SlideShare a Scribd company logo
1 of 7
Download to read offline
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1834
www.ijarcet.org
AN EFFECTIVE METHODOLOGY
FOR MINUTIAE BASED
FINGERPRINT MATCHING USING
SINGULARITIES INDEXING
M.Sivapriya, S.Pushpa
Abstract- Fingerprint is one of the most
significant and traditional biometric trait
and its uniqueness are exclusively
determined by the local ridge characteristics
and their relationships. However, in existing
system, due to variations in impression
condition, due to different stress level, ridge
configuration, skin conditions, acquisition
devices, noise etc, the accuracy of the system
get affected. To overcome this problem, more
number of different fingerprint classifiers
are considered. This paper proposes a new
effective methodology using minutiae
matching technique along with singularities
detection and indexing, based on the
occurrences of singular points with
reference to the core point. From the results,
it shows this technique is effective and it is
measured in terms of False Acceptance Rate
(FAR) and False Rejection Rate (FRR).
Index terms: Biometrics, Fingerprint
Recognition, Minutiae Matching, Pattern
based Matching, Singularities indexing
Manuscript Details
Ms. M.Sivapriya, M.tech Networking, Sri
Manakula Vinayagar Engineering College, India.
Dr. S. Pushpa, Professor, Department of CSE, Sri
Manakula Vinayagar Engineering College, India.
I.INTRODUCTION
Biometrics is the identification of an
individual based on physical or
behavioral characteristics of the person.
Traditional methods of establishing a
person’s identity include knowledge
based (e.g., passwords) and token-based
(e.g., ID cards) mechanisms, but these
substitution representation of identity can
easily be faked or easily spoofed
compromising the intended security.
Hence the term biometrics came into
existence, where the behavioral and the
physiological characters are considered to
overcome the drawbacks of the
traditional system.
The physiological characteristics
include eye (retina and iris), fingerprints,
palm-prints, hand geometry and
behavioral characteristics such as
handwritten signature; voiceprint; gait;
gesture; etc which are unique to every
individual . Thus biometrics finds its
application in various fields such as
Commercial, Government, Research and
Military.
The reference template which is an
individual’s first instance to the biometric
system is enrolled into the database. In
this enrolment phase, before storing the
data into the database the image
undergoes many stages. During the first
stage, the image enters the pre processing
phase where the noise removal in the
image and enhancement of the image is
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1835
www.ijarcet.org
done. In the second stage, the images are
segmented to particular areas known as
areas of interest and the processing is
mainly done in that area. Finally, the
image enters the normalization stage
where the image is normalized and the
features are extracted and stored. These
stages are the basic modules for any
common biometric system.
During the matching process a trial
template is obtained from the user and it
undergoes all the stages. The features are
matched with the stored features and the
difference in their match is calculated
with respect to the threshold by which it
is authenticated. For all these stages
various algorithms are used which are
enhanced, changed or modified so that
the accuracy of the system can be
improved. Among all traits [1-2]
fingerprint is a most commonly used
traits for its uniqueness and permanence
over time.
A new effective methodology for
improving the accuracy and efficiency of
a fingerprint verification system by using
consistency of singular points along with
minutiae points even in the distorted
images by estimating the orientation field
