SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 01-05
www.iosrjournals.org
www.iosrjournals.org 1 | Page
Developmentof Image Enhancement and the Feature Extraction
Techniques on Rural Fingerprint Images to Improve the
Recognition and the Authentication Rate.
Babasaheb V. Bhalerao, Ramesh R. Manza.
Department of Computer Science and Information Technology,
Dr. Babasaheb Ambedkar Marathwada University, Aurangabad (MS) India.
Abstract: Fingerprint recognition is one of the most popular and successful methods used for person
identification which takes advantage of the fact that the fingerprint has some unique characteristics called
minutiae which are points where a extracts the ridges and bifurcation from a fingerprint image. A critical step in
studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images.
However fingerprint images are rarely of perfect quality. Fingerprint image enhancement techniques are
employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations.
Fingerprint matching is often affected by the presence of intrinsically low quality fingerprints and various
distortions introduced during the acquisition process. In this paper we have used the rural fingerprints
database which is collected from IIIT Delhi research lab which consists of 1634 fingerprints images. Out of
which we have preprocess 600 sample preprocessing extracts the ridges and bifurcation from a fingerprint
image and tried to improve the quality of images. The Resultant images quality is verified by using different
quality measures.
Keywords: minutiae extraction, extracts the ridges and bifurcation, rural fingerprint authentication.
I. Introduction
Fingerprint matching is among the most widely used biometric technologies with a broad range of both
government and civilian applications such as a UIDAI, passport control, ATM/credit card, The key challenge in
fingerprint matching is getting a match decision between a pair of fingerprints from the same finger under
various within-class variations. Our implementation mainly noisy rural fingerprint images enhancement, image
segmentation, minutiae extraction.
Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a
match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an
individual and verify their identity. Because of their uniqueness and consistency over time, fingerprints have
been used for over a century.
The word “Biometrics” comes from the Greek language and is derived from the words “Biomeans life
and „metric‟ means to be measure, so biometrics is a field of science and technology used to be measure life
characteristics. Biometrics System uses physical and behavioral parameters for person identification. Biometric
data are unique for each individual person, even two identical twins. Basically we can use physical parameters
than behavioral because behavioral parameters are changed with age and environment whereas physical
parameters never changed during whole life. Fingerprint matching techniques are divided into three main types:
*Correlation based matching
* Minutiae based matching
* Pattern based matching.
Minutiae based matching is the most popular and most widely used technique for fingerprint matching. This
technique refers the analysis of some unique point’s exhibit on fingerprint called minutiae points. The detection
and representation of these points are also known as minutiae set. There are two basic minutiae points are
majorly used for matching in minutiae based technique, that is Ridge-end, which means the end of the ridges
and Bifurcation points, which means one single ridge divided into two ridges.
Figure 1.Ridges-end point, Bifurcation point
Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint
www.iosrjournals.org 2 | Page
II. Fingerprint Recognition:
Fingerprint recognition system can be used to analyze two fingerprint images one is original image and
