SlideShare a Scribd company logo
1 of 7
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
ABSTRACT
Elastic distortion of fingerprints is one of the major causes for false non-match. While
this problem affects all fingerprint recognition applications, it is especially dangerous in negative
recognition applications, such as watchlist and deduplication applications. In such applications,
malicious users may purposely distort their fingerprints to evade identification. In this paper, we
proposed novel algorithms to detect and rectify skin distortion based on a single fingerprint
image. Distortion detection is viewed as a two-class classification problem, for which the
registered ridge orientation map and period map of a fingerprint are used as the feature vector
and a SVM classifier is trained to perform the classification task. Distortion rectification (or
equivalently distortion field estimation) is viewed as a regression problem, where the input is a
distorted fingerprint and the output is the distortion field. To solve this problem, a database
(called reference database) of various distorted reference fingerprints and corresponding
distortion fields is built in the offline stage, and then in the online stage, the nearest neighbor of
the input fingerprint is found in the reference database and the corresponding distortion field is
used to transform the input fingerprint into a normal one. Promising results have been obtained
on three databases containing many distorted fingerprints, namely FVC2004 DB1, Tsinghua
Distorted Fingerprint database, and the NIST SD27 latent fingerprint database.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
Due to the vital importance of recognizing distorted fingerprints, researchers have
proposed a number of methods which can be coarsely classified into four categories It is
desirable to automatically detect distortion during fingerprint acquisition so that severely
distorted fingerprints can be rejected. Several researchers have proposed to detect improper force
using specially designed hardware .WE proposed to detect excessive force and torque exerted by
using a force sensor. They showed that controlled fingerprint acquisition leads to improved
matching performance . In existing proposed to detect distortion by detecting deformation of a
transparent film attached to the sensor surface. Dorai et al. proposed to detect distortion by
analyzing the motion in video of fingerprint The most popular way to handle distortion is to
make the fingerprint matcher tolerant to distortion . In other words, they deal with distortion on a
case by case basis, i.e., for every pair of fingerprints to be compared. For the most widely used
minutiae-based fingerprint matching method, the following three types of strategies have been
adopted to handle distortion: (i) assume a global rigid transformation and use a tolerant box of
fixed size or adaptive size to compensate for distortion; (ii) explicitly model the spatial
transformation by thin plate spline (TPS) model ; and (iii) enforce constraint on istortion locally.
Various methods for handling distortion during matching have also been used in image-based
matcher or skeleton-based matcher
PROPOSED SYSTEM:
In this paper, novel algorithms are proposed to deal with the fingerprint distortion
problem. Given an input fingerprint, distortion detection is performed first. If it is determined to
be distorted, distortion rectification is performed to transform the input fingerprint into a normal
one. A distorted fingerprint is analogous to a face with expression, which affects the matching
accuracy of face recognition systems. Rectifying a distorted fingerprint into a normal fingerprint
is analogous to transforming a face with expression into a neutral face, which can improve face
recognition performance. In this paper, distortion detection is viewed as a two class classification
problem, for which the registered ridge orientation map and period map of a fingerprint are used
as the feature vector and a SVM classifier is trained to perform the classification task. Distortion
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
rectification (or equivalently distortion field estimation) is viewed as a regression problem,
where the input is a distorted fingerprint and the output is the distortion field. To solve this
problem, a database of various distorted reference fingerprints and corresponding distortion
fields is built in the offline stage, and then in the online stage, the nearest neighbor of the input
fingerprint is found in the database of distorted reference fingerprints and the corresponding
distortion field is used to rectify the input fingerprint. An important property of the proposed
system is that it does not require any changes to existing fingerprint sensors and fingerprint
acquisition procedures. Such property is important for convenient incorporation into existing
fingerprint recognition systems. The proposed system has been evaluated on three databases,
FVC2004 DB1 whose images are markedly affected by distortion, Tsinghua distorted fingerprint
database which contains 320 distorted fingerprint video files, and NIST SD27 latent fingerprint
database. Experimental results demonstrate that the proposed algorithms can improve the
matching accuracy of distorted fingerprints evidently.
Module 1
Fingerprint distortion detection
Fingerprint distortion detection can be viewed as a two class classification problem. We used the
registered ridge orientation map and period map as the feature vector, which is classified by a
SVM classifier.
Fingerprint Registration In order to extract meaningful feature vector, fingerprints have to be
registered in a fixed coordinate system. For this task, we propose a multi-reference based
fingerprint registration approach. In the following, we describe how the reference fingerprints are
prepared in the offline stage, and how to register an input fingerprint in the online stage.
Reference Fingerprints In order to learn statistics of realist fingerprint distortion, we collected a
distorted fingerprint database called Tsinghua distorted fingerprint database. A FTIR fingerprint
scanner with video capture functionality was used for data collection. Each participant is asked
to press a finger on the scanner in a normal way, and then distort the finger by applying a lateral
force or a torque and gradually increase the force. Online Fingerprint Registration In the online
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
stage, given an input fingerprint, we perform the registration w.r.t. registered reference
fingerprints. Level 1 features (orientation map, singular points, period map) are extracted using
traditional algorithms. According to whether the upper core point is detected or not, the
registration approach can be classified into two cases. If the upper core point is not detected, we
do a full search to find the pose information, namely solve the following optimization formula:
arg max x;y;a;i kOrientDiffðROiðx; y; aÞ;OÞ _ utk0; (1) where x and y denote the translation