of each block to locate the core and delta
points has been proposed, and also a new
proposal of indexing, each template
based on the occurrence of delta point
with reference to the core point is
attempted, and the results are obtained by
implementing in Standardized dataset for
fingerprint FVC[11], FAR and FRR
levels are compared to the existing
systems to analyze the performance of
the proposed method.
The rest of the paper is organized as
follows: Section II describes the basic
modules in fingerprint recognition
system. Section III describes proposed
work in fingerprint recognition system.
And finally, Section IV draws some
results and conclusion.
II. LITERATURE REVIEW
Minutiae based recognition [3,4] has
been one of the most successful
fingerprint recognition techniques used
for personal identification. Minutiae
points are these local ridge characteristics
that occur either at a ridge ending or a
ridge bifurcation. A ridge ending [3,4] is
defined as the point where the ridge ends
abruptly and the ridge bifurcation is the
point where the ridge splits into two or
more branches. The minutiae algorithm
locates the ridge bifurcation and ridge
ending. From the FVC [11] database, the
fingerprint input image (TIFF), locate all
the visible minutiae points. Now the
minutiae points are stores as the string of
numbers for the given input image. This
process is called Fingerprint
Identification or Fingerprint Feature
Extraction. Next step is the authentication
of any given fingerprint image. For this,
an input fingerprint which is to be
validated is extracted and all the minutiae
points are compared with the previously
stored fingerprint template image and
authenticated. The basic steps involved in
the fingerprint recognition system are
mentioned below.
A.Image Binarisation
The input image is segmented to ensure
the removal of noise. For this, the image is
divided into blocks of size 16×16 and the
variance of each block is less than the
threshold value, then it is deleted from the
original figure. This process is carried out
for the whole image.
Original image Normalized image
Fig 1: Normalization
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1836
www.ijarcet.org
B. Image Thinning
Using thinning process, the image is
thinned in order to remove the noise. For
this purpose, the frequency of the local
blocks using Gabor filter based matching
X-signatures of each block are computed
along the direction perpendicular to the
orientation angle in each block. The
window used for this purpose is of size
16×32. The frequency is then computed
by the distance between the peaks
obtained in the X-signatures.
Normalized image Thinned image
Fig 2: Binarisation
C. Minutiae Extraction
The next step is to extract the minutiae
points from the input image. As a result
of thinning process, the skeleton of the
image is formed, in which a ridge is only
a pixel wide. Then minutiae are extracted
using Neighborhood Operation [4],
where ridge endings are those, which
have a pixel value of one as its neighbor
and ridge bifurcations are those which
have a pixel value of more than two ones.
Thinned image Minutiae
Fig 3: Minutiae Extraction
D. Minutiae Matching
The matching phase validates the
similarity metrics between two
fingerprint representations and
authenticates it. The string of numbers
holding the properties of the minutiae
points of reference template are matched
with the corresponding trial template
identifies by the key id.
 1 2, ,....., mT mm m
(1)
 , ,i i i im xy  1..i m (2)
 ' ' '
1 2, ,...., nI mm m
(3)
 ' ' ' '
, ,j j j jm x y  1..j n
(4)
A minutiae in I and a minutiae in
T are considered to be matched if their
spatial and orientation differences are
within specified thresholds and . In
this approach the minutiae sets ate first
registered using a derivative
computation. The matching algorithm
returns a percentage match score, if the
