SlideShare a Scribd company logo
1 of 8
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 121
e-ISSN: 2349-9745
p-ISSN: 2393-8161
Enhanced Latent Fingerprint Segmentation through Dictionary Based
Approach
Nithya.K1
, Karthi Prem.S2
and Prem.P.E3
1
Department of IT, Vivekanandha College of Engineering for Women
2
Department of IT, Vivekanandha College of Engineering for Women
3
Department of IT, Vivekanandha College of Engineering for Women
Abstract— The accuracy of latent finger print matching compared to roll and plain finger print
matching is significantly lower due to background noise, poor ridge quality and overlapping
structured noise in latent images. In this paper the proposed algorithm is dictionary-based approach
for automatic segmentation and enhancement towards the goal of achieving “lights out” latent
identifications system. Total variation decomposition model with L1 fidelity regularization in latent
finger print image remove background noise. A coarse to fine strategy is used to improve robustness
and accuracy. It improves the computational efficiency of the algorithm.
Keywords- Latent finger print, image decomposition, ROI, segmentation, ridge enhancement.
I. INTRODUCTION
Latent fingerprints refer to fingerprints got from the surfaces of objects acknowledgeable touched
or handled by a person typically at crime scenes. Compared to rolled and plain finger prints, latent
finger print is typically poor in quality and complex background noise. Due to this problem latent
finger print accuracy is much lower.
The main challenging problem in latent identification system is how to automatically extract
reliable features in latent, especially latent with poor quality. The various features are proposed like
ROI (Region of Interest), singular points and minutiae detection.
The human factor issue in latent examinations has raised some reliability and repeatability.
Brandon Mayfield case is involved to identify mistakes based on latent matching. The lights out
capability develop a fully automatic latent feature extraction module. This is highly desirable to
(i) Increase the throughput of latent matching systems,
(ii) Improve repeatability of latent feature extraction and,
(iii) Increase the compatibility
Between features extracted in the latents and features extracted in reference images.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 122
Figure.1Three types of fingerprint images. (a) Rolled fingerprint, (b) plain fingerprint, (c) latent fingerprint with
foreground (friction ridge pattern) highlighted by red outline. Notice the presence of different types of noise and
distortion in (c).
Commonly rolled/plain print matching or latent matching typically contains a number of
modules, including region of interest (ROI) Segmentation (separating friction ridge from
background), enhancement, feature extraction, and matching.
To address the two main difficulties in latent fingerprint matching, namely presence of
structured noise and poor quality of ridge structure, we propose a dictionary-based segmentation and
enhancement of latent fingerprint. To remove the structured noise, the total-variation model with L1
fidelity regularization is used to decompose a latent into a texture part and a cartoon part. The main
contributions of this paper are as follows:
1. Ridge structure dictionary is proposed for latent segmentation and enhancement. The
dictionary is learnt from high quality fingerprint patches.
2. The ridge quality of a patch is defined as the structural similarity between the patch and its
reconstruction from the learnt ridge structure dictionary. Orientation and frequency fields of a
patch are estimated from its reconstruction.
3. To balance robustness and accuracy, a coarse to fine strategy is proposed which uses
dictionaries at two levels of resolution (64 × 64 and 32× 32).
4. The proposed segmentation and enhancement algorithms outperform published algorithms
and can also significantly boost the performance of a state of the-art commercial latent
matcher on two latent databases (NIST SD27 and WVU DB).
II. RELATED WORK
Various researches have been reported in this related work based on segmentation and
enhancement of latent finger print [2]-[6]. The idea of “Latent Fingerprint Enhancement via Robust
Orientation Field Estimation” demonstrates the improvement of the automatic match accuracy and it
is effective which help to find a correct orientation for latent fingerprint algorithm. [1].Hence it
improved the performance of the orientation field.
The Short Time Fourier Transform (STFT) improves the evaluation of the enhancement
algorithm. The STFT analyses consider the improvement only in matching the accuracy of the poor
quality print [15]. It uses some set of data base images for analysis purposes, which shows 17% of
improvement in recognition rate.
The Adaptive Directional Total Variation (ADTV) is derived for the latent fingerprint
segmentation. It gives better accuracy in segmentation and enhancement process. Hence it increases
the performance of the latent fingerprint feature detection and matching.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 123
For image segmentation and estimation of fingerprint by ridge orientation a systematic
method is used [2]. Since the ridge structure is taken by using the Gabor filter method, which
improves the matching performance. This systematic method automatically removes the broken
ridge. Thus it provides the accuracy in the minutiae detection.
Some of the systematic methods are used for computation of the directional field and singular
