SlideShare a Scribd company logo
1 of 14
Download to read offline
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
DOI : 10.5121/ijesa.2018.8403 27
FINGERPRINT CLASSIFICATION BASED ON
ORIENTATION FIELD
Zahraa Hadi Khazaal and Safaa S. Mahdi
Department of Computer Engineering, Al Nahrain University, Baghdad, Iraq
ABSTRACT
This paper introduces an effective method of fingerprint classification based on discriminative feature
gathering from orientation field. A nonlinear support vector machines (SVMs) is adopted for the
classification. The orientation field is estimated through a pixel-Wise gradient descent method and the
percentage of directional block classes is estimated. These percentages are classified into four-dimensional
vector considered as a good feature that can be combined with an accurate singular point to classify the
fingerprint into one of five classes. This method shows high classification accuracy relative to other spatial
domain classifiers.
KEYWORDS
Orientation Field, Singular point, SVMs Classifier, Feature Vector.
1.INTRODUCTION
The maturing of fingerprint identification system and the fingerprint database is expanded
therefore, the identification become a problem due to a comparison of the input image with a large
fingerprint images taken a long time especially in real time application, so that the classification
becomes a vital role in increasing speed and accuracy of the system[1]. By reducing the size of the
database through dividing it into classes. SVMs classifier provides elegant solution to different
problems such as classification, regression problem, face detection, and handwriting recognition.
SVM can be considered a conventional classifier due to immediate determination of decision
boundary between training data, this leads to maximization of feature space between classes that
minimizing generalization error, also the risk of over fitting is less in SVMs. At last its ability to
learning with few training examples. There are many applications of fingerprint that increase the
privacy of individuals e.g. (deal with money in electronic wallet, and electoral voting). Fingerprint
classified into five classes named as Whorl, Left Loop, Arch, Right loop and Tented arch according
to henry classification as shown in Figure (1). The distrubion of classes is uneven. The probability
of classes were 0.279 0.029, 0.317, 0.338, 0.029, and 0.037 for the whorl, right loop, left loop,
tented arch and arch respectively [2]as approximatly descriped in figure (2). The significant
problem in classification is the similrity of structure and shape of images escepicaly in whrol where
covering large spread of print for the same charateristic, this problem called large inter-class
variation as shown in figure (3). A classification algorithm was divided into 4 types (i) Rule-based
method depend on the number, locations of singularity and geometrical shape of ridge line [3]. (ii)
Syntactic approach in this method image was described by small groups of directional components
in the orientation image then classification depends on some grammars. (iii) Structural approach
was based on a rational graph model for describing the feature. (iv) Cognitive method, for example,
neural network, fuzzy and support vector machines (SVMs) were relay on feature vector either
from singularity region or directional image and processed it to obtain final classification based on
a pyramidal architecture[4].
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
28
Figure 1. Five samples of a fingerprint from NIST-DB4 database. (a) Right loop, (b)Whorl, (c)Left loop, (e)
Arch, (f) Tented arch
Figure 2. The distribution of henry classification [2].
different classification techniques have been proposed such as hierarchical classifier based on K
Nearest Neighbors (KNN) and SVM for feature extracted from orientation field and complex filter
[5] and convolutional Neural Network was used for classification [6] as well as Fuzzy C-Means
(FCM) and Naive Bayes classifier demonstrated for classification fingerprint into 4 classes [7] .
In this paper, an efficient method for classification with low time consuming and high accuracy is
investigated, uncomplicated but robust against noise based on extracting feature that consists of a
directional block percentage of an image and location and number of accurate singular points. We
use SVM as a classifier for classification and comparing it with KNN classifier.
Right Loop 31%
Left Loop 34%Whorl 28%
Arch 4%
Tented
arch 3%
(a) (b)
(c)
(e) (f)
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
29
The paper is regulated as follows. Section 2 introduces the proposed method. Section 3, 4, 5 features
will be extracted, then section 5 presents classifier that was applied, Section 6 displays the
experimental result for two databases, finally conclusions is carried out based on result.
Figure 3. Three whorl images with different characteristics
2. THE PROPOSED METHOD
The basic idea of the proposed method is to extract a sufficient feature to improve time
performance and to provide high accuracy for fingerprint image classification in different quality,
and that makes recognition of fingerprint to become more easier in large database. Figure (4)
demonstrates the block diagram of the proposed method. Support vector machines used for
classification.
Figure 4. Proposed method block diagram
Input Image from
Database
Orientation Field
Estimation
Directional Percentage
Vector
Core and Delta
Detection
Classification
vector
SVM classifier
Whorl Whorl Whorl
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
30
3. DIRECTIONAL FIELD ESTIMATION BY LEAST MEAN SQUARE
ALGORITHM.
A generic step in the singular point determination is the orientation field that presents the direction
and location of the ridge in the fingerprint image. The gradient-based method was used for
calculating orientation θ, through different steps[8], these are as follows,
1- Compute the gradient 𝜕 𝑥(𝑖, 𝑗) and 𝜕 𝑦(𝑖, 𝑗) of each pixel in fingerprint image along the
horizontal and vertical direction image based on Sobel Operator that consist of 3×3
gradient filter as follows: -
𝑠 𝑥 = [
1 2 1
0 0 0
−1 −2 −1
] (1)
𝑠 𝑦 = [
1 0 −1
2 0 −2
1 0 −1
] (2)
2- Calculate the orientation 𝜃(𝑖, 𝑗) of 𝑤 × 𝑤 nonoverlapping blocks centering at pixel
(𝑖, 𝑗) and can be computed as: -
𝑉𝑥(i, j) = ∑ ∑ 2𝐺 𝑥
𝑗+
𝑊
2
𝑣=𝑗−
𝑊
2
𝑖+
𝑊
2
𝑢=𝑖−
𝑊
2
(u, v)𝐺 𝑦(𝑢, 𝑣) (3)
𝑉𝑦(𝑖, 𝑗) = ∑ ∑ 𝐺 𝑥
2(𝑢, 𝑣)
𝑗+
𝑊
2
𝑣=𝑗−
𝑊
2
𝑖+
𝑊
2
𝑢=𝑖−
𝑊
2
− 𝐺 𝑦
2(𝑢, 𝑣) (4)
Accordingly,
𝜃(𝑖, 𝑗) =
1
2
𝑡𝑎𝑛−1
(
𝑉𝑥
𝑉𝑦
) +
𝜋
2
(5)
3- In order to remove broken ridge on the orientation field when gradually varies in the local
neighborhood where not genuine singular point appears due to noise, the orientation field
is converted to continues vector field to improve accuracy then apply a low pass filter.
The continues vector field in the x and y components is given by: -
𝜙 𝑥(𝑖, 𝑗) = cos(2𝜃(𝑖, 𝑗)) (6)
𝜙 𝑦(𝑖, 𝑗) = sin(2𝜃(𝑖, 𝑗)) (7)
4- Smooth the orientation by low pass filter as follows: -
𝜙 𝑥
′ (𝑖, 𝑗) = ∑ ∑ 𝐺(𝑢, 𝑣). 𝜙 𝑥(𝑖 − 𝑢𝑤, 𝑗 − 𝑣𝑤)
𝑤 𝜙
2
𝑣=−
𝑤 𝜙
2
𝑤 𝜙
2
𝑢=−
𝑤 𝜙
2
(8)
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
31
𝜙 𝑦
′ (𝑖, 𝑗) = ∑ ∑ 𝐺(𝑢, 𝑣). 𝜙 𝑦(𝑖 − 𝑢𝑤, 𝑗 − 𝑣𝑤)
𝑤 𝜙/2
𝑣=−𝑤 𝜙/2
𝑤 𝜙/2
𝑢=−𝑤 𝜙/2
(9)
5- Estimate the smoothed orientation field centered at pixel (𝑖, 𝑗) to obtain a reliable
directional field and can be expressed as: -
𝜃′(𝑖, 𝑗) ≈
1
2
𝑡𝑎𝑛−1
𝜙 𝑦
′ (𝑖, 𝑗)
𝜙 𝑥
