Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
17 views43 pages

CRMS Documentation

Uploaded by

Dawit Birhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views43 pages

CRMS Documentation

Uploaded by

Dawit Birhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

HARAMBE UNIVERSITY

DEPARTMENT OF COMPUTER SCIENCE

CRIME REPORT AND MANAGEMENT SYSTEM


USING FINGER PRINTER

A DOCUMENTATION PREPARED FOR FULFILMENT OF THE


REQUIRMENTS FOR BSc DEGREE IN COMPUTER SCIENCE

Prepared by Id
Abel Gezahegn 218069

Bonsa Wakuma 214836

Genet Merid 215078

Nahom Mulugeta 215143

Senait Abebe 213788


Tigist Tufa 215224

Advisor: Mr. Dawit


May, 2024

Adama, Ethiopia
DECLARATION
We, undersigned declare that this research paper entitled “Crime report and record management
system using finger printer” is our original work and has not been presented for award of any degree
or diploma to any university or institution and all the material required for the study has been duly
acknowledged.

NAME SIGNATURE
Abel Gezahegn ________________
Bonsa Wakuma ________________
Genet Merid ________________
Nahom Mulugeta ________________
Senait Abebe ________________
Tigist Tufa ________________

i
APROVE SHEET
As University advisor, I, hereby certify that I have read and evaluated the senior essay undertaken
by Abel Gezahegn, Bonsa Wakuma, Genet Merid, Nahom Tesfaye , Senayit Abebe and Tigist Tufa
under my guidance, which is entitled “Crime report and record management system using finger
printer”. I recommend the paper to be submitted to department of Computer Science with my
approval as it fulfilled the requirements to award BA degree in Computer Science.

NAME OF ADVISOR: Mr. Dawit SIGNATURE: ________________

ii
ABSTRACT
Crime Report and Management System using finger printer is a Completely Web Based Application
which is applies to all police stations, court and airlines across the country. Nowadays, Crimes are
happened over the world, and it is in maximum case. Crime Report and Management System is
available offline as well as online with the active participation of the system. The main purpose of
Crime Report and Management System using finger printer is to reduce the cases of crime because of
recording criminal scenario with integrate user fingerprint and store on database. The project specially
moves towards crime record and verification. This study is help to provide an investigation of crime
and provide effective and efficient approaches to the investigation. The development of software
includes the process of planning, requirement analysis, system analysis and deployment and
maintenance Crime Record and management would really help the complainant and the authority to
communicate privately. This software provides a facility for reporting crimes online, registering
complaints, entering missing persons, showing most wanted person details, news reporting. Police and
police will receive the complaint can send a message regarding the status of the complaint to the user
who filed the complaint. Police can use this software to manage different crimes, judge use for
applying sentence and modifying criminal status and airline officer can see specific criminal that not
allow to move other country. Police, judge and airline officers gets their login password from the
admin directly. A MongoDB must be maintained for the temporary storage of the database to enable
the processing facilities. This paper describes how simple react coding has been used to design the
website. Finger print reader available on every police stations for verification purpose. Then we took
a look at the challenges ahead and opportunities in this fundamental technology that is all set to
revolutionize our digital world.

iii
ACKNOWLEDGEMENT
First and above all, we would like to thanks the almighty God, for helping and strengthen us in all
situations to accomplish this study in a good manner and for all the blessings in our life. Our
heartfelt thanks and sincere appreciation go to my advisor Mr. Dawit for his insightful comments,
support and continual guidance throughout my research work.
Finally, we would like to express our gratefulness for all members of our family, for their moral and
financial support and to all my friends those who directly or indirectly contributed for the successful
completion of our study.

iv
Table of Contents

May, 2024.......................................................................................................................................... 1
DECLARATION ............................................................................................................................... i
APROVE SHEET ............................................................................................................................. ii
ACKNOWLEDGEMENT ............................................................................................................... iv
Table of Contents .............................................................................................................................. v
List of Tables .................................................................................................................................... 7
CHAPTER ONE ............................................................................................................................. 1
INTRODUCTION........................................................................................................................... 1
1.1. Background of the Study ......................................................................................................... 1
1.2. Statement of the Problem ........................................................................................................ 2
1.3. Objective of Project ................................................................................................................. 2
1.3.1. General objective ............................................................................................................................ 2
1.3.2. Specific Objective ............................................................................................................................ 3
1.4. Significance of Project ............................................................................................................. 3
1.5. Scope and Limitations of a Project......................................................................................... 4
1.5.1. Scope................................................................................................................................................. 4
1.5.2. Limitation ........................................................................................................................................ 4
CHAPTER TWO .............................................................................................................................. 5
LITRETURE REVIEW .................................................................................................................... 5
2.1. Overview .................................................................................................................................... 5
2.2. History of Fingerprint ................................................................................................................ 6
2.2.1. Types of Fingerprints Patterns .......................................................................................................... 7
2.3. Digital image processing............................................................................................................ 8
2.3.1. Low-level processes .......................................................................................................................... 8
2.3.2. Mid-level processes .......................................................................................................................... 8
2.3.3. High-level processes ......................................................................................................................... 9
2.4. Fundamental Steps of Digital Image Processing ....................................................................... 9
2.4.1. Image Acquisition ............................................................................................................................. 9
2.4.2. Image Pre-processing ...................................................................................................................... 10
2.4.3. Fingerprint Image Enhancement ..................................................................................................... 10
2.4.4 Binarization ...................................................................................................................................... 11
2.5. Fingerprint Representation....................................................................................................... 11
v
2.5.1. Image-based representation............................................................................................................. 11
2.5.2. Global Ridge Pattern representation ............................................................................................... 11
2.5.3. Local Ridge Detail representation................................................................................................... 12
2.5.4. Intra-ridge Detail representation ..................................................................................................... 12
2.9. Review of Related Works ........................................................................................................ 12
CHAPTER THREE ...................................................................................................................... 15
METHODOLOGY ....................................................................................................................... 15
3.1. Project design ......................................................................................................................... 15
3.2. Data collection ........................................................................................................................ 16
3.3. Data Analysis .......................................................................................................................... 16
3.4. Tools to use ............................................................................................................................. 17
3.4.1. Tools for front end development.................................................................................................. 17
3.4.2. Tools for back end development .................................................................................................. 17
3.5. Risk and Constraints ............................................................................................................. 17
3.5.1. Risk ................................................................................................................................................. 17
3.5.2. Action Taken ................................................................................................................................. 18
3.6. Software and Hardware Specification ................................................................................. 18
3.6.1. Software requirements ................................................................................................................. 18
3.6.2. Hardware requirements ............................................................................................................... 18
Teams compositions ...................................................................................................................... 18
CHAPTER FOUR ........................................................................................................................... 19
SYSTEM DESIGN ......................................................................................................................... 19
4.1 System Modeling Using Object-Oriented Paradigm ................................................................ 19
4.2 Use Case Diagram..................................................................................................................... 19
User and Criminal Management: .............................................................................................................. 19
User Management: .................................................................................................................................... 19
Content Management: ............................................................................................................................... 20
Additional Considerations: ....................................................................................................................... 20
4.2.1 Identified Use Cases of This System ............................................................................................... 23
......................................................................................................................................................... 23
Fig 4.3 manage use case.................................................................................................................. 23
4.2.2 The manage criminal information use case ..................................................................................... 23
......................................................................................................................................................... 24
4.2.3 The manage criminal information use case ........................................................................... 24
......................................................................................................................................................... 24
vi
5.3 Sequence Diagram .................................................................................................................... 24
......................................................................................................................................................... 25
5.4 Activity Diagram ...................................................................................................................... 25
......................................................................................................................................................... 25
......................................................................................................................................................... 26
5.5 State chart Diagram................................................................................................................... 26
......................................................................................................................................................... 26
......................................................................................................................................................... 27
CHAPTER FIVE ............................................................................................................................ 28
SYSTEM IMPLEMENTATION AND TESTING ......................................................................... 28
5.1 System Implementation .......................................................................................................... 28
5.2 The Process of Coding .............................................................................................................. 29
5.2.1. Install Necessary Software .............................................................................................................. 29
5.2.2. Backend Development .................................................................................................................... 29
5.2.3. Frontend Development.................................................................................................................... 29
5.2.5. Running the Application .............................................................................................................. 29
Sample project source code ............................................................................................................ 30
Sample Web UI ............................................................................................................................... 31
5.2 Testing Techniques: .................................................................................................................. 33
CHAPTER SIX ............................................................................................................................... 34
CONCLUSION AND RECOMMENDATION .............................................................................. 34
5.1 Conclusion ............................................................................................................................... 34
5.2 Recomendations ........................................................................................................................ 34
Reference ........................................................................................................................................ 35