point of the fingerprint. By using the averaged square gradient and singular-point-extraction the error
rate of singular point is improved for the purposes of detecting the low quality fingerprint.
The K-mean Singular Value Decomposition (K-SVD) is used for adaptive dictionaries to
achieve the spares single representation [4]. The problem of the scalability in K-SVD is more
complement so it can be improved in future.
Latent fingerprint enhancement algorithm is used for finding the region of interest (ROI) and
Singular Point (SP) [1]. It improves the accuracy matching for fingerprint which obtains the multiple
orientation elements for each image block.
III. PROPOSED ALGORITHM
While current automated fingerprint identification systems have achieved high accuracy in
matching rolled/plain prints, latent matching still remains to be a challenging problem and requires
much human intervention. The goal of this work is to achieve accurate latent segmentation, which is
an essential step towards achieving automatic latent identification. Existing fingerprint segmentation
algorithms performs poorly on latent prints, as they are mostly based on the assumptions that are
only applicable for rolled/plain fingerprints.
However, the proposed algorithm still does not work well on very poor quality latent
fingerprint images. Latent fingerprints found at crime scenes provide crucial evidence to law
enforcement agencies. The latents are typically searched against a large fingerprint database which is
the collection of rolled/plain fingerprints of previously apprehended criminals. Due to the poor
quality of the latents, latent examiners perform manual feature markup and
Visual verification between the latent and the candidate fingerprints from the database.
The latent finger print segmentation and enhancement consists of the following steps:
(i) Latent decomposition
(ii) Coarse level estimation of quality map and orientation and frequency fields.
(iii) Fine level estimation of quality map and orientation and frequency fields.
(iv) Segmentation and enhancement.
A “Lights-Out” mode for latent identification is desired to reduce the burden on latent examiners
and to introduce a level of consistency in fingerprint matching, particularly in searching ever
growing fingerprint database.
The proposed module latent matching or search is still a challenging problem due to presence of
complex background noise and poor quality of friction ridge structure in many latents proposed an
automatic latent segmentation and enhancement algorithm based on image decomposition and coarse
to fine ridge structure dictionaries. The two different latent fingerprint databases, NIST SD27 and
WVU DB, in conjunction with three different COTS matchers show that the proposed algorithm is
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 124
able to improve the performance of two COTS ten print matchers and can even boost the
performance of a state-of-the-art latent matcher by weighted match score fusion. However, the
proposed algorithm still does not work well on very poor quality latent fingerprint images.
3.1. Algorithm Overview
The proposed algorithm consists of an off-line dictionary learning stage and on-line stage for
segmentation and enhancement. In the off-line stage, two types of dictionaries are learnt:
i) a coarse-level dictionary with patch size of 64 × 64 pixels which is used for coarse estimation of
ridge quality map, orientation and frequency fields, and
ii) 16 fine-level dictionaries with patch size of 32 ×32pixels which are used for fine estimation of
ridge quality map, and orientation and frequency fields computation;
Given the dictionaries, on-line latent segmentation and enhancement consists of the following
steps:
3.1.1. Latent decomposition:
Input latent is decomposed into cartoon and texture images via local total variations, the
cartoon image is discarded. The relative reduction rate before and after filtering the image with the
low-pass filter measures the local oscillatory behavior which is given by
ߣߪሺ‫ݔ‬ሻ =
௅்௏ఙሺ௙ሻሺ௫ሻି ௅்௏ఙሺ௅ఙ∗௙ሻሺ௫ሻ
௅்௏ఙሺ௙ሻሺ௫ሻ
where, Lσ is an σ-sized low-pass filter, x belongs to the cartoon part. The relative reduction rate is
ߣߪሺ‫ݔ‬ሻ
3.1.2. Coarse level estimation of quality map and orientation and frequency fields.
The texture image is divided into overlapping patches of size 64 × 64 pixels. The sparse
representation of p can be obtained by solving the following optimization problem using orthogonal
matching pursuit. The approximation can be calculated as,‫݌‬ෝ= ‫ܦ‬௦
௖
α , where α is given by
α = ሺ‫ܦ‬௦
௖்
‫ܦ‬௦
௖
ሻିଵ
‫ܦ‬௦
௖்
‫݌‬. The residual vector can be calculated as r(p) = p - ‫̂݌‬ = p - ‫ܦ‬௦
௖்
α'
3.1.3. Fine level estimation of quality map and orientation and frequency fields.
The texture image is divided into overlapping patches of size 32 × 32 pixels. Each patch has
32 ×16 or 16 ×32 overlapping pixels with each of its four connected neighboring blocks. For each
patch, the coarse ridge orientation value is first used to index the corresponding fine-level dictionary.
The fine estimation of ridge quality map, orientation and frequency fields are computed as
coarse estimations.
3.1.4. Segmentation and enhancement
The final quality map Q is computed as the average of coarse level quality and fine level
quality by,
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 125
Q = ½(ܳ஼
+ܳ௙
)
The quality map Q is then normalized to the range [0,1]. The orientation and frequency
parameters of the filter are tuned based on the fine-level orientation field (uf ) and the average
frequency of coarse-level frequency field and fine level frequency field (ffþfc)the standard deviation