another one is template image stored in the database. Fingerprint recognition is mainly divided in two sub-parts:
one is verification system and other is identification system. Fingerprint verification is used to verify the
authenticity of one person with one to one matching of the database, while fingerprint identification is used to
specify the person identification with one to n matching, fingerprint verification is rapid execution method than
fingerprint identification. Fingerprint identification is especially serviceable for criminal investigation cases.
MATLAB software provides the best image processing toolbox. Digital fingerprint images can analyze easily
using MATLAB. In this paper we present the result of implementation of algorithm on MATLAB.
III. Methodology
The complete algorithm is as follows: Input: Introduce fingerprint Image. Output: Matching score or total
number of both ridges-end and bifurcation points.
Figure2.Rural Fingerprint Original Images
Step1: Acquisition of fingerprint image. Step2: Convert image into binary form.
Step3: Apply thinning process on the binary image.
Step4: Find total numbers of ridges-end points and bifurcation points.
Step5: Match both minutiae points for fingerprint verification.
Figure 3.Flow
Pre-Processing:
Pre-processing is the process of alter a gray scale image to a black and white image. In MATLAB, a
value of one represents that the pixel is white and value of zero represents that the pixel is black. This
modification of gray scale image to binary image is executed by using threshold process to the image. When a
threshold process is applied to an image, each pixel values are analyzed to the input threshold. Those pixel
values which are smaller than the threshold value is place to zero and those pixel value which are greater than
the threshold value is place to one. At the end of this process each pixel values within the image are either zero
or one, and the image has been modifying to binary form. After this conversion the ridges in the fingerprint are
highlighted with black color while valleys are highlighted with white color.
Minutiae Extraction:
In fingerprint extraction have an accurate representation of the fingerprint image is critical to automatic
fingerprint identification systems, because most deployed commercial&non commercial large-scale systems are
dependent on feature-based matching Among all the fingerprint features, minutia point features with
corresponding orientation maps are unique enough to differenceamongst fingerprints robustly; the minutiae
feature representation reduces the complex fingerprint recognition problem to a point pattern matching problem.
In order to achieve high-accuracy minutiae with varied quality fingerprint images, segmentation algorithm needs
to separate foreground from noisy background which includes all ridge-valley regions and not the background.
Image Acquisition Pre-Processing
CalculationResult
Fingerpr
int
Image
Binary
Count
Total No
of
Ridges-
end
Points
and
Bifurcati
on
Points
Minutia
e Points
Matchin
g
Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint
www.iosrjournals.org 3 | Page
Image enhancement andFeature Extraction Techniques algorithm needs to keep the original ridge flow pattern
without altering the singularity, join broken ridges, clean artifacts between pseudo-parallel ridges, and not
introduce false information. Finally minutiae detection algorithm needs to locate efficiently and accurately the
minutiae points
Figure 4.Input Image after Bifurcations
Thinning:
After binarization, next leading pre-processing technique used for matching process is thinning. Image
thinning is the process ofdecrease thethickness of all ridges lines intosingle pixelwidth. Thinning process does
