SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 762
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
Pooja Das1, Prof. Kanjana G2
1 PG student, Dept. of Electronics and communication Engineering, LBSITW, Kerala, India
2Assistant Professor, Dept. of Electronics and Communication Engineering, LBSITW, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Fingerprints are the most important means of
identification of an individual due to its uniqueness,
permanence, acceptability and collectability. And the
minutiae-based representation is the widely accepted
fingerprint representation method. However, aconstraintwas
taken into account that the minutiae points are entirely
insufficient for the latent fingerprint reconstruction. Latent
fingerprints are fingerprint impressions leftatcrimescenesby
criminals that have been used as primary evidence in criminal
investigations. The quality of latent fingerprints is typically
poor, with complicated background noise, distortion, and a
limited fingerprint region. As a result, image enhancement is
required for the reliable identification. A lot of research is
being done to automate all of the major processesinthelatent
fingerprint identification process. The performance of several
state-of-the-art latent fingerprint identification systems, on
the other hand, is far from satisfactory. The existence of noise,
distortion, little information, and a big database make
designing a latent fingerprint identification system extremely
difficult. The purpose of this paper is to make a comparative
analysis of existing latent fingerprint reconstructionmethods.
Key Words: Minutiae, Latent fingerprint, fingerprint
reconstruction, image enhancement, fingerprint
identification system.
1. INTRODUCTION
Fingerprint recognition is one of the most effective method
for the identifying an individual. This is used to confirm the
identity of a person by comparingthefingerprintimpression
of two fingerprints. Even with the new emerging techniques
in the field of biometrics, fingerprints have the most reliable
physiological traits due to their uniqueness, permanence,
collectability and acceptability. Thus, it is used in many
applications today in the field of criminology, banking etc.
Fingerprints are the valley and ridge patterns on the surface
of human fingertips. The uniqueness of fingerprints is
characterized by three levels of features such as level-1,
level-2 and level-3. Level-1 features areconsideredasmacro
level features which include pattern type, ridge orientation
and frequency fields, and singular points. Level-2 features
refer to the local features that include minutia points in a
local region such as ridge endings and ridge bifurcations.
And level 3 features consist of all dimensional attributes ata
very fine scale, such as width, shape, curvature and edge
contours of ridges, pores, as well as otherpermanentdetails.
The minutiae (set of minutia points) are the most effective
feature among these three types of characteristics and is
most typically utilized in fingerprint matching and
recognition systems. It was believed that it is not possible to
reconstruct a fingerprint image from its extracted minutiae
set. However, it has been demonstrated that it is possible to
reconstruct the fingerprint image in this way and the
reconstructed image can be matched to the original
fingerprint image with a reasonable high accuracy. The goal
of fingerprint reconstruction from a set of minutiaeisforthe
rebuilt fingerprint to look like the original.
The existing fingerprint reconstruction methods consist of
two major steps:
i) Orientation field reconstruction and
ii) Ridge pattern reconstruction.
Only when the reconstructed image matches the original
fingerprint image on the minutiaepointsisconsideredasthe
successful fingerprint reconstruction.
(a) (b) (c)
Fig-1: Illustration of fingerprintfeatures.(a)level 1features:
orientation field and singular points, (b) level 2 features:
ridge endings (red squares) and ridge bifurcations (blue
circles) and (c) level 3 features: pores and dots.
2. REVIEW OF PAPERS
Liu et al. [1] proposed a deep convolutional neural network
architecture with the nested UNets for automatic
segmentation and enhancement of latent fingerprints. For
that synthetically generated latent fingerprints are used as
the training dataset. Then, a nested UNets is proposed to
transform low quality latent image into segmentation mask
and high-quality images throughpixels-to-pixelsandend-to-
end training. Finally, the test latent fingerprints are
segmented and enhanced with the deep nested UNets to
improve the image quality. By combiningthelocal andglobal
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 763
losses the enhancement network is optimized, which not
only helps to reconstruct the global structure, but also
enhance the local ridge details of latent fingerprints. The
experimental results and comparison were carried out on
NIST SD27 and IIITD-MOLF latent fingerprint databases.