of the Gaussian envelope in the Gabor filter The coarse quality map and fine quality map are
combined for latent segmentation. In the foreground of texture image, Gabor filtering based on the
orientation and frequency fields applied for latent enhancement.
V. ARCHITECTURAL DIAGRAM
The analysis of Image decomposition ROI segmentation and enhancement using coarse to
fine strategy to increase accuracy of latent finger print image. The overview of proposed latent
segmentation and enhancement architecture is been shown in fig.2
The latent finger print image is been acquired. Then image decomposition method is used to get
the output as textured image. Coarse to fine strategy is used to estimate texture image.
Dictionary construction method using this estimation consists of two types 1. coarse and 2. fine
strategy.
Initially the off-line coarse dictionary construction is used and the finger print image is acquired.
The path extraction method is applied get training samples of image the finally dictionary learning
method is applied to get the outcomes of dictionary elements. The data are been sent to coarse level
and quality map, orientation and frequency field are estimated in it.
Figure.2 Proposed Latent Segmentation and enhancement architecture
Then apply the same process for the off-line fine dictionary. The off-line fine dictionary
construction is used and the finger print image is acquired. The path extraction method is applied get
training samples of image the finally dictionary learning method is applied to get the outcomes of
dictionary elements. The data are been sent to coarse level and quality map, orientation and
frequency field are estimated in it.
The result of latent segmentation and enhancement are derived by combining the coarse
estimation and fine estimation which are represented as ROI segmentation.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 126
VI. CONCLUSION
The new method has been proposed to improve the computational efficiency of the algorithm.
A coarse to fine strategy is used to improve robustness and accuracy. The latent finger print
matching compared to roll and plain finger print matching, accuracy is significantly lower due to
background noise, poor ridge quality and overlapping structured noise in latent images. In this paper
the proposed algorithm is dictionary-based approach for automatic segmentation and enhancement
towards the goal of achieving “lights out” latent identifications system. Obtaining the ROI
segmentation and enhancement through coarse to fine ridge strategy.
REFERENCES
[1] S. Yoon, J. Feng, and A. Jain, “Latent Fingerprint Enhancement via Robust Orientation Field Estimation,” Proc. Int’l
Joint Conf. Biometrics (IJCB), pp. 1-8, 2011.
[2] E. Zhu, J. Yin, C.Hu, and G. Zhang, “A Systematic Method for Fingerprint Ridge Orientation Estimation and Image
Segmentation,” Pattern Recognition, vol. 39, no. 8, pp. 1452-1472, 2006.
[3] J. Feng, J. Zhou, and A.K. Jain, “Orientation Field Estimation for Latent Fingerprint Enhancement,” IEEE Trans.
Pattern Analysis and Machine Intelligence, vol. 35, no. 4, pp. 925-940, Apr. 2013.
[4] M.Aharon, M.Elad, and A. Bruckstein, “K-SVD: An Algorithm for Designing Overcomplete Dictionaries for Sparse
Representation,” IEEE Trans. Signal Processing, vol. 54, no. 11, pp. 4311- 4322, Nov. 2006.
[5] J. Zhang, R.Lai, and C.-C. Kuo, “Adaptive Directional Total-Variation Model for Latent Fingerprint Segmentation,”
IEEE Trans. Information Forensics and Security, vol. 8, no. 8, pp. 1261-1273, Aug. 2013.
[6] B.T. Ulery, R.A. Hicklin, J. Buscaglia, and M.A. Roberts, “Accuracy and Reliability of Forensic Latent Fingerprint
Decisions,” Proc. Nat’l Academy of Sciences of USA, vol. 108, no. 19, pp. 7733-7738, 2011.
[7] C. Wilson, R.A. Hicklin, H. Korves, B. Ulery, M. Zoepfl, M. Bone, P. Grother, R. Micheals, S. Otto, and C. Watson,
“Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report,” Report NISTIR 7123,
Nat’l Inst. of Standards and Technology, 2004.
[8] M.D. Indovina, V. Dvornychenko, R.A. Hicklin, and G.I. Kiebuzinski, “Evaluation of Latent Fingerprint
Technologies: Extended Feature Sets (Evaluation 2),” Technical Report NISTIR7859, Nat’l Inst. of Standards and
Technology, 2012.
[9] B.T. Ulery, R.A. Hicklin, J. Buscaglia, and M.A. Roberts, “Repeatability and Reproducibility of Decisions by Latent
Fingerprint Examiners,” PloS one, vol. 7, no. 3, article e32800, 2012.
[10] N.J. Short, M.S. Hsiao, A.L. Abbott, and E.A. Fox, “Latent Fingerprint Segmentation Using Ridge Template
Correlation,” Proc. Fourth Int’l 2008 Conf. Imaging for Crime Detection and Prevention, pp. 1- 6, 2011.
[11] H.-S. Choi, M. Boaventura, I.A.G. Boaventura, and A.K. Jain, “Automatic Segmentation of Latent Fingerprints,”
Proc. IEEE Biometrics: Theory, Applications and Systems (BTAS), 2012.
[12] X.J. Chen, J. Tian, J.G. Cheng, and X. Yang, “Segmentation of Fingerprint Images Using Linear Classifier,”
EURASIP J. Applied Signal Processing, vol. 4, pp. 480-494, 2004.
[13] F. Turroni, D. Maltoni, R. Cappelli, and D. Maio, “Improving Fingerprint Orientation Extraction,” IEEE Trans.
Information Forensics and Security, vol. 6, no. 3, pp. 1002-1013, Sept. 2011.
[14] S. Yoon, J. Feng, and A.K. Jain, “On Latent Fingerprint Enhancement,” Proc. SPIE Biometric Technology for
Human Identification VII, pp. 766 707-766 707-10., 2010.
[15] S. Chikkerur, A.N. Cartwright, and V. Govindaraju, “Fingerprint Enhancement Using STFT Analysis,” Pattern
Recognition, vol. 40, no. 1, pp. 198-211, 2007.
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach

More Related Content

What's hot

An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour FeaturesIRJET Journal
 
A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...IRJET Journal
 
IRJET- Shape based Image Classification using Geometric ­–Properties
IRJET-  	  Shape based Image Classification using Geometric ­–PropertiesIRJET-  	  Shape based Image Classification using Geometric ­–Properties
IRJET- Shape based Image Classification using Geometric ­–PropertiesIRJET Journal
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...IJTET Journal
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsCloudTechnologies
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTSNexgen Technology
 
An Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateAn Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateIRJET Journal
 
Dictionary Based Automatic Target Recognition
Dictionary Based Automatic Target RecognitionDictionary Based Automatic Target Recognition
Dictionary Based Automatic Target RecognitionIJESM JOURNAL
 
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...feature software solutions pvt ltd
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...sipij
 
Real Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its ApplicationReal Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its ApplicationTELKOMNIKA JOURNAL
 

What's hot (17)

An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...
 
IRJET- Shape based Image Classification using Geometric ­–Properties
IRJET-  	  Shape based Image Classification using Geometric ­–PropertiesIRJET-  	  Shape based Image Classification using Geometric ­–Properties
IRJET- Shape based Image Classification using Geometric ­–Properties
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
N010226872
N010226872N010226872
N010226872
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
B221223
B221223B221223
B221223
 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 
An Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition RateAn Assimilated Face Recognition System with effective Gender Recognition Rate
An Assimilated Face Recognition System with effective Gender Recognition Rate
 
Dictionary Based Automatic Target Recognition
Dictionary Based Automatic Target RecognitionDictionary Based Automatic Target Recognition
Dictionary Based Automatic Target Recognition
 
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy  up...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
 
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
COMPRESSION BASED FACE RECOGNITION USING TRANSFORM DOMAIN FEATURES FUSED AT M...
 