List of Tables
Table 1: teams compositions .......................................................................................................... 18

vii
CHAPTER ONE
INTRODUCTION
1.1. Background of the Study
In recent years, the rapid advancement of technology has significantly impacted various fields,
including law enforcement and crime management. One such technological innovation is the
integration of biometric systems, particularly fingerprint recognition, into crime management
systems. This study focuses on the implementation of a crime management system utilizing
fingerprint technology within the Ethiopian Federal Police. The objective is to enhance the
efficiency, accuracy, and security of crime data management and to support the overall law
enforcement efforts in Ethiopia.
The need for good record-keeping and information-sharing practices has taken on great significance
in today's global environment. Not only do well-organized records provide important internal
information (i.e., business operations and case management support— not to forget the official
memory of an agency's investigations), law enforcement agencies are now required to communicate
agency-to-agency and across continents to protect the Nation's citizens. Nothing is more necessary
to accomplishing that mission than having accessibility to accurate and timely records. Calls for
service records and investigative, arrest, criminal identification, detention, and even civil records
hold data that by themselves mean little; however, once pieced together with information from other
jurisdictions, the result can help with all levels of investigations and aid in safeguarding the Nation.
In Ethiopia there is no any advance and integrated computer based method to handle day to day
activities of crimes happen. Since now we are trying to develop a system that conveys good ways
to handle those things. The Crime Report and Management System (CRMS) provides optimal as
possible as plan for crime reports and managements. So many countries are faced with these
problems of crime reporting and managements of handlings. Now days the members of peoples
make crime are highly developed and educated than police officers. To make more peoples are
concerned to this and help to stop crimes this system can improve knowledge methods of all citizen
become crime fighter.
The Ethiopian Federal Police is responsible for maintaining law and order, preventing and
investigating crimes, and ensuring the safety of citizens across the country. Given the diverse and
expansive nature of Ethiopia, with its varying regional contexts and challenges, the integration of a
sophisticated crime management system is essential.
Ethiopia has been undergoing significant socio-economic transformations, which also bring about
1
changes in the nature and complexity of crimes. The traditional methods of crime management are
increasingly inadequate in addressing these evolving challenges. Therefore, there is a critical need
for modern, technology-driven solutions to enhance the capabilities of the Ethiopian Federal Police.
Several initiatives have been undertaken to modernize the Ethiopian Federal Police, including
training programs, international collaborations, and the introduction of new technologies. However,
comprehensive studies focusing on the integration of fingerprint technology in crime management
are limited.
Existing literature highlights the benefits of biometric systems in various law enforcement contexts
globally, but there is a gap in research specifically tailored to the Ethiopian context. This study aims
to fill that gap by providing a detailed analysis of the potential benefits, challenges, and
implementation strategies for a fingerprint-based crime management system in Ethiopia.
1.2. Statement of the Problem
Since the current system is file based, not using fingerprint reader for integrate criminal data and
not computerized ways it faces so many problems include technological, transport, material and
lack of moderate knowledge those all problems are listed under the following. Those are:
✓ Hard to gather information concerning crimes
✓ Lack moderated materials
✓ Collecting the crime effect is very hard
✓ Lack of evidences after suspected criminal
✓ Unable to generated automatic crimes report

✓ Use file based system that consume time and labor

1.3. Objective of Project


1.3.1. General objective
The primary objective of the Crime Report Management System using Fingerprint Technology is
to enhance the accuracy, efficiency, and security of crime data management. This system aims to:
1. Improve Identification Accuracy: Utilize advanced fingerprint recognition to accurately
identify individuals involved in criminal activities, reducing the risk of errors associated
with manual identification methods.
2. Streamline Crime Reporting: Simplify and expedite the process of recording and
managing crime reports by integrating biometric verification, ensuring that records are
reliably linked to verified identities.
2
3. Facilitate Efficient Record Management: Enable efficient storage, retrieval, and analysis
of crime reports, making it easier for law enforcement agencies to track, investigate, and
resolve cases.
4. Support Inter-agency Collaboration: Provide a standardized platform that allows for
seamless information sharing and collaboration between different law enforcement
agencies, enhancing the overall effectiveness of crime prevention and investigation efforts.
5. Ensure Compliance with Legal Standards: Align with legal and regulatory standards for
biometric data handling and privacy, ensuring the system is compliant with relevant laws
and ethical guidelines.
1.3.2. Specific Objective
To achieve the above mentioned general objective, the project will also address the following
specific objectives.
✓ To develop a fingerprint-based crime record management system for the federal police
department and courts.

