This document summarizes a research paper that proposes an automated fingerprint recognition system using minutiae matching. It involves three main phases: image processing to enhance the fingerprint image and remove noise, minutiae extraction to detect ridge endings and bifurcations, and matching of minutiae points between two fingerprints to determine a match. The proposed system is evaluated on a database of fingerprint images. Results show the percentage of minutiae points correctly detected by the system ranges from 59% to 70%, demonstrating the potential of the minutiae matching technique for large-scale fingerprint recognition.
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...idescitation
Few years ago a self service has been predominant way of passenger at airport.
For the passenger that is a very enjoyable and comfort situation because it keeps control
over all process during their complete journey. For airport and for airlines is also very
interesting evolution because self service allows increasing capacity of airport without any
significant extra investment. However success of self service induces one potential risk. That
is of lack of human contact between airline operator and passenger, there is a problem in
identifying a passenger. This is definitely the problem for immigrations forcibly. This
potential risk of the industry is needed to be addressed and biometrics definitely can solve
this kind of problem. Nowadays biometric is considered to be the most important and
reliable method for personal identification. Iris recognition is considered as most personal
identification.
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
In this work, we deal with contactless fingerprint biometrics. More specifically, we are interested in solving the problem of registration by taking into consideration some constraints such as finger rotation and translation. In the proposed method, the registration requires: (1) a segmentation technique to extract streaks, (2) a skeletonization technique to extract the center line streaks and (3) and landmarks extraction technique. The correspondence between the sets of control points, is obtained by calculating the descriptor vector of Zernike moments on a window of size RxR centered at each point. Comparison of correlation coefficients between the descriptor vectors of Zernike moments helps define the corresponding points. The estimation of parameters of the existing deformation between images is performed using RANSAC algorithm (Random SAmple Consensus) that suppresses wrong matches. Finally, performance evaluation is achieved on a set of fingerprint images where promising results are reported.
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
Abstract: Fingerprint recognition is one of the most popular and successful methods used for person
identification which takes advantage of the fact that the fingerprint has some unique characteristics called
minutiae which are points where a extracts the ridges and bifurcation from a fingerprint image. A critical step in
studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images.
However fingerprint images are rarely of perfect quality. Fingerprint image enhancement techniques are
employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations.
Fingerprint matching is often affected by the presence of intrinsically low quality fingerprints and various
distortions introduced during the acquisition process. In this paper we have used the rural fingerprints
database which is collected from IIIT Delhi research lab which consists of 1634 fingerprints images. Out of
which we have preprocess 600 sample preprocessing extracts the ridges and bifurcation from a fingerprint
image and tried to improve the quality of images. The Resultant images quality is verified by using different
quality measures.
Keywords: minutiae extraction, extracts the ridges and bifurcation, rural fingerprint authentication.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
An Iot Based Smart Manifold Attendance SystemIJERDJOURNAL
ABSTRACT:- Attendance has been an age old procedure employed in different disciplines of educational institutions. While attendance systems have witnessed growth right from manual techniques to biometrics, plight of taking attendance is undeniable. In fingerprint based attendance monitoring, if fingers get roughed / scratched, it leads to misreading. Also for face recognition, students will have to make a queue and each one will have to wait until their face gets recognised. Our proposed system is employing “manifold attendance” that means employing passive attendance, where at a time, the attendance of multiple people can get captured. We have eliminated the need of queue system / paper-pen system of attendance, and just with a single click the attendance is not only captured, but monitored as well, that too without any human intervention. In the proposed system, creation of database and face detection is done by using the concepts of bounding box, whereas for face recognition we employ histogram equalization and matching technique.
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...idescitation
Few years ago a self service has been predominant way of passenger at airport.
For the passenger that is a very enjoyable and comfort situation because it keeps control
over all process during their complete journey. For airport and for airlines is also very
interesting evolution because self service allows increasing capacity of airport without any
significant extra investment. However success of self service induces one potential risk. That
is of lack of human contact between airline operator and passenger, there is a problem in
identifying a passenger. This is definitely the problem for immigrations forcibly. This
potential risk of the industry is needed to be addressed and biometrics definitely can solve
this kind of problem. Nowadays biometric is considered to be the most important and
reliable method for personal identification. Iris recognition is considered as most personal
identification.