′ (𝑖, 𝑗)
(10)
Where 𝜃′
∈ {0, 𝜋 4⁄ , 𝜋 2⁄ , 𝜋}
6- Depending on Eq (10) , calculate the directional block percentage (DBP) for
approximation value of 𝜃′
for range 0 , 𝜋 4⁄ , 𝜋 2⁄ , and 𝜋 by division 𝑁𝑑 to 𝑁 𝑇 where 𝑁𝑑
indicates the number of blocks within the 𝜃′
over 𝑁 𝑇 that represents the total number of
the fingerprint blocks in the orientation field and can be expressed as [9]:-
𝐷𝑃(𝜃′) =
𝑁𝑑
𝑁 𝑇
× 100% (11)
After that combine all percentages for all 𝜃′
to generate feature vector that will be used later
in classification. Figure (5) presents a sample of the orientation field of the fingerprint image.
Figure 5. (a) Original Image (b) Orientation Field
4. MODIFIED SINGULAR POINT DETECTION
A Poincare index algorithm is a well-Known method for localizing singular point that includes
core and delta point. The Poincare Index (PI) was computed around the closed curved that travels
across the counterclockwise route. The value of PI was calculated as the collect of the difference
between each two orientation within the curve and can be found at [10]:-
𝑝𝑜𝑖𝑛𝑐𝑎𝑟𝑒(𝑖, 𝑗) =
1
2𝜋
∑ ∆(𝑘)
𝑁−1
𝑘=0
(12)
(a) (b)
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
32
∆( 𝑘) =
{
𝛿( 𝑘) 𝑖𝑓 | 𝛿(𝑘)| <
𝜋
2
𝜋 + 𝛿( 𝑘) 𝑖𝑓 𝛿( 𝑘) ≤ −
𝜋
2
𝜋 − 𝛿( 𝑘) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒
(13)
Where
𝛿(𝑘) = 𝜃′
(𝑥(𝑘+1)𝑚𝑜𝑑𝑁, 𝑦(𝑘+1)𝑚𝑜𝑑𝑁) − 𝜃′(𝑥 𝑘, 𝑦 𝑘) (14)
The PI for core point is 0.5 but for delta is -0.5, furthermore postprocessing has been used to avoid
spurious singular point in the region of scares, crease, blurred prints and other area that affected
by noise and to obtain perfect and stable core and delta point, therefore this method should be
modified as follows[11]:
1- If the distance between two singular points less than 8 pixels, then all of them should be
eliminated.
2- In that case, N cores or deltas point occurs in the small circular region, then resolve this by
averaging cores and deltas.
Figure 6. Singular Point for Different Image in NIST SD4 and Second Database
5. CLASSIFICATION VECTOR
The classification vector consists of a directional block percentage for 4 directions, the position,
number of core and delta in fingerprint images as given in table 1.
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
33
Table 1. Classification vector
FEATURE VECTOR
No. of
deltas
No.
of
cores
Delta
Y
Direction
Delta
X
direction
Core
Y
direction
Core
x
direction
DBP
between
3𝜋 2⁄
and 𝜋
DBP
between
𝜋 2⁄ and
3 𝜋 𝟐⁄
DBP
between
𝜋 𝟒⁄ and
𝜋 𝟐⁄
DBP
between
0 and
𝜋 𝟒⁄
6. SVM CLASSIFIER
SVM is a supervised training technique that originated from statistical learning theory. SVM
performs a good classification via optimal hyperplane determination in infinite dimensional
feature space with a maximal margin to the training point that minimizing generalization error.
For nonlinearly separable data point a nonlinear function 𝜙(. ) which map input features into high
dimensional feature space ℋ where the hyperplane classifier applied[12].
For given training data: -
𝒟 = {(𝑥𝑖, 𝑦𝑖)| 𝑥𝑖 ∈ ℝ 𝑝
, 𝑦𝑖 ∈ {−1,1}}𝑖=1
𝑛
SVM was trained with learning algorithm from optimization theory Lagrange and gives a
sensible load through depending on the inner product in terms of the feature vector in the ℋ by
shaping them in kernel function K, i.e. K(x, y) = 𝜙(𝑥) 𝑇
. 𝜙(𝑦).The discriminate function of SVM
is given as [13],
𝑔(𝑥) = 𝑤 𝑇
𝜙(𝑥) + 𝑤0 (15)
The SVM determines a saddle point of Lagrange to specify the largest possible margin 𝐿 𝐷 to
the nearest training points. The dual form of the Lagrange is 𝑚𝑎𝑥𝐿 𝐷 as [13]: -
𝐿 𝐷 =
1
2
∑ 𝛼𝑖 −
1
2
𝑛
𝑖=1
∑ ∑ 𝛼𝑖 𝛼𝑗 𝑦𝑖
𝑛
𝑗=1
𝑦𝑗 𝜑 𝑇(𝑥𝑖)𝜑(𝑥𝑗)
𝑛
𝑖=1
(16)
Where 𝑦𝑖 = ±1, 𝑖 = 1, … 𝑛 𝑎𝑟𝑒 𝑐𝑙𝑎𝑠𝑠 𝑖𝑛𝑑𝑒𝑥 𝑣𝑎𝑙𝑢𝑒
𝛼𝑖 Is a Lagrange multiplier that satisfy, subject to the approval of,
∑ 𝛼𝑖 𝑦𝑖 = 0
𝑛
𝑖=1
, 0 ≤ 𝛼𝑖 ≤ 𝐶 (17)
Where C is a regularization parameter that controls fluctuation and training error. Kernel
function that is used in a nonlinear SVM must be symmetric function and should satisfy the
Mercer’s Theorem, thus, one of the important permissible kernel function is a Gaussian kernel as
expressed in following equation[14],
𝐾(𝑋, 𝑌) = exp (−
‖𝑋−𝑌‖
2𝜎2 ) (18)
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
34
Where 𝜎 is the Gaussian variance, the decision function of SVM described as follows[13],
𝑓(𝑥) = 𝑠𝑔𝑛 [∑ 𝛼𝑖 𝑦𝑖 𝜙(𝑥𝑖) 𝑇
𝜙(𝑥) + 𝑤0
𝑛
𝑖=1
] (19)
In criteria of fingerprint classification, we use feature vector that contains 14 dimensions which
classify fingerprint using a nonlinear binary classification. To distinguish image first
discrimination whorl from dataset that contain (Left loop, Arch, Right Loop, Tented arch) then
continuously apply SVM in hierarchal manner to separate the remaining fingerprint images as
illustrated in figure (7),
Figure 7. The block Diagram of Five class one VS all SVM Classifier [9]
7. EXPERIMENTAL RESULTS: -
In our work, the nonlinear SVMs classifier was applied according to figure (7) in addition,
parameters were chosen as C=1000, 𝜎 = 0.04. The performance of the proposed method is
presented by conducting on two databases. All program simulated in MATLAB 2017b
7.1 FIRST DATABASE NIST SPECIAL DATABASE 4 (NIST SD4)
NIST Special Database 4 (NIST SD4) be composed of 4000 gray scale images with size 512×512
classified for 5 classes, with 400 images for each class and two images per the same finger, so
500 fingerprints for training and 500 fingerprints for testing were randomly selected, table (2)
describes the confusion matrix on NIST SD4.
Feature vector from A, W, R, L, TA
R, TA, A, L
L, TA, L, R
W
A
R, LT
L R
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
35
Table (2) Confusion matrix for NIST SD4
Actual Class
Predicated Class
Whorl Negative
Whorl 96 4
Negative 0 400
Actual Class
Predicated Class
Arch Negative
Arch 94 6
Negative 0 300
Actual Class
Predicated Class
Tented Arch Negative
Tented Arch 100 0
Negative 5 195
Actual Class
Predicated Class
Left Loop Right Loop
Left Loop 100 0
Right Loop 0 95
Moreover, the performance evalulatition by using matrices named as precision, sensitivity,
specificity, and F-measure which are caluclated from the confucion matrix as follows and it
mensioned in figure (8)
Precision =
𝑡𝑟𝑢𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒
𝑡𝑢𝑟𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒+𝑓𝑎𝑙𝑠𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒
(20)
𝑅𝑐𝑎𝑙𝑙(𝑆𝑒𝑛𝑠𝑖𝑡𝑣𝑖𝑡𝑦) =
𝑡𝑟𝑢𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒
𝑡𝑟𝑢𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒 + 𝑓𝑎𝑙𝑠𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒
(21)
𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦 =
𝑡𝑟𝑢𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒
𝑡𝑟𝑢𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒 + 𝑓𝑎𝑙𝑠𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒
(22)
𝐹_𝑀𝑒𝑎𝑠𝑢𝑟𝑒 = 2 ∗ (
𝑟𝑒𝑐𝑎𝑙𝑙 ∗ 𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛
𝑟𝑒𝑐𝑎𝑙𝑙 + 𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛
) (23)
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
36
Figure 8. Performance of NIST(SD4)
The result in the table (2) show that SVM allows us to achieve is 94 % accuracy for Whorl, 96%
for Arch, 100 % for Tented Arch and 100%, 95% for Left and Right respectively thus total mean
accuracy is 97% and average error percentage is 2.2% with average processing time 0.45 second,
also figure (8) provides the high ability of a classifier to identify positive and negative label.
