Submit Search
Upload
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
•
0 likes
•
5 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i5/IRJET-V9I5222.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
IRJET Journal
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Editor IJMTER
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.
IRJET Journal
IRJET- Shape based Image Classification using Geometric –Properties
IRJET- Shape based Image Classification using Geometric –Properties
IRJET Journal
Introduction To Palmprint Recognition
Introduction To Palmprint Recognition
IRJET Journal
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
theijes
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
ijcsit
A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...
IRJET Journal
Recommended
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
Fingerprint Based Gender Classification by using Fuzzy C- Means and Neural Ne...
IRJET Journal
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Editor IJMTER
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.
IRJET Journal
IRJET- Shape based Image Classification using Geometric –Properties
IRJET- Shape based Image Classification using Geometric –Properties
IRJET Journal
Introduction To Palmprint Recognition
Introduction To Palmprint Recognition
IRJET Journal
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
theijes
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
ijcsit
A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...
IRJET Journal
Multiple features based fingerprint identification system
Multiple features based fingerprint identification system
eSAT Journals
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
IRJET Journal
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
prjpublications
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
prjpublications
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
prj_publication
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
IRJET Journal
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
IJCI JOURNAL
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET Journal
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
IRJET Journal
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET Journal
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
IAEME Publication
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
IAEME Publication
Survey on Various Image Denoising Techniques
Survey on Various Image Denoising Techniques
IRJET Journal
IRJET - Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
IRJET Journal
IRJET- Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
IRJET Journal
Cursive Handwriting Recognition System using Feature Extraction and Artif...
Cursive Handwriting Recognition System using Feature Extraction and Artif...
IRJET Journal
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
IRJET Journal
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
Multiple features based fingerprint identification system
Multiple features based fingerprint identification system
eSAT Journals
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
IRJET Journal
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
prjpublications
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
prjpublications
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
prj_publication
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
IRJET Journal
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
IJCI JOURNAL
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET Journal
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
IRJET Journal
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET Journal
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
IAEME Publication
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
IAEME Publication
Survey on Various Image Denoising Techniques
Survey on Various Image Denoising Techniques
IRJET Journal
IRJET - Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
IRJET Journal
IRJET- Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
IRJET Journal
Cursive Handwriting Recognition System using Feature Extraction and Artif...
Cursive Handwriting Recognition System using Feature Extraction and Artif...
IRJET Journal
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET Journal
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
IRJET Journal
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
Similar to A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
(20)
Multiple features based fingerprint identification system
Multiple features based fingerprint identification system
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Improved Performance of Fuzzy Logic Algorithm for Lane Detection Images
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
IRJET - Underwater Image Enhancement using PCNN and NSCT Fusion
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
Survey on Various Image Denoising Techniques
Survey on Various Image Denoising Techniques
IRJET - Object Detection using Hausdorff Distance
IRJET - Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
IRJET- Object Detection using Hausdorff Distance
Cursive Handwriting Recognition System using Feature Extraction and Artif...
Cursive Handwriting Recognition System using Feature Extraction and Artif...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
A New Deep Learning Based Technique To Detect Copy Move Forgery In Digital Im...