match score is within the threshold limit
the system allows the image else rejected.
III. PROPOSED WORK
The core points are more constant even
for distorted image. So, to add reliability
of the minutiae based matching in the
proposed system, core point is considered
as a prime factor, and is detected using
the centralizing algorithm then the
orientation field estimation of the ridge is
closely detected using the interpolation
algorithm [6], so that the delta points too
can be detected by finding the Poincare
index value. In order to increase the
accuracy even for worst case images [4,
11], singularities detections are used for
indexing based on its occurrences with
reference to core point.
A.Core Point Detection
Initially, the directional flow of ridges
is computed for estimating the orientation
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1837
www.ijarcet.org
field. The image is tilted to 20 degree,
and the sum of angle of difference is
computed after that, with reference to the
sum of angle difference of each block
that’s a pixel surrounded by 8 pixels 3×3.
The centralizing is carried out as shown
in the figure 4
Fig 4: Core Point Detection
B. Delta Point Detection
The delta points are located based in
the Poincare index value [9]. Each block
of 3×3 matrix is considered. The sum of
angle difference of each block is
calculated, and it is called as Poincare
index.
 If the Poincare index is equal to
360 degree (threshold), it is a
core point
 If the Poincare index is greater
than 180 degree (threshold), it is
a delta point.
Fig 5: Delta Point Detection
The Poincare index value is
represented using,
Fig: 6 Poincare Indexing
C. Singularities Indexing
With reference to the core point, the
maximum occurrence of delta points are
noted based on the maximum occurrence
towards the quadrant the flags are set as
below
 00 - Maximum occurrences of
delta points in (x,y)
 01 - Maximum occurrences of
delta points in (-x,y)
 10 - Maximum occurrences of
delta points in (-x,-y)
 11 - Maximum occurrences of
delta points in (x,-y)
Fig: 7 Singularities Indexing
D. Matching
The templates are stored as the string of
numbers in the following patterns in
order to make the matching speedily as
shown below in the figure 8
Fig: 8 Storage Representation of
Template
Flag Cn (xc,yc) n (xn,yn, θn)
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1838
www.ijarcet.org
Where,
Flag – Two byte binary no, to
indicate the maximum occurrence of
delta points with reference to core point.
Cn – Core point number
Xc , Yc – x,y coordinates of core
point.
n – no.of minutiae points
(Xn,Yn,n) – spatial and orientatioin
coordinates of minutiae points.
Once the trial template is accessed, the
two bytes flag is first inspected, based on
the flag and core points x,y co-ordinates,
the occurrence of the delta points are
compared . If it matches, half the score is
allocated to the template and for the
remaining half the minutiae points are
matched with liberal threshold since
singular points which is consistent is
matched with strong threshold. Finally
based on the hamming distance value
between the metrics the match score is
generated and compared with the
threshold and validation is done.
IV. RESULTS AND DISCUSSION
The performance of the system is
evaluated by conducting some
experiments using the standardized
databases. The specification of the
database is given in the Table 1. The
fingerprint images in the database vary in
quality, stress level, orientation etc. For
fingerprint, FVC2006 database with
datasets DB1_A, DB2_A, DB3_A and
DB4_A are used in which more than half
of the database has finger print images of
acceptable quality and remaining images
are highly distorted. The Table2 and 3
shows the comparison of the existing and
proposed algorithm results for two
different thresholds (20 and 25) of the
finger print recognition. The Table shows
