Till now many algorithms are published for fingerprint recognition and these algorithms has different accuracy rate. This paper consists of information of about fingerprint (biometrics) recognition. The novel algorithm is considered for thinning process. Whole process of recognition is explained from image capturing to verification. The image captured is first converted to gray scale then image enrichment is done then thinning process take over charge which is main process then last process which is also equally important as thinning process is feature extraction which extracts ridge ending, bifurcation, and dot. The accuracy depends on the result of the three main process namely pre-processing, thinning process and feature extraction. Keywords: Arch, loop, whorl, Preprocessing, Thinning Process, Feature Extraction, Ridge.
Review: Biometric and GSM Security for LockersIJERA Editor
In this review paper we will develop biometric (finger or face) and GSM technology for bank lockers. Because in this system bank will collect the biometric data of each person for accessing the lockers because in this system only authenticated person recover the money, documents from the lockers. So the biometric and GSM security has more advantages then other system. Because biometric is stored individual identity of a person and GSM is used for sending and receiving message.
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among to fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records. The main objective of this project is to develop an embedded system, which is used for security applications. The biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in college administration systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, and handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of attendance system using fingerprint sensor and face recognition module is implemented. The tracking module is used here to identify the location of the missing person.
Paper helps to learner to know about various bio metrics and comparison between them. this paper provide researchers a brief information so that they can choose their research area in biometric based on the comparison
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
Frauds attacking the automated teller machine have increased over the decade which has motivated us to use the biometrics for personal identification to procure high level of security and accuracy This paper describes a system that replaces the ATM cards and PINs by the physiological biometric face and iris authentication. In this system during enrolment the genuine users face and iris samples of are retained in the database. The process of transaction begins by getting and matching face and iris patterns. The system will automatically distinguish between real legitimate trait and fake samples. If a fake biometric is recognized a GSM module connected to the controller will message OTP by the system to the registered mobile number. After the valid OTP is entered the user can either withdraw or deposit cash or check his her balance. We have included another biometric called Palm Vien. By using Palm Vein we can access the ATM. Mr. T. Karthikeyan | Ms. Aarthi. S | Ms. Amirtha. P | Ms. Divya. R | Ms. Sowndarya. S ""Enhancing the Cash Point using Multimode Biometric System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21768.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/21768/enhancing-the-cash-point-using-multimode-biometric-system/mr-t-karthikeyan
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Review: Biometric and GSM Security for LockersIJERA Editor
In this review paper we will develop biometric (finger or face) and GSM technology for bank lockers. Because in this system bank will collect the biometric data of each person for accessing the lockers because in this system only authenticated person recover the money, documents from the lockers. So the biometric and GSM security has more advantages then other system. Because biometric is stored individual identity of a person and GSM is used for sending and receiving message.
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among to fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records. The main objective of this project is to develop an embedded system, which is used for security applications. The biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in college administration systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, and handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of attendance system using fingerprint sensor and face recognition module is implemented. The tracking module is used here to identify the location of the missing person.
