SlideShare a Scribd company logo
1 of 7
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 17
LATENT FINGERPRINT AND VEIN MATCHING USING RIDGE
FEATURE IDENTIFICATION
Rajeswari.P1
, Sathya.M2
, Joy Kinshy.P3
1
PG Scholar, Computer Science and Engineering, Knowledge Institute of Technology, Salem, TN, India
2
Assistant Professor, Computer Science and Engineering, Knowledge Institute of Technology, Salem, TN, India
3
PG Scholar, Computer Science and Engineering, Knowledge Institute of Technology, Salem, TN, India
Abstract
Fingerprint is an impression of friction ridges of the fingers. It has getting better either by enrollment or by the impressions lifted from
crime scenes. Latent prints are partial prints, invisible and it had been get from accidental impressions of crime scenes. Minutiae
matches had been defined as the points which are marked with 3 different regions like start, end and intersection ridges of the
fingerprints. For an authentication system, full-to-full matching fingerprint are efficient. But it is not efficient in latent-to-full
matching fingerprints. In our proposed system, latent-to-full matching fingerprint must be efficient with the distance had been
calculated with in the minutiae points by using 8x8 Gabor filter, using this spatial frequencies had been calculated. In this case, the
spoof attacks had been occurred. To reduce these attacks, we propose an algorithm, Ridge Feature Identification and it may combine
the work of taking distance minutiae calculation and the finger-vein matching to become the system more efficient and provides the
liveliness in the authentication system.
Keywords: Fingerprint, Latent prints, Ridge Feature Identification, Minutiae matches, Finger-vein.
----------------------------------------------------------------------***-----------------------------------------------------------------------
1. INTRODUCTION
Now a days, Biometrics maps to a new civilian applications of
commercial use. Automatic Fingerprint Identification System
(AFIS) appeared as an essential tool for all the biometrics and
the law enforcement agencies [1].The demand of the secured
biometric system, now lead to the growth in the features and
individualities for the responsibility of quite complicated
fingerprint and finger-vein present in the fingertips of the
fingerprint. This important technology is widely used in area-
access control, Pc login, and e-commerce. These all biometrics
are attracted towards this technology, because of password
theft, loss and release of userโ€Ÿs memory [10].
In biometrics system, the security and convenience of the
system are important [10].The system requires high response
times and fast accuracy. The biometrics includes the patterns
based on fingerprint, finger-vein, facial features, the iris, and
the voice, hand geometry. However, some of the features are
susceptible to forgery, so if it is used in combination the
system will be efficient. The fingerprint and finger-vein
produces high confidentiality over other measures.
1.1 Fingerprint
In general, not even twin sisters or twin brothers may not have
the same fingerprint. They may be varying with respect to
their genetic arrangements of cells and tissues. Fingerprint
may consist of friction ridges and it is a combination of
ridges(black line) and valleys(space between the two
ridges).In fingerprint,level-2 fingerprint features has been
executed with high performance and individuality in the
fingerprints and it may produce the imperfections randomly in
the case of friction ridges and they are known as the minutiae.
These type of fingerprint acquisition typically utilizes the
fingerprint resolution must higher than
410dpI.Although,[2]level-1 features may be utilized by
Automated Fingerprint resolution, and this may produce the
pattern type and ridge flow features present in our fingers and
it may be got from a low-resolution images, and this features
are used only for fingerprint classification.
Fingerprint [6] images are of three types. (i) rolled, (ii)plain
and (iii)latent. Although rolled and plain fingerprint images
are used for forensic applications, whereas rolled print may be
used for government applications and commercial one. This
may have the friction ridge impressions of full nail (end-to-
end) for the purpose of registry.
But in plain fingerprint, once the finger is pressed in a flat
surface and not be rolled, both this plain and rolled prints are
taken by the live scan machine or inked impressions on paper.
Latent fingerprint is defined as the partial print or injured
print. It defines that the impressions we get it in a damaged
conditions or partial prints. But half of the fingerprint is there
to identify a system.
In identification system, the enrolled fingerprint is stored at an
initial stage and the verifying fingerprint is the print for the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 18
authentication purpose, we have to verify among the enrolled
prints. If the fingerprint is plain or rolled, it is easy to verify
the system in AFIS. But if it is latent, the identification system
is not successful and it is failed. So [1], the fingerprint
examiners of manual identifiers, use the procedure ACE-V in
the latent fingerprint Identification System. The ACE-V
procedure includes (Analysis, Comparisons, Evaluations and
Verifications).
Step 1: First, Analysis the image whether rolled, plain or latent
[3]. It may verify that the sufficient ridge information is
available and mark the features along with associated quality
information done by human experts.
Step 2: Compared to the original image in the database
(includes the level 1, level 2 and level 3).
Step 3: Evaluate and classify the fingerprint pair as
individualization (match or non-match).
Step 4: By verifying and check the result by another examiner,
to verify the identity is correct or not.
The analysis and identifications seems to be critical issues.
The errors may be done by the human examiners like
erroneous exclusion and erroneous individualization[3].The
minutiae features includes ridges intersection, ridge
bifurcation, ridge starting, ridge ending provides the marking
of those particular region and performs the action by taking
the matching score between the enrolled and verifying
fingerprints and that can be performed by baseline matching
algorithm. Focus on this method includes the local minutiae
matching; global minutiae matching and matching score
computation are efficient in this method.
In many aspects, Feature extraction is a major process. In this
feature extraction, the features are defined in [3], CDEFFS
document and use the term consistent here (1) Reference
points includes type, location and directions. (2) Ridge flow
map (3) ridge wavelength map (4) Ridge quality map. By
these features, the feature extraction is efficient over it. This
may be generated based on the validated ridges.
In relevant aspects, Anil k.Jain et.al [1] using Hough
transform is to evaluate the straight lines present in a
fingerprint images. Based on these observations, edge
detection is the reprocessing procedure in this method. The
process includes (1) get an imperfect image as input (2) extent
the identity by using arbitrary shapes. Besides, on latent
fingerprint enhancement [6] can be done by providing Gabor
filter for enhancement purpose. Here, it has two parameters,
(1) local ridge orientation and (2) frequency generation.
According to this method, Gabor filtering can connect the
broken ridges and separate the joined ridges. Here, in this
method, the true ridges are weakened and spurious ridges are
strengthening after this Gabor filtering.
Focus on this previous method, Image segmentation is an
important method in fingerprint image. This method may
segment the image into a set a pixels and individual pixel may
consist of useful information about the minutiae. Now a day,
boundary detection using segmentation is efficient and label
formation is the enhancing technique.
1.2 Finger-Vein
Finger-vein recognition is a technique to provide liveliness in
the sensor-level spoof attacks[2].In this recognition technique,
it may provide the finger response to electrical signals,
temperature and electrocardiograph signals in the finger, time
varying perspiration from fingertips and percentage of
generated oxygen saturated hemoglobin in the blood.
Now a day, it is almost used in biometric and forensics, the
vein images are acquired from the near-infrared-based or
thermal-infrared-based optical imaging technique. This optical
imaging technique is economically feasible and sensitive to
skin as a deeper tissue features.
The finger-vein patterns can be extracted by placing the finger
in between the camera and infrared light source [10].The
infrared light is passed through the hands in the backside of
finger and the hemoglobin absorbs the light and produces the
patterns of veins in the palm side of the hand as shadows. It
consists of vein patterns and irregular shading and noise.
