Neural Network-Based Fingerprint Matching and Human Recognition System
Neural Network-Based Fingerprint Matching and Human Recognition System
ISSN No:-2456-2165
Abstract:- This research presents a neural network- The use of technology has provided many solutions for
based fingerprint matching and human recognition payroll fraud using a biometric approach. Biometric
system. The methods used are data collection, data technology employed the use of physical and behavioral
processing, data extraction, and convolutional neural traits of human beings such as their eyes, face, handwritten,
network (CNN). The CNN was adopted and used to fingerprint, voice, and iris among others, for person
develop the human identification system based on object- identification [10; 11].These biometric traits all have their
oriented methodology and then implemented with advantages and disadvantages as identified in [12], but the
Simulink. The result when tested showed that the new use of fingerprint technology has been the most consistent,
system was able to verify humans with the fingerprint at easy to use and affordable, reliable, and most used biometric
90% accuracy. technology all over the world when compared to other
biometric counterparts.
Keywords:- fingerprint, Convolutional Neural Network,
human identification, accuracy. Fingerprint-based technology employed the use of
fingerprint data for human identification. Many works have
I. INTRODUCTION employed various techniques to develop this system such as
image processing, fuzzy logic, expert system, and machine
Every day begins a story and this time, the narrative learning among others, however, the use of machine
was inspired by the ever-increasing rate of fraud across the learning techniques has provided a better solution when
globe. Fraud is simply a criminal and unlawful act to makea compared to others [13; 14; 15].
financial gain. This has eaten deep into the public and
private sectors and has remained a major challenge. Fraud Machine learning according to [16] isa series of
can occur in many forms such as impersonation, payroll algorithms thatcan learn and do classification or regression
fraud, malpractices, fabrication of fake documents, etc [1]. problems. These algorithms include K-nearest neighbor,
support vector machine, clustering, and Artificial Neural
Today the common trend is the issue of payroll fraud Network (ANN), among others, however, [17] have
[2]. Payroll fraud is an act of stealing money from an identified the use of the artificial neural network as the most
organization by the ghost worker perpetrators. Ghost reliable in solving image-based pattern recognition
workers are employeeson a payroll, but do not work for the problems. [18; 19; 20] used an artificial neural network to
company [3]. This has remained a challenge all over the solve the problem of human identification, but despite its
world and has crippled many economies.[4] Reportedly in success, it is not considered a solutionto the problems of
Borno state Nigeria, 22,556 ghost workers were discovered payroll fraud. The solution to the aforementioned problems
within the state government payroll system [5], further was proposed in this work as a development of a neural
investigation revealed that the introduction of the Integrated network-based fraud detection system using fingerprint
Payroll and Personnel Information System (IPPIS) matching technology.
uncovered 60,450 ghost workers in the Nigerian government
payroll system, among other cases mentioned in [6; 7; 8], II. METHODOLOGY
however, the IPPIS did not address the peculiarity of the
Nigerian University education system of operation. The methodology used for this system development is
the object-oriented analysis methodology. The methods
To solve this problem,[9] presented some include data collection, data processing, feature extraction,
administrative solutions which include the use of classification, and results.
technology, transparency in the payroll system, and Data collection: Data collation activity was done at the
accountability mechanisms, among others, however, the Enugu State University of Science and Technology
study revealed that the use of technology will provide a (ESUT).Fingerprint data of the students and staff were
more reliable solution to ghost worker fraud when compared collected using the KOJAK fingerprint scanner as shown
to the rest. in figure 1;
The setup was used to collect 515 fingerprint data of feature extraction techniques and concluded that it is the
students and nonacademic staff as the sample size. These best.
data were formatted using image quadratic programming- Classification: This process used a feed-forward artificial
based image resizing techniques in [22] to the same size and neural network to learn the fingerprint data and then
then stored in the training dataset. generate a classification algorithm. The neural network is
biologically inspired neurons that have weights, bias,
Data Processing: Fingerprint data always contain noise hidden layers, and activation functions to learn the patterns
that can originate from the nature of the query person's of the training data features and generate a reference
finger, dirty on the scanner, among other environmental verification model used for the verification of a person.
sources. This results in the poor quality of the data when Result: This is the verification output of the neural
collected and hence the need for data processing. The data network when tested with a test fingerprint set.
was processed using a filter developed by [23]. The filter
was used to remove noise and enhance the features of the III. SYSTEM DEVELOPMENT
data for better classification results.