Real Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its ApplicationReal Time Face Recognition Based on Face Descriptor and Its Application
Real Time Face Recognition Based on Face Descriptor and Its Application
 

Viewers also liked

Cvpr2007 object category recognition p4 - combined segmentation and recogni...
Cvpr2007 object category recognition   p4 - combined segmentation and recogni...Cvpr2007 object category recognition   p4 - combined segmentation and recogni...
Cvpr2007 object category recognition p4 - combined segmentation and recogni...zukun
 
Methods Of Fingerprinting: Chris Strein
Methods Of Fingerprinting: Chris StreinMethods Of Fingerprinting: Chris Strein
Methods Of Fingerprinting: Chris Streincstrein1993
 
Fingerprints
FingerprintsFingerprints
Fingerprintsmpattani
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 

Viewers also liked (6)

Cvpr2007 object category recognition p4 - combined segmentation and recogni...
Cvpr2007 object category recognition   p4 - combined segmentation and recogni...Cvpr2007 object category recognition   p4 - combined segmentation and recogni...
Cvpr2007 object category recognition p4 - combined segmentation and recogni...
 
Methods Of Fingerprinting: Chris Strein
Methods Of Fingerprinting: Chris StreinMethods Of Fingerprinting: Chris Strein
Methods Of Fingerprinting: Chris Strein
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
IMAGE SEGMENTATION.
IMAGE SEGMENTATION.IMAGE SEGMENTATION.
IMAGE SEGMENTATION.
 

Similar to Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach

A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSIRJET Journal
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...theijes
 
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.IRJET Journal
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsPvrtechnologies Nellore
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Editor IJCATR
 
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...IRJET Journal
 
IRJET- Finger Vein Pattern Recognition Security
IRJET- Finger Vein Pattern Recognition SecurityIRJET- Finger Vein Pattern Recognition Security
IRJET- Finger Vein Pattern Recognition SecurityIRJET Journal
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prj_publication
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionIJTET Journal
 
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection ImagesImproved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection ImagesIRJET Journal
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmIJARIIT
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff DistanceIRJET Journal
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff DistanceIRJET Journal
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesIRJET Journal
 

Similar to Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach (20)

A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
 
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
 
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
 
IRJET- Finger Vein Pattern Recognition Security
IRJET- Finger Vein Pattern Recognition SecurityIRJET- Finger Vein Pattern Recognition Security
IRJET- Finger Vein Pattern Recognition Security
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint Compression
 
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection ImagesImproved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
 