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
In this work, we deal with contactless fingerprint biometrics. More specifically, we are interested in solving the problem of registration by taking into consideration some constraints such as finger rotation and translation. In the proposed method, the registration requires: (1) a segmentation technique to extract streaks, (2) a skeletonization technique to extract the center line streaks and (3) and landmarks extraction technique. The correspondence between the sets of control points, is obtained by calculating the descriptor vector of Zernike moments on a window of size RxR centered at each point. Comparison of correlation coefficients between the descriptor vectors of Zernike moments helps define the corresponding points. The estimation of parameters of the existing deformation between images is performed using RANSAC algorithm (Random SAmple Consensus) that suppresses wrong matches. Finally, performance evaluation is achieved on a set of fingerprint images where promising results are reported.
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
Abstract: Fingerprint recognition is one of the most popular and successful methods used for person
identification which takes advantage of the fact that the fingerprint has some unique characteristics called
minutiae which are points where a extracts the ridges and bifurcation from a fingerprint image. A critical step in
studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images.
However fingerprint images are rarely of perfect quality. Fingerprint image enhancement techniques are
employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations.
Fingerprint matching is often affected by the presence of intrinsically low quality fingerprints and various
distortions introduced during the acquisition process. In this paper we have used the rural fingerprints
database which is collected from IIIT Delhi research lab which consists of 1634 fingerprints images. Out of
which we have preprocess 600 sample preprocessing extracts the ridges and bifurcation from a fingerprint
image and tried to improve the quality of images. The Resultant images quality is verified by using different
quality measures.
Keywords: minutiae extraction, extracts the ridges and bifurcation, rural fingerprint authentication.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
An Iot Based Smart Manifold Attendance SystemIJERDJOURNAL
ABSTRACT:- Attendance has been an age old procedure employed in different disciplines of educational institutions. While attendance systems have witnessed growth right from manual techniques to biometrics, plight of taking attendance is undeniable. In fingerprint based attendance monitoring, if fingers get roughed / scratched, it leads to misreading. Also for face recognition, students will have to make a queue and each one will have to wait until their face gets recognised. Our proposed system is employing “manifold attendance” that means employing passive attendance, where at a time, the attendance of multiple people can get captured. We have eliminated the need of queue system / paper-pen system of attendance, and just with a single click the attendance is not only captured, but monitored as well, that too without any human intervention. In the proposed system, creation of database and face detection is done by using the concepts of bounding box, whereas for face recognition we employ histogram equalization and matching technique.
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Generate a key for MAC Algorithm using Biometric Fingerprint ijasuc
known as cryptographic checksum or MAC that is appended to the message.
The unauthorized thefts in our society have made the requirement for reliable information security
mechanisms. Information security can be accomplished with the help of a prevailing tool like cryptography,
protecting the cryptographic keys is one of the significant issues to be deal with. Here we proposed a
biometric-crypto system which generates a cryptographic key from the Finger prints for calculating the
MAC value of the information we considered fingerprint because it is unique and permanent through out a
person’s life.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...IJERA Editor
The multimodal Biometric System using multiple sources of information has been widely recognized. However computational models for multimodal biometrics recognition have only recently received attention. In this paper the fingerprint and palmprint images are chosen and fused together using image fusion methods. The biometric features are subjected to modality extraction. Different fusion methods like average fusion, minimum fusion, maximum fusion, discrete wavelet transform fusion and stationary wavelet transformfusion are implemented for the fusion of extracting modalities. The best fused template is analyzed by applying various fusion metrics. Here the DWT fused image provided better results.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Human Face Detection Systemin ANew AlgorithmIOSRjournaljce
Trying to detecting a face from any photo is big problem and got these days a focusing because of it importance, in face recognition system,face detection in one of the basic components. A lot of troubles are there to be solved in order to create a successful face detection algorithm. The skin of face has its properties in color domain and also a texture which may help in the algorithm for detecting faces because of its ability to find skins from photo. Here we are going to create a new algorithm for human face detection depending on skin color tone specially YCbCr color tone as an approach to slice the photo into parts. In addition, Gray level has been used to detect the area which contains a skin, after that anotherlevel used to erase the area that does not contain skin. The system which proposed applied on many photos and passed with great accuracy of detecting faces and it has a good efficient especially to separate the area that does not contain skin or face from the area which contain face and skin. It has been agreed and approved that the accuracy of the proposed system is 98% in human face detection.