Agarwal et al. [2] introduced the usefulness of pores, that is,
level 3 features besides minutiae in latent fingerprint
matching. An algorithm based on Lindeberg’s automatic
scale selection method is proposed for pores extraction in
latent fingerprint images. The fusion of minutiae and pores
at score level is used to re-rank the minutiae based latent
fingerprint matcher. The performance of the proposed
algorithm and pores utility are evaluated by observing and
comparing the latent recognition accuracy obtained for
minutiae matching and matching after fusion. Both pores
and minutiae are automatically extracted in latent and
reference fingerprints. The experimental results indicated
that the fusion improves the latent fingerprint recognition
rate in comparison to the minutiae matching.
Horapong et al. [3] introduced a novel framework for latent
fingerprint enhancement. It uses a progressive feedback
mechanism incorporated with a new learning model for
anomalous fingerprint pattern detection. In this paper a
progressive feedback mechanism is developed for handling
automatic latent fingerprintenhancementandintroducedan
automatic initial block localization method, which can
indicate multiple initial locations. This method helps to
reduce the risk of initial start at the wrong location resulting
in error propagation. Then, trained the proposed spectral
autoencoder by a large set of enhanced spectral patches of
high-quality fingerprints. This spectral autoencoder helpsto
detect the anomalous fingerprint patterns from outputs of
the progressivefeedback mechanism.The errorlocations are
then detected and sent back for re-enhancement in the next
iteration. This learning model provides a superior scheme
for error detection and error correction of the proposed
framework.
Gupta et al. [4] proposed a novel technique which considers
the minutiae density and the orientation field direction for
the reconstruction of fingerprint. The public domain
databases Fingerprint Verification Competition 2002
(FVC2002) and Fingerprint Verification Competition 2004
(FVC2004) have been used for the experimental results and
to validate the suggested methods for the fingerprint
reconstruction and enhancement. Both DB_1 and DB_2
databases are used here. The prior knowledge of the ridge
structure is used in the algorithmfortheimprovementofthe
ridge structure. Two types of dictionaries are used in this
method; orientation based and continuous phase-based
dictionaries. These dictionaries are used for obtaining the
orientation field from the obtained minutiae set. The
continuous phase-based dictionary is used for the
reconstruction of the ridge pattern.Theridgefrequencyfield
used in this proposed method can be either fixed priori or
reconstructed image from the ridge frequency around
minutiae. By this method the reconstructed fingerprint
images do not contain many spurious minutiae in the
background and the results for the latent fingerprints are as
accurate as they are for the normal data sets.InType-Iattack
TAR of 97.95% and 94.05% is obtained on FVC2002 and
FVC2004 databases respectively.
Manickam et al. [5] proposed an enhancementandmatching
of latent fingerprint method using Scale Invariant Feature
Transformation (SIFT). It consists of two phases: (i) Latent
fingerprint contrast enhancement usingintuitionistictype-2
fuzzy set (ii) Extract the SIFT feature points from the latent
fingerprints. Then the proposed algorithm is performed
with n- number of images and scores are calculated byusing
Euclidean distance. This method was implemented using
public domain fingerprint database such as FVC-2004 and
IIIT-latent fingerprint. And the experimental results shows
that the matching result obtained is better when compared
to minutiae points.
Bajahzar et al. [6] proposed a method to minimize thesize of
fingerprint images and retain the reference points. The
method is divided into three parts, the first part is about
digital image preprocessing for eliminating the noise,
improve the image, convert it into a binary image, detect the
skeleton and locate the reference point. The second part
concerns about the detection of critical points by the
Douglas-Peucker method. And the final part presents the
methodology for the fingerprint curvesreconstructionusing
the fractal interpolation curves. The experimental result
shows that the relative error isbetween2.007%and5.627%
and the mean squared error (MSE) is between 0.126 and
0.009 at a small number of iterations. For a greater number
of iterations, the ER is between 0.415% and 1.64% and MSE
is between 0.000124 and 0.0167. This clearly indicates that
the interpolated curves and the original curves are virtually
identical and exceedingly similar to each other.
