Academia.eduAcademia.edu
[Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research UNIQUE IDENTIFICATION(UID) PROJECT FOR INDIVIDUALS OF ETHIOPIA Prabhakar Gantela*1 & Dr. R. Mahammad Shafi2 *1Lecturer, Department of Information Technology MizanTepi University, Ethiopia 2 Associate Professor, Department of Electrical & Computer Engineering MizanTepi University, Ethiopia Keywords: Unique identification number, population, subsidies, benefits, unique, refugees, drought, biometric, demographic, natural disaster, poverty, food starving, crisis etc. ABSTRACT Assigning Unique Identification(UID) Number or Social Security Number(SSN) to an individual has already been implemented in many countries since long back. The concept of identifying an individual using a ID has been revolutionary and has been a successful project in all the areas concerning to the benefits of the individual as well as government of a country. In this paper we concentrated on Ethiopia, its back ground, socio –economical standards and the use of Unique Identification Number and its impact in the present situations.Keeping in view thepresent scenario’s in Ethiopia, the project can be a beneficiary and away out even for the government to know exactly the people who are below the poverty line and can extent its subsidies only to the genuine citizens. So far there is no centralized database for the country where they can analyse, plan and execute the policies made by the government. We proposed assigning a UID to the individuals of Ethiopia which can solve various issues and also benefit the country to be placed as an outstanding icon of the continent. We pointed few areas as sample where this UID can he handy for the government. UID of an individual will be a unique number which will be stored in the centralized database with which the government comes to an understanding of the citizens in the country. INTRODUCTION Ethiopia- the fastest growing country in the African continent is now open for international market. Being the top from the under developed countries of the world, Ethiopia is still struggling to face the global challenges. To be a centre of attraction of the continent Ethiopia has to analyse their country status among the globe, the citizen’s socio-economic scenarios and also the census and statistics of the country. To maintain all these the country needs a centralized database and the need of identifying citizens of the country individually. One solution for this which we think is to assign a unique identification (UID) number or a social security number(SSN) for each individual and track their day to day transactions and record them on a centralized database. This might help the country in planning, analysing and executing government benefits only to the eligible people. This will also help the country in identifying the misuse of the subsidies and the benefits given to the needy. NATIONAL SCENARIO OF ETHIOPIA Ethiopia has a total population of 91.73 million (2014) and is one of the poorest countries in the world,with a per capita annual income of US$ 90 (2003). Percentage of population living in urban areas is 17% and population proportion between ages 30 and 70 years is 26.4% (2014). Ethiopia is experiencing recurrent problems as a result of droughts and conflicts. Drought has become a chronic occurrence, affecting the country periodically (once every 7–10 years) since 1983. Periodically, the dry lands experience heavy seasonal rains, which cause flooding leading to internaldisplacement and increased risk for diseases related to stagnant waters such as malaria and cholera. The widespread food shortages associated with these natural disasters further results in malnutrition and under nutrition. In order to address chronic poverty and persisting food insecurity, the Ethiopian government is since 2003 conducting a massive resettlement programme, under which 2.2 million people will be moved to more productive areas in future. Ethiopia is currently hosting some 124,000 refugees from Sudan, Somalia and Eritrea. While there areno official numbers of internally displaced persons, it is estimated that about 168,000 persons have been displaced by http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[58] [Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research conflict and ethnic tension. Refugees and displaced people are especially vulnerable from a health perspective because of their living conditions and reduced access to health services in recent times. Ethiopia is a federal democratic republic state, divided into nine National Regional States and the two Administrative CityCouncils: (a) (b) National Regional States: Tigray; Afar; Amhara; Oromia; Somalia; Benishangul-Gumuz; Southern Nations, Nationalities and Peoples Region (SNNPR); Gambella;and Harari; Administrative City Councils: Addis Ababa; and Dire Dawa. Each state is headed by a president assisted by heads of various regional bureaux. The states are responsiblefor their own legislative and administrative functions, except for foreign affairs and defence. The National Regional States as well as the Administrative Councils are further divided into 75 zones,551 woredas (i.e. districts) and approximately 10,000 kebeles (i.e. counties). Each region has a Regional Health Bureau (RHB) and Woreda Health Office. In 2004/05, there