SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1892
A Comparative Study of Fingerprint Matching Algorithms
Neelima Kanjan 1, Kajal Patil 2 ,Sonal Ranaware 3, Pratiksha Sarokte4
1,2,3,4 Department of Computer Engineering ,Pimpri Chinchwad College of Engineering Pune,India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In today’s computerized world, it has become
more important to authenticate people in a secure way.
Thereforebiometricauthenticationmethodsprovidesaunique
way to authenticate people. A secure and confidential
biometric authentication technique is the utilization of
fingerprints .In recent years, fingerprintrecognitiontechnique
is the dominant technology in the biometric sector. A number
of fingerprint recognition methods have beenusedtoperform
fingerprint matching. This paper discusses the existing
algorithms, limitations, and future research directionsineach
of the recognition phase. The main objective of this paper is to
review the extensive research work that has been done over
the past few years and discuss thevarioustechniquesproposed
for fingerprint matching.
Key Words: Fingerprint matching, Minutiae, Gabor ,
clustering, cryptography.
1. INTRODUCTION
Fingerprint-based identificationisoneofthemostimportant
biometric technologies which have drawn a substantial
amount of attention recently. Fingerprintsarebelievedto be
unique across individuals and across fingers of same
individual. Even identical twins having similar DNA, are
believed to havedifferentfingerprints.Conventional security
systems used either knowledge based methods (passwords
or PIN), and token-based methods (passport, driver license,
ID card) and were prone to fraud because PIN numbers
could be forgotten or hacked and the tokens could be lost,
duplicated or stolen. To address theneedfor robust,reliable,
and fool-proof personal identification, authentication
systems will necessarily requirea biometric component.The
word “biometrics” comes from the Greek language and is
derived from the words bio (life) and metric (to measure).
Biometric systems use a person’s physical characteristics
(like fingerprints, irises or veins),or behavioural
characteristics (like voice, handwriting or typing rhythm) to
determine their identity or to confirmthattheyarewhothey
claim to be. The most widely used biometric technology is
the fingerprint system. In fact, fingerprint can be used to
replace the PIN or passwords in most security aspect.
Fingerprints can be used instead of PIN in the smart card
applications, passwords on workstations, etc. Many
researches about fingerprint technology are undergoing all
around the world. Thereare twotypesoffingerprintsystems
[9]: fingerprint verification and identification.
The verification system is a one-to-one matching
and is based on the comparison of two groups of minutiae,
respectively corresponding to two fingerstobecompared.It
is basically identity verification since you have to first input
some information about yourself then the information is
verified using your fingerprint. A fingerprint the pattern of
ridges and valleys on the surface of fingertip .Fingerprint
recognition can be categorized into identification and
verification. Fingerprint identification is the process of
determining which registered individual provides a given
fingerprint. Fingerprint verification,ontheotherhand,is the
process of accepting and rejecting the identity claim of a
person using his fingerprint.
Fingerprint matching using a Gabor filter [6] is
another technique which uses fingerprint matching using a
16 Gabor filter from the template which results in designing
a new method for comparing two ridge patterns map of
image using adaptive filter method. Minutiae based
fingerprint matching algorithm [3] is useful in certain
application for privacy protection. Previously, some work
has been carried out to reduce the FRR (False Rejection
Rate) by using certain techniques. Some of the techniques
use the minutiae position of fingerprint images like Gabor
filter technique [6] in which core & ridge pattern is used. All
technologies of fingerprint recognition, identification and
verification, minutiae extraction based and spectral features
based, each has its own advantages and disadvantagesandit
may requires different treatments and techniques. The
choice of which technologies to use is application specific.
2. FINGERPRINT MATCHING
The existing fingerprint recognition systems uses the
approaches based on the local and global feature
representations of the fingerprint images such as minutiae,
ridge shape, texture information etc.
2.1 Ratio of Relational Distance Matching [1]
This algorithm works in two phases 1. Finding
common unique points , 2. Matching phase .
In first phase , two images with N1 and N2 identified
minutiae points respectively, this phase output is Mwhichis
a common minutiae points from N1 and N2 , M is N1
intersection N2 i.e M= ( ) where N1 is minutiae
points of image1 and N2 is minutiae point of image2. After
this new term called M(i)-tuples is introduced which
represents information about a minutiae that can be
identified uniquely among the set of all minutiae . There are
2 images are consider as a base image (BM) and input image
(IM). Either of them can be BM or IM and vice versa.Step 1to