parameters, a denotes the rotation parameter, i denotes the corresponding reference fingerprint
ID, O is the orientation map of the input fingerprint, ROi denotes the orientation map of the ith
reference fingerprint, function OrientDiffðÞ computes the difference of two orientation maps at
each location, k _ k0 counts the number of nonzero elements, and ut is the threshold, which is
empirically set as 10 degrees. Note that the ridge orientation map is defined on blocks of 16 _ 16
pixels. Finally, we register the ridge orientation map and period map of the input fingerprint to
the fixed coordinate system by using the obtained pose information.
Module 2
Statistical Modeling of Distortion Fields
In order to learn statistical fingerprint distortion model, we need to know the distortion fields (or
deformation fields) between paired fingerprints (the first frame and the last frame of each video)
in the training set. The distortion field between a pair of fingerprints can be estimated based on
the corresponding minutiae of the two fingerprints. Unfortunately, due to the severe distortion
between paired fingerprints, existing minutiae matchers cannot find corresponding minutiae
reliably. Thus, we extract minutiae in the first frame using VeriFinger and perform minutiae
tracking in each video. Since the relative motion between adjacent frames is small, reliable
minutiae correspondences between the first frame and the last frame can be found by this
method. Given the matching minutiae of a pair of fingerprints, we estimate the transformation
using thin plate spline model We define a regular sampling grid on the normal fingerprint and
compute the corresponding grid (called distortion grid) on the distorted fingerprint using the TPS
model.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
Module 3
Distorted fingerprint rectification
A distorted fingerprint can be thought of being generated by applying an unknown distortion
field d to the normal fingerprint, which is also unknown. If we can estimate the distortion field d
from the given distorted fingerprint, we can easily rectify it into the normal fingerprint by
applying the inverse of d. So we need to address a regression problem, which is quite difficult
because of the high dimensionality of the distortion field (even if we use a block-wise distortion
field). In this paper, a nearest neighbor regression approach is used for this task. The proposed
distorted fingerprint rectification algorithm consists of an offline stage and an online stage. In the
offline stage, a database of distorted reference fingerprints is generated by transforming several
normal reference fingerprints with various distortion fields sampled from the statistical model of
distortion fields. In the online stage, given a distorted input fingerprint (which is detected by the
algorithm described in Section 3), we retrieval its nearest neighbor in the distorted reference
fingerprint database and then use the inverse of the corresponding distortion field to rectify the
distorted input fingerprint.
Module 4
Distorted Reference Fingerprint Database
To generate the database of distorted reference fingerprints, we use nref ¼ 100 normal
fingerprints from FVC2002 DB1. The distortion fields are generated by uniformly sampling the
subspace spanned by the first two principle components. For each basis, 11 points are uniformly
sampled in the interval. See Fig. 9 for an example of generating distortion fields and applying
such distortion fields to a reference fingerprint to generate corresponding distorted fingerprints.
For visualization purpose, only one reference fingerprint (the fingerprint located at the origin of
the coordinate system) is used to generate the database of distorted reference fingerprints, and for
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
each basis, five points are sampled. In practice, multiple reference fingerprints are used to
achieve better performance. Also note that instead of storing the fingerprint image, we store the
ridge orientation map and period map of each fingerprint in the reference database.
Module 5
Distortion Field Estimation by Nearest Neighbor Search
Distortion field estimation is equal to finding the nearest neighbor among all distorted reference
fingerprints. The similarity is measured based on level 1 features of fingerprint, namely ridge
orientation map and period map. We conjecture that distortion detection and rectification of
human experts also relies on these features instead of minutiae. The similarity computation
method is different depending on whether the upper core point can be detected in the input
fingerprint. If the upper core point is detected, we translate the input fingerprint by aligning the
upper core point to center point. Then we do a full search of u in the interval ½_30; 30_ for the
maximum similarity. For a specific u, the similarity between two fingerprints is computed as
follows: s ¼ sO1 þ sO2 m _wO 1 sO 1 þ wO 2 sO 2 _ þ sP1 þ sP2 m _wP1 sP1 þ wP2 sP2
where m denotes the number of blocks in the overlapping area, sO1 and sO2 denote the number
of blocks with similar orientation above and below the center point, sP1 and sP2 denote the
number of blocks with similar period above and below the center point, and the four weights
wO1, wO2, wP1, wP2, are empirically set as 1, 0.5, 1, 1.5, respectively.
CONCLUSION
False non-match rates of fingerprint matchers are very high in the case of severely distorted
fingerprints. This generates a security hole in automatic fingerprint recognition systems which
can be utilized by criminals and terrorists. For this reason, it is necessary to develop a fingerprint
distortion detection and rectification algorithms to fill the hole. This paper described a novel
distorted fingerprint detection and rectification algorithm. For distortion detection, the registered
ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com
classifier is trained to classify the input fingerprint as distorted or normal. For distortion
rectification (or equivalently distortion field estimation), a nearest neighbor regression approach
is used to predict the distortion field from the input distorted fingerprint and then the inverse of
the distortion field is used to transform the distorted fingerprint into a normal one. The
experimental results on FVC2004 DB1, Tsinghua DF database, and NIST SD27 database
showed that the proposed algorithm can improve recognition rate of distorted fingerprints
evidently A major limitation of the current approach is efficiency. Both detection and
rectification steps can be significantly speeded up if a robust and accurate fingerprint registration
algorithm can be developed. Another limitation is that the current approach does not support
rolled fingerprints. It is difficult to collect many rolled fingerprints with various distortion types
and meanwhile obtain accurate distortion fields for learning statistical distortion model. It is our
ongoing work to address the above limitations