Fingerprint and Palmprint Multi-Modal Biometric Security SystemIJEACS
In this work, fingerprint and palm print multi-modal
biometric security system is proposed. In this proposed work
some of the common features of finger print and palm print
images are identified and the process is carried out for
authentication. At first, the preprocessing steps are completed on
chosen images which include binarization, thinning and minute
extraction. Binarization is for identifying the important ridges of
finger print and palm print images and later on thinning is
applied to eliminate the repetitive pixels on the binarized images.
Using minute extraction different angles are formed for the
thinned images for choosing the specific area of the images. In the
next step for identifying the specific area in the finger print
images region of interest is carried out. After the initial stage
(preprocessing) features are extracted by using Feature
Extraction method from both the finger print and palm print
images and all the extracted features are combined to form a
feature vector element. Secrete key is generated using the fuzzy
extractor from the biometric features and stored in the fuzzy
vault. The generated key and obtained vector elements are stored
in the database. In final stage authentication methods are carried
out for the test images. In this method feature of finger print
images and palm print images are extracted and verified with the
fuzzy vault and then a secrete key is generated. If the key
generate and key stored in database are matched then the process
is successful authentication or else it is failure authentication.
Feature extraction is becoming popular in face recognition method. Face recognition is the interesting and growing area in real time applications. In last decades many of face recognitions methods has been developed. Feature extraction is the one of the emerging technique in the face recognition methods. In this method an attempt to show best faces recognition method. Here used different descriptors combination like LBP and SIFT, LBP and HOG for feature extraction. Using a single descriptor is difficult to address all variations so combining multiple features in common. Find LBP and SIFT features separately from the images and fuse them with a canonical correlation analysis and same procedure also done using LBP and HOG. The SIFT features have some limitations they don’t work well with lighting changes, quite slow, and mathematically complicated and computationally heavy. The combinations of HOG and LBP features make the system robust against some variations like illumination and expressions. Also, face recognition technique used a different classifier to extract the useful information from images to solve the problems. This paper is organized into four sections. Introduction in the first section. The second section describes feature descriptors and the third section describes proposed methods, final sections describes experiments result and conclusion phase.
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
For security and surveillance automated personal identification is major issue. We can see a lot varieties of biometric systems like face detection, fingerprint recognition, iris recognition, voice recognition, palm recognition etc. In our project we will only go for fingerprint recognition. Never two peoples have exactly same fingerprints even twins, they are totally unique. The sensors capture the finger prints of humans and convert them into images and a minutiae extraction algorithm extracts the location of minutiae points called termination and bifurcation. A database system stores these patterns and minutiae points of fingerprint. A large storage space required to store bifurcation and termination points for the fingerprint database. LZW compression algorithm has been used to reduce the size of data. With LZW applied on these extracted minutiae points, these minutiae points get encoded which add more security feature.
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
In cash transactions, the biggest challenge faced is counterfeit notes. This problem is only expanding due to the technology available and many fraud cases have been uncovered. Manual detection of counterfeit notes is time consuming and inefficient and hence the need of automated counterfeit detection has raised. To tackle this problem, we studied existing systems using Matlab, which used different methods to detect fake notes.
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Generate a key for MAC Algorithm using Biometric Fingerprint ijasuc
known as cryptographic checksum or MAC that is appended to the message.