find M(i )-tuples is for each i = 1 to N1 , 5 nearest minutiae
points are found . This is calculated by finding euclidean
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1893
distance from 'i'th minutiae point to all the other minutiae
points in set N1 (BM) and noting down 5 euclidean distance
with respect to euclidean distance. Step 2 if there are 5
points then calculate euclidean distance by subtracting the
iN from i . then calculate ratio between them according to
the formula (a – b): (a – c) = Max {(a-b), (a-c)} / Min {(a-b),
(a-c)}. same way calculate M(i)-tuples for input image (IM).
All this ratios are compared to get an candidate common list
which is done in phase 2 matchingphaseconfirmedcommon
points are identified by drawingtreelikestructureand listed
them , this algorithm results a tree whose vertices features
are in Confirmed Common Points List which contains
common minutiae points in image 1 and image 2 . Now final
results is given if C(N) is the number of points in Confirmed
Common Points List and N is maximum ( Number of points
in base and input images ) , then C(N)>= (N/2) if this is true
then positive score of both images are same is given else
negative score is displayed.
2.2 K-Nearest Neighbor Minutiae Clustering [2]
Mainly two considerations are lie in this algorithm
which are as follows :
1.It uses graph as fingerprint data structure.
2. Fingerprint search is optimized by clustering fingerprint
graph feature.
As graph is set of edges and vertices hereverticesrepresents
feature of fingerprint and edges represents minutiae so
clustering of graph data is done by K-NN clustering
algorithm based on Euclidean distance between the vertices
of the graph .It is the simplest clustering algorithm.
The nodes are classified by votes of its neighbors ,
each node is assigned to the class that is closest among its K
nearest neighbor’s , where K is integer value. If K=1 then
node is assigned to the class of its nearest neighbor.
Following steps are involved for K-NN clustering :
1. Each node of the graph which is in the feature set has a
class label , Class = c1,c2,...cn.
2. Calculating the Euclidean distance matrix for finding K-
nearest neighbor’s where K is the number of neighbors.
3. Most common class labels within the set aredetermineby
analyzing K-closest nodes.
4. The most common class label is assignedtothe nodebeing
analyzed.
After this clustering of graph nodes the fingerprint
matching is performed. To identify the fingerprint it reads
each fingerprint clustered graph templates from database
and compares it with clustered input fingerprint graph
templates. If graph templates are matched then the total
graph isomorphism is applied. This continues till the input
fingerprint is matched with fingerprint stored in database
otherwise no match found returns.
2.3 Minutiae Extraction And Matching Algorithm
The basic method of minutiae extraction is divided in to
three part Pre-processing, Minutiae Extraction, Post
processing .Fig. 1.shows the Fingerprint recognitionprocess
using minutiae based algorithm .
Fig.1.Fingerprint recognition process
This method divides three basic steps in to 7 modules which
are given below [10].
Step 1: Input-
In this step we take five fingerprints of personas input and
process them.
Step 2: Binarization:
This transform the 8-bit Gray fingerprint image to a 1-bit
image with 0- value for ridges and 1-value for furrows.
Step 3: Thinning:
Ridge thinning is to eliminate the redundant pixels of ridges
till the ridges are just one pixel wide. [7] Uses an iterative,
parallel thinning algorithm.
1) To get a thinned image we find the location of middle
black pixel at each stage of continuation of the curve.
2) In each scan of the full fingerprint image, the algorithm
marks down redundant pixels in each small image window
(3x3).
3) And finally removes all those marked pixels after several
scans.
Step 4: Minutiae Connect:
This operation takes thinned image as input and produces
refined skeleton image by converting small straight lines to
curve to maximum possible extant.
Step 5: Minutiae Margin:
This increases the margin of endpointsbyonepixel ofcurves
of length at least three pixels.
Step 6: Minutiae point Extraction:
For extracting minutiae point we compute the number of
one- value of every 3x3 window:
 If the centroid is 1 and has only 1 one valued
neighbor, then the central pixel is a termination.
 If the central is 1 and has 3 one-value neighbours,
then the central pixel is a bifurcation.
sensor Minutiae
extractor
Minutiae
matcher
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1894
 If the central is 1 and has 2 one-value neighbours,
then the central pixel is a usual pixel.
Step 7: False Minutiae Removal
Procedure for removing false minutiae is given below [12]:
 If the distance between one bifurcation and one
termination is less than D and the two minutiae are
in the same ridge. Remove both of them. Where D is
the average inter-ridge width representing the
average distance between two parallel neighboring
ridges.
 If the distance between two bifurcations islessthan
D and they are in the same ridge, remove the two
bifurcations.
 If two terminations are within a distance D and
their directions are coincident with a small angle
variation. And they suffice the condition that now