Almost, in a single image, the vein patterns are not clear and it
consists of thickness of finger bones and muscles. So,
simultaneous extraction of finger-vein patterns is efficient and
useful. Personal Identification using finger vein patterns has
received a lot of interest in research area of forensic and
civilian application [2] [10].
Miura and Nagasaka et al. [10] using a repeated line tracking
algorithm to further improve the performance of vein
identification. A detailed evaluation of this method may
evaluate the robustness in the extraction of finger vein has
been improved randomly by using the local maximum
curvature.
In [2], improves the performance metrics by using the finger-
vein and low-resolution fingerprint images combines these in
a new score level combination. In this finger-vein
identification system, extract the shape and improves the
accuracy in this system. By using this [10], this system may
not achieves the high individuality in very large population.
2. RELATED WORK
In this section, we reviewed the related work in two areas. One
with fingerprint and the other work with finger-vein. Mostly,
all the algorithms work with the help of the minutiae points
present in the fingerprint. In this method [1], feature extraction
is the initial process and it extracts the minutiae and
orientation field from both the latent print and rolled print.
With the use of the gradient based method, local minutiae
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 19
descriptors are built from the minutiae and orientation field is
also reconstructed.
1. Local minutiae descriptors
In these descriptors, the minutiae points are coordinated and
formed as the cylinder like shape with varying size; it is
described as minutiae cylinder code (MCC) by the density of
neighboring minutiae in a particular direction.
2. Orientation Field Reconstruction
Gradient based method used in this method and the orientation
field is also reliable with good images and reconstructed only
under the convex hull of minutiae points.
๐‘†๐‘š =
1
๐‘
๐‘†๐‘ ๐‘– ๐‘†๐‘ (๐‘–)๐‘›
๐‘–โˆ’1 (1)
Where,
๐‘†๐‘š = matching minutiae score around two fingerprints.
๐‘†๐‘(๐‘–) = the ๐‘–Th pair in matched minutiae cylinder code.
๐‘†๐‘  ๐‘– = 1 โˆ’ (
๐‘‘๐‘  ๐‘–
2๐‘ก๐‘ 
) (2)
Where,
๐‘‘๐‘ (๐‘–) = spatial distance.
๐‘ = number of minutiae in the latent.
Feng et al. [12] extract the fingerprint features and the features
had been marked in the particular fingerprint. Based on this
extracted fingerprint, the orientation field is estimated and the
curvature field also constructed from this features. The
pyramid formation of fingerprint is made and extracts the
singular points at lower and higher levels.
Almost in filtering large fingerprint database for latent
matching [6], the features in fingerprint includes 3 levels of
resolutions includes minutiae, pores and ridge shapes. Here [6]
described a minutiae-based method and the features includes
the feature marking and feature extraction at lost the filtering
techniques are enhanced and the matching process starts and
identify a particular person in a system.
The ridge lines present in the fingerprint evaluates the
orientation and curvature field is computed. The singular point
extracts at both high and lowers level locations. The pattern
type is also recognized as loop, tented arch, plain arch, whorl
etc. This system may propose the multistage filtering in this
fingerprint database as follows: singularity filtering and
orientation filtering.
Jianjiang Feng [5] described the method of descriptor-based
minutiae matching algorithm and combining the information
of texture and the minutiae information is performed. The
minutiae correspondence problem solved with a simple
alignment-based greedy matching algorithm. By this method,
the performance rate may be increased correspondingly.
In [13], exposed the system with reduced manual input and
improves the matching accuracy. This enhancement algorithm
manually marked the ROI and the singular points. The
commercial SDK provides the enhancement algorithm in an
orientation field estimation algorithm and fits it to the coarse
field estimation as a skeleton. This system performs the
operation of โ€žlights-out โ€žmode in an efficient way.
The proposed method in [2] can acquired simultaneous finger-
vein and finger surface images are presented. This method
illustrates and utilizes more user-friendly and peg-free
imaging. The steps in this method include image
normalization, segmentation and rotation of the interclass
image had been developed.
Anil K.Jain et.al [3] used local minutiae matching, global
minutiae matching and matching score computation. This [3]
may clearly demonstrates the features of the minutiae points
and the lines present. Naoto Miura et.al [10] used the repeated
line tracking method, to detect the patterns of veins and
removed by background by blacked out regions. The pixel
marked as a current tracking point is recorded as a matrix
named as โ€œlocus spaceโ€. The locus space values have the high
or frequency.
In[13],includes four steps to enhance the algorithm,1)manual
markup of ROI and singular points 2)STFT 3)Orientation field
estimation 4)Gabor filters.
3. METHODS AND DATA ANALYSIS
3.1 User Interface Design
The objective of user interface design is to make the user's
interaction as simple and more efficient as possible, in terms
of completing user goals is often referred as user-centered
design. Good customer boundary design accelerates
concluding the task at hand without drawing fired attention to
it. Graphic design can be exploited to upkeep its usability and
visibility. The design process must balance with the technical
functionality and visual elements are used to create a system
that is not only operational but also usable and adaptable to
changing user needs.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 20
Fig-1 System Flow Diagram for the proposed system
3.2 NBIS Segmentation Algorithm
This algorithm segment the original fingerprint image without
line removal process. In this algorithm, the background is
indicated by the blacked out region. The fig1 demonstrates
clearly that the detected fingerprint regions from the proposed
segmentation algorithm are much smaller and more accurate
than those of the previous method. The ability of the proposed
algorithm to reduce the searchable fingerprint area while
improving accuracy can be visualized.
In this segmentation process fig.2, take a wide database with
rolled fingerprint, the features of the full fingerprint is stored
in the NBIS database. At a verification process, a latent of the
individual is taken and it had been matched with the database
by preceding the first process segmentation. It is a method of
splitting a digital image into multiple segments and this leads
to simply and change the representation of an image into more
useful and easy to analyze .This process had been segmented
by using label for every pixels and the pixels with the same
label share certain characteristics.
Fig- 2 Segmenting a Latent Image
Fig.-3 Binarizing and Minutiae Point Classification
3.3 Latent Matching Approach
Prearranged a latent fingerprint and a rolled fingerprint, this
method extract extra features from both prints, align them in
the similar coordinate system, and calculate a match score
amongst them.
3.3.1 Latent Fingerprint Matching
Enhanced latent matching accuracy has been described by
expending features, which are manually noticeable for latent.
However, marking extended features (orientation field, ridge
skeleton, etc.) in poor quality latent is exact time-consuming
and might be only practicable in infrequent cases. However,
only a minor portion of latent can be properly known using
this approach. The segmented image is extracted and formed
the binary image by the process of binarization.
3.3.2 Feature Extraction
The planned matching approach uses minutiae and orientation
field from both latent and rolled prints. Minutiae are manually
marked by latent examiners in the latent, and automatically
Input finger
image1
Input vein
image1
Apply Gabor
filtering
Noise less image
Apply image
segmentation
Images extraction
Generate the ridge
feature templates
Score combination
Score > K
Fingerprint
matched
Fingerprint not
matched
Yes
No
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 21
extracted using commercial matchers in the rolled print. Based
on minutiae, local minutiae descriptors are constructed and
used in the proposed descriptor-based alignment and scoring
algorithms.
3.4 Ridge Feature Process
Here the process obtains the essential ridges and minutiae
information from the fingerprint image. This method can then
define ridge coordinates and extract ridge features between the
two minutiae points. Here, the ridge count (rc) is calculated by
with the number of ridges along the perpendicular axis until
the axis lights the ridge attached to the adjacent minutia. The
ridge length (rl) is the distance on the horizontal axis from the
joint of the perpendicular and horizontal axis to a minutia. In