The unauthorized thefts in our society have made the requirement for reliable information security
mechanisms. Information security can be accomplished with the help of a prevailing tool like cryptography,
protecting the cryptographic keys is one of the significant issues to be deal with. Here we proposed a
biometric-crypto system which generates a cryptographic key from the Finger prints for calculating the
MAC value of the information we considered fingerprint because it is unique and permanent through out a
person’s life.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...IJERA Editor
The multimodal Biometric System using multiple sources of information has been widely recognized. However computational models for multimodal biometrics recognition have only recently received attention. In this paper the fingerprint and palmprint images are chosen and fused together using image fusion methods. The biometric features are subjected to modality extraction. Different fusion methods like average fusion, minimum fusion, maximum fusion, discrete wavelet transform fusion and stationary wavelet transformfusion are implemented for the fusion of extracting modalities. The best fused template is analyzed by applying various fusion metrics. Here the DWT fused image provided better results.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Human Face Detection Systemin ANew AlgorithmIOSRjournaljce
Trying to detecting a face from any photo is big problem and got these days a focusing because of it importance, in face recognition system,face detection in one of the basic components. A lot of troubles are there to be solved in order to create a successful face detection algorithm. The skin of face has its properties in color domain and also a texture which may help in the algorithm for detecting faces because of its ability to find skins from photo. Here we are going to create a new algorithm for human face detection depending on skin color tone specially YCbCr color tone as an approach to slice the photo into parts. In addition, Gray level has been used to detect the area which contains a skin, after that anotherlevel used to erase the area that does not contain skin. The system which proposed applied on many photos and passed with great accuracy of detecting faces and it has a good efficient especially to separate the area that does not contain skin or face from the area which contain face and skin. It has been agreed and approved that the accuracy of the proposed system is 98% in human face detection.
Fingerprint and Palmprint Multi-Modal Biometric Security SystemIJEACS
In this work, fingerprint and palm print multi-modal
biometric security system is proposed. In this proposed work
some of the common features of finger print and palm print
images are identified and the process is carried out for
authentication. At first, the preprocessing steps are completed on
chosen images which include binarization, thinning and minute
extraction. Binarization is for identifying the important ridges of
finger print and palm print images and later on thinning is
applied to eliminate the repetitive pixels on the binarized images.
Using minute extraction different angles are formed for the
thinned images for choosing the specific area of the images. In the
next step for identifying the specific area in the finger print
images region of interest is carried out. After the initial stage
(preprocessing) features are extracted by using Feature
Extraction method from both the finger print and palm print
images and all the extracted features are combined to form a
feature vector element. Secrete key is generated using the fuzzy
extractor from the biometric features and stored in the fuzzy
vault. The generated key and obtained vector elements are stored
in the database. In final stage authentication methods are carried
out for the test images. In this method feature of finger print
images and palm print images are extracted and verified with the
fuzzy vault and then a secrete key is generated. If the key
generate and key stored in database are matched then the process
is successful authentication or else it is failure authentication.
Feature extraction is becoming popular in face recognition method. Face recognition is the interesting and growing area in real time applications. In last decades many of face recognitions methods has been developed. Feature extraction is the one of the emerging technique in the face recognition methods. In this method an attempt to show best faces recognition method. Here used different descriptors combination like LBP and SIFT, LBP and HOG for feature extraction. Using a single descriptor is difficult to address all variations so combining multiple features in common. Find LBP and SIFT features separately from the images and fuse them with a canonical correlation analysis and same procedure also done using LBP and HOG. The SIFT features have some limitations they don’t work well with lighting changes, quite slow, and mathematically complicated and computationally heavy. The combinations of HOG and LBP features make the system robust against some variations like illumination and expressions. Also, face recognition technique used a different classifier to extract the useful information from images to solve the problems. This paper is organized into four sections. Introduction in the first section. The second section describes feature descriptors and the third section describes proposed methods, final sections describes experiments result and conclusion phase.
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
For security and surveillance automated personal identification is major issue. We can see a lot varieties of biometric systems like face detection, fingerprint recognition, iris recognition, voice recognition, palm recognition etc. In our project we will only go for fingerprint recognition. Never two peoples have exactly same fingerprints even twins, they are totally unique. The sensors capture the finger prints of humans and convert them into images and a minutiae extraction algorithm extracts the location of minutiae points called termination and bifurcation. A database system stores these patterns and minutiae points of fingerprint. A large storage space required to store bifurcation and termination points for the fingerprint database. LZW compression algorithm has been used to reduce the size of data. With LZW applied on these extracted minutiae points, these minutiae points get encoded which add more security feature.