More Related Content

What's hot

IEEE Projects 2015 | Detection and rectification of distorted fingerprints
IEEE Projects 2015 | Detection and rectification of distorted fingerprintsIEEE Projects 2015 | Detection and rectification of distorted fingerprints
IEEE Projects 2015 | Detection and rectification of distorted fingerprints1crore projects
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognitionmahesamrin
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsRaja Ram
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
 
Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Sana Fakhfakh
 
Automatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionAutomatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionSana Fakhfakh
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...ijtsrd
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd Iaetsd
 
Gesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign LanguageGesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign LanguageIRJET Journal
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
 
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11vishakhmarari
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET Journal
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour FeaturesIRJET Journal
 

What's hot (16)

IEEE Projects 2015 | Detection and rectification of distorted fingerprints
IEEE Projects 2015 | Detection and rectification of distorted fingerprintsIEEE Projects 2015 | Detection and rectification of distorted fingerprints
IEEE Projects 2015 | Detection and rectification of distorted fingerprints
 
Correlation based Fingerprint Recognition
Correlation based Fingerprint RecognitionCorrelation based Fingerprint Recognition
Correlation based Fingerprint Recognition
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
finger prints
finger printsfinger prints
finger prints
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matching
 
Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition
 
Automatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionAutomatic Isolated word sign language recognition
Automatic Isolated word sign language recognition
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matching
 
Gesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign LanguageGesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign Language
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
 
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
 
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCVIRJET- Class Attendance using Face Detection and Recognition with OPENCV
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 

Similar to Detection and rectification of distorted fingerprints

Detection and rectification
Detection and rectificationDetection and rectification
Detection and rectificationnexgentech15
 
Detection and Rectification of Distorted Fingerprints
Detection and Rectification of Distorted FingerprintsDetection and Rectification of Distorted Fingerprints
Detection and Rectification of Distorted Fingerprintsnexgentechnology
 