addition, the process improves the discriminating control of
ridge structures, the ridge type (rt) is used as one of the ridge
structures in its place of a minutia type. To regulate the ridge
type (rt), all minutia is first ordered as an end point or a
bifurcation. If a minutia is an finale point, there is only single
ridge fitting to the minutia. If a minutia is a branching, there
are three ridges joined to the minutiae.
Fig-4 Distance Calculation of Minutiae Points a) red-minutiae
points b) blue-distance of minutiae points c) yellow-matching
process
3.5 Fingerprint and Vein Segmentation
In vein segmentation, the algorithm without the line removal,
the background is labeled by the blacked out region. The
rushed white outlines were drawn manually and are replicated
in the other images to deliver visual orientations for
comparison. This algorithm demonstrates clearly that the
identified fingerprint regions from the proposed segmentation
algorithm are much smaller and more accurate than those of
the earlier method. From this method, the capacity of the
proposed algorithm to reduce the searchable fingerprint area
while improving accuracy can be visualized.
The low contrast images, due to the light scattering outcome,
are improved and the fingerprint lines are detached using 2D
discrete wavelet filtering. Kernel filtering produces multiple
images by rotating the kernel in six dissimilar directions,
emphasis into the predictable ways of the vein patterns. The
maximum of all images is converted into a binary image.
Further development is achieved by a two-level morphological
process: a majority filter smoothed the shapes and eliminates
some of the misclassified isolated pixels, and a reconstruction
procedure removes the remaining misclassified areas.
3.6 Matching Process
The complete flow of the proposed fingerprint matching
algorithm is as follows:1) Originally match any pair of ridge-
based coordinate systems mined from the enrolled fingerprint
image and the input fingerprint image using dynamic
programming.2) Select the uppermost degree of corresponding
ridge-based coordinate pairs.3) For every primarily matched
pair, a breadth-first search (BFS) is achieved to detect the
matched ridge-based coordinate pairs incrementally.4)
Patterned the strength of the matched coordinate pairs using
the comparative position and orientation of the minutiae and
count the number of matched minutiae.5) Repeat steps 3 or 4
times and then yield the maximum number of matched
minutiae.6) Calculate the matching score. If the two image
score is matched with other image score this system give the
outcome as both are same fingerprint image else both are not
same image.
4 EXPERIMENTAL ANALYSES
In order to determine the performance enhancement using the
proposed schemes, we performed difficult experiments on our
collected database. The nonlinear score combination may
adjust the matching score by the degrees of consistency
between the two matching score as illustrated below:
^
๐‘  =
๐‘Ž + ๐‘ ๐‘ก
๐‘Ž + ๐‘ ๐‘ฃ
๐›พ
โˆ— (๐‘Ž + ๐‘ ๐‘ฃ)2
Where,
a=positive constant and it is fixed to 1.
๐›พ=range of image is selected as [1, 2].
๐‘ ๐‘ก=matching score from finger texture.
๐‘ ๐‘ฃ=matching score from finger-vein.
^
๐‘ 
=combined score.
Where the equation evaluates that the two matching scores are
consistent then the final score is distributed by the vein
matching. If it is inconsistent, the matching score provided by
the modulated joint probability. In most circumstances, the
finger-vein matching is more stable, then the whole matching
system is more or less stable.
The model evaluation of proposed system can be measured by
considering the environment as follows:
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 22
Table-1 Terms and performance of the system
Terms Fingerpri
nt
Finger-
vein
Combine
d Results
Performance 89 88 92
Minutiae Points 69 5 75
Distance
Calculation
96 7 98
Security 90 90 99
Authentication 86 86 95
The above matrix demonstrates the performance and terms in
case of the approximation by using the algorithm level
description. First, the performance of the system had been
demonstrated and the match score is consistent high. Second,
minutiae points had been extracted that shows the combined
results with reduced factors. Then, the distance minutiae
calculation by using Gabor filter is demonstrated with very
high performance. And the security and the authentication is
also high is this system of measurements.
Chart-1 Performances of the Overall System
The overhead chart embodies the whole performance of the
latent fingerprint and finger-vein system from the matrix of
the Table 1.
5. CONCLUSIONS AND FUTURE
ENHANCEMENT
Fingerprint matching algorithm designed for matching latent
to rolled/plain fingerprints which is based on a descriptor-
based Hough Transform alignment. A comparison between the
alignment performance of the proposed algorithm and the
well-known Generalized Hough Transform shows the superior
performance of the proposed method. Here reported matching
results for two different latent fingerprint databases with a
large background database of around 32K rolled prints. The
comparison performance of the proposed matcher with three
different state-of-the-art fingerprint matchers. Experimental
results show that the proposed algorithm performs better than
the three fingerprint matchers used in the study across all
image qualities. A score-level fusion of the proposed matcher
and one of the commercial matchers shows a further boost in
the matching performance. Latent fingerprint used in this
descriptor based Hough Transform compares only the
minutiae features like ridge start, end and bifurcations. In our
work, enhancing this project by taking the distance between
the minutiae points and compare with the latent image. Finger-
vein matching is using in this project to overcome the spoof
attacks in this latent fingerprint matching .This may be done
by using the Gabor filter in ridge feature identification. This
may provide the authentication in an efficient way. In future
enhance this system by applying various algorithms with
different databases.
REFERENCES
[1]. A. A. Paulino, J. Feng, and A. K. Jain, โ€œLatent fingerprint
matching using descriptor-based Hough transform,โ€ in Proc.
Int. Joint Conf. Biometrics, pp. 1โ€“7, Oct. 2011.
[2]. Ajay Kumar and Yingbo Zhou, โ€œ Human Identification
Using Finger Images,โ€ IEEE Trans. On Image Processing,
vol. 21, no. 4, Apr 2012.
[3]. A. K. Jain and J. Feng, โ€œLatent fingerprint matching,โ€
IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 1, pp.
88โ€“100, Jan. 2011.
[4]. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar,
Handbook of Fingerprint Recognition, 2nd ed. New York:
Springer-Verlag, 2009.
[5]. J. Feng, โ€œCombining minutiae descriptors for fingerprint
matching,โ€ Pattern Recognit., vol. 41, pp. 342โ€“352, 2008.
[6]. J. Feng and A. K. Jain, โ€œFiltering large fingerprint
database for latent matching,โ€ in Proc. ICPR, Dec. 2008, pp.
1โ€“4.
[7]. J. Qi, S. Yang, and Y. Wang, โ€œFingerprint matching
combining the global orientation field with minutia,โ€ Pattern
Recognit. Lett., vol. 26, pp. 2424โ€“2430, 2005.
[8]. J. Gu, J. Zhou, and C. Yang, โ€œFingerprint recognition by
combining global structure and local cues,โ€ IEEE Trans.
Image Process., vol. 15, no. 7, pp. 1952โ€“1964, Jul. 2006.
[9]. M. Tico and P. Kuosmanen, โ€œFingerprint matching using
and orientation based minutia descriptor,โ€ IEEE Trans.
Pattern Anal. Mach. Intell., vol. 25, no. 8, pp. 1009โ€“1014,
Aug. 2003
[10]. Naoto Miura, Akio Nagasaka, Takafumi Miyatake,
โ€œFeature extraction of finger-vein patterns based on repeated
line tracking and its application to personal identificationโ€
Machine Vision and Applications ,Feb.2004
[11]. R. Cappelli, M. Ferrara, and D. Maltoni, โ€œMinutia
cylinder-code: A new representation and matching technique
0
20
40
60
80
100
120
finger-print
finger-vein
combined
results
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 23
for fingerprint recognition,โ€ IEEE Trans. Pattern Anal. Mach.
Intell., vol. 32, no. 12, pp. 2128โ€“2141, Dec. 2010.
[12]. S. Yoon, J. Feng, and A. K. Jain, โ€œLatent fingerprint
enhancement via robust orientation field estimation,โ€ in Proc.
Int. Joint Conf. Biometrics, New Delhi, India, Oct. 2011, pp.
1โ€“8.
[13]. S. Yoon, J. Feng, and A. K. Jain, โ€œOn latent fingerprint
enhancement,โ€ in Proc. SPIE, Apr. 2010, vol. 7667, no.
766707.
BIOGRAPHIES
RAJESWARI.P is a student pursuing PG
Degree in Computer Science and Engineering
at knowledge institute of technology, Salem.
Research Interest includes Image Processing
and Information Security.
contact:rajiprd2@gmail.com
SATHYA.M is an Assistant Professor in Knowledge Institute
of echnology,Salem.Research Interest includes Image
Processing and Web Mining.
JOY KINSHY.P is a student pursuing PG
Degree in Computer Science and Engineering
at knowledge institute of technology, Salem.
Research Interest includes Image Processing
and Mobile Computing.

