SlideShare a Scribd company logo
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
92 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
Gabor Filter Ali Abdul Azeez Mohammad baker Computer Science Department Kufa university Najaf/Iraq 
alia.qazzaz@uokufa.edu.iq 
Abstract—Gabor filter is a powerful way to enhance biometric images like fingerprint images in order to extract correct features from these images, Gabor filter used in extracting features directly asin iris images, and sometimes Gabor filter has been used for texture analysis. In fingerprint images The even symmetric Gabor filter is contextual filter or multi-resolution filter will be used to enhance fingerprint imageby filling small gaps (low-pass effect) in the direction of the ridge (black regions) and to increase the discrimination between ridge and valley (black and white regions) in the direction, orthogonal to the ridge, the proposed method in applying Gabor filter on fingerprint images depending on translated fingerprint image into binary image after applying some simple enhancing methods to partially overcome time consuming problem of the Gabor filter. Index Terms—Gabor filter, fingerprint, binary image, biometrics, orientation. 
I. INTRODUCTION 
Every person own ten unique fingerprints. This makes fingerprint matching system one of the most reliablesystems for identifying people, fingerprint image may be shown as a uniform pattern of parallel ridges and valleys run together, ridges are the black regions while valleys are the white regions in fingerprint image as illustrated in figure (1).some permanent (like ridge ending and bifurcate) and semi-permanent features such as scars, cuts are also shown in a fingerprint image. There are many features can be discoveredin fingerprint image which enable fingerprint matching system to make sound judgment about whether any two prints came from same finger or not, these features can be divided into two groups 
 Local features : A local feature consists of several components, each component typically derived from a spatially restricted region of the fingerprint , these features extracted from ridges by analyzing the ridge behavior as individual or the relations between consecutive ridges this group of features involves many features, some of these features are Ridge ending, bifurcation, Dot or island, Hook, Lake, and Bridge, These features also called minutiae and most fingerprint identification systems depend only on only ridge ending and bifurcate in matching process as illustrated in figure(1), these features used in matching any two prints and enable system in making decision if these two prints identical or not. There are about (70 to 150) minutiae in a typical fingerprint image. 
 Global features: these features involved two important features which are core and delta ,core can be defined as the top most point on the inner most ridge while delta point can be defined as the point where three ridge directions meet as illustrated in figure(1), these features also called singular points or singularities. 
Fig. 1 fingerprint image 
To extractglobal features precisely, fingerprint image must be enhanced by using perfect methods of contextual filter or multi-resolution filter, and if the enhancement step uses a single filter convolution for the entire fingerprint image, it creates significant number of false minutiae, a large number of true minutiae are missed and, a significant error in the location (position and orientation) of minutiae may be introduced. 
II. PROPOSED METHOD 
The proposed system consist of the following steps as illustrated in figure (2) 
 Applying median filter. 
 Normalization.
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
93 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
 Calculating pixels orientation by using Sobel image. 
 Dividing image into blocks, and calculating blocks 
orientation. 
 Translatingfingerprint image into binary. 
 CalculatingGabor filter for each pixel. 
Each one of the above steps can be illustrated as follows 
A. Applying median filter 
The fingerprint image divided into (3×3) matrices, each 
matrix translated into a victor with (9) values that arranged in 
any order(ascending or descending)then the center of the 
matrix will be replaced with the middle value of the vector, the 
result of applying this filter can be illustrated in figure (3). 
Fig. 2 block diagram of the proposed system 
B. Normalization process 
Normalization process is used to fixed the intensity values of 
the pixels within a desired or wanted range by applying 
equation (1) 
 
 
 
 
 
 
 
 
 
