TABLE OF CONTENTS
DECLARATION - - - - - - - - - - . i
CERTIFICATION - - - - - - - - ii
DEDICATION - - - - - - - - - . iii
ACKNOWLEDGEMENT - - - - - - - - - . iv
ABSTRACT - - - - - - - . vi
TABLE OF CONTENTS - - - - - - - - vii
CHAPTER ONE - - - - - - - - - - . 1
1.0 Introduction - - - - - - - - 1
1.1 Statement of the problems - - - - - - - - . 2
1.2 Aim and objectives - - - - - - - 2
1.3 Scope and limitation of the study - - - - - - - . 3
CHAPTER TWO - - - - - - - - - - 4
LITERATURE REVIEW - - - - - - - - . 4
2.0 Introduction - - - - - - - - 4
2.1 Historical background of the study area - - - - - - . 5
2.2 The concept of modern biometric system - - - - - - - 5
2.3 Evolution of modern biometrics - - - - - - . 7
2.4 Technical development - - - - - - . 10
2.4.0 Classification of biometric - - - - - - - - 10
2.4.1 Wayman classifications of biometric - - - - - . 12
2.4.2 Key technologies of biometric - - - - - - . 14
2.5 Industry standards - - - - - - - - 22
2.6 Biometric concerns - - - - - - - - - . 23
2.6.0 Informational privacy concerns - - - - - - - . 24
2.6.1 Physical privacy concern - - - - - - - 25
2.6.2 Religious concerns - - - - - - . 25
2.7 Performance of biometric - - - - - - - - . 25
CHAPTER THREE - - - - - - - 28
METHODOLOGY AND SYSTEM ANALYSIS - - - - - - 28
3.0 Introduction - - - - - - - - - 28
3.1 Research methodology - - - - - - . 28
3.2 Modelling and requirements engineering - - - - - 31
3.2.0 Mapping GRAPPLE and Requirements Engineering - - - - . 32
3.2.1 Requirements Management using DOORS - - - - - - 35
3.2.2 Defining the Problem Domain - - - - - - . 35
3.3 Requirements engineering in the problem domain - - - - . 36
3.3.0 Fingerprint Authentication: Statement of Needs - - - - - 36
3.4 Requirements gathering in the problem domain - - - - - . 37
3.4.0 Develop Stakeholder Requirements - - - - - - - 37
3.4 Analysis of System Requirements - - - - - . 38
3.4.0 System functional Requirements - - - - - - - - . 38
3.4.1 Non-Functional Requirements - - - - - - . 39
CHAPTER FOUR - - - - - - - - - . 40
SYSTEM DESIGN, IMPLEMENTATION AND TESTING - - - 40
4.0 Introduction - - - - - - - - - 40
4.1 System design - - - - - - - - . 40
4.2 System requirements - - - - - - - 42
4.2.0 Hardware Requirement - - - - - - - . 42
4.2.1 Software Requirement - - - - - - - - - . 42
4.3 User interface design - - - - - - - 42
4.4 Database design - - - - - - - - - 43
4.5 System operational procedure - - - - - - . 44
4.6 System implementation - - - - - - 48
4.7 Software testing and validation - - - - - - 48
4.8 System testing - - - - - - - - . 49
CHAPTER FIVE - - - - - - - - 50
SUMMARY CONCLUSION AND RECOMMENDATION - - - 50
5.0 Summary - - - - - - - - - - . 50
5.1 Conclusion - - - - - - - - . 50
5.2 Recommendation - - - - - - - - - - 51
REFERENCES - - - - - - - - - - . 52
Appendix A - - - - - - - . 57
Operational screenshots - - - - - - - . 57