More Related Content

What's hot

Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentseSAT Journals
ย 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognitionmahesamrin
ย 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
ย 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
ย 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
ย 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint IdentificationIJMER
ย 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
ย 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition systemeSAT Journals
ย 
Object detection using real time algorithm with face recognition
Object detection using real time algorithm with face recognitionObject detection using real time algorithm with face recognition
Object detection using real time algorithm with face recognitioneSAT Publishing House
ย 
Object detection using real time algorithm with face recognition
Object detection using real time algorithm with face recognitionObject detection using real time algorithm with face recognition
Object detection using real time algorithm with face recognitioneSAT Journals
ย 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security systemeSAT Publishing House
ย 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
ย 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detectionijitjournal
ย 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
ย 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
ย 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTSNexgen Technology
ย 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
ย 

What's hot (19)

Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
ย 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognition
ย 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
ย 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
ย 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
ย 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
ย 
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...Face Liveness Detection for Biometric Antispoofing Applications using Color T...
Face Liveness Detection for Biometric Antispoofing Applications using Color T...
ย 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition system
ย 
Object detection using real time algorithm with face recognition
Object detection using real time algorithm with face recognitionObject detection using real time algorithm with face recognition
Object detection using real time algorithm with face recognition
ย 
Object detection using real time algorithm with face recognition
Object detection using real time algorithm with face recognitionObject detection using real time algorithm with face recognition
Object detection using real time algorithm with face recognition
ย 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
ย 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
ย 
An overview of face liveness detection
An overview of face liveness detectionAn overview of face liveness detection
An overview of face liveness detection
ย 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
ย 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
ย 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
ย 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
ย 
40120140505010
4012014050501040120140505010
40120140505010
ย 
40120140505010 2-3
40120140505010 2-340120140505010 2-3
40120140505010 2-3
ย 

Viewers also liked

License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment applicationeSAT Publishing House
ย 
Estimation of morphometric parameters and
Estimation of morphometric parameters andEstimation of morphometric parameters and
Estimation of morphometric parameters andeSAT Publishing House
ย 
Development of mathematical model on gas tungsten arc welding process parameters
Development of mathematical model on gas tungsten arc welding process parametersDevelopment of mathematical model on gas tungsten arc welding process parameters
Development of mathematical model on gas tungsten arc welding process parameterseSAT Publishing House
ย 
Influence of reinforcement on the behavior of hollow
Influence of reinforcement on the behavior of hollowInfluence of reinforcement on the behavior of hollow
Influence of reinforcement on the behavior of holloweSAT Publishing House
ย 
Migrating from a legacy enterprise resource planning (erp) system to a new er...
Migrating from a legacy enterprise resource planning (erp) system to a new er...Migrating from a legacy enterprise resource planning (erp) system to a new er...
Migrating from a legacy enterprise resource planning (erp) system to a new er...eSAT Publishing House
ย 
Seismic evaluation of mutistorey building with soft storey
Seismic evaluation of mutistorey building with soft storeySeismic evaluation of mutistorey building with soft storey
Seismic evaluation of mutistorey building with soft storeyeSAT Publishing House
ย 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...eSAT Publishing House
ย 
Fineโ€“grained analysis and profiling of software bugs to facilitate waste iden...
Fineโ€“grained analysis and profiling of software bugs to facilitate waste iden...Fineโ€“grained analysis and profiling of software bugs to facilitate waste iden...
Fineโ€“grained analysis and profiling of software bugs to facilitate waste iden...eSAT Publishing House
ย 
Performance evaluation of bituminous concrete incorporating crumb rubber and ...
Performance evaluation of bituminous concrete incorporating crumb rubber and ...Performance evaluation of bituminous concrete incorporating crumb rubber and ...
Performance evaluation of bituminous concrete incorporating crumb rubber and ...eSAT Publishing House
ย 
Seismic analysis of low to medium rise building for base
Seismic analysis of low to medium rise building for baseSeismic analysis of low to medium rise building for base
Seismic analysis of low to medium rise building for baseeSAT Publishing House
ย 
A study of seismic pounding between adjacent buildings
A study of seismic pounding between adjacent buildingsA study of seismic pounding between adjacent buildings
A study of seismic pounding between adjacent buildingseSAT Publishing House
ย 
Design of an autonomous ornithopter with live video
Design of an autonomous ornithopter with live videoDesign of an autonomous ornithopter with live video
Design of an autonomous ornithopter with live videoeSAT Publishing House
ย 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUAlpesh Kurhade
ย 
Modern solar powered irrigation sysytem by using arm
Modern solar powered irrigation sysytem by using armModern solar powered irrigation sysytem by using arm
Modern solar powered irrigation sysytem by using armeSAT Publishing House
ย 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
ย 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMManish Negi
ย 
Al-Humajah MTsN Pelintung Kota Dumai
Al-Humajah MTsN Pelintung Kota DumaiAl-Humajah MTsN Pelintung Kota Dumai
Al-Humajah MTsN Pelintung Kota DumaiSanti Hendrayani
ย 
Summary the good earth story (chapter I to III)
Summary the good earth story (chapter I to III)Summary the good earth story (chapter I to III)
Summary the good earth story (chapter I to III)Thai Chamroeun
ย 
An introduction to critical discourse analysis in education (new)
An introduction to critical discourse analysis in education (new)An introduction to critical discourse analysis in education (new)
An introduction to critical discourse analysis in education (new)Thai Chamroeun
ย 

Viewers also liked (19)