7.2 SECOND DATABASE FOR 100 PERSONS
we are testing on Second database that contains 1000 fingerprint images for 100 people with size
640×480, each person has 10 images for the same fingerprint image with different orientation,
illumination, and quality half of them were used for test and other half for training. This database
was classified into 4 classes as Whorl, Left loop, Right loop, Arch. Table (3), figure (9) shows
the confusion matrix for this database and performance measure for database respectively.
Table (3) Confusion matrix for database of 100 persons each one has 10 fingerprint images
Actual Class
Predicated Class
Whorl Negative
Whorl 177 8
Negative 0 315
Actual Class
Predicated Class
Arch Negative
Arch 45 0
Negative 0 270
95.5
96
96.5
97
97.5
98
98.5
99
99.5
100
Precision Sensitivity Specificity Accuracy F-Measure
Actual Class
Predicated Class
Left Loop Right Loop
Left Loop 103 2
Right Loop 1 164
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
37
Figure (9) Performance of second database for 100 persons
from table (3) we observe that classifier confusion matrix of a database for 1000 images has
given an accuracy of 95.67% for Whorl and 100 %, 98%, 98.7 % for Arch, Left, and right
respectively i.e. the total average accuracy is 97.6 % with average processing time 0.46 second.
Also, when we apply KNN hierarchically as SVM classifier, the result of accuracy as described
in table (4) and the overall accuracy of both classifiers as shown in figure (10). Thus, KNN do
not perform good classification by comparing it with SVM for the same databases because of
learning and training phase is very fast which cannot be powerful to noise.
Table 4. Accuracy of KNN classifier
Class NIST (SD4) for 5 classes 2nd
Dataset for 4 Classes
Whorl 88% 67%
ARCH 96% 75%
Right Loop 87% 87%
Left Loop 83% 90%
Tented Arch 57% -
Figure 10. Overall accuracy of KNN and SVM
95.5
96
96.5
97
97.5
98
98.5
99
99.5
100
Precision Sensitivity Specificity Accuracy F-Measure
70
75
80
85
90
95
100
KNN for
NIST(SD4)
KNN for 3rd
database
SVM for
NIST(SD4)
SVM for 3rd
database
Accuracy
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
38
Table (5) show demonstrate comparison to other researchers for different databases and method
was used
Table 5. Compares our result with similar works.
ClassifierDatabase5 Class
Accuracy
FeatureAlgorithm
Fuzzy Wavelet
Neural network
(FWNN)
NIST-SD4/
2500 images
1000 train
images, 1500
test images
92.4%Directional
image and a
singular point on
ROI image
Wang, et al
[15]
2006
SVMFVC 2004/800
Images
400 train
images, 400 test
images
96.38%Directional
block percentage
Ji, Yi [9]
2007
CNNFVC2000, 2002,
2004
788 train
images, 100 test
images
97.2%-Su Jeon, Yong
[16] 2017
BP network with
SVM
FVC 200493.6%Primitive
Feature
extracted by a
Genetic
algorithm from
Orientation Field
Hu, Xei [17]
2010
Rule based
method
FVC 2004 for
320 images
95%Singular pointJaved, Usman
[18] 2011
Nonlinear SVMNIST-SD4 1000
images (5 class)
For database of
100 persons,
each one has 10
images (4 class)
97%,
97.6%
Directional
percentage and
singular position
and number
Our Proposed
In can be seen from table (5) that classification efficiency was improved in four and five classes
with less processing time due the hierarchal procedure of classification that gives better result.
8. CONCLUSIONS
In order to facilitate fingerprint recognition for large databases and reduce required processing
time, as well as, increase the efficiency , it is necessary to classify fingerprint first, so that our
method gives classification that depends on a robust classification vector which contains the
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
39
percentage of the directional image and accurate singular point, a nonlinear SVM classifier with
RBF kernel and KNN classifier was tested on two Database (NIST-SD4) and another database of
100 people , each one has 10 impressions for the same finger. The experimental result shows that
classification accuracy for SVM is 97.6% for 5 classes in NIST database and 97.6% for another
database for 4 classes while KNN classifier achieve 82% for NIST 80% for 2nd
database. In
summary, the algorithm with SVM classifier that used for fingerprint image classification is
more suitable and attractive as well as low computation time through classification for four and
five classes due to the hierarchal procedure.
ACKNOWLEDGEMENTS
The author wishes to thank the mother who gave all tenderness, God's mercy, also would like to
thank the Father and sisters who gives safety and strength, may God protect him.
REFERENCES
[1] R. Wang, C. Han, Y. Wu, and T. Guo, “Fingerprint Classification Based on Depth Neural Network,”
arXiv, pp. 1–14, 2014.
[2] A. A. Abbood and G. Sulong, “Fingerprint Classification Techniques : A Review,” IJCSI Int. J.
Comput. Sci. Issues, vol. 11, no. 1, pp. 111–122, 2014.
[3] F. Mirzaei, M. Biglari, and H. Ebrahimpour-komleh, “A Novel Rule-based Fingerprint
Classification Approach,” Int. J. Digit. Inf. Wirel. Commun., vol. 3, no. 4, pp. 51–55, 2013.
[4] R. Wang, C. Han, Y. Wu, and T. Guo, “Fingerprint Classification Based on Depth Neural Network,”
Drug Des. Open Access, vol. 5, no. 2, pp. 1–7, 2014.
[5] K. Cao, L. Pang, J. Liang, and J. Tian, “Fingerprint Classification by a Hierarchical Classifier,”
Pattern Recognit., vol. 46, no. 12, pp. 3186–3197, 2013.
[6] J. M. Shrein, “Fingerprint Classification Using Convolutional Neural Networks and Ridge
Orientation Images,” in IEEE Symposium Series on Computational Intelligence (SSCI), 2017, pp.
1–8.
[7] G. Vitello, F. Sorbello, G. I. M. Migliore, V. Conti, and S. Vitabile, “A Novel Technique for
Fingerprint Classification Based on Fuzzy C-Means and Naive Bayes Classifier,” 2014 Eighth Int.
Conf. Complex, Intell. Softw. Intensive Syst. A, pp. 155–161, 2014.
[8] G. A. Bahgat, A. H. Khalil, N. S. A. Kader, and S. Mashali, “Fast and Accurate Algorithm for Core
Point Detection in Fingerprint Images,” Egypt. Informatics J., vol. 14, no. 1, pp. 15–25, 2013.
[9] L. Ji and Z. Yi, “SVM-based Fingerprint Classification Using Orientation Field,” Third Int. Conf.
Nat. Comput. IEEE, vol. 2, no. Icnc, pp. 724–727, 2007.
[10] D. Weng, Y. Y. Ã, and D. Yang, “Singular Points Detection based on Multi-resolution in Fingerprint
Images,” Neurocomputing, vol. 74, no. 17, pp. 3376–3388, 2011.
[11] G. B. Iwasokun and O. C. Akinyokun, “Fingerprint Singular Point Detection Based on Modififed
Poincare Index Method,” vol. 7, no. 5, pp. 259–272, 2014.
[12] L. X. W. L. C.-C. J. Kuo, Visual Quality Assessment by Machine Learning. Springer, 2015.
[13] A. R. W. K. D. Copsey, Statistical Pattern Recognition, 3rd Editio. Wiley, 2011.
International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018
40
[14] P. Wankhede and D. Doye, “Support Vector Machines for Fingerprint Classification,” no. 4, pp. 1–
5.
[15] W. Wang, J. Li, and W. Chen, “Fingerprint Classification Using Improved Directional Field and
Fuzzy Wavelet Neural Network,” in IEEE, 2006, vol. 2, pp. 9961–9964.
[16] W. Jeon and S. Rhee, “Fingerprint Pattern Classification Using Convolution Neural Network,” Int.
J. Fuzzy Log. Intell. Syst., vol. 17, no. 3, pp. 170–176, 2017.
[17] J. Hu and M. Xie, “Fingerprint Classification Based on Genetic Programming,” IEEE, vol. 6, pp.
193–196, 2010.
[18] S. Javed, “Computerized System for Fingerprint Classification using Singular Points,” IEEE, vol. 1,
pp. 4577–657, 2011.