El4301832837
El4301832837El4301832837
El4301832837
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 121 e-ISSN: 2349-9745 p-ISSN: 2393-8161 Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach Nithya.K1 , Karthi Prem.S2 and Prem.P.E3 1 Department of IT, Vivekanandha College of Engineering for Women 2 Department of IT, Vivekanandha College of Engineering for Women 3 Department of IT, Vivekanandha College of Engineering for Women Abstract— The accuracy of latent finger print matching compared to roll and plain finger print matching is significantly lower due to background noise, poor ridge quality and overlapping structured noise in latent images. In this paper the proposed algorithm is dictionary-based approach for automatic segmentation and enhancement towards the goal of achieving “lights out” latent identifications system. Total variation decomposition model with L1 fidelity regularization in latent finger print image remove background noise. A coarse to fine strategy is used to improve robustness and accuracy. It improves the computational efficiency of the algorithm. Keywords- Latent finger print, image decomposition, ROI, segmentation, ridge enhancement. I. INTRODUCTION Latent fingerprints refer to fingerprints got from the surfaces of objects acknowledgeable touched or handled by a person typically at crime scenes. Compared to rolled and plain finger prints, latent finger print is typically poor in quality and complex background noise. Due to this problem latent finger print accuracy is much lower. The main challenging problem in latent identification system is how to automatically extract reliable features in latent, especially latent with poor quality. The various features are proposed like ROI (Region of Interest), singular points and minutiae detection. The human factor issue in latent examinations has raised some reliability and repeatability. Brandon Mayfield case is involved to identify mistakes based on latent matching. The lights out capability develop a fully automatic latent feature extraction module. This is highly desirable to (i) Increase the throughput of latent matching systems, (ii) Improve repeatability of latent feature extraction and, (iii) Increase the compatibility Between features extracted in the latents and features extracted in reference images.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 122 Figure.1Three types of fingerprint images. (a) Rolled fingerprint, (b) plain fingerprint, (c) latent fingerprint with foreground (friction ridge pattern) highlighted by red outline. Notice the presence of different types of noise and distortion in (c). Commonly rolled/plain print matching or latent matching typically contains a number of modules, including region of interest (ROI) Segmentation (separating friction ridge from background), enhancement, feature extraction, and matching. To address the two main difficulties in latent fingerprint matching, namely presence of structured noise and poor quality of ridge structure, we propose a dictionary-based segmentation and enhancement of latent fingerprint. To remove the structured noise, the total-variation model with L1 fidelity regularization is used to decompose a latent into a texture part and a cartoon part. The main contributions of this paper are as follows: 1. Ridge structure dictionary is proposed for latent segmentation and enhancement. The dictionary is learnt from high quality fingerprint patches. 2. The ridge quality of a patch is defined as the structural similarity between the patch and its reconstruction from the learnt ridge structure dictionary. Orientation and frequency fields of a patch are estimated from its reconstruction. 3. To balance robustness and accuracy, a coarse to fine strategy is proposed which uses dictionaries at two levels of resolution (64 × 64 and 32× 32). 4. The proposed segmentation and enhancement algorithms outperform published algorithms and can also significantly boost the performance of a state of the-art commercial latent matcher on two latent databases (NIST SD27 and WVU DB). II. RELATED WORK Various researches have been reported in this related work based on segmentation and enhancement of latent finger print [2]-[6]. The idea of “Latent Fingerprint Enhancement via Robust Orientation Field Estimation” demonstrates the improvement of the automatic match accuracy and it is effective which help to find a correct orientation for latent fingerprint algorithm. [1].Hence it improved the performance of the orientation field. The Short Time Fourier Transform (STFT) improves the evaluation of the enhancement algorithm. The STFT analyses consider the improvement only in matching the accuracy of the poor quality print [15]. It uses some set of data base images for analysis purposes, which shows 17% of improvement in recognition rate. The Adaptive Directional Total Variation (ADTV) is derived for the latent fingerprint segmentation. It gives better accuracy in segmentation and enhancement process. Hence it increases the performance of the latent fingerprint feature detection and matching.