otherwise 
V 
I i j M 
o 
v 
o 
M 
if I i j M 
V 
I i j M 
o 
v 
o 
M 
N i j 
( ( , ) )2 
( , ) 
( ( , ) )2 
( , )  
Where, M and V are the mean and variance of the fingerprint 
image I (i, j), Mo and Vo are the desired mean and variance 
values. 
The result of applying this process is illustrated in figure (3) 
a .Original image b. applying median filter 
c. normalization result 
Fig. 3 Applying median filter and normalization process 
C. Applying Sobel masks 
Orientation in each pixel can be calculated by using Sobel 
vertical and horizontal masks as illustrated in figure (4) 
Z1 Z2 Z3 
-1 -2 -1 
-1 0 1 
Z4 Z5 Z6 0 0 0 -2 0 2 
Z7 Z8 Z9 1 2 1 -1 0 1 
a- Image b- Vertical mask c- Horizontal mask 
Fig. 4 Sobel masks 
Original image 
Applying Sobel masks to 
calculate orientation for each 
pixel 
Normalization 
Applying median filter 
Dividing fingerprint image into blocks and 
Calculating blocks orientation. 
Constructing and applying Gabor filter for each pixel in 
binary fingerprint image 
Translating to 
binary image
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
94 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
The orientation value in each pixel will be calculated by 
using the following equations 
( , ) ( 2 ) ( 2 ) 7 8 9 1 2 3 y p q  z  z  z  z  z  z (2) 
( , ) ( 2 ) ( 2 ) 3 6 9 1 4 7 x p q  z  z  z  z  z  z (3) 
D. Dividing image into blocks, and calculating blocks 
orientation 
The fingerprint image will be divided into non overlap 
blocks with size of (W×W) , and the orientation of each block 
will be calculated as follows 
( , ) 2 ( , ) ( , ) 
2 
2 
2 
2 
v i j p q p q y 
w 
i 
w 
p i 
w 
j 
w 
q j 
y x      
 
  
 
  
(4) 
( , ) ( , ) ( , ) 2 
2 
2 
2 
2 
2 v i j p q p q y 
w 
i 
w 
p i 
w 
j 
w 
q j 
x x     
 
  
 
  
(5) 
( , ) 
( , ) 
tan 
2 
1 
( , ) 1 
v i j 
v i j 
i j 
x 
 y   (6) 
Where θ is The block orientation and (w =17) 
E. Translating fingerprint image into binary image 
The fingerprint image will be converted into a binary 
representation as shown in figure (5) by dividing the image 
into (W×W) non overlap blocks and calculating the mean for 
each block by using equation (7) 
 
 
 
 
  
 
1 
0 
1 
0 
( , ) 
1 w 
i 
w 
j 
image i j 
w w 
bloack mean (7) 
Binary image (i, j) =255 
if enhanced image pixel (i, j) ≥ block mean 
Binary image (i, j) =0 
if enhanced image pixel (i, j) < block mean 
a-original image b- enhanced image 
c- binary image 
Fig. 5 Binary image 
F. Calculating Gabor filter for each pixel 
The fingerprint image will be divided into (W × W) overlap 
blocks and these blocks will be filtered with Gabor filter. An 
even symmetric Gabor filter has the following general form in 
the spatial domain 
cos(2 fx ) 
2 
1 
( , , , ) 2 1 
2 
1 
2 
2 
1  
 
 
 
 
 
 
   
 
  
 
 
 
 
 
x y 
x y 
G x y f Exp 
  
 (8) 
cos sin 1 X  x  y (9) 
sin cos 1 Y  x  y (10) 
Where, (ƒ) is the frequency of the sinusoidal plane wave 
along the direction (θ) from the x-axis, and (δx, δy) are the 
space constants of the Gaussian envelope along x and y axes, 
respectively. In our proposed method we used ƒ =0.1, 
δx=4,and δy=4, The result of applying Gabor filter is illustrate 
in figure (6). 
a- Original image b- Image after apply Gabor filter 
Fig. 6 Applying Gabor filter
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
95 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
III. RESULTS 
After applying the proposed method on fingerprint images the results of three examples will be illustrated Example 1:- 
a-original image b-enhanced image 
c-binary image d-Gabor image 
Fig. 7 results (1) 
Example 2:- 
a-original image b-enhanced image 
c-binary image d-Gabor image 
Fig. 8 results (2) 
Example 3:- 
a-original image b-enhanced image 
c-binary image d-Gabor image 
Fig. 9 results (3) 
IV. CONCLUSION 
 Applying Gabor filter on binary image simplified calculation and makes perfect enhanced results. 
 Multi resolution filters are time consuming compared with simple filters.
ISSN: 2312-7694 
Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
96 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
 Good enhancement methods make fingerprint system more reliable. 
REFERENCES 
1- [Iwasokun 2012] Iwasokun Gabriel Babatunde, AkinyokunOluwole Charles, Alese Boniface Kayode, and OlabodeOlatubosun "Fingerprint Image Enhancement: Segmentation to Thinning",(IJACSA) International Journal of Advanced Computer Science and Applications, 2012. 
2- [Kumud 2011] KumudArora, and Dr.PoonamGarg "A Quantitative Survey of various Fingerprint Enhancement techniques", International Journal of Computer Applications, 2011. 
3- [Liu 2008] Liu Wei "Fingerprint Classification Using Singularities Detection", international journal of mathematics and computers in simulation, 2008. 
4- [Peihao 2007] Peihao Huang, Chia-Yung Chang, Chaur-Chin Chen "Implementation of an Automatic Fingerprint Identification System", IEEE, 2007. 
5- [Salil 2002] Salil Prabhakar, Anil K. Jain, and Sharath Pankanti "Learning fingerprint minutiae location and type", Watson Research Center, Yorktown Heights, NY 10598, USA, 2002. 
6- [William 2001] William K. Pratt "digital image processing ", Los Altos, California, USA, 2001.

