SlideShare a Scribd company logo
International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
1
A Study on Fingerprint (biometrics)
Recognition
Urvik Patel
Information Technology department,
Gujarat Technological Univarsity
urvik2010@gmail.com
Gujarat
India.
Abstract: Till now many algorithms are published for fingerprint recognition and these algorithms has different
accuracy rate. This paper consists of information of about fingerprint (biometrics) recognition. The novel
algorithm is considered for thinning process. Whole process of recognition is explained from image capturing to
verification. The image captured is first converted to gray scale then image enrichment is done then thinning
process take over charge which is main process then last process which is also equally important as thinning
process is feature extraction which extracts ridge ending, bifurcation, and dot. The accuracy depends on the result
of the three main process namely pre-processing, thinning process and feature extraction.
Keywords: Arch, loop, whorl, Preprocessing, Thinning Process, Feature Extraction, Ridge.
I. INTRODUCTION
The term biometric arrived from the Greek words bios means life and metrikos which means to measure. The
body characteristics such as face, eyes, hand, finger, irisor voice are used for recognition process. Today thewide variety of
the applications uses this method for verification purpose to confirm the identity of the person. Earlier, passwords and ID
cards were used to let access to secure systems but these methods can easily be breached and person still remain unknown
after doing the crime [1]. There are different types of biometrics methods like Physical:- which mainly deals with
fingerprint, facial, hand geometry, iris, retina, DNA. Behavioral:-which mainly deals with voice and signature recognition.
Fingerprint recognition is one of the commonly usedmethod for personal identification. Fingerprint ridges starts forming in
newly developing baby at third to fourth month of development stage. The ridges formed can be seenon the skin of thumbs
and fingers. The fingerprint is formed on skin so while picking some object it avoids slippage. As per accuracy ratio
misidentification rate is 1/1000 and this is universally accepted for application.
II. FINGERPRINT RECOGNITION
In a fingerprint image the dark lines which are seen are called ridges and the white area between the ridges is
named valleys as it’s like river valley between two mountains.
International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
2
Fig I: shows the three mainbasic different patterns seen in the fingerprints
 Arch: - It is one type of ridge which is seen like entering from one side and rises in middle forming a arc and exit
from other side.
 Loop: - It’s like ridge entering from one side of finger then forming a curve and exiting from the same side
through where it entered.
 Whorl:-ridges which form a circle like structure in fingerprint are whorls.
About 65 percent of the total population has loops, 30 percent have whorls, and 5 percent have arches [3].
III. GENERAL METHODS
In order to achieve our goal of matching fingerprints we need to go throughfollowing steps:-
Step 1: -Collect fingerprint image of the person.
Step 2: -Go for image preprocessing.
Step 3: -Go for thinning process.
Step 4: -Go for feature extraction process.
Step 5: -Compare with the collected data
if data match
Then access the system
Else
Go to step 1
Step 6: -Test the implemented algorithm to check its accuracy [4].
IV. FLOW DIAGRAM
Fig II: - shows the flow of the main three processes:-
1. Preprocessing process
Pre-processing process is the process in which all initial steps are taken in consideration the main steps are stated
below:-
International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
3
a. Image acquisition.
b. Converting the input image into gray scale.
c. Removing the unwanted parts from the image.
d. Image is placed into exact position.
e. Noise removal operation is performed without effectingthe fingerprint pattern.
f. Image resizing is performed to give exact size.
g. Image enhancement.
2. Thinning Process
Thinning process is the process of reducing the thickness of the lines as much as possible without affecting the
original image pattern. This is main process of fingerprint verification.
Fingerprint thinning process can achieve more performance if:
a. The lines of input fingerprint image to this process should be a single pixel as possible.
b. The lines of inputfingerprint image should not have any discontinuity as possible or should be minimal.
c. The lines of input fingerprint image should be adjusted to its center pixel as possible.
d. All redundancies and unwanted pixels should be removed before inputting to this process.
e. Performing the above steps can lead to more effective output of thinning process.
3. Feature Extraction Process
Feature extraction process which depends on the previous processes and it is the main part of the overall
verification system in which it take out the required characteristics of the fingerprint pattern. Feature extraction process of
fingerprint recognition system is very responsive process and concert delight required for characteristics of the Minutiae;