not convert the original x, y location and angle of direction of the minutiae points of the image, which assure the
true calculation of minutiae points. It is also known as Block Filtering. Ridges thinning are used to destruct the
extra pixel of ridges till the ridges are just one pixel broad this is done using MATLAB.
Figure 5Input images after thinning Minutiae
Input images after thinningMinutiae extraction:
Rural Fingerprint analysis using minutiae extraction process with the combination of several
techniques for image pre-processing and post-processing steps to improve the input image until it is suitable for
minutiae extraction. Preprocessing steps are crucial for further minutiae extraction. The Minutiae Extraction is
done by
Points Searching:
The proposed algorithm detects the Minutiae Points on the basis of Ridges are disconnected at arbitrary
point: Ridge-end Point and Ridges are associated with bifurcations: Bifurcation Point.
The classification of ridge-end or bifurcation points is done in MATLAB by creating matrix. If the
central pixel is one, has only one neighbor pixel that is ridge-end point. Whereas, if the central pixel is one, has
two neighbor pixel that is bifurcation point.
Minutiae Matching:
Image Acquisition
Fingerprint image.BMP = Input Image acquisition from reader.
Timage BMP = Template Image retrieve from database.
Computation of Value:
This step is a very important part of fingerprint matching. After the detection of minutiae points,
matching algorithm require to calculate total number of available points in the fingerprint image separately. To
perform this computation two counter variables are used to count both ridge-end and bifurcation points.
Minutiae extraction Bifurcations value
Table 1: Minutiae extraction Bifurcations value
Sr .No Name of Fingerprint Image Bifurcation
(Value)
1 BBrural fingerprint01_1bmp 522
2 BBrural fingerprint01_2bmp 699
3 BBrural fingerprint01_3bmp 578
4 BBrural fingerprint01_4bmp 701
5 BBrural fingerprint01_5bmp 380
6 BBrural fingerprint01_6bmp 488
7 BBrural fingerprint01_7bmp 623
8 BBrural fingerprint01_8bmp 690
9 BBrural fingerprint01_9bmp 362
Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint
www.iosrjournals.org 4 | Page
10 BBrural fingerprint01_10bmp 296
11 BBrural fingerprint2_1bmp 830
12 BBrural fingerprint2_2bmp 760
13 BBrural fingerprint2_3bmp 857
14 BBrural fingerprint2_4bmp 773
15 BBrural fingerprint2_5bmp 811
16 BBrural fingerprint2_6bmp 651
17 BBrural fingerprint2_7bmp 664
18 BBrural fingerprint2_8bmp 752
19 BBrural fingerprint2_9bmp 675
20 BBrural fingerprint2_10bmp 775
21 BBrural fingerprint3_1bmp 788
22 BBrural fingerprint3_2bmp 685
23 BBrural fingerprint3_3bmp 786
24 BBrural fingerprint3_4bmp 942
25 BBrural fingerprint3_5bmp 957
26 BBrural fingerprint3_6bmp 823
27 BBrural fingerprint3_7bmp 709
28 BBrural fingerprint3_8bmp 515
29 BBrural fingerprint3_9bmp 645
30 BBrural fingerprint3_10bmp 579
31 BBrural fingerprint4_1bmp 1224
32 BBrural fingerprint4_2bmp 488
33 BBrural fingerprint4_3bmp 794
34 BBrural fingerprint4_4bmp 745
35 BBrural fingerprint4_5bmp 507
36 BBrural fingerprint4_6bmp 690
37 BBrural fingerprint4_7bmp 696
38 BBrural fingerprint4_8bmp 420
39 BBrural fingerprint4_9bmp 672
40 BBrural fingerprint4_10bmp 594
Fig 6 Bifurcations valueGraph
Each minutiae point in the fingerprint image has a specific location. This location information of particular point
is significant to store for further matching of fingerprints. The location of every point in the digital image is
given by pixel position, so that it can be taken and stored separately for both ridge-end and bifurcation points.
Figure 7Minutiae point extracted in input images
IV. Conclusion:
In large scale deployment of fingerprint recognition systems, especially in rural fingerprints database,
there are some challenges involved. Along with the sensor noise and poor image quality, presence of scars and
Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint
www.iosrjournals.org 5 | Page
warts, and deteriorating ridge/minutiae patterns in fingerprints from rural population affect the data distribution.
Since there is no research that evaluates the performance of automatic fingerprint verification/identification in
rural fingerprints databases.We will studied the performance using standard fingerprint recognition systems and
fingerprint databases collected from the rural fingerprints databases, Indian population now a day’s it has been
work on unique identification where but when there is enhancement with such noisy fingerprints hence our
research work concentrated on same. In this paper we have perform minutiae extraction fingerprint images of
rural fingerprint image database. We have selected 600 images out of 1632. In this paper sample result of first
forty images out of six hundred given.Fingerprint image enhancement techniques are employed prior to
minutiae extraction to obtain a more reliable estimation of minutiae locations very much useful to enhance the
quality of rural fingerprint image database.
Acknowledgement:
We are very much thankful to Image Analysis and Biometrics (IAB) Lab at Indraprastha Institute of
Information Technology, IIIT Delhi for providing rural fingerprint database& Special thanks SAP DSR Phase-I
of Dept of Computer Science &IT, Dr. Babasaheb Ambedkar Marthwada University, and Aurangabad.
References
[1] BabasahebV. Bhalerao, Ramesh R. ManzaYogesh M. Rajput Department of CSand IT, Dr.BabasahebAmbedkar Marthwada
University, Aurangabad.(MS), India” Use of Quality Measures for Rural Indian Fingerprint Image Database Enhancement and
Improve the Recognition Rate International Journal of Computer Applications (0975– 8887) Volume 70– No.18, May 2013.
[2] M. Vatsa, R. Singh, S. Bharadwaj, H. Bhatt, R. Mashruwala “Analyzing Fingerprints of Indian Population Using Image Quality”: A
UIDAI Case Study 1 - IIIT Delhi, India 2 - UIDAI, India.
[3] C. Puri, K. Narang, A. Tiwari, M. Vatsa, and R. Singh,“On Analysis of Rural and Urban Indian Fingerprint Images” IIIT Delhi,
India.
[4] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, “Hand-book of fingerprint recognition”. Springer Verlag, 2003.
[5] R. M.Mandi,S. S. Lokhande, Rotation “Invariant Fingerprint Identification System “International Journal of Electronics
Communication and Computer Technology (IJECCT) Volume 2 Issue 4 (July 2012).
[6] Rohit Singh (Y6400), Utkarsh Shah (Y6510), Vinay Gupta (Y6534) , “Fingerprint Recognition”, Department of Computer Science
& engineering Indian Institute of technology, Kanpur. Computer Vision and Image. Processing (CS676).
[7] Graig T. Diefenderfer,”Fingerprint Recognition “Naval PostgraduateSchool Monterey, California.
[8] ChiragDadlani, Arun Kumar Passi ,Herman SahotaMitinKrishan Kumar, “Fingerprint recognition using minutiae based feature” As
part of EE851: Biometrics.
[9] Mary Lourde R, and DushyantKhosla ”Fingerprint Identification in Biometric Security Systems” International Journal of Computer
and Electrical Engineering, Vol. 2, No. 5, October, 2010 1793-8163.
[10] D.Maio and D. Maltoni. Direct gray-scale minutiae detection in fingerprints.IEEE Trans. Pattern Anal. And Machine Intell.,
19(1):27-40, 1997.
[11] L. Hong, Y. Wan and A.K. Jain, "Fingerprint Image Enhancement: Algorithms andPerformance Evaluation", IEEE Transactions on
PAMI, Vol. 20, No. 8, pp.777-789, August 1998.
[12] D. Maltoni and D. Maio, "Handbook of Fingerprint Recognition.3 Fingerprint Analysis and Representation", Springer Verlag, ISBN
0-387-95431-7, 2003.
[13] T. Jea and V. Govindaraju, "A Minutia-Based Partial Fingerprint Recognition System", Pattern Recognition 2005.
[14] “Digital Image processing using MATLAB” by Rafael C.Gonzalez, Richard E.Woods, Steven L.Eddins”.