that the proposed algorithm shows better
results.
Table 1: Fingerprint Database
Specification
Table 2: Fingerprint Recognition –
Recognition Rate vs Rejection Rate T =
20
For each and every table a graph is
plotted namely Receiver Operator Curve
(ROC) which shows the performance of
the both existing and the proposed
system in terms of False Acceptance Rate
Database
FVC 2006
No. of
Images
No .of
Instances
Size Quality
Db1_A 100 8 640 x 480 Distorted
Db2_A 100 8 640 x 480 Medium
Db3_A 100 8 640 x 480 Medium
Db4_A 100 8 640 x 480 Good
FVC2006
Recognition Rate
(%)
Rejection Rate (%)
Existing Proposed Existing Proposed
DB1_A 97.25 98.15 7.5 6.5
DB2_A 98.15 98.84 11.2 10.3
DB3_A
and
DB4_A
98.75 99.47 9.63 9.15
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1839
www.ijarcet.org
(FAR) AND False Rejection Rate (FRR).
FVC2006
Recognition Rate
(%) Rejection Rate (%)
Existing Proposed Existing Proposed
DB1_A 97.10 97.93 7.9 6.7
DB2_A 97.95 98.64 12.2 11.13
DB3_A
And
DB4_A
98.35 99.25 10.89 9.10
Table 3: Fingerprint Recognition – Recognition
Rate vs Rejection Rate T = 25
Figure 11: ROC GRAPH – Performance
evaluation of Fingerprint Recognition for
DB1_A and DB2_A with T=25
Figure 10: ROC GRAPH – Performance
evaluation of Fingerprint Recognition for DB3_A
and DB4_A with T=20
Figure 9: ROC GRAPH – Performance
evaluation of Fingerprint Recognition for
DB1_A and DB2_A with T=20
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1840
www.ijarcet.org
V.CONCLUSION
The existing system with minutiae
V. CONCLUSION
The existing system with minutiae matching
techniques shows results of 99.25% ., and the
proposed system which includes the singular points
detection and indexing based on the maximum
occurrence of delta points with reference to the core
point shows the results of 99.65% . With reference
to the test cases, it is found that the false acceptance
rate and false rejection rate in minimized, even for
distorted images since constant singularities are
considered.
REFERENCES
[1] Woodward, N.M. Orlans, and P.T. Higgins, “Biometrics”,
The McGraw-Hill Company, Berkeley, California, 2002.
[2] A.K. Jain, P. Flynn and A. Ross, “Handbook of Biometrics”,
Springer, 2007.
[3]D. Maltoni, D. Maio, A.K. Jain, and S.Prabhakar, “Handbook
of Fingerprint Recognition”, Springer Verlag, June 2003.
[4] Sharath Pankanti, Salil Prabhakar, and Anil K.
Jain, “On the Individuality of Fingerprints”,
IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol.24, no.8, August 200
[5] Fanglin Chen, JieZhou, Chunyu Yang,
“Reconstructing Orientation Field From
Fingerprint Minutiae to Improve Minutiae-
Matching Accuracy”, IEEE Transactions On
Image Processing, Vol. 18, No. 7, pp.1665-
1670, July 2007.
[6] Arun Ross, Jidnya Shah, and Anil K . Jain,
“From Template to Image: Reconstructing
Fingerprints from Minutiae Points”, IEEE
Transactions On Pattern Analysis and Machine
Intelligence, Vol. 29, No.4, pp.544-560, April
2007.
[7] Jie Zhou, Fanglin Chen, and Jinwei Gu, “A
Novel Algorithm for Detecting Singular Points
from Fingerprint Images”, IEEE Transactions
On Pattern Analysis and Machine Intelligence,
Vol.31, No.7, pp.1239-1250, July 2009.
[8] Raffaele Cappelli, Alessandra Lumini, Dario
Maio, and Davide Maltoni, “Fingerprint Image
Reconstruction from Standard Templates”,
IEEE Transactions On Pattern Analysis and
Machine Intelligence, Vol.29, No.9, pp.1489-
1503, September 2007.
[9] Raffaele Cappelli, and Davide Maltoni, “On the
Spatial Distribution of Fingerprint
Singularities”, IEEE Transactions On Pattern
Analysis and Machine Intelligence, Vol.31,
No.4, pp.742-748, April 2009.
[10] Raffaele Cappelli, Dario Maio, Davide
Maltoni, James L.Wayman, and Anil K. Jain,
“Performance Evaluation of Fingerprint
Verification Systems”, Vol.28, No.1, January
2006.
Figure 12: ROC GRAPH – Performance
evaluation of Fingerprint Recognition for
DB1_A and DB2_A with T=25