Review of Various Image Processing Techniques for Currency Note AuthenticationIJCERT
In cash transactions, the biggest challenge faced is counterfeit notes. This problem is only expanding due to the technology available and many fraud cases have been uncovered. Manual detection of counterfeit notes is time consuming and inefficient and hence the need of automated counterfeit detection has raised. To tackle this problem, we studied existing systems using Matlab, which used different methods to detect fake notes.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points between the sample fingerprint & fingerprint under question. The main functional blocks of this system follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the memory space used by the fingerprint image database.
This paper introduces the implementation of fingerprint matching Minutiae Algorithm for Fingerprint
Matching. These algorithm increases the reliability accuracy of the fingerprint matching. The proposed method was
evaluated by means of experiment conducted on the FVC2002, FVC2004 database. Experimental results confirm
that the taking time of the fingerprint image matching is very less than the other methods. This algorithm is very
effective algorithm for the identification of fingerprint image.
Project on fake currency recognition using image processing ppt final (3).pptx426SahithiBaiMiriska
End of the project is the technology of currency recognition basically AIMS for identifying and extracting visible and invisible features of currency notes and till now many techniques have been proposed stering for the fake currency note but the best way to use the visible features of the note or colour and size
The scope of work and idea is this project proposes and approach the 12 detect a currency note be in circular in our country by using their image our project will provide required mobility and compatibility to most of the people and provides a credible accuracy for the fake currency detection we are using machine learning to make it portable and efficient.
The overview of the project is the fake currency detection using machine learning was implemented on matlab features of currency note like serial number security thread identification mark Mahatma Gandhi portrayed what extracted the process star and from image acquisition to calculation of intensity of each extracted feature.
The application the applications are fake currency detection system can be utilised in shops Bank counters and end computerised tailor machine and auto merchant machines and so on the systems are created utilizing diverse techniques and
The future scope of this project is many different adaptation test and innovations have been kept for the future due to lack of time as which a work concerns de per analysis of particular mechanisms new proposal Pride different methods or simply curiosity in future we will be including ammonia for currency conversion and we can implement the system for foreign currencies and tracking of device location through which the currency scan and maintain the same in the database.
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Smart Bank Locker Access System Using Iris ,Fingerprints,Face Recognization A...IJERA Editor
In today's modern world, security plays an important role. For that purpose, we proposed advance security systems for banking locker system and the bank customers. This specialized security is proposed through four different modules in combination i.e. face detection technique, Password verification, finger prints and Iris verification .All these steps are followed in the sequence if anything goes wrong he or she is unable to access the system. We are also providing some additional billing with it i.e. it will always for after 1 transaction. It will give the intimation of first transaction is complete and you are left with prescribed number transaction mentioned in system.
Image processing based girth monitoring and recording system for rubber plant...sipij
Measuring the girth and continuous monitoring of the increase in girth is one of the most important processes in rubber plantations since identification of girth deficiencies would enable planters to take corrective actions to ensure a good yield from the plantation.
This research paper presents an image processing based girth measurement & recording system that can replace existing manual process in an efficient and economical manner.
The system uses a digital image of the tree which uses the current number drawn on the tree to identify the tree number & its width. The image is threshold first & then filtered out using several filtering criterion to identify possible candidates for numbers. Identified blobs are then fed to the Tesseract OCR for number recognition. Threshold image is then filtered again with different criterion to segment out the black strip drawn on the tree which is then used to calculate the width of the tree using calibration parameters. Once the tree number is identified & width is calculated the girth the measured girth of the tree is stored in the data base under the identified tree number.
The results obtained from the system indicated significant improvement in efficiency & economy for main plantations. As future developments we are proposing a standard commercial system for girth measurement using standardized 2D Bar Codes as tree identifiers
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from Curvelet transform. The Curvelet feature dimension is selected based on d-prime number. The increase in feature dimension is reduced by using template averaging, moment features and by Principal component analysis (PCA). The algorithm is tested on in-house multimodal database comprising of 3000 samples and Chimeric databases. Identification performance of the system is evaluated using SVM classifier. A maximum GAR of 97.15% is achieved with Curvelet-PCA features.