this can be implemented by the use Minutiae detection, Minutiae enhancement and Minutia extraction. Minutiae in terms
of fingerprint can be considered such as bifurcations, ridge endings and short ridge.
Fig III: shows three main characteristics:
 Ridge ending: - It is ends of the ridges which are important as the length can’t be same for all ridges.
 Bifurcation: - This is like ridges splitting into two parts from one ridge.
 Short ridge:-It’s like small ridges which are considered as a dot while extraction process.
Ridge Ending Bifurcation Short Ridge (Dot)
International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
4
Fig 4:- The processing of the image which contains the arc like structure in the fingerprints
V. ADVATAGES
 Very high accuracy.
 Is the most economical biometric PC user authentication technique.
 it is one of the most developed biometrics
 Easy to use.
 Small storage space required for the biometric template, reducing the size of the database memory required.
 It is standardized.
VI. DISADVANTAGES
 For some people it is very disturbing, because there is a chance of criminal identification.
 It can make mistakes with the dryness or dirt on the finger’s skin and also the fingerprint changes as per age.
 Image capturing rate is 500 dots per inch (dpi) and resolution is 8 bits per pixel. Therefore the total space required
approximately is 240 Kb. So compress of image is to be done and compression factor should be high around 10.
VII. APPLICATION
 National ID cards, electronic commerce, organizations and banking operations.
 Law Enforcement.
 Authorize Entry Devices for Buildings.
 Computer Network Access.
 ATM authorization.
 And in many other fields this method is successfully implemented for authentication purpose.
International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
5
VIII. CONCLUSION
From the above result we can conclude that fingerprint is universally accepted for security purpose as it possess
higher security then other measures like signature, voice etc. The mismatch of fingerprint can be avoided if the level of
dryness and dirt is less. Also the use of high definition camera can lead to better result.
Accuracy:
Male – Female:-
Females have low image quality in comparison with male subjects.
Right Hand – Left Hand:-
Left hand fingerprint quality is lower than right hand.
By Age of Subject:-
Image Quality degrade as person’s age increases.
REFERENCES
[1]. S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition: Security and Privacy Concerns", IEEE Security &
Privacy, March/April 2003, pp.33-42.
[2]. A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to Biometric Recognition", IEEE Trans. on Circuits and
Systems for Video Technology, Vol.14, No. 1, pp 4-19, January 2004.
[3]. SharathPankanti, “On the Individuality of Fingerprints”, IEEE Transactions on Pattern Analysis and Machine
Intellegence, vol. 24, No.8, August2002.
[4]. MuzhirShaban Al-Ani “A Novel Thinning Algorithm for Fingerprint Recognition”, IT journal of engineering
science 2(2) February 2013, Pages: 43-48.
[5]. AvinashPokhriyalet. al., “MERIT: Minutiae Extraction using Rotation Invariant Thinning”, International Journal
of Engineering Science andTechnology Vol. 2(7), 2010, 3225-3235.
[6]. MuzhirShaban Al-Aniet. al., “An Improved Proposed Approach for Hand Written Arabic Signature
Recognition”, Advances in Computer Scienceand Engineering Volume 7, Number 1, 2011, Pages 25-35
[7]. Sangita K Chaudahri, “An algorithm for fingerprint enhancement & matching”, National Conference on
Emerging Trends in Engineering &Technology (VNCET-30 Mar’12)
[8]. Om PreetiChaurasia, “An Approach to Fingerprint Image Pre-Processing”, I.J. Image, Graphics and Signal
Processing, 2012, 6, 29-35.
[9]. SasanGolabi, SaiidSaadat, Mohammad SadeghHelfroush, and AshkanTashk, “A Novel Thinning Algorithm with
Fingerprint Minutiae ExtractionCapability”, International Journal of Computer Theory and Engineering, Vol. 4,
No. 4, August 2012.
[10]. L. Ravi Kumar1, S. Sai Kumar2, J. Rajendra Prasad3, B. V. Subba Rao4, P. Ravi Prakash5 “ Fingerprint Minutia
Match Using BifurcationTechnique”, S Sai Kumar et al , International Journal of Computer Science &
Communication Networks,Vol 2(4), 478-486, Sep. 2012.
[11]. MuzhirShaban Al-Aniet. al., “Face Recognition Approach Based on Wavelet-Curvelet Technique”, Signal &
Image Processing : An InternationalJournal (SIPIJ) Vol.3, No.2, April 2012
[12]. Eric H. Holder, Jr. et. al. , “The Fingerprint”, 2004, U.S. Department of Justice, Office of Justice Programs, 810
Seventh Street N.W.,WashingtonDC20531 https://www.fas.org/irp/eprint/fingerprint.pdfMuzhirShaban Al-
AniInternational Journal of Engineering Sciences, 2(2) February 201348
International Journal of Engineering and Sciences (eISSN-2394-6180),
Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com
6
[13]. O’Gorman L., “Overview of fingerprint verification technologies,” Elsevier Information Security Technical
Report, Vol. 3, No. 1, 1998.
[14]. BhanuBir, Tan Xuejun, Computational Algorithms for Fingerprint Recognition. USA: Kluwer Academic
Publishers, 2004.
[15]. http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies

More Related Content

What's hot

Seminar
SeminarSeminar
Seminar
Nidhi Nayan
 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a survey
eSAT Publishing House
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
Agbona Azeez
 
H03201039049
H03201039049H03201039049
H03201039049
inventionjournals
 
(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry
International Center for Biometric Research
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
eSAT Publishing House
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
RSIS International
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
IJERA Editor
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
ijseajournal
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
IOSR Journals
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
christywong1234
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
ijtsrd
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of BiometricsAnit Thapaliya
 
Review on vein enhancement methods for biometric system
Review on vein enhancement methods for biometric systemReview on vein enhancement methods for biometric system
Review on vein enhancement methods for biometric system
eSAT Journals
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
IDES Editor
 

What's hot (19)

Seminar
SeminarSeminar
Seminar
 
Offline and online signature verification systems a survey
Offline and online signature verification systems a surveyOffline and online signature verification systems a survey
Offline and online signature verification systems a survey
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
H03201039049
H03201039049H03201039049
H03201039049
 
(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry(2010) HBSI and Hand Geometry
(2010) HBSI and Hand Geometry
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...An Investigation towards Effectiveness of Present State of Biometric-Based Au...
An Investigation towards Effectiveness of Present State of Biometric-Based Au...
 
Bw33449453
Bw33449453Bw33449453
Bw33449453
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
Secure Authentication System Using Video Surveillance
Secure Authentication System Using Video SurveillanceSecure Authentication System Using Video Surveillance
Secure Authentication System Using Video Surveillance
 
20120140502012
2012014050201220120140502012
20120140502012
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Introduction of Biometrics
Introduction of BiometricsIntroduction of Biometrics
Introduction of Biometrics
 
Review on vein enhancement methods for biometric system
Review on vein enhancement methods for biometric systemReview on vein enhancement methods for biometric system
Review on vein enhancement methods for biometric system
 
High Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris ImagesHigh Security Human Recognition System using Iris Images
High Security Human Recognition System using Iris Images
 

Viewers also liked

What Kind of Institution
What Kind of InstitutionWhat Kind of Institution
What Kind of InstitutionShannon Brown
 
Thomas Salzano aka Thomas N Salzano - Best Destinations in Europe
Thomas Salzano aka Thomas N Salzano - Best Destinations in EuropeThomas Salzano aka Thomas N Salzano - Best Destinations in Europe
Thomas Salzano aka Thomas N Salzano - Best Destinations in Europe
Thomas Salzano aka Thomas N Salzano
 
Proyecto para Marqueting Digital
Proyecto para Marqueting DigitalProyecto para Marqueting Digital
Proyecto para Marqueting Digital
Raul Matamoros Hernandez
 
Kvalito life science consultant project quality management (frankfurt a m a...
Kvalito life science consultant   project quality management (frankfurt a m a...Kvalito life science consultant   project quality management (frankfurt a m a...
Kvalito life science consultant project quality management (frankfurt a m a...
Daniel Attard
 
koenig-social-media-advertising-case-study
koenig-social-media-advertising-case-studykoenig-social-media-advertising-case-study
koenig-social-media-advertising-case-studyGarima Mathur
 