More Related Content

What's hot

Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...idescitation
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Editor IJCATR
 
An evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a reviewAn evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a revieweSAT Journals
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET Journal
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...IJMER
 
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...IOSR Journals
 
Paper id 312201522
Paper id 312201522Paper id 312201522
Paper id 312201522IJRAT
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterIRJET Journal
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...sipij
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformIJERA Editor
 

What's hot (17)

Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
Spot Edge Detection in cDNA Microarray Images using Window based Bi-Dimension...
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
1304.2109
1304.21091304.2109
1304.2109
 
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...Fingerprint Image Compression using Sparse Representation and Enhancement wit...
Fingerprint Image Compression using Sparse Representation and Enhancement wit...
 
An evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a reviewAn evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a review
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency Recognition
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...Mislaid character analysis using 2-dimensional discrete wavelet transform for...
Mislaid character analysis using 2-dimensional discrete wavelet transform for...
 
Bx4301429434
Bx4301429434Bx4301429434
Bx4301429434
 
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
Image Processing for Automated Flaw Detection and CMYK model for Color Image ...
 
Paper id 312201522
Paper id 312201522Paper id 312201522
Paper id 312201522
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median Filter
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
Medical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet TransformMedical Image Fusion Using Discrete Wavelet Transform
Medical Image Fusion Using Discrete Wavelet Transform
 

Viewers also liked

Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Editor IJARCET
 
Ijarcet vol-2-issue-7-2328-2332
Ijarcet vol-2-issue-7-2328-2332Ijarcet vol-2-issue-7-2328-2332
Ijarcet vol-2-issue-7-2328-2332Editor IJARCET
 
Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383Editor IJARCET
 
CertifUCP
CertifUCPCertifUCP
CertifUCPAcncc
 

Viewers also liked (6)

Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404Ijarcet vol-2-issue-4-1398-1404
Ijarcet vol-2-issue-4-1398-1404
 
Ijarcet vol-2-issue-7-2328-2332
Ijarcet vol-2-issue-7-2328-2332Ijarcet vol-2-issue-7-2328-2332
Ijarcet vol-2-issue-7-2328-2332
 
Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383Ijarcet vol-2-issue-7-2378-2383
Ijarcet vol-2-issue-7-2378-2383
 
IOSH
IOSHIOSH
IOSH
 
CertifUCP
CertifUCPCertifUCP
CertifUCP
 
Khelshi
KhelshiKhelshi
Khelshi
 

Similar to 1834 1840

A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsIRJET Journal
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AKARTHIKEYAN V
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507IJRAT
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
Automatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureAutomatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...IJECEIAES
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 

Similar to 1834 1840 (20)

A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
El4301832837
El4301832837El4301832837
El4301832837
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
M017637484
M017637484M017637484
M017637484
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Paper id 36201507
Paper id 36201507Paper id 36201507
Paper id 36201507
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
Automatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureAutomatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone Fracture
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
E017443136
E017443136E017443136
E017443136
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