✓ To design and implement a computer and web-based system for managing crime records,
replacing the current paper-based system.

✓ To create a secure and centralized database for storing and retrieving crime-related
information.

✓ To enhance data accessibility and minimize the risk of information loss in crime
management.

✓ To improve efficiency and reduce time-consuming processes in crime record management

✓ To streamline information and evidence gathering, minimizing delays in investigations and


legal proceedings.
1.4. Significance of Project
By digitizing and storing fingerprint data in an online system, law enforcement agencies can quickly
search and match prints against a database of known offenders. This expedites the investigation
process and facilitates the apprehension of suspects. Online systems streamline record-keeping
processes by automating data entry and retrieval tasks. This reduces the paperwork and
administrative burden on law enforcement personnel, allowing them to focus more on investigative
work. And also
✓ Police office can access their daily working zones easily using their computer.
3
✓ The placement of police officer will be effective.
✓ Minimize wastage of resources including energy.
✓ Helps the investigating police officer to get previous information.
✓ The system is portable.
✓ Helps to initiate investigation on priority basis.
✓ Enhances accuracy of information to be collected for effective use.
✓ Helps to perform the speedy trials.
1.5. Scope and Limitations of a Project
1.5.1. Scope
As a general the scope of our system is as follows:
✓ Ensure data’s accuracy.
✓ Minimize manual data entry.
✓ Greater efficiency and better services.
✓ Generates crime reports.
✓ Greater help for police about criminal detail information
✓ Fast for connection between police, judge and airline officer
1.5.2. Limitation
Even though this project focuses on the crime reporting and managements systems it doesn’t include
the following because of time to do all this
✓ It doesn’t bring the crime person to the court
✓ It doesn’t work without connection except reading article book
✓ It doesn’t upload videos or image but capture and send online
✓ It doesn’t help for people for reporting report for police station

4
CHAPTER TWO
LITRETURE REVIEW
2.1. Overview
The evolution of crime reporting and management systems has greatly enhanced the capabilities of
law enforcement agencies. While modern systems offer significant benefits in terms of efficiency,
accuracy, and collaboration, they also present challenges related to technology integration, data
security, and ethical considerations. As these systems continue to evolve, it will be essential to
address these challenges through technological innovations, regulatory measures, and ongoing
research.
Fingerprint identification and verification system is one of the biometric methods that are very
reliable identification methods for every person. Due to the rapid development on technology,
fingerprint recognition had successfully implemented to some applications for use in verification
and identification. Reason of implementation of fingerprint recognition in fingerprint identification
and verification system is because of it can obtain easily, unalterable and unique. The research paper
main objectives had concerned about to apply the biometric to fingerprint identification and
verification system forensic science to support criminal investigation and in biometric systems, such
as civilian and commercial identification devices to make the user’s more easily and effectively.
Fingerprints have been used for over a century and are one of many forms of biometric to identify an
individual and to verify their identity. Fingerprint identification is commonly employed in forensic
science to support criminal investigations and in biometric systems, such as civilian and commercial
identification devices. Hence, there is a widespread use of fingerprints. Fingerprint recognition is
being widely applied for personal identification with the purpose 12 of high degree of security by
matching processes between two human fingerprints. However, some fingerprint images captured in
variant applications are poor in quality, which corrupted the accuracy of fingerprint recognition.
With identity fraud in our society reaching unprecedented proportions and an increasing emphasis
on the emerging personal automatic identification applications, biometric based verification,
especially fingerprint-based identification, is receiving a lot of attention. Fingerprint matching
techniques can be classified into three types.Correlation-based matching, minutiae-based matching
and non minutiae. Minutiae-based matching is the most popular and most widely used technique,
being the basis of the fingerprint comparison. The widely used minutiae-based representation does
not utilize a significant component of the rich discriminatory information available in the
fingerprints. Local ridge structures cannot be completely characterized by minutiae. Further,
5
minutiae-based matching has difficulty in quickly matching two fingerprint images containing
different numbers of unregistered minutiae points. Algorithm is designed to recognize fingerprint
images using a Gabor filter to capture both local and global details in a fingerprint with eight
different directions.
2.2. History of Fingerprint
There is archaeological evidence that fingerprints as a form of identification have been used at least
since 7000 to 6000 BC by the ancient Assyrians and Chinese. Clay pottery from these times
sometimes contains fingerprint impressions placed to mark the potter. Chinese documents bore a
clay seal marked by the thumbprint of the originator. Bricks used in houses in the ancient city of
Jericho were sometimes imprinted by pairs of thumbprints of the bricklayer. However, though
fingerprint individuality was recognized, there is no evidence this was used on a universal basis in
any of these societies. In the mid-1800's scientific studies were begun that would established two
critical characteristics of fingerprints that are true still to this day: no two fingerprints from different
fingers have been found to have the same ridge pattern, and fingerprint ridge patterns are
unchanging throughout life.
These studies led to the use of fingerprints for criminal identification, first in Argentina in 1896,
then at Scotland Yard in 1901, and to other countries in the early 1900's.Computer processing of
fingerprints began in the early 1960s with the introduction of computer hardware that could
reasonably process these images. Since then, automated fingerprint identification systems (AFIS)
have been deployed widely among law enforcement agencies throughout the world. In the 1980s,
innovations in two technology areas, personal computers and optical scanners, enabled the tools to
make fingerprint capture practical in non-criminal applications such as for ID-card programs. Now,
in the late 1990s, the introduction of inexpensive fingerprint capture devices and the development of
fast, reliable matching algorithms have set the stage for the expansion of fingerprint matching to
personal use. Why include a history of fingerprints in this chapter? This history of use is one that
other types of biometric do not come close to. Thus there is the 14 experience of a century of
forensic use and hundreds of millions of fingerprint matches by which we can say with some
authority that fingerprints are unique and their use in matching is extremely reliable.
Forensic scientists have used fingerprints in criminal investigations as a means of identification for
centuries. Fingerprint identification is one of the most important criminal investigation tools due to
two features: their persistence and their uniqueness. A person’s fingerprints do not change over time.
The friction ridges which create fingerprints are formed while inside the womb and grow

6
proportionally as the baby grows. Permanent scarring is the only way a fingerprint can change. In
addition, fingerprints are unique to an individual. Even identical twins have different fingerprints.

