SlideShare a Scribd company logo
1 of 14
Fingerprints Recognition
          using
    Neural Network



         Presented By:
         GURJANT SINGH SANDHU (328)
         PRANJAL SINGH (333)
Fingerprints
 A fingerprint in its narrow sense is an
 impression left by the friction ridges of a
 human finger.

 Their pattern is permanent and unchangeable on each
 finger during the whole life time of an individual.

 The probability that fingerprints of two individual are
 alike is about 1 in 1.9×1015.

 According to FBI the accuracy and reliability of
 fingerprint scans are correct 99.8% of the time.
Fingerprint Pattern
Pattern recognition System
      Image         Edge                  Feature    Classifier
                              Thinning
    Acquisition   Detection              Extractor




 Image Acquisition
  Converting a scene into an array
 of numbers that can be manipulated by a computer.
 Edge Detection and Thinning
  These are the part of preprocessing step which involves
removing noise, enhancing the picture and, if necessary,
segmenting the image into meaningful regions.
Pattern recognition System
      Image         Edge                  Feature    Classifier
                              Thinning
    Acquisition   Detection              Extractor




  Feature extraction
   The image is represented by a set of
numerical “features” to remove
redundancy from data and reduce its dimensions.
 Classification
    Class label is assigned to the image by examining its
extracted features and comparing them with the class that
it has already learned.
Why use Neural Network?
    A neural network consists of an interconnected group
    of artificial neurons, and it processes information and
    help us to find solution.
   There is no need to program Neural Network they
    learn with the examples.
   Neural Networks offers significant speed advantage
    over conventional techniques.
Other Applications
 Character Recognition
  The idea of character recognition has become very
important as handheld devices like Palm Pilot are
becoming increasingly popular.

 Image Compression
  Neural networks can receive and process large
amount of information at once, making them useful in
image compression. With internet explosion and
more and websites using more and more images,
using neural networks for image compression is
worth a look.
Other Applications
 Stock Market Prediction
  The day-to-day business of stock market is
extremely complicated. Stock prices will go up or
down is the result of many different factors. Since
neural network can examine a lot of information, they
can be used to predict stock prices.

 Travelling Salesman Problem
   Neural network can solve the travelling salesman
problem, but only to a certain degree of
approximation.

   Medicine, Security, and Loan Applications.
Preprocessing System
   The first phase of the work is to capture the
    fingerprints image and convert it into a digital
    representation of 512×512 by 256 grey levels.

   The binary image is further enhanced by a
    thinning algorithm which reduces the image
    ridges to a skeletal structure.
Preprocessing System
   After obtaining the binary form of the
    fingerprint image, there may be some
    irregularities caused by skinfolds and spreading
    of ink due to finger pressure, and so on…

   The remedy to this problem is smoothing to fill
    holes, delete unnecessary points, removing
    noisy points and filling necessary missing points.
Application of fingerprint
                   Recognition

   The fingerprint recognition system can be easily
    embedded in any system. It is used in-
    ◦   Recognition of criminals in law enforcement.
    ◦   Used in providing security to cars, lockers, banks, shops.
    ◦   To differentiate between persons.
    ◦   To count the individuals.
    ◦   Drug detection.
Criticism
   Despite the widespread acceptance of fingerprint
    evidence, many question its worth due to a significant
    amount of identification mistakes. There is a question of
    its reliability and accuracy.

   For example, in 2000, an individual was arrested for
    murder and was told by police that fingerprint experts
    matched his fingerprints to those found at the crime
    scene. The individual's attorney hired his own fingerprint
    experts, two former FBI examiners, who determined
    that absolutely no positive identification took place.
    After some post-incarceration legal wrangling, this
    evidence was deemed sufficient for an acquittal.
Conclusion
 For centuries fingerprints have been one of the most
  highly used methods for human recognition; automated
  biometric system have only been available in recent
  years.
 The advancement of technology have led to next
  generation of fingerprint recognition devices which are
  highly reliable and accurate.
 Fingerprints have a broad acceptance with the general
  public, law enforcement and the forensic science
  community.
 Hence, they will continue to be used for human
  recognition and for new systems that require a reliable
  biometric.
THANK YOU

More Related Content

What's hot

What's hot (20)

Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint Matching
 
Biometrics
BiometricsBiometrics
Biometrics
 
Image Compression Using Neural Network
 Image Compression Using Neural Network Image Compression Using Neural Network
Image Compression Using Neural Network
 
Local binary pattern
Local binary patternLocal binary pattern
Local binary pattern
 
Biometric
Biometric Biometric
Biometric
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Project Face Detection
Project Face Detection Project Face Detection
Project Face Detection
 
IRIS RECOGNITION
IRIS RECOGNITION IRIS RECOGNITION
IRIS RECOGNITION
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Image processing, Noise, Noise Removal filters
Image processing, Noise, Noise Removal filtersImage processing, Noise, Noise Removal filters
Image processing, Noise, Noise Removal filters
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
CHARACTER RECOGNITION USING NEURAL NETWORK WITHOUT FEATURE EXTRACTION FOR KAN...
 
Keystroke dynamics
Keystroke dynamicsKeystroke dynamics
Keystroke dynamics
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 

Viewers also liked

Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications Ahmed_hashmi
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applicationsAkhil Kumar
 
palm vein technology
palm vein technologypalm vein technology
palm vein technologyRAJASHREE B
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptxschetan202
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsPaul Green
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Priyanka Pradhan
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAparna Bhadran
 
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Universitat Politècnica de Catalunya
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKcodebangla
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionUmesh Dhital
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)shraddha_b
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology Anurag Chitti
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention systemNikhil Raj
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural networkIndira Nayak
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural networkSumeet Kakani
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system pptSheetal Verma
 

Viewers also liked (20)

Neural network & its applications
Neural network & its applications Neural network & its applications
Neural network & its applications
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
palm vein technology and its applications
palm vein technology and its applicationspalm vein technology and its applications
palm vein technology and its applications
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
Palm vein technology.pptx
Palm vein technology.pptxPalm vein technology.pptx
Palm vein technology.pptx
 
Introduction To Intrusion Detection Systems
Introduction To Intrusion Detection SystemsIntroduction To Intrusion Detection Systems
Introduction To Intrusion Detection Systems
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...Image Processing Based Signature Recognition and Verification Technique Using...
Image Processing Based Signature Recognition and Verification Technique Using...
 
Intrusion Prevention System
Intrusion Prevention SystemIntrusion Prevention System
Intrusion Prevention System
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
Skin Lesion Detection from Dermoscopic Images using Convolutional Neural Netw...
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
FACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORKFACE RECOGNITION USING NEURAL NETWORK
FACE RECOGNITION USING NEURAL NETWORK
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Intrusion Detection System(IDS)
Intrusion Detection System(IDS)Intrusion Detection System(IDS)
Intrusion Detection System(IDS)
 
Palm vein technology
Palm vein technology Palm vein technology
Palm vein technology
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Face recognition using neural network
Face recognition using neural networkFace recognition using neural network
Face recognition using neural network
 
Face recognition using artificial neural network
Face recognition using artificial neural networkFace recognition using artificial neural network
Face recognition using artificial neural network
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 

Similar to Fingerprint Recognition using Neural Networks

Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintSonuSawant
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docxjoyjonna282
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Editor Jacotech
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONIJCIRAS Journal
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceIRJET Journal
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 

Similar to Fingerprint Recognition using Neural Networks (20)

Seetu
SeetuSeetu
Seetu
 
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card FingerprintFingerprint Authentication Using Biometric And Aadhar Card Fingerprint
Fingerprint Authentication Using Biometric And Aadhar Card Fingerprint
 
GANNON UNIVERSITYELECTR.docx
                                     GANNON UNIVERSITYELECTR.docx                                     GANNON UNIVERSITYELECTR.docx
GANNON UNIVERSITYELECTR.docx
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
 
L026070074
L026070074L026070074
L026070074
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITIONA SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
A SURVEY ON DEEP LEARNING METHOD USED FOR CHARACTER RECOGNITION
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Roy b2
Roy b2Roy b2
Roy b2
 
8 g iris-recognition_system
8 g iris-recognition_system8 g iris-recognition_system
8 g iris-recognition_system
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiMDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
MDD Project Report By Dharmendra singh [Srm University] Ncr Delhi
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
Face Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial IntelligenceFace Mask Detection System Using Artificial Intelligence
Face Mask Detection System Using Artificial Intelligence
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 

Fingerprint Recognition using Neural Networks

  • 1. Fingerprints Recognition using Neural Network Presented By: GURJANT SINGH SANDHU (328) PRANJAL SINGH (333)
  • 2. Fingerprints A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger. Their pattern is permanent and unchangeable on each finger during the whole life time of an individual. The probability that fingerprints of two individual are alike is about 1 in 1.9×1015. According to FBI the accuracy and reliability of fingerprint scans are correct 99.8% of the time.
  • 4. Pattern recognition System Image Edge Feature Classifier Thinning Acquisition Detection Extractor  Image Acquisition Converting a scene into an array of numbers that can be manipulated by a computer.  Edge Detection and Thinning These are the part of preprocessing step which involves removing noise, enhancing the picture and, if necessary, segmenting the image into meaningful regions.
  • 5. Pattern recognition System Image Edge Feature Classifier Thinning Acquisition Detection Extractor  Feature extraction The image is represented by a set of numerical “features” to remove redundancy from data and reduce its dimensions.  Classification Class label is assigned to the image by examining its extracted features and comparing them with the class that it has already learned.
  • 6. Why use Neural Network?  A neural network consists of an interconnected group of artificial neurons, and it processes information and help us to find solution.  There is no need to program Neural Network they learn with the examples.  Neural Networks offers significant speed advantage over conventional techniques.
  • 7. Other Applications  Character Recognition The idea of character recognition has become very important as handheld devices like Palm Pilot are becoming increasingly popular.  Image Compression Neural networks can receive and process large amount of information at once, making them useful in image compression. With internet explosion and more and websites using more and more images, using neural networks for image compression is worth a look.
  • 8. Other Applications  Stock Market Prediction The day-to-day business of stock market is extremely complicated. Stock prices will go up or down is the result of many different factors. Since neural network can examine a lot of information, they can be used to predict stock prices.  Travelling Salesman Problem Neural network can solve the travelling salesman problem, but only to a certain degree of approximation.  Medicine, Security, and Loan Applications.
  • 9. Preprocessing System  The first phase of the work is to capture the fingerprints image and convert it into a digital representation of 512×512 by 256 grey levels.  The binary image is further enhanced by a thinning algorithm which reduces the image ridges to a skeletal structure.
  • 10. Preprocessing System  After obtaining the binary form of the fingerprint image, there may be some irregularities caused by skinfolds and spreading of ink due to finger pressure, and so on…  The remedy to this problem is smoothing to fill holes, delete unnecessary points, removing noisy points and filling necessary missing points.
  • 11. Application of fingerprint Recognition  The fingerprint recognition system can be easily embedded in any system. It is used in- ◦ Recognition of criminals in law enforcement. ◦ Used in providing security to cars, lockers, banks, shops. ◦ To differentiate between persons. ◦ To count the individuals. ◦ Drug detection.
  • 12. Criticism  Despite the widespread acceptance of fingerprint evidence, many question its worth due to a significant amount of identification mistakes. There is a question of its reliability and accuracy.  For example, in 2000, an individual was arrested for murder and was told by police that fingerprint experts matched his fingerprints to those found at the crime scene. The individual's attorney hired his own fingerprint experts, two former FBI examiners, who determined that absolutely no positive identification took place. After some post-incarceration legal wrangling, this evidence was deemed sufficient for an acquittal.
  • 13. Conclusion  For centuries fingerprints have been one of the most highly used methods for human recognition; automated biometric system have only been available in recent years.  The advancement of technology have led to next generation of fingerprint recognition devices which are highly reliable and accurate.  Fingerprints have a broad acceptance with the general public, law enforcement and the forensic science community.  Hence, they will continue to be used for human recognition and for new systems that require a reliable biometric.