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
simmis5
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
fenichawla
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
rknatarajan
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Recently uploaded
(20)
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 762 A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS Pooja Das1, Prof. Kanjana G2 1 PG student, Dept. of Electronics and communication Engineering, LBSITW, Kerala, India 2Assistant Professor, Dept. of Electronics and Communication Engineering, LBSITW, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Fingerprints are the most important means of identification of an individual due to its uniqueness, permanence, acceptability and collectability. And the minutiae-based representation is the widely accepted fingerprint representation method. However, aconstraintwas taken into account that the minutiae points are entirely insufficient for the latent fingerprint reconstruction. Latent fingerprints are fingerprint impressions leftatcrimescenesby criminals that have been used as primary evidence in criminal investigations. The quality of latent fingerprints is typically poor, with complicated background noise, distortion, and a limited fingerprint region. As a result, image enhancement is required for the reliable identification. A lot of research is being done to automate all of the major processesinthelatent fingerprint identification process. The performance of several state-of-the-art latent fingerprint identification systems, on the other hand, is far from satisfactory. The existence of noise, distortion, little information, and a big database make designing a latent fingerprint identification system extremely difficult. The purpose of this paper is to make a comparative analysis of existing latent fingerprint reconstructionmethods. Key Words: Minutiae, Latent fingerprint, fingerprint reconstruction, image enhancement, fingerprint identification system. 1. INTRODUCTION Fingerprint recognition is one of the most effective method for the identifying an individual. This is used to confirm the identity of a person by comparingthefingerprintimpression of two fingerprints. Even with the new emerging techniques in the field of biometrics, fingerprints have the most reliable physiological traits due to their uniqueness, permanence, collectability and acceptability. Thus, it is used in many applications today in the field of criminology, banking etc. Fingerprints are the valley and ridge patterns on the surface of human fingertips. The uniqueness of fingerprints is characterized by three levels of features such as level-1, level-2 and level-3. Level-1 features areconsideredasmacro level features which include pattern type, ridge orientation and frequency fields, and singular points. Level-2 features refer to the local features that include minutia points in a local region such as ridge endings and ridge bifurcations. And level 3 features consist of all dimensional attributes ata very fine scale, such as width, shape, curvature and edge contours of ridges, pores, as well as otherpermanentdetails. The minutiae (set of minutia points) are the most effective feature among these three types of characteristics and is most typically utilized in fingerprint matching and recognition systems. It was believed that it is not possible to reconstruct a fingerprint image from its extracted minutiae set. However, it has been demonstrated that it is possible to reconstruct the fingerprint image in this way and the reconstructed image can be matched to the original fingerprint image with a reasonable high accuracy. The goal of fingerprint reconstruction from a set of minutiaeisforthe rebuilt fingerprint to look like the original. The existing fingerprint reconstruction methods consist of two major steps: i) Orientation field reconstruction and ii) Ridge pattern reconstruction. Only when the reconstructed image matches the original fingerprint image on the minutiaepointsisconsideredasthe successful fingerprint reconstruction. (a) (b) (c) Fig-1: Illustration of fingerprintfeatures.(a)level 1features: orientation field and singular points, (b) level 2 features: ridge endings (red squares) and ridge bifurcations (blue circles) and (c) level 3 features: pores and dots. 2. REVIEW OF PAPERS Liu et al. [1] proposed a deep convolutional neural network architecture with the nested UNets for automatic segmentation and enhancement of latent fingerprints. For that synthetically generated latent fingerprints are used as the training dataset. Then, a nested UNets is proposed to transform low quality latent image into segmentation mask and high-quality images throughpixels-to-pixelsandend-to- end training. Finally, the test latent fingerprints are segmented and enhanced with the deep nested UNets to improve the image quality. By combiningthelocal andglobal