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
1304.2109
1. 3rd International Conference on Electrical & Computer Engineering
ICECE 2004, 28-30 December 2004, Dhaka, Bangladesh
ISBN 984-32-1804-4 116
AUTOMATED FINGERPRINT RECOGNITION: USING
MINUTIAE MATCHING TECHNIQUE FOR THE LARGE
FINGERPRINT DATABASE
S M Mohsen, S M Zamshed Farhan and M M A Hashem
Department of Computer Science and Engineering
Khulna University of Engineering & Technology
Khulna-9203, Bangladesh
Ph: +88-041-769471, Fax: +88-041-774403
Email: hashem@cse.kuet.ac.bd
ABSTRACT
Extracting minutiae from fingerprint images is one of
the most important steps in automatic fingerprint
identification system. Because minutiae matching are
certainly the most well-known and widely used
method for fingerprint matching, minutiae are local
discontinuities in the fingerprint pattern. In this paper
a fingerprint matching algorithm is proposed using
some specific feature of the minutiae points, also the
acquired fingerprint image is considered by
minimizing its size by generating a corresponding
fingerprint template for a large fingerprint database.
The results achieved are compared with those
obtained through some other methods also shows
some improvement in the minutiae detection process
in terms of memory and time required.
1. INTRODUCTION
Forensic experts [1] usually look for a sufficient
number of matching minutiae in order to determine
whether two fingerprint images correspond to the
same person. Automatic matching algorithms
roughly follow the same procedure, according to the
dominant approaches reported in the literature. In
order to promote the wide spread utilization of
biometric techniques, an increased level of security
of biometric data is necessary [3]. Minutiae
characteristics are local discontinuities in the
fingerprint pattern which represent terminations and
bifurcations [Fig. 1]. [2]. There are a lot of
hindrances make very hard the fingerprint
verification task and very robust algorithms need to
process the noisy fingerprint images. An automatic
verification system is proposed here. The system has
to recognize an acquired fingerprint image using
personal data information to select a fingerprint
database item. A fingerprint matching is
successively performed between the acquired
fingerprint image and the selected database item. A
lot of works dealing with fingerprint verification
task is present in literature [5]. They obtained high
accuracy of correct verification but they did not
work with poor and the large size of image. In this
paper a minutiae matching algorithm is proposed for
fingerprints verification, which is based on a set
image processing algorithms and characteristic
features extraction algorithms [4]. The proposed
system is based on three main phases: the image
processing phase, the minutiae extraction phase and
the matching phase. An image processing technique
is used to erase noisy background, textures of the
fingerprint. The minutiae extraction phase aims to
extract fingerprint images characteristics. Finally,
the matching phase determines whether the
fingerprints are impressions of the same finger. The
matching stage also defines a threshold to decide
whether given pair of representations is of the same
finger (mated pair) or not. The rest of the paper is
organized as follows: Section 2 addresses the details
of the proposed system that is image enhancement,
minutiae extraction technique, and matching stage.
Section 3 presents the experimental results and
performance evaluation of our proposed approach.
Finally, in Section 4 some conclusions are drawn.
2. THE PROPOSED SYSTEM
The goal of a this system is to compare two
fingerprint images, where a fingerprint is composed
of two main features which are called minutiae
2. 117
points can be classified as ridge ending and
bifurcation.
Fig. 1: Ridge ending and bifurcation
A fingerprint captured and processed in a particular
moment with one fingerprint stored in the database in
real time. In this work an automated fingerprint
verification system is proposed. For matching there
are two steps, a registration and verification step. In
the registration step all fingerprints of a set of person
are captured, processed and stored as a template
which is much smaller than the original image, in a
database for later use. In the verification step a person
gives his fingerprint to verify the identity: the
fingerprint is compared with ones stored in the
database
2.1 Image Processing
Image processing consists of three stages: 1. Image
Filtering, 2. Image Enhancement, and 3. Image
Shaping. In Image Filtering every image is a
collection of pixels, where each pixel contains three
colors in different ratio, range over 0 to 255 RGB
values, which has three parameters, such as RED,
GREEN and BLUE as constant figure. For an
example, return value as RGB of all 0 contains
BLACK and return value as RGB of all 255 contains
WHITE. For filtering RGB values of every pixel is
replaced by maximum or minimum, with comparing
the given threshold. In Image Enhancement, the
black colors mean the ridgelines, which haven’t the
same thickness all over the image. To overcome the
above limitations find the representative point of
each ridgeline and fill it. In Image Shaping, it
requires lining the image which is the initial step to
overcome the limitation of smoothness of the image.