Cao et al. [7] proposed a ConvNet (convolutional neural
networks) based approach for the estimation of latent
orientation field. This idea is to identify the orientation field
of a latent patch which is one of a set of representative
orientation patterns.Forthis,128representativeorientation
patterns are learnt from a large number of orientation fields
and 10000 fingerprint patches are selected to train the
ConvNet for each orientation pattern. Experiment was
carried out on NIST SD27 latent database.
Feng et al. [8] utilized the amplitude and frequency
modulated (AM-FM) model for fingerprint reconstruction.
The phase, which includes a continuous phase and a spiral
phase (which corresponds to minutiae), totally defines the
minutiae and ridge structure in this method. In the AM-FM
model-based fingerprint reconstruction, continuous phase
reconstruction is a crucial step. Moreover, the continuous
phase was obtained by a piecewise planar model. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 764
piecewise planar model, on the other hand, included
numerous erroneous details into the reconstructed image,
resulting in noticeable blocking effects. The TAR obtained
here is 94.12% at 0.1% FAR on FVC2002 DB1_A and 99.7%
rank-1 identification rate on NIST SD4 in the case of Type-I
attack. Considering Type-II attack TAR is 45.89% at 0.1%
FAR on FVC2002 DB1_A and 65.75% rank-1 identification
rate on NIST SD4.
Ross et al. [9] proposed fingerprint reconstruction from
minutiae points. Here the selected minutiae triplets in the
template are used for the orientation field estimation. Then,
with minutiae and border points, a streamline is traced.
Linear Integral Convolution (LIC) is used to impart texture-
like appearance to the ridges. Finally, the image is
smoothened for obtaining wider ridges. But this algorithm
can generate only a partial fingerprint. The performance of
this reconstruction algorithm was tested by matching 2000
reconstructed fingerprints against the 2000 original
fingerprints in NIST SD4. Type -I attack rate of 23% was
reported here.
Cappelli et al. [10] introduced a method to reconstruct the
grayscale image from minutiae directly.Theorientationfield
is estimated by a modified zero-pole model. Then Gabor
filtering is iteratively performed from minutiae on an image
initialized by the local minutiae pattern. Then the
reconstructed image is made more realistic by a rendering
step. Here the performance is evaluated based on True
Accept Rate (TAR) and False Accept Rate (FAR). An average
TAR of 81.49% at 0% FAR was obtained in matching 120
reconstructed fingerprints against the 120 original
fingerprints in FVC2002 DB_1. But this algorithm generates
many spurious minutiae in the reconstructed images.
Hill [11] proposed a fingerprint reconstruction method in
which a skeleton image is reconstructed from the minutiae
which is then converted into grayscale image. Here the
orientation field is generated based on singular points. The
zero-pole method is suggested for the estimation of
orientation field and partial skeleton reconstructionmethod
for ridge pattern recognition. The main disadvantage of this
method is that it only generates a partial skeleton image of
the fingerprint.
3. CONCLUSION
Fingerprint reconstruction aims to recreate the original
fingerprint image from a set of input minutiae. The
fingerprint images are reconstruction from a givenminutiae
set is being studied for three main reasons: (i) for securing
minutiae templates, (ii) to increase the interoperability of
fingerprint templates generated by various sensor and
algorithm combinations, (iii) to improve fingerprint
synthesis. Despite of significant improvements in
reconstruction techniques over the last ten years, there is
still a matching performance gap between the reconstructed
and original fingerprint images. This paper is the summary
of different latent fingerprint reconstruction methods.
ACKNOWLEDGEMENT
We would like to thank the Director ofLBSITWandPrincipal
of the institution for providing the facilities and support for
our work.
REFERENCES
[1] M. Liu and P. Qian, "Automatic Segmentation and
Enhancement of Latent Fingerprints Using Deep Nested
UNets," in IEEE Transactions on Information Forensics
and Security, vol. 16, pp. 1709-1719, 2021, doi:
10.1109/TIFS.2020.3039058.
[2] Agarwal, Diwakar, and Atul Bansal. "A utility of pores as
level 3 features in latent fingerprint
identification." Multimedia Tools and Applications 80.15
(2021): 23605-23624.
[3] Horapong, Kittipol, Kittinuth Srisutheenon, and
VutipongAreekul."ProgressiveandCorrectiveFeedback
for Latent Fingerprint Enhancement Using Boosted
Spectral Filtering and Spectral Autoencoder." IEEE
Access 9 (2021): 96288-96308.