Paper helps to learner to know about various bio metrics and comparison between them. this paper provide researchers a brief information so that they can choose their research area in biometric based on the comparison
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
Frauds attacking the automated teller machine have increased over the decade which has motivated us to use the biometrics for personal identification to procure high level of security and accuracy This paper describes a system that replaces the ATM cards and PINs by the physiological biometric face and iris authentication. In this system during enrolment the genuine users face and iris samples of are retained in the database. The process of transaction begins by getting and matching face and iris patterns. The system will automatically distinguish between real legitimate trait and fake samples. If a fake biometric is recognized a GSM module connected to the controller will message OTP by the system to the registered mobile number. After the valid OTP is entered the user can either withdraw or deposit cash or check his her balance. We have included another biometric called Palm Vien. By using Palm Vein we can access the ATM. Mr. T. Karthikeyan | Ms. Aarthi. S | Ms. Amirtha. P | Ms. Divya. R | Ms. Sowndarya. S ""Enhancing the Cash Point using Multimode Biometric System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21768.pdf
Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/21768/enhancing-the-cash-point-using-multimode-biometric-system/mr-t-karthikeyan
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This is a Fingerprint based class attendance system in higher institutions, The implementation take attendance of student in a class and give output of student eligibility status at the end of the semester or term
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
Identifying attackers is a major apprehension to both organizations and governments. Recently, the most
used applications for prevention or detection of attacks are intrusion detection systems. Biometrics
technology is simply the measurement and use of the unique characteristics of living humans to distinguish
them from one another and it is more useful as compare to passwords and tokens as they can be lost or
stolen so we have choose the technique biometric authentication. The biometric authentication provides the
ability to require more instances of authentication in such a quick and easy manner that users are not
bothered by the additional requirements. In this paper, we have given a brief introduction about
biometrics. Then we have given the information regarding the intrusion detection system and finally we
have proposed a method which is based on fingerprint recognition which would allow us to detect more
efficiently any abuse of the computer system that is running.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Investigation towards Effectiveness of Present State of Biometric-Based Au...RSIS International
The adoption of biometric-based authentication mechanism has been already initiated a decade back but still in real-life we get to see usage of only unimodal biometrics. Out of all the different forms of biometrics, we see usage of fingerprint as the dominant attribute in contrast to different other attributes e.g. teeth image, palm, facial geometry, retina network, iris, etc. Multimodal biometrics is believed to offered better security compared to unimodal. Although, there are some of the technical advancement in evolving up with new multimodal methodologies, but still commercial usage of such is yet to be seen. Therefore, this manuscripts aims to explore the level of effectiveness in existing approaches of biometric-based authentication system in order to further investigate the unaddressed solution towards this problem. This paper reviews the approaches used for addressing different problems associated with biometrics and discusses about their technical methodologies as well as their limitations.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Software Implementation of Iris Recognition System using MATLABijtsrd
The software implementation of iris recognition system introduces in this paper. This system intends to apply for high security required areas. The demand on security is increasing greatly in these years and biometric recognition gradually becomes a hot field of research. Iris recognition is a branch of biometric recognition method. In thesis, Iris recognition system consists of localization of the iris region and generation of data set of iris images followed by iris pattern recognition. In thesis, a fast algorithm is proposed for the localization of the inner and outer boundaries of the iris region. Located iris is extracted from an eye image, and, after normalization and enhancement, it is represented by a data set. Using this data set a Neural Network NN is used for the classification of iris patterns. The adaptive learning strategy is applied for training of the NN. The implementation of the system is developed with MATLAB. The results of simulations illustrate the effectiveness of the neural system in personal identification. Finally, the accuracy of iris recognition system is tested and evaluated with different iris images. Mo Mo Myint Wai | Nyan Phyo Aung | Lwin Lwin Htay "Software Implementation of Iris Recognition System using MATLAB" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25258.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25258/software-implementation-of-iris-recognition-system-using-matlab/mo-mo-myint-wai
Review on vein enhancement methods for biometric systemeSAT Journals
Abstract
Vein biometric system uses vein inside human body as a unique identification. Researchers have concluded that human vein
pattern is unique to an individual. Vein pattern cannot be stolen or duplicated because it is in the human body. At present, vein
pattern in finger, palm, palm-dorsa and wrist of human are used for biometric system. This paper presents a review on vein
enhancement methods. This paper begins with overview of vein detection and the advantages of vein as biometric modal. Next, the
vein capturing technology to obtain the vein pattern in human body is presented. Finally, preceding works related to vein
enhancement methods are discussed and reviewed
Keywords: biometric, vein, vein detection, vein enhancement, vein pattern.