any other termination is located between the two
terminations. Then the two terminations are
regarded as false minutia derived from a broken
ridge and are removed.
 If two terminations are located in a short ridgewith
length less than D, remove the two terminations.
 If a branch point has at least two neighboring
branch points, which are each no further away than
maximum distance threshold value and these
branch points are closely connected on common
line segment than remove the branch points. And
last we do the minutiae matching. Two fingerprint
images to be matched, any one minutia is chosen
from each image, and then the similarity of the two
ridges associated with the two referenced minutia
points is calculated. If the similarity is larger than a
threshold, each set of minutiae to a new
coordination system is transformed,whoseoriginis
at the referenced point and whose x-axis is
coincident with the direction of the referenced
point. After we get two sets of transformed minutia
points, we use the elastic match algorithm to count
the matched minutia pairs by assuming two
minutiae having nearly the same position and
direction are identical.
2.4 Threshold Cryptography Technique [5]
2.5 Fingerprint Matching using Gabor Filter[11]
The different processing steps from pre-processing to
matching as the final step of the fingerprint authentication
are
 Quantized co-sinusoidal triplets
 Discrete Fourier transform
 Gabor filters
The first step is the normalization, which results in a
better contrast of the fingerprint image. After that, the
fingerprint is segmented, which crops areas of the recorded
image, which do not contain anyrelevantinformation. Thisis
the end of the pre-processing. The last pre-processing step
usually consists of a fingerprintenhancementasdescribedin
[7]. However, tests have shown that the subsequent
reference point detection works on non-enhanced
fingerprint images as well as on enhanced. Therefore, any
further enhancement is not required for the subsequent
processing steps. After that, the fingerprint image is filtered
using a Gabor filter. Now, it is possible to create the feature
map, which is used as the template.Thistemplateismatched
in the subsequent matching step with templates of other
fingerprints.
The result of the matching is the matching score, which
represents how good two fingerprints resemble each other.
Most methods for fingerprint identification use minutiae as
the fingerprint features. For small scale fingerprint
recognition system, it would not be efficient to undergo all
the pre-processing steps (edge detection, smoothing,
thinning ), instead Gabor filters will be used to extract
features directly from the gray level fingerprint. No pre-
processing stage is needed before extractingthefeatures [7].
1) Image Acquisition
A number of methods are used to acquire
fingerprints. Among them, the inked impression method
remains the most popular one. Inkless fingerprint scanners
are also present eliminating the intermediate digitization
process [11]. Fingerprint quality is very important since it
affects directly the minutiae extractionalgorithm.Twotypes
of degradation usually affect fingerprint images:1)theridge
lines are not strictly continuous since they sometimes
include small breaks (gaps); 2) parallel ridgelines are not
always well separated due to the presence of cluttering
noise. The resolution of the scanned fingerprints must be
500 dpi while the size is 300 x 300.
In Threshold cryptographic technique, fingerprint
image is divided into two or more shares using visual
cryptographic technique followed by compression. Alsoone
share of fingerprint is stored in server & remaining shares
given to user. The template can only be reconstructed by
super-imposing shares. During the authentication phasethe
T share are superimposed with the ID card shares available
with the user & it gets authenticated. The major concern of
this technique is reducing the error rate. The advantage of
the technique is the system is secured from the attack from
server side. The disadvantage of this technique is there is no
privacy Combined minutiae template for enrolment of
database. The server side attacks are removed by using this
techniques.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1895
2) Feature Extractor
Gabor filter based features have been successfully
and widely applied to face recognition, pattern recognition
and fingerprint enhancement. The familyof2-DGaborfilters
was originally presented by Daugman (1980) as a
framework for understanding the orientation and spatial
frequency selectivity properties of the filter. The fingerprint
print image will be scanned by a 8x8 window; for each block
the magnitude of the Gabor filter is extracted with different
values of m (m = 4 and m = 8). The features extracted (new
reduced size image) will be used as theinputtotheclassifier.
3) Classifier
The classifier is based on the k-nearest
neighborhood algorithmKNN.“Training”oftheKNN consists
simply of collecting k images per individual as the training
set. The remaining images consists the testing set. The
classifier finds the k points in the training set that are the
closest to x (relative to the Euclidean distance) and assignsx
the label shared by the majorityofthesek nearestneighbors.