More Related Content

What's hot

Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...eSAT Publishing House
 
Template Matching - Pattern Recognition
Template Matching - Pattern RecognitionTemplate Matching - Pattern Recognition
Template Matching - Pattern RecognitionMustafa Salam
 
SEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATURESEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATUREacijjournal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Lec11: Active Contour and Level Set for Medical Image Segmentation
Lec11: Active Contour and Level Set for Medical Image SegmentationLec11: Active Contour and Level Set for Medical Image Segmentation
Lec11: Active Contour and Level Set for Medical Image SegmentationUlaş Bağcı
 
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithmPaper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithmMDABDULMANNANMONDAL
 
SIFT/SURF can achieve scale, rotation and illumination invariant during image...
SIFT/SURF can achieve scale, rotation and illumination invariant during image...SIFT/SURF can achieve scale, rotation and illumination invariant during image...
SIFT/SURF can achieve scale, rotation and illumination invariant during image...National Cheng Kung University
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operationsijcseit
 
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...IJMER
 
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...CSCJournals
 
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATIONFUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATIONijcsit
 
A Review Paper on Stereo Vision Based Depth Estimation
A Review Paper on Stereo Vision Based Depth EstimationA Review Paper on Stereo Vision Based Depth Estimation
A Review Paper on Stereo Vision Based Depth EstimationIJSRD
 
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...Petroleum Training Institute
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extractionRushin Shah
 
Extraction of texture features by using gabor filter in wheat crop disease de...
Extraction of texture features by using gabor filter in wheat crop disease de...Extraction of texture features by using gabor filter in wheat crop disease de...
Extraction of texture features by using gabor filter in wheat crop disease de...eSAT Journals
 
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...CSCJournals
 

What's hot (19)

Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
Ech a novel multilevel thresholding technique for minutiae based fingerprint ...
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Template Matching - Pattern Recognition
Template Matching - Pattern RecognitionTemplate Matching - Pattern Recognition
Template Matching - Pattern Recognition
 
SEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATURESEGMENTATION USING ‘NEW’ TEXTURE FEATURE
SEGMENTATION USING ‘NEW’ TEXTURE FEATURE
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Lec11: Active Contour and Level Set for Medical Image Segmentation
Lec11: Active Contour and Level Set for Medical Image SegmentationLec11: Active Contour and Level Set for Medical Image Segmentation
Lec11: Active Contour and Level Set for Medical Image Segmentation
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithmPaper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
Paper 58 disparity-of_stereo_images_by_self_adaptive_algorithm
 
SIFT/SURF can achieve scale, rotation and illumination invariant during image...
SIFT/SURF can achieve scale, rotation and illumination invariant during image...SIFT/SURF can achieve scale, rotation and illumination invariant during image...
SIFT/SURF can achieve scale, rotation and illumination invariant during image...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Image restoration based on morphological operations
Image restoration based on morphological operationsImage restoration based on morphological operations
Image restoration based on morphological operations
 
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
Nose Tip Detection Using Shape index and Energy Effective for 3d Face Recogni...
 
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
Combining Generative And Discriminative Classifiers For Semantic Automatic Im...
 
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATIONFUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
FUZZY IMAGE SEGMENTATION USING VALIDITY INDEXES CORRELATION
 
A Review Paper on Stereo Vision Based Depth Estimation
A Review Paper on Stereo Vision Based Depth EstimationA Review Paper on Stereo Vision Based Depth Estimation
A Review Paper on Stereo Vision Based Depth Estimation
 
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
Muzammil Abdulrahman PPT On Gabor Wavelet Transform (GWT) Based Facial Expres...
 
Image feature extraction
Image feature extractionImage feature extraction
Image feature extraction
 
Extraction of texture features by using gabor filter in wheat crop disease de...
Extraction of texture features by using gabor filter in wheat crop disease de...Extraction of texture features by using gabor filter in wheat crop disease de...
Extraction of texture features by using gabor filter in wheat crop disease de...
 
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
Fusion Based Gaussian noise Removal in the Images using Curvelets and Wavelet...
 