Prueba kuder c para elección vocacional (respuestas)
Prueba kuder c para elección vocacional (respuestas)Prueba kuder c para elección vocacional (respuestas)
Prueba kuder c para elección vocacional (respuestas)
Alinedark
 
Catalogue cvl steel conduit flexible conduit- ong luon day dien gi- ong ruo...
Catalogue cvl steel conduit   flexible conduit- ong luon day dien gi- ong ruo...Catalogue cvl steel conduit   flexible conduit- ong luon day dien gi- ong ruo...
Catalogue cvl steel conduit flexible conduit- ong luon day dien gi- ong ruo...
tramcvl
 
Rd 11-46-94
Rd 11-46-94Rd 11-46-94
Rd 11-46-94
brianthomes841
 
Endocarditis2 copy
Endocarditis2 copyEndocarditis2 copy
Endocarditis2 copy
lorena diaz
 
3D Technology in the cinema and at home (Samantha Lusby Report )
3D Technology in the cinema and at home (Samantha Lusby Report )3D Technology in the cinema and at home (Samantha Lusby Report )
3D Technology in the cinema and at home (Samantha Lusby Report )Samantha Lusby
 
Resume_Vikash1056@gmail
Resume_Vikash1056@gmailResume_Vikash1056@gmail
Resume_Vikash1056@gmailvikash kumar
 
Twitter Tips & Tricks
Twitter Tips & TricksTwitter Tips & Tricks
Twitter Tips & Tricks
Dom Cushnan
 
Catalogo2017
Catalogo2017Catalogo2017
Catalogo2017
Pakko Difratex
 
Due Diligence Checklist for Commercial Real Estate Developers
Due Diligence Checklist for Commercial Real Estate DevelopersDue Diligence Checklist for Commercial Real Estate Developers
Due Diligence Checklist for Commercial Real Estate Developers
Curley & Rothman, LLC
 

Viewers also liked (15)

What Kind of Institution
What Kind of InstitutionWhat Kind of Institution
What Kind of Institution
 
Thomas Salzano aka Thomas N Salzano - Best Destinations in Europe
Thomas Salzano aka Thomas N Salzano - Best Destinations in EuropeThomas Salzano aka Thomas N Salzano - Best Destinations in Europe
Thomas Salzano aka Thomas N Salzano - Best Destinations in Europe
 
Proyecto para Marqueting Digital
Proyecto para Marqueting DigitalProyecto para Marqueting Digital
Proyecto para Marqueting Digital
 
Triko Décor
Triko DécorTriko Décor
Triko Décor
 
Kvalito life science consultant project quality management (frankfurt a m a...
Kvalito life science consultant   project quality management (frankfurt a m a...Kvalito life science consultant   project quality management (frankfurt a m a...
Kvalito life science consultant project quality management (frankfurt a m a...
 
koenig-social-media-advertising-case-study
koenig-social-media-advertising-case-studykoenig-social-media-advertising-case-study
koenig-social-media-advertising-case-study
 
Prueba kuder c para elección vocacional (respuestas)
Prueba kuder c para elección vocacional (respuestas)Prueba kuder c para elección vocacional (respuestas)
Prueba kuder c para elección vocacional (respuestas)
 
Catalogue cvl steel conduit flexible conduit- ong luon day dien gi- ong ruo...
Catalogue cvl steel conduit   flexible conduit- ong luon day dien gi- ong ruo...Catalogue cvl steel conduit   flexible conduit- ong luon day dien gi- ong ruo...
Catalogue cvl steel conduit flexible conduit- ong luon day dien gi- ong ruo...
 