Then from lined image, each single BLACK pixel is
found out and draws a filled circle corresponding to
the pixel to smooth the enhanced image.
2.2 Minutiae extraction and Template Generation
Minutiae extraction is just a trivial task of extracting
singular points in a thinned ridge map. The
performance of currently available minutiae
extraction algorithms depends heavily on the quality
of input fingerprint images. After extracting the
minutiae points a predetermined position is clipped
to generate a template which bears some
sophisticated data to generate a corresponding data
file used as template, which file contains the Total
number of minutiae points, Co-ordinates of each
point. Interrelated distance of each point termed as
correlation.
2.3 Fingerprint Matching
Matching is the final stage of this study. It is needed
to verify one that he must be registered before. So
the steps are: 1.Registration, 2.Verification.
Registration: In this process, the process takes the
one’s fingerprint as an image format and processed
that image as few steps such as filtering, enhancing,
lining and shaping. Then it requires selection of
minutiae points as feature then generates a template
and stores it. The authenticate template contains the
total number of minutiae points selected by proposed
feature selection technique AFIS. The number of
minutiae points limited by a bindings named limited
region to improve the flexibility of verification, and
then find out the co-relation among the features
bounded by limited region.
Verification: To verify one, the process takes one’s
fingerprint as an image format through fingerprint
acquisition hardware and processed that. Then it
requires technique to detect minutiae points and
selects features, and then to verify, load the
templates and compare with the information
gathered from verifying one. If it obtains any
template matched with that of verifying one, it
makes a decision that one was authenticated, or not.
2.4 Algorithm: Matching
1. Take X and Y as two co-ordinates.
2. Take a minutiae point (I th), where 1<=I<=total
minutiae points.
3. Now, take another minutiae point J th,
Where 1<=J<=total minutiae points
and I!=J.
4. if Y_I=Y_J then DISTANCE: =X_J-X_I
if DISTANCE <0 then
DISTANCE:=DISTANCE×(-1);
else if (Y_I>Y_J) then
if (Y_I-Y_J:=1) or (Y_I-Y_J:=-1)
3. 118
then DISTANCE:=0
else if (Y_I-Y_J:=2) or (Y_I-Y_J:=-2) then
DISTANCE:=Y_I-Y_J
else DISTANCE:=(Y_I-Y_J)-2
DISTANCE:=(DISTANCE*WIDTH)
+(WIDTH-X_J)+X_I
else if (Y_I-Y_J):=1 or(Y_I-Y_J):=-1
then DISTANCE:=0
else if (Y_I-Y_J:=2) or (Y_I-Y_J:=-2)
then DISTANCE:=Y_J-Y_I
else DISTANCE:=(Y_J-Y_I)-2
DISTANCE := (DISTANCE*WIDTH)
+(WIDTH-X_I)+X_J
5. Repeat step 1,2 & 3 for the verified image also.
6. Find the equality of minutiae points (M1 & M2),
as EQ: = matched (M1, M2)/greater (M1, M2);
7. Calculate total number of correlated distances
DISTANCE-of-both.
3. EXPERIMENTAL RESULTS
Table 1: Classifications of Minutiae point of an
image.
Image 1 2 3 4
Contained in image 54 37 32 30
Selected by AFIS 44 43 38 32
Dropped by AFIS 22 12 12 9
False by AFIS 12 18 18 11
Minutiae
Correct selection 32 25 20 21
In table 1, it contains some particular images with
manually detected minutiae points contained in the
image, Minutiae selected by the proposed technique
AFIS, Dropped minutiae points by AFIS, False
minutiae points by AFIS, and Correct minutiae
points acquired by AFIS. Total minutiae points
contained in taken image calculated manually are
used to find out the accuracy of proposed minutiae
finding technique named AFIS. AFIS is a proposed
minutiae finding technique used to find out the
fingerprint feature named minutiae points from
processed image artificially.
Dropped minutiae points are that which are
contained in taken image but not in the image
processed by the AFIS, i.e., failed to recognize that
point as minutiae points or as feature. False minutiae
points are that which are not contained in taken
image as minutiae points but the AFIS select that as
minutiae points. Then correct numbers of minutiae
points are selected by AFIS are those features, which
are contained in original fingerprint image detected
by AFIS.