More Related Content

What's hot

Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
EECJOURNAL
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
IJCI JOURNAL
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowAlexander Decker
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
idescitation
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino uno
VibhuThakur3
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumar
shritosh kumar
 
30 ball
30 ball30 ball
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
CSCJournals
 
Vision based human computer interface using colour detection
Vision based human computer interface using colour detectionVision based human computer interface using colour detection
Vision based human computer interface using colour detection
eSAT Journals
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median Filter
IRJET Journal
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
IJEID :: International Journal of Excellence Innovation and Development
 
N010226872
N010226872N010226872
N010226872
IOSR Journals
 
Gesture Recognition Based Mouse Events
Gesture Recognition Based Mouse EventsGesture Recognition Based Mouse Events
Gesture Recognition Based Mouse Events
ijcsit
 

What's hot (18)

Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
1304.2109
1304.21091304.2109
1304.2109
 
1834 1840
1834 18401834 1840
1834 1840
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial window
 
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
Enhancing Security and Privacy Issue in Airport by Biometric based Iris Recog...
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino uno
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumar
 
30 ball
30 ball30 ball
30 ball
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
Vision based human computer interface using colour detection
Vision based human computer interface using colour detectionVision based human computer interface using colour detection
Vision based human computer interface using colour detection
 
Text Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median FilterText Extraction and Recognition Using Median Filter
Text Extraction and Recognition Using Median Filter
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
N010226872
N010226872N010226872
N010226872
 
Gesture Recognition Based Mouse Events
Gesture Recognition Based Mouse EventsGesture Recognition Based Mouse Events
Gesture Recognition Based Mouse Events
 

Viewers also liked

Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognition
mahesamrin
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
Akash Patel
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
Manish Negi
 

Viewers also liked (7)

Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognition
 
K0167683
K0167683K0167683
K0167683
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Dip fingerprint
Dip fingerprintDip fingerprint
Dip fingerprint
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
 

Similar to Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint Images to Improve the Recognition and the Authentication Rate.

Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
Made Artha
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
Made Artha
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
varsha mohite
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
IRJET Journal
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
Er. Arpit Sharma
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
IJCERT
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
joyjonna282
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
NEERAJ BAGHEL
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint
ijasuc
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paper
Charlie716895
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
Editor IJCATR
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand Gestures
IRJET Journal
 
Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360
IRJET Journal
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
iosrjce
 
M017637484
M017637484M017637484
M017637484
IOSR Journals
 

Similar to Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint Images to Improve the Recognition and the Authentication Rate. (20)

Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
1834 1840
1834 18401834 1840
1834 1840
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
 
Review of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note AuthenticationReview of Various Image Processing Techniques for Currency Note Authentication
Review of Various Image Processing Techniques for Currency Note Authentication
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paper
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
Sign Language Identification based on Hand Gestures
Sign Language Identification based on Hand GesturesSign Language Identification based on Hand Gestures
Sign Language Identification based on Hand Gestures
 
Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360Controlling Mouse Movements Using hand Gesture And X box 360
Controlling Mouse Movements Using hand Gesture And X box 360
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
M017637484
M017637484M017637484
M017637484
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 

Recently uploaded (20)

Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 

Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint Images to Improve the Recognition and the Authentication Rate.