License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment application
ย 
Estimation of morphometric parameters and
Estimation of morphometric parameters andEstimation of morphometric parameters and
Estimation of morphometric parameters and
ย 
Development of mathematical model on gas tungsten arc welding process parameters
Development of mathematical model on gas tungsten arc welding process parametersDevelopment of mathematical model on gas tungsten arc welding process parameters
Development of mathematical model on gas tungsten arc welding process parameters
ย 
Influence of reinforcement on the behavior of hollow
Influence of reinforcement on the behavior of hollowInfluence of reinforcement on the behavior of hollow
Influence of reinforcement on the behavior of hollow
ย 
Migrating from a legacy enterprise resource planning (erp) system to a new er...
Migrating from a legacy enterprise resource planning (erp) system to a new er...Migrating from a legacy enterprise resource planning (erp) system to a new er...
Migrating from a legacy enterprise resource planning (erp) system to a new er...
ย 
Seismic evaluation of mutistorey building with soft storey
Seismic evaluation of mutistorey building with soft storeySeismic evaluation of mutistorey building with soft storey
Seismic evaluation of mutistorey building with soft storey
ย 
Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...Identity based cryptography for client side security in web applications (web...
Identity based cryptography for client side security in web applications (web...
ย 
Fineโ€“grained analysis and profiling of software bugs to facilitate waste iden...
Fineโ€“grained analysis and profiling of software bugs to facilitate waste iden...Fineโ€“grained analysis and profiling of software bugs to facilitate waste iden...
Fineโ€“grained analysis and profiling of software bugs to facilitate waste iden...
ย 
Performance evaluation of bituminous concrete incorporating crumb rubber and ...
Performance evaluation of bituminous concrete incorporating crumb rubber and ...Performance evaluation of bituminous concrete incorporating crumb rubber and ...
Performance evaluation of bituminous concrete incorporating crumb rubber and ...
ย 
Seismic analysis of low to medium rise building for base
Seismic analysis of low to medium rise building for baseSeismic analysis of low to medium rise building for base
Seismic analysis of low to medium rise building for base
ย 
A study of seismic pounding between adjacent buildings
A study of seismic pounding between adjacent buildingsA study of seismic pounding between adjacent buildings
A study of seismic pounding between adjacent buildings
ย 
Design of an autonomous ornithopter with live video
Design of an autonomous ornithopter with live videoDesign of an autonomous ornithopter with live video
Design of an autonomous ornithopter with live video
ย 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
ย 
Modern solar powered irrigation sysytem by using arm
Modern solar powered irrigation sysytem by using armModern solar powered irrigation sysytem by using arm
Modern solar powered irrigation sysytem by using arm
ย 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
ย 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
ย 
Al-Humajah MTsN Pelintung Kota Dumai
Al-Humajah MTsN Pelintung Kota DumaiAl-Humajah MTsN Pelintung Kota Dumai
Al-Humajah MTsN Pelintung Kota Dumai
ย 
Summary the good earth story (chapter I to III)
Summary the good earth story (chapter I to III)Summary the good earth story (chapter I to III)
Summary the good earth story (chapter I to III)
ย 
An introduction to critical discourse analysis in education (new)
An introduction to critical discourse analysis in education (new)An introduction to critical discourse analysis in education (new)
An introduction to critical discourse analysis in education (new)
ย 

Similar to Latent fingerprint and vein matching using ridge feature identification

Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification systemeSAT Journals
ย 
IRJET- Survey on Sign Language and Gesture Recognition System
IRJET- Survey on Sign Language and Gesture Recognition SystemIRJET- Survey on Sign Language and Gesture Recognition System
IRJET- Survey on Sign Language and Gesture Recognition SystemIRJET Journal
ย 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a surveyeSAT Publishing House
ย 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
ย 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peakseSAT Publishing House
ย 
IRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET Journal
ย 
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
ย 
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET Journal
ย 
Hand gesture recognition system for human computer interaction using contour ...
Hand gesture recognition system for human computer interaction using contour ...Hand gesture recognition system for human computer interaction using contour ...
Hand gesture recognition system for human computer interaction using contour ...eSAT Journals
ย 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Abhishek Walia
ย 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
ย 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesIRJET Journal
ย 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesIRJET Journal
ย 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
ย 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
ย 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
ย 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET Journal
ย 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docxjoyjonna282
ย 

Similar to Latent fingerprint and vein matching using ridge feature identification (20)

Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
ย 
IRJET- Survey on Sign Language and Gesture Recognition System
IRJET- Survey on Sign Language and Gesture Recognition SystemIRJET- Survey on Sign Language and Gesture Recognition System
IRJET- Survey on Sign Language and Gesture Recognition System
ย 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a survey
ย 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
ย 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaks
ย 
IRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture RecognitionIRJET- Survey Paper on Vision based Hand Gesture Recognition
IRJET- Survey Paper on Vision based Hand Gesture Recognition
ย 
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...
ย 
IRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed SensingIRJET- Biometric Scanner using Compressed Sensing
IRJET- Biometric Scanner using Compressed Sensing
ย 
E0543135
E0543135E0543135
E0543135
ย 
Hand gesture recognition system for human computer interaction using contour ...
Hand gesture recognition system for human computer interaction using contour ...Hand gesture recognition system for human computer interaction using contour ...
Hand gesture recognition system for human computer interaction using contour ...
ย 
M017637484
M017637484M017637484
M017637484
ย 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
ย 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
ย 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
ย 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand Gestures
ย 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
ย 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
ย 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
ย 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
ย 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
ย 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
ย 
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...eSAT Publishing House
ย 
Hudhud cyclone โ€“ a severe disaster in visakhapatnam
Hudhud cyclone โ€“ a severe disaster in visakhapatnamHudhud cyclone โ€“ a severe disaster in visakhapatnam
Hudhud cyclone โ€“ a severe disaster in visakhapatnameSAT Publishing House
ย 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
ย 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
ย 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
ย 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
ย 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
ย 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
ย 
Shear strength of rc deep beam panels โ€“ a review
Shear strength of rc deep beam panels โ€“ a reviewShear strength of rc deep beam panels โ€“ a review
Shear strength of rc deep beam panels โ€“ a revieweSAT Publishing House
ย 
Role of voluntary teams of professional engineers in dissater management โ€“ ex...
Role of voluntary teams of professional engineers in dissater management โ€“ ex...Role of voluntary teams of professional engineers in dissater management โ€“ ex...
Role of voluntary teams of professional engineers in dissater management โ€“ ex...eSAT Publishing House
ย 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
ย 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
ย 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
ย 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
ย 
Coastal zones โ€“ seismic vulnerability an analysis from east coast of india
Coastal zones โ€“ seismic vulnerability an analysis from east coast of indiaCoastal zones โ€“ seismic vulnerability an analysis from east coast of india
Coastal zones โ€“ seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
ย 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
ย 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
ย 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
ย 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
ย 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
ย 
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
Impact of flood disaster in a drought prone area โ€“ case study of alampur vill...
ย 
Hudhud cyclone โ€“ a severe disaster in visakhapatnam
Hudhud cyclone โ€“ a severe disaster in visakhapatnamHudhud cyclone โ€“ a severe disaster in visakhapatnam
Hudhud cyclone โ€“ a severe disaster in visakhapatnam
ย 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
ย 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
ย 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
ย 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
ย 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
ย 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
ย 
Shear strength of rc deep beam panels โ€“ a review
Shear strength of rc deep beam panels โ€“ a reviewShear strength of rc deep beam panels โ€“ a review
Shear strength of rc deep beam panels โ€“ a review
ย 
Role of voluntary teams of professional engineers in dissater management โ€“ ex...
Role of voluntary teams of professional engineers in dissater management โ€“ ex...Role of voluntary teams of professional engineers in dissater management โ€“ ex...
Role of voluntary teams of professional engineers in dissater management โ€“ ex...
ย 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
ย 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
ย 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
ย 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
ย 
Coastal zones โ€“ seismic vulnerability an analysis from east coast of india
Coastal zones โ€“ seismic vulnerability an analysis from east coast of indiaCoastal zones โ€“ seismic vulnerability an analysis from east coast of india
Coastal zones โ€“ seismic vulnerability an analysis from east coast of india
ย 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
ย 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
ย 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
ย 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
ย 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
ย 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
ย 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
ย 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEslot gacor bisa pakai pulsa
ย 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
ย 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
ย 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
ย 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
ย 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
ย 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
ย 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
ย 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
ย 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ย 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
ย 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
ย 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
ย 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
ย 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
ย 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
ย 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
ย 