Note that k is a parameter of the classifier; it is typically set
to an odd value in order to prevent ties. The last phase is the
verification phase where the testing fingerprint image [10]:
1) Is inputted to the system
2) Magnitude features are extracted
3) Perform the KNN algorithm
4) Identify the person
3. COMPARATIVE ANALYSIS
Table 1 shows the comparative analysis of various matching
techniques.
Table -1: Comparative Analysis of Techniques.
Techniques Objective Limitations
Minutiae Based
Algorithm[3]
To design an
algorithm with
privacy & security
purpose.
Not suitable for
low quality
template .
Threshold
Cryptography
Technique [5]
To develop a
technique by
dividing it into
small shares
Compression is
required for
reconstruction of
fingerprint image
Fingerprint
Matching using
Gabor Filter[6]
To develop
technique to
increase genuine
acceptance rate.
More number
gabor filter used.
K-Nearest
Neighbour
Minutiae
Clustering [2]
To identify the
fingerprint it
reads each
fingerprint
clustered graph
templates from
database
This technique
increase the
processing time .
4. CONCLUSIONS
A large number of fingerprint matching techniques for the
purpose of authentication proposed in the literature have
been reviewed. This paper provides a broad study of the
various algorithms used in fingerprint matching process
based on the various fingerprint representations and
features extracted from the fingerprints images. A
performance comparison table of various techniques
proposed earlier for fingerprint matching, evaluated on the
various parameters explainedinpaperisalsopresented. The
benefits and limitations of these approaches have been
highlighted. Mostly accepted finger scan technologyisbased
on minutiae. Minutiae based techniques produce the
fingerprint by its local features, like termination and
bifurcation when minutiae points match between two
fingerprints, so fingerprints are match .Most of techniques
has high FRR rate which is not suitable for development of
secure application. Hence, secured application with
fingerprint authentication using a minutiae basedalgorithm
will create a impact on other techniques with its security,
privacy & low FRR rate.
ACKNOWLEDGEMENT
We would like to show our gratitude to Mr. Atul Pawar ,
Professor PCCOE who guided us throughoutthe preparation
of the paper and gave us relevant concept to materialize the
paper.
REFERENCES
[1] AbinandhanChandrasekaran,Dr.BhavaniThuraisingham,
“Fingerprint Matching AlgorithmBasedonTreeComparison
using Ratios of Relational Distances”Second International
Conference on Availability, Reliability and Security
(ARES'07), IEEE Computer society 2007.
[2] Vaishali Pawar ,Mukesh Zaveri “Graph Based K-Nearest
Neighbor Minutiae Clustering for Fingerprint Recognition”
10th International Conference on Natural Computation ,
IEEE 2014.
[3] Sheng Li and Alex C. Kot "Fingerprint Combination for
Privacy Protection," IEEE Transactions on Information
Forensics and Security, February 2013.
[4] Chandra Prakash Singh, Susheel Jain, Anurag Jain “
Literature Survey On Fingerprint Recognition Using Level
3 Feature Extraction Method ” IJECE, Volume 3 Issue 1
January, 2014.
[5] Rajeswari Mukeshi & V.J.Subashini, "Fingerprint Based
Authentication System Using Threshold Visual
Cryptographic Technique," IEEE-International Conference
On Advances In Engineering, Science And Management,
March 2012 .
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1896
[6] Muhammad Umer Munir and Dr. Muhammad Younas
Javed, "Fingerprint Matching using Gabor Filters," National
Conference on Emerging Technologies, 2004.
[7] Munir, M. U., Javed, M. Y., ''Fingerprint Matching using
Gabor Filters,'' 2005.
[8] Manvjeet Kaur, MukhwinderSingh,AkshayGirdhar,and
Parvinder S. Sandhu, “Fingerprint Verification System using
Minutiae Extraction Technique”, World Academy of Science,
Engineering and Technology 46 2008.
[9] NTSC Subcommittee on Biometrics, ''Fingerprint
Recognition'', 2000.
[10] Roli Bansal, Priti Sehgal and Punam Bedi “Minutiae
Extraction from Fingerprint Images - a Review” IJCSI
International Journal of Computer Science Issues, Vol. 8,
Issue 5, No 3, September 2011.
[11] Lin Hong, Yifei Wang, and Anil Jain, “Fingerprint Image
Enhancement: Algorithm andPerformanceEvaluation”IEEE
Transactions on Pattern Analysis and Machine Intelligence,
20(8), August 1998.
[12] Maltoni D., Maio D., Jain A.K. and prabhakar S.,
“Handbook of Fingerprint Recognition,” Second Edition,
Springer , 2009.
[13] Sun Bei, Luo Wusheng, Du Liebo, Lu Qin , “A fingerprint
identification algorithm based on local minutiae topological
property” , IEEE First International Conference on Data
Science in Cyberspace , 2016 .
[14] Gianmarco Baldini , Gary Steri , “A surveyoftechniques
for the identification of mobile phones using the physical
fingerprints of the built-in components”, IEEE
Communications Surveys Tutorials , 2017
[15] Renuka Hawanna , Urmila Pawar , Pooja Sashte ,
“Android based application for an attendance monitoring” ,
International Engineering Research Journal (IERJ)Volume1
Issue 11 Page 1649-1652, 2016 .
[16] Hariyanto , Sunny Arief Sudiro , Saepul Lukman ,
“Minutiae Matching Algorithm using Arti_cial Neural
Network for Fingerprint Recognition”,3rd International
Conference on Arti_cial Intelligence, Modelling and
Simulation , 2015