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 763 losses the enhancement network is optimized, which not only helps to reconstruct the global structure, but also enhance the local ridge details of latent fingerprints. The experimental results and comparison were carried out on NIST SD27 and IIITD-MOLF latent fingerprint databases. Agarwal et al. [2] introduced the usefulness of pores, that is, level 3 features besides minutiae in latent fingerprint matching. An algorithm based on Lindeberg’s automatic scale selection method is proposed for pores extraction in latent fingerprint images. The fusion of minutiae and pores at score level is used to re-rank the minutiae based latent fingerprint matcher. The performance of the proposed algorithm and pores utility are evaluated by observing and comparing the latent recognition accuracy obtained for minutiae matching and matching after fusion. Both pores and minutiae are automatically extracted in latent and reference fingerprints. The experimental results indicated that the fusion improves the latent fingerprint recognition rate in comparison to the minutiae matching. Horapong et al. [3] introduced a novel framework for latent fingerprint enhancement. It uses a progressive feedback mechanism incorporated with a new learning model for anomalous fingerprint pattern detection. In this paper a progressive feedback mechanism is developed for handling automatic latent fingerprintenhancementandintroducedan automatic initial block localization method, which can indicate multiple initial locations. This method helps to reduce the risk of initial start at the wrong location resulting in error propagation. Then, trained the proposed spectral autoencoder by a large set of enhanced spectral patches of high-quality fingerprints. This spectral autoencoder helpsto detect the anomalous fingerprint patterns from outputs of the progressivefeedback mechanism.The errorlocations are then detected and sent back for re-enhancement in the next iteration. This learning model provides a superior scheme for error detection and error correction of the proposed framework. Gupta et al. [4] proposed a novel technique which considers the minutiae density and the orientation field direction for the reconstruction of fingerprint. The public domain databases Fingerprint Verification Competition 2002 (FVC2002) and Fingerprint Verification Competition 2004 (FVC2004) have been used for the experimental results and to validate the suggested methods for the fingerprint reconstruction and enhancement. Both DB_1 and DB_2 databases are used here. The prior knowledge of the ridge structure is used in the algorithmfortheimprovementofthe ridge structure. Two types of dictionaries are used in this method; orientation based and continuous phase-based dictionaries. These dictionaries are used for obtaining the orientation field from the obtained minutiae set. The continuous phase-based dictionary is used for the reconstruction of the ridge pattern.Theridgefrequencyfield used in this proposed method can be either fixed priori or reconstructed image from the ridge frequency around minutiae. By this method the reconstructed fingerprint images do not contain many spurious minutiae in the background and the results for the latent fingerprints are as accurate as they are for the normal data sets.InType-Iattack TAR of 97.95% and 94.05% is obtained on FVC2002 and FVC2004 databases respectively. Manickam et al. [5] proposed an enhancementandmatching of latent fingerprint method using Scale Invariant Feature Transformation (SIFT). It consists of two phases: (i) Latent fingerprint contrast enhancement usingintuitionistictype-2 fuzzy set (ii) Extract the SIFT feature points from the latent fingerprints. Then the proposed algorithm is performed with n- number of images and scores are calculated byusing Euclidean distance. This method was implemented using public domain fingerprint database such as FVC-2004 and IIIT-latent fingerprint. And the experimental results shows that the matching result obtained is better when compared to minutiae points. Bajahzar et al. [6] proposed a method to minimize thesize of fingerprint images and retain the reference points. The method is divided into three parts, the first part is about digital image preprocessing for eliminating the noise, improve the image, convert it into a binary image, detect the skeleton and locate the reference point. The second part concerns about the detection of critical points by the Douglas-Peucker method. And the final part presents the methodology for the fingerprint curvesreconstructionusing the fractal interpolation curves. The experimental result shows that the relative error isbetween2.007%and5.627% and the mean squared error (MSE) is between 0.126 and 0.009 at a small number of iterations. For a greater number of iterations, the ER is between 0.415% and 1.64% and MSE is between 0.000124 and 0.0167. This clearly indicates that the interpolated curves and the original curves are virtually identical and exceedingly similar to each other. Cao et al. [7] proposed a ConvNet (convolutional neural networks) based approach for the estimation of latent orientation field. This idea is to identify the orientation field of a latent patch which is one of a set of representative orientation patterns.Forthis,128representativeorientation patterns are learnt from a large number of orientation fields and 10000 fingerprint patches are selected to train the ConvNet for each orientation pattern. Experiment was carried out on NIST SD27 latent database. Feng et al. [8] utilized the amplitude and frequency modulated (AM-FM) model for fingerprint reconstruction. The phase, which includes a continuous phase and a spiral phase (which corresponds to minutiae), totally defines the minutiae and ridge structure in this method. In the AM-FM model-based fingerprint reconstruction, continuous phase reconstruction is a crucial step. Moreover, the continuous phase was obtained by a piecewise planar model. The