Latent fingerprint and vein matching using ridge feature identification

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 17 LATENT FINGERPRINT AND VEIN MATCHING USING RIDGE FEATURE IDENTIFICATION Rajeswari.P1 , Sathya.M2 , Joy Kinshy.P3 1 PG Scholar, Computer Science and Engineering, Knowledge Institute of Technology, Salem, TN, India 2 Assistant Professor, Computer Science and Engineering, Knowledge Institute of Technology, Salem, TN, India 3 PG Scholar, Computer Science and Engineering, Knowledge Institute of Technology, Salem, TN, India Abstract Fingerprint is an impression of friction ridges of the fingers. It has getting better either by enrollment or by the impressions lifted from crime scenes. Latent prints are partial prints, invisible and it had been get from accidental impressions of crime scenes. Minutiae matches had been defined as the points which are marked with 3 different regions like start, end and intersection ridges of the fingerprints. For an authentication system, full-to-full matching fingerprint are efficient. But it is not efficient in latent-to-full matching fingerprints. In our proposed system, latent-to-full matching fingerprint must be efficient with the distance had been calculated with in the minutiae points by using 8x8 Gabor filter, using this spatial frequencies had been calculated. In this case, the spoof attacks had been occurred. To reduce these attacks, we propose an algorithm, Ridge Feature Identification and it may combine the work of taking distance minutiae calculation and the finger-vein matching to become the system more efficient and provides the liveliness in the authentication system. Keywords: Fingerprint, Latent prints, Ridge Feature Identification, Minutiae matches, Finger-vein. ----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION Now a days, Biometrics maps to a new civilian applications of commercial use. Automatic Fingerprint Identification System (AFIS) appeared as an essential tool for all the biometrics and the law enforcement agencies [1].The demand of the secured biometric system, now lead to the growth in the features and individualities for the responsibility of quite complicated fingerprint and finger-vein present in the fingertips of the fingerprint. This important technology is widely used in area- access control, Pc login, and e-commerce. These all biometrics are attracted towards this technology, because of password theft, loss and release of userโ€Ÿs memory [10]. In biometrics system, the security and convenience of the system are important [10].The system requires high response times and fast accuracy. The biometrics includes the patterns based on fingerprint, finger-vein, facial features, the iris, and the voice, hand geometry. However, some of the features are susceptible to forgery, so if it is used in combination the system will be efficient. The fingerprint and finger-vein produces high confidentiality over other measures. 1.1 Fingerprint In general, not even twin sisters or twin brothers may not have the same fingerprint. They may be varying with respect to their genetic arrangements of cells and tissues. Fingerprint may consist of friction ridges and it is a combination of ridges(black line) and valleys(space between the two ridges).In fingerprint,level-2 fingerprint features has been executed with high performance and individuality in the fingerprints and it may produce the imperfections randomly in the case of friction ridges and they are known as the minutiae. These type of fingerprint acquisition typically utilizes the fingerprint resolution must higher than 410dpI.Although,[2]level-1 features may be utilized by Automated Fingerprint resolution, and this may produce the pattern type and ridge flow features present in our fingers and it may be got from a low-resolution images, and this features are used only for fingerprint classification. Fingerprint [6] images are of three types. (i) rolled, (ii)plain and (iii)latent. Although rolled and plain fingerprint images are used for forensic applications, whereas rolled print may be used for government applications and commercial one. This may have the friction ridge impressions of full nail (end-to- end) for the purpose of registry. But in plain fingerprint, once the finger is pressed in a flat surface and not be rolled, both this plain and rolled prints are taken by the live scan machine or inked impressions on paper. Latent fingerprint is defined as the partial print or injured print. It defines that the impressions we get it in a damaged conditions or partial prints. But half of the fingerprint is there to identify a system. In identification system, the enrolled fingerprint is stored at an initial stage and the verifying fingerprint is the print for the
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 18 authentication purpose, we have to verify among the enrolled prints. If the fingerprint is plain or rolled, it is easy to verify the system in AFIS. But if it is latent, the identification system is not successful and it is failed. So [1], the fingerprint examiners of manual identifiers, use the procedure ACE-V in the latent fingerprint Identification System. The ACE-V procedure includes (Analysis, Comparisons, Evaluations and Verifications). Step 1: First, Analysis the image whether rolled, plain or latent [3]. It may verify that the sufficient ridge information is available and mark the features along with associated quality information done by human experts. Step 2: Compared to the original image in the database (includes the level 1, level 2 and level 3). Step 3: Evaluate and classify the fingerprint pair as individualization (match or non-match). Step 4: By verifying and check the result by another examiner, to verify the identity is correct or not. The analysis and identifications seems to be critical issues. The errors may be done by the human examiners like erroneous exclusion and erroneous individualization[3].The minutiae features includes ridges intersection, ridge bifurcation, ridge starting, ridge ending provides the marking of those particular region and performs the action by taking the matching score between the enrolled and verifying fingerprints and that can be performed by baseline matching algorithm. Focus on this method includes the local minutiae matching; global minutiae matching and matching score computation are efficient in this method. In many aspects, Feature extraction is a major process. In this feature extraction, the features are defined in [3], CDEFFS document and use the term consistent here (1) Reference points includes type, location and directions. (2) Ridge flow map (3) ridge wavelength map (4) Ridge quality map. By these features, the feature extraction is efficient over it. This may be generated based on the validated ridges. In relevant aspects, Anil k.Jain et.al [1] using Hough transform is to evaluate the straight lines present in a fingerprint images. Based on these observations, edge detection is the reprocessing procedure in this method. The process includes (1) get an imperfect image as input (2) extent the identity by using arbitrary shapes. Besides, on latent fingerprint enhancement [6] can be done by providing Gabor filter for enhancement purpose. Here, it has two parameters, (1) local ridge orientation and (2) frequency generation. According to this method, Gabor filtering can connect the broken ridges and separate the joined ridges. Here, in this method, the true ridges are weakened and spurious ridges are strengthening after this Gabor filtering. Focus on this previous method, Image segmentation is an important method in fingerprint image. This method may segment the image into a set a pixels and individual pixel may consist of useful information about the minutiae. Now a day, boundary detection using segmentation is efficient and label formation is the enhancing technique. 1.2 Finger-Vein Finger-vein recognition is a technique to provide liveliness in the sensor-level spoof attacks[2].In this recognition technique, it may provide the finger response to electrical signals, temperature and electrocardiograph signals in the finger, time varying perspiration from fingertips and percentage of generated oxygen saturated hemoglobin in the blood. Now a day, it is almost used in biometric and forensics, the vein images are acquired from the near-infrared-based or thermal-infrared-based optical imaging technique. This optical imaging technique is economically feasible and sensitive to skin as a deeper tissue features. The finger-vein patterns can be extracted by placing the finger in between the camera and infrared light source [10].The infrared light is passed through the hands in the backside of finger and the hemoglobin absorbs the light and produces the patterns of veins in the palm side of the hand as shadows. It consists of vein patterns and irregular shading and noise. Almost, in a single image, the vein patterns are not clear and it consists of thickness of finger bones and muscles. So, simultaneous extraction of finger-vein patterns is efficient and useful. Personal Identification using finger vein patterns has received a lot of interest in research area of forensic and civilian application [2] [10]. Miura and Nagasaka et al. [10] using a repeated line tracking algorithm to further improve the performance of vein identification. A detailed evaluation of this method may evaluate the robustness in the extraction of finger vein has been improved randomly by using the local maximum curvature. In [2], improves the performance metrics by using the finger- vein and low-resolution fingerprint images combines these in a new score level combination. In this finger-vein identification system, extract the shape and improves the accuracy in this system. By using this [10], this system may not achieves the high individuality in very large population. 