Feature Extraction: This process was used to extract the The system development used a structural method that
fingerprint pixels into a compact feature vector. This was shows the logical interaction of the steps used to achieve the
achieved using a sequential binarization approach to new system. The development first configured neural
extract the image's interesting features using thinning network architecture as shown in figure 3; using the
algorithm adopted from [25]. The reason behind the attributes of the training dataset and then training the neuron
feature extraction choice was because [25] has with the data to learn and generate the desired classification
comparatively evaluated its performance with other reference model.
Figure 2 presents the structure of the neural network neurons are trained by loading the data into the neural
configured to train the fingerprint data.This was achieved network as a training and test set using the neural network
using the Rectified Linear Unit (ReLU) activation function toolbox to generate the configured neural network model in
which is the most used in developing neural network Figures 3a and 3b.
structures for pattern recognition problems [27]. The
(a)
(b)
IV. IMPLEMENTATION
The system was implemented using the neural network toolbox to load, configure and train the data as shown in figure 4;
To evaluate the performance of the fingerprint verification algorithm developed, the MSE model in [18] and Regression was
used and the result of the MSE is presented in figure 6;
The ideal regression (R) value is 1, however when R is in [19] and the average R results achieved is 0.9891 and
approximately 1, then the system is said to be very good. MSE OF 0.050877Mu.
From figure 7, it was observed that the overall regression
result achieved using the mean of the multisets is 0.9999, Having tested the verification algorithm and validated
which is approximately 1. The implication of the result the results, the system was integrated as an expert system
showed that the verification algorithm was able to identify and tested using the fingerprint of someselected staff of
individuals based on their fingerprints. The results were ESUT institution, and the results are presented in figure 8
validated using a tenfold cross-validation technique model and 9 respectively showing the query fingerprint data and
the verification result;
The need for a technological means of human [1.] Akeem T., Momoh I., Danlami J. (2016)”
identification has been identified by the world health Assessment of the variation of ghost employee fraud
organization [9] as the only reliable means to curb fraud in in Nigerian; 2008-2015
our society. This research has developed an artificial [2.] Albrecht CO (2009). International fraud: a
intelligence system that can verify the identity of individuals management perspective. Ph.D. dissertation.
using fingerprint data to help address the problem of payroll Barcelona: Universitat Ramon Lull.
fraud in our tertiary institutions. The system was tested and [3.] Amoako-Tuffour J (2002). Ghost names, shadow
the result showed that it was able to verify a person's workers, and the public sector wage bill. Accra,
identity with approximate zero (0) MSE which is very good. Ghana: Institute of Economic Affairs.
The study, therefore, recommends that other institutions and [4.] Editorial, Vanguard newspaper” The ghost worker
related stakeholders should adopt this system and solve the syndrome in Nigeria” 2 January 2021.
problem of payroll fraud once and for all. In this work, an [5.] Penn E., Mbuh N. Nchise D., Alain V. (2020) “
intelligent fingerprint verification system was developed to Employee fraud: an empirical review of ghost
solve the problem of payroll fraud and ghost worker workers” IJRAS; Vol 7; Issue 3; ISSN 2394-4404
syndrome. [6.] Agboola T., (2018) “ Effectiveness of Integrated
Payroll and Personnel Information System (IPPSS) in
Engr. Dr. Ene Princewill Chigozie is a researcher under the Instrumentation and Robotic Control group at the Exxon Mobile
Laboratory and a Lecturer in Electrical and Electronic Engineering Department, Faculty of Engineering, Enugu State University
of Science and Technology (ESUT). He obtained a B.Sc. Degree in Electrical and Electronic Engineering, M.Eng. and Ph.D.
Degree in Instrumentation and Control Engineering from EEE Dept. ESUT in 2006, 2012, and 2019 respectively. He is a member
of the Nigerian Society of Engineers (NSE), the Council for the Regulation of Engineering in Nigeria (COREN), and the Institute
of Electrical and Electronic Engineers (IEEE). His scientific interests include Artificial Intelligence in Robotic Control,
Mechatronics, Signal Processing, Computer Vision, and Power System Security. He has collaborated actively with researchers in
other disciplines of engineering.