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 01-05 www.iosrjournals.org www.iosrjournals.org 1 | Page Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint Images to Improve the Recognition and the Authentication Rate. Babasaheb V. Bhalerao, Ramesh R. Manza. Department of Computer Science and Information Technology, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad (MS) India. Abstract: Fingerprint recognition is one of the most popular and successful methods used for person identification which takes advantage of the fact that the fingerprint has some unique characteristics called minutiae which are points where a extracts the ridges and bifurcation from a fingerprint image. A critical step in studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images. However fingerprint images are rarely of perfect quality. Fingerprint image enhancement techniques are employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations. Fingerprint matching is often affected by the presence of intrinsically low quality fingerprints and various distortions introduced during the acquisition process. In this paper we have used the rural fingerprints database which is collected from IIIT Delhi research lab which consists of 1634 fingerprints images. Out of which we have preprocess 600 sample preprocessing extracts the ridges and bifurcation from a fingerprint image and tried to improve the quality of images. The Resultant images quality is verified by using different quality measures. Keywords: minutiae extraction, extracts the ridges and bifurcation, rural fingerprint authentication. I. Introduction Fingerprint matching is among the most widely used biometric technologies with a broad range of both government and civilian applications such as a UIDAI, passport control, ATM/credit card, The key challenge in fingerprint matching is getting a match decision between a pair of fingerprints from the same finger under various within-class variations. Our implementation mainly noisy rural fingerprint images enhancement, image segmentation, minutiae extraction. Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. Because of their uniqueness and consistency over time, fingerprints have been used for over a century. The word “Biometrics” comes from the Greek language and is derived from the words “Biomeans life and „metric‟ means to be measure, so biometrics is a field of science and technology used to be measure life characteristics. Biometrics System uses physical and behavioral parameters for person identification. Biometric data are unique for each individual person, even two identical twins. Basically we can use physical parameters than behavioral because behavioral parameters are changed with age and environment whereas physical parameters never changed during whole life. Fingerprint matching techniques are divided into three main types: *Correlation based matching * Minutiae based matching * Pattern based matching. Minutiae based matching is the most popular and most widely used technique for fingerprint matching. This technique refers the analysis of some unique point’s exhibit on fingerprint called minutiae points. The detection and representation of these points are also known as minutiae set. There are two basic minutiae points are majorly used for matching in minutiae based technique, that is Ridge-end, which means the end of the ridges and Bifurcation points, which means one single ridge divided into two ridges. Figure 1.Ridges-end point, Bifurcation point
  • 2. Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint www.iosrjournals.org 2 | Page II. Fingerprint Recognition: Fingerprint recognition system can be used to analyze two fingerprint images one is original image and another one is template image stored in the database. Fingerprint recognition is mainly divided in two sub-parts: one is verification system and other is identification system. Fingerprint verification is used to verify the authenticity of one person with one to one matching of the database, while fingerprint identification is used to specify the person identification with one to n matching, fingerprint verification is rapid execution method than fingerprint identification. Fingerprint identification is especially serviceable for criminal investigation cases. MATLAB software provides the best image processing toolbox. Digital fingerprint images can analyze easily using MATLAB. In this paper we present the result of implementation of algorithm on MATLAB. III. Methodology The complete algorithm is as follows: Input: Introduce fingerprint Image. Output: Matching score or total number of both ridges-end and bifurcation points. Figure2.Rural Fingerprint Original Images Step1: Acquisition of fingerprint image. Step2: Convert image into binary form. Step3: Apply thinning process on the binary image. Step4: Find total numbers of ridges-end points and bifurcation points. Step5: Match both minutiae points for fingerprint verification. Figure 3.Flow Pre-Processing: Pre-processing is the process of alter a gray scale