SlideShare a Scribd company logo
1 of 52
FINGER PRINTS
RECOGNITION SYSTEM
S.ANITHALAKSHMI
50409621003
AbstrAct
 The minutiae are ridge endings or bifurcations on the
fingerprints. They, including their coordinates and
direction, are most distinctive features to represent the
fingerprint.
 Most fingerprint recognition systems store only the
minutiae template in the database for further usage.
 The conventional methods to utilize minutiae
information are treating it as a point set and finding the
matched points from different minutiae sets.
 This kind of minutiae-based fingerprint recognition
systems consists of two steps, i.e., minutiae
extraction and minutiae matching.
 In the minutiae matching process, the minutiae
feature of a given fingerprint is compared with the
minutiae template, and the matched minutiae will be
found out.
 The template used for fingerprint recognition is
further utilized in the matching stage to enhance the
system’s performance.
 These templates are been stored in the database for further
processing.
 Specific unique id is generated for each template stored.
 The id is stored in the database along with the template locations.
 Next is the verification process where you need to provide the id
for comparison.
 The given id is being compared with the id’s in the database and
matched with the corresponding template of that id.
 A message is being displayed on successful matching along
with the score.
 Otherwise an failure message is displayed indicating match not
found.
 In the identification stage we need not specify an id. Click on
the Identify button which searches for any match and provides
the corresponding result.
 The database records can also be deleted through the
application.
 Auto extract and Auto identify check boxes can be selected if
need which automatically extracts and identifies the matching
image
 It is also possible to load an image and compare it with the
database images.
 The colors of the template extraction can also be changed.
OrGANIZAtIONAL PrOFILE
OrAtOr sOLUtIONs
 The name “Orator”– A Good Speaker, One who speaks
well in public. A good speaker has lot of followers.
Like that, We people are good speaker by our work.
We satisfy our clients by our services. And we are here
to provide Intelligent
SKILLS
 Banking & Real Estate
 Finance & Insurance
o Hospital and health care industry
o Web Applications
o Office Automation
o Manufacturing Retailing
HArDWArE rEQUIrEMENts
 Processor PENTIUM IV
 RAM 128 MB
 Hard Disk 40 GB
sOFtWArE rEQUIrEMENts
 Browser Internet Explorer
 Server side scripting Java
 Database Ms-Access
 Client side scripting HTML
ExIstING systEM
 The conventional methods to utilize minutiae
information are treating it as a point set and finding the
matched points from different minutiae sets.
 In existing system, the Sparse areas are not considered.
So the result may not obtain correctly. And the
matching will be difficult to get an absolute result.
FingerPrint View
Red Spots Minutiae
PrOPOsED systEM
 In Proposed system, we considered the sparse area
and the fingerprint’s orientation field is reconstructed
from minutiae and further utilized in the matching
stage to enhance the system’s performance.
DESIGN OF THE PROJECT
DaTa FlOw DIaGRam
Show the matching Score
Thump Impression
Extract
Particular Identify
Entire Verification
Database
If Matches Show the Particular ID No
Does Not Exist
False
True
If Matches
Does not match
False
True
Enroll
mODulE lIST
 Minutiae Template
 Minutiae Matching
 Effective Region Estimation
 Orientation Field Matching
 Fusing Matching
mINuTIaE TEmPlaTE
 Minutiae templates are a fraction of the size of
fingerprint images, require less storage memory
and can be transmitted electronically faster than
images.
mINuTIaE maTCHING
 In this module we matches the fingerprint minutiae
by using both the local and global structures of
minutiae.
 The local structure of a minutia describes a rotation
and translation invariant feature of the minutia in its
neighborhood.
 It is used to find the correspondence of two minutiae
sets and increase the reliability of the global matching.
 The global structure of minutiae reliably determines
the uniqueness of fingerprint. Therefore, the local and
global structures of minutiae together provide a solid
basis for reliable and robust minutiae matching.
(a) X Person’s Fingerprint (b) X Person’s Fingerprint for
verification
Matching Stage
EFFECTIvE REGION
ESTImaTION
 we can extract the effective region by finding the
smallest envelope that contains all the minutiae
points. For an When only having minutiae feature, we
can extract the effective region by only using
minutiae illustration. Here, we put the original image
together for the convenience to give a visual sense.
Estimation of Effective Region
ORIENTaTION FIElD
maTCHING
 To compare two fingerprints’ orientation field, the
first step is alignment of these two fingerprints. The
alignment is mainly based on minutiae information .
Here we choose the Hough transform based approach
to finish the alignment due to its simplicity.
 Hough Transform (HT) is one of the most common
methods for detecting shapes (lines, circles, etc.) in
binary or edge images. Its advantage is its ability to
detect discontinuous patterns in noisy images, but it
requires a large amount of computing power.
FuSING maTCHING
 A variety of combination rules have been proposed. It
has shown that matching accuracy can be improved
by combining independent matchers using Neyman–
Pearson rule. Here, we will also use Neyman–Pearson
rule for the task.
 Matching of test fingerprint with template is done in
Neyman-Pearson rule. Two sets of minutiae are
compared. If matching score is found, then the
fingerprint is matched with template. Otherwise does
not matched with the template.
INPuT aND OuTPuT SCREENS
Main Page
Authentication
Load BMP Image
Extract Template
Enroll
Reports
Verify
Verify
Identify
ClearDatabase
ClearLog
Benefits of the project
 The project can be used for security purposes.
 E.g. : Attendance ,
voter registration,
Crime Investigation,
forensic fingerprint searching.
CONCLUSION
Orientation field is important for fingerprint
representation. In order to utilize the orientation
information in automatic fingerprint recognition
systems which only stores minutiae feature. So we can
reduce the usage of memory and enhancing the
performance of system.
We also utilize the reconstructed orientation field
information into the matching stage. We can reduce
the effect of wrongly detected minutiae. A fingerprint
matching based on orientation field is used to combine
with conventional minutiae matching for real
applications.
THANK YOU