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 123 For image segmentation and estimation of fingerprint by ridge orientation a systematic method is used [2]. Since the ridge structure is taken by using the Gabor filter method, which improves the matching performance. This systematic method automatically removes the broken ridge. Thus it provides the accuracy in the minutiae detection. Some of the systematic methods are used for computation of the directional field and singular point of the fingerprint. By using the averaged square gradient and singular-point-extraction the error rate of singular point is improved for the purposes of detecting the low quality fingerprint. The K-mean Singular Value Decomposition (K-SVD) is used for adaptive dictionaries to achieve the spares single representation [4]. The problem of the scalability in K-SVD is more complement so it can be improved in future. Latent fingerprint enhancement algorithm is used for finding the region of interest (ROI) and Singular Point (SP) [1]. It improves the accuracy matching for fingerprint which obtains the multiple orientation elements for each image block. III. PROPOSED ALGORITHM While current automated fingerprint identification systems have achieved high accuracy in matching rolled/plain prints, latent matching still remains to be a challenging problem and requires much human intervention. The goal of this work is to achieve accurate latent segmentation, which is an essential step towards achieving automatic latent identification. Existing fingerprint segmentation algorithms performs poorly on latent prints, as they are mostly based on the assumptions that are only applicable for rolled/plain fingerprints. However, the proposed algorithm still does not work well on very poor quality latent fingerprint images. Latent fingerprints found at crime scenes provide crucial evidence to law enforcement agencies. The latents are typically searched against a large fingerprint database which is the collection of rolled/plain fingerprints of previously apprehended criminals. Due to the poor quality of the latents, latent examiners perform manual feature markup and Visual verification between the latent and the candidate fingerprints from the database. The latent finger print segmentation and enhancement consists of the following steps: (i) Latent decomposition (ii) Coarse level estimation of quality map and orientation and frequency fields. (iii) Fine level estimation of quality map and orientation and frequency fields. (iv) Segmentation and enhancement. A “Lights-Out” mode for latent identification is desired to reduce the burden on latent examiners and to introduce a level of consistency in fingerprint matching, particularly in searching ever growing fingerprint database. The proposed module latent matching or search is still a challenging problem due to presence of complex background noise and poor quality of friction ridge structure in many latents proposed an automatic latent segmentation and enhancement algorithm based on image decomposition and coarse to fine ridge structure dictionaries. The two different latent fingerprint databases, NIST SD27 and WVU DB, in conjunction with three different COTS matchers show that the proposed algorithm is
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 124 able to improve the performance of two COTS ten print matchers and can even boost the performance of a state-of-the-art latent matcher by weighted match score fusion. However, the proposed algorithm still does not work well on very poor quality latent fingerprint images. 3.1. Algorithm Overview The proposed algorithm consists of an off-line dictionary learning stage and on-line stage for segmentation and enhancement. In the off-line stage, two types of dictionaries are learnt: i) a coarse-level dictionary with patch size of 64 × 64 pixels which is used for coarse estimation of ridge quality map, orientation and frequency fields, and ii) 16 fine-level dictionaries with patch size of 32 ×32pixels which are used for fine estimation of ridge quality map, and orientation and frequency fields computation; Given the dictionaries, on-line latent segmentation and enhancement consists of the following steps: 3.1.1. Latent decomposition: Input latent is decomposed into cartoon and texture images via local total variations, the cartoon image is discarded. The relative reduction rate before and after filtering the image with the low-pass filter measures the local oscillatory behavior which is given by ߣߪሺ‫ݔ‬ሻ = ௅்௏ఙሺ௙ሻሺ௫ሻି ௅்௏ఙሺ௅ఙ∗௙ሻሺ௫ሻ ௅்௏ఙሺ௙ሻሺ௫ሻ where, Lσ is an σ-sized low-pass filter, x belongs to the cartoon part. The relative reduction rate is ߣߪሺ‫ݔ‬ሻ 3.1.2. Coarse level estimation of quality map and orientation and frequency fields. The texture image is divided into overlapping patches of size 64 × 64 pixels. The sparse representation of p can be obtained by solving the following optimization problem using orthogonal matching pursuit. The approximation can be calculated as,‫݌‬ෝ= ‫ܦ‬௦ ௖ α , where α is given by α = ሺ‫ܦ‬௦ ௖் ‫ܦ‬௦ ௖ ሻିଵ ‫ܦ‬௦ ௖் ‫݌‬. The residual vector can be calculated as r(p) = p - ‫̂݌‬ = p - ‫ܦ‬௦ ௖் α' 3.1.3. Fine level estimation of quality map and orientation and frequency fields. The texture image is divided into overlapping patches of size 32 × 32 pixels. Each patch has 32 ×16 or 16 ×32 overlapping pixels with each of its four connected neighboring blocks. For each patch, the coarse ridge orientation value is first used to index the corresponding fine-level dictionary. The fine estimation of ridge quality map, orientation and frequency fields are computed as coarse estimations. 3.1.4. Segmentation and enhancement The final quality map Q is computed as the average of coarse level quality and fine level quality by,