2. RELATED WORK In this section, we reviewed the related work in two areas. One with fingerprint and the other work with finger-vein. Mostly, all the algorithms work with the help of the minutiae points present in the fingerprint. In this method [1], feature extraction is the initial process and it extracts the minutiae and orientation field from both the latent print and rolled print. With the use of the gradient based method, local minutiae
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 19 descriptors are built from the minutiae and orientation field is also reconstructed. 1. Local minutiae descriptors In these descriptors, the minutiae points are coordinated and formed as the cylinder like shape with varying size; it is described as minutiae cylinder code (MCC) by the density of neighboring minutiae in a particular direction. 2. Orientation Field Reconstruction Gradient based method used in this method and the orientation field is also reliable with good images and reconstructed only under the convex hull of minutiae points. ๐‘†๐‘š = 1 ๐‘ ๐‘†๐‘ ๐‘– ๐‘†๐‘ (๐‘–)๐‘› ๐‘–โˆ’1 (1) Where, ๐‘†๐‘š = matching minutiae score around two fingerprints. ๐‘†๐‘(๐‘–) = the ๐‘–Th pair in matched minutiae cylinder code. ๐‘†๐‘  ๐‘– = 1 โˆ’ ( ๐‘‘๐‘  ๐‘– 2๐‘ก๐‘  ) (2) Where, ๐‘‘๐‘ (๐‘–) = spatial distance. ๐‘ = number of minutiae in the latent. Feng et al. [12] extract the fingerprint features and the features had been marked in the particular fingerprint. Based on this extracted fingerprint, the orientation field is estimated and the curvature field also constructed from this features. The pyramid formation of fingerprint is made and extracts the singular points at lower and higher levels. Almost in filtering large fingerprint database for latent matching [6], the features in fingerprint includes 3 levels of resolutions includes minutiae, pores and ridge shapes. Here [6] described a minutiae-based method and the features includes the feature marking and feature extraction at lost the filtering techniques are enhanced and the matching process starts and identify a particular person in a system. The ridge lines present in the fingerprint evaluates the orientation and curvature field is computed. The singular point extracts at both high and lowers level locations. The pattern type is also recognized as loop, tented arch, plain arch, whorl etc. This system may propose the multistage filtering in this fingerprint database as follows: singularity filtering and orientation filtering. Jianjiang Feng [5] described the method of descriptor-based minutiae matching algorithm and combining the information of texture and the minutiae information is performed. The minutiae correspondence problem solved with a simple alignment-based greedy matching algorithm. By this method, the performance rate may be increased correspondingly. In [13], exposed the system with reduced manual input and improves the matching accuracy. This enhancement algorithm manually marked the ROI and the singular points. The commercial SDK provides the enhancement algorithm in an orientation field estimation algorithm and fits it to the coarse field estimation as a skeleton. This system performs the operation of โ€žlights-out โ€žmode in an efficient way. The proposed method in [2] can acquired simultaneous finger- vein and finger surface images are presented. This method illustrates and utilizes more user-friendly and peg-free imaging. The steps in this method include image normalization, segmentation and rotation of the interclass image had been developed. Anil K.Jain et.al [3] used local minutiae matching, global minutiae matching and matching score computation. This [3] may clearly demonstrates the features of the minutiae points and the lines present. Naoto Miura et.al [10] used the repeated line tracking method, to detect the patterns of veins and removed by background by blacked out regions. The pixel marked as a current tracking point is recorded as a matrix named as โ€œlocus spaceโ€. The locus space values have the high or frequency. In[13],includes four steps to enhance the algorithm,1)manual markup of ROI and singular points 2)STFT 3)Orientation field estimation 4)Gabor filters. 3. METHODS AND DATA ANALYSIS 3.1 User Interface Design The objective of user interface design is to make the user's interaction as simple and more efficient as possible, in terms of completing user goals is often referred as user-centered design. Good customer boundary design accelerates concluding the task at hand without drawing fired attention to it. Graphic design can be exploited to upkeep its usability and visibility. The design process must balance with the technical functionality and visual elements are used to create a system that is not only operational but also usable and adaptable to changing user needs.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 20 Fig-1 System Flow Diagram for the proposed system 3.2 NBIS Segmentation Algorithm This algorithm segment the original fingerprint image without line removal process. In this algorithm, the background is indicated by the blacked out region. The fig1 demonstrates clearly that the detected fingerprint regions from the proposed segmentation algorithm are much smaller and more accurate than those of the previous method. The ability of the proposed algorithm to reduce the searchable fingerprint area while improving accuracy can be visualized. In this segmentation process fig.2, take a wide database with rolled fingerprint, the features of the full fingerprint is stored in the NBIS database. At a verification process, a latent of the individual is taken and it had been matched with the database by preceding the first process segmentation. It is a method of splitting a digital image into multiple segments and this leads to simply and change the representation of an image into more useful and easy to analyze .This process had been segmented by using label for every pixels and the pixels with the same label share certain characteristics. Fig- 2 Segmenting a Latent Image Fig.-3 Binarizing and Minutiae Point Classification 3.3 Latent Matching Approach Prearranged a latent fingerprint and a rolled fingerprint, this method extract extra features from both prints, align them in the similar coordinate system, and calculate a match score amongst them. 3.3.1 Latent Fingerprint Matching Enhanced latent matching accuracy has been described by expending features, which are manually noticeable for latent. However, marking extended features (orientation field, ridge skeleton, etc.) in poor quality latent is exact time-consuming and might be only practicable in infrequent cases. However, only a minor portion of latent can be properly known using this approach. The segmented image is extracted and formed the binary image by the process of binarization. 3.3.2 Feature Extraction The planned matching approach uses minutiae and orientation field from both latent and rolled prints. Minutiae are manually marked by latent examiners in the latent, and automatically Input finger image1 Input vein image1 Apply Gabor filtering Noise less image Apply image segmentation Images extraction Generate the ridge feature templates Score combination Score > K Fingerprint matched Fingerprint not matched Yes No
