SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD26600 | Volume – 3 | Issue – 5 | July - August 2019 Page 1208
Identification of Persons by Fingerprint using
Huffman Coding Algorithm
Nwe Ni Kyaw1, Kyaw Kyaw Naing2, Myat Myo Nwe Wai3
1Assistant Lecturer, 2Lecturer, 3Professor
1,3Faculty of Computer Science, Myanmar Institute of Information Technology, Mandalay, Myanmar
2Physics Department, Shwebo University, Shwebo, Myanmar
How to cite this paper: Nwe Ni Kyaw |
Kyaw Kyaw Naing | Myat Myo Nwe Wai
"Identification of Persons by Fingerprint
using Huffman Coding Algorithm"
Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019, pp.1208-1211,
https://doi.org/10.31142/ijtsrd26600
Copyright © 2019 by author(s) and
International Journalof Trendin Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
Fingerprint system is one of the most common biometric features used for
personal identification and verification. There are many techniques used
for finding the features of fingerprint when it matches the other images of
fingerprint. This system must input the fingerprint for the corresponding
profile. It converts the binary image. This image will convert the Huffman
code approach and to generate codes for input fingerprint. The system has
the profile information along with their associated fingerprints. When the
system identified the fingerprint, the system will display the associated
profile information for the corresponding image. Huffman compression
technique was the most accurate technique for compression of fingerprint
image.
KEYWORDS: Biometrics, Automated Fingerprint Identification System, Huffman
Code
1. INTRODUCTION
Biometrics are automated methods of recognizing a person based on a
physiological or behavioral characteristic. Among the features measured are
face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
Biometric data are separate and distinct from personal information. Biometric
templates cannot be reverse-engineered to recreate personal information and
they cannot be stolen and used to access personal information [1].
Fingerprint identification is the method of identification based on the different
patterns of human fingers, which is actually unique among each person.
It is the most popular way of acquiring details of any person
and is the easiest and convenient way of identifyingaperson
[4]. These unique patterns of lines can either be in a loop,
whorl, or arch pattern [5]. In figure 1, shows the fingerprint
patterns. Finger patterns can be divided into three groups as
show below figure 2. Arches: Ridges enter and exit on same
sides. Loops: Ridges enter on one side and exit on different
side. Whorls: It consists of circles or mixture of patterntypes
[4].
Figure1: Fingerprint pattern
Figure 2: (a) Plain Arch (b) Loops (c) Whorls
The two major applications of fingerprint recognition are
Fingerprint verification and fingerprint identification.
Fingerprint Verification; also known one-to-one fingerprint
matching or Fingerprint Authentication is the process of
confirming that a user is who they claim to be. In fingerprint
Verification a user usually provides some kind of
identification, for example a user ID or username or a card
before placing his finger on the fingerprint scanner. It takes
the user ID and tries to match the new fingerprint with the
fingerprints associated with this user ID.
Fingerprint Identification, also known as one-to-many
matching fingerprint matching, is the processof comparinga
fingerprint against all the fingerprints in the database to see
if a match is found.
Fingerprint identification system is a part of a project to
design and implement a national standard for collecting,
encoding, storing and retrieving digitized fingerprints
images.
IJTSRD26600
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26600 | Volume – 3 | Issue – 5 | July - August 2019 Page 1209
2. RELATED WORKS
Aburas et al. (2008) has been presented the fingerprint
patterns recognition system by using Huffman Coding
algorithm. Firstly, the fingerprint image is fed in the system.
Secondly, it converts the binary image as the pre-processing
stage. And then, the binary image is compressed by using
Huffman coding approach. The obtained results are
considerably promising since very low FAR i.e. 0.733%, FRR
i.e. 2.6% and high accuracy i.e. approximately 97%. The
weakness of the system comes from the point of different
captured environments for the images [2].
Kanbar et al. (2016) proposed the fingerprint identification
