to revise and update published content as needed.
3. Search Post:
Description: Search for posts based on specific criteria.
Functionality: Enable users to find relevant posts or information efficiently.
4. Delete Post:
Description: Remove posts from the system, possibly to manage outdated or incorrect information.
Functionality: Delete irrelevant or obsolete content to maintain data accuracy.
Additional Considerations:
Permissions and Security:
Description: Ensure appropriate access control for different users (e.g., administrators, law
enforcement personnel, general users).
Functionality: Implement role-based access control (RBAC) to safeguard sensitive information and
functionalities.
Integration:
Description: Consider integration with other systems or databases for comprehensive criminal
information management.
Functionality: Facilitate seamless data exchange and interoperability with external systems or
databases.
Reporting:
Description: Possibly include reporting capabilities for generating insights or summaries of criminal
data.
Functionality Generate reports on criminal activities, case progress, statistics, and other relevant
metrics as required
Use case diagrams illustrate the functional requirements of the system, depicting the interactions
between users (actors) and the system through use cases.
22
Fig 4.1 use case diagram
4.2.1 Identified Use Cases of This System
The manage User use case
The manage User use case describes us the components that are included in the manage branch
use case: these are update User, delete User, and add User.
23
4.2.3 The manage criminal information use case
The manage criminal information use case describes us the components that are included in the
manage criminal information use case: these includes add, delete and update criminal
information.
24
5.4 Activity Diagram
Activity diagrams illustrate the dynamic aspects of the system by modeling the flow
of activities.
25
5.5 State chart Diagram
State chart diagrams model the different states an object goes through during its
lifecycle in response to events.
26
27
CHAPTER FIVE
SYSTEM IMPLEMENTATION AND TESTING
5.1 System Implementation
Implementation is the process of building a software system based on a design.
a. Frontend Development
b. Backend Development
• API Development: Develop RESTful APIs for user authentication, crime reporting, and
searching.
• Fingerprint Processing: Integrate fingerprint scanning and processing capabilities using
Arduino library provided by the fingerprint scanner vendor.
• Database Schema: Design tables/collections for users, crime reports, police, judge, author
and fingerprints.
c. Database Design
• Users Table: Fields for user details (ID, name, role, etc.).
• Crimes Table: Fields for crime details (ID, description, date, location, fingerprint data etc.).
• Fingerprint Data: Store fingerprint templates securely.
• News Table: news contents
d. Fingerprint Integration
• Fingerprint Enrollment: Capture and store fingerprints when suspects are enrolled.
• Fingerprint Matching: Implement fingerprint matching to identify suspects.
e. Security Measures
28
• Access Control: Define roles and permissions for accessing different parts of the system.
• Node.js and npm: Make sure Node.js and npm are installed on your machine.
• MongoDB: Install MongoDB and ensure it is running.
• Fingerprint package: Obtain and install the fingerprint scanner package compatible with your
device.
b. Define Models:- Create MVC models folder and add index.js and arduino.js:
a. Set Up React Components:- Navigate to the client folder and create necessary components:
App.js and install react and vite tool
29
Sample project source code
30
Fig 5.3 Server side authentication code
Sample Web UI
31
Fig 5.5 admin add user page
32
5.2 Testing Techniques:
There are several testing techniques that can be used to test a CRMS. Here are some of the most
common techniques:
Unit Testing
Unit tests focus on individual components to ensure they work as expected. Backend Unit Tests
(using Jest and Supertest). and others tests like.
1. Functional testing: This involves testing the app's functionality to ensure that it works as intended.
This includes testing features such as searching for restaurants, selecting items from a menu, adding
items to a cart, and placing an order.
2. Usability testing: This involves testing the app's user interface to ensure that it is easy to use and
navigate. This includes testing features such as menu navigation and search functionality.
3. Security testing: This involves testing the app's security features to ensure that user data is protected.
This includes testing features such as user authentication, data encryption.
4. Compatibility testing: This involves testing the app's compatibility with different devices and
operating systems. This includes testing the app on different mobile devices, browsers, and operating
systems to ensure that it works correctly on all platforms.
33
CHAPTER SIX
CONCLUSION AND RECOMMENDATION
5.1 Conclusion
The integration of fingerprint identification within an online crime management system offers
numerous advantages in terms of accuracy, efficiency, security, and collaboration, ultimately
contributing to more effective crime prevention and law enforcement efforts. The objective of
software planning is to provide a frame work that enables the administrator to make timely schedules
reasonable estimates made within a limited time frame at the beginning of the software project and
should be updated regularly as the project progresses.
5.2 Recomendations
Implementing a crime management and record report system using fingerprint technology on the
MERN stack is a complex but rewarding task. By following best practices in planning, development,
testing, deployment, security, and maintenance, you can create a system that is robust, secure, and
user-friendly. Regular updates and user training will ensure the system remains effective and meets
the needs of its users.
34
Reference
wikipedia.org/wiki/Crime_in_Ethiopia.
https://www.researchgate.net/publication/358571160_Development_of_Biometric
Based_Crime_Investigation_System_for_the_Nigeria_Police_Force
https://www.scirp.org/journal/paperinformation?paperid=92272
https://et.usembassy.gov/u-s-citizen-services/victims-of-crime/
Jain, A., et al. "Enhanced Fingerprint Recognition Using Convolutional Neural Networks." Journal
of Biometric Research, 2019.
Kim, S., Park, J. "Adaptive Fingerprint Recognition with Deep Learning Techniques." IEEE
Transactions on Information Forensics and Security, 2020.
Ali, M., et al. "Hybrid Approach for Fingerprint Enhancement and Recognition Using Wavelet
Transform and PCA." International Journal of Computer Vision and Pattern Recognition, 2021.
Chen, L., et al. "Facial Recognition with Deep Residual Networks." IEEE Transactions on Neural
Networks and Learning Systems, 2019.
Wang, H., et al. "Data Augmentation with GANs for Improved Facial Recognition." Proceedings of
the IEEE Conference on Computer Vision and Pattern Recognition, 2020.
Nguyen, T., Tran, D. "MobileNetV2-based Lightweight Facial Recognition Model." International
Conference on Computer Vision and Mobile Computing, 2022.
Gupta, R., et al. "Iris Recognition Using Histogram Equalization and Discrete Cosine Transform."
Pattern Recognition Letters, 2021.
Zhao, X., Liu, Y. "Capsule Network-Based Iris Recognition System." Journal of Artificial
Intelligence Research, 2022.
Hassan, M., et al. "Multi-Modal Biometric System Combining Iris and Periocular Recognition."
IEEE Access, 2023.
35