image to a black and white image. In MATLAB, a value of one represents that the pixel is white and value of zero represents that the pixel is black. This modification of gray scale image to binary image is executed by using threshold process to the image. When a threshold process is applied to an image, each pixel values are analyzed to the input threshold. Those pixel values which are smaller than the threshold value is place to zero and those pixel value which are greater than the threshold value is place to one. At the end of this process each pixel values within the image are either zero or one, and the image has been modifying to binary form. After this conversion the ridges in the fingerprint are highlighted with black color while valleys are highlighted with white color. Minutiae Extraction: In fingerprint extraction have an accurate representation of the fingerprint image is critical to automatic fingerprint identification systems, because most deployed commercial&non commercial large-scale systems are dependent on feature-based matching Among all the fingerprint features, minutia point features with corresponding orientation maps are unique enough to differenceamongst fingerprints robustly; the minutiae feature representation reduces the complex fingerprint recognition problem to a point pattern matching problem. In order to achieve high-accuracy minutiae with varied quality fingerprint images, segmentation algorithm needs to separate foreground from noisy background which includes all ridge-valley regions and not the background. Image Acquisition Pre-Processing CalculationResult Fingerpr int Image Binary Count Total No of Ridges- end Points and Bifurcati on Points Minutia e Points Matchin g
  • 3. Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint www.iosrjournals.org 3 | Page Image enhancement andFeature Extraction Techniques algorithm needs to keep the original ridge flow pattern without altering the singularity, join broken ridges, clean artifacts between pseudo-parallel ridges, and not introduce false information. Finally minutiae detection algorithm needs to locate efficiently and accurately the minutiae points Figure 4.Input Image after Bifurcations Thinning: After binarization, next leading pre-processing technique used for matching process is thinning. Image thinning is the process ofdecrease thethickness of all ridges lines intosingle pixelwidth. Thinning process does not convert the original x, y location and angle of direction of the minutiae points of the image, which assure the true calculation of minutiae points. It is also known as Block Filtering. Ridges thinning are used to destruct the extra pixel of ridges till the ridges are just one pixel broad this is done using MATLAB. Figure 5Input images after thinning Minutiae Input images after thinningMinutiae extraction: Rural Fingerprint analysis using minutiae extraction process with the combination of several techniques for image pre-processing and post-processing steps to improve the input image until it is suitable for minutiae extraction. Preprocessing steps are crucial for further minutiae extraction. The Minutiae Extraction is done by Points Searching: The proposed algorithm detects the Minutiae Points on the basis of Ridges are disconnected at arbitrary point: Ridge-end Point and Ridges are associated with bifurcations: Bifurcation Point. The classification of ridge-end or bifurcation points is done in MATLAB by creating matrix. If the central pixel is one, has only one neighbor pixel that is ridge-end point. Whereas, if the central pixel is one, has two neighbor pixel that is bifurcation point. Minutiae Matching: Image Acquisition Fingerprint image.BMP = Input Image acquisition from reader. Timage BMP = Template Image retrieve from database. Computation of Value: This step is a very important part of fingerprint matching. After the detection of minutiae points, matching algorithm require to calculate total number of available points in the fingerprint image separately. To perform this computation two counter variables are used to count both ridge-end and bifurcation points. Minutiae extraction Bifurcations value Table 1: Minutiae extraction Bifurcations value Sr .No Name of Fingerprint Image Bifurcation (Value) 1 BBrural fingerprint01_1bmp 522 2 BBrural fingerprint01_2bmp 699 3 BBrural fingerprint01_3bmp 578 4 BBrural fingerprint01_4bmp 701 5 BBrural fingerprint01_5bmp 380 6 BBrural fingerprint01_6bmp 488 7 BBrural fingerprint01_7bmp 623 8 BBrural fingerprint01_8bmp 690 9 BBrural fingerprint01_9bmp 362