[4] Gupta, Rashmi, et al. "Fingerprint image enhancement
and reconstruction using the orientation and phase
reconstruction." Information Sciences 530 (2020): 201-
218.
[5] Manickam, A., Devarasan, E., Manogaran, G. et al. Score
level based latent fingerprint enhancement and
matching using SIFT feature. Multimed Tools
Appl 78, 3065–3085 (2019).
https://doi.org/10.1007/s11042-018-5633-1
[6] Bajahzar, Abdullah,andHichemGuedri."Reconstruction
of Fingerprint Shape using Fractal
Interpolation." Reconstruction 10.5 (2019).
[7] K. Cao and A. K. Jain, "Latent orientation field estimation
via convolutional neural network," 2015 International
Conference on Biometrics (ICB), 2015, pp. 349-356, doi:
10.1109/ICB.2015.7139060.
[8] J. Feng and A. K. Jain, “Fingerprint reconstruction: From
minutiae to phase,” IEEE Transaction on Pattern
Analysis and Machine Intelligence, vol. 33, no. 2, pp.
209–223, Feb. 2011.
[9] A. Ross, J. Shah, and A. Jain, “From template to image:
Reconstructing fingerprintsfromminutiaepoints,”IEEE
Transactions on Pattern Analysis and Machine
Intelligence, vol. 29, no. 4, pp. 544–560, 2007.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 765
[10] R. Cappelli, D. Maio, A. Lumini, and D. Maltoni,
“Fingerprint image reconstruction from standard
templates,” IEEE Transactions on Pattern Analysis and
Machine Intelligence, vol. 29, no. 9, pp. 1489–1503,
2007.
[11] C. Hill, “Risk of masquerade arising from the storage of
biometrics,” 2001, Bachelor’s Thesis.

More Related Content

Similar to A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS

Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification systemeSAT Journals
 
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection ImagesImproved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection ImagesIRJET Journal
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prj_publication
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsIRJET Journal
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET -  	  Underwater Image Enhancement using PCNN and NSCT FusionIRJET -  	  Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT FusionIRJET Journal
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesIRJET Journal
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
Survey on Various Image Denoising Techniques
Survey on Various Image Denoising TechniquesSurvey on Various Image Denoising Techniques
Survey on Various Image Denoising TechniquesIRJET Journal
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff DistanceIRJET Journal
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff DistanceIRJET Journal
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...IRJET Journal
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...IRJET Journal
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 

Similar to A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS (20)

Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection ImagesImproved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET -  	  Underwater Image Enhancement using PCNN and NSCT FusionIRJET -  	  Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
Survey on Various Image Denoising Techniques
Survey on Various Image Denoising TechniquesSurvey on Various Image Denoising Techniques
Survey on Various Image Denoising Techniques
 
IRJET - Object Detection using Hausdorff Distance
IRJET -  	  Object Detection using Hausdorff DistanceIRJET -  	  Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
 
IRJET- Object Detection using Hausdorff Distance
IRJET-  	  Object Detection using Hausdorff DistanceIRJET-  	  Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
 
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
­­­­Cursive Handwriting Recognition System using Feature Extraction and Artif...