2.2.1. Types of Fingerprints Patterns


Fingerprints are classified by arch, loop, or whorl. All three of these types of fingerprints have more
specified types. There are eight general prints in total: the Plain Arch, the Tented Arch, the Central
Pocket Loop, the Ulnar Loop, the Radial Loop, the Plain Whorl, the accidental Whorl, and the
Double Loop Whorl.
Arches A fingerprint pattern in which the ridges pattern originates from one side of the pattern and
leaves from other side Arches can be broken into two sub-groups: Plain Arch: - This has a gentle
rise. While tented arch; This has a steeper rise than plain arches.
Loops a fingerprint pattern in which the ridge pattern flows inward and returns in the direction of
the origin. Loops can be divided into two groups: Radial loops: - These flow downward and toward
the radius (or the thumb side). Ulnar loops: - These flows toward the ulnar (or the little finger side).
The ulnar loop is more common.
Whorls ridges from circularly around a central point on finger. Whorls have a circular pattern and
have at least two deltas and a core.
A fingerprint is the feature pattern of one finger. Strong evidences shows that each fingerprint is
unique. Each person has his own fingerprints with the permanent uniqueness. So fingerprints have
been used for identification and forensic investigation for a long time. A fingerprint is an impression
of the friction ridges of all part of the finger. A friction ridge is a raised portion of the epidermis on
the palmer (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more
connected ridge units of friction ridge skin. Among all the biometric techniques, fingerprint-based
identification is the oldest method which has been successfully used in numerous applications.
Everyone is known to have unique, immutable fingerprints.
A fingerprint is made of a series of ridges and furrows on the surface of the finger. The uniqueness
of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae
points. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a
ridge ending. The number and locations of the minutiae vary from finger to finger in any particular
person, and from person to person for any particular finger (for example, the thumb on the left hand)
. When a set of finger images is obtained from an individual, the number of minutiae is recorded for
each finger. The precise locations of the minutiae are also recorded, in the form of numerical
coordinates, for each finger. The result is a function that can be entered and stored in a computer

7
database. A computer can rapidly compare this function with that of anyone else in the world whose
finger image has been scanned.
2.3. Digital image processing
Image Processing is processing of images using mathematical operations by using any form of
signal processing for which the input is an image, a series of images, or a video, such as a
photograph or video frame; the output of image processing may be either an image or a set of
characteristics or parameters related to the image. Most image-processing techniques involve
treating the image as a two-dimensional signal and applying standard signal-processing techniques
to it. Images are also processed as three-dimensional signals where the third dimension being time or
the z-axis. Image processing usually refers to digital image processing, but optical and analog image
processing are also possible.
The acquisition of images (producing the input image in the first place) is referred to as imaging. In
modern sciences and technologies, images also gain much broader scopes due to the ever growing
importance of scientific visualization (of often large-scale complex scientific/experimental data).
Examples include microarray data in genetic research, or real-time multi-asset portfolio trading in
finance. Image analysis is the extraction of meaningful information from images; mainly from
digital images by means of digital image processing techniques. Image analysis tasks can be as
simple as reading bar coded tags or as sophisticated as identifying a person from their face.
Computers are indispensable for the analysis of large amounts of data, for tasks that require complex
computation, or for the extraction of quantitative information. On the other hand, the human visual
cortex is an excellent image analysis apparatus, especially for extracting higher-level information,
and for many applications-including medicine, security, and remote sensing - human analysts still
cannot be replaced by computers. For this reason, many important image analysis tools such as edge
detectors and neural networks are inspired by human visual perception models.
There are no clear-cut boundaries in the continuum from image processing at one end to computer
vision at the other. However, one useful paradigm is to consider three types of computerized
processes in this continuum: low- level processes, mid- level processes, and high level processes.

2.3.1. Low-level processes


Low-level processes involve primitive operations such as image preprocessing to reduce noise,
contrast enhancement, and image sharpening. A low-level process is characterized by the fact that
both its inputs and outputs are images.

2.3.2. Mid-level processes

8
Mid-level processing on images involves tasks such as segmentation (partitioning an image into
regions or objects), description of those objects to reduce them to a form suitable for computer
processing, and classification (recognition) of individual objects. A mid-level process is
characterized by the fact that its inputs generally are images, but its outputs are attributes extracted
from those images (e.g., edges, contours, and the identity of individual objects).

2.3.3. High-level processes


Higher-level processing involves ―making sense‖ of an ensemble of recognized objects, as in
image analysis, and, at the far end of the continuum, performing the cognitive functions normally
associated with vision.
2.4. Fundamental Steps of Digital Image Processing
There are some fundamental steps in digital image processing.Such as image acquisition, image
enhancement, image binarization, image thinning, image extraction, image segmentation and image
matching.

2.4.1. Image Acquisition


This is the first step or process of the fundamental steps of digital image processing. Image
acquisition could be as simple as being given an image that is already in digital form. Generally, the
image acquisition stage involves preprocessing. Fingerprint acquisition image is classified as offline
(Inked) or Online (Live scan).An inked finger is first obtained on a paper, and then scanned. An
offline images produce very poor quality images because the ink spread un uniformly and is
therefore not exercised in online AFIS. In live scan sensing mechanism that can detect the ridge and
valleys present in the fingertip. For online fingerprint image acquisition, capacitive or optical
fingerprint scanners.
The acquisition of fingerprint images has been historically carried out by spreading the finger with
ink and pressing it against a paper. The paper is then scanned, resulting in a digital representation.
This process is known as off-line acquisition and is still used in law enforcement applications.
Currently, it is possible to acquire fingerprint images by pressing the finger against 19 the flat
surface of an electronic fingerprint sensor. This process is known as online acquisition. There are
three families of electronic fingerprint sensors based on the sensing technology.
a) Solid-state or silicon sensors: These consist of an array of pixels, each pixel being a sensor itself.
Users place the finger on the surface of the silicon, and four techniques are typically used to convert
the ridge/valley information into an electrical signal: capacitive, thermal, electric field and
piezoelectric. Since solid-state sensors do not use optical components, their size is considerably

9
smaller and can be easily embedded. On the other hand, silicon sensors are expensive, so the sensing
area of solid-state sensors is typically small.
b) Optical scanner: The finger touches a glass prism and the prism is illuminated with diffused light.
The light is reflected at the valleys and absorbed at the ridges. The reflected light is focused onto a
CCD or CMOS sensor. Optical fingerprint sensors provide good image quality and large sensing
area but they cannot be miniaturized because as the distance between the prism and the image sensor
is reduced, more optical distortion is introduced in the acquired image.
c) Ultrasound: Acoustic signals are sent, capturing the echo signals that are reflected at the
fingerprint surface. Acoustic signals are able to cross dirt and oil that may be present in the finger,
thus giving good quality images. On the other hand, ultrasound scanners are large and expensive,
and take some seconds to acquire an image. A new generation of touch less live scan devices that
generate a 3D representation of fingerprints is appearing. Several images of the finger are acquired
from different views using a multi camera system, and a contact-free 3D representation of the
fingerprint is constructed. This new sensing technology overcomes some of the problems that
intrinsically appear in contact-based sensors such as improper finger placement, skin deformation,
sensor noise or dirt.