More Related Content

What's hot

Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507IJRAT
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint ijasuc
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeIJERA Editor
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...idescitation
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...IOSR Journals
 
Real time implementation of object tracking through
Real time implementation of object tracking throughReal time implementation of object tracking through
Real time implementation of object tracking througheSAT Publishing House
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419IJRAT
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET Journal
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET Journal
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edgeijma
 

What's hot (19)

Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
1304.2109
1304.21091304.2109
1304.2109
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
Offline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of ChequeOffline Signiture and Numeral Recognition in Context of Cheque
Offline Signiture and Numeral Recognition in Context of Cheque
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
 
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
 
Real time implementation of object tracking through
Real time implementation of object tracking throughReal time implementation of object tracking through
Real time implementation of object tracking through
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...IRJET-  	  Image based Approach for Indian Fake Note Detection by Dark Channe...
IRJET- Image based Approach for Indian Fake Note Detection by Dark Channe...
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency Recognition
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edge
 

Similar to A Comparative Study of Fingerprint Matching Algorithms

Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7IRJET Journal
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesIRJET Journal
 
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSIRJET Journal
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification systemeSAT Journals
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING cscpconf
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
 
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVESSURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVESZac Darcy
 
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...IRJET Journal
 
Study of person identification using palmprint
Study of person identification using palmprintStudy of person identification using palmprint
Study of person identification using palmprinteSAT Publishing House
 
IRJET- Universal Currency Identifier
IRJET-  	  Universal Currency IdentifierIRJET-  	  Universal Currency Identifier
IRJET- Universal Currency IdentifierIRJET Journal
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
 
Real Estate Investment Advising Using Machine Learning
Real Estate Investment Advising Using Machine LearningReal Estate Investment Advising Using Machine Learning
Real Estate Investment Advising Using Machine LearningIRJET Journal
 

Similar to A Comparative Study of Fingerprint Matching Algorithms (20)

1834 1840
1834 18401834 1840
1834 1840
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
 
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matching
 
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVESSURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
SURVEY ON POLYGONAL APPROXIMATION TECHNIQUES FOR DIGITAL PLANAR CURVES
 
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
 
Study of person identification using palmprint
Study of person identification using palmprintStudy of person identification using palmprint
Study of person identification using palmprint
 
IRJET- Universal Currency Identifier
IRJET-  	  Universal Currency IdentifierIRJET-  	  Universal Currency Identifier
IRJET- Universal Currency Identifier
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Real Estate Investment Advising Using Machine Learning
Real Estate Investment Advising Using Machine LearningReal Estate Investment Advising Using Machine Learning
Real Estate Investment Advising Using Machine Learning
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