were 126 hospitals, 519 health centres, 1,797 health stations, 2899 health posts and1,299 private clinics in the country. Although there is no data available on the number of traditional healers in the country, it is well known that many Ethiopian households use them for various health problems. WHAT UID IS ALL ABOUT? An UID can be a number which can be 12 (or more)digits, randomly generated but unique, individual identification number issued by the Unique Identification Authority of Government body.Any individual, irrespective of age and gender, who is a resident in the country and satisfies the verification process laid down by the Government body can enrol in the UID program.Enrolment for UID is by appointment at residents’ convenience or at the decision of the body. There won’t be any deadline forenrolment.Each individual needs to enrol only once. There won’t be any charge for registering. The verification processused for enrolmentrequiresresidents to appear in person to apply for an UID. Resident’s need to complete an UID enrolment form.In addition, verification of UID enrolment uses multiple sources of information including demographic and biometric information. Demographic information includes; name, date of birth, gender, address, parent or guardian information for children, and contact information such as email addresses and phone numbers. Biometric information includes; photograph(s) or facial images, finger prints, and iris scans. Once an individual resident receives his/her UID it can be used as a proof of identity and address, i.e. authentication, anywhere in the country. This system has been followed by many countries in the world. Once a resident’s UID enrolment has been verified a letter containing the resident personal information, enrolment number, UID number, etc. is sent to the address the Resident provided during enrolment. In addition, Residents can download both their UID letters and cards online. The Information Technology Act of 2000 established legal recognition of digital signatures so that an UID letter received via Post and an e-UID downloaded from website are equally valid and can be used interchangeably. http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[59] [Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research Fig 1: - Sample UID issued by the Government to an individual (India) Fig 2: - Enrolment receipt given to an individual after capturing the data (India) http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[60] [Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research Fig 3: -Sample Social Security Number (SSN) of an Individual of USA BENEFITS OF UID IN ETHIOPIA Case1: -Identifying The Refugees And Migrants Ethiopia as of now is facing many problems both internally and externally. The internal conflicts that has been taking place since years and the pressure that is generated from the neighbouring countries make Ethiopia unstable. In either cases there is a common issue of migrations of Ethiopian citizens to other countries and people from other countries try to enter into Ethiopia. The refugees mainly recorded are from Sudan, Somalia and Eritrea. On using UID for each individual of Ethiopia the government can easily identify the person who migrates and also identify the persons those enter illegally. In both the cases for example if a person needs to open a bank account or want a house for rent or plans to buy a land or wants to start a company they have to show their UID to the concerned department. If the person is from other country and entered illegally he won’t be having UID issued by the government of Ethiopia and can be easily caught. On the other hand, if a person from Ethiopia migrates to other country the government can block his UID and again if the person enters Ethiopia he has to use his UID for any purpose and once if the UID is found to be operated he can be easily caught by the government officials. Case 2: - Identifyingthe Beneficiaries Of Government Subsidies As discussed earlier Ethiopia is highly effected by droughts for every 7-10 years. If the government plans to help the citizens by providing some products on subsidy, they can use this UID as UID records all the activities of an individual. If the person owns a house or owns a car, he won’tbe considered as poor and is not eligible for claiming the subsidy given by the government.Thus combating the misuse of resources to the ineligible persons. This works as the person while purchasing a car or a house has to submit his UID and the transaction will be recorded in the UID database. Hence the property of the government can be properly used. Case 3: -Identifying The Diseased Percentage As per the statistics the probability of dying between ages 30 and 70 from four main Non-Communicable Diseases (NCD) is 15% (2014). The four main NCDs considered were Cancers, Diabetes, Cardiovascular diseases and Chronic respiratory diseases. The progress in health status of the population indicates that about 80% of diseases in Ethiopia are attributable to preventable conditions related to infectious diseases, malnutrition; and personal and environmental hygiene. The prevalence of TB in Ethiopia is estimated to be 241 with incidence of 247 per 100 000 populations. The adult HIV prevalence is 1.5% in 2011 (4.2% for urban and 0.6% for rural) and is higher