Similar to FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD

Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...ZaidHussein6
 
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme ijcisjournal
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filtersIAEME Publication
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filtersIAEME Publication
 
Segmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachSegmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachIjrdt Journal
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestIJERA Editor
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestYoussef Rachidi
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 
Efficient 3D stereo vision stabilization for multi-camera viewpoints
Efficient 3D stereo vision stabilization for multi-camera viewpointsEfficient 3D stereo vision stabilization for multi-camera viewpoints
Efficient 3D stereo vision stabilization for multi-camera viewpointsjournalBEEI
 
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...ijfcstjournal
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
 
Performance evaluation of different automatic seed point generation technique...
Performance evaluation of different automatic seed point generation technique...Performance evaluation of different automatic seed point generation technique...
Performance evaluation of different automatic seed point generation technique...IAEME Publication
 
SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text IJERA Editor
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
 

Similar to FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD (20)

Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
40120140504011
4012014050401140120140504011
40120140504011
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
 
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme Gait Based Person Recognition Using Partial Least Squares Selection Scheme
Gait Based Person Recognition Using Partial Least Squares Selection Scheme
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filters
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filters
 
Segmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approachSegmentation of medical images using metric topology – a region growing approach
Segmentation of medical images using metric topology – a region growing approach
 
Improvement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random ForestImprovement of the Recognition Rate by Random Forest
Improvement of the Recognition Rate by Random Forest
 
Improvement oh the recognition rate by random forest
Improvement oh the recognition rate by random forestImprovement oh the recognition rate by random forest
Improvement oh the recognition rate by random forest
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
How to Decide the Best Fuzzy Model in ANFIS
How to Decide the Best Fuzzy Model in ANFIS How to Decide the Best Fuzzy Model in ANFIS
How to Decide the Best Fuzzy Model in ANFIS
 
Efficient 3D stereo vision stabilization for multi-camera viewpoints
Efficient 3D stereo vision stabilization for multi-camera viewpointsEfficient 3D stereo vision stabilization for multi-camera viewpoints
Efficient 3D stereo vision stabilization for multi-camera viewpoints
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
SHORT LISTING LIKELY IMAGES USING PROPOSED MODIFIED-SIFT TOGETHER WITH CONVEN...
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
Performance evaluation of different automatic seed point generation technique...
Performance evaluation of different automatic seed point generation technique...Performance evaluation of different automatic seed point generation technique...
Performance evaluation of different automatic seed point generation technique...
 
SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text SVM Based Identification of Psychological Personality Using Handwritten Text
SVM Based Identification of Psychological Personality Using Handwritten Text
 
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
 

More from ijesajournal

DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
 
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORijesajournal
 
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...ijesajournal
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)ijesajournal
 
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...ijesajournal
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)ijesajournal
 
Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...ijesajournal
 
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)ijesajournal
 
International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)ijesajournal
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)ijesajournal
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)ijesajournal
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGijesajournal
 
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERGENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERijesajournal
 
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGESINVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGESijesajournal
 
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems ijesajournal
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSijesajournal
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
 
2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology 2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology ijesajournal
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...ijesajournal
 

More from ijesajournal (20)

DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
 
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITORDESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
DESIGN OF AN EMBEDDED SYSTEM: BEDSIDE PATIENT MONITOR
 
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
PIP-MPU: FORMAL VERIFICATION OF AN MPUBASED SEPARATION KERNEL FOR CONSTRAINED...
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)
 
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
Pip-MPU: Formal Verification of an MPU-Based Separationkernel for Constrained...
 
International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)International Journal of Embedded Systems and Applications (IJESA)
International Journal of Embedded Systems and Applications (IJESA)
 
Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...Call for papers -15th International Conference on Wireless & Mobile Network (...
Call for papers -15th International Conference on Wireless & Mobile Network (...
 
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
Call for Papers -International Conference on NLP & Signal (NLPSIG 2023)
 
International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)International Conference on NLP & Signal (NLPSIG 2023)
International Conference on NLP & Signal (NLPSIG 2023)
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)
 
11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)11th International Conference on Software Engineering & Trends (SE 2023)
11th International Conference on Software Engineering & Trends (SE 2023)
 
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXINGPERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
PERFORMING AN EXPERIMENTAL PLATFORM TO OPTIMIZE DATA MULTIPLEXING
 
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLERGENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
GENERIC SOPC PLATFORM FOR VIDEO INTERACTIVE SYSTEM WITH MPMC CONTROLLER
 
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGESINVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
INVERTING BUCK-BOOST DCDC CONVERTER DESIGN CHALLENGES
 
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
A Case Study: Task Scheduling Methodologies for High Speed Computing Systems
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
 
AUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMSAUTOMATED EMBEDDED PAYMENT SYSTEMS
AUTOMATED EMBEDDED PAYMENT SYSTEMS
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
 
2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology 2 nd International Conference on Computing and Information Technology
2 nd International Conference on Computing and Information Technology
 
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
A NOVEL METHODOLOGY FOR TASK DISTRIBUTION IN HETEROGENEOUS RECONFIGURABLE COM...
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD

  • 1. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 DOI : 10.5121/ijesa.2018.8403 27 FINGERPRINT CLASSIFICATION BASED ON ORIENTATION FIELD Zahraa Hadi Khazaal and Safaa S. Mahdi Department of Computer Engineering, Al Nahrain University, Baghdad, Iraq ABSTRACT This paper introduces an effective method of fingerprint classification based on discriminative feature gathering from orientation field. A nonlinear support vector machines (SVMs) is adopted for the classification. The orientation field is estimated through a pixel-Wise gradient descent method and the percentage of directional block classes is estimated. These percentages are classified into four-dimensional vector considered as a good feature that can be combined with an accurate singular point to classify the fingerprint into one of five classes. This method shows high classification accuracy relative to other spatial domain classifiers. KEYWORDS Orientation Field, Singular point, SVMs Classifier, Feature Vector. 1.INTRODUCTION The maturing of fingerprint identification system and the fingerprint database is expanded therefore, the identification become a problem due to a comparison of the input image with a large fingerprint images taken a long time especially in real time application, so that the classification becomes a vital role in increasing speed and accuracy of the system[1]. By reducing the size of the database through dividing it into classes. SVMs classifier provides elegant solution to different problems such as classification, regression problem, face detection, and handwriting recognition. SVM can be considered a conventional classifier due to immediate determination of decision boundary between training data, this leads to maximization of feature space between classes that minimizing generalization error, also the risk of over fitting is less in SVMs. At last its ability to learning with few training examples. There are many applications of fingerprint that increase the privacy of individuals e.g. (deal with money in electronic wallet, and electoral voting). Fingerprint classified into five classes named as Whorl, Left Loop, Arch, Right loop and Tented arch according to henry classification as shown in Figure (1). The distrubion of classes is uneven. The probability of classes were 0.279 0.029, 0.317, 0.338, 0.029, and 0.037 for the whorl, right loop, left loop, tented arch and arch respectively [2]as approximatly descriped in figure (2). The significant problem in classification is the similrity of structure and shape of images escepicaly in whrol where covering large spread of print for the same charateristic, this problem called large inter-class variation as shown in figure (3). A classification algorithm was divided into 4 types (i) Rule-based method depend on the number, locations of singularity and geometrical shape of ridge line [3]. (ii) Syntactic approach in this method image was described by small groups of directional components in the orientation image then classification depends on some grammars. (iii) Structural approach was based on a rational graph model for describing the feature. (iv) Cognitive method, for example, neural network, fuzzy and support vector machines (SVMs) were relay on feature vector either from singularity region or directional image and processed it to obtain final classification based on a pyramidal architecture[4].
  • 2. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 28 Figure 1. Five samples of a fingerprint from NIST-DB4 database. (a) Right loop, (b)Whorl, (c)Left loop, (e) Arch, (f) Tented arch Figure 2. The distribution of henry classification [2]. different classification techniques have been proposed such as hierarchical classifier based on K Nearest Neighbors (KNN) and SVM for feature extracted from orientation field and complex filter [5] and convolutional Neural Network was used for classification [6] as well as Fuzzy C-Means (FCM) and Naive Bayes classifier demonstrated for classification fingerprint into 4 classes [7] . In this paper, an efficient method for classification with low time consuming and high accuracy is investigated, uncomplicated but robust against noise based on extracting feature that consists of a directional block percentage of an image and location and number of accurate singular points. We use SVM as a classifier for classification and comparing it with KNN classifier. Right Loop 31% Left Loop 34%Whorl 28% Arch 4% Tented arch 3% (a) (b) (c) (e) (f)
  • 3. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 29 The paper is regulated as follows. Section 2 introduces the proposed method. Section 3, 4, 5 features will be extracted, then section 5 presents classifier that was applied, Section 6 displays the experimental result for two databases, finally conclusions is carried out based on result. Figure 3. Three whorl images with different characteristics 2. THE PROPOSED METHOD The basic idea of the proposed method is to extract a sufficient feature to improve time performance and to provide high accuracy for fingerprint image classification in different quality, and that makes recognition of fingerprint to become more easier in large database. Figure (4) demonstrates the block diagram of the proposed method. Support vector machines used for classification. Figure 4. Proposed method block diagram Input Image from Database Orientation Field Estimation Directional Percentage Vector Core and Delta Detection Classification vector SVM classifier Whorl Whorl Whorl
  • 4. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 30 3. DIRECTIONAL FIELD ESTIMATION BY LEAST MEAN SQUARE ALGORITHM. A generic step in the singular point determination is the orientation field that presents the direction and location of the ridge in the fingerprint image. The gradient-based method was used for calculating orientation θ, through different steps[8], these are as follows, 1- Compute the gradient 𝜕 𝑥(𝑖, 𝑗) and 𝜕 𝑦(𝑖, 𝑗) of each pixel in fingerprint image along the horizontal and vertical direction image based on Sobel Operator that consist of 3×3 gradient filter as follows: - 𝑠 𝑥 = [ 1 2 1 0 0 0 −1 −2 −1 ] (1) 𝑠 𝑦 = [ 1 0 −1 2 0 −2 1 0 −1 ] (2) 2- Calculate the orientation 𝜃(𝑖, 𝑗) of 𝑤 × 𝑤 nonoverlapping blocks centering at pixel (𝑖, 𝑗) and can be computed as: - 𝑉𝑥(i, j) = ∑ ∑ 2𝐺 𝑥 𝑗+ 𝑊 2 𝑣=𝑗− 𝑊 2 𝑖+ 𝑊 2 𝑢=𝑖− 𝑊 2 (u, v)𝐺 𝑦(𝑢, 𝑣) (3) 𝑉𝑦(𝑖, 𝑗) = ∑ ∑ 𝐺 𝑥 2(𝑢, 𝑣) 𝑗+ 𝑊 2 𝑣=𝑗− 𝑊 2 𝑖+ 𝑊 2 𝑢=𝑖− 𝑊 2 − 𝐺 𝑦 2(𝑢, 𝑣) (4) Accordingly, 𝜃(𝑖, 𝑗) = 1 2 𝑡𝑎𝑛−1 ( 𝑉𝑥 𝑉𝑦 ) + 𝜋 2 (5) 3- In order to remove broken ridge on the orientation field when gradually varies in the local neighborhood where not genuine singular point appears due to noise, the orientation field is converted to continues vector field to improve accuracy then apply a low pass filter. The continues vector field in the x and y components is given by: - 𝜙 𝑥(𝑖, 𝑗) = cos(2𝜃(𝑖, 𝑗)) (6) 𝜙 𝑦(𝑖, 𝑗) = sin(2𝜃(𝑖, 𝑗)) (7) 4- Smooth the orientation by low pass filter as follows: - 𝜙 𝑥 ′ (𝑖, 𝑗) = ∑ ∑ 𝐺(𝑢, 𝑣). 𝜙 𝑥(𝑖 − 𝑢𝑤, 𝑗 − 𝑣𝑤) 𝑤 𝜙 2 𝑣=− 𝑤 𝜙 2 𝑤 𝜙 2 𝑢=− 𝑤 𝜙 2 (8)
  • 5. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 31 𝜙 𝑦 ′ (𝑖, 𝑗) = ∑ ∑ 𝐺(𝑢, 𝑣). 𝜙 𝑦(𝑖 − 𝑢𝑤, 𝑗 − 𝑣𝑤) 𝑤 𝜙/2 𝑣=−𝑤 𝜙/2 𝑤 𝜙/2 𝑢=−𝑤 𝜙/2 (9) 5- Estimate the smoothed orientation field centered at pixel (𝑖, 𝑗) to obtain a reliable directional field and can be expressed as: - 𝜃′(𝑖, 𝑗) ≈ 1 2 𝑡𝑎𝑛−1 𝜙 𝑦 ′ (𝑖, 𝑗) 𝜙 𝑥 ′ (𝑖, 𝑗) (10) Where 𝜃′ ∈ {0, 𝜋 4⁄ , 𝜋 2⁄ , 𝜋} 6- Depending on Eq (10) , calculate the directional block percentage (DBP) for approximation value of 𝜃′ for range 0 , 𝜋 4⁄ , 𝜋 2⁄ , and 𝜋 by division 𝑁𝑑 to 𝑁 𝑇 where 𝑁𝑑 indicates the number of blocks within the 𝜃′ over 𝑁 𝑇 that represents the total number of the fingerprint blocks in the orientation field and can be expressed as [9]:- 𝐷𝑃(𝜃′) = 𝑁𝑑 𝑁 𝑇 × 100% (11) After that combine all percentages for all 𝜃′ to generate feature vector that will be used later in classification. Figure (5) presents a sample of the orientation field of the fingerprint image. Figure 5. (a) Original Image (b) Orientation Field 4. MODIFIED SINGULAR POINT DETECTION A Poincare index algorithm is a well-Known method for localizing singular point that includes core and delta point. The Poincare Index (PI) was computed around the closed curved that travels across the counterclockwise route. The value of PI was calculated as the collect of the difference between each two orientation within the curve and can be found at [10]:- 𝑝𝑜𝑖𝑛𝑐𝑎𝑟𝑒(𝑖, 𝑗) = 1 2𝜋 ∑ ∆(𝑘) 𝑁−1 𝑘=0 (12) (a) (b)
  • 6. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 32 ∆( 𝑘) = { 𝛿( 𝑘) 𝑖𝑓 | 𝛿(𝑘)| < 𝜋 2 𝜋 + 𝛿( 𝑘) 𝑖𝑓 𝛿( 𝑘) ≤ − 𝜋 2 𝜋 − 𝛿( 𝑘) 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 (13) Where 𝛿(𝑘) = 𝜃′ (𝑥(𝑘+1)𝑚𝑜𝑑𝑁, 𝑦(𝑘+1)𝑚𝑜𝑑𝑁) − 𝜃′(𝑥 𝑘, 𝑦 𝑘) (14) The PI for core point is 0.5 but for delta is -0.5, furthermore postprocessing has been used to avoid spurious singular point in the region of scares, crease, blurred prints and other area that affected by noise and to obtain perfect and stable core and delta point, therefore this method should be modified as follows[11]: 1- If the distance between two singular points less than 8 pixels, then all of them should be eliminated. 2- In that case, N cores or deltas point occurs in the small circular region, then resolve this by averaging cores and deltas. Figure 6. Singular Point for Different Image in NIST SD4 and Second Database 5. CLASSIFICATION VECTOR The classification vector consists of a directional block percentage for 4 directions, the position, number of core and delta in fingerprint images as given in table 1.
  • 7. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 33 Table 1. Classification vector FEATURE VECTOR No. of deltas No. of cores Delta Y Direction Delta X direction Core Y direction Core x direction DBP between 3𝜋 2⁄ and 𝜋 DBP between 𝜋 2⁄ and 3 𝜋 𝟐⁄ DBP between 𝜋 𝟒⁄ and 𝜋 𝟐⁄ DBP between 0 and 𝜋 𝟒⁄ 6. SVM CLASSIFIER SVM is a supervised training technique that originated from statistical learning theory. SVM performs a good classification via optimal hyperplane determination in infinite dimensional feature space with a maximal margin to the training point that minimizing generalization error. For nonlinearly separable data point a nonlinear function 𝜙(. ) which map input features into high dimensional feature space ℋ where the hyperplane classifier applied[12]. For given training data: - 𝒟 = {(𝑥𝑖, 𝑦𝑖)| 𝑥𝑖 ∈ ℝ 𝑝 , 𝑦𝑖 ∈ {−1,1}}𝑖=1 𝑛 SVM was trained with learning algorithm from optimization theory Lagrange and gives a sensible load through depending on the inner product in terms of the feature vector in the ℋ by shaping them in kernel function K, i.e. K(x, y) = 𝜙(𝑥) 𝑇 . 𝜙(𝑦).The discriminate function of SVM is given as [13], 𝑔(𝑥) = 𝑤 𝑇 𝜙(𝑥) + 𝑤0 (15) The SVM determines a saddle point of Lagrange to specify the largest possible margin 𝐿 𝐷 to the nearest training points. The dual form of the Lagrange is 𝑚𝑎𝑥𝐿 𝐷 as [13]: - 𝐿 𝐷 = 1 2 ∑ 𝛼𝑖 − 1 2 𝑛 𝑖=1 ∑ ∑ 𝛼𝑖 𝛼𝑗 𝑦𝑖 𝑛 𝑗=1 𝑦𝑗 𝜑 𝑇(𝑥𝑖)𝜑(𝑥𝑗) 𝑛 𝑖=1 (16) Where 𝑦𝑖 = ±1, 𝑖 = 1, … 𝑛 𝑎𝑟𝑒 𝑐𝑙𝑎𝑠𝑠 𝑖𝑛𝑑𝑒𝑥 𝑣𝑎𝑙𝑢𝑒 𝛼𝑖 Is a Lagrange multiplier that satisfy, subject to the approval of, ∑ 𝛼𝑖 𝑦𝑖 = 0 𝑛 𝑖=1 , 0 ≤ 𝛼𝑖 ≤ 𝐶 (17) Where C is a regularization parameter that controls fluctuation and training error. Kernel function that is used in a nonlinear SVM must be symmetric function and should satisfy the Mercer’s Theorem, thus, one of the important permissible kernel function is a Gaussian kernel as expressed in following equation[14], 𝐾(𝑋, 𝑌) = exp (− ‖𝑋−𝑌‖ 2𝜎2 ) (18)
  • 8. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 34 Where 𝜎 is the Gaussian variance, the decision function of SVM described as follows[13], 𝑓(𝑥) = 𝑠𝑔𝑛 [∑ 𝛼𝑖 𝑦𝑖 𝜙(𝑥𝑖) 𝑇 𝜙(𝑥) + 𝑤0 𝑛 𝑖=1 ] (19) In criteria of fingerprint classification, we use feature vector that contains 14 dimensions which classify fingerprint using a nonlinear binary classification. To distinguish image first discrimination whorl from dataset that contain (Left loop, Arch, Right Loop, Tented arch) then continuously apply SVM in hierarchal manner to separate the remaining fingerprint images as illustrated in figure (7), Figure 7. The block Diagram of Five class one VS all SVM Classifier [9] 7. EXPERIMENTAL RESULTS: - In our work, the nonlinear SVMs classifier was applied according to figure (7) in addition, parameters were chosen as C=1000, 𝜎 = 0.04. The performance of the proposed method is presented by conducting on two databases. All program simulated in MATLAB 2017b 7.1 FIRST DATABASE NIST SPECIAL DATABASE 4 (NIST SD4) NIST Special Database 4 (NIST SD4) be composed of 4000 gray scale images with size 512×512 classified for 5 classes, with 400 images for each class and two images per the same finger, so 500 fingerprints for training and 500 fingerprints for testing were randomly selected, table (2) describes the confusion matrix on NIST SD4. Feature vector from A, W, R, L, TA R, TA, A, L L, TA, L, R W A R, LT L R
  • 9. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 35 Table (2) Confusion matrix for NIST SD4 Actual Class Predicated Class Whorl Negative Whorl 96 4 Negative 0 400 Actual Class Predicated Class Arch Negative Arch 94 6 Negative 0 300 Actual Class Predicated Class Tented Arch Negative Tented Arch 100 0 Negative 5 195 Actual Class Predicated Class Left Loop Right Loop Left Loop 100 0 Right Loop 0 95 Moreover, the performance evalulatition by using matrices named as precision, sensitivity, specificity, and F-measure which are caluclated from the confucion matrix as follows and it mensioned in figure (8) Precision = 𝑡𝑟𝑢𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒 𝑡𝑢𝑟𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒+𝑓𝑎𝑙𝑠𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒 (20) 𝑅𝑐𝑎𝑙𝑙(𝑆𝑒𝑛𝑠𝑖𝑡𝑣𝑖𝑡𝑦) = 𝑡𝑟𝑢𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒 𝑡𝑟𝑢𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒 + 𝑓𝑎𝑙𝑠𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒 (21) 𝑆𝑝𝑒𝑐𝑖𝑓𝑖𝑐𝑖𝑡𝑦 = 𝑡𝑟𝑢𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒 𝑡𝑟𝑢𝑒 𝑛𝑒𝑔𝑎𝑡𝑖𝑣𝑒 + 𝑓𝑎𝑙𝑠𝑒 𝑝𝑜𝑠𝑖𝑡𝑖𝑣𝑒 (22) 𝐹_𝑀𝑒𝑎𝑠𝑢𝑟𝑒 = 2 ∗ ( 𝑟𝑒𝑐𝑎𝑙𝑙 ∗ 𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 𝑟𝑒𝑐𝑎𝑙𝑙 + 𝑝𝑟𝑒𝑐𝑖𝑠𝑖𝑜𝑛 ) (23)
  • 10. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 36 Figure 8. Performance of NIST(SD4) The result in the table (2) show that SVM allows us to achieve is 94 % accuracy for Whorl, 96% for Arch, 100 % for Tented Arch and 100%, 95% for Left and Right respectively thus total mean accuracy is 97% and average error percentage is 2.2% with average processing time 0.45 second, also figure (8) provides the high ability of a classifier to identify positive and negative label. 7.2 SECOND DATABASE FOR 100 PERSONS we are testing on Second database that contains 1000 fingerprint images for 100 people with size 640×480, each person has 10 images for the same fingerprint image with different orientation, illumination, and quality half of them were used for test and other half for training. This database was classified into 4 classes as Whorl, Left loop, Right loop, Arch. Table (3), figure (9) shows the confusion matrix for this database and performance measure for database respectively. Table (3) Confusion matrix for database of 100 persons each one has 10 fingerprint images Actual Class Predicated Class Whorl Negative Whorl 177 8 Negative 0 315 Actual Class Predicated Class Arch Negative Arch 45 0 Negative 0 270 95.5 96 96.5 97 97.5 98 98.5 99 99.5 100 Precision Sensitivity Specificity Accuracy F-Measure Actual Class Predicated Class Left Loop Right Loop Left Loop 103 2 Right Loop 1 164
  • 11. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 37 Figure (9) Performance of second database for 100 persons from table (3) we observe that classifier confusion matrix of a database for 1000 images has given an accuracy of 95.67% for Whorl and 100 %, 98%, 98.7 % for Arch, Left, and right respectively i.e. the total average accuracy is 97.6 % with average processing time 0.46 second. Also, when we apply KNN hierarchically as SVM classifier, the result of accuracy as described in table (4) and the overall accuracy of both classifiers as shown in figure (10). Thus, KNN do not perform good classification by comparing it with SVM for the same databases because of learning and training phase is very fast which cannot be powerful to noise. Table 4. Accuracy of KNN classifier Class NIST (SD4) for 5 classes 2nd Dataset for 4 Classes Whorl 88% 67% ARCH 96% 75% Right Loop 87% 87% Left Loop 83% 90% Tented Arch 57% - Figure 10. Overall accuracy of KNN and SVM 95.5 96 96.5 97 97.5 98 98.5 99 99.5 100 Precision Sensitivity Specificity Accuracy F-Measure 70 75 80 85 90 95 100 KNN for NIST(SD4) KNN for 3rd database SVM for NIST(SD4) SVM for 3rd database Accuracy
  • 12. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 38 Table (5) show demonstrate comparison to other researchers for different databases and method was used Table 5. Compares our result with similar works. ClassifierDatabase5 Class Accuracy FeatureAlgorithm Fuzzy Wavelet Neural network (FWNN) NIST-SD4/ 2500 images 1000 train images, 1500 test images 92.4%Directional image and a singular point on ROI image Wang, et al [15] 2006 SVMFVC 2004/800 Images 400 train images, 400 test images 96.38%Directional block percentage Ji, Yi [9] 2007 CNNFVC2000, 2002, 2004 788 train images, 100 test images 97.2%-Su Jeon, Yong [16] 2017 BP network with SVM FVC 200493.6%Primitive Feature extracted by a Genetic algorithm from Orientation Field Hu, Xei [17] 2010 Rule based method FVC 2004 for 320 images 95%Singular pointJaved, Usman [18] 2011 Nonlinear SVMNIST-SD4 1000 images (5 class) For database of 100 persons, each one has 10 images (4 class) 97%, 97.6% Directional percentage and singular position and number Our Proposed In can be seen from table (5) that classification efficiency was improved in four and five classes with less processing time due the hierarchal procedure of classification that gives better result. 8. CONCLUSIONS In order to facilitate fingerprint recognition for large databases and reduce required processing time, as well as, increase the efficiency , it is necessary to classify fingerprint first, so that our method gives classification that depends on a robust classification vector which contains the
  • 13. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 39 percentage of the directional image and accurate singular point, a nonlinear SVM classifier with RBF kernel and KNN classifier was tested on two Database (NIST-SD4) and another database of 100 people , each one has 10 impressions for the same finger. The experimental result shows that classification accuracy for SVM is 97.6% for 5 classes in NIST database and 97.6% for another database for 4 classes while KNN classifier achieve 82% for NIST 80% for 2nd database. In summary, the algorithm with SVM classifier that used for fingerprint image classification is more suitable and attractive as well as low computation time through classification for four and five classes due to the hierarchal procedure. ACKNOWLEDGEMENTS The author wishes to thank the mother who gave all tenderness, God's mercy, also would like to thank the Father and sisters who gives safety and strength, may God protect him. REFERENCES [1] R. Wang, C. Han, Y. Wu, and T. Guo, “Fingerprint Classification Based on Depth Neural Network,” arXiv, pp. 1–14, 2014. [2] A. A. Abbood and G. Sulong, “Fingerprint Classification Techniques : A Review,” IJCSI Int. J. Comput. Sci. Issues, vol. 11, no. 1, pp. 111–122, 2014. [3] F. Mirzaei, M. Biglari, and H. Ebrahimpour-komleh, “A Novel Rule-based Fingerprint Classification Approach,” Int. J. Digit. Inf. Wirel. Commun., vol. 3, no. 4, pp. 51–55, 2013. [4] R. Wang, C. Han, Y. Wu, and T. Guo, “Fingerprint Classification Based on Depth Neural Network,” Drug Des. Open Access, vol. 5, no. 2, pp. 1–7, 2014. [5] K. Cao, L. Pang, J. Liang, and J. Tian, “Fingerprint Classification by a Hierarchical Classifier,” Pattern Recognit., vol. 46, no. 12, pp. 3186–3197, 2013. [6] J. M. Shrein, “Fingerprint Classification Using Convolutional Neural Networks and Ridge Orientation Images,” in IEEE Symposium Series on Computational Intelligence (SSCI), 2017, pp. 1–8. [7] G. Vitello, F. Sorbello, G. I. M. Migliore, V. Conti, and S. Vitabile, “A Novel Technique for Fingerprint Classification Based on Fuzzy C-Means and Naive Bayes Classifier,” 2014 Eighth Int. Conf. Complex, Intell. Softw. Intensive Syst. A, pp. 155–161, 2014. [8] G. A. Bahgat, A. H. Khalil, N. S. A. Kader, and S. Mashali, “Fast and Accurate Algorithm for Core Point Detection in Fingerprint Images,” Egypt. Informatics J., vol. 14, no. 1, pp. 15–25, 2013. [9] L. Ji and Z. Yi, “SVM-based Fingerprint Classification Using Orientation Field,” Third Int. Conf. Nat. Comput. IEEE, vol. 2, no. Icnc, pp. 724–727, 2007. [10] D. Weng, Y. Y. Ã, and D. Yang, “Singular Points Detection based on Multi-resolution in Fingerprint Images,” Neurocomputing, vol. 74, no. 17, pp. 3376–3388, 2011. [11] G. B. Iwasokun and O. C. Akinyokun, “Fingerprint Singular Point Detection Based on Modififed Poincare Index Method,” vol. 7, no. 5, pp. 259–272, 2014. [12] L. X. W. L. C.-C. J. Kuo, Visual Quality Assessment by Machine Learning. Springer, 2015. [13] A. R. W. K. D. Copsey, Statistical Pattern Recognition, 3rd Editio. Wiley, 2011.
  • 14. International Journal of Embedded Systems and Applications (IJESA), Vol 8, No.4,December 2018 40 [14] P. Wankhede and D. Doye, “Support Vector Machines for Fingerprint Classification,” no. 4, pp. 1– 5. [15] W. Wang, J. Li, and W. Chen, “Fingerprint Classification Using Improved Directional Field and Fuzzy Wavelet Neural Network,” in IEEE, 2006, vol. 2, pp. 9961–9964. [16] W. Jeon and S. Rhee, “Fingerprint Pattern Classification Using Convolution Neural Network,” Int. J. Fuzzy Log. Intell. Syst., vol. 17, no. 3, pp. 170–176, 2017. [17] J. Hu and M. Xie, “Fingerprint Classification Based on Genetic Programming,” IEEE, vol. 6, pp. 193–196, 2010. [18] S. Javed, “Computerized System for Fingerprint Classification using Singular Points,” IEEE, vol. 1, pp. 4577–657, 2011.