and verification system for crime scene investigation. the
paper presents an overview of thedifferentstepsinvolved in
the development of fingerprint based person identification
and verification using minutiae based system [3].
Kambli et al. (2010) presented for compressing the
fingerprint images by comparing thedifferentmethods. This
research used 50 images of 512 x 512 bmp format. The
result showed Modified SPIHT offers better compression
than basic SPIHT and JPEG [7].
McMahon et al. (2003) published HuffmanCodingAlgorithm
for implementation of Character Recognition System. They
used this algorithm to produce approximate character.
Alternatively, Huffman Coding Algorithm is used to
implement current fingerprint identification system [8].
3. Automated Fingerprint Identification System
Automated Fingerprint Identification Systems (AFIS)
arc used inlawcnforccmcnt and security applications to
identify individuals based on their fingerprints. A pattern
matching algorithm is typically at the heart of these
systems. Pattern matching is used to compare two
different fingerprint images to determine ifthey represent
fingerprint impressions from the same individual.
4. Huffman Code
In computer scienceand informationtheory, Huffman coding
is an entropy encoding algorithm used for lossless data
compression. The term refers to the use of a variable-length
code table for encoding a source symbol (such as a character
in a file) where the variable-length code table is derived in a
particular way based on the estimated probability of
occurrence for each possible value of the source symbol [9].
The technique works by creating a binary tree
of nodes. These can be stored in a regular array, the size of
which depends on the number of symbols, n. A node can be
either a leaf node or an internal node.
Initially, all nodes are leaf nodes, which contain the symbol
itself, the weight (frequency of appearance) of the symbol
and optionally, a link to a parent node which makes iteasy to
read the code (in reverse) starting from a leaf node. Internal
nodes contain symbol weight, links to two child nodes and
the optional link to a parent node. As a common convention,
bit '0' represents following the left child and bit '1'
represents following the right child. A finished treehasup to
n leaf nodes and (n – 1) internal nodes. A Huffman tree that
omits unused symbols is produced the most optimal code
lengths [10].Huffman coding uses a specific method for
choosing the representation for each symbol.
The process essentiallybeginswiththeleaf nodes containing
the probabilities of the symbol they represent, and then a
new node whose children are the 2 nodes with smallest
probability is created, suchthatthenewnode'sprobabilityis
equal to the sum of the children's probability. With the
previous 2 nodes merged into one node (thus not
considering them anymore), and with the new node being
now considered, the procedure is repeated until only one
node remains, the Huffman tree. Fingerprintsare encoded 8-
bits grayscale images.
Huffman coding algorithm is an entropy encoding algorithm
used for lossless data compression in image processing and
information theory.
The simplest construction algorithm uses a priority queue
where the node with lowest probability is given highest
priority:
1. Create a leaf node for each symbol and add it to the
priority queue.
2. While there is more than one node in the queue:
A. Remove the two nodes of highest priority (lowest
probability) from queue:
B. Create a new internal node with these two nodes as
children and with probability equal to the sum of
the two node probabilities.
C. Add the new node to the queue.
3. The remaining node is the root node and the tree is
complete.
If the symbols are sorted by probability, there is a linear-
time (O(n)) method to create Huffman tree using two
queues, the first one containing the initial weights (along
with pointers to the associated leaves), and combined
weights being put in the back of the second queue. This
assures that the lowest weight is always kept at the front of
one of the two queues:
A. Starts with a many leaves as there are symbols.
B. Enqueue all leaf nodes into the first queue (by
probability in increasing order so that the last likely
item is in the head of the queue).
C. While there is more than one node in the queues:
1. Dequeue the two nodes with the lowest weight by
examine the front of both queues.
2. Create a new nodes, with the two just removed nodesas
children (either node can be either child) and thesum of
their weights as the new weight.
3. Enqueue the new node into the rear of the second
queue.
D. The remaining node is the root node; the tree has now
been generated.
5. Proposed System
In the following system design; the system displays the
associated profile information for the corresponding
fingerprint.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26600 | Volume – 3 | Issue – 5 | July - August 2019 Page 1210
A. Algorithm Flowchart
Figure3: System Flow Diagram
In Figure 3. depicts the general mechanism of the proposed
system The system has two main tasks, profile information
acquisition and fingerprint identification. In profile
information acquisition process; user can input the profile
information to the system. Also, user must input the
fingerprint image for the corresponding profile. This image
will be converted into Huffman code and store in database
for the identificationprocess.Inthefingerprintidentification
process; the user must input the fingerprint image to the
system. Then, the input fingerprint image is also converted
into Huffman codes stored in the database. When thesystem
identified the fingerprint, the system will display the
associated profile information for the corresponding
fingerprint.
6. Experimental Results
After the fingerprint image process is finished, user select
match image to start fingerprint recognition process to find
the associated person.
Figure4: .Fingerprint database
In the figure 4, , user can see the stored personal profile
information. "Add New" button represents the process for
adding new personal information.
Figure5: Form main window
According to the result table, "Open Image" button
represents the process to input the fingerprint for
recognition process. When user clicks the “Open Image”
button, the following Select Image window will appear to
choose input fingerprint. At this window, user can rotatethe
fingerprint to be in appropriate orientation. "OK" button
represent the process to finish fingerprint input process.
After the fingerprint image process is finished,usercanstart
fingerprint identification process to find the associated
person.
When the fingerprint recognition process is completed, the
result information will be displayed in the Result Table. The
associated person is the one who has the maximum
similarity ratio. In the example, user can be determined that
the associated person for the input fingerprint is “Mg Mg”.
7. CONCLUSION AND FUTURE WORK
The system uses Huffman coding Algorithm to compressthe
fingerprint image for storing it into the personal profile
information database to save space and gets response time
faster. Also, Huffman coding is used to match the input
fingerprint against with the stored fingerprints from the
personal profile information. Becausethesystem can reduce
space effectively, it is appropriate to store the large amount
of fingerprints. Fingerprints are encoded 8-bits grayscale
image. The system used C#.net programming language. The
system can extend other programming language.
ACKNOWLEDGMENT
The authors would like to thank the anonymous reviewers
and the editor for their valuable comments and suggestions,
which improvement the quality of this paper.
REFERENCES
[1] http://www.bioelectronix.com/what_is_biometrics.ht
ml
[2] Aburas, Rehiel, “Fingerprint Patterns Recognition
System Using Huffman Coding”, Proceedings of the
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26600 | Volume – 3 | Issue – 5 | July - August 2019 Page 1211
World Congress on Engineering 2008 Vol III WCE
2008, July 2 - 4, 2008, London, U.K.
[3] Kanbar, “Fingerprint Identification for Forensic Crime
Scene Investigation”,InternationalJournalof Computer
Science and Mobile Computing,Vol.5Issue.8,pg.60-65,
August- 2016.
[4] https://www.elprocus.com/fingerprint-identification/
[5] Randell, N., Biometric basics, PC Magazine, April 1999,
pp. 193-202.
[6] https://www.touchngoid.com/fingerprint-verification-
vs-fingerprint-identification/
[7] Kambli, Bhatia, “Comparison of different Fingerprint
Compression Techniques”, Signal & Image Processing:
An International Journal (SIPIJ) Vol.1, No.1, September
2010.
[8] McMahon, D. H. Johsonn, “A Hybrid Fingerprint
Matcher”, Recognition, Pattern Recognition, 2003.
[9] http:// www.wikipedia.com /wiki/ Fingerprint
identification system.
[10] National Institute of Standard Technology (NIST),
website:www.nist.gov/data/biomet.htm

More Related Content

What's hot

OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...csandit
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition inijaia
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionNaiyan Noor
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONIJCIRAS Journal
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...CSCJournals
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsSalam Shah
 
Handwritten Script Recognition
Handwritten Script RecognitionHandwritten Script Recognition
Handwritten Script Recognitionijsrd.com
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterIOSR Journals
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognitionBIJIT GHOSH
 
Kinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice ExtractionKinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice ExtractionIJCSIS Research Publications
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Chiranjeevi Adi
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting RecognitionBindu Karki
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabijcses
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHarshana Madusanka Jayamaha
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image ProcessingIRJET Journal
 

What's hot (20)

OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
OCR-THE 3 LAYERED APPROACH FOR CLASSIFICATION AND IDENTIFICATION OF TELUGU HA...
 
Handwritten character recognition in
Handwritten character recognition inHandwritten character recognition in
Handwritten character recognition in
 
Handwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer VersionHandwriting Recognition Using Deep Learning and Computer Version
Handwriting Recognition Using Deep Learning and Computer Version
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
Image Steganography Technique By Using Braille Method of Blind People (LSBrai...
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
Handwritten Script Recognition
Handwritten Script RecognitionHandwritten Script Recognition
Handwritten Script Recognition
 
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari CharacterArtificial Neural Network For Recognition Of Handwritten Devanagari Character
Artificial Neural Network For Recognition Of Handwritten Devanagari Character
 
Automatic handwriting recognition
Automatic handwriting recognitionAutomatic handwriting recognition
Automatic handwriting recognition
 
Kinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice ExtractionKinect Sensor based Indian Sign Language Detection with Voice Extraction
Kinect Sensor based Indian Sign Language Detection with Voice Extraction
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
Co4201605611
Co4201605611Co4201605611
Co4201605611
 
Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks Hand Written Character Recognition Using Neural Networks
Hand Written Character Recognition Using Neural Networks
 
Handwriting Recognition
Handwriting RecognitionHandwriting Recognition
Handwriting Recognition
 
Neural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlabNeural network based numerical digits recognization using nnt in matlab
Neural network based numerical digits recognization using nnt in matlab
 
Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
IRJET- Optical Character Recognition using Image Processing
IRJET-  	  Optical Character Recognition using Image ProcessingIRJET-  	  Optical Character Recognition using Image Processing
IRJET- Optical Character Recognition using Image Processing
 
370 374
370 374370 374
370 374
 

Similar to Identification of Persons by Fingerprint using Huffman Coding Algorithm

System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysisvivatechijri
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
 
Sign Language Detector Using Cloud
Sign Language Detector Using CloudSign Language Detector Using Cloud
Sign Language Detector Using Cloudijtsrd
 
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-FingerprintsA-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-FingerprintsArindam Paul
 
An efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using colAn efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using colIAEME Publication
 
Indian sign language recognition system
Indian sign language recognition systemIndian sign language recognition system
Indian sign language recognition systemIRJET Journal
 
Fingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A ReviewFingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A Reviewpaperpublications3
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace SystemAgbona Azeez
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGIJNSA Journal
 
Handwritten Digit Recognition
Handwritten Digit RecognitionHandwritten Digit Recognition
Handwritten Digit Recognitionijtsrd
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesIDES Editor
 
Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino unoVibhuThakur3
 
ANN Based Handwritten Signature Recognition System
ANN Based Handwritten Signature Recognition SystemANN Based Handwritten Signature Recognition System
ANN Based Handwritten Signature Recognition Systemijtsrd
 

Similar to Identification of Persons by Fingerprint using Huffman Coding Algorithm (20)

A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
L026070074
L026070074L026070074
L026070074
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
Sign Language Detector Using Cloud
Sign Language Detector Using CloudSign Language Detector Using Cloud
Sign Language Detector Using Cloud
 
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-FingerprintsA-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
A-Study-on-Binary-Number-of-Gender-Identification-Based-on-Fingerprints
 
An efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using colAn efficient hash based steganography technique for text message using col
An efficient hash based steganography technique for text message using col
 
Indian sign language recognition system
Indian sign language recognition systemIndian sign language recognition system
Indian sign language recognition system
 
Fingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A ReviewFingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A Review
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
 
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNINGENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
ENCRYPTION MODES IDENTIFICATION OF BLOCK CIPHERS BASED ON MACHINE LEARNING
 
Handwritten Digit Recognition
Handwritten Digit RecognitionHandwritten Digit Recognition
Handwritten Digit Recognition
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
 
Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino uno
 
G0333946
G0333946G0333946
G0333946
 
ANN Based Handwritten Signature Recognition System
ANN Based Handwritten Signature Recognition SystemANN Based Handwritten Signature Recognition System
ANN Based Handwritten Signature Recognition System
 
K017257578
K017257578K017257578
K017257578
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhleson0603
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSean M. Fox
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint23600690
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesPooky Knightsmith
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...Nguyen Thanh Tu Collection
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxLimon Prince
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 

Recently uploaded (20)

Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading RoomSternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
Sternal Fractures & Dislocations - EMGuidewire Radiology Reading Room
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 

Identification of Persons by Fingerprint using Huffman Coding Algorithm

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD26600 | Volume – 3 | Issue – 5 | July - August 2019 Page 1208 Identification of Persons by Fingerprint using Huffman Coding Algorithm Nwe Ni Kyaw1, Kyaw Kyaw Naing2, Myat Myo Nwe Wai3 1Assistant Lecturer, 2Lecturer, 3Professor 1,3Faculty of Computer Science, Myanmar Institute of Information Technology, Mandalay, Myanmar 2Physics Department, Shwebo University, Shwebo, Myanmar How to cite this paper: Nwe Ni Kyaw | Kyaw Kyaw Naing | Myat Myo Nwe Wai "Identification of Persons by Fingerprint using Huffman Coding Algorithm" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.1208-1211, https://doi.org/10.31142/ijtsrd26600 Copyright © 2019 by author(s) and International Journalof Trendin Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT Fingerprint system is one of the most common biometric features used for personal identification and verification. There are many techniques used for finding the features of fingerprint when it matches the other images of fingerprint. This system must input the fingerprint for the corresponding profile. It converts the binary image. This image will convert the Huffman code approach and to generate codes for input fingerprint. The system has the profile information along with their associated fingerprints. When the system identified the fingerprint, the system will display the associated profile information for the corresponding image. Huffman compression technique was the most accurate technique for compression of fingerprint image. KEYWORDS: Biometrics, Automated Fingerprint Identification System, Huffman Code 1. INTRODUCTION Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric data are separate and distinct from personal information. Biometric templates cannot be reverse-engineered to recreate personal information and they cannot be stolen and used to access personal information [1]. Fingerprint identification is the method of identification based on the different patterns of human fingers, which is actually unique among each person. It is the most popular way of acquiring details of any person and is the easiest and convenient way of identifyingaperson [4]. These unique patterns of lines can either be in a loop, whorl, or arch pattern [5]. In figure 1, shows the fingerprint patterns. Finger patterns can be divided into three groups as show below figure 2. Arches: Ridges enter and exit on same sides. Loops: Ridges enter on one side and exit on different side. Whorls: It consists of circles or mixture of patterntypes [4]. Figure1: Fingerprint pattern Figure 2: (a) Plain Arch (b) Loops (c) Whorls The two major applications of fingerprint recognition are Fingerprint verification and fingerprint identification. Fingerprint Verification; also known one-to-one fingerprint matching or Fingerprint Authentication is the process of confirming that a user is who they claim to be. In fingerprint Verification a user usually provides some kind of identification, for example a user ID or username or a card before placing his finger on the fingerprint scanner. It takes the user ID and tries to match the new fingerprint with the fingerprints associated with this user ID. Fingerprint Identification, also known as one-to-many matching fingerprint matching, is the processof comparinga fingerprint against all the fingerprints in the database to see if a match is found. Fingerprint identification system is a part of a project to design and implement a national standard for collecting, encoding, storing and retrieving digitized fingerprints images. IJTSRD26600
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26600 | Volume – 3 | Issue – 5 | July - August 2019 Page 1209 2. RELATED WORKS Aburas et al. (2008) has been presented the fingerprint patterns recognition system by using Huffman Coding algorithm. Firstly, the fingerprint image is fed in the system. Secondly, it converts the binary image as the pre-processing stage. And then, the binary image is compressed by using Huffman coding approach. The obtained results are considerably promising since very low FAR i.e. 0.733%, FRR i.e. 2.6% and high accuracy i.e. approximately 97%. The weakness of the system comes from the point of different captured environments for the images [2]. Kanbar et al. (2016) proposed the fingerprint identification and verification system for crime scene investigation. the paper presents an overview of thedifferentstepsinvolved in the development of fingerprint based person identification and verification using minutiae based system [3]. Kambli et al. (2010) presented for compressing the fingerprint images by comparing thedifferentmethods. This research used 50 images of 512 x 512 bmp format. The result showed Modified SPIHT offers better compression than basic SPIHT and JPEG [7]. McMahon et al. (2003) published HuffmanCodingAlgorithm for implementation of Character Recognition System. They used this algorithm to produce approximate character. Alternatively, Huffman Coding Algorithm is used to implement current fingerprint identification system [8]. 3. Automated Fingerprint Identification System Automated Fingerprint Identification Systems (AFIS) arc used inlawcnforccmcnt and security applications to identify individuals based on their fingerprints. A pattern matching algorithm is typically at the heart of these systems. Pattern matching is used to compare two different fingerprint images to determine ifthey represent fingerprint impressions from the same individual. 4. Huffman Code In computer scienceand informationtheory, Huffman coding is an entropy encoding algorithm used for lossless data compression. The term refers to the use of a variable-length code table for encoding a source symbol (such as a character in a file) where the variable-length code table is derived in a particular way based on the estimated probability of occurrence for each possible value of the source symbol [9]. The technique works by creating a binary tree of nodes. These can be stored in a regular array, the size of which depends on the number of symbols, n. A node can be either a leaf node or an internal node. Initially, all nodes are leaf nodes, which contain the symbol itself, the weight (frequency of appearance) of the symbol and optionally, a link to a parent node which makes iteasy to read the code (in reverse) starting from a leaf node. Internal nodes contain symbol weight, links to two child nodes and the optional link to a parent node. As a common convention, bit '0' represents following the left child and bit '1' represents following the right child. A finished treehasup to n leaf nodes and (n – 1) internal nodes. A Huffman tree that omits unused symbols is produced the most optimal code lengths [10].Huffman coding uses a specific method for choosing the representation for each symbol. The process essentiallybeginswiththeleaf nodes containing the probabilities of the symbol they represent, and then a new node whose children are the 2 nodes with smallest probability is created, suchthatthenewnode'sprobabilityis equal to the sum of the children's probability. With the previous 2 nodes merged into one node (thus not considering them anymore), and with the new node being now considered, the procedure is repeated until only one node remains, the Huffman tree. Fingerprintsare encoded 8- bits grayscale images. Huffman coding algorithm is an entropy encoding algorithm used for lossless data compression in image processing and information theory. The simplest construction algorithm uses a priority queue where the node with lowest probability is given highest priority: 1. Create a leaf node for each symbol and add it to the priority queue. 2. While there is more than one node in the queue: A. Remove the two nodes of highest priority (lowest probability) from queue: B. Create a new internal node with these two nodes as children and with probability equal to the sum of the two node probabilities. C. Add the new node to the queue. 3. The remaining node is the root node and the tree is complete. If the symbols are sorted by probability, there is a linear- time (O(n)) method to create Huffman tree using two queues, the first one containing the initial weights (along with pointers to the associated leaves), and combined weights being put in the back of the second queue. This assures that the lowest weight is always kept at the front of one of the two queues: A. Starts with a many leaves as there are symbols. B. Enqueue all leaf nodes into the first queue (by probability in increasing order so that the last likely item is in the head of the queue). C. While there is more than one node in the queues: 1. Dequeue the two nodes with the lowest weight by examine the front of both queues. 2. Create a new nodes, with the two just removed nodesas children (either node can be either child) and thesum of their weights as the new weight. 3. Enqueue the new node into the rear of the second queue. D. The remaining node is the root node; the tree has now been generated. 5. Proposed System In the following system design; the system displays the associated profile information for the corresponding fingerprint.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26600 | Volume – 3 | Issue – 5 | July - August 2019 Page 1210 A. Algorithm Flowchart Figure3: System Flow Diagram In Figure 3. depicts the general mechanism of the proposed system The system has two main tasks, profile information acquisition and fingerprint identification. In profile information acquisition process; user can input the profile information to the system. Also, user must input the fingerprint image for the corresponding profile. This image will be converted into Huffman code and store in database for the identificationprocess.Inthefingerprintidentification process; the user must input the fingerprint image to the system. Then, the input fingerprint image is also converted into Huffman codes stored in the database. When thesystem identified the fingerprint, the system will display the associated profile information for the corresponding fingerprint. 6. Experimental Results After the fingerprint image process is finished, user select match image to start fingerprint recognition process to find the associated person. Figure4: .Fingerprint database In the figure 4, , user can see the stored personal profile information. "Add New" button represents the process for adding new personal information. Figure5: Form main window According to the result table, "Open Image" button represents the process to input the fingerprint for recognition process. When user clicks the “Open Image” button, the following Select Image window will appear to choose input fingerprint. At this window, user can rotatethe fingerprint to be in appropriate orientation. "OK" button represent the process to finish fingerprint input process. After the fingerprint image process is finished,usercanstart fingerprint identification process to find the associated person. When the fingerprint recognition process is completed, the result information will be displayed in the Result Table. The associated person is the one who has the maximum similarity ratio. In the example, user can be determined that the associated person for the input fingerprint is “Mg Mg”. 7. CONCLUSION AND FUTURE WORK The system uses Huffman coding Algorithm to compressthe fingerprint image for storing it into the personal profile information database to save space and gets response time faster. Also, Huffman coding is used to match the input fingerprint against with the stored fingerprints from the personal profile information. Becausethesystem can reduce space effectively, it is appropriate to store the large amount of fingerprints. Fingerprints are encoded 8-bits grayscale image. The system used C#.net programming language. The system can extend other programming language. ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the editor for their valuable comments and suggestions, which improvement the quality of this paper. REFERENCES [1] http://www.bioelectronix.com/what_is_biometrics.ht ml [2] Aburas, Rehiel, “Fingerprint Patterns Recognition System Using Huffman Coding”, Proceedings of the
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26600 | Volume – 3 | Issue – 5 | July - August 2019 Page 1211 World Congress on Engineering 2008 Vol III WCE 2008, July 2 - 4, 2008, London, U.K. [3] Kanbar, “Fingerprint Identification for Forensic Crime Scene Investigation”,InternationalJournalof Computer Science and Mobile Computing,Vol.5Issue.8,pg.60-65, August- 2016. [4] https://www.elprocus.com/fingerprint-identification/ [5] Randell, N., Biometric basics, PC Magazine, April 1999, pp. 193-202. [6] https://www.touchngoid.com/fingerprint-verification- vs-fingerprint-identification/ [7] Kambli, Bhatia, “Comparison of different Fingerprint Compression Techniques”, Signal & Image Processing: An International Journal (SIPIJ) Vol.1, No.1, September 2010. [8] McMahon, D. H. Johsonn, “A Hybrid Fingerprint Matcher”, Recognition, Pattern Recognition, 2003. [9] http:// www.wikipedia.com /wiki/ Fingerprint identification system. [10] National Institute of Standard Technology (NIST), website:www.nist.gov/data/biomet.htm