SlideShare a Scribd company logo
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 156
Paper Publications
Fingerprint Feature Extraction, Identification
and Authentication: A Review
1
Farah Fayaz Quraishi, 2
Summera Ashraf, 3
Dr. Manzoor Ahmad Chachoo
1, 2, 3
Department of Computer Science, University of Kashmir, Srinagar, Kashmir -190006, India
Abstract: In the modern computerized world, due to high demand on fingerprint identification system, a lot of
challenges keep arising in each phase of system, which include fingerprint image enhancement, feature extraction,
features matching and fingerprint classification. Applications such as online banking and online shopping use
techniques that depend on personal identification numbers, keys, or passwords. But there is the risk of data being
forgotten, lost, or even stolen. One of the solutions to it may be biometric authentication methods which provide a
unique way to identify, recognize and authenticate people. Fingerprints being the oldest methods of biometric
authentication, are being explored at large. The main focus of the paper is to review fingerprint feature extraction,
identification and authentication in different image/pattern based and minutiae-based fingerprints.
Keywords: Fingerprints, identification, feature extraction, authentication, AFIS.
1. INTRODUCTION
Fingerprint identification, also referred as “DACTYLOSCOPY”, is the method of verifying the fingerprints by comparing
two instances of minutiae which can be extracted from human fingers, toes, or even the palm of the hand or sole of the
foot. Fingerprint is one of the most researched and matured field of biometric authentication. The first known example of
biometrics in practice was a form of fingerprinting being used in China (Joao De Barros, 2005).
Fingerprints offer a flawless and reliable means of personal identification, thereby, replacing other methods of
establishing identities and authentication. The science of fingerprint identification and authentication outshines all other
forensic sciences on the following grounds (E. Spinella, 2002):
1) Fingerprint details are permanent. Other visible human characteristics tend to change – fingerprints don’t. Although
with age as the skin loses elasticity, fingerprints seem to be changed.
2) No two fingerprints have been ever found alike in many billions of humans and automated computer comparisons,
although individuality has been recently challenged in many court cases. According to the empirical study, two
individuals will not have more than seven common minutiae (E. Spinella, 2002, Maio and D. Maltoni)
Fingerprint Features Usually Considered:
1) Coarse Features: also known by the name of singular-points, are suited during an identification for presorting in a very
large database and include:
 Arch: These ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of
finger.
 Loop: The ridges enter from one side of a finger, form a curve, and then exit on the same side.
 Whorl: Ridges form circularly around a central point on the finger.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 157
Paper Publications
2) Fine Features: The major minutia features of fingerprint ridges are:
 Ridge Ending: point at which ridge terminates.
 Bifurcation: point at which single ridge splits into two ridges.
 Short Ridge (Or Dot): are ridges which are significantly shorter than the average ridge length on fingerprint.
 Core-Point: is the top-most point on the inner most ridge.
 Delta-Point: is the tri-radial point with three ridges radiating.
To identify and authenticate fingerprints, two steps are involved: Classification and Matching. Classification is the
method of grouping fingerprints into a few types based on a criteria while fingerprint matching is a method that uses some
sort of algorithm to assign the fingerprint to a particular person it belongs to, that is found in the database..
2. BACKGROUND
Fingerprints are constant, unique and form the most reliable criteria for identification (Pillay, 2009; Kanchan, T.
Chattopadhyay, S., 2006). It has been shown that fingerprints provide high accuracy when compared with other existing
biometric traits (A.K. Jain, P. Flynn, & A.A Ross; 2007). They are persistent in nature as they don’t easily change with
age, unlike face and voice patterns. Fingerprints are incomparably the most sure and unchanging form of all other forms
of signature (Francis Galton, 1892). According to Dario Maio and Davide Maltoni, “fingerprints are defined by a set of
ridge lines and they can run parallel, can terminate sometimes or can even intersect each other and the points where the
ridge lines are terminated, are known as Minutiae (D.Maio and D.Maltoni, 1997).” According to Galton, “each ridge is
characterized by numerous minute peculiarities called Minutiae, which may divide and almost immediately reunite,
enclosing a small circular or elliptical space or sometimes the independent beginning or ending of ridges (Francis Galton,
1892)”. In a fingerprint image, ridges are dark whereas valleys are bright. Ridges and valleys often run in parallel;
sometimes they bifurcate and sometimes they terminate. A good quality fingerprint contains 25-80 numbers of minutiae
(Neil Yager and Adnan Amin, 2004) which depend on the resolution and finger placement on the sensor. However, the