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This is a Fingerprint based class attendance system in higher institutions, The implementation take attendance of student in a class and give output of student eligibility status at the end of the semester or term
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
Identifying attackers is a major apprehension to both organizations and governments. Recently, the most
used applications for prevention or detection of attacks are intrusion detection systems. Biometrics
technology is simply the measurement and use of the unique characteristics of living humans to distinguish
them from one another and it is more useful as compare to passwords and tokens as they can be lost or
stolen so we have choose the technique biometric authentication. The biometric authentication provides the
ability to require more instances of authentication in such a quick and easy manner that users are not
bothered by the additional requirements. In this paper, we have given a brief introduction about
biometrics. Then we have given the information regarding the intrusion detection system and finally we
have proposed a method which is based on fingerprint recognition which would allow us to detect more
efficiently any abuse of the computer system that is running.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
An Investigation towards Effectiveness of Present State of Biometric-Based Au...RSIS International
The adoption of biometric-based authentication mechanism has been already initiated a decade back but still in real-life we get to see usage of only unimodal biometrics. Out of all the different forms of biometrics, we see usage of fingerprint as the dominant attribute in contrast to different other attributes e.g. teeth image, palm, facial geometry, retina network, iris, etc. Multimodal biometrics is believed to offered better security compared to unimodal. Although, there are some of the technical advancement in evolving up with new multimodal methodologies, but still commercial usage of such is yet to be seen. Therefore, this manuscripts aims to explore the level of effectiveness in existing approaches of biometric-based authentication system in order to further investigate the unaddressed solution towards this problem. This paper reviews the approaches used for addressing different problems associated with biometrics and discusses about their technical methodologies as well as their limitations.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Software Implementation of Iris Recognition System using MATLABijtsrd
The software implementation of iris recognition system introduces in this paper. This system intends to apply for high security required areas. The demand on security is increasing greatly in these years and biometric recognition gradually becomes a hot field of research. Iris recognition is a branch of biometric recognition method. In thesis, Iris recognition system consists of localization of the iris region and generation of data set of iris images followed by iris pattern recognition. In thesis, a fast algorithm is proposed for the localization of the inner and outer boundaries of the iris region. Located iris is extracted from an eye image, and, after normalization and enhancement, it is represented by a data set. Using this data set a Neural Network NN is used for the classification of iris patterns. The adaptive learning strategy is applied for training of the NN. The implementation of the system is developed with MATLAB. The results of simulations illustrate the effectiveness of the neural system in personal identification. Finally, the accuracy of iris recognition system is tested and evaluated with different iris images. Mo Mo Myint Wai | Nyan Phyo Aung | Lwin Lwin Htay "Software Implementation of Iris Recognition System using MATLAB" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25258.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/25258/software-implementation-of-iris-recognition-system-using-matlab/mo-mo-myint-wai
Review on vein enhancement methods for biometric systemeSAT Journals
Abstract
Vein biometric system uses vein inside human body as a unique identification. Researchers have concluded that human vein
pattern is unique to an individual. Vein pattern cannot be stolen or duplicated because it is in the human body. At present, vein
pattern in finger, palm, palm-dorsa and wrist of human are used for biometric system. This paper presents a review on vein
enhancement methods. This paper begins with overview of vein detection and the advantages of vein as biometric modal. Next, the
vein capturing technology to obtain the vein pattern in human body is presented. Finally, preceding works related to vein
enhancement methods are discussed and reviewed
Keywords: biometric, vein, vein detection, vein enhancement, vein pattern.
High Security Human Recognition System using Iris ImagesIDES Editor
In this paper, efficient biometric security
technique for Integer Wavelet Transform based Human
Recognition System (IWTHRS) using Iris images
verification is described. Human Recognition using Iris
images is one of the most secure and authentic among the
other biometrics. The Iris and Pupil boundaries of an Eye
are identified by Integro-Differential Operator. The features
of the normalized Iris are extracted using Integer Wavelet
Transform and Discrete Wavelet Transform. The Hamming
Distance is used for matching of two Iris feature vectors. It
is observed that the values of FAR, FRR, EER and
computation time required are improved in the case of
Integer Wavelet Transform based Human Recognition
System as compared to Discrete Wavelet Transform based
Human Recognition System (DWTHRS).
Before undertaking a project or buying land, commercial real estate developers need to do their due diligence to protect their interests. Sellers have only limited disclosure requirements, so commercial developers must ensure the land is fit for their desired purpose. Learn more in this presentation.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and performance. It is based on several physical human characteristics but the most used technology is the fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in each fingerprint we propose in this article an image preprocessing procedure in order to improve its quality before extracting the necessary information for the comparison phase.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and performance. It is based on several physical human characteristics but the most used technology is the fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in each fingerprint we propose in this article an image preprocessing procedure in order to improve its quality before extracting the necessary information for the comparison phase.