A Comparative Study of Fingerprint Matching Algorithms

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1892 A Comparative Study of Fingerprint Matching Algorithms Neelima Kanjan 1, Kajal Patil 2 ,Sonal Ranaware 3, Pratiksha Sarokte4 1,2,3,4 Department of Computer Engineering ,Pimpri Chinchwad College of Engineering Pune,India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In today’s computerized world, it has become more important to authenticate people in a secure way. Thereforebiometricauthenticationmethodsprovidesaunique way to authenticate people. A secure and confidential biometric authentication technique is the utilization of fingerprints .In recent years, fingerprintrecognitiontechnique is the dominant technology in the biometric sector. A number of fingerprint recognition methods have beenusedtoperform fingerprint matching. This paper discusses the existing algorithms, limitations, and future research directionsineach of the recognition phase. The main objective of this paper is to review the extensive research work that has been done over the past few years and discuss thevarioustechniquesproposed for fingerprint matching. Key Words: Fingerprint matching, Minutiae, Gabor , clustering, cryptography. 1. INTRODUCTION Fingerprint-based identificationisoneofthemostimportant biometric technologies which have drawn a substantial amount of attention recently. Fingerprintsarebelievedto be unique across individuals and across fingers of same individual. Even identical twins having similar DNA, are believed to havedifferentfingerprints.Conventional security systems used either knowledge based methods (passwords or PIN), and token-based methods (passport, driver license, ID card) and were prone to fraud because PIN numbers could be forgotten or hacked and the tokens could be lost, duplicated or stolen. To address theneedfor robust,reliable, and fool-proof personal identification, authentication systems will necessarily requirea biometric component.The word “biometrics” comes from the Greek language and is derived from the words bio (life) and metric (to measure). Biometric systems use a person’s physical characteristics (like fingerprints, irises or veins),or behavioural characteristics (like voice, handwriting or typing rhythm) to determine their identity or to confirmthattheyarewhothey claim to be. The most widely used biometric technology is the fingerprint system. In fact, fingerprint can be used to replace the PIN or passwords in most security aspect. Fingerprints can be used instead of PIN in the smart card applications, passwords on workstations, etc. Many researches about fingerprint technology are undergoing all around the world. Thereare twotypesoffingerprintsystems [9]: fingerprint verification and identification. The verification system is a one-to-one matching and is based on the comparison of two groups of minutiae, respectively corresponding to two fingerstobecompared.It is basically identity verification since you have to first input some information about yourself then the information is verified using your fingerprint. A fingerprint the pattern of ridges and valleys on the surface of fingertip .Fingerprint recognition can be categorized into identification and verification. Fingerprint identification is the process of determining which registered individual provides a given fingerprint. Fingerprint verification,ontheotherhand,is the process of accepting and rejecting the identity claim of a person using his fingerprint. Fingerprint matching using a Gabor filter [6] is another technique which uses fingerprint matching using a 16 Gabor filter from the template which results in designing a new method for comparing two ridge patterns map of image using adaptive filter method. Minutiae based fingerprint matching algorithm [3] is useful in certain application for privacy protection. Previously, some work has been carried out to reduce the FRR (False Rejection Rate) by using certain techniques. Some of the techniques use the minutiae position of fingerprint images like Gabor filter technique [6] in which core & ridge pattern is used. All technologies of fingerprint recognition, identification and verification, minutiae extraction based and spectral features based, each has its own advantages and disadvantagesandit may requires different treatments and techniques. The choice of which technologies to use is application specific. 2. FINGERPRINT MATCHING The existing fingerprint recognition systems uses the approaches based on the local and global feature representations of the fingerprint images such as minutiae, ridge shape, texture information etc. 2.1 Ratio of Relational Distance Matching [1] This algorithm works in two phases 1. Finding common unique points , 2. Matching phase . In first phase , two images with N1 and N2 identified minutiae points respectively, this phase output is Mwhichis a common minutiae points from N1 and N2 , M is N1 intersection N2 i.e M= ( ) where N1 is minutiae points of image1 and N2 is minutiae point of image2. After this new term called M(i)-tuples is introduced which represents information about a minutiae that can be identified uniquely among the set of all minutiae . There are 2 images are consider as a base image (BM) and input image (IM). Either of them can be BM or IM and vice versa.Step 1to find M(i )-tuples is for each i = 1 to N1 , 5 nearest minutiae points are found . This is calculated by finding euclidean
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1893 distance from 'i'th minutiae point to all the other minutiae points in set N1 (BM) and noting down 5 euclidean distance with respect to euclidean distance. Step 2 if there are 5 points then calculate euclidean distance by subtracting the iN from i . then calculate ratio between them according to the formula (a – b): (a – c) = Max {(a-b), (a-c)} / Min {(a-b), (a-c)}. same way calculate M(i)-tuples for input image (IM). All this ratios are compared to get an candidate common list which is done in phase 2 matchingphaseconfirmedcommon points are identified by drawingtreelikestructureand listed them , this algorithm results a tree whose vertices features are in Confirmed Common Points List which contains common minutiae points in image 1 and image 2 . Now final results is given if C(N) is the number of points in Confirmed Common Points List and N is maximum ( Number of points in base and input images ) , then C(N)>= (N/2) if this is true then positive score of both images are same is given else negative score is displayed. 2.2 K-Nearest Neighbor Minutiae Clustering [2] Mainly two considerations are lie in this algorithm which are as follows : 1.It uses graph as fingerprint data structure. 