among females (1.9%) than males (1%). Environmental risk factors contribute to 31% of the total disease burden in the country. If the government wants to give any medical aid or any medicine for free to the diseased based on their financial status, there is no particular record with the government to estimate the people who are below the poverty line.By providing the UID to all the individuals the problem can be solved, As the UID tracks all the purchases and sales of an individual, the people who are really poor can be identified. http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[61] [Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research Case 4: - Provides Regional Statistics Ethiopia consists of nine (9) regions where the funds and treasure is generated by the regional bodies itself. The fund is also utilized only for that region. Only few areas such as federal, health, education etc. will be shared by the Ethiopian central government. For any representation from the region, central government responds with a helping hand.In order to estimate the regional statistics and also to understand the living style and expenditure ranges of the people, UID serves a lot. Before allotting the funds to any place or region, the central government can have a look at the statistics and then analyse the situation there in the region. UID is the only solution which serves at its best rather than following the manual reports produced by the officials that can be easily manipulated. Case 5: - General Purpose Analysis And Census The other benefit that we have with UID is identifying a person individually. These may be for his personal benefits. For example, any individual who needs to activate a new SIM card has to submit a copy of his UID. On any report received against this SIM number, the person can be easily identified. If a person needs a bank loan or if he is absconding without clearing the bank loan can be easily traced when he uses his UID for any transaction. Not only these but for any general purpose usages like education loan or purchases of a vehicle etc. can be monitored using UID. HOW THE PROJECT CAN BE IMPLEMENTED? Once the if the user enrols himself in the UID issuing centre, all the data which includes Iris, Bio metric and facial scan will be now captured and stored in a centralized database of the government.Figure 4illustrates how UID enrolment centres capture all this information in a biometric database. The overall flow of the data that happens at the UID issuing centre can be displayed in the following chart. We have taken three actors in this chart i.e. enrolment agency, resident / individual and registrar who finally confirms and stores the data. The overall mechanism that takes place in issuing a UID can be given as follows:  Individual presents himself in the issuing centre  Fills in the application form provided at the centre (Consists of demographic details).  Iris details are scanned.  Finger print details are scanned  Facial scan has to be done  A receipt will be issued after completion of scanning all the details. (Receipt contains Enrolment number, UID number, photo of the individual and also all the details that were scanned. Now this receipt will serve as a UID of the individual and can be accepted anywhere in the country. A detailed card containing the details issued by the government will be sent through post or can be easily downloaded from the website on entering the enrolment number provided on the receipt. http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[62] [Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research Fig 4: - Data flow at the UID issuing centre Since then he has to use his UID for any transactions that he does daily. These transactions will be recorded and stored in the centralized government database. TECHNOLOGY’S USED Many technologies have been developed specifically for the purpose of generating biometrics that can be used for authentication purposes. Beyond developing technologies, it is important to ensure that sufficient reliable, safe, and secure devices are available to support the requirements of a program. To fully utilize authentication via biometrics a process called “enrolment” must take place firstand a biometric authentication system must be used (Bromba, 2012). The enrolment process creates a biometric database for use in verifying identity. A biometric authentication system then verifies identity using a biometric capture devicesuch as a camera to detect the biometric characteristic, a processing unit such as a computer that extracts and processes data from the capture device, and software for comparison to existing biometric data in an enrolment database. As an example of reliability, iris scans are considered to be highly reliable because of the uniqueness of an individual’s eyes, i.e. the chance of a false identification using an iris scan is purported to be 1 x 1078(Wilson, 2005). Systems based on multimodal biometrics, i.e. the combination of two or more biometric characteristics such as finger prints and iris scans, is even more accurate(Iritech, 2015) and we use the same for issuing UID’s to an individual in this project. http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[63] [Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research a) Iris Technology Iris recognition