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 762 A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS Pooja Das1, Prof. Kanjana G2 1 PG student, Dept. of Electronics and communication Engineering, LBSITW, Kerala, India 2Assistant Professor, Dept. of Electronics and Communication Engineering, LBSITW, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Fingerprints are the most important means of identification of an individual due to its uniqueness, permanence, acceptability and collectability. And the minutiae-based representation is the widely accepted fingerprint representation method. However, aconstraintwas taken into account that the minutiae points are entirely insufficient for the latent fingerprint reconstruction. Latent fingerprints are fingerprint impressions leftatcrimescenesby criminals that have been used as primary evidence in criminal investigations. The quality of latent fingerprints is typically poor, with complicated background noise, distortion, and a limited fingerprint region. As a result, image enhancement is required for the reliable identification. A lot of research is being done to automate all of the major processesinthelatent fingerprint identification process. The performance of several state-of-the-art latent fingerprint identification systems, on the other hand, is far from satisfactory. The existence of noise, distortion, little information, and a big database make designing a latent fingerprint identification system extremely difficult. The purpose of this paper is to make a comparative analysis of existing latent fingerprint reconstructionmethods. Key Words: Minutiae, Latent fingerprint, fingerprint reconstruction, image enhancement, fingerprint identification system. 1. INTRODUCTION Fingerprint recognition is one of the most effective method for the identifying an individual. This is used to confirm the identity of a person by comparingthefingerprintimpression of two fingerprints. Even with the new emerging techniques in the field of biometrics, fingerprints have the most reliable physiological traits due to their uniqueness, permanence, collectability and acceptability. Thus, it is used in many applications today in the field of criminology, banking etc. Fingerprints are the valley and ridge patterns on the surface of human fingertips. The uniqueness of fingerprints is characterized by three levels of features such as level-1, level-2 and level-3. Level-1 features areconsideredasmacro level features which include pattern type, ridge orientation and frequency fields, and singular points. Level-2 features refer to the local features that include minutia points in a local region such as ridge endings and ridge bifurcations. And level 3 features consist of all dimensional attributes ata very fine scale, such as width, shape, curvature and edge contours of ridges, pores, as well as otherpermanentdetails. The minutiae (set of minutia points) are the most effective feature among these three types of characteristics and is most typically utilized in fingerprint matching and recognition systems. It was believed that it is not possible to reconstruct a fingerprint image from its extracted minutiae set. However, it has been demonstrated that it is possible to reconstruct the fingerprint image in this way and the reconstructed image can be matched to the original fingerprint image with a reasonable high accuracy. The goal of fingerprint reconstruction from a set of minutiaeisforthe rebuilt fingerprint to look like the original. The existing fingerprint reconstruction methods consist of two major steps: i) Orientation field reconstruction and ii) Ridge pattern reconstruction. Only when the reconstructed image matches the original fingerprint image on the minutiaepointsisconsideredasthe successful fingerprint reconstruction. (a) (b) (c) Fig-1: Illustration of fingerprintfeatures.(a)level 1features: orientation field and singular points, (b) level 2 features: ridge endings (red squares) and ridge bifurcations (blue circles) and (c) level 3 features: pores and dots. 2. REVIEW OF PAPERS Liu et al. [1] proposed a deep convolutional neural network architecture with the nested UNets for automatic segmentation and enhancement of latent fingerprints. For that synthetically generated latent fingerprints are used as the training dataset. Then, a nested UNets is proposed to transform low quality latent image into segmentation mask and high-quality images throughpixels-to-pixelsandend-to- end training. Finally, the test latent fingerprints are segmented and enhanced with the deep nested UNets to improve the image quality. By combiningthelocal andglobal
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 763 losses the enhancement network is optimized, which not only helps to reconstruct the global structure, but also enhance the local ridge details of latent fingerprints. The experimental results and comparison were carried out on NIST SD27 and IIITD-MOLF latent fingerprint databases. Agarwal et al. [2] introduced the usefulness of pores, that is, level 3 features besides minutiae in latent fingerprint matching. An algorithm based on Lindeberg’s automatic scale selection method is proposed for pores extraction in latent fingerprint images. The fusion of minutiae and pores at score level is used to re-rank the minutiae based latent fingerprint matcher. The performance of the proposed algorithm and pores utility are evaluated by observing and comparing the latent recognition accuracy obtained for minutiae matching and matching after fusion. Both pores and minutiae are automatically extracted in latent and reference fingerprints. The experimental results indicated that the fusion improves the latent fingerprint recognition rate in comparison to the minutiae matching. Horapong et al. [3] introduced a novel framework for latent fingerprint enhancement. It uses a progressive feedback mechanism incorporated with a new learning model for anomalous fingerprint pattern detection. In this paper a progressive feedback mechanism is developed for handling automatic latent fingerprintenhancementandintroducedan automatic initial block localization method, which can indicate multiple initial locations. This method helps to reduce the risk of initial start at the wrong location resulting in error propagation. Then, trained the proposed spectral autoencoder by a large set of enhanced spectral patches of high-quality fingerprints. This spectral autoencoder helpsto detect the anomalous fingerprint patterns from outputs of the progressivefeedback mechanism.The errorlocations are then detected and sent back for re-enhancement in the next iteration. This learning model provides a superior scheme for error detection and error correction of the proposed framework. Gupta et al. [4] proposed a novel technique which considers the minutiae density and the orientation field direction for the reconstruction of fingerprint. The public domain databases Fingerprint Verification Competition 2002 (FVC2002) and Fingerprint Verification Competition 2004 (FVC2004) have been used for the experimental results and to validate the suggested methods for the fingerprint reconstruction and enhancement. Both DB_1 and DB_2 databases are used here. The prior knowledge of the ridge structure is used in the algorithmfortheimprovementofthe ridge structure. Two types of dictionaries are used in this method; orientation based and continuous phase-based dictionaries. These dictionaries are used for obtaining the orientation field from the obtained minutiae set. The continuous phase-based dictionary is used for the reconstruction of the ridge pattern.Theridgefrequencyfield used in this proposed method can be either fixed priori or reconstructed image from the ridge frequency around minutiae. By this method the reconstructed fingerprint images do not contain many spurious minutiae in the background and the results for the latent fingerprints are as accurate as they are for the normal data sets.InType-Iattack TAR of 97.95% and 94.05% is obtained on FVC2002 and FVC2004 databases respectively. Manickam et al. [5] proposed an enhancementandmatching of latent fingerprint method using Scale Invariant Feature Transformation (SIFT). It consists of two phases: (i) Latent fingerprint contrast enhancement usingintuitionistictype-2 fuzzy set (ii) Extract the SIFT feature points from the latent fingerprints. Then the proposed algorithm is performed with n- number of images and scores are calculated byusing Euclidean distance. This method was implemented using public domain fingerprint database such as FVC-2004 and IIIT-latent fingerprint. And the experimental results shows that the matching result obtained is better when compared to minutiae points. Bajahzar et al. [6] proposed a method to minimize thesize of fingerprint images and retain the reference points. The method is divided into three parts, the first part is about digital image preprocessing for eliminating the noise, improve the image, convert it into a binary image, detect the skeleton and locate the reference point. The second part concerns about the detection of critical points by the Douglas-Peucker method. And the final part presents the methodology for the fingerprint curvesreconstructionusing the fractal interpolation curves. The experimental result shows that the relative error isbetween2.007%and5.627% and the mean squared error (MSE) is between 0.126 and 0.009 at a small number of iterations. For a greater number of iterations, the ER is between 0.415% and 1.64% and MSE is between 0.000124 and 0.0167. This clearly indicates that the interpolated curves and the original curves are virtually identical and exceedingly similar to each other. Cao et al. [7] proposed a ConvNet (convolutional neural networks) based approach for the estimation of latent orientation field. This idea is to identify the orientation field of a latent patch which is one of a set of representative orientation patterns.Forthis,128representativeorientation patterns are learnt from a large number of orientation fields and 10000 fingerprint patches are selected to train the ConvNet for each orientation pattern. Experiment was carried out on NIST SD27 latent database. Feng et al. [8] utilized the amplitude and frequency modulated (AM-FM) model for fingerprint reconstruction. The phase, which includes a continuous phase and a spiral phase (which corresponds to minutiae), totally defines the minutiae and ridge structure in this method. In the AM-FM model-based fingerprint reconstruction, continuous phase reconstruction is a crucial step. Moreover, the continuous phase was obtained by a piecewise planar model. The
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 764 piecewise planar model, on the other hand, included numerous erroneous details into the reconstructed image, resulting in noticeable blocking effects. The TAR obtained here is 94.12% at 0.1% FAR on FVC2002 DB1_A and 99.7% rank-1 identification rate on NIST SD4 in the case of Type-I attack. Considering Type-II attack TAR is 45.89% at 0.1% FAR on FVC2002 DB1_A and 65.75% rank-1 identification rate on NIST SD4. Ross et al. [9] proposed fingerprint reconstruction from minutiae points. Here the selected minutiae triplets in the template are used for the orientation field estimation. Then, with minutiae and border points, a streamline is traced. Linear Integral Convolution (LIC) is used to impart texture- like appearance to the ridges. Finally, the image is smoothened for obtaining wider ridges. But this algorithm can generate only a partial fingerprint. The performance of this reconstruction algorithm was tested by matching 2000 reconstructed fingerprints against the 2000 original fingerprints in NIST SD4. Type -I attack rate of 23% was reported here. Cappelli et al. [10] introduced a method to reconstruct the grayscale image from minutiae directly.Theorientationfield is estimated by a modified zero-pole model. Then Gabor filtering is iteratively performed from minutiae on an image initialized by the local minutiae pattern. Then the reconstructed image is made more realistic by a rendering step. Here the performance is evaluated based on True Accept Rate (TAR) and False Accept Rate (FAR). An average TAR of 81.49% at 0% FAR was obtained in matching 120 reconstructed fingerprints against the 120 original fingerprints in FVC2002 DB_1. But this algorithm generates many spurious minutiae in the reconstructed images. Hill [11] proposed a fingerprint reconstruction method in which a skeleton image is reconstructed from the minutiae which is then converted into grayscale image. Here the orientation field is generated based on singular points. The zero-pole method is suggested for the estimation of orientation field and partial skeleton reconstructionmethod for ridge pattern recognition. The main disadvantage of this method is that it only generates a partial skeleton image of the fingerprint. 3. CONCLUSION Fingerprint reconstruction aims to recreate the original fingerprint image from a set of input minutiae. The fingerprint images are reconstruction from a givenminutiae set is being studied for three main reasons: (i) for securing minutiae templates, (ii) to increase the interoperability of fingerprint templates generated by various sensor and algorithm combinations, (iii) to improve fingerprint synthesis. Despite of significant improvements in reconstruction techniques over the last ten years, there is still a matching performance gap between the reconstructed and original fingerprint images. This paper is the summary of different latent fingerprint reconstruction methods. ACKNOWLEDGEMENT We would like to thank the Director ofLBSITWandPrincipal of the institution for providing the facilities and support for our work. REFERENCES [1] M. Liu and P. Qian, "Automatic Segmentation and Enhancement of Latent Fingerprints Using Deep Nested UNets," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1709-1719, 2021, doi: 10.1109/TIFS.2020.3039058. [2] Agarwal, Diwakar, and Atul Bansal. "A utility of pores as level 3 features in latent fingerprint identification." Multimedia Tools and Applications 80.15 (2021): 23605-23624. [3] Horapong, Kittipol, Kittinuth Srisutheenon, and VutipongAreekul."ProgressiveandCorrectiveFeedback for Latent Fingerprint Enhancement Using Boosted Spectral Filtering and Spectral Autoencoder." IEEE Access 9 (2021): 96288-96308. [4] Gupta, Rashmi, et al. "Fingerprint image enhancement and reconstruction using the orientation and phase reconstruction." Information Sciences 530 (2020): 201- 218. [5] Manickam, A., Devarasan, E., Manogaran, G. et al. Score level based latent fingerprint enhancement and matching using SIFT feature. Multimed Tools Appl 78, 3065–3085 (2019). https://doi.org/10.1007/s11042-018-5633-1 [6] Bajahzar, Abdullah,andHichemGuedri."Reconstruction of Fingerprint Shape using Fractal Interpolation." Reconstruction 10.5 (2019). [7] K. Cao and A. K. Jain, "Latent orientation field estimation via convolutional neural network," 2015 International Conference on Biometrics (ICB), 2015, pp. 349-356, doi: 10.1109/ICB.2015.7139060. [8] J. Feng and A. K. Jain, “Fingerprint reconstruction: From minutiae to phase,” IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 33, no. 2, pp. 209–223, Feb. 2011. [9] A. Ross, J. Shah, and A. Jain, “From template to image: Reconstructing fingerprintsfromminutiaepoints,”IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 544–560, 2007.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 765 [10] R. Cappelli, D. Maio, A. Lumini, and D. Maltoni, “Fingerprint image reconstruction from standard templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 9, pp. 1489–1503, 2007. [11] C. Hill, “Risk of masquerade arising from the storage of biometrics,” 2001, Bachelor’s Thesis.