A Survey Based on Fingerprint Matching SystemIJTET Journal
Abstract — Fingerprint is one of the biometric features mostly used for identification and verification. Latent fingerprints are conventionally recovered coming in to existence of crime scenes and are analyzed with active databases of well-known fingerprints for finding criminals. A bulk of matching algorithms with distant uniqueness has been developed in modern years and the algorithms are depending up on minutiae features. The detection of accepted systems tries to find which fingerprint in a database matches the fingerprint needs the matching of its minutiae against the input fingerprint. Since the detection complexity are more minutiae of other fingerprints. Therefore, fingerprint matching system is a higher than verification and detection systems. This paper discussed about the various novel techniques like Minutia Cylinder Code (MCC) algorithm, Minutia score matching and Graphic Processing Unit (GPU). The feature extraction anywhere in the extracted features is sovereign of shift and rotation of the fingerprint. Meanwhile, the matching operation is performed much more easily and higher accuracy.
Biometric system works on behavioral and physiological biometric parameters to spot a person. Every fingerprint contains distinctive options and its recognizing system primarily works on native ridge feature local ridge endings, minutiae, core point, delta, etc. However, fingerprint pictures have poor quality thanks to variations in skin and impression conditions. In personal identification, fingerprint recognition is taken into account the foremost outstanding and reliable technique for matching with keep fingerprints within the information. Minutiae extraction is additional essential step in fingerprint matching. This paper provides plan regarding numerous feature extraction and matching algorithms for fingerprint recognition systems and to seek out that technique is additional reliable and secure.
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In this paper, a microcontroller based prototype of ATM cashbox access system using fingerprint sensor module is implemented. An 8-bit PIC16F877A microcontroller developed by Microchip Technology is used in the system. The necessary software is written in Embedded 'C' and the system is tested.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Measuring memetic algorithm performance on image fingerprints datasetTELKOMNIKA JOURNAL
Personal identification has become one of the most important terms in our society regarding access control, crime and forensic identification, banking and also computer system. The fingerprint is the most used biometric feature caused by its unique, universality and stability. The fingerprint is widely used as a security feature for forensic recognition, building access, automatic teller machine (ATM) authentication or payment. Fingerprint recognition could be grouped in two various forms, verification and identification. Verification compares one on one fingerprint data. Identification is matching input fingerprint with data that saved in the database. In this paper, we measure the performance of the memetic algorithm to process the image fingerprints dataset. Before we run this algorithm, we divide our fingerprints into four groups according to its characteristics and make 15 specimens of data, do four partial tests and at the last of work we measure all computation time.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESIAEME Publication
When it comes to security, we cannot overlook the concept of uniqueness. When we mention uniqueness, what comes to mind in everyone is the uniqueness that exists in every human being. This article explains the security of Cloud Computing through biometric features such as fingerprints, eye iris, retina, etc. First, the characteristics of the fingerprints that make each fingerprint unique and the sensors with which they are read are analyzed. Next, the steps of a fingerprint recognition algorithm and the disadvantages of such a system are analyzed. At the end of the article, an evaluation is made at the security level of the fingerprint recognition system.