Table 2: Percentage of different stages of minutiae
points
Image 1 2 3 4
Total Minutiae 54 37 32 30
False
22.22
%
48.69
%
56.22
%
36.67
%
Drop
40.74
%
32.43
%
37.5
%
30.00
%
Percentageof
Correct
Minutiaeby
AFIS
59.26
%
67.57
%
62.5
%
70.00
%
In table 2, it contains the total number of minutiae
points contained in taken image, percentage of false
minutiae points by AFIS, percentage of dropped
minutiae points by AFIS and percentage of correct
minutiae points by AFIS.
3.1 Performance Evaluation
The poor image means the original image and then
extracted minutiae points by AFIS from original
poor image. The improved image is the processed
image, extracted minutiae points by AFIS from
improved image
0
10
20
30
40
50
60
70
80
Image 1 Image 2 Image 3 Image 4
Image ->
NumberofMinutiae->
AFIS Minutiae
Manual Minutiae
Fig. 2: Graph represents the poor versus improved
image curve
0
50
100
150
200
250
Input Filter Enhance Lining Shape
Image processing
Intensity
Image 4
Image 3
Image 2
Image 1
Fig. 3: Graph represents the ridgeline intensity curve
during the various phases of the input image
processing
4. 119
In Fig. 2, it is shown that the number of minutiae
points of poor image and improved image is not
similar but linear and it takes a decision that number
of minutiae points in poor image is less than that of
the improved image, as the poor image is so noisy
compared with that of the improved images.
In Fig. 3, it shows that the intensity variation and
relationship among the intensity variation of the
steps, such as input image, filtered image, enhanced
image, lined image and shaped image.
0
50
100
150
200
250
300
Image File AFIS File
File Types ->
FileSizeinKB->
File Size
Fig. 4: Graph represents image file size Vs AFIS
generated file size
0
5
10
15
20
25
30
35
40
45
50
Image File AFIS File
File Types ->
FileProcesingTimeinSec->
Time
Fig. 5: Graph represents processing time of image
file Vs AFIS generated file size
In Fig. 4, it represents the memory management
criterion of AFIS, where processed image requires a
large amount of storage area, such as 280 kilobytes,
on the contrary, the AFIS generated file requires too
less memory, such as 1 kilobyte.
In Fig. 5, it represents the computational time of
AFIS, where processed image requires a large
amount of computational time, such as 45 second,
on the contrary, the AFIS generated file requires too
less computational time, such as 1 second.
4. CONCLUSION
Every person or organization search for more secure
authentication methods to secure one. A Fingerprint
based security system can provide more secure and
reliable authentication and verification according
users requirements. In this paper a matching
algorithm is provided to authenticate and verify one.
The proposed approach comparatively shows more
efficiency on the case of memory and time
requirements. This matching approach can be
improved by taking whole image in place of
representative part of image.
REFERENCES
[1] FBI. The science of fingerprints. Classification
and uses. U.S. Department of Justice, FBI.
Superintendent of Documents, U.S. Government
Printing Office, Washington, D.C. 20402. Stock
Number 027-001-00033-5 / Catalogue No.
J1.14/2:F49/12/977, 1984.
[2] K. Jain, L. Hong, S. Pankanti, R. Bolle, An
identity-Authentication system using
fingerprints, Proceeding of IEEE, Vol.85, No.9,
1997, pp.1365-1388.
[3] N.K. Ratha, J.H. Connell, and R.M. Bolle, “An
analysis of minutiae matching strength”, Proc.
Third AVBPA, Halmstad, Sweden, June 2001,
pp. 223-228.
[4] S M Mohsen, S M Zamshed Farhan, M M A
Hashem, K M Azharul Hasan and Banani Roy,
Fingerprint Recognition Using a Feature
Selection Technique, proc. 3rd
International
Conferences on Electrical, Electronics and
Computer Engineering (ICEECE 2003), pp 171-
176.
[5] Z. M. Kovacs-Vajna, A fingerprint verification
system based on triangular matching and
dynamic time warping, IEEE transaction on
pattern analysis and machine intelligence,
Vol.22, No.11, November 2000, pp.1266-1276.