Detection and Rectification of Distorted Fingerprints
Detection and Rectification of Distorted FingerprintsDetection and Rectification of Distorted Fingerprints
Detection and Rectification of Distorted Fingerprints1crore projects
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint IdentificationIJMER
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prj_publication
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionAsrarulhaq Maktedar
 
Real Time Sign Language Detection
Real Time Sign Language DetectionReal Time Sign Language Detection
Real Time Sign Language DetectionIRJET Journal
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSIRJET Journal
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Si fengzhou wifs12_distortion
Si fengzhou wifs12_distortionSi fengzhou wifs12_distortion
Si fengzhou wifs12_distortionSamir le King
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
 

Similar to Detection and rectification of distorted fingerprints (20)

Detection and rectification
Detection and rectificationDetection and rectification
Detection and rectification
 
Detection and Rectification of Distorted Fingerprints
Detection and Rectification of Distorted FingerprintsDetection and Rectification of Distorted Fingerprints
Detection and Rectification of Distorted Fingerprints
 
Detection and Rectification of Distorted Fingerprints
Detection and Rectification of Distorted FingerprintsDetection and Rectification of Distorted Fingerprints
Detection and Rectification of Distorted Fingerprints
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
1834 1840
1834 18401834 1840
1834 1840
 
1834 1840
1834 18401834 1840
1834 1840
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Identifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognitionIdentifying unconscious patients using face and fingerprint recognition
Identifying unconscious patients using face and fingerprint recognition
 
Real Time Sign Language Detection
Real Time Sign Language DetectionReal Time Sign Language Detection
Real Time Sign Language Detection
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
 
N010226872
N010226872N010226872
N010226872
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Si fengzhou wifs12_distortion
Si fengzhou wifs12_distortionSi fengzhou wifs12_distortion
Si fengzhou wifs12_distortion
 
Latent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identificationLatent fingerprint and vein matching using ridge feature identification
Latent fingerprint and vein matching using ridge feature identification
 

More from Shakas Technologies

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionShakas Technologies
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...Shakas Technologies
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.Shakas Technologies
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...Shakas Technologies
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024Shakas Technologies
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024Shakas Technologies
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Shakas Technologies
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...Shakas Technologies
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSEShakas Technologies
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Shakas Technologies
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONShakas Technologies
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCEShakas Technologies
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Shakas Technologies
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Shakas Technologies
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Shakas Technologies
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Shakas Technologies
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Shakas Technologies
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxShakas Technologies
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Shakas Technologies
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Shakas Technologies
 

More from Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Recently uploaded

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...caitlingebhard1
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Detection and rectification of distorted fingerprints