is accomplished by analysing the random pattern of an individual’s iris via an iris scan and the mathematical analysis of the data acquired through that scan. Figure 5 illustrates the parts of the human eye. As shown in Figure 5, the iris is a ring around the pupil or centre of the eye. Like a snowflake, no two irises are alike; each has its own distinctive pattern. Further, because the iris lies under the cornea it is protected from damage and wear. This makes an iris scan more reliable than a finger print pattern which can be altered. Iris scanning is an ideal way of biometric identification since the iris is an internal organ that is largely protected by damage and wear by the cornea. This makes it more attractive then fingerprints which can be difficult to recognize after several years of certain types of manual labour. Figure 5 shows a camera’s view looking into a human eye during an iris scan (Hartley, 2011); and, Figure 6 illustrates how a camera is used to acquire an iris scan at an enrolment centre (Ganguly, 2015). As can be seen, the process does not have any lasers or bright lights. There is no contact (UIDAI, 2012). Fig 5: - The internal parts of a human eye Fig 6: - Iris Scan process and mechanism Fig 7: - Collecting Bio-metric samples of an individual b) Fingerprint Technology Fingerprint patterns have been used for a long time to identify individuals. According to the Scientific Working Group on Friction Ridge Analysis, Study and Technology (SWGFAST), a fingerprint is basically the impression made by the ridges of a finger. In the past this has been done by a forensics expert in fingerprint pattern analysis. Today the process of capturing, analysing and storing fingerprint patterns is being automated. And, associated standards for this automation have been created(SWGFAST, 2009).The technology utilized to automate the http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[64] [Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research process includes a fingerprint scanner, as shown in Figure 8, which captures a digital image of thefingerprint pattern. This scan is digitally processed to create a biometric template of the fingerprint pattern which is stored in the biometrics database to be used for matching during identity authentication(UIDAI, 2012). Fig 8: - Finger print scanning and data collection c) Facial Recognition Face recognition is often used as part of biometric authentication. Closed circuit television (CCTV) video surveillance, human computer interface and image database management all capture, analyse and store facial images used by facial recognition programs. A camera that can take a clear crisp photograph of the face is required, e.g. one with 2 megapixels or more spatial resolution. Once the image of a face is acquired by a camera the content is transformed into features which can be compared to available biometric facial data for the purpose of identity authentication. Fig 9: - Facial Recognition process CASE STUDY BY UNDERSTANDING HOW UID IS IMPLEMENTED IN OTHER COUNTRIES (for example INDIA). We have taken India as an example as it is the world’s largest biometric identification system being used now and is successful in its implementation. To overcome corruption, to develop a comprehensive and reliable identification system, the Government of India embarked on the “Aadhaar” program. An Aadhaar number is a unique identity number issued by the Unique Identity Authority of India (UIDAI) to individuals.India spends about “$60 billion annually on social programs, subsidies, and welfare benefits” (Daugman, 2014), only half of which reaches India’s poor; the rest is “siphoned away by corrupt officials and middlemen”(Nadhamuni, 2012). The Aadhaar project establishes a unique number identifying each individual that remains valid throughout the individual’s lifetime. Aadhaar is a random 12 digits’ number not associated with any personal identifiers such as caste, creed, religion or geographic location. No individual can have more than one Aadhaar. Aadhaar is portable, i.e. it can be used universally for a wide variety of services at a number of agencies. For example, Aadhaar can be used to receivebenefits payments such as Social Security Pension benefits. Identity verification is a routine problem in India and Aadhaar sounds like a fool proof solution to provide residents with access to banking services, mobile phone connections, Government benefits and subsidies and in the future other non-Governmental services. Aadhaar is the world’s largest ID platform. http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[65] [Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research As of April 20, 2015, more than 82 crores, or over 820 million, people had a unique Aadhaar number established for them(Government of India, 2015). In 2005 the Reserve Bank of India established the Board for Payment and Settlement Systems. The Board issued a vision document including an umbrella institution for all retail payment systems in India(National Payments Corporation of India, 2010). Out of this vision, the National Payments Corporation of India (NPCI) was incorporated as a Section 25 company operating for the benefit of its member banks and their customers. NPCI’s vision is to be “the Best Payments Network Globally”(National Payments Corporation of