2.4.2. Image Pre-processing


The fingerprint image is first pre-processed to remove noise and any irrelevant information. With the
objective of simplifying the task of minutiae extraction and make it more easy and reliable.
Enhancement and segmentation of the fingerprint are the most commonly methods performed in the
preprocessing step. Normalization is performed to remove the effect of sensor noise and gray-level
background which are the consequence of difference in finger pressure. Normalization is used to
standardize the intensity values in an image by adjusting the range of gray-level values so that it lies
within a desired range of values

2.4.3. Fingerprint Image Enhancement


Image enhancement is among the simplest and most appealing areas of digital image processing.
Basically, the idea behind enhancement techniques is to bring out detail that is obscured, or simply
to highlight certain features of interest in an image, Such as changing brightness & contrast.
A critical step in automatic fingerprint matching system is to automatically and reliably extract
minutiae from input finger print images. However the performance of the Minutiae extraction
algorithm relies heavily on the quality of the input fingerprint image. In order to ensure to extract the

10
true minutiae points it is essential to incorporate the enhancement algorithm used Gabor filter and
FFT.

2.4.4 Binarization
Binarization method and direct gray-level enhancement. Binarization method is preferred since the
image is only represented using 0 and 1 and most of the Matlab functions work on binary images. It
is possible to develop an enhancement algorithm that exploits these visual clues to improve the
clarity of ridge structures in corrupted fingerprint images. The fingerprint enhancement techniques
proposed by Jain is based on the convolution of the image with Gabor filters which has the local
ridge orientation and ridge frequency. The algorithm includes normalization, ridge orientation
estimation, ridge frequency estimation and filtering Gabor filters are band pass filters that have both
frequency-selective and orientation selective properties, thus the ridge are enhanced. The goal of
image processing stage is to binarize, enhance and skeletonized the original gray level image.
2.5. Fingerprint Representation
There are mainly three different kinds of fingerprint representations that are used in fingerprint
recognition systems and each has its own advantages and drawbacks. When observing the patterns
that the ridges of a fingerprint form together created a classification of fingerprints into five classes.
These classes are, arch, tented arch, left loop, right loop and whorl.
There are two main features that define the shape of a fingerprint. These are cores and deltas also
collectively known as macro-singularities. A core is often described as a point where a single ridge
line turns through 180 degrees. Similarly, a delta is described as a point where three ridge lines form
a triangle. These core and delta points characterize the overall shape. Arches can be easily identified
through the lack of any delta or core points. Also, whorls can be easily identified through the
presence of two core and two delta points. Differentiating the right loop, left loop and tented arch is
slightly more difficult, as all three have one core and one delta point.

2.5.1. Image-based representation


In image based representation, the fingerprint image itself is used as a template. There is no need for
a specific feature extracting algorithm, and the raw intensity pixel values are directly used. This
representation retains the most information about a fingerprint since fewer assumptions are made
about the application. However, a fingerprint recognition system that uses the image-based
representation requires tremendous storage space.

2.5.2. Global Ridge Pattern representation


This representation relies on the ridge structure, global landmarks and ridge pattern characteristic,
11
such as the singular points, ridge orientation map, and the ridge frequency map. This representation
is sensitive to the quality of the fingerprint images . However, the discriminative abilities of this
representation are limited due to absence of singular points.

2.5.3. Local Ridge Detail representation


This is the most widely used and studied fingerprint representation. Local ridge details are the
discontinuities of local ridge structure referred to as minutiae. Sir Francis Galton (1822-1922) was
the first person who observed the structures and permanence of minutiae. Therefore, minutiae are
also called ―Galton details‖. They are used by forensic experts to match two fingerprints. There are
about 150 different types of minutiae. However, to extract the minutiae from a poor quality image is
not an easy task. At present, most of the automatic fingerprint recognition systems are designed to
use minutiae as their fingerprint representations include this research.

2.5.4. Intra-ridge Detail representation


On every ridge of the finger epidermis, there are many tiny sweat pores. Pores are considered to be
highly distinctive in terms of their numbers, positions, and shapes. However, extracting pores is
feasible only in high-resolution fingerprint images and with good image quality. Therefore, this kind
of representation is not practical for most applications.
2.9. Review of Related Works
Many researchers have proposed fingerprinting approaches and they tried to find the best algorithm
that can produce fingerprint images with minimum noise and has maximum performance.
Jain et al. (2019) proposed a robust fingerprint recognition system utilizing convolutional neural
networks (CNNs) to improve feature extraction from fingerprint images. Their system enhanced the
accuracy of matching by integrating both ridge flow and minutiae information. The experimental
results demonstrated a significant improvement in recognition rates, achieving a 95% accuracy on
the FVC2004 database. However, the model's complexity resulted in longer processing times, which
could hinder real-time applications .
Kim and Park (2020) developed an adaptive fingerprint recognition algorithm based on deep
learning techniques. By employing a multi-layer perceptron (MLP) and a recurrent neural network
(RNN), their system was capable of learning temporal patterns in fingerprint features. The method
was tested on the NIST SD4 database, where it achieved a 94.5% accuracy, outperforming
traditional methods. The primary limitation noted was the requirement for extensive computational
resources during training .
Ali et al. (2021) introduced a hybrid approach combining wavelet transforms and principal