More Related Content

What's hot

Biometric security system
Biometric security systemBiometric security system
Biometric security system
Mithun Paul
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
Nabila mahjabin
 

What's hot (20)

Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Hand Gesture recognition
Hand Gesture recognitionHand Gesture recognition
Hand Gesture recognition
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Biometric security system
Biometric security systemBiometric security system
Biometric security system
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
 
Hand gesture recognition
Hand gesture recognitionHand gesture recognition
Hand gesture recognition
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Smart quill ppt
Smart quill pptSmart quill ppt
Smart quill ppt
 
Voice recognition
Voice recognitionVoice recognition
Voice recognition
 
Hand gesture recognition system for human computer interaction using contour ...
Hand gesture recognition system for human computer interaction using contour ...Hand gesture recognition system for human computer interaction using contour ...
Hand gesture recognition system for human computer interaction using contour ...
 
Hand gesture recognition
Hand gesture recognitionHand gesture recognition
Hand gesture recognition
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
A Dynamic hand gesture recognition for human computer interaction
A Dynamic hand gesture recognition for human computer interactionA Dynamic hand gesture recognition for human computer interaction
A Dynamic hand gesture recognition for human computer interaction
 

Viewers also liked

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
guest8cbcb02
 
Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013
JJ Wu
 
Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013
JJ Wu
 

Viewers also liked (20)

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013
 
Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013
 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 
Ullas_CV
Ullas_CVUllas_CV
Ullas_CV
 
3 Content/Body
3 Content/Body3 Content/Body
3 Content/Body
 
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 

Similar to 50409621003 fingerprint recognition system-ppt

ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
IJCSEIT Journal
 

Similar to 50409621003 fingerprint recognition system-ppt (20)

ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhhppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
 
finger prints
finger printsfinger prints
finger prints
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 
Modex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual Overview
 
AI NOTES.docx
AI NOTES.docxAI NOTES.docx
AI NOTES.docx
 
Data Science in business World
Data Science in business World Data Science in business World
Data Science in business World
 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image Processing
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