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 764 piecewise planar model, on the other hand, included numerous erroneous details into the reconstructed image, resulting in noticeable blocking effects. The TAR obtained here is 94.12% at 0.1% FAR on FVC2002 DB1_A and 99.7% rank-1 identification rate on NIST SD4 in the case of Type-I attack. Considering Type-II attack TAR is 45.89% at 0.1% FAR on FVC2002 DB1_A and 65.75% rank-1 identification rate on NIST SD4. Ross et al. [9] proposed fingerprint reconstruction from minutiae points. Here the selected minutiae triplets in the template are used for the orientation field estimation. Then, with minutiae and border points, a streamline is traced. Linear Integral Convolution (LIC) is used to impart texture- like appearance to the ridges. Finally, the image is smoothened for obtaining wider ridges. But this algorithm can generate only a partial fingerprint. The performance of this reconstruction algorithm was tested by matching 2000 reconstructed fingerprints against the 2000 original fingerprints in NIST SD4. Type -I attack rate of 23% was reported here. Cappelli et al. [10] introduced a method to reconstruct the grayscale image from minutiae directly.Theorientationfield is estimated by a modified zero-pole model. Then Gabor filtering is iteratively performed from minutiae on an image initialized by the local minutiae pattern. Then the reconstructed image is made more realistic by a rendering step. Here the performance is evaluated based on True Accept Rate (TAR) and False Accept Rate (FAR). An average TAR of 81.49% at 0% FAR was obtained in matching 120 reconstructed fingerprints against the 120 original fingerprints in FVC2002 DB_1. But this algorithm generates many spurious minutiae in the reconstructed images. Hill [11] proposed a fingerprint reconstruction method in which a skeleton image is reconstructed from the minutiae which is then converted into grayscale image. Here the orientation field is generated based on singular points. The zero-pole method is suggested for the estimation of orientation field and partial skeleton reconstructionmethod for ridge pattern recognition. The main disadvantage of this method is that it only generates a partial skeleton image of the fingerprint. 3. CONCLUSION Fingerprint reconstruction aims to recreate the original fingerprint image from a set of input minutiae. The fingerprint images are reconstruction from a givenminutiae set is being studied for three main reasons: (i) for securing minutiae templates, (ii) to increase the interoperability of fingerprint templates generated by various sensor and algorithm combinations, (iii) to improve fingerprint synthesis. Despite of significant improvements in reconstruction techniques over the last ten years, there is still a matching performance gap between the reconstructed and original fingerprint images. This paper is the summary of different latent fingerprint reconstruction methods. ACKNOWLEDGEMENT We would like to thank the Director ofLBSITWandPrincipal of the institution for providing the facilities and support for our work. REFERENCES [1] M. Liu and P. Qian, "Automatic Segmentation and Enhancement of Latent Fingerprints Using Deep Nested UNets," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1709-1719, 2021, doi: 10.1109/TIFS.2020.3039058. [2] Agarwal, Diwakar, and Atul Bansal. "A utility of pores as level 3 features in latent fingerprint identification." Multimedia Tools and Applications 80.15 (2021): 23605-23624. [3] Horapong, Kittipol, Kittinuth Srisutheenon, and VutipongAreekul."ProgressiveandCorrectiveFeedback for Latent Fingerprint Enhancement Using Boosted Spectral Filtering and Spectral Autoencoder." IEEE Access 9 (2021): 96288-96308. [4] Gupta, Rashmi, et al. "Fingerprint image enhancement and reconstruction using the orientation and phase reconstruction." Information Sciences 530 (2020): 201- 218. [5] Manickam, A., Devarasan, E., Manogaran, G. et al. Score level based latent fingerprint enhancement and matching using SIFT feature. Multimed Tools Appl 78, 3065–3085 (2019). https://doi.org/10.1007/s11042-018-5633-1 [6] Bajahzar, Abdullah,andHichemGuedri."Reconstruction of Fingerprint Shape using Fractal Interpolation." Reconstruction 10.5 (2019). [7] K. Cao and A. K. Jain, "Latent orientation field estimation via convolutional neural network," 2015 International Conference on Biometrics (ICB), 2015, pp. 349-356, doi: 10.1109/ICB.2015.7139060. [8] J. Feng and A. K. Jain, “Fingerprint reconstruction: From minutiae to phase,” IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 33, no. 2, pp. 209–223, Feb. 2011. [9] A. Ross, J. Shah, and A. Jain, “From template to image: Reconstructing fingerprintsfromminutiaepoints,”IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 544–560, 2007.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 05 | May 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 765 [10] R. Cappelli, D. Maio, A. Lumini, and D. Maltoni, “Fingerprint image reconstruction from standard templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 9, pp. 1489–1503, 2007. [11] C. Hill, “Risk of masquerade arising from the storage of biometrics,” 2001, Bachelor’s Thesis.
Download now