12
component analysis (PCA) for fingerprint enhancement and feature extraction. This method aimed
to reduce noise and enhance the ridge structure in fingerprint images, leading to improved
recognition performance. Testing on a proprietary database, the system achieved an accuracy of
92%, with a false acceptance rate (FAR) of 2.1% and a false rejection rate (FRR) of 5.4%. The
approach, however, struggled with high-dimensional data processing, which increased
computational overhead .
Facial Recognition
Chen et al. (2019) presented a novel facial recognition system using deep residual networks
(ResNets). Their approach focused on improving feature representation by using residual learning to
mitigate the degradation problem in deep networks. Evaluated on the LFW and MegaFace datasets,
their model achieved a recognition accuracy of 98.6% and 97.4% respectively. Despite its high
accuracy, the model's deep architecture resulted in high memory usage, making it less suitable for
mobile applications .
Wang et al. (2020) explored the use of generative adversarial networks (GANs) for augmenting
training data in facial recognition systems. By generating realistic synthetic images, their method
addressed the issue of data scarcity and imbalance. The enhanced dataset led to an improved
recognition accuracy of 96.8% on the VGGFace2 dataset. However, the GAN-based approach
required substantial training time and was sensitive to training instability .
Nguyen and Tran (2022) developed a lightweight facial recognition model based on MobileNetV2
architecture for deployment on mobile devices. The model aimed to balance performance and
computational efficiency, achieving an accuracy of 95.2% on the CASIA-WebFace dataset while
maintaining a low inference time suitable for real-time applications. The trade-off was a slight
reduction in accuracy compared to more complex models .
Iris Recognition
Gupta et al. (2021) proposed an iris recognition system using a combination of histogram
equalization and discrete cosine transform (DCT) for feature extraction. Their system was designed
to enhance the contrast and extract distinctive features from iris images. Tested on the CASIA-
IrisV3 database, the system achieved an accuracy of 91.5%, with a FAR of 1.5% and an FRR of
6.2%. One limitation was the sensitivity to variations in illumination and occlusion .
Zhao and Liu (2022) introduced a deep learning-based iris recognition model leveraging a capsule
network (CapsNet). Their approach focused on capturing spatial hierarchies and relationships within
the iris patterns. The model was evaluated on the UBIRIS.v2 database, achieving a recognition
accuracy of 93.8%. The primary challenge faced was the requirement for a large annotated dataset
13
for effective training .
Hassan et al. (2023) developed a multi-modal biometric system combining iris and periocular
recognition to enhance security and accuracy. By integrating features from both modalities using a
deep fusion network, their system improved robustness against occlusions and variations in lighting
conditions. The evaluation on the MICHE-I dataset showed an accuracy of 96.1%. The complexity
of the multi-modal approach resulted in increased processing time and resource consumption.

14
CHAPTER THREE
METHODOLOGY
3.1. Project design
Integrating fingerprint technology with a crime report management system on a website involves
several steps, from selecting the appropriate hardware and software to ensuring data security and
compliance with legal standards. Here's a detailed guide:
Step-by-Step Guide to Integrate Fingerprint Technology with a Website Management System
1. Hardware Selection and Setup
Choose a Fingerprint Scanner: Select a reliable fingerprint scanner that is compatible with your
system requirements. Ensure it has the necessary drivers and SDKs (Software Development Kits) for
integration.
Install Drivers: Install the necessary drivers for the fingerprint scanner on the devices that will be
used to access the crime report management system.
2. Software Integration
SDK Integration: Use the SDK provided by the fingerprint scanner manufacturer to integrate the
hardware with your website. The SDK typically includes libraries and APIs that facilitate
communication between the scanner and your application.
Develop Backend Services: Create backend services to handle fingerprint data. This includes
capturing, processing, and storing the fingerprint data securely.
Capture Fingerprint: Write code to capture fingerprint data from the scanner.
Process Data: Implement algorithms to process and match fingerprint data. This could involve using
existing libraries or developing custom solutions.
Store Data Securely: Use encryption to store fingerprint data in a secure database.
3. Web Application Development
User Interface (UI) Development: Design and develop a user-friendly interface for the crime report
management system. This includes forms for crime reporting and fingerprint scanning.
Fingerprint Scanning UI: Add a section in your web application for fingerprint scanning where users
can place their finger on the scanner to authenticate or register their fingerprint.
JavaScript Integration: Use JavaScript to interact with the fingerprint scanner on the client-side. This

15
might involve using WebSockets or other real-time communication methods to capture and send
fingerprint data to the server.
4. Security and Compliance
Data Encryption: Ensure all fingerprint data is encrypted both in transit and at rest to protect against
unauthorized access and breaches.
Access Control: Implement robust access control mechanisms to ensure only authorized personnel
can access fingerprint data and crime reports.
Compliance: Ensure your system complies with legal and regulatory standards for biometric data
handling and privacy, such as GDPR or CCPA.
5. Testing and Deployment
Testing: Conduct thorough testing of the system to ensure accuracy, reliability, and security. This
includes functional testing, security testing, and user acceptance testing.
Deployment: Deploy the system on a secure server. Ensure that the fingerprint scanner is correctly
configured and accessible to users.
6. Maintenance and Support
Regular Updates: Keep the fingerprint scanner firmware, drivers, and your web application updated
to address any security vulnerabilities and improve performance.
User Training: Provide training for law enforcement personnel and other users on how to use the
fingerprint scanning feature effectively.
Technical Support: Set up a support system to address any issues or challenges users may face with
the fingerprint integration.
3.2. Data collection
Data collection is the most important part of the project to find the main requirement of the system
and to understand how the system works. We are going to use different methods to collect data.
Among the methods, we use the following:
✓ Observations:- to analyze the organization the previous crime management system
✓ Document analysis: - to get information about ways of crime managements from Oromia
police based on adama
✓ Interview:- for gathering direct information from the Commanders, judges and other polices
3.3. Data Analysis
We are going to use functional programming paradigms because JavaScript has strong support for
functional programming concepts. The main reason behind using FP is:

16
✓ In order to check reusability of the current crime management system in Ethiopia
✓ In order to define new or modify objects that can be combine with the current system

3.4. Tools to use


The tools we are going to use for documents analysis in our projects are:
✓ Microsoft office 2013, 2019 for the purpose of writing the documentations
✓ Microsoft PowerPoint 2013, 2019
✓ Microsoft office VISIO professional 2013, 2017 and Edraw max for the purpose of drawing
the use-case, class, activity and other drawing. During implementations we are going to use:
✓ VS code for managing client and server side
✓ Github for collaborate the project
3.4.1. Tools for front end development
✓ React: for designing and dynamic functionality
✓ Tailwindcss: for styling the webpage
✓ Firebase: for store image files online
✓ Redux: for state management
✓ Redux toolkit: for easily use redux and redux persisitor
✓ Vite: to coordinate all front end tasks
3.4.2. Tools for back end development
✓ Node.js: for using JavaScript language as backend
✓ MongoDB: for NoSQL database
✓ Arduino UNO: for integrate fingerprint module to computer
✓ Fingerprint Module: for record and testing targeted person
✓ Express.js: for easily used node.js
✓ NPM: for controlling package managers
✓ JWT and passport.js: for authorization and authentication
3.5. Risk and Constraints
3.5.1. Risk
While we are developing our projects we may encounter different problems among:
✓ The computer virus and failures are some of them.
✓ Availability of hardware materials (fingerprint module)
✓ Power fluctuations and loss in the laboratories if computer is desktop