1834 1840

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1834 www.ijarcet.org AN EFFECTIVE METHODOLOGY FOR MINUTIAE BASED FINGERPRINT MATCHING USING SINGULARITIES INDEXING M.Sivapriya, S.Pushpa Abstract- Fingerprint is one of the most significant and traditional biometric trait and its uniqueness are exclusively determined by the local ridge characteristics and their relationships. However, in existing system, due to variations in impression condition, due to different stress level, ridge configuration, skin conditions, acquisition devices, noise etc, the accuracy of the system get affected. To overcome this problem, more number of different fingerprint classifiers are considered. This paper proposes a new effective methodology using minutiae matching technique along with singularities detection and indexing, based on the occurrences of singular points with reference to the core point. From the results, it shows this technique is effective and it is measured in terms of False Acceptance Rate (FAR) and False Rejection Rate (FRR). Index terms: Biometrics, Fingerprint Recognition, Minutiae Matching, Pattern based Matching, Singularities indexing Manuscript Details Ms. M.Sivapriya, M.tech Networking, Sri Manakula Vinayagar Engineering College, India. Dr. S. Pushpa, Professor, Department of CSE, Sri Manakula Vinayagar Engineering College, India. I.INTRODUCTION Biometrics is the identification of an individual based on physical or behavioral characteristics of the person. Traditional methods of establishing a person’s identity include knowledge based (e.g., passwords) and token-based (e.g., ID cards) mechanisms, but these substitution representation of identity can easily be faked or easily spoofed compromising the intended security. Hence the term biometrics came into existence, where the behavioral and the physiological characters are considered to overcome the drawbacks of the traditional system. The physiological characteristics include eye (retina and iris), fingerprints, palm-prints, hand geometry and behavioral characteristics such as handwritten signature; voiceprint; gait; gesture; etc which are unique to every individual . Thus biometrics finds its application in various fields such as Commercial, Government, Research and Military. The reference template which is an individual’s first instance to the biometric system is enrolled into the database. In this enrolment phase, before storing the data into the database the image undergoes many stages. During the first stage, the image enters the pre processing phase where the noise removal in the image and enhancement of the image is
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1835 www.ijarcet.org done. In the second stage, the images are segmented to particular areas known as areas of interest and the processing is mainly done in that area. Finally, the image enters the normalization stage where the image is normalized and the features are extracted and stored. These stages are the basic modules for any common biometric system. During the matching process a trial template is obtained from the user and it undergoes all the stages. The features are matched with the stored features and the difference in their match is calculated with respect to the threshold by which it is authenticated. For all these stages various algorithms are used which are enhanced, changed or modified so that the accuracy of the system can be improved. Among all traits [1-2] fingerprint is a most commonly used traits for its uniqueness and permanence over time. A new effective methodology for improving the accuracy and efficiency of a fingerprint verification system by using consistency of singular points along with minutiae points even in the distorted images by estimating the orientation field of each block to locate the core and delta points has been proposed, and also a new proposal of indexing, each template based on the occurrence of delta point with reference to the core point is attempted, and the results are obtained by implementing in Standardized dataset for fingerprint FVC[11], FAR and FRR levels are compared to the existing systems to analyze the performance of the proposed method. The rest of the paper is organized as follows: Section II describes the basic modules in fingerprint recognition system. Section III describes proposed work in fingerprint recognition system. And finally, Section IV draws some results and conclusion. II. LITERATURE REVIEW Minutiae based recognition [3,4] has been one of the most successful fingerprint recognition techniques used for personal identification. Minutiae points are these local ridge characteristics that occur either at a ridge ending or a ridge bifurcation. A ridge ending [3,4] is defined as the point where the ridge ends abruptly and the ridge bifurcation is the point where the ridge splits into two or more branches. The minutiae algorithm locates the ridge bifurcation and ridge ending. From the FVC [11] database, the fingerprint input image (TIFF), locate all the visible minutiae points. Now the minutiae points are stores as the string of numbers for the given