Multiple features based fingerprint identification systemeSAT Journals
Abstract Security has become major issue now a day. In order to prevent unauthorized access of confidential data there is a need for accurate and reliable personal identification system. So, biometric based identification system is one of the best solutions. Fingerprint based system is one of oldest biometric identification systems. It is used in many commercial and security applications. Even with advent of technology in fingerprint identification system, the accurate extraction and matching of features from a fingerprint image is a challenging task. The task is much more challenging when fingerprint is affected by non-linear deformations such as rotation and translation. In this paper, fingerprint identification system using improved feature vector based algorithm is presented. In the algorithm Gabor filter is implemented to enhance the fingerprint image. The salient features minutiae (ridge endings) and reference point are extracted from the image. The Euclidian distances between reference point and each minutiae point are calculated and are arranged in ascending order. These are stored in database as feature vectors. The fingerprint matching is done based on the similarity rate between the feature vector of input fingerprint and the feature vectors stored in the database. Algorithms are implemented using Visual Studio 2010 in C++ language using Open CV libraries and tested on the fingerprint database created in the laboratory. Key Words: Fingerprint, Minutiae, Reference point, Euclidian distance, Similarity rate, Identification
GANNON UNIVERSITY
ELECTRICAL AND COMPUTER ENGINEERING DEPARTMENT
FALL2015
GECE 572: DIGITAL SIGNAL PROCESSING
FINGER PRINT RECOGNITION USING MINUTIAE BASED FEATURE
FINAL PROJECT
Prepared by
THADASINA PRUTHVIN REDDY
[email protected]
SALMAN SIDDIQUI
[email protected]
Instructor:
Dr. Ram Sundaram
Table of contents
1. Abstract
2. Introduction
3. Fingerprint matching
4. Pre-processing stage
5. Minutiae extraction stage
6. Post-processing stage
7. Merits & Demerits
8. Applications & future scope
9. Conclusions
10.References
1. Abstract
Nowadays, conventional identification methods such as driver's license, passport, ATM cards and PIN codes do not meet the demands of this wide scale connectivity. Automated biometrics in general, and automated fingerprint authentication in particular, provide efficient solutions to these modern identification problems. Fingerprints have been used for many centuries as a means of identifying people. The fingerprints of individual are unique and are stay unchanged during the life time. Fingerprint matching techniques can be placed into two categories, minutiae-based and correlation based. Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. However, there are some difficulties when using this approach. It is difficult to extract the minutiae points accurately when the fingerprint is of low quality the correlation-based method is able to overcome some of the difficulties of the minutiae-based approach. However, it has some of its own shortcomings. Correlation-based techniques require the precise location of a registration point and are affected by image translation and rotation.
2. Introduction
Biometric recognition refers to the use of distinctive physiological (e.g. fingerprint, palm print, iris, face) and behavioral (e.g. gait, signature) characteristics, called biometric identifiers for recognizing individuals.
Fingerprint recognition is one of the oldest and most reliable biometric used for personal identification. Fingerprint recognition has been used for over 100 years now and has come a long way from tedious manual fingerprint matching. The ancient procedure of matching fingerprints manually was extremely cumbersome and time-consuming and required skilled personnel.
Finger skin is made up of friction ridges and sweat pores all along these ridges. Friction ridges are created during fetal life and only the general shape is genetically defined. The distinguishing nature of physical characteristics of a person is due to both the inherent individual genetic diversity within the human population as well as the random processes affecting the development of the embryo. Friction ridges ...
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Similar to A Study on Fingerprint (biometrics) Recognition (20)
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
1. International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
1
A Study on Fingerprint (biometrics)
Recognition
Urvik Patel
Information Technology department,
Gujarat Technological Univarsity
urvik2010@gmail.com
Gujarat
India.
Abstract: Till now many algorithms are published for fingerprint recognition and these algorithms has different
accuracy rate. This paper consists of information of about fingerprint (biometrics) recognition. The novel
algorithm is considered for thinning process. Whole process of recognition is explained from image capturing to
verification. The image captured is first converted to gray scale then image enrichment is done then thinning
process take over charge which is main process then last process which is also equally important as thinning
process is feature extraction which extracts ridge ending, bifurcation, and dot. The accuracy depends on the result
of the three main process namely pre-processing, thinning process and feature extraction.
Keywords: Arch, loop, whorl, Preprocessing, Thinning Process, Feature Extraction, Ridge.
I. INTRODUCTION
The term biometric arrived from the Greek words bios means life and metrikos which means to measure. The
body characteristics such as face, eyes, hand, finger, irisor voice are used for recognition process. Today thewide variety of
the applications uses this method for verification purpose to confirm the identity of the person. Earlier, passwords and ID
cards were used to let access to secure systems but these methods can easily be breached and person still remain unknown
after doing the crime [1]. There are different types of biometrics methods like Physical:- which mainly deals with
fingerprint, facial, hand geometry, iris, retina, DNA. Behavioral:-which mainly deals with voice and signature recognition.