  • 4. Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint www.iosrjournals.org 4 | Page 10 BBrural fingerprint01_10bmp 296 11 BBrural fingerprint2_1bmp 830 12 BBrural fingerprint2_2bmp 760 13 BBrural fingerprint2_3bmp 857 14 BBrural fingerprint2_4bmp 773 15 BBrural fingerprint2_5bmp 811 16 BBrural fingerprint2_6bmp 651 17 BBrural fingerprint2_7bmp 664 18 BBrural fingerprint2_8bmp 752 19 BBrural fingerprint2_9bmp 675 20 BBrural fingerprint2_10bmp 775 21 BBrural fingerprint3_1bmp 788 22 BBrural fingerprint3_2bmp 685 23 BBrural fingerprint3_3bmp 786 24 BBrural fingerprint3_4bmp 942 25 BBrural fingerprint3_5bmp 957 26 BBrural fingerprint3_6bmp 823 27 BBrural fingerprint3_7bmp 709 28 BBrural fingerprint3_8bmp 515 29 BBrural fingerprint3_9bmp 645 30 BBrural fingerprint3_10bmp 579 31 BBrural fingerprint4_1bmp 1224 32 BBrural fingerprint4_2bmp 488 33 BBrural fingerprint4_3bmp 794 34 BBrural fingerprint4_4bmp 745 35 BBrural fingerprint4_5bmp 507 36 BBrural fingerprint4_6bmp 690 37 BBrural fingerprint4_7bmp 696 38 BBrural fingerprint4_8bmp 420 39 BBrural fingerprint4_9bmp 672 40 BBrural fingerprint4_10bmp 594 Fig 6 Bifurcations valueGraph Each minutiae point in the fingerprint image has a specific location. This location information of particular point is significant to store for further matching of fingerprints. The location of every point in the digital image is given by pixel position, so that it can be taken and stored separately for both ridge-end and bifurcation points. Figure 7Minutiae point extracted in input images IV. Conclusion: In large scale deployment of fingerprint recognition systems, especially in rural fingerprints database, there are some challenges involved. Along with the sensor noise and poor image quality, presence of scars and
  • 5. Developmentof Image Enhancement and the Feature Extraction Techniques on Rural Fingerprint www.iosrjournals.org 5 | Page warts, and deteriorating ridge/minutiae patterns in fingerprints from rural population affect the data distribution. Since there is no research that evaluates the performance of automatic fingerprint verification/identification in rural fingerprints databases.We will studied the performance using standard fingerprint recognition systems and fingerprint databases collected from the rural fingerprints databases, Indian population now a day’s it has been work on unique identification where but when there is enhancement with such noisy fingerprints hence our research work concentrated on same. In this paper we have perform minutiae extraction fingerprint images of rural fingerprint image database. We have selected 600 images out of 1632. In this paper sample result of first forty images out of six hundred given.Fingerprint image enhancement techniques are employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations very much useful to enhance the quality of rural fingerprint image database. Acknowledgement: We are very much thankful to Image Analysis and Biometrics (IAB) Lab at Indraprastha Institute of Information Technology, IIIT Delhi for providing rural fingerprint database& Special thanks SAP DSR Phase-I of Dept of Computer Science &IT, Dr. Babasaheb Ambedkar Marthwada University, and Aurangabad. References [1] BabasahebV. Bhalerao, Ramesh R. ManzaYogesh M. Rajput Department of CSand IT, Dr.BabasahebAmbedkar Marthwada University, Aurangabad.(MS), India” Use of Quality Measures for Rural Indian Fingerprint Image Database Enhancement and Improve the Recognition Rate International Journal of Computer Applications (0975– 8887) Volume 70– No.18, May 2013. [2] M. Vatsa, R. Singh, S. Bharadwaj, H. Bhatt, R. Mashruwala “Analyzing Fingerprints of Indian Population Using Image Quality”: A UIDAI Case Study 1 - IIIT Delhi, India 2 - UIDAI, India. [3] C. Puri, K. Narang, A. Tiwari, M. Vatsa, and R. Singh,“On Analysis of Rural and Urban Indian Fingerprint Images” IIIT Delhi, India. [4] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, “Hand-book of fingerprint recognition”. Springer Verlag, 2003. [5] R. M.Mandi,S. S. Lokhande, Rotation “Invariant Fingerprint Identification System “International Journal of Electronics Communication and Computer Technology (IJECCT) Volume 2 Issue 4 (July 2012). [6] Rohit Singh (Y6400), Utkarsh Shah (Y6510), Vinay Gupta (Y6534) , “Fingerprint Recognition”, Department of Computer Science & engineering Indian Institute of technology, Kanpur. Computer Vision and Image. Processing (CS676). [7] Graig T. Diefenderfer,”Fingerprint Recognition “Naval PostgraduateSchool Monterey, California. [8] ChiragDadlani, Arun Kumar Passi ,Herman SahotaMitinKrishan Kumar, “Fingerprint recognition using minutiae based feature” As part of EE851: Biometrics. [9] Mary Lourde R, and DushyantKhosla ”Fingerprint Identification in Biometric Security Systems” International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010 1793-8163. [10] D.Maio and D. Maltoni. Direct gray-scale minutiae detection in fingerprints.IEEE Trans. Pattern Anal. And Machine Intell., 19(1):27-40, 1997. [11] L. Hong, Y. Wan and A.K. Jain, "Fingerprint Image Enhancement: Algorithms andPerformance Evaluation", IEEE Transactions on PAMI, Vol. 20, No. 8, pp.777-789, August 1998. [12] D. Maltoni and D. Maio, "Handbook of Fingerprint Recognition.3 Fingerprint Analysis and Representation", Springer Verlag, ISBN 0-387-95431-7, 2003. [13] T. Jea and V. Govindaraju, "A Minutia-Based Partial Fingerprint Recognition System", Pattern Recognition 2005. [14] “Digital Image processing using MATLAB” by Rafael C.Gonzalez, Richard E.Woods, Steven L.Eddins”.