input image. This process is called Fingerprint Identification or Fingerprint Feature Extraction. Next step is the authentication of any given fingerprint image. For this, an input fingerprint which is to be validated is extracted and all the minutiae points are compared with the previously stored fingerprint template image and authenticated. The basic steps involved in the fingerprint recognition system are mentioned below. A.Image Binarisation The input image is segmented to ensure the removal of noise. For this, the image is divided into blocks of size 16×16 and the variance of each block is less than the threshold value, then it is deleted from the original figure. This process is carried out for the whole image. Original image Normalized image Fig 1: Normalization
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1836 www.ijarcet.org B. Image Thinning Using thinning process, the image is thinned in order to remove the noise. For this purpose, the frequency of the local blocks using Gabor filter based matching X-signatures of each block are computed along the direction perpendicular to the orientation angle in each block. The window used for this purpose is of size 16×32. The frequency is then computed by the distance between the peaks obtained in the X-signatures. Normalized image Thinned image Fig 2: Binarisation C. Minutiae Extraction The next step is to extract the minutiae points from the input image. As a result of thinning process, the skeleton of the image is formed, in which a ridge is only a pixel wide. Then minutiae are extracted using Neighborhood Operation [4], where ridge endings are those, which have a pixel value of one as its neighbor and ridge bifurcations are those which have a pixel value of more than two ones. Thinned image Minutiae Fig 3: Minutiae Extraction D. Minutiae Matching The matching phase validates the similarity metrics between two fingerprint representations and authenticates it. The string of numbers holding the properties of the minutiae points of reference template are matched with the corresponding trial template identifies by the key id.  1 2, ,....., mT mm m (1)  , ,i i i im xy  1..i m (2)  ' ' ' 1 2, ,...., nI mm m (3)  ' ' ' ' , ,j j j jm x y  1..j n (4) A minutiae in I and a minutiae in T are considered to be matched if their spatial and orientation differences are within specified thresholds and . In this approach the minutiae sets ate first registered using a derivative computation. The matching algorithm returns a percentage match score, if the match score is within the threshold limit the system allows the image else rejected. III. PROPOSED WORK The core points are more constant even for distorted image. So, to add reliability of the minutiae based matching in the proposed system, core point is considered as a prime factor, and is detected using the centralizing algorithm then the orientation field estimation of the ridge is closely detected using the interpolation algorithm [6], so that the delta points too can be detected by finding the Poincare index value. In order to increase the accuracy even for worst case images [4, 11], singularities detections are used for indexing based on its occurrences with reference to core point. A.Core Point Detection Initially, the directional flow of ridges is computed for estimating the orientation
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1837 www.ijarcet.org field. The image is tilted to 20 degree, and the sum of angle of difference is computed after that, with reference to the sum of angle difference of each block that’s a pixel surrounded by 8 pixels 3×3. The centralizing is carried out as shown in the figure 4 Fig 4: Core Point Detection B. Delta Point Detection The delta points are located based in the Poincare index value [9]. Each block of 3×3 matrix is considered. The sum of angle difference of each block is calculated, and it is called as Poincare index.  If the Poincare index is equal to 360 degree (threshold), it is a core point  If the Poincare index is greater than 180 degree (threshold), it is a delta point. Fig 5: Delta Point Detection The Poincare index value is represented using, Fig: 6 Poincare Indexing C. Singularities Indexing With reference to the core point, the maximum occurrence of delta points are noted based on the maximum occurrence towards the quadrant the flags are set as below  00 - Maximum occurrences of delta points in (x,y)  01 - Maximum occurrences of delta points in (-x,y)  10 - Maximum occurrences of delta points in (-x,-y)  11 - Maximum occurrences of delta points in (x,-y) Fig: 7 Singularities Indexing D. Matching The templates are stored as the string of numbers in the following patterns in order to make the matching speedily as shown below in the figure 8 Fig: 8 Storage Representation of Template Flag Cn (xc,yc) n (xn,yn, θn)