  • 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS ABSTRACT Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition applications, it is especially dangerous in negative recognition applications, such as watchlist and deduplication applications. In such applications, malicious users may purposely distort their fingerprints to evade identification. In this paper, we proposed novel algorithms to detect and rectify skin distortion based on a single fingerprint image. Distortion detection is viewed as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to perform the classification task. Distortion rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field. To solve this problem, a database (called reference database) of various distorted reference fingerprints and corresponding distortion fields is built in the offline stage, and then in the online stage, the nearest neighbor of the input fingerprint is found in the reference database and the corresponding distortion field is used to transform the input fingerprint into a normal one. Promising results have been obtained on three databases containing many distorted fingerprints, namely FVC2004 DB1, Tsinghua Distorted Fingerprint database, and the NIST SD27 latent fingerprint database.
  • 2. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM: Due to the vital importance of recognizing distorted fingerprints, researchers have proposed a number of methods which can be coarsely classified into four categories It is desirable to automatically detect distortion during fingerprint acquisition so that severely distorted fingerprints can be rejected. Several researchers have proposed to detect improper force using specially designed hardware .WE proposed to detect excessive force and torque exerted by using a force sensor. They showed that controlled fingerprint acquisition leads to improved matching performance . In existing proposed to detect distortion by detecting deformation of a transparent film attached to the sensor surface. Dorai et al. proposed to detect distortion by analyzing the motion in video of fingerprint The most popular way to handle distortion is to make the fingerprint matcher tolerant to distortion . In other words, they deal with distortion on a case by case basis, i.e., for every pair of fingerprints to be compared. For the most widely used minutiae-based fingerprint matching method, the following three types of strategies have been adopted to handle distortion: (i) assume a global rigid transformation and use a tolerant box of fixed size or adaptive size to compensate for distortion; (ii) explicitly model the spatial transformation by thin plate spline (TPS) model ; and (iii) enforce constraint on istortion locally. Various methods for handling distortion during matching have also been used in image-based matcher or skeleton-based matcher PROPOSED SYSTEM: In this paper, novel algorithms are proposed to deal with the fingerprint distortion problem. Given an input fingerprint, distortion detection is performed first. If it is determined to be distorted, distortion rectification is performed to transform the input fingerprint into a normal one. A distorted fingerprint is analogous to a face with expression, which affects the matching accuracy of face recognition systems. Rectifying a distorted fingerprint into a normal fingerprint is analogous to transforming a face with expression into a neutral face, which can improve face recognition performance. In this paper, distortion detection is viewed as a two class classification problem, for which the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to perform the classification task. Distortion
  • 3. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field. To solve this problem, a database of various distorted reference fingerprints and corresponding distortion fields is built in the offline stage, and then in the online stage, the nearest neighbor of the input fingerprint is found in the database of distorted reference fingerprints and the corresponding distortion field is used to rectify the input fingerprint. An important property of the proposed system is that it does not require any changes to existing fingerprint sensors and fingerprint acquisition procedures. Such property is important for convenient incorporation into existing fingerprint recognition systems. The proposed system has been evaluated on three databases, FVC2004 DB1 whose images are markedly affected by distortion, Tsinghua distorted fingerprint database which contains 320 distorted fingerprint video files, and NIST SD27 latent fingerprint database. Experimental results demonstrate that the proposed algorithms can improve the matching accuracy of distorted fingerprints evidently. Module 1 Fingerprint distortion detection Fingerprint distortion detection can be viewed as a two class classification problem. We used the registered ridge orientation map and period map as the feature vector, which is classified by a SVM classifier. Fingerprint Registration In order to extract meaningful feature vector, fingerprints have to be registered in a fixed coordinate system. For this task, we propose a multi-reference based fingerprint registration approach. In the following, we describe how the reference fingerprints are prepared in the offline stage, and how to register an input fingerprint in the online stage. Reference Fingerprints In order to learn statistics of realist fingerprint distortion, we collected a distorted fingerprint database called Tsinghua distorted fingerprint database. A FTIR fingerprint scanner with video capture functionality was used for data collection. Each participant is asked to press a finger on the scanner in a normal way, and then distort the finger by applying a lateral force or a torque and gradually increase the force. Online Fingerprint Registration In the online