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 21 extracted using commercial matchers in the rolled print. Based on minutiae, local minutiae descriptors are constructed and used in the proposed descriptor-based alignment and scoring algorithms. 3.4 Ridge Feature Process Here the process obtains the essential ridges and minutiae information from the fingerprint image. This method can then define ridge coordinates and extract ridge features between the two minutiae points. Here, the ridge count (rc) is calculated by with the number of ridges along the perpendicular axis until the axis lights the ridge attached to the adjacent minutia. The ridge length (rl) is the distance on the horizontal axis from the joint of the perpendicular and horizontal axis to a minutia. In addition, the process improves the discriminating control of ridge structures, the ridge type (rt) is used as one of the ridge structures in its place of a minutia type. To regulate the ridge type (rt), all minutia is first ordered as an end point or a bifurcation. If a minutia is an finale point, there is only single ridge fitting to the minutia. If a minutia is a branching, there are three ridges joined to the minutiae. Fig-4 Distance Calculation of Minutiae Points a) red-minutiae points b) blue-distance of minutiae points c) yellow-matching process 3.5 Fingerprint and Vein Segmentation In vein segmentation, the algorithm without the line removal, the background is labeled by the blacked out region. The rushed white outlines were drawn manually and are replicated in the other images to deliver visual orientations for comparison. This algorithm demonstrates clearly that the identified fingerprint regions from the proposed segmentation algorithm are much smaller and more accurate than those of the earlier method. From this method, the capacity of the proposed algorithm to reduce the searchable fingerprint area while improving accuracy can be visualized. The low contrast images, due to the light scattering outcome, are improved and the fingerprint lines are detached using 2D discrete wavelet filtering. Kernel filtering produces multiple images by rotating the kernel in six dissimilar directions, emphasis into the predictable ways of the vein patterns. The maximum of all images is converted into a binary image. Further development is achieved by a two-level morphological process: a majority filter smoothed the shapes and eliminates some of the misclassified isolated pixels, and a reconstruction procedure removes the remaining misclassified areas. 3.6 Matching Process The complete flow of the proposed fingerprint matching algorithm is as follows:1) Originally match any pair of ridge- based coordinate systems mined from the enrolled fingerprint image and the input fingerprint image using dynamic programming.2) Select the uppermost degree of corresponding ridge-based coordinate pairs.3) For every primarily matched pair, a breadth-first search (BFS) is achieved to detect the matched ridge-based coordinate pairs incrementally.4) Patterned the strength of the matched coordinate pairs using the comparative position and orientation of the minutiae and count the number of matched minutiae.5) Repeat steps 3 or 4 times and then yield the maximum number of matched minutiae.6) Calculate the matching score. If the two image score is matched with other image score this system give the outcome as both are same fingerprint image else both are not same image. 4 EXPERIMENTAL ANALYSES In order to determine the performance enhancement using the proposed schemes, we performed difficult experiments on our collected database. The nonlinear score combination may adjust the matching score by the degrees of consistency between the two matching score as illustrated below: ^ ๐‘  = ๐‘Ž + ๐‘ ๐‘ก ๐‘Ž + ๐‘ ๐‘ฃ ๐›พ โˆ— (๐‘Ž + ๐‘ ๐‘ฃ)2 Where, a=positive constant and it is fixed to 1. ๐›พ=range of image is selected as [1, 2]. ๐‘ ๐‘ก=matching score from finger texture. ๐‘ ๐‘ฃ=matching score from finger-vein. ^ ๐‘  =combined score. Where the equation evaluates that the two matching scores are consistent then the final score is distributed by the vein matching. If it is inconsistent, the matching score provided by the modulated joint probability. In most circumstances, the finger-vein matching is more stable, then the whole matching system is more or less stable. The model evaluation of proposed system can be measured by considering the environment as follows:
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 22 Table-1 Terms and performance of the system Terms Fingerpri nt Finger- vein Combine d Results Performance 89 88 92 Minutiae Points 69 5 75 Distance Calculation 96 7 98 Security 90 90 99 Authentication 86 86 95 The above matrix demonstrates the performance and terms in case of the approximation by using the algorithm level description. First, the performance of the system had been demonstrated and the match score is consistent high. Second, minutiae points had been extracted that shows the combined results with reduced factors. Then, the distance minutiae calculation by using Gabor filter is demonstrated with very high performance. And the security and the authentication is also high is this system of measurements. Chart-1 Performances of the Overall System The overhead chart embodies the whole performance of the latent fingerprint and finger-vein system from the matrix of the Table 1. 5. CONCLUSIONS AND FUTURE ENHANCEMENT Fingerprint matching algorithm designed for matching latent to rolled/plain fingerprints which is based on a descriptor- based Hough Transform alignment. A comparison between the alignment performance of the proposed algorithm and the well-known Generalized Hough Transform shows the superior performance of the proposed method. Here reported matching results for two different latent fingerprint databases with a large background database of around 32K rolled prints. The comparison performance of the proposed matcher with three different state-of-the-art fingerprint matchers. Experimental results show that the proposed algorithm performs better than the three fingerprint matchers used in the study across all image qualities. A score-level fusion of the proposed matcher and one of the commercial matchers shows a further boost in the matching performance. Latent fingerprint used in this descriptor based Hough Transform compares only the minutiae features like ridge start, end and bifurcations. In our work, enhancing this project by taking the distance between the minutiae points and compare with the latent image. Finger- vein matching is using in this project to overcome the spoof attacks in this latent fingerprint matching .This may be done by using the Gabor filter in ridge feature identification. This may provide the authentication in an efficient way. In future enhance this system by applying various algorithms with different databases. REFERENCES [1]. A. A. Paulino, J. Feng, and A. K. Jain, โ€œLatent fingerprint matching using descriptor-based Hough transform,โ€ in Proc. Int. Joint Conf. Biometrics, pp. 1โ€“7, Oct. 2011. [2]. Ajay Kumar and Yingbo Zhou, โ€œ Human Identification Using Finger Images,โ€ IEEE Trans. On Image Processing, vol. 21, no. 4, Apr 2012. [3]. A. K. Jain and J. Feng, โ€œLatent fingerprint matching,โ€ IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 1, pp. 88โ€“100, Jan. 2011. [4]. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed. New York: Springer-Verlag, 2009. [5]. J. Feng, โ€œCombining minutiae descriptors for fingerprint matching,โ€ Pattern Recognit., vol. 41, pp. 342โ€“352, 2008. [6]. J. Feng and A. K. Jain, โ€œFiltering large fingerprint database for latent matching,โ€ in Proc. ICPR, Dec. 2008, pp. 1โ€“4. [7]. J. Qi, S. Yang, and Y. Wang, โ€œFingerprint matching combining the global orientation field with minutia,โ€ Pattern Recognit. Lett., vol. 26, pp. 2424โ€“2430, 2005. [8]. J. Gu, J. Zhou, and C. Yang, โ€œFingerprint recognition by combining global structure and local cues,โ€ IEEE Trans. Image Process., vol. 15, no. 7, pp. 1952โ€“1964, Jul. 2006. [9]. M. Tico and P. Kuosmanen, โ€œFingerprint matching using and orientation based minutia descriptor,โ€ IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 8, pp. 1009โ€“1014, Aug. 2003 [10]. Naoto Miura, Akio Nagasaka, Takafumi Miyatake, โ€œFeature extraction of finger-vein patterns based on repeated line tracking and its application to personal identificationโ€ Machine Vision and Applications ,Feb.2004 [11]. R. Cappelli, M. Ferrara, and D. Maltoni, โ€œMinutia cylinder-code: A new representation and matching technique 0 20 40 60 80 100 120 finger-print finger-vein combined results
  • 7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 23 for fingerprint recognition,โ€ IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 12, pp. 2128โ€“2141, Dec. 2010. [12]. S. Yoon, J. Feng, and A. K. Jain, โ€œLatent fingerprint enhancement via robust orientation field estimation,โ€ in Proc. Int. Joint Conf. Biometrics, New Delhi, India, Oct. 2011, pp. 1โ€“8. [13]. S. Yoon, J. Feng, and A. K. Jain, โ€œOn latent fingerprint enhancement,โ€ in Proc. SPIE, Apr. 2010, vol. 7667, no. 766707. BIOGRAPHIES RAJESWARI.P is a student pursuing PG Degree in Computer Science and Engineering at knowledge institute of technology, Salem. Research Interest includes Image Processing and Information Security. contact:rajiprd2@gmail.com SATHYA.M is an Assistant Professor in Knowledge Institute of echnology,Salem.Research Interest includes Image Processing and Web Mining. JOY KINSHY.P is a student pursuing PG Degree in Computer Science and Engineering at knowledge institute of technology, Salem. Research Interest includes Image Processing and Mobile Computing.