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1838 www.ijarcet.org Where, Flag – Two byte binary no, to indicate the maximum occurrence of delta points with reference to core point. Cn – Core point number Xc , Yc – x,y coordinates of core point. n – no.of minutiae points (Xn,Yn,n) – spatial and orientatioin coordinates of minutiae points. Once the trial template is accessed, the two bytes flag is first inspected, based on the flag and core points x,y co-ordinates, the occurrence of the delta points are compared . If it matches, half the score is allocated to the template and for the remaining half the minutiae points are matched with liberal threshold since singular points which is consistent is matched with strong threshold. Finally based on the hamming distance value between the metrics the match score is generated and compared with the threshold and validation is done. IV. RESULTS AND DISCUSSION The performance of the system is evaluated by conducting some experiments using the standardized databases. The specification of the database is given in the Table 1. The fingerprint images in the database vary in quality, stress level, orientation etc. For fingerprint, FVC2006 database with datasets DB1_A, DB2_A, DB3_A and DB4_A are used in which more than half of the database has finger print images of acceptable quality and remaining images are highly distorted. The Table2 and 3 shows the comparison of the existing and proposed algorithm results for two different thresholds (20 and 25) of the finger print recognition. The Table shows that the proposed algorithm shows better results. Table 1: Fingerprint Database Specification Table 2: Fingerprint Recognition – Recognition Rate vs Rejection Rate T = 20 For each and every table a graph is plotted namely Receiver Operator Curve (ROC) which shows the performance of the both existing and the proposed system in terms of False Acceptance Rate Database FVC 2006 No. of Images No .of Instances Size Quality Db1_A 100 8 640 x 480 Distorted Db2_A 100 8 640 x 480 Medium Db3_A 100 8 640 x 480 Medium Db4_A 100 8 640 x 480 Good FVC2006 Recognition Rate (%) Rejection Rate (%) Existing Proposed Existing Proposed DB1_A 97.25 98.15 7.5 6.5 DB2_A 98.15 98.84 11.2 10.3 DB3_A and DB4_A 98.75 99.47 9.63 9.15
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1839 www.ijarcet.org (FAR) AND False Rejection Rate (FRR). FVC2006 Recognition Rate (%) Rejection Rate (%) Existing Proposed Existing Proposed DB1_A 97.10 97.93 7.9 6.7 DB2_A 97.95 98.64 12.2 11.13 DB3_A And DB4_A 98.35 99.25 10.89 9.10 Table 3: Fingerprint Recognition – Recognition Rate vs Rejection Rate T = 25 Figure 11: ROC GRAPH – Performance evaluation of Fingerprint Recognition for DB1_A and DB2_A with T=25 Figure 10: ROC GRAPH – Performance evaluation of Fingerprint Recognition for DB3_A and DB4_A with T=20 Figure 9: ROC GRAPH – Performance evaluation of Fingerprint Recognition for DB1_A and DB2_A with T=20
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1840 www.ijarcet.org V.CONCLUSION The existing system with minutiae V. CONCLUSION The existing system with minutiae matching techniques shows results of 99.25% ., and the proposed system which includes the singular points detection and indexing based on the maximum occurrence of delta points with reference to the core point shows the results of 99.65% . With reference to the test cases, it is found that the false acceptance rate and false rejection rate in minimized, even for distorted images since constant singularities are considered. REFERENCES [1] Woodward, N.M. Orlans, and P.T. Higgins, “Biometrics”, The McGraw-Hill Company, Berkeley, California, 2002. [2] A.K. Jain, P. Flynn and A. Ross, “Handbook of Biometrics”, Springer, 2007. [3]D. Maltoni, D. Maio, A.K. Jain, and S.Prabhakar, “Handbook of Fingerprint Recognition”, Springer Verlag, June 2003. [4] Sharath Pankanti, Salil Prabhakar, and Anil K. Jain, “On the Individuality of Fingerprints”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.24, no.8, August 200 [5] Fanglin Chen, JieZhou, Chunyu Yang, “Reconstructing Orientation Field From Fingerprint Minutiae to Improve Minutiae- Matching Accuracy”, IEEE Transactions On Image Processing, Vol. 18, No. 7, pp.1665- 1670, July 2007. [6] Arun Ross, Jidnya Shah, and Anil K . Jain, “From Template to Image: Reconstructing Fingerprints from Minutiae Points”, IEEE Transactions On Pattern Analysis and Machine Intelligence, Vol. 29, No.4, pp.544-560, April 2007. [7] Jie Zhou, Fanglin Chen, and Jinwei Gu, “A Novel Algorithm for Detecting Singular Points from Fingerprint Images”, IEEE Transactions On Pattern Analysis and Machine Intelligence, Vol.31, No.7, pp.1239-1250, July 2009. [8] Raffaele Cappelli, Alessandra Lumini, Dario Maio, and Davide Maltoni, “Fingerprint Image Reconstruction from Standard Templates”, IEEE Transactions On Pattern Analysis and Machine Intelligence, Vol.29, No.9, pp.1489- 1503, September 2007. [9] Raffaele Cappelli, and Davide Maltoni, “On the Spatial Distribution of Fingerprint Singularities”, IEEE Transactions On Pattern Analysis and Machine Intelligence, Vol.31, No.4, pp.742-748, April 2009. [10] Raffaele Cappelli, Dario Maio, Davide Maltoni, James L.Wayman, and Anil K. Jain, “Performance Evaluation of Fingerprint Verification Systems”, Vol.28, No.1, January 2006. Figure 12: ROC GRAPH – Performance evaluation of Fingerprint Recognition for DB1_A and DB2_A with T=25