50409621003 fingerprint recognition system-ppt

  • 2. AbstrAct  The minutiae are ridge endings or bifurcations on the fingerprints. They, including their coordinates and direction, are most distinctive features to represent the fingerprint.  Most fingerprint recognition systems store only the minutiae template in the database for further usage.  The conventional methods to utilize minutiae information are treating it as a point set and finding the matched points from different minutiae sets.
  • 3.  This kind of minutiae-based fingerprint recognition systems consists of two steps, i.e., minutiae extraction and minutiae matching.  In the minutiae matching process, the minutiae feature of a given fingerprint is compared with the minutiae template, and the matched minutiae will be found out.  The template used for fingerprint recognition is further utilized in the matching stage to enhance the system’s performance.
  • 4.  These templates are been stored in the database for further processing.  Specific unique id is generated for each template stored.  The id is stored in the database along with the template locations.  Next is the verification process where you need to provide the id for comparison.  The given id is being compared with the id’s in the database and matched with the corresponding template of that id.
  • 5.  A message is being displayed on successful matching along with the score.  Otherwise an failure message is displayed indicating match not found.  In the identification stage we need not specify an id. Click on the Identify button which searches for any match and provides the corresponding result.
  • 6.  The database records can also be deleted through the application.  Auto extract and Auto identify check boxes can be selected if need which automatically extracts and identifies the matching image  It is also possible to load an image and compare it with the database images.  The colors of the template extraction can also be changed.
  • 7. OrGANIZAtIONAL PrOFILE OrAtOr sOLUtIONs  The name “Orator”– A Good Speaker, One who speaks well in public. A good speaker has lot of followers. Like that, We people are good speaker by our work. We satisfy our clients by our services. And we are here to provide Intelligent SKILLS  Banking & Real Estate  Finance & Insurance
  • 8. o Hospital and health care industry o Web Applications o Office Automation o Manufacturing Retailing
  • 9. HArDWArE rEQUIrEMENts  Processor PENTIUM IV  RAM 128 MB  Hard Disk 40 GB
  • 10. sOFtWArE rEQUIrEMENts  Browser Internet Explorer  Server side scripting Java  Database Ms-Access  Client side scripting HTML
  • 11. ExIstING systEM  The conventional methods to utilize minutiae information are treating it as a point set and finding the matched points from different minutiae sets.  In existing system, the Sparse areas are not considered. So the result may not obtain correctly. And the matching will be difficult to get an absolute result.
  • 13. PrOPOsED systEM  In Proposed system, we considered the sparse area and the fingerprint’s orientation field is reconstructed from minutiae and further utilized in the matching stage to enhance the system’s performance.
  • 14. DESIGN OF THE PROJECT
  • 15. DaTa FlOw DIaGRam Show the matching Score Thump Impression Extract Particular Identify Entire Verification Database If Matches Show the Particular ID No Does Not Exist False True If Matches Does not match False True Enroll
  • 16. mODulE lIST  Minutiae Template  Minutiae Matching  Effective Region Estimation  Orientation Field Matching  Fusing Matching
  • 17. mINuTIaE TEmPlaTE  Minutiae templates are a fraction of the size of fingerprint images, require less storage memory and can be transmitted electronically faster than images.
  • 18. mINuTIaE maTCHING  In this module we matches the fingerprint minutiae by using both the local and global structures of minutiae.  The local structure of a minutia describes a rotation and translation invariant feature of the minutia in its neighborhood.  It is used to find the correspondence of two minutiae sets and increase the reliability of the global matching.  The global structure of minutiae reliably determines the uniqueness of fingerprint. Therefore, the local and global structures of minutiae together provide a solid basis for reliable and robust minutiae matching.
  • 19. (a) X Person’s Fingerprint (b) X Person’s Fingerprint for verification Matching Stage
  • 20. EFFECTIvE REGION ESTImaTION  we can extract the effective region by finding the smallest envelope that contains all the minutiae points. For an When only having minutiae feature, we can extract the effective region by only using minutiae illustration. Here, we put the original image together for the convenience to give a visual sense.
  • 22. ORIENTaTION FIElD maTCHING  To compare two fingerprints’ orientation field, the first step is alignment of these two fingerprints. The alignment is mainly based on minutiae information . Here we choose the Hough transform based approach to finish the alignment due to its simplicity.  Hough Transform (HT) is one of the most common methods for detecting shapes (lines, circles, etc.) in binary or edge images. Its advantage is its ability to detect discontinuous patterns in noisy images, but it requires a large amount of computing power.
  • 23. FuSING maTCHING  A variety of combination rules have been proposed. It has shown that matching accuracy can be improved by combining independent matchers using Neyman– Pearson rule. Here, we will also use Neyman–Pearson rule for the task.  Matching of test fingerprint with template is done in Neyman-Pearson rule. Two sets of minutiae are compared. If matching score is found, then the fingerprint is matched with template. Otherwise does not matched with the template.
  • 24. INPuT aND OuTPuT SCREENS
  • 28.
  • 29.
  • 30.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 42.
  • 44.
  • 46.
  • 50. Benefits of the project  The project can be used for security purposes.  E.g. : Attendance , voter registration, Crime Investigation, forensic fingerprint searching.
  • 51. CONCLUSION Orientation field is important for fingerprint representation. In order to utilize the orientation information in automatic fingerprint recognition systems which only stores minutiae feature. So we can reduce the usage of memory and enhancing the performance of system. We also utilize the reconstructed orientation field information into the matching stage. We can reduce the effect of wrongly detected minutiae. A fingerprint matching based on orientation field is used to combine with conventional minutiae matching for real applications.