Fingerprint recognition is one of the commonly usedmethod for personal identification. Fingerprint ridges starts forming in
newly developing baby at third to fourth month of development stage. The ridges formed can be seenon the skin of thumbs
and fingers. The fingerprint is formed on skin so while picking some object it avoids slippage. As per accuracy ratio
misidentification rate is 1/1000 and this is universally accepted for application.
II. FINGERPRINT RECOGNITION
In a fingerprint image the dark lines which are seen are called ridges and the white area between the ridges is
named valleys as it’s like river valley between two mountains.
2. International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
2
Fig I: shows the three mainbasic different patterns seen in the fingerprints
Arch: - It is one type of ridge which is seen like entering from one side and rises in middle forming a arc and exit
from other side.
Loop: - It’s like ridge entering from one side of finger then forming a curve and exiting from the same side
through where it entered.
Whorl:-ridges which form a circle like structure in fingerprint are whorls.
About 65 percent of the total population has loops, 30 percent have whorls, and 5 percent have arches [3].
III. GENERAL METHODS
In order to achieve our goal of matching fingerprints we need to go throughfollowing steps:-
Step 1: -Collect fingerprint image of the person.
Step 2: -Go for image preprocessing.
Step 3: -Go for thinning process.
Step 4: -Go for feature extraction process.
Step 5: -Compare with the collected data
if data match
Then access the system
Else
Go to step 1
Step 6: -Test the implemented algorithm to check its accuracy [4].
IV. FLOW DIAGRAM
Fig II: - shows the flow of the main three processes:-
1. Preprocessing process
Pre-processing process is the process in which all initial steps are taken in consideration the main steps are stated
below:-
3. International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
3
a. Image acquisition.
b. Converting the input image into gray scale.
c. Removing the unwanted parts from the image.
d. Image is placed into exact position.
e. Noise removal operation is performed without effectingthe fingerprint pattern.
f. Image resizing is performed to give exact size.
g. Image enhancement.
2. Thinning Process
Thinning process is the process of reducing the thickness of the lines as much as possible without affecting the
original image pattern. This is main process of fingerprint verification.
Fingerprint thinning process can achieve more performance if:
a. The lines of input fingerprint image to this process should be a single pixel as possible.
b. The lines of inputfingerprint image should not have any discontinuity as possible or should be minimal.
c. The lines of input fingerprint image should be adjusted to its center pixel as possible.
d. All redundancies and unwanted pixels should be removed before inputting to this process.
e. Performing the above steps can lead to more effective output of thinning process.
3. Feature Extraction Process
Feature extraction process which depends on the previous processes and it is the main part of the overall
verification system in which it take out the required characteristics of the fingerprint pattern. Feature extraction process of
fingerprint recognition system is very responsive process and concert delight required for characteristics of the Minutiae;
this can be implemented by the use Minutiae detection, Minutiae enhancement and Minutia extraction. Minutiae in terms
of fingerprint can be considered such as bifurcations, ridge endings and short ridge.
Fig III: shows three main characteristics:
Ridge ending: - It is ends of the ridges which are important as the length can’t be same for all ridges.
Bifurcation: - This is like ridges splitting into two parts from one ridge.
Short ridge:-It’s like small ridges which are considered as a dot while extraction process.
Ridge Ending Bifurcation Short Ridge (Dot)
4. International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
4
Fig 4:- The processing of the image which contains the arc like structure in the fingerprints
V. ADVATAGES
Very high accuracy.
Is the most economical biometric PC user authentication technique.
it is one of the most developed biometrics
Easy to use.
Small storage space required for the biometric template, reducing the size of the database memory required.
It is standardized.
VI. DISADVANTAGES
For some people it is very disturbing, because there is a chance of criminal identification.
It can make mistakes with the dryness or dirt on the finger’s skin and also the fingerprint changes as per age.