fingerprint image captured through poor scanners, are found to have fewer number of minutiae points. The secretions in
the fingerprints contain various chemicals and their metabolites which can be detected and used for the forensic purposes
(Maio and D.Maltoni).
Automatic fingerprint authentication systems can be broadly classified into two categories [13].
1. Pattern (Image) based systems.
2. Minutiae based systems.
Literature Review Of Pattern / Image Based Fingerprint Authentication Systems.
Different authors have proposed different solutions to the problems of Pattern / Image Based Fingerprint Authentication
Systems.
1. Bazen et al. (A. M. Bazen and S. H. Gerez, 2000] proposed a 3- step correlation-based fingerprint verification system.
Step 1: Firstly, small sized templates are selected in the primary reference fingerprint.
Step 2: Then using the technique of template matching, the query (secondary) fingerprint is found. The secondary
fingerprint is the one to which the template matches the most.
Step 3: To authenticate fingerprint matching, comparing template position in both the fingerprints is done. If the template
position in both the primary and secondary fingerprint is same, the fingerprints are authenticated, else the case is opposite.
Advantage:
i) More stable than methods where correlation is computed globally. In this method, correlation is computed locally as
small templates are selected.
ii) Can tolerate the non-uniform local shape distortions in the fingerprint.
Dis-Advantage:
i) Computationally more expensive.
ii) Not able to deal with rotations of more than 10 degree.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 158
Paper Publications
2. Nandkumar et al. [K. Nandakumar and A. K. Jain,2004] proposed a local correlation-based fingerprint matching
algorithm. In this algorithm, two different window sizes are used. One window is used for the minutia locations in the
template image with window size of 42*42 pixels and another is used for the corresponding location in the query
(secondary) image with window size of 32*32 pixels. The peak is detected by calculating the normalized cross-correlation
between the query (secondary) window and the template window. All the possible correspondence from the alignment
stage are tested and maximum correlation value over all the correspondence is taken as the matching score between the
query and template image.
Case i): If the distance between the peak and center is more than 10 pixels, the correlation between the template and
query (secondary) window is zero.
Case ii): If the distance between the peak and center is less than 10 pixels, then there is an absolute value of correlation
between the query and template window. In all template windows, the local correlation with their corresponding regions
in the query (secondary) images are found and their mean correlation is calculated.
Advantage:
i) More stable than methods where correlation is computed globally.
Dis-Advantage:
i) All minutiae points are to be extracted so that all the related problems remain in the system database.
ii) Proper alignment algorithm is used before matching.
iii) System is computationally expensive.
3. Owang et al. [Z. Ouyang, J. Feng, F. Su and A. Cai, 2006. ] proposed a correlation-based matching method using two
functions i.e. Fourier- Mellin descriptor (FMD) and phase only correlation (POC). Most likely FMD pair is calculated
from the pair images and then the two fingerprints are aligned and other corresponding FMD pairs are checked if they are
matched or not. For the calculation of similarity of two FMDs and the alignment parameters, the POC function is used.
Advantage:
i) Is fast.
ii) Does not require any minutiae or core information while taking rotation into account. .
Dis-Advantage:
i) Computationally more expensive.
ii) Requires efficient method for the extraction of local FMDs to improve the performance of the system.
4. Cavusoglu et al. (A.Cavusoglu and S. Gorgunoglu, 2007) proposed a robust correlation-based fingerprint matching
algorithm. Before the application of correlation, the steps followed in the algorithm requires segmentation, ridge
orientation, reference point detection and normalized operation algorithm. In the enrollment stage, a set of features,
starting from the core, are obtained with different radius (r) and with different angles (θ). The set of features are obtained
by rotating the query image. For each rotation, the normalized cross correlation values of both the template and the query
images are calculated. Higher the value of cross correlation, higher is the similarity between the query and template
image.
Advantage:
i) Is efficient in terms of storage as only a set of features of template image are stored instead of the whole template
image.
Dis-Advantage:
i) Requires the accurate detection of core point.
ii) The method may fail in case the core is not present in the image.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 159
Paper Publications
Literature Review Of Minutiae-Based Fingerprint Systems:
Generally there are 2 steps involved in fingerprint matching algorithms, first to align the fingerprints and then find the
correspondences between the two. The various matching algorithms already given include:
1. Jain et.al [Jain A.K., Hong l., Pankati S., Bolle R,1997] : the algorithm given by Jain et.al is capable of compensating
for some of the non-linear deformations and then finding the correspondences. The problem with the technique is that for
accurate alignment; size of the image should be large, which takes much memory and computation.
2. Kovacs-Vajna [Kovacs-Vajna Z.M., 2000] : uses a triangular matching algorithm to deal with the deformations of
fingerprints. However, the main drawback of this technique is that without further verification the final results of this
matching algorithm are not acceptable.
3. Jiang and Yau [Jiang X., Yau W.Y., 2000 ] use both the local as well as global structures of minutiae in which the
local structure of a minutiae are used to describe the rotation and translation invariant feature of the minutiae in its
neighborhood, while as global structure define the uniqueness of fingerprint. The main drawback in this technique is that it
can’t be used to compensate for real world distortions of a 3D elastic finger.
3. SUMMARY
The notable strengths of fingerprint recognition include:
o It provides a high level of recognition accuracy.
o User friendly as it doesn’t require complex user-system interaction.
o Due to its small interface can be used in a broad range of applications , such as E-Commerce, PC’s and mobile login.
Some of most common CHALLENGES faced while dealing with fingerprint biometric authentication include:
o Low quality of input (primary) images,
o Data security issues related with fingerprint systems,
o It is not yet proved that fingerprints are unique and families don’t share elements of the same pattern,
o It is difficult to scan fingerprints of the elderly person as their skin loses elasticity and in some rare conditions can also
leave some people with smooth, featureless fingertips.
o Small-area sensors embedded in portable devices may result in less information available from a fingerprint.
REFERENCES
[1] Joao De Barros, Biometric history, August, 2005
[2] E. Spinella, “Biometrics Scanning Technologies: Finger, Facial and Retinal Scanning”, SANS Technology Institute,
San Francisco, Dec., 2002. 3. D.;
[3] Maio and D. Maltoni, “Direct Gray-Scale Minutiae Detection in Fingerprints”, IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol.19, no.1
[4] Pillay, V.V. Textbook of Forensic Medicine and Toxicology. 15th ed. Hyderabad: Paras Medical Publishers, 2009:
53-94.
[5] Kanchan, T. Chattopadhyay, S. Distribution of Fingerprint Patterns among Medical Students. Journal of Indian
Acade-my of Forensic Medicine, 2006; 28(2): 65-68. ]
[6] A.K. Jain, P. Flynn, & A.A Ross; Handbook of Biometrics; Springer, Secaucus, NJ, USA, 2007.
[7] Francis Galton, Finger Prints; Macmillan & Co., London, New York, 1892.
[8] D. Maio and D. Maltoni, “Direct Gray-Scale Minutiae Detection in Fingerprints”, IEEE Transactions on Pattern
Analysis and Machine Intelligence, vol.19, no.1, pp. 27-40, 1997.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org
Page | 160
Paper Publications
[9] Francis Galton, Finger Prints; Macmillan & Co., London, New York, 1892
[10] Neil Yager and Adnan Amin; Fingerprint verification based on minutiae features: A review Pattern Analysis and
Application, 7:94-113, February 2004
[11] L. Hong, Y. Wan, A. Jain, Fingerprint image enhancement: Algorithm and performance evaluation, IEEE Trans.
Pattern Anal. Mach. Intell. (1998) 777– 789
[12] C. Khmanee, D. Nguyen, On the design of 2D Gabor filtering of fingerprint images, in: First IEEE Consumer
Communications and Networking Conference, CCNC 2004, 2004, pp. 430–435
[13] P. Reid, “Biometric for Network Security”,1st Indian Reprint, Pearson Education, New Delhi, 2004.
[14] A. M. Bazen and S. H. Gerez, “Directional Field Computation for Fingerprints based on the Principal Component
Analysis of Local Gradients”, Proceedings of 11th Annual Workshopon Circuits, Systems and Signal Processing,
Veldhoven, Netherlands, pp. 1-7, November, 2000.
[15] K. Nandakumar and A. K. Jain, “Local Correlation-based Fingerprint Matching”, Proceedings of Indian Conference
on Computer Vision, Graphics & Image Processing, pp.1-6, Kolkata, December, 2004
[16] A. Cavusoglu and S. Gorgunoglu, “A Robust Correlation based Fingerprint Matching Algorithm for Verification”,
Journal of Applied Sciences, vol. 7, no. 21, pp. 3286-3291, 2007
[17] Z. Ouyang, J. Feng, F. Su and A. Cai, “Fingerprint Matching with Rotation Descriptor Texture Features”,
Proceedings of 18th International Conference on Pattern Recognition, Hong Kong, vol. 4, pp. 417-420, Aug., 2006
[18] S Pankati, S.Prabhakar, Jain A.K. “On the indiviaduality of Fingerprints.” Pattern Analysis And Machine
Intelligence,IEEE Tranactions on 24, no.8(2002) :1010-1025.
[19] Jain A.K., Hong l., Pankati S., Bolle R.,An Identity-authentication system using fingerprints, Proc.IEEE 85(9)
pp:1364-1388,1997
[20] Kovacs-Vajna Z.M., A Fingerprint verification system based on triangular matching and dynamic time warping,
IEEE Trans. Pattern Anal. Mach. Intel.22(11):1266-1276,2000
[21] Jiang X., Yau W.Y., Fingerprint minutiae matching based on the local and global structures, Proceeding of the
International Conference on Pattern Recognition, pp. 1030-1041, 2000

More Related Content

What's hot

Palmprint Identification Using FRIT
Palmprint Identification Using FRITPalmprint Identification Using FRIT
Palmprint Identification Using FRIT
Dakshina Ranjan Kisku
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
Salam Shah
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
EECJOURNAL
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
IDES Editor
 
Paper
PaperPaper
Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition
Sana Fakhfakh
 
Automatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionAutomatic Isolated word sign language recognition
Automatic Isolated word sign language recognition
Sana Fakhfakh
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
ijtsrd
 
Gesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign LanguageGesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign Language
IRJET Journal
 
finger prints
finger printsfinger prints
finger prints
Bhuvana Sundar
 
Face recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysisFace recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysis
acijjournal
 
Reducing Process-Time for Fingerprint Identification System
Reducing Process-Time for Fingerprint Identification SystemReducing Process-Time for Fingerprint Identification System
Reducing Process-Time for Fingerprint Identification System
CSCJournals
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
Editor IJARCET
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
ijtsrd
 
Og3424882497
Og3424882497Og3424882497
Og3424882497
IJERA Editor
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
ijsrd.com
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
IDES Editor
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
IJTET Journal
 
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Association of Scientists, Developers and Faculties
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
eSAT Journals
 

What's hot (20)

Palmprint Identification Using FRIT
Palmprint Identification Using FRITPalmprint Identification Using FRIT
Palmprint Identification Using FRIT
 
An offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levelsAn offline signature verification using pixels intensity levels
An offline signature verification using pixels intensity levels
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
 
Paper
PaperPaper
Paper
 
Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition Hand and wrist localization approach: sign language recognition
Hand and wrist localization approach: sign language recognition
 
Automatic Isolated word sign language recognition
Automatic Isolated word sign language recognitionAutomatic Isolated word sign language recognition
Automatic Isolated word sign language recognition
 
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
 
Gesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign LanguageGesture Acquisition and Recognition of Sign Language
Gesture Acquisition and Recognition of Sign Language
 
finger prints
finger printsfinger prints
finger prints
 
Face recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysisFace recogition from a single sample using rlog filter and manifold analysis
Face recogition from a single sample using rlog filter and manifold analysis
 
Reducing Process-Time for Fingerprint Identification System
Reducing Process-Time for Fingerprint Identification SystemReducing Process-Time for Fingerprint Identification System
Reducing Process-Time for Fingerprint Identification System
 
Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067Volume 2-issue-6-2064-2067
Volume 2-issue-6-2064-2067
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
 
Og3424882497
Og3424882497Og3424882497
Og3424882497
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
 
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 

Viewers also liked

Diabetics Online
Diabetics OnlineDiabetics Online
Diabetics Online
paperpublications3
 
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc NetworkEfficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network
paperpublications3
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
paperpublications3
 
Analysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing TechniquesAnalysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing Techniques
paperpublications3
 
Privacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive DataPrivacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive Data
paperpublications3
 
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
paperpublications3
 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancer
paperpublications3
 
Automatic Fire Fighting Robot
Automatic Fire Fighting RobotAutomatic Fire Fighting Robot
Automatic Fire Fighting Robot
paperpublications3
 
Fuzzy α^m-Separation Axioms
Fuzzy α^m-Separation AxiomsFuzzy α^m-Separation Axioms
Fuzzy α^m-Separation Axioms
paperpublications3
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
paperpublications3
 
Smart Password
Smart PasswordSmart Password
Smart Password
paperpublications3
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
paperpublications3
 
Some Aspects of Abelian Categories
Some Aspects of Abelian CategoriesSome Aspects of Abelian Categories
Some Aspects of Abelian Categories
paperpublications3
 
Sign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture AnalysisSign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture Analysis
paperpublications3
 
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
paperpublications3
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
paperpublications3
 
Multimedia Cloud Computing To Save Smartphone Energy
Multimedia Cloud Computing To Save Smartphone EnergyMultimedia Cloud Computing To Save Smartphone Energy
Multimedia Cloud Computing To Save Smartphone Energy
paperpublications3
 
Android Application for College
Android Application for CollegeAndroid Application for College
Android Application for College
paperpublications3
 
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key AbstractionEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
paperpublications3
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environment
paperpublications3
 

Viewers also liked (20)

Diabetics Online
Diabetics OnlineDiabetics Online
Diabetics Online
 
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc NetworkEfficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network
 
Folder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication SchemeFolder Security Using Graphical Password Authentication Scheme
Folder Security Using Graphical Password Authentication Scheme
 
Analysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing TechniquesAnalysis of Fungus in Plant Using Image Processing Techniques
Analysis of Fungus in Plant Using Image Processing Techniques
 
Privacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive DataPrivacy Preserving Data Leak Detection for Sensitive Data
Privacy Preserving Data Leak Detection for Sensitive Data
 
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
Using Bandwidth Aggregation to Improve the Performance of Video Quality- Adap...
 
Supervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For CancerSupervised Multi Attribute Gene Manipulation For Cancer
Supervised Multi Attribute Gene Manipulation For Cancer
 
Automatic Fire Fighting Robot
Automatic Fire Fighting RobotAutomatic Fire Fighting Robot
Automatic Fire Fighting Robot
 
Fuzzy α^m-Separation Axioms
Fuzzy α^m-Separation AxiomsFuzzy α^m-Separation Axioms
Fuzzy α^m-Separation Axioms
 
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor NetworksEfficient and Optimal Routing Scheme for Wireless Sensor Networks
Efficient and Optimal Routing Scheme for Wireless Sensor Networks
 
Smart Password
Smart PasswordSmart Password
Smart Password
 
Tree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETsTree Based Proactive Source Routing Protocol for MANETs
Tree Based Proactive Source Routing Protocol for MANETs
 
Some Aspects of Abelian Categories
Some Aspects of Abelian CategoriesSome Aspects of Abelian Categories
Some Aspects of Abelian Categories
 
Sign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture AnalysisSign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture Analysis
 
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
Comparative Study of Data Mining Classification Algorithms in Heart Disease P...
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
Multimedia Cloud Computing To Save Smartphone Energy
Multimedia Cloud Computing To Save Smartphone EnergyMultimedia Cloud Computing To Save Smartphone Energy
Multimedia Cloud Computing To Save Smartphone Energy
 
Android Application for College
Android Application for CollegeAndroid Application for College
Android Application for College
 
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key AbstractionEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
 
Secure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based EnvironmentSecure Encrypted Data in Cloud Based Environment
Secure Encrypted Data in Cloud Based Environment
 

Similar to Fingerprint Feature Extraction, Identification and Authentication: A Review

novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
INFOGAIN PUBLICATION
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
joyjonna282
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
Agbona Azeez
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
IJMER
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
vivatechijri
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
Dharmendrasingh417
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
Abhishek Walia
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
varsha mohite
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matching
Iaetsd Iaetsd
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
IJTET Journal
 
L026070074
L026070074L026070074
L026070074
ijceronline
 
FINGER PRINTINGS
FINGER PRINTINGSFINGER PRINTINGS
FINGER PRINTINGS
shiv dhori
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
IJCI JOURNAL
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
KARTHIKEYAN V
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
International Journal of Engineering Inventions www.ijeijournal.com
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
IJERA Editor
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET Journal
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint Analaysis
ANIKLAL2
 

Similar to Fingerprint Feature Extraction, Identification and Authentication: A Review (20)

novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Biometric Class Attendace System
Biometric Class Attendace SystemBiometric Class Attendace System
Biometric Class Attendace System
 
Study of Local Binary Pattern for Partial Fingerprint Identification
Study of Local Binary Pattern for Partial Fingerprint  IdentificationStudy of Local Binary Pattern for Partial Fingerprint  Identification
Study of Local Binary Pattern for Partial Fingerprint Identification
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project Fingerprint recognition (term paper) Project
Fingerprint recognition (term paper) Project
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matching
 
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...A Fast and Accurate Palmprint Identification System based on Consistency Orie...
A Fast and Accurate Palmprint Identification System based on Consistency Orie...
 
L026070074
L026070074L026070074
L026070074
 
FINGER PRINTINGS
FINGER PRINTINGSFINGER PRINTINGS
FINGER PRINTINGS
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
IRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation ForestIRJET- Credit Card Fraud Detection using Isolation Forest
IRJET- Credit Card Fraud Detection using Isolation Forest
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint Analaysis
 

Recently uploaded

BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
mahammadsalmanmech
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 

Recently uploaded (20)

BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Question paper of renewable energy sources
Question paper of renewable energy sourcesQuestion paper of renewable energy sources
Question paper of renewable energy sources
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 

Fingerprint Feature Extraction, Identification and Authentication: A Review

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 156 Paper Publications Fingerprint Feature Extraction, Identification and Authentication: A Review 1 Farah Fayaz Quraishi, 2 Summera Ashraf, 3 Dr. Manzoor Ahmad Chachoo 1, 2, 3 Department of Computer Science, University of Kashmir, Srinagar, Kashmir -190006, India Abstract: In the modern computerized world, due to high demand on fingerprint identification system, a lot of challenges keep arising in each phase of system, which include fingerprint image enhancement, feature extraction, features matching and fingerprint classification. Applications such as online banking and online shopping use techniques that depend on personal identification numbers, keys, or passwords. But there is the risk of data being forgotten, lost, or even stolen. One of the solutions to it may be biometric authentication methods which provide a unique way to identify, recognize and authenticate people. Fingerprints being the oldest methods of biometric authentication, are being explored at large. The main focus of the paper is to review fingerprint feature extraction, identification and authentication in different image/pattern based and minutiae-based fingerprints. Keywords: Fingerprints, identification, feature extraction, authentication, AFIS. 1. INTRODUCTION Fingerprint identification, also referred as “DACTYLOSCOPY”, is the method of verifying the fingerprints by comparing two instances of minutiae which can be extracted from human fingers, toes, or even the palm of the hand or sole of the foot. Fingerprint is one of the most researched and matured field of biometric authentication. The first known example of biometrics in practice was a form of fingerprinting being used in China (Joao De Barros, 2005). Fingerprints offer a flawless and reliable means of personal identification, thereby, replacing other methods of establishing identities and authentication. The science of fingerprint identification and authentication outshines all other forensic sciences on the following grounds (E. Spinella, 2002): 1) Fingerprint details are permanent. Other visible human characteristics tend to change – fingerprints don’t. Although with age as the skin loses elasticity, fingerprints seem to be changed. 2) No two fingerprints have been ever found alike in many billions of humans and automated computer comparisons, although individuality has been recently challenged in many court cases. According to the empirical study, two individuals will not have more than seven common minutiae (E. Spinella, 2002, Maio and D. Maltoni) Fingerprint Features Usually Considered: 1) Coarse Features: also known by the name of singular-points, are suited during an identification for presorting in a very large database and include:  Arch: These ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of finger.  Loop: The ridges enter from one side of a finger, form a curve, and then exit on the same side.  Whorl: Ridges form circularly around a central point on the finger.
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 157 Paper Publications 2) Fine Features: The major minutia features of fingerprint ridges are:  Ridge Ending: point at which ridge terminates.  Bifurcation: point at which single ridge splits into two ridges.  Short Ridge (Or Dot): are ridges which are significantly shorter than the average ridge length on fingerprint.  Core-Point: is the top-most point on the inner most ridge.  Delta-Point: is the tri-radial point with three ridges radiating. To identify and authenticate fingerprints, two steps are involved: Classification and Matching. Classification is the method of grouping fingerprints into a few types based on a criteria while fingerprint matching is a method that uses some sort of algorithm to assign the fingerprint to a particular person it belongs to, that is found in the database.. 2. BACKGROUND Fingerprints are constant, unique and form the most reliable criteria for identification (Pillay, 2009; Kanchan, T. Chattopadhyay, S., 2006). It has been shown that fingerprints provide high accuracy when compared with other existing biometric traits (A.K. Jain, P. Flynn, & A.A Ross; 2007). They are persistent in nature as they don’t easily change with age, unlike face and voice patterns. Fingerprints are incomparably the most sure and unchanging form of all other forms of signature (Francis Galton, 1892). According to Dario Maio and Davide Maltoni, “fingerprints are defined by a set of ridge lines and they can run parallel, can terminate sometimes or can even intersect each other and the points where the ridge lines are terminated, are known as Minutiae (D.Maio and D.Maltoni, 1997).” According to Galton, “each ridge is characterized by numerous minute peculiarities called Minutiae, which may divide and almost immediately reunite, enclosing a small circular or elliptical space or sometimes the independent beginning or ending of ridges (Francis Galton, 1892)”. In a fingerprint image, ridges are dark whereas valleys are bright. Ridges and valleys often run in parallel; sometimes they bifurcate and sometimes they terminate. A good quality fingerprint contains 25-80 numbers of minutiae (Neil Yager and Adnan Amin, 2004) which depend on the resolution and finger placement on the sensor. However, the fingerprint image captured through poor scanners, are found to have fewer number of minutiae points. The secretions in the fingerprints contain various chemicals and their metabolites which can be detected and used for the forensic purposes (Maio and D.Maltoni). Automatic fingerprint authentication systems can be broadly classified into two categories [13]. 1. Pattern (Image) based systems. 2. Minutiae based systems. Literature Review Of Pattern / Image Based Fingerprint Authentication Systems. Different authors have proposed different solutions to the problems of Pattern / Image Based Fingerprint Authentication Systems. 1. Bazen et al. (A. M. Bazen and S. H. Gerez, 2000] proposed a 3- step correlation-based fingerprint verification system. Step 1: Firstly, small sized templates are selected in the primary reference fingerprint. Step 2: Then using the technique of template matching, the query (secondary) fingerprint is found. The secondary fingerprint is the one to which the template matches the most. Step 3: To authenticate fingerprint matching, comparing template position in both the fingerprints is done. If the template position in both the primary and secondary fingerprint is same, the fingerprints are authenticated, else the case is opposite. Advantage: i) More stable than methods where correlation is computed globally. In this method, correlation is computed locally as small templates are selected. ii) Can tolerate the non-uniform local shape distortions in the fingerprint. Dis-Advantage: i) Computationally more expensive. ii) Not able to deal with rotations of more than 10 degree.
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 158 Paper Publications 2. Nandkumar et al. [K. Nandakumar and A. K. Jain,2004] proposed a local correlation-based fingerprint matching algorithm. In this algorithm, two different window sizes are used. One window is used for the minutia locations in the template image with window size of 42*42 pixels and another is used for the corresponding location in the query (secondary) image with window size of 32*32 pixels. The peak is detected by calculating the normalized cross-correlation between the query (secondary) window and the template window. All the possible correspondence from the alignment stage are tested and maximum correlation value over all the correspondence is taken as the matching score between the query and template image. Case i): If the distance between the peak and center is more than 10 pixels, the correlation between the template and query (secondary) window is zero. Case ii): If the distance between the peak and center is less than 10 pixels, then there is an absolute value of correlation between the query and template window. In all template windows, the local correlation with their corresponding regions in the query (secondary) images are found and their mean correlation is calculated. Advantage: i) More stable than methods where correlation is computed globally. Dis-Advantage: i) All minutiae points are to be extracted so that all the related problems remain in the system database. ii) Proper alignment algorithm is used before matching. iii) System is computationally expensive. 3. Owang et al. [Z. Ouyang, J. Feng, F. Su and A. Cai, 2006. ] proposed a correlation-based matching method using two functions i.e. Fourier- Mellin descriptor (FMD) and phase only correlation (POC). Most likely FMD pair is calculated from the pair images and then the two fingerprints are aligned and other corresponding FMD pairs are checked if they are matched or not. For the calculation of similarity of two FMDs and the alignment parameters, the POC function is used. Advantage: i) Is fast. ii) Does not require any minutiae or core information while taking rotation into account. . Dis-Advantage: i) Computationally more expensive. ii) Requires efficient method for the extraction of local FMDs to improve the performance of the system. 4. Cavusoglu et al. (A.Cavusoglu and S. Gorgunoglu, 2007) proposed a robust correlation-based fingerprint matching algorithm. Before the application of correlation, the steps followed in the algorithm requires segmentation, ridge orientation, reference point detection and normalized operation algorithm. In the enrollment stage, a set of features, starting from the core, are obtained with different radius (r) and with different angles (θ). The set of features are obtained by rotating the query image. For each rotation, the normalized cross correlation values of both the template and the query images are calculated. Higher the value of cross correlation, higher is the similarity between the query and template image. Advantage: i) Is efficient in terms of storage as only a set of features of template image are stored instead of the whole template image. Dis-Advantage: i) Requires the accurate detection of core point. ii) The method may fail in case the core is not present in the image.
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 159 Paper Publications Literature Review Of Minutiae-Based Fingerprint Systems: Generally there are 2 steps involved in fingerprint matching algorithms, first to align the fingerprints and then find the correspondences between the two. The various matching algorithms already given include: 1. Jain et.al [Jain A.K., Hong l., Pankati S., Bolle R,1997] : the algorithm given by Jain et.al is capable of compensating for some of the non-linear deformations and then finding the correspondences. The problem with the technique is that for accurate alignment; size of the image should be large, which takes much memory and computation. 2. Kovacs-Vajna [Kovacs-Vajna Z.M., 2000] : uses a triangular matching algorithm to deal with the deformations of fingerprints. However, the main drawback of this technique is that without further verification the final results of this matching algorithm are not acceptable. 3. Jiang and Yau [Jiang X., Yau W.Y., 2000 ] use both the local as well as global structures of minutiae in which the local structure of a minutiae are used to describe the rotation and translation invariant feature of the minutiae in its neighborhood, while as global structure define the uniqueness of fingerprint. The main drawback in this technique is that it can’t be used to compensate for real world distortions of a 3D elastic finger. 3. SUMMARY The notable strengths of fingerprint recognition include: o It provides a high level of recognition accuracy. o User friendly as it doesn’t require complex user-system interaction. o Due to its small interface can be used in a broad range of applications , such as E-Commerce, PC’s and mobile login. Some of most common CHALLENGES faced while dealing with fingerprint biometric authentication include: o Low quality of input (primary) images, o Data security issues related with fingerprint systems, o It is not yet proved that fingerprints are unique and families don’t share elements of the same pattern, o It is difficult to scan fingerprints of the elderly person as their skin loses elasticity and in some rare conditions can also leave some people with smooth, featureless fingertips. o Small-area sensors embedded in portable devices may result in less information available from a fingerprint. REFERENCES [1] Joao De Barros, Biometric history, August, 2005 [2] E. Spinella, “Biometrics Scanning Technologies: Finger, Facial and Retinal Scanning”, SANS Technology Institute, San Francisco, Dec., 2002. 3. D.; [3] Maio and D. Maltoni, “Direct Gray-Scale Minutiae Detection in Fingerprints”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.19, no.1 [4] Pillay, V.V. Textbook of Forensic Medicine and Toxicology. 15th ed. Hyderabad: Paras Medical Publishers, 2009: 53-94. [5] Kanchan, T. Chattopadhyay, S. Distribution of Fingerprint Patterns among Medical Students. Journal of Indian Acade-my of Forensic Medicine, 2006; 28(2): 65-68. ] [6] A.K. Jain, P. Flynn, & A.A Ross; Handbook of Biometrics; Springer, Secaucus, NJ, USA, 2007. [7] Francis Galton, Finger Prints; Macmillan & Co., London, New York, 1892. [8] D. Maio and D. Maltoni, “Direct Gray-Scale Minutiae Detection in Fingerprints”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.19, no.1, pp. 27-40, 1997.
  • 5. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 2, pp: (156-160), Month: October 2015 – March 2016, Available at: www.paperpublications.org Page | 160 Paper Publications [9] Francis Galton, Finger Prints; Macmillan & Co., London, New York, 1892 [10] Neil Yager and Adnan Amin; Fingerprint verification based on minutiae features: A review Pattern Analysis and Application, 7:94-113, February 2004 [11] L. Hong, Y. Wan, A. Jain, Fingerprint image enhancement: Algorithm and performance evaluation, IEEE Trans. Pattern Anal. Mach. Intell. (1998) 777– 789 [12] C. Khmanee, D. Nguyen, On the design of 2D Gabor filtering of fingerprint images, in: First IEEE Consumer Communications and Networking Conference, CCNC 2004, 2004, pp. 430–435 [13] P. Reid, “Biometric for Network Security”,1st Indian Reprint, Pearson Education, New Delhi, 2004. [14] A. M. Bazen and S. H. Gerez, “Directional Field Computation for Fingerprints based on the Principal Component Analysis of Local Gradients”, Proceedings of 11th Annual Workshopon Circuits, Systems and Signal Processing, Veldhoven, Netherlands, pp. 1-7, November, 2000. [15] K. Nandakumar and A. K. Jain, “Local Correlation-based Fingerprint Matching”, Proceedings of Indian Conference on Computer Vision, Graphics & Image Processing, pp.1-6, Kolkata, December, 2004 [16] A. Cavusoglu and S. Gorgunoglu, “A Robust Correlation based Fingerprint Matching Algorithm for Verification”, Journal of Applied Sciences, vol. 7, no. 21, pp. 3286-3291, 2007 [17] Z. Ouyang, J. Feng, F. Su and A. Cai, “Fingerprint Matching with Rotation Descriptor Texture Features”, Proceedings of 18th International Conference on Pattern Recognition, Hong Kong, vol. 4, pp. 417-420, Aug., 2006 [18] S Pankati, S.Prabhakar, Jain A.K. “On the indiviaduality of Fingerprints.” Pattern Analysis And Machine Intelligence,IEEE Tranactions on 24, no.8(2002) :1010-1025. [19] Jain A.K., Hong l., Pankati S., Bolle R.,An Identity-authentication system using fingerprints, Proc.IEEE 85(9) pp:1364-1388,1997 [20] Kovacs-Vajna Z.M., A Fingerprint verification system based on triangular matching and dynamic time warping, IEEE Trans. Pattern Anal. Mach. Intel.22(11):1266-1276,2000 [21] Jiang X., Yau W.Y., Fingerprint minutiae matching based on the local and global structures, Proceeding of the International Conference on Pattern Recognition, pp. 1030-1041, 2000