India, Background and Organisation, 2010). The Aadhaar Payments Bridge (APB) System is a payment system that utilizes Aadhaar Numbers issued by UIDAI and Institution (or Issuer) Identification Numbers (IIN) issued by NPCI. The APB System, launched in 2011, uses Aadhaar and IIN numbers to move Government subsidies and benefits into Aadhaar Enabled Bank Accounts (AEBA) of intended beneficiaries(National Payments Corporation of India, Frequently Asked Questions (FAQs) By Customers: Aadhaar Payment Bridge (APB) System, 2013). By the end of December, 2014, over 100 million Aadhaar numbers had been linked to bank accounts. Beyond this the Aadhaar biometric database, the largest biometric database in the world, alsoserves users ranging from LPG (Gas) consumers, Rural Reconstruction-Mahatma Gandhi National Rural Employment Guarantee Act (MNREGA) workers, public distribution system (PDS) recipients, remittance and scholarship beneficiaries, etc., all via Aadhaar numbers through the Aadhaar Payments Bridge System(Mayhew, 2014). Despite impediments the Aadhaar program has attained several major milestones. In a press release dated September 10, 2014, UIDAI reported that the Cabinet Committee on Economic Affairs approved Phase-V of the Unique Identification Project making enrolments of 100 crores, that is the enrolment of 1 billion people, possible in 2015(UIDAI, Cabinet Committee on Economic Affairs approves, 2014). Fig 10: - Growth in Aadhaar Numbers Established between June 2014 and May 2015(UIDAI, Aadhaar Generation Progress in India, 2015) Another major milestone, 100 million Aadhaar numbers having been linked to bank accounts ofAadhaar holders,has been reached with enabling these individuals to receive government welfaresubsidies and other payments directly into their bank accounts(UIDAI, 10 crore Aadhaar’s linked to Bank Accounts, 2014). Establishing a link between an Aadhaar number and a bank account makes it easier for the government to identify genuine beneficiaries and route welfare payments and subsidies directly into their bank accounts. CONCLUSION Issuing unique identity number (UID) to the individuals has several benefits and can help the country against corruption and misuse. The project can also help us in showing the world the scope and growth of Ethiopia in recent years. http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[66] [Gantela*, 4(3): March, 2017] ISSN 2349-6193 Impact Factor: 2.805 IJESMR International Journal OF Engineering Sciences & Management Research This project can address various issues concerned to the country and also avoid illegal migrations that can affect the security as well as the economy of the country. In this paper we have taken Ethiopia as it has huge scope for growth in the coming future. We are also sure that this project will be a cutting edge for the country. We hope that a country like India which is the second largest in population, was successful in registering 100million UID’s into a centralized database, Ethiopia with a total population of 91.73 million can also be successful in no time REFERENCES 1. Bromba, M. U. (2012, November 2). Biometrics Frequently Asked Questions. Retrieved May 28, 2015, from Bioidentification: http://www.bromba.com/faq/biofaqe.htm#Biometrie 2. Carter, J. (2011, May 8). The Glorious End of User Names and Passwords. Retrieved May 28, 2015, from Forbes: http://www.forbes.com/2011/05/05/user-names-passwords.html 3. Daugman, J. (2014, May 7). 600 million citizens of India are now enrolled with biometric ID. Retrieved May 27, 2015, from SPIE Defense & Security: http://spie.org/x108321.xml 4. Ganguly, B. (2015, March 18). File: Iris Scan - Biometric Data Collection - Aadhaar - Kolkata, India. Retrieved May 28, 2015, from Wikimedia Commons: http://commons.wikimedia.org/wiki/File:Iris_Scan_-_Biometric_Data_Collection_-_Aadhaar__Kolkata_2015-03-18_3662.JPG#file 5. Government of India. (2015, April 20). K-11022/188/20150-UIDAI (Auth-II). Sensitisation Workshop on Aadhaar Seeding and Authentication Services. New Delhi, Delhi, India: Government of India. 6. Hartley, D. (2011, June 1). How to Create a Safe Password? Retrieved May 28, 2015, from VR World: http://www.vrworld.com/2011/06/01/how-to-create-a-safe-password/ 7. Inst for Development & Research in Banking Tech, & Ernst & Young. (2013). Technology in Banking: Towards Improving Business Performance and Customer Engagement. Mumbai, India: Reserve Bank of India. 8. Iritech, I. (2015, April 21). Multimodal biometrics - A more accurate identification system. Retrieved May 28, 2015, from Iritech Blog: http://www.blogiritech.com/#!Multimodal-biometrics-%E2%80%93A-more-accurate-identification-system/c22wd/5535cc360cf2836c87e136b2 9. Mayhew, S. (2014, December 26). Unique Identification Authority of India sees 100 million Aadhaar numbers linked to bank accounts. Retrieved May 28, 2015, from Biometric Update.com: http://www.biometricupdate.com/201412/unique-identification-authority-of-india-sees-100-millionaadhaar-numbers-linked-to-bank-accounts 10. Nadhamuni, S. (2012, September 13). Aadhaar: The Implementation of the largest national ID project in the world. Berkeley, California, U.S.A.: CSAS.Retrievedfrom https://archive.org/details/CSAS_Talk_September_13_2012# http: // www.ijesmr.com © International Journal of Engineering Sciences & Management Research[67]