2. Fingerprint search is optimized by clustering fingerprint graph feature. As graph is set of edges and vertices hereverticesrepresents feature of fingerprint and edges represents minutiae so clustering of graph data is done by K-NN clustering algorithm based on Euclidean distance between the vertices of the graph .It is the simplest clustering algorithm. The nodes are classified by votes of its neighbors , each node is assigned to the class that is closest among its K nearest neighbor’s , where K is integer value. If K=1 then node is assigned to the class of its nearest neighbor. Following steps are involved for K-NN clustering : 1. Each node of the graph which is in the feature set has a class label , Class = c1,c2,...cn. 2. Calculating the Euclidean distance matrix for finding K- nearest neighbor’s where K is the number of neighbors. 3. Most common class labels within the set aredetermineby analyzing K-closest nodes. 4. The most common class label is assignedtothe nodebeing analyzed. After this clustering of graph nodes the fingerprint matching is performed. To identify the fingerprint it reads each fingerprint clustered graph templates from database and compares it with clustered input fingerprint graph templates. If graph templates are matched then the total graph isomorphism is applied. This continues till the input fingerprint is matched with fingerprint stored in database otherwise no match found returns. 2.3 Minutiae Extraction And Matching Algorithm The basic method of minutiae extraction is divided in to three part Pre-processing, Minutiae Extraction, Post processing .Fig. 1.shows the Fingerprint recognitionprocess using minutiae based algorithm . Fig.1.Fingerprint recognition process This method divides three basic steps in to 7 modules which are given below [10]. Step 1: Input- In this step we take five fingerprints of personas input and process them. Step 2: Binarization: This transform the 8-bit Gray fingerprint image to a 1-bit image with 0- value for ridges and 1-value for furrows. Step 3: Thinning: Ridge thinning is to eliminate the redundant pixels of ridges till the ridges are just one pixel wide. [7] Uses an iterative, parallel thinning algorithm. 1) To get a thinned image we find the location of middle black pixel at each stage of continuation of the curve. 2) In each scan of the full fingerprint image, the algorithm marks down redundant pixels in each small image window (3x3). 3) And finally removes all those marked pixels after several scans. Step 4: Minutiae Connect: This operation takes thinned image as input and produces refined skeleton image by converting small straight lines to curve to maximum possible extant. Step 5: Minutiae Margin: This increases the margin of endpointsbyonepixel ofcurves of length at least three pixels. Step 6: Minutiae point Extraction: For extracting minutiae point we compute the number of one- value of every 3x3 window:  If the centroid is 1 and has only 1 one valued neighbor, then the central pixel is a termination.  If the central is 1 and has 3 one-value neighbours, then the central pixel is a bifurcation. sensor Minutiae extractor Minutiae matcher
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1894  If the central is 1 and has 2 one-value neighbours, then the central pixel is a usual pixel. Step 7: False Minutiae Removal Procedure for removing false minutiae is given below [12]:  If the distance between one bifurcation and one termination is less than D and the two minutiae are in the same ridge. Remove both of them. Where D is the average inter-ridge width representing the average distance between two parallel neighboring ridges.  If the distance between two bifurcations islessthan D and they are in the same ridge, remove the two bifurcations.  If two terminations are within a distance D and their directions are coincident with a small angle variation. And they suffice the condition that now any other termination is located between the two terminations. Then the two terminations are regarded as false minutia derived from a broken ridge and are removed.  If two terminations are located in a short ridgewith length less than D, remove the two terminations.  If a branch point has at least two neighboring branch points, which are each no further away than maximum distance threshold value and these branch points are closely connected on common line segment than remove the branch points. And last we do the minutiae matching. Two fingerprint images to be matched, any one minutia is chosen from each image, and then the similarity of the two ridges associated with the two referenced minutia points is calculated. If the similarity is larger than a threshold, each set of minutiae to a new coordination system is transformed,whoseoriginis at the referenced point and whose x-axis is coincident with the direction of the referenced point. After we get two sets of transformed minutia points, we use the elastic match algorithm to count the matched minutia pairs by assuming two minutiae having nearly the same position and direction are identical. 2.4 Threshold Cryptography Technique [5] 2.5 Fingerprint Matching using Gabor Filter[11] The different processing steps from pre-processing to matching as the final step of the fingerprint authentication are  Quantized co-sinusoidal triplets  Discrete Fourier transform  Gabor filters The first step is the normalization, which results in a better contrast of the fingerprint image. After that, the fingerprint is segmented, which crops areas of the recorded image, which do not contain anyrelevantinformation. Thisis the end of the pre-processing. The last pre-processing step usually consists of a fingerprintenhancementasdescribedin [7]. However, tests have shown that the subsequent reference point detection works on non-enhanced fingerprint images as well as on enhanced. Therefore, any further enhancement is not required for the subsequent processing steps. After that, the fingerprint image is filtered using a Gabor filter. Now, it is possible to create the feature map, which is used as the template.Thistemplateismatched in the subsequent matching step with templates of other fingerprints. The result of the matching is the matching score, which represents how good two fingerprints resemble each other. Most methods for fingerprint identification use minutiae as the fingerprint features. For small scale fingerprint recognition system, it would not be efficient to undergo all the pre-processing steps (edge detection, smoothing, thinning ), instead Gabor filters will be used to extract features directly from the gray level fingerprint. No pre- processing stage is needed before extractingthefeatures [7]. 