17
3.5.2. Action Taken
As a problems exist the solution as well be exists. Some solutions for problems are:
✓ Scanning the computer with antivirus and recovering the files
✓ Using additional laptop and working with them
✓ Searching companies that use similar hardware
3.6. Software and Hardware Specification
3.6.1. Software requirements
The CRMS uses VS code for the purpose of writing the codes and other required are listed below:
OS: Linux/Windows 7/8/8.1/10
Development tools: React, Node.js, MongoDB, Express.js and other libraries
3.6.2. Hardware requirements
Hardware requirement includes hardware required for developing the system. Those are:
Laptop or desktop with specification of
✓ Processor: Intel core i3 or more
✓ Hard disk: 50GB or more
✓ RAM: 6GB or more
Other hardware device
✓ Arduino UNO
✓ Fingerprint module
✓ Bread board

Teams compositions
The team that develops the project consists of six persons.
Name of Group Members Roles
Abel Gezahegn Programming
Bonsa Wakuma UX/UI design
Nahom Tesfaye Hardware integration
Genet Merid Data Analysis
Senait Abebe Documentation
Tigist Tufa Data Analysis
Table 1: teams composition

18
CHAPTER FOUR
SYSTEM DESIGN
4.1 System Modeling Using Object-Oriented Paradigm
Object-oriented modeling is essential for creating a clear and organized representation of the
system's structure and behavior. This paradigm uses classes and objects to model real-world entities
and their interactions.

Fig 4.1 system model

4.2 Use Case Diagram


User and Criminal Management:

1. Add Criminal: Add information about a new criminal to the system.


2. Check Criminal: Retrieve information about a specific criminal.
3. Travel Ban: Likely to manage or impose travel bans on individuals (possibly criminals).
4. List Criminal: Retrieve a list of criminals stored in the system.
5. Add Sentence: Record sentencing information for criminals.
6. Notification: Send notifications, possibly related to updates on criminals or cases.

User Management:

1. Travel Ban Criminal: Possibly a specific action related to imposing travel bans on
criminals.
2. Criminal Info: Retrieve detailed information about a criminal.
3. Add User: Add a new user to the system.
4. List User: Retrieve a list of users registered in the system.
5. User Management: Administer user accounts, possibly including roles and permissions.
19
Content Management:

1. Create Post: Create new posts, likely related to case updates or information sharing.
2. Edit Post: Modify existing posts, possibly for updates or corrections.
3. Search Post: Search for posts based on specific criteria.
4. Delete Post: Remove posts from the system, possibly to manage outdated or incorrect
information.

Additional Considerations:

• Permissions and Security: Ensure appropriate access control for different users (e.g.,
administrators, law enforcement personnel, general users).
• Integration: Consider integration with other systems or databases for comprehensive
criminal information management.
• Reporting: Possibly include reporting capabilities for generating insights or summaries of
criminal data.

Identified Actors of This System


1. police:.The manage criminal information use case describes us the components that are
included in the manage criminal information use case: these includes add, delete and
update criminal information.
2. Admin: The manage User use case describes us the components that are included in the
manage branch use case: these are update User, delete User, and add User.
3. Judge: includes viewing of reports. The manage criminal information use case describes us the
components that are included in the manage criminal information use case: these includes add,
delete and update criminal information.
4. Airline officer: This includes viewing of reports
5. Author:- posts new news

.Use Case Description


Based on the breakdown you've provided, here's a more structured overview of the system's
functionalities and considerations:
User and Criminal Management:
1. Add Criminal:
Description: Add information about a new criminal to the system.

20
Functionality: Capture detailed data such as personal information, criminal history, etc.
2. Check Criminal:
Description: Retrieve information about a specific criminal.
Functionality: Allow authorized users to access detailed criminal records and history.
3. Travel Ban:
Description: Manage or impose travel bans on individuals (possibly criminals).
Functionality: Implement and enforce travel restrictions through the system.
4. List Criminal:
Description: Retrieve a list of criminals stored in the system.
Functionality: Provide a comprehensive list of all individuals categorized as criminals in the
system.
5. Add Sentence:
Description: Record sentencing information for criminals.
Functionality: Document details of court sentences, penalties, and terms for convicted individuals.
6. Notification:
Description: Send notifications, possibly related to updates on criminals or cases.
Functionality: Notify users about important updates, changes in criminal status, or system-related
messages.
User Management:
1. Travel Ban Criminal:
Description: Possibly a specific action related to imposing travel bans on criminals.
Functionality: Execute travel restrictions for individuals marked for travel bans.
2. Criminal Info:
Description: Retrieve detailed information about a criminal.
Functionality: Provide in-depth criminal profiles and historical data for authorized users.

3. Add User:
Description: Add a new user to the system.
Functionality: Register new users with appropriate roles and permissions.
4. List User:
Description: Retrieve a list of users registered in the system.
Functionality: Display all active users along with their roles and contact information.
5. User Management:
Description: Administer user accounts, possibly including roles and permissions.
21
Functionality: Manage user accounts, permissions, and access levels within the system.
Content Management:
1. Create Post:
Description: Create new posts, likely related to case updates or information sharing.
Functionality: Publish updates, announcements, or case-related information for users.
2. Edit Post:
Description: Modify existing posts, possibly for updates or corrections.
Functionality: Allow authorized users to revise and update published content as needed.
3. Search Post:
Description: Search for posts based on specific criteria.
Functionality: Enable users to find relevant posts or information efficiently.
4. Delete Post:
Description: Remove posts from the system, possibly to manage outdated or incorrect information.
Functionality: Delete irrelevant or obsolete content to maintain data accuracy.
Additional Considerations:
Permissions and Security:
Description: Ensure appropriate access control for different users (e.g., administrators, law
enforcement personnel, general users).
Functionality: Implement role-based access control (RBAC) to safeguard sensitive information and
functionalities.
Integration:
Description: Consider integration with other systems or databases for comprehensive criminal
information management.
Functionality: Facilitate seamless data exchange and interoperability with external systems or
databases.
Reporting:
Description: Possibly include reporting capabilities for generating insights or summaries of criminal
data.
Functionality Generate reports on criminal activities, case progress, statistics, and other relevant
metrics as required
Use case diagrams illustrate the functional requirements of the system, depicting the interactions
between users (actors) and the system through use cases.

22
Fig 4.1 use case diagram
4.2.1 Identified Use Cases of This System
The manage User use case
The manage User use case describes us the components that are included in the manage branch
use case: these are update User, delete User, and add User.

Fig 4.3 manage use case

4.2.2 The manage criminal information use case


The manage criminal information use case describes us the components that are included in the
manage criminal information use case: these includes add, delete and update criminal
information.

23
4.2.3 The manage criminal information use case
The manage criminal information use case describes us the components that are included in the
manage criminal information use case: these includes add, delete and update criminal
information.

5.3 Sequence Diagram


A sequence diagram shows how objects interact in a particular scenario of a use case

24
5.4 Activity Diagram
Activity diagrams illustrate the dynamic aspects of the system by modeling the flow
of activities.

Login activity diagram

Add Criminal Information activity diagram

25
5.5 State chart Diagram
State chart diagrams model the different states an object goes through during its
lifecycle in response to events.

26
27
CHAPTER FIVE
SYSTEM IMPLEMENTATION AND TESTING
5.1 System Implementation
Implementation is the process of building a software system based on a design.
a. Frontend Development

• Login and Registration Forms: Create forms for user authentication.


• Crime Report Form: Interface for reporting crimes, including fields for details and suspect
fingerprints.
• Search Interface: Allow users to search for suspects using fingerprint data.

b. Backend Development

• API Development: Develop RESTful APIs for user authentication, crime reporting, and
searching.
• Fingerprint Processing: Integrate fingerprint scanning and processing capabilities using
Arduino library provided by the fingerprint scanner vendor.
• Database Schema: Design tables/collections for users, crime reports, police, judge, author
and fingerprints.

c. Database Design

• Users Table: Fields for user details (ID, name, role, etc.).
• Crimes Table: Fields for crime details (ID, description, date, location, fingerprint data etc.).
• Fingerprint Data: Store fingerprint templates securely.
• News Table: news contents

d. Fingerprint Integration

• Fingerprint Enrollment: Capture and store fingerprints when suspects are enrolled.
• Fingerprint Matching: Implement fingerprint matching to identify suspects.

e. Security Measures

• Encryption: Encrypt sensitive data in the database.


• Authentication: Implement strong authentication mechanisms.

28
• Access Control: Define roles and permissions for accessing different parts of the system.

5.2 The Process of Coding


5.2.1. Install Necessary Software

• Node.js and npm: Make sure Node.js and npm are installed on your machine.
• MongoDB: Install MongoDB and ensure it is running.
• Fingerprint package: Obtain and install the fingerprint scanner package compatible with your
device.

Initialize the Project:- npm init -y

Install Dependencies:- npm install express mongoose bcryptjs jsonwebtoken body-parser

5.2.2. Backend Development


a. Set Up Express Server:- Create a file named server.js in the root directory:

b. Define Models:- Create MVC models folder and add index.js and arduino.js:

5.2.3. Frontend Development

a. Set Up React Components:- Navigate to the client folder and create necessary components:
App.js and install react and vite tool

5.2.4. Integrate Fingerprint Scanning


Integrate fingerprint scanning in CrimeVerify.jsx and AddCriminal.jsx to capture and store
fingerprints:
5.2.5. Running the Application

Start the Backend:- npm run dev

Start the Frontend:- cd client => npm run dev

29
Sample project source code

Fig 5.1 Client side admin user management

Fig 5.2 Server side main page source code

30
Fig 5.3 Server side authentication code

Sample Web UI

Fig 5.4 login page

31
Fig 5.5 admin add user page

Fig 5.6 News page

32
5.2 Testing Techniques:
There are several testing techniques that can be used to test a CRMS. Here are some of the most
common techniques:

Unit Testing

Unit tests focus on individual components to ensure they work as expected. Backend Unit Tests
(using Jest and Supertest). and others tests like.

1. Functional testing: This involves testing the app's functionality to ensure that it works as intended.
This includes testing features such as searching for restaurants, selecting items from a menu, adding
items to a cart, and placing an order.

2. Usability testing: This involves testing the app's user interface to ensure that it is easy to use and
navigate. This includes testing features such as menu navigation and search functionality.

3. Security testing: This involves testing the app's security features to ensure that user data is protected.
This includes testing features such as user authentication, data encryption.

4. Compatibility testing: This involves testing the app's compatibility with different devices and
operating systems. This includes testing the app on different mobile devices, browsers, and operating
systems to ensure that it works correctly on all platforms.

33
CHAPTER SIX
CONCLUSION AND RECOMMENDATION

5.1 Conclusion

The integration of fingerprint identification within an online crime management system offers
numerous advantages in terms of accuracy, efficiency, security, and collaboration, ultimately
contributing to more effective crime prevention and law enforcement efforts. The objective of
software planning is to provide a frame work that enables the administrator to make timely schedules
reasonable estimates made within a limited time frame at the beginning of the software project and
should be updated regularly as the project progresses.
5.2 Recomendations

Implementing a crime management and record report system using fingerprint technology on the
MERN stack is a complex but rewarding task. By following best practices in planning, development,
testing, deployment, security, and maintenance, you can create a system that is robust, secure, and
user-friendly. Regular updates and user training will ensure the system remains effective and meets
the needs of its users.

34
Reference
wikipedia.org/wiki/Crime_in_Ethiopia.
https://www.researchgate.net/publication/358571160_Development_of_Biometric
Based_Crime_Investigation_System_for_the_Nigeria_Police_Force
https://www.scirp.org/journal/paperinformation?paperid=92272
https://et.usembassy.gov/u-s-citizen-services/victims-of-crime/
Jain, A., et al. "Enhanced Fingerprint Recognition Using Convolutional Neural Networks." Journal
of Biometric Research, 2019.
Kim, S., Park, J. "Adaptive Fingerprint Recognition with Deep Learning Techniques." IEEE
Transactions on Information Forensics and Security, 2020.
Ali, M., et al. "Hybrid Approach for Fingerprint Enhancement and Recognition Using Wavelet
Transform and PCA." International Journal of Computer Vision and Pattern Recognition, 2021.
Chen, L., et al. "Facial Recognition with Deep Residual Networks." IEEE Transactions on Neural
Networks and Learning Systems, 2019.
Wang, H., et al. "Data Augmentation with GANs for Improved Facial Recognition." Proceedings of
the IEEE Conference on Computer Vision and Pattern Recognition, 2020.
Nguyen, T., Tran, D. "MobileNetV2-based Lightweight Facial Recognition Model." International
Conference on Computer Vision and Mobile Computing, 2022.
Gupta, R., et al. "Iris Recognition Using Histogram Equalization and Discrete Cosine Transform."
Pattern Recognition Letters, 2021.
Zhao, X., Liu, Y. "Capsule Network-Based Iris Recognition System." Journal of Artificial
Intelligence Research, 2022.
Hassan, M., et al. "Multi-Modal Biometric System Combining Iris and Periocular Recognition."
IEEE Access, 2023.

35

You might also like