Image capturing rate is 500 dots per inch (dpi) and resolution is 8 bits per pixel. Therefore the total space required
approximately is 240 Kb. So compress of image is to be done and compression factor should be high around 10.
VII. APPLICATION
National ID cards, electronic commerce, organizations and banking operations.
Law Enforcement.
Authorize Entry Devices for Buildings.
Computer Network Access.
ATM authorization.
And in many other fields this method is successfully implemented for authentication purpose.
5. International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
5
VIII. CONCLUSION
From the above result we can conclude that fingerprint is universally accepted for security purpose as it possess
higher security then other measures like signature, voice etc. The mismatch of fingerprint can be avoided if the level of
dryness and dirt is less. Also the use of high definition camera can lead to better result.
Accuracy:
Male – Female:-
Females have low image quality in comparison with male subjects.
Right Hand – Left Hand:-
Left hand fingerprint quality is lower than right hand.
By Age of Subject:-
Image Quality degrade as person’s age increases.
REFERENCES
[1]. S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition: Security and Privacy Concerns", IEEE Security &
Privacy, March/April 2003, pp.33-42.
[2]. A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to Biometric Recognition", IEEE Trans. on Circuits and
Systems for Video Technology, Vol.14, No. 1, pp 4-19, January 2004.
[3]. SharathPankanti, “On the Individuality of Fingerprints”, IEEE Transactions on Pattern Analysis and Machine
Intellegence, vol. 24, No.8, August2002.
[4]. MuzhirShaban Al-Ani “A Novel Thinning Algorithm for Fingerprint Recognition”, IT journal of engineering
science 2(2) February 2013, Pages: 43-48.
[5]. AvinashPokhriyalet. al., “MERIT: Minutiae Extraction using Rotation Invariant Thinning”, International Journal
of Engineering Science andTechnology Vol. 2(7), 2010, 3225-3235.
[6]. MuzhirShaban Al-Aniet. al., “An Improved Proposed Approach for Hand Written Arabic Signature
Recognition”, Advances in Computer Scienceand Engineering Volume 7, Number 1, 2011, Pages 25-35
[7]. Sangita K Chaudahri, “An algorithm for fingerprint enhancement & matching”, National Conference on
Emerging Trends in Engineering &Technology (VNCET-30 Mar’12)
[8]. Om PreetiChaurasia, “An Approach to Fingerprint Image Pre-Processing”, I.J. Image, Graphics and Signal
Processing, 2012, 6, 29-35.
[9]. SasanGolabi, SaiidSaadat, Mohammad SadeghHelfroush, and AshkanTashk, “A Novel Thinning Algorithm with
Fingerprint Minutiae ExtractionCapability”, International Journal of Computer Theory and Engineering, Vol. 4,
No. 4, August 2012.
[10]. L. Ravi Kumar1, S. Sai Kumar2, J. Rajendra Prasad3, B. V. Subba Rao4, P. Ravi Prakash5 “ Fingerprint Minutia
Match Using BifurcationTechnique”, S Sai Kumar et al , International Journal of Computer Science &
Communication Networks,Vol 2(4), 478-486, Sep. 2012.
[11]. MuzhirShaban Al-Aniet. al., “Face Recognition Approach Based on Wavelet-Curvelet Technique”, Signal &
Image Processing : An InternationalJournal (SIPIJ) Vol.3, No.2, April 2012
[12]. Eric H. Holder, Jr. et. al. , “The Fingerprint”, 2004, U.S. Department of Justice, Office of Justice Programs, 810
Seventh Street N.W.,WashingtonDC20531 https://www.fas.org/irp/eprint/fingerprint.pdfMuzhirShaban Al-
AniInternational Journal of Engineering Sciences, 2(2) February 201348
6. International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
6
[13]. O’Gorman L., “Overview of fingerprint verification technologies,” Elsevier Information Security Technical
Report, Vol. 3, No. 1, 1998.
[14]. BhanuBir, Tan Xuejun, Computational Algorithms for Fingerprint Recognition. USA: Kluwer Academic
Publishers, 2004.
[15]. http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies