SlideShare a Scribd company logo
SUBMITTED TO:
Prof.Neeraj Bhargava
Professor and Head
Department of Computer Science
PRESENTED BY:
Arpit Kumar Sharma
M.Tech III Sem
Department of Computer Science
CONTENT
 MATLAB SOFTWARE
 INTRODUCTION
 FINGERPRINT RECOGINITION
 FINGERPRINT PATTERN
 FINGERPRINT RECOGINITION TECHNOLOGY
 PRINCIPLE COMPONENT ANALYSIS
 IMPLIMENTATION OF PCA
 EXPERIMENTAL RESULT
MATLAB SOFTWARE
 MATLAB is a high-performance language for technical
computing. It integrates computation, visualization, and
programming in an easy-to-use environment where problems
and solutions are expressed in familiar mathematical notation.
 Math and computation
 Algorithm development
 Data acquisition Modeling, simulation, and prototyping
Data analysis, exploration, and visualization
 Scientific and engineering graphic
 Application development, including graphical user
interface building.
INTRODUCTION
WHAT IS FINGERPRINT?
•An impression or mark made on a surface by a
person's fingertip.
•Able to be used for identifying individuals
from the unique pattern of whorls and lines on
the fingertips.
•Fingerprints are the tiny ridges, whorls and
valley patterns on the tip of each finger.
•Totally unique.
FINGERPRINT RECOGINITION
•Fingerprint recognition refers to the automated method of identifying or
confirming the identity of an individual based on the comparison of two
fingerprints.
•Fingerprint recognition is one of the most well known biometrics, and it is by far
the most used biometric solution for authentication on computerized system.
Fingerprint patterns
(a) Basic patterns
The three basic patterns of fingerprint ridges are:
•An arch is a pattern where the ridge enters one side of
the finger, then rises in the center forming an arch, and
exits on the other side of the finger.
•With a loop the ridge enters one side of the finger, then
forms a curve, and exits on the same side of the finger
from which it entered. Loops are the most common
pattern in fingerprints.
• Finally a whorl is the pattern you have when ridges
form circularly around a central point.
(b)Minutiae features
•Minutiae refer to specific points in a fingerprint,
these are the small details in a fingerprint that
are most important for fingerprint recognition.
•There are three major types of minutiae
features:
• The ridge ending,
•The bifurcation,
•The dot (also called short ridge).
•The ridge ending is, as indicated by the name,
the spot where a ridge ends.
•A bifurcation is the spot where a ridge splits
into two ridges. Spots are those fingerprint
ridges that are significantly shorter than other
ridges.
FINGERPRINT RECOGINITION TECHNOLOGY
 Enrollment phase : In the enrollment
phase:
 Sensor scans the fingerprint of user and
then determine the minutiae point .
 Feature extractor extracts the minutiae
points from image
 Then the system stores the minutiae
information along with demographic
information of the person as a template in
the database.
 Recognition phase: In the recognition
phase,
 Sensor generates the fingerprint image of
user namely as a query image.
 Minutiae extractor will extracts the
minutiae points from query image and then
the matcher module compares the minutiae
points of user’s image with the stored
minutiae template in database and then a
match score is generated by the system.
 After that, System determines the person’s
identity by comparing the obtained match
score with the threshold value.
 The basic function of the fingerprint
recognition system.
A fingerprint recognition technology mainly works in two phase :
Fingerprint Recognition Steps:
 The fingerprint classification based on mainly two strategies.
 Local features : Local features can be characterized as minutiae points.
 Global features : Global characteristics of fingerprint can be easily seen
with our eyes like pattern type, orientation, position, spatial frequency,
line types- dot, island, core, curvature points.
 The main ingredients of thumb impression are defined by its type,
position of minutiae, orientation etc.
 It is true that global attributes of more than one person are similar but
their local features can never be same.
 Discovery of local features needs to determine the ridge ends or
bifurcation.
 In order to extract these minutiae various steps must be followed:
(1) Image acquisition
 In this step raw image of fingerprint is taken from source.
 Fingerprint impression can be easily received when ridges and valleys of a
finger touches a surface.
 Fingerprint may be scanned through off line fingerprint acquisition through
ink technique.
 And system captures the impression then in matching phase fingerprint are
matched with large number of stored database.
 Fingerprint verification generally uses two schemes minutiae based (local
representatives) and image based (whole features of global representatives).
 A fingerprint image may be contaminated
due to noise present in image, holes, blurred
image, and smeared mark on surface,
corrupted devices or scanner.
 Enhancement is necessary step to increase
contrast between ridges and furrows, to get
rid of unrecoverable regions, to improve
clarity of ridges minutiae and bifurcation,
speedy extraction of minutiae ,increase
brightness of an image, normalization,
orientation estimation, filtering of an
image, binarization and thinning steps.
 The very first step in enhancement is
Normalization may be performed to check
image quality and also for easily comparison
with different modalities. database.
(2) Image Enhancement
 Features extraction mainly uses three
approaches such as:
 feature based method (global),
 image based,
 minutiae based features (local).
 The local and global feature describe the
whole structure and characteristics of
impression such as loop, arch, whorl etc
patterns like two ridge meets, ridges singular
point, ridges count, core point, lines type etc
made up all these features.
 The extracted features from each fingerprint
contain the orientation details like position of
center point, bifurcation and ridge ending and
Euclidean distance between feature vector
points.
INPUT
IMAGE
ENHANCEMEN
T
FEATURE
ECTRACTION
(3)Fingerprint Extraction
 Binarization is a procedure by which the
grayscale image is changed over into a black
and white image. Generally 1 is taken as
white and 0 as black.
 0-value for ridges and 1-value for furrows.
 After the operation, fingerprint is highlighted
ridges in the fingerprint are featured with
black color while furrows are white for
processing.
(4)Image Binarization
INPUT
BINARIZATI
ON
 In the biometric process of finger scanning, minutiae are specific points in a finger
image.
 There are two main types, known as ridge endings and bifurcations. Sometimes,
other details, such as the points at which scars begin or terminate, are considered
minutiae.
 The number and locations of the minutiae vary from finger to finger .
 When a set of finger images is obtained from an individual, the number of minutiae
is recorded for each finger.
 The precise locations of the minutiae are also recorded, in the form of numerical
coordinates, for each finger.
(5) Minutiae Extraction
(5.1) Image thinning
 Fingerprint ridge thinning process eliminating the
redundant pixels of ridges and this will carried
out till the ridges are just one pixel wide in
length.
 Removes noise as well.
 Fingerprint image passed for orientation,
alignment checking process for discovery of
direction of each point where ridges are
ending,edges.
 Two ridges are splitting and so on in thumb
impression.
(5.2) Terminations and bifurcations
matching
 Various data acquisition conditions such as
impression pressure can easily change a minutia
form into a different one.
 we adopt the elastic match representation for both
termination and bifurcation.
 So each minutia is wholely described by its
coordinates (x,y) and its orientation.
(6)Minutiae Matching
 One image chosen dynamically and another chosen
by system from database; now segmented image of
each block will be matched based on ridges
associated with two reference minutiae points .
 Now calculate the matching minutiae in each block
coordinates; i.e. where x-axis coincident with the
reference segmented image with direction of
minutiae points.
 In matching stage we actually evaluate the
matched minutiae pairs from two images nearly
with same position and direction are same.
 Also in matching algorithm for different alignment
of impression from each person is taken then each
minutia in the template either matched within
rectangle box and orientation is slightly deformed.
PRINCIPLE COMPONENT ANALYSIS
 PCA finds the principal components of data.
 It is often useful to measure data in terms of its principal components rather than on a normal
x-y axis.
 The main idea of PCA is to reduce the dimensionality of a data set consisting of many
variables correlated with each other, either heavily or lightly, while retaining the variation
present in the dataset, up to the maximum extent.
 The same is done by transforming the variables to a new set of variables, which are known as
the principal components (or simply, the PCs) and are orthogonal, ordered such that the
retention of variation present in the original variables decreases as we move down in the order.
 The principal components are linear combinations of the original variables weighted by their
contribution to explaining the variance in a particular orthogonal dimension.
Implementation of PCA
Step 1: Normalize the data
 First step is to normalize the data that we have so that PCA works properly.
This is done by subtracting the respective means from the numbers in the
respective column. So if we have two dimensions X and Y, all X become 𝔁-
and all Y become 𝒚-.
 This produces a dataset whose mean is zero.
Step 2: Calculate the covariance matrix
 Since the dataset we took is 2-dimensional, this will result in a 2x2
Covariance matrix.
 Please note that Var[X1] = Cov[X1,X1] and Var[X2] = Cov[X2,X2].
Step 3: Calculate the eigenvalues and eigenvectors
 Next step is to calculate the eigenvalues and eigenvectors for the covariance
matrix. The same is possible because it is a square matrix. ƛ is an eigenvalue
for a matrix A if it is a solution of the characteristic equation:
det( ƛI - A ) = 0
 Where, I is the identity matrix of the same dimension as A which is a
required condition for the matrix subtraction as well in this case and ‘det’ is
the determinant of the matrix. For each eigenvalue ƛ, a corresponding
Eigen-vector v, can be found by solving:
( ƛI - A )v = 0
Step 4: Choosing components and forming a
feature vector:
 We order the eigenvalues from largest to smallest so that it gives us the
components in order or significance. Here comes the dimensionality
reduction part. If we have a dataset with n variables, then we have the
corresponding n eigenvalues and eigenvectors. It turns out that the
eigenvector corresponding to the highest eigenvalue is the principal
component of the dataset and it is our call as to how many eigenvalues we
choose to proceed our analysis with. To reduce the dimensions, we choose
the first p eigenvalues and ignore the rest. We do lose out some information
in the process, but if the eigenvalues are small, we do not lose much.
 Next we form a feature vector which is a matrix of vectors, in our case, the
eigenvectors. In fact, only those eigenvectors which we want to proceed
with. Since we just have 2 dimensions in the running example, we can either
choose the one corresponding to the greater eigenvalue or simply take
both.
Feature Vector = (eig1, eig2)
Step 5: Forming Principal Components:
 This is the final step where we actually form the principal
components using all the math we did till here. For the same, we take
the transpose of the feature vector and left-multiply it with the
transpose of scaled version of original dataset.
NewData = FeatureVectorT x ScaledDataT
 Here,
NewData is the Matrix consisting of the principal components,
FeatureVector is the matrix we formed using the eigenvectors we
chose to keep, and
ScaledData is the scaled version of original dataset
 (‘T’ in the superscript denotes transpose of a matrix which is formed
by interchanging the rows to columns and vice versa. In particular, a
2x3 matrix has a transpose of size 3x2).
 All the eigenvectors of a matrix are perpendicular to each other. So, in PCA,
what we do is represent or transform the original dataset using these
orthogonal (perpendicular) eigenvectors instead of representing on normal x
and y axes.
 We have now classified our data points as a combination of contributions
from both x and y.
 The difference lies when we actually disregard one or many eigenvectors,
hence, reducing the dimension of the dataset.
 Otherwise, in case, we take all the eigenvectors in account, we are just
transforming the co-ordinates and hence, not serving the purpose.
EXPERIMENTAL RESULT
EXPERIMENTAL RESULT
THANK YOU

More Related Content

What's hot

Lab manual of Digital image processing using python by khalid Shaikh
Lab manual of Digital image processing using python by khalid ShaikhLab manual of Digital image processing using python by khalid Shaikh
Lab manual of Digital image processing using python by khalid Shaikh
khalidsheikh24
 
Face recognition
Face recognitionFace recognition
Face recognition
Balamurugan M
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul Islam
Nazmul Islam
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
Pavan Kumar MT
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentals
A B Shinde
 
Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)nikhilus85
 
Image Processing and Computer Vision
Image Processing and Computer VisionImage Processing and Computer Vision
Image Processing and Computer Vision
Silicon Mentor
 
Image Stitching for Panorama View
Image Stitching for Panorama ViewImage Stitching for Panorama View
Image Stitching for Panorama View
Nimai Chand Das Adhikari
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
Mazin Alwaaly
 
Facial Recognition
Facial RecognitionFacial Recognition
Facial Recognition
Pallavi Agarwal
 
Computer vision in medical application
Computer vision in medical applicationComputer vision in medical application
Computer vision in medical application
VishwasN6
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
iosrjce
 
Image Segmentation (D3L1 2017 UPC Deep Learning for Computer Vision)
Image Segmentation (D3L1 2017 UPC Deep Learning for Computer Vision)Image Segmentation (D3L1 2017 UPC Deep Learning for Computer Vision)
Image Segmentation (D3L1 2017 UPC Deep Learning for Computer Vision)
Universitat Politècnica de Catalunya
 
color detection using open cv
color detection using open cvcolor detection using open cv
color detection using open cv
Anil Pokhrel
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
varsha mohite
 
Ai lecture 03 computer vision
Ai lecture 03 computer visionAi lecture 03 computer vision
Ai lecture 03 computer vision
Ahmad sohail Kakar
 
03 digital image fundamentals DIP
03 digital image fundamentals DIP03 digital image fundamentals DIP
03 digital image fundamentals DIP
babak danyal
 
Deep learning-for-pose-estimation-wyang-defense
Deep learning-for-pose-estimation-wyang-defenseDeep learning-for-pose-estimation-wyang-defense
Deep learning-for-pose-estimation-wyang-defense
Wei Yang
 
Computer vision ppt
Computer vision pptComputer vision ppt
Computer vision ppt
geethamegharaj1
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
Self
 

What's hot (20)

Lab manual of Digital image processing using python by khalid Shaikh
Lab manual of Digital image processing using python by khalid ShaikhLab manual of Digital image processing using python by khalid Shaikh
Lab manual of Digital image processing using python by khalid Shaikh
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Hough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul IslamHough Transform By Md.Nazmul Islam
Hough Transform By Md.Nazmul Islam
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Image processing fundamentals
Image processing fundamentalsImage processing fundamentals
Image processing fundamentals
 
Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)Action Recognition (Thesis presentation)
Action Recognition (Thesis presentation)
 
Image Processing and Computer Vision
Image Processing and Computer VisionImage Processing and Computer Vision
Image Processing and Computer Vision
 
Image Stitching for Panorama View
Image Stitching for Panorama ViewImage Stitching for Panorama View
Image Stitching for Panorama View
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Facial Recognition
Facial RecognitionFacial Recognition
Facial Recognition
 
Computer vision in medical application
Computer vision in medical applicationComputer vision in medical application
Computer vision in medical application
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
Image Segmentation (D3L1 2017 UPC Deep Learning for Computer Vision)
Image Segmentation (D3L1 2017 UPC Deep Learning for Computer Vision)Image Segmentation (D3L1 2017 UPC Deep Learning for Computer Vision)
Image Segmentation (D3L1 2017 UPC Deep Learning for Computer Vision)
 
color detection using open cv
color detection using open cvcolor detection using open cv
color detection using open cv
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Ai lecture 03 computer vision
Ai lecture 03 computer visionAi lecture 03 computer vision
Ai lecture 03 computer vision
 
03 digital image fundamentals DIP
03 digital image fundamentals DIP03 digital image fundamentals DIP
03 digital image fundamentals DIP
 
Deep learning-for-pose-estimation-wyang-defense
Deep learning-for-pose-estimation-wyang-defenseDeep learning-for-pose-estimation-wyang-defense
Deep learning-for-pose-estimation-wyang-defense
 
Computer vision ppt
Computer vision pptComputer vision ppt
Computer vision ppt
 
Introduction to biometric systems security
Introduction to biometric systems securityIntroduction to biometric systems security
Introduction to biometric systems security
 

Similar to "FingerPrint Recognition Using Principle Component Analysis(PCA)”

Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino uno
VibhuThakur3
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
Tufail Ahmed
 
Reconstruction of fingerprints
Reconstruction of fingerprintsReconstruction of fingerprints
Reconstruction of fingerprintsJuhi Khandelwal
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
IOSR Journals
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
ijfcstjournal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
IJERA Editor
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint
ijasuc
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
IJET - International Journal of Engineering and Techniques
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
IRJET-Computer Aided Touchless Palmprint Recognition Using Sift
IRJET-Computer Aided Touchless Palmprint Recognition Using SiftIRJET-Computer Aided Touchless Palmprint Recognition Using Sift
IRJET-Computer Aided Touchless Palmprint Recognition Using Sift
IRJET Journal
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumar
shritosh kumar
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
IJECEIAES
 
L017248388
L017248388L017248388
L017248388
IOSR Journals
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
IRJET Journal
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowAlexander Decker
 

Similar to "FingerPrint Recognition Using Principle Component Analysis(PCA)” (20)

Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino uno
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Reconstruction of fingerprints
Reconstruction of fingerprintsReconstruction of fingerprints
Reconstruction of fingerprints
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Fingerprints images
Fingerprints imagesFingerprints images
Fingerprints images
 
1834 1840
1834 18401834 1840
1834 1840
 
1834 1840
1834 18401834 1840
1834 1840
 
IRJET-Computer Aided Touchless Palmprint Recognition Using Sift
IRJET-Computer Aided Touchless Palmprint Recognition Using SiftIRJET-Computer Aided Touchless Palmprint Recognition Using Sift
IRJET-Computer Aided Touchless Palmprint Recognition Using Sift
 
Ear Biometrics shritosh kumar
Ear Biometrics shritosh kumarEar Biometrics shritosh kumar
Ear Biometrics shritosh kumar
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
 
L017248388
L017248388L017248388
L017248388
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial window
 

More from Er. Arpit Sharma

IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
Er. Arpit Sharma
 
Recommendation system by_arpit_sharma
Recommendation system by_arpit_sharmaRecommendation system by_arpit_sharma
Recommendation system by_arpit_sharma
Er. Arpit Sharma
 
Machine learning introduction by arpit_sharma
Machine learning introduction by arpit_sharmaMachine learning introduction by arpit_sharma
Machine learning introduction by arpit_sharma
Er. Arpit Sharma
 
Hierarchical clustering machine learning by arpit_sharma
Hierarchical clustering  machine learning by arpit_sharmaHierarchical clustering  machine learning by arpit_sharma
Hierarchical clustering machine learning by arpit_sharma
Er. Arpit Sharma
 
Artificial neural network by arpit_sharma
Artificial neural network by arpit_sharmaArtificial neural network by arpit_sharma
Artificial neural network by arpit_sharma
Er. Arpit Sharma
 
Association rules by arpit_sharma
Association rules by arpit_sharmaAssociation rules by arpit_sharma
Association rules by arpit_sharma
Er. Arpit Sharma
 
Bioinformatics Gaussian by ChARM’s
Bioinformatics Gaussian by ChARM’sBioinformatics Gaussian by ChARM’s
Bioinformatics Gaussian by ChARM’s
Er. Arpit Sharma
 

More from Er. Arpit Sharma (9)

HCI
HCI HCI
HCI
 
HCI
HCIHCI
HCI
 
IoT [Internet of Things]
IoT [Internet of Things]IoT [Internet of Things]
IoT [Internet of Things]
 
Recommendation system by_arpit_sharma
Recommendation system by_arpit_sharmaRecommendation system by_arpit_sharma
Recommendation system by_arpit_sharma
 
Machine learning introduction by arpit_sharma
Machine learning introduction by arpit_sharmaMachine learning introduction by arpit_sharma
Machine learning introduction by arpit_sharma
 
Hierarchical clustering machine learning by arpit_sharma
Hierarchical clustering  machine learning by arpit_sharmaHierarchical clustering  machine learning by arpit_sharma
Hierarchical clustering machine learning by arpit_sharma
 
Artificial neural network by arpit_sharma
Artificial neural network by arpit_sharmaArtificial neural network by arpit_sharma
Artificial neural network by arpit_sharma
 
Association rules by arpit_sharma
Association rules by arpit_sharmaAssociation rules by arpit_sharma
Association rules by arpit_sharma
 
Bioinformatics Gaussian by ChARM’s
Bioinformatics Gaussian by ChARM’sBioinformatics Gaussian by ChARM’s
Bioinformatics Gaussian by ChARM’s
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

"FingerPrint Recognition Using Principle Component Analysis(PCA)”

  • 1. SUBMITTED TO: Prof.Neeraj Bhargava Professor and Head Department of Computer Science PRESENTED BY: Arpit Kumar Sharma M.Tech III Sem Department of Computer Science
  • 2. CONTENT  MATLAB SOFTWARE  INTRODUCTION  FINGERPRINT RECOGINITION  FINGERPRINT PATTERN  FINGERPRINT RECOGINITION TECHNOLOGY  PRINCIPLE COMPONENT ANALYSIS  IMPLIMENTATION OF PCA  EXPERIMENTAL RESULT
  • 3. MATLAB SOFTWARE  MATLAB is a high-performance language for technical computing. It integrates computation, visualization, and programming in an easy-to-use environment where problems and solutions are expressed in familiar mathematical notation.  Math and computation  Algorithm development  Data acquisition Modeling, simulation, and prototyping Data analysis, exploration, and visualization  Scientific and engineering graphic  Application development, including graphical user interface building.
  • 4. INTRODUCTION WHAT IS FINGERPRINT? •An impression or mark made on a surface by a person's fingertip. •Able to be used for identifying individuals from the unique pattern of whorls and lines on the fingertips. •Fingerprints are the tiny ridges, whorls and valley patterns on the tip of each finger. •Totally unique.
  • 5. FINGERPRINT RECOGINITION •Fingerprint recognition refers to the automated method of identifying or confirming the identity of an individual based on the comparison of two fingerprints. •Fingerprint recognition is one of the most well known biometrics, and it is by far the most used biometric solution for authentication on computerized system.
  • 6. Fingerprint patterns (a) Basic patterns The three basic patterns of fingerprint ridges are: •An arch is a pattern where the ridge enters one side of the finger, then rises in the center forming an arch, and exits on the other side of the finger. •With a loop the ridge enters one side of the finger, then forms a curve, and exits on the same side of the finger from which it entered. Loops are the most common pattern in fingerprints. • Finally a whorl is the pattern you have when ridges form circularly around a central point.
  • 7. (b)Minutiae features •Minutiae refer to specific points in a fingerprint, these are the small details in a fingerprint that are most important for fingerprint recognition. •There are three major types of minutiae features: • The ridge ending, •The bifurcation, •The dot (also called short ridge). •The ridge ending is, as indicated by the name, the spot where a ridge ends. •A bifurcation is the spot where a ridge splits into two ridges. Spots are those fingerprint ridges that are significantly shorter than other ridges.
  • 8. FINGERPRINT RECOGINITION TECHNOLOGY  Enrollment phase : In the enrollment phase:  Sensor scans the fingerprint of user and then determine the minutiae point .  Feature extractor extracts the minutiae points from image  Then the system stores the minutiae information along with demographic information of the person as a template in the database.  Recognition phase: In the recognition phase,  Sensor generates the fingerprint image of user namely as a query image.  Minutiae extractor will extracts the minutiae points from query image and then the matcher module compares the minutiae points of user’s image with the stored minutiae template in database and then a match score is generated by the system.  After that, System determines the person’s identity by comparing the obtained match score with the threshold value.  The basic function of the fingerprint recognition system. A fingerprint recognition technology mainly works in two phase :
  • 9. Fingerprint Recognition Steps:  The fingerprint classification based on mainly two strategies.  Local features : Local features can be characterized as minutiae points.  Global features : Global characteristics of fingerprint can be easily seen with our eyes like pattern type, orientation, position, spatial frequency, line types- dot, island, core, curvature points.  The main ingredients of thumb impression are defined by its type, position of minutiae, orientation etc.  It is true that global attributes of more than one person are similar but their local features can never be same.  Discovery of local features needs to determine the ridge ends or bifurcation.  In order to extract these minutiae various steps must be followed:
  • 10. (1) Image acquisition  In this step raw image of fingerprint is taken from source.  Fingerprint impression can be easily received when ridges and valleys of a finger touches a surface.  Fingerprint may be scanned through off line fingerprint acquisition through ink technique.  And system captures the impression then in matching phase fingerprint are matched with large number of stored database.  Fingerprint verification generally uses two schemes minutiae based (local representatives) and image based (whole features of global representatives).
  • 11.  A fingerprint image may be contaminated due to noise present in image, holes, blurred image, and smeared mark on surface, corrupted devices or scanner.  Enhancement is necessary step to increase contrast between ridges and furrows, to get rid of unrecoverable regions, to improve clarity of ridges minutiae and bifurcation, speedy extraction of minutiae ,increase brightness of an image, normalization, orientation estimation, filtering of an image, binarization and thinning steps.  The very first step in enhancement is Normalization may be performed to check image quality and also for easily comparison with different modalities. database. (2) Image Enhancement
  • 12.  Features extraction mainly uses three approaches such as:  feature based method (global),  image based,  minutiae based features (local).  The local and global feature describe the whole structure and characteristics of impression such as loop, arch, whorl etc patterns like two ridge meets, ridges singular point, ridges count, core point, lines type etc made up all these features.  The extracted features from each fingerprint contain the orientation details like position of center point, bifurcation and ridge ending and Euclidean distance between feature vector points. INPUT IMAGE ENHANCEMEN T FEATURE ECTRACTION (3)Fingerprint Extraction
  • 13.  Binarization is a procedure by which the grayscale image is changed over into a black and white image. Generally 1 is taken as white and 0 as black.  0-value for ridges and 1-value for furrows.  After the operation, fingerprint is highlighted ridges in the fingerprint are featured with black color while furrows are white for processing. (4)Image Binarization INPUT BINARIZATI ON
  • 14.  In the biometric process of finger scanning, minutiae are specific points in a finger image.  There are two main types, known as ridge endings and bifurcations. Sometimes, other details, such as the points at which scars begin or terminate, are considered minutiae.  The number and locations of the minutiae vary from finger to finger .  When a set of finger images is obtained from an individual, the number of minutiae is recorded for each finger.  The precise locations of the minutiae are also recorded, in the form of numerical coordinates, for each finger. (5) Minutiae Extraction
  • 15. (5.1) Image thinning  Fingerprint ridge thinning process eliminating the redundant pixels of ridges and this will carried out till the ridges are just one pixel wide in length.  Removes noise as well.  Fingerprint image passed for orientation, alignment checking process for discovery of direction of each point where ridges are ending,edges.  Two ridges are splitting and so on in thumb impression. (5.2) Terminations and bifurcations matching  Various data acquisition conditions such as impression pressure can easily change a minutia form into a different one.  we adopt the elastic match representation for both termination and bifurcation.  So each minutia is wholely described by its coordinates (x,y) and its orientation.
  • 16. (6)Minutiae Matching  One image chosen dynamically and another chosen by system from database; now segmented image of each block will be matched based on ridges associated with two reference minutiae points .  Now calculate the matching minutiae in each block coordinates; i.e. where x-axis coincident with the reference segmented image with direction of minutiae points.  In matching stage we actually evaluate the matched minutiae pairs from two images nearly with same position and direction are same.  Also in matching algorithm for different alignment of impression from each person is taken then each minutia in the template either matched within rectangle box and orientation is slightly deformed.
  • 17. PRINCIPLE COMPONENT ANALYSIS  PCA finds the principal components of data.  It is often useful to measure data in terms of its principal components rather than on a normal x-y axis.  The main idea of PCA is to reduce the dimensionality of a data set consisting of many variables correlated with each other, either heavily or lightly, while retaining the variation present in the dataset, up to the maximum extent.  The same is done by transforming the variables to a new set of variables, which are known as the principal components (or simply, the PCs) and are orthogonal, ordered such that the retention of variation present in the original variables decreases as we move down in the order.  The principal components are linear combinations of the original variables weighted by their contribution to explaining the variance in a particular orthogonal dimension.
  • 18. Implementation of PCA Step 1: Normalize the data  First step is to normalize the data that we have so that PCA works properly. This is done by subtracting the respective means from the numbers in the respective column. So if we have two dimensions X and Y, all X become 𝔁- and all Y become 𝒚-.  This produces a dataset whose mean is zero. Step 2: Calculate the covariance matrix  Since the dataset we took is 2-dimensional, this will result in a 2x2 Covariance matrix.  Please note that Var[X1] = Cov[X1,X1] and Var[X2] = Cov[X2,X2].
  • 19. Step 3: Calculate the eigenvalues and eigenvectors  Next step is to calculate the eigenvalues and eigenvectors for the covariance matrix. The same is possible because it is a square matrix. ƛ is an eigenvalue for a matrix A if it is a solution of the characteristic equation: det( ƛI - A ) = 0  Where, I is the identity matrix of the same dimension as A which is a required condition for the matrix subtraction as well in this case and ‘det’ is the determinant of the matrix. For each eigenvalue ƛ, a corresponding Eigen-vector v, can be found by solving: ( ƛI - A )v = 0
  • 20. Step 4: Choosing components and forming a feature vector:  We order the eigenvalues from largest to smallest so that it gives us the components in order or significance. Here comes the dimensionality reduction part. If we have a dataset with n variables, then we have the corresponding n eigenvalues and eigenvectors. It turns out that the eigenvector corresponding to the highest eigenvalue is the principal component of the dataset and it is our call as to how many eigenvalues we choose to proceed our analysis with. To reduce the dimensions, we choose the first p eigenvalues and ignore the rest. We do lose out some information in the process, but if the eigenvalues are small, we do not lose much.  Next we form a feature vector which is a matrix of vectors, in our case, the eigenvectors. In fact, only those eigenvectors which we want to proceed with. Since we just have 2 dimensions in the running example, we can either choose the one corresponding to the greater eigenvalue or simply take both. Feature Vector = (eig1, eig2)
  • 21. Step 5: Forming Principal Components:  This is the final step where we actually form the principal components using all the math we did till here. For the same, we take the transpose of the feature vector and left-multiply it with the transpose of scaled version of original dataset. NewData = FeatureVectorT x ScaledDataT  Here, NewData is the Matrix consisting of the principal components, FeatureVector is the matrix we formed using the eigenvectors we chose to keep, and ScaledData is the scaled version of original dataset  (‘T’ in the superscript denotes transpose of a matrix which is formed by interchanging the rows to columns and vice versa. In particular, a 2x3 matrix has a transpose of size 3x2).
  • 22.  All the eigenvectors of a matrix are perpendicular to each other. So, in PCA, what we do is represent or transform the original dataset using these orthogonal (perpendicular) eigenvectors instead of representing on normal x and y axes.  We have now classified our data points as a combination of contributions from both x and y.  The difference lies when we actually disregard one or many eigenvectors, hence, reducing the dimension of the dataset.  Otherwise, in case, we take all the eigenvectors in account, we are just transforming the co-ordinates and hence, not serving the purpose.