  • 4. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com stage, given an input fingerprint, we perform the registration w.r.t. registered reference fingerprints. Level 1 features (orientation map, singular points, period map) are extracted using traditional algorithms. According to whether the upper core point is detected or not, the registration approach can be classified into two cases. If the upper core point is not detected, we do a full search to find the pose information, namely solve the following optimization formula: arg max x;y;a;i kOrientDiffðROiðx; y; aÞ;OÞ _ utk0; (1) where x and y denote the translation parameters, a denotes the rotation parameter, i denotes the corresponding reference fingerprint ID, O is the orientation map of the input fingerprint, ROi denotes the orientation map of the ith reference fingerprint, function OrientDiffðÞ computes the difference of two orientation maps at each location, k _ k0 counts the number of nonzero elements, and ut is the threshold, which is empirically set as 10 degrees. Note that the ridge orientation map is defined on blocks of 16 _ 16 pixels. Finally, we register the ridge orientation map and period map of the input fingerprint to the fixed coordinate system by using the obtained pose information. Module 2 Statistical Modeling of Distortion Fields In order to learn statistical fingerprint distortion model, we need to know the distortion fields (or deformation fields) between paired fingerprints (the first frame and the last frame of each video) in the training set. The distortion field between a pair of fingerprints can be estimated based on the corresponding minutiae of the two fingerprints. Unfortunately, due to the severe distortion between paired fingerprints, existing minutiae matchers cannot find corresponding minutiae reliably. Thus, we extract minutiae in the first frame using VeriFinger and perform minutiae tracking in each video. Since the relative motion between adjacent frames is small, reliable minutiae correspondences between the first frame and the last frame can be found by this method. Given the matching minutiae of a pair of fingerprints, we estimate the transformation using thin plate spline model We define a regular sampling grid on the normal fingerprint and compute the corresponding grid (called distortion grid) on the distorted fingerprint using the TPS model.
  • 5. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com Module 3 Distorted fingerprint rectification A distorted fingerprint can be thought of being generated by applying an unknown distortion field d to the normal fingerprint, which is also unknown. If we can estimate the distortion field d from the given distorted fingerprint, we can easily rectify it into the normal fingerprint by applying the inverse of d. So we need to address a regression problem, which is quite difficult because of the high dimensionality of the distortion field (even if we use a block-wise distortion field). In this paper, a nearest neighbor regression approach is used for this task. The proposed distorted fingerprint rectification algorithm consists of an offline stage and an online stage. In the offline stage, a database of distorted reference fingerprints is generated by transforming several normal reference fingerprints with various distortion fields sampled from the statistical model of distortion fields. In the online stage, given a distorted input fingerprint (which is detected by the algorithm described in Section 3), we retrieval its nearest neighbor in the distorted reference fingerprint database and then use the inverse of the corresponding distortion field to rectify the distorted input fingerprint. Module 4 Distorted Reference Fingerprint Database To generate the database of distorted reference fingerprints, we use nref ¼ 100 normal fingerprints from FVC2002 DB1. The distortion fields are generated by uniformly sampling the subspace spanned by the first two principle components. For each basis, 11 points are uniformly sampled in the interval. See Fig. 9 for an example of generating distortion fields and applying such distortion fields to a reference fingerprint to generate corresponding distorted fingerprints. For visualization purpose, only one reference fingerprint (the fingerprint located at the origin of the coordinate system) is used to generate the database of distorted reference fingerprints, and for
  • 6. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com each basis, five points are sampled. In practice, multiple reference fingerprints are used to achieve better performance. Also note that instead of storing the fingerprint image, we store the ridge orientation map and period map of each fingerprint in the reference database. Module 5 Distortion Field Estimation by Nearest Neighbor Search Distortion field estimation is equal to finding the nearest neighbor among all distorted reference fingerprints. The similarity is measured based on level 1 features of fingerprint, namely ridge orientation map and period map. We conjecture that distortion detection and rectification of human experts also relies on these features instead of minutiae. The similarity computation method is different depending on whether the upper core point can be detected in the input fingerprint. If the upper core point is detected, we translate the input fingerprint by aligning the upper core point to center point. Then we do a full search of u in the interval ½_30; 30_ for the maximum similarity. For a specific u, the similarity between two fingerprints is computed as follows: s ¼ sO1 þ sO2 m _wO 1 sO 1 þ wO 2 sO 2 _ þ sP1 þ sP2 m _wP1 sP1 þ wP2 sP2 where m denotes the number of blocks in the overlapping area, sO1 and sO2 denote the number of blocks with similar orientation above and below the center point, sP1 and sP2 denote the number of blocks with similar period above and below the center point, and the four weights wO1, wO2, wP1, wP2, are empirically set as 1, 0.5, 1, 1.5, respectively. CONCLUSION False non-match rates of fingerprint matchers are very high in the case of severely distorted fingerprints. This generates a security hole in automatic fingerprint recognition systems which can be utilized by criminals and terrorists. For this reason, it is necessary to develop a fingerprint distortion detection and rectification algorithms to fill the hole. This paper described a novel distorted fingerprint detection and rectification algorithm. For distortion detection, the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM
  • 7. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off:0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website:www.shakastech.com, Email - id:shakastech@gmail.com, info@shakastech.com classifier is trained to classify the input fingerprint as distorted or normal. For distortion rectification (or equivalently distortion field estimation), a nearest neighbor regression approach is used to predict the distortion field from the input distorted fingerprint and then the inverse of the distortion field is used to transform the distorted fingerprint into a normal one. The experimental results on FVC2004 DB1, Tsinghua DF database, and NIST SD27 database showed that the proposed algorithm can improve recognition rate of distorted fingerprints evidently A major limitation of the current approach is efficiency. Both detection and rectification steps can be significantly speeded up if a robust and accurate fingerprint registration algorithm can be developed. Another limitation is that the current approach does not support rolled fingerprints. It is difficult to collect many rolled fingerprints with various distortion types and meanwhile obtain accurate distortion fields for learning statistical distortion model. It is our ongoing work to address the above limitations