Rd 11-46-94
Rd 11-46-94Rd 11-46-94
Rd 11-46-94
 
Endocarditis2 copy
Endocarditis2 copyEndocarditis2 copy
Endocarditis2 copy
 
3D Technology in the cinema and at home (Samantha Lusby Report )
3D Technology in the cinema and at home (Samantha Lusby Report )3D Technology in the cinema and at home (Samantha Lusby Report )
3D Technology in the cinema and at home (Samantha Lusby Report )
 
Resume_Vikash1056@gmail
Resume_Vikash1056@gmailResume_Vikash1056@gmail
Resume_Vikash1056@gmail
 
Twitter Tips & Tricks
Twitter Tips & TricksTwitter Tips & Tricks
Twitter Tips & Tricks
 
Catalogo2017
Catalogo2017Catalogo2017
Catalogo2017
 
Due Diligence Checklist for Commercial Real Estate Developers
Due Diligence Checklist for Commercial Real Estate DevelopersDue Diligence Checklist for Commercial Real Estate Developers
Due Diligence Checklist for Commercial Real Estate Developers
 

Similar to A Study on Fingerprint (biometrics) Recognition

PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
Analytical Study On Digital Image Processing Applications
Analytical Study On Digital Image Processing ApplicationsAnalytical Study On Digital Image Processing Applications
Analytical Study On Digital Image Processing Applications
Scott Faria
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
IJTET Journal
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
EECJOURNAL
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
iosrjce
 
M017637484
M017637484M017637484
M017637484
IOSR Journals
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identification
eSAT Publishing House
 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints dataset
TELKOMNIKA JOURNAL
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
Editor IJCATR
 
A04820104
A04820104A04820104
A04820104
IOSR-JEN
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
ShubhamYadav769267
 
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESSECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
IAEME Publication
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
eSAT Journals
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
joyjonna282
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
eSAT Publishing House
 

Similar to A Study on Fingerprint (biometrics) Recognition (20)

PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Analytical Study On Digital Image Processing Applications
Analytical Study On Digital Image Processing ApplicationsAnalytical Study On Digital Image Processing Applications
Analytical Study On Digital Image Processing Applications
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
M017637484
M017637484M017637484
M017637484
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identification
 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints dataset
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
A04820104
A04820104A04820104
A04820104
 
Biometric.docx
Biometric.docxBiometric.docx
Biometric.docx
 
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURESSECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
SECURITY OF CLOUD COMPUTING THROUGH BIOMETRIC FEATURES
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 

Recently uploaded

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
Intella Parts
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
ViniHema
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 

Recently uploaded (20)

Forklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella PartsForklift Classes Overview by Intella Parts
Forklift Classes Overview by Intella Parts
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
power quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptxpower quality voltage fluctuation UNIT - I.pptx
power quality voltage fluctuation UNIT - I.pptx
 
addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 

A Study on Fingerprint (biometrics) Recognition

  • 1. International Journal of Engineering and Sciences (eISSN-2394-6180), Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 1 A Study on Fingerprint (biometrics) Recognition Urvik Patel Information Technology department, Gujarat Technological Univarsity urvik2010@gmail.com Gujarat India. Abstract: Till now many algorithms are published for fingerprint recognition and these algorithms has different accuracy rate. This paper consists of information of about fingerprint (biometrics) recognition. The novel algorithm is considered for thinning process. Whole process of recognition is explained from image capturing to verification. The image captured is first converted to gray scale then image enrichment is done then thinning process take over charge which is main process then last process which is also equally important as thinning process is feature extraction which extracts ridge ending, bifurcation, and dot. The accuracy depends on the result of the three main process namely pre-processing, thinning process and feature extraction. Keywords: Arch, loop, whorl, Preprocessing, Thinning Process, Feature Extraction, Ridge. I. INTRODUCTION The term biometric arrived from the Greek words bios means life and metrikos which means to measure. The body characteristics such as face, eyes, hand, finger, irisor voice are used for recognition process. Today thewide variety of the applications uses this method for verification purpose to confirm the identity of the person. Earlier, passwords and ID cards were used to let access to secure systems but these methods can easily be breached and person still remain unknown after doing the crime [1]. There are different types of biometrics methods like Physical:- which mainly deals with fingerprint, facial, hand geometry, iris, retina, DNA. Behavioral:-which mainly deals with voice and signature recognition. Fingerprint recognition is one of the commonly usedmethod for personal identification. Fingerprint ridges starts forming in newly developing baby at third to fourth month of development stage. The ridges formed can be seenon the skin of thumbs and fingers. The fingerprint is formed on skin so while picking some object it avoids slippage. As per accuracy ratio misidentification rate is 1/1000 and this is universally accepted for application. II. FINGERPRINT RECOGNITION In a fingerprint image the dark lines which are seen are called ridges and the white area between the ridges is named valleys as it’s like river valley between two mountains.
  • 2. International Journal of Engineering and Sciences (eISSN-2394-6180), Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 2 Fig I: shows the three mainbasic different patterns seen in the fingerprints  Arch: - It is one type of ridge which is seen like entering from one side and rises in middle forming a arc and exit from other side.  Loop: - It’s like ridge entering from one side of finger then forming a curve and exiting from the same side through where it entered.  Whorl:-ridges which form a circle like structure in fingerprint are whorls. About 65 percent of the total population has loops, 30 percent have whorls, and 5 percent have arches [3]. III. GENERAL METHODS In order to achieve our goal of matching fingerprints we need to go throughfollowing steps:- Step 1: -Collect fingerprint image of the person. Step 2: -Go for image preprocessing. Step 3: -Go for thinning process. Step 4: -Go for feature extraction process. Step 5: -Compare with the collected data if data match Then access the system Else Go to step 1 Step 6: -Test the implemented algorithm to check its accuracy [4]. IV. FLOW DIAGRAM Fig II: - shows the flow of the main three processes:- 1. Preprocessing process Pre-processing process is the process in which all initial steps are taken in consideration the main steps are stated below:-
  • 3. International Journal of Engineering and Sciences (eISSN-2394-6180), Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 3 a. Image acquisition. b. Converting the input image into gray scale. c. Removing the unwanted parts from the image. d. Image is placed into exact position. e. Noise removal operation is performed without effectingthe fingerprint pattern. f. Image resizing is performed to give exact size. g. Image enhancement. 2. Thinning Process Thinning process is the process of reducing the thickness of the lines as much as possible without affecting the original image pattern. This is main process of fingerprint verification. Fingerprint thinning process can achieve more performance if: a. The lines of input fingerprint image to this process should be a single pixel as possible. b. The lines of inputfingerprint image should not have any discontinuity as possible or should be minimal. c. The lines of input fingerprint image should be adjusted to its center pixel as possible. d. All redundancies and unwanted pixels should be removed before inputting to this process. e. Performing the above steps can lead to more effective output of thinning process. 3. Feature Extraction Process Feature extraction process which depends on the previous processes and it is the main part of the overall verification system in which it take out the required characteristics of the fingerprint pattern. Feature extraction process of fingerprint recognition system is very responsive process and concert delight required for characteristics of the Minutiae; this can be implemented by the use Minutiae detection, Minutiae enhancement and Minutia extraction. Minutiae in terms of fingerprint can be considered such as bifurcations, ridge endings and short ridge. Fig III: shows three main characteristics:  Ridge ending: - It is ends of the ridges which are important as the length can’t be same for all ridges.  Bifurcation: - This is like ridges splitting into two parts from one ridge.  Short ridge:-It’s like small ridges which are considered as a dot while extraction process. Ridge Ending Bifurcation Short Ridge (Dot)