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 125 Q = ½(ܳ஼ +ܳ௙ ) The quality map Q is then normalized to the range [0,1]. The orientation and frequency parameters of the filter are tuned based on the fine-level orientation field (uf ) and the average frequency of coarse-level frequency field and fine level frequency field (ffþfc)the standard deviation of the Gaussian envelope in the Gabor filter The coarse quality map and fine quality map are combined for latent segmentation. In the foreground of texture image, Gabor filtering based on the orientation and frequency fields applied for latent enhancement. V. ARCHITECTURAL DIAGRAM The analysis of Image decomposition ROI segmentation and enhancement using coarse to fine strategy to increase accuracy of latent finger print image. The overview of proposed latent segmentation and enhancement architecture is been shown in fig.2 The latent finger print image is been acquired. Then image decomposition method is used to get the output as textured image. Coarse to fine strategy is used to estimate texture image. Dictionary construction method using this estimation consists of two types 1. coarse and 2. fine strategy. Initially the off-line coarse dictionary construction is used and the finger print image is acquired. The path extraction method is applied get training samples of image the finally dictionary learning method is applied to get the outcomes of dictionary elements. The data are been sent to coarse level and quality map, orientation and frequency field are estimated in it. Figure.2 Proposed Latent Segmentation and enhancement architecture Then apply the same process for the off-line fine dictionary. The off-line fine dictionary construction is used and the finger print image is acquired. The path extraction method is applied get training samples of image the finally dictionary learning method is applied to get the outcomes of dictionary elements. The data are been sent to coarse level and quality map, orientation and frequency field are estimated in it. The result of latent segmentation and enhancement are derived by combining the coarse estimation and fine estimation which are represented as ROI segmentation.
  • 6. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 126 VI. CONCLUSION The new method has been proposed to improve the computational efficiency of the algorithm. A coarse to fine strategy is used to improve robustness and accuracy. The latent finger print matching compared to roll and plain finger print matching, accuracy is significantly lower due to background noise, poor ridge quality and overlapping structured noise in latent images. In this paper the proposed algorithm is dictionary-based approach for automatic segmentation and enhancement towards the goal of achieving “lights out” latent identifications system. Obtaining the ROI segmentation and enhancement through coarse to fine ridge strategy. REFERENCES [1] S. Yoon, J. Feng, and A. Jain, “Latent Fingerprint Enhancement via Robust Orientation Field Estimation,” Proc. Int’l Joint Conf. Biometrics (IJCB), pp. 1-8, 2011. [2] E. Zhu, J. Yin, C.Hu, and G. Zhang, “A Systematic Method for Fingerprint Ridge Orientation Estimation and Image Segmentation,” Pattern Recognition, vol. 39, no. 8, pp. 1452-1472, 2006. [3] J. Feng, J. Zhou, and A.K. Jain, “Orientation Field Estimation for Latent Fingerprint Enhancement,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 35, no. 4, pp. 925-940, Apr. 2013. [4] M.Aharon, M.Elad, and A. Bruckstein, “K-SVD: An Algorithm for Designing Overcomplete Dictionaries for Sparse Representation,” IEEE Trans. Signal Processing, vol. 54, no. 11, pp. 4311- 4322, Nov. 2006. [5] J. Zhang, R.Lai, and C.-C. Kuo, “Adaptive Directional Total-Variation Model for Latent Fingerprint Segmentation,” IEEE Trans. Information Forensics and Security, vol. 8, no. 8, pp. 1261-1273, Aug. 2013. [6] B.T. Ulery, R.A. Hicklin, J. Buscaglia, and M.A. Roberts, “Accuracy and Reliability of Forensic Latent Fingerprint Decisions,” Proc. Nat’l Academy of Sciences of USA, vol. 108, no. 19, pp. 7733-7738, 2011. [7] C. Wilson, R.A. Hicklin, H. Korves, B. Ulery, M. Zoepfl, M. Bone, P. Grother, R. Micheals, S. Otto, and C. Watson, “Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report,” Report NISTIR 7123, Nat’l Inst. of Standards and Technology, 2004. [8] M.D. Indovina, V. Dvornychenko, R.A. Hicklin, and G.I. Kiebuzinski, “Evaluation of Latent Fingerprint Technologies: Extended Feature Sets (Evaluation 2),” Technical Report NISTIR7859, Nat’l Inst. of Standards and Technology, 2012. [9] B.T. Ulery, R.A. Hicklin, J. Buscaglia, and M.A. Roberts, “Repeatability and Reproducibility of Decisions by Latent Fingerprint Examiners,” PloS one, vol. 7, no. 3, article e32800, 2012. [10] N.J. Short, M.S. Hsiao, A.L. Abbott, and E.A. Fox, “Latent Fingerprint Segmentation Using Ridge Template Correlation,” Proc. Fourth Int’l 2008 Conf. Imaging for Crime Detection and Prevention, pp. 1- 6, 2011. [11] H.-S. Choi, M. Boaventura, I.A.G. Boaventura, and A.K. Jain, “Automatic Segmentation of Latent Fingerprints,” Proc. IEEE Biometrics: Theory, Applications and Systems (BTAS), 2012. [12] X.J. Chen, J. Tian, J.G. Cheng, and X. Yang, “Segmentation of Fingerprint Images Using Linear Classifier,” EURASIP J. Applied Signal Processing, vol. 4, pp. 480-494, 2004. [13] F. Turroni, D. Maltoni, R. Cappelli, and D. Maio, “Improving Fingerprint Orientation Extraction,” IEEE Trans. Information Forensics and Security, vol. 6, no. 3, pp. 1002-1013, Sept. 2011. [14] S. Yoon, J. Feng, and A.K. Jain, “On Latent Fingerprint Enhancement,” Proc. SPIE Biometric Technology for Human Identification VII, pp. 766 707-766 707-10., 2010. [15] S. Chikkerur, A.N. Cartwright, and V. Govindaraju, “Fingerprint Enhancement Using STFT Analysis,” Pattern Recognition, vol. 40, no. 1, pp. 198-211, 2007.