1) Image Acquisition A number of methods are used to acquire fingerprints. Among them, the inked impression method remains the most popular one. Inkless fingerprint scanners are also present eliminating the intermediate digitization process [11]. Fingerprint quality is very important since it affects directly the minutiae extractionalgorithm.Twotypes of degradation usually affect fingerprint images:1)theridge lines are not strictly continuous since they sometimes include small breaks (gaps); 2) parallel ridgelines are not always well separated due to the presence of cluttering noise. The resolution of the scanned fingerprints must be 500 dpi while the size is 300 x 300. In Threshold cryptographic technique, fingerprint image is divided into two or more shares using visual cryptographic technique followed by compression. Alsoone share of fingerprint is stored in server & remaining shares given to user. The template can only be reconstructed by super-imposing shares. During the authentication phasethe T share are superimposed with the ID card shares available with the user & it gets authenticated. The major concern of this technique is reducing the error rate. The advantage of the technique is the system is secured from the attack from server side. The disadvantage of this technique is there is no privacy Combined minutiae template for enrolment of database. The server side attacks are removed by using this techniques.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1895 2) Feature Extractor Gabor filter based features have been successfully and widely applied to face recognition, pattern recognition and fingerprint enhancement. The familyof2-DGaborfilters was originally presented by Daugman (1980) as a framework for understanding the orientation and spatial frequency selectivity properties of the filter. The fingerprint print image will be scanned by a 8x8 window; for each block the magnitude of the Gabor filter is extracted with different values of m (m = 4 and m = 8). The features extracted (new reduced size image) will be used as theinputtotheclassifier. 3) Classifier The classifier is based on the k-nearest neighborhood algorithmKNN.“Training”oftheKNN consists simply of collecting k images per individual as the training set. The remaining images consists the testing set. The classifier finds the k points in the training set that are the closest to x (relative to the Euclidean distance) and assignsx the label shared by the majorityofthesek nearestneighbors. Note that k is a parameter of the classifier; it is typically set to an odd value in order to prevent ties. The last phase is the verification phase where the testing fingerprint image [10]: 1) Is inputted to the system 2) Magnitude features are extracted 3) Perform the KNN algorithm 4) Identify the person 3. COMPARATIVE ANALYSIS Table 1 shows the comparative analysis of various matching techniques. Table -1: Comparative Analysis of Techniques. Techniques Objective Limitations Minutiae Based Algorithm[3] To design an algorithm with privacy & security purpose. Not suitable for low quality template . Threshold Cryptography Technique [5] To develop a technique by dividing it into small shares Compression is required for reconstruction of fingerprint image Fingerprint Matching using Gabor Filter[6] To develop technique to increase genuine acceptance rate. More number gabor filter used. K-Nearest Neighbour Minutiae Clustering [2] To identify the fingerprint it reads each fingerprint clustered graph templates from database This technique increase the processing time . 4. CONCLUSIONS A large number of fingerprint matching techniques for the purpose of authentication proposed in the literature have been reviewed. This paper provides a broad study of the various algorithms used in fingerprint matching process based on the various fingerprint representations and features extracted from the fingerprints images. A performance comparison table of various techniques proposed earlier for fingerprint matching, evaluated on the various parameters explainedinpaperisalsopresented. The benefits and limitations of these approaches have been highlighted. Mostly accepted finger scan technologyisbased on minutiae. Minutiae based techniques produce the fingerprint by its local features, like termination and bifurcation when minutiae points match between two fingerprints, so fingerprints are match .Most of techniques has high FRR rate which is not suitable for development of secure application. Hence, secured application with fingerprint authentication using a minutiae basedalgorithm will create a impact on other techniques with its security, privacy & low FRR rate. ACKNOWLEDGEMENT We would like to show our gratitude to Mr. Atul Pawar , Professor PCCOE who guided us throughoutthe preparation of the paper and gave us relevant concept to materialize the paper. REFERENCES [1] AbinandhanChandrasekaran,Dr.BhavaniThuraisingham, “Fingerprint Matching AlgorithmBasedonTreeComparison using Ratios of Relational Distances”Second International Conference on Availability, Reliability and Security (ARES'07), IEEE Computer society 2007. [2] Vaishali Pawar ,Mukesh Zaveri “Graph Based K-Nearest Neighbor Minutiae Clustering for Fingerprint Recognition” 10th International Conference on Natural Computation , IEEE 2014. [3] Sheng Li and Alex C. Kot "Fingerprint Combination for Privacy Protection," IEEE Transactions on Information Forensics and Security, February 2013. [4] Chandra Prakash Singh, Susheel Jain, Anurag Jain “ Literature Survey On Fingerprint Recognition Using Level 3 Feature Extraction Method ” IJECE, Volume 3 Issue 1 January, 2014. [5] Rajeswari Mukeshi & V.J.Subashini, "Fingerprint Based Authentication System Using Threshold Visual Cryptographic Technique," IEEE-International Conference On Advances In Engineering, Science And Management, March 2012 .
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1896 [6] Muhammad Umer Munir and Dr. Muhammad Younas Javed, "Fingerprint Matching using Gabor Filters," National Conference on Emerging Technologies, 2004. [7] Munir, M. U., Javed, M. Y., ''Fingerprint Matching using Gabor Filters,'' 2005. [8] Manvjeet Kaur, MukhwinderSingh,AkshayGirdhar,and Parvinder S. Sandhu, “Fingerprint Verification System using Minutiae Extraction Technique”, World Academy of Science, Engineering and Technology 46 2008. [9] NTSC Subcommittee on Biometrics, ''Fingerprint Recognition'', 2000. [10] Roli Bansal, Priti Sehgal and Punam Bedi “Minutiae Extraction from Fingerprint Images - a Review” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 3, September 2011. [11] Lin Hong, Yifei Wang, and Anil Jain, “Fingerprint Image Enhancement: Algorithm andPerformanceEvaluation”IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(8), August 1998. [12] Maltoni D., Maio D., Jain A.K. and prabhakar S., “Handbook of Fingerprint Recognition,” Second Edition, Springer , 2009. [13] Sun Bei, Luo Wusheng, Du Liebo, Lu Qin , “A fingerprint identification algorithm based on local minutiae topological property” , IEEE First International Conference on Data Science in Cyberspace , 2016 . [14] Gianmarco Baldini , Gary Steri , “A surveyoftechniques for the identification of mobile phones using the physical fingerprints of the built-in components”, IEEE Communications Surveys Tutorials , 2017 [15] Renuka Hawanna , Urmila Pawar , Pooja Sashte , “Android based application for an attendance monitoring” , International Engineering Research Journal (IERJ)Volume1 Issue 11 Page 1649-1652, 2016 . [16] Hariyanto , Sunny Arief Sudiro , Saepul Lukman , “Minutiae Matching Algorithm using Arti_cial Neural Network for Fingerprint Recognition”,3rd International Conference on Arti_cial Intelligence, Modelling and Simulation , 2015