  • 4. International Journal of Engineering and Sciences (eISSN-2394-6180), Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 4 Fig 4:- The processing of the image which contains the arc like structure in the fingerprints V. ADVATAGES  Very high accuracy.  Is the most economical biometric PC user authentication technique.  it is one of the most developed biometrics  Easy to use.  Small storage space required for the biometric template, reducing the size of the database memory required.  It is standardized. VI. DISADVANTAGES  For some people it is very disturbing, because there is a chance of criminal identification.  It can make mistakes with the dryness or dirt on the finger’s skin and also the fingerprint changes as per age.  Image capturing rate is 500 dots per inch (dpi) and resolution is 8 bits per pixel. Therefore the total space required approximately is 240 Kb. So compress of image is to be done and compression factor should be high around 10. VII. APPLICATION  National ID cards, electronic commerce, organizations and banking operations.  Law Enforcement.  Authorize Entry Devices for Buildings.  Computer Network Access.  ATM authorization.  And in many other fields this method is successfully implemented for authentication purpose.
  • 5. International Journal of Engineering and Sciences (eISSN-2394-6180), Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 5 VIII. CONCLUSION From the above result we can conclude that fingerprint is universally accepted for security purpose as it possess higher security then other measures like signature, voice etc. The mismatch of fingerprint can be avoided if the level of dryness and dirt is less. Also the use of high definition camera can lead to better result. Accuracy: Male – Female:- Females have low image quality in comparison with male subjects. Right Hand – Left Hand:- Left hand fingerprint quality is lower than right hand. By Age of Subject:- Image Quality degrade as person’s age increases. REFERENCES [1]. S. Prabhakar, S. Pankanti, A. K. Jain, "Biometric Recognition: Security and Privacy Concerns", IEEE Security & Privacy, March/April 2003, pp.33-42. [2]. A. K. Jain, A. Ross, S. Prabhakar, "An Introduction to Biometric Recognition", IEEE Trans. on Circuits and Systems for Video Technology, Vol.14, No. 1, pp 4-19, January 2004. [3]. SharathPankanti, “On the Individuality of Fingerprints”, IEEE Transactions on Pattern Analysis and Machine Intellegence, vol. 24, No.8, August2002. [4]. MuzhirShaban Al-Ani “A Novel Thinning Algorithm for Fingerprint Recognition”, IT journal of engineering science 2(2) February 2013, Pages: 43-48. [5]. AvinashPokhriyalet. al., “MERIT: Minutiae Extraction using Rotation Invariant Thinning”, International Journal of Engineering Science andTechnology Vol. 2(7), 2010, 3225-3235. [6]. MuzhirShaban Al-Aniet. al., “An Improved Proposed Approach for Hand Written Arabic Signature Recognition”, Advances in Computer Scienceand Engineering Volume 7, Number 1, 2011, Pages 25-35 [7]. Sangita K Chaudahri, “An algorithm for fingerprint enhancement & matching”, National Conference on Emerging Trends in Engineering &Technology (VNCET-30 Mar’12) [8]. Om PreetiChaurasia, “An Approach to Fingerprint Image Pre-Processing”, I.J. Image, Graphics and Signal Processing, 2012, 6, 29-35. [9]. SasanGolabi, SaiidSaadat, Mohammad SadeghHelfroush, and AshkanTashk, “A Novel Thinning Algorithm with Fingerprint Minutiae ExtractionCapability”, International Journal of Computer Theory and Engineering, Vol. 4, No. 4, August 2012. [10]. L. Ravi Kumar1, S. Sai Kumar2, J. Rajendra Prasad3, B. V. Subba Rao4, P. Ravi Prakash5 “ Fingerprint Minutia Match Using BifurcationTechnique”, S Sai Kumar et al , International Journal of Computer Science & Communication Networks,Vol 2(4), 478-486, Sep. 2012. [11]. MuzhirShaban Al-Aniet. al., “Face Recognition Approach Based on Wavelet-Curvelet Technique”, Signal & Image Processing : An InternationalJournal (SIPIJ) Vol.3, No.2, April 2012 [12]. Eric H. Holder, Jr. et. al. , “The Fingerprint”, 2004, U.S. Department of Justice, Office of Justice Programs, 810 Seventh Street N.W.,WashingtonDC20531 https://www.fas.org/irp/eprint/fingerprint.pdfMuzhirShaban Al- AniInternational Journal of Engineering Sciences, 2(2) February 201348
  • 6. International Journal of Engineering and Sciences (eISSN-2394-6180), Volume -1 Isuue-2, Feb-2015, Available at www.knowledgecuddle.com 6 [13]. O’Gorman L., “Overview of fingerprint verification technologies,” Elsevier Information Security Technical Report, Vol. 3, No. 1, 1998. [14]. BhanuBir, Tan Xuejun, Computational Algorithms for Fingerprint Recognition. USA: Kluwer Academic Publishers, 2004. [15]. http://biometrics.pbworks.com/w/page/14811349/Advantages%20and%20disadvantages%20of%20technologies