More Related Content

What's hot

Image Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain FiltersImage Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain Filters
Suhaila Afzana
 
Color image processing Presentation
Color image processing PresentationColor image processing Presentation
Color image processing Presentation
Revanth Chimmani
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression models
lavanya marichamy
 
Digital Image restoration
Digital Image restorationDigital Image restoration
Digital Image restoration
Md Shabir Alam
 
IMAGE SEGMENTATION.
IMAGE SEGMENTATION.IMAGE SEGMENTATION.
IMAGE SEGMENTATION.
Tawose Olamide Timothy
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSING
muthu181188
 
Sharpening using frequency Domain Filter
Sharpening using frequency Domain FilterSharpening using frequency Domain Filter
Sharpening using frequency Domain Filter
arulraj121
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
Ahmed Daoud
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image Enhancement
Ankit Nayan
 
Fractal Image Compression
Fractal Image CompressionFractal Image Compression
Fractal Image Compression
Sanjeev Kumar Jaiswal
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
lalithambiga kamaraj
 
Image enhancement techniques a review
Image enhancement techniques   a reviewImage enhancement techniques   a review
Image enhancement techniques a review
eSAT Journals
 
Feature detection and matching
Feature detection and matchingFeature detection and matching
Feature detection and matching
Kuppusamy P
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
Gayan Sampath
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
kirupasuchi1996
 
reducing noises in images
reducing noises in imagesreducing noises in images
reducing noises in images
aswathdas
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
PundrikPatel
 
Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filters
A B Shinde
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation pptGichelle Amon
 

What's hot (20)

Image Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain FiltersImage Smoothing using Frequency Domain Filters
Image Smoothing using Frequency Domain Filters
 
Color image processing Presentation
Color image processing PresentationColor image processing Presentation
Color image processing Presentation
 
Fundamentals and image compression models
Fundamentals and image compression modelsFundamentals and image compression models
Fundamentals and image compression models
 
Digital Image restoration
Digital Image restorationDigital Image restoration
Digital Image restoration
 
IMAGE SEGMENTATION.
IMAGE SEGMENTATION.IMAGE SEGMENTATION.
IMAGE SEGMENTATION.
 
SPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSINGSPATIAL FILTERING IN IMAGE PROCESSING
SPATIAL FILTERING IN IMAGE PROCESSING
 
Sharpening using frequency Domain Filter
Sharpening using frequency Domain FilterSharpening using frequency Domain Filter
Sharpening using frequency Domain Filter
 
Chapter 9 morphological image processing
Chapter 9   morphological image processingChapter 9   morphological image processing
Chapter 9 morphological image processing
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image Enhancement
 
Fractal Image Compression
Fractal Image CompressionFractal Image Compression
Fractal Image Compression
 
Digital Image Processing
Digital Image ProcessingDigital Image Processing
Digital Image Processing
 
Image enhancement techniques a review
Image enhancement techniques   a reviewImage enhancement techniques   a review
Image enhancement techniques a review
 
Object Recognition
Object RecognitionObject Recognition
Object Recognition
 
Feature detection and matching
Feature detection and matchingFeature detection and matching
Feature detection and matching
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Image compression standards
Image compression standardsImage compression standards
Image compression standards
 
reducing noises in images
reducing noises in imagesreducing noises in images
reducing noises in images
 
Image Representation & Descriptors
Image Representation & DescriptorsImage Representation & Descriptors
Image Representation & Descriptors
 
Image Processing: Spatial filters
Image Processing: Spatial filtersImage Processing: Spatial filters
Image Processing: Spatial filters
 
Image segmentation ppt
Image segmentation pptImage segmentation ppt
Image segmentation ppt
 

Similar to Gabor Filter

Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
CSCJournals
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edge
ijma
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
eSAT Publishing House
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0Kapil Tiwari
 
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
IOSR Journals
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
IAEME Publication
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
AM Publications
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
CSCJournals
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
IJMER
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...Kunal Kishor Nirala
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
IOSR Journals
 
B018110915
B018110915B018110915
B018110915
IOSR Journals
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
ZaidHussein6
 
Dense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic AlgorithmDense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic Algorithm
Slimane Djema
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
sipij
 
F045033337
F045033337F045033337
F045033337
IJERA Editor
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
editorijcres
 
E017443136
E017443136E017443136
E017443136
IOSR Journals
 
I04302068075
I04302068075I04302068075
I04302068075
ijceronline
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
CSCJournals
 

Similar to Gabor Filter (20)

Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques Performance Evaluation of Image Edge Detection Techniques
Performance Evaluation of Image Edge Detection Techniques
 
An approach to improving edge
An approach to improving edgeAn approach to improving edge
An approach to improving edge
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
Research Paper v2.0
Research Paper v2.0Research Paper v2.0
Research Paper v2.0
 
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
Enhanced Algorithm for Obstacle Detection and Avoidance Using a Hybrid of Pla...
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
 
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUESDIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
DIGITAL RESTORATION OF TORN FILMS USING FILTERING T ECHNIQUES
 
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
Face Recognition Using Neural Network Based Fourier Gabor Filters & Random Pr...
 
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...Visual Quality for both Images and Display of Systems by Visual Enhancement u...
Visual Quality for both Images and Display of Systems by Visual Enhancement u...
 
An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...An automatic algorithm for object recognition and detection based on asift ke...
An automatic algorithm for object recognition and detection based on asift ke...
 
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...Removal of Gaussian noise on the image edges using the Prewitt operator and t...
Removal of Gaussian noise on the image edges using the Prewitt operator and t...
 
B018110915
B018110915B018110915
B018110915
 
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
Stereo Vision Distance Estimation Employing Canny Edge Detector with Interpol...
 
Dense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic AlgorithmDense Visual Odometry Using Genetic Algorithm
Dense Visual Odometry Using Genetic Algorithm
 
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVALEFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
EFFICIENT IMAGE RETRIEVAL USING REGION BASED IMAGE RETRIEVAL
 
F045033337
F045033337F045033337
F045033337
 
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHODFORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
FORGERY (COPY-MOVE) DETECTION IN DIGITAL IMAGES USING BLOCK METHOD
 
E017443136
E017443136E017443136
E017443136
 
I04302068075
I04302068075I04302068075
I04302068075
 
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality AssessmentFrequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
Frequency Domain Blockiness and Blurriness Meter for Image Quality Assessment
 

More from International Journal of Computer and Communication System Engineering

Cloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care SystemsCloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care Systems
International Journal of Computer and Communication System Engineering
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
International Journal of Computer and Communication System Engineering
 
A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...
International Journal of Computer and Communication System Engineering
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
International Journal of Computer and Communication System Engineering
 
Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...
International Journal of Computer and Communication System Engineering
 
Real Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android PhonesReal Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android Phones
International Journal of Computer and Communication System Engineering
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
International Journal of Computer and Communication System Engineering
 
Compact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch AntennaCompact Fractal Based UWB Band Notch Antenna
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
International Journal of Computer and Communication System Engineering
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
International Journal of Computer and Communication System Engineering
 
An Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori AlgorithmAn Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori Algorithm
International Journal of Computer and Communication System Engineering
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
International Journal of Computer and Communication System Engineering
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
International Journal of Computer and Communication System Engineering
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
International Journal of Computer and Communication System Engineering
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
International Journal of Computer and Communication System Engineering
 
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
International Journal of Computer and Communication System Engineering
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
International Journal of Computer and Communication System Engineering
 

More from International Journal of Computer and Communication System Engineering (20)

Cloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care SystemsCloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care Systems
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
 
A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...
 
Real Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android PhonesReal Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android Phones
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
 
Compact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch AntennaCompact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch Antenna
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
An Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori AlgorithmAn Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori Algorithm
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
 
Mobile Effects on Human Body
Mobile Effects on Human BodyMobile Effects on Human Body
Mobile Effects on Human Body
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
 
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
 
Rp 3010 5814
Rp 3010 5814Rp 3010 5814
Rp 3010 5814
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

Gabor Filter

  • 1. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 92 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com Gabor Filter Ali Abdul Azeez Mohammad baker Computer Science Department Kufa university Najaf/Iraq alia.qazzaz@uokufa.edu.iq Abstract—Gabor filter is a powerful way to enhance biometric images like fingerprint images in order to extract correct features from these images, Gabor filter used in extracting features directly asin iris images, and sometimes Gabor filter has been used for texture analysis. In fingerprint images The even symmetric Gabor filter is contextual filter or multi-resolution filter will be used to enhance fingerprint imageby filling small gaps (low-pass effect) in the direction of the ridge (black regions) and to increase the discrimination between ridge and valley (black and white regions) in the direction, orthogonal to the ridge, the proposed method in applying Gabor filter on fingerprint images depending on translated fingerprint image into binary image after applying some simple enhancing methods to partially overcome time consuming problem of the Gabor filter. Index Terms—Gabor filter, fingerprint, binary image, biometrics, orientation. I. INTRODUCTION Every person own ten unique fingerprints. This makes fingerprint matching system one of the most reliablesystems for identifying people, fingerprint image may be shown as a uniform pattern of parallel ridges and valleys run together, ridges are the black regions while valleys are the white regions in fingerprint image as illustrated in figure (1).some permanent (like ridge ending and bifurcate) and semi-permanent features such as scars, cuts are also shown in a fingerprint image. There are many features can be discoveredin fingerprint image which enable fingerprint matching system to make sound judgment about whether any two prints came from same finger or not, these features can be divided into two groups  Local features : A local feature consists of several components, each component typically derived from a spatially restricted region of the fingerprint , these features extracted from ridges by analyzing the ridge behavior as individual or the relations between consecutive ridges this group of features involves many features, some of these features are Ridge ending, bifurcation, Dot or island, Hook, Lake, and Bridge, These features also called minutiae and most fingerprint identification systems depend only on only ridge ending and bifurcate in matching process as illustrated in figure(1), these features used in matching any two prints and enable system in making decision if these two prints identical or not. There are about (70 to 150) minutiae in a typical fingerprint image.  Global features: these features involved two important features which are core and delta ,core can be defined as the top most point on the inner most ridge while delta point can be defined as the point where three ridge directions meet as illustrated in figure(1), these features also called singular points or singularities. Fig. 1 fingerprint image To extractglobal features precisely, fingerprint image must be enhanced by using perfect methods of contextual filter or multi-resolution filter, and if the enhancement step uses a single filter convolution for the entire fingerprint image, it creates significant number of false minutiae, a large number of true minutiae are missed and, a significant error in the location (position and orientation) of minutiae may be introduced. II. PROPOSED METHOD The proposed system consist of the following steps as illustrated in figure (2)  Applying median filter.  Normalization.
  • 2. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 93 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com  Calculating pixels orientation by using Sobel image.  Dividing image into blocks, and calculating blocks orientation.  Translatingfingerprint image into binary.  CalculatingGabor filter for each pixel. Each one of the above steps can be illustrated as follows A. Applying median filter The fingerprint image divided into (3×3) matrices, each matrix translated into a victor with (9) values that arranged in any order(ascending or descending)then the center of the matrix will be replaced with the middle value of the vector, the result of applying this filter can be illustrated in figure (3). Fig. 2 block diagram of the proposed system B. Normalization process Normalization process is used to fixed the intensity values of the pixels within a desired or wanted range by applying equation (1)          otherwise V I i j M o v o M if I i j M V I i j M o v o M N i j ( ( , ) )2 ( , ) ( ( , ) )2 ( , )  Where, M and V are the mean and variance of the fingerprint image I (i, j), Mo and Vo are the desired mean and variance values. The result of applying this process is illustrated in figure (3) a .Original image b. applying median filter c. normalization result Fig. 3 Applying median filter and normalization process C. Applying Sobel masks Orientation in each pixel can be calculated by using Sobel vertical and horizontal masks as illustrated in figure (4) Z1 Z2 Z3 -1 -2 -1 -1 0 1 Z4 Z5 Z6 0 0 0 -2 0 2 Z7 Z8 Z9 1 2 1 -1 0 1 a- Image b- Vertical mask c- Horizontal mask Fig. 4 Sobel masks Original image Applying Sobel masks to calculate orientation for each pixel Normalization Applying median filter Dividing fingerprint image into blocks and Calculating blocks orientation. Constructing and applying Gabor filter for each pixel in binary fingerprint image Translating to binary image
  • 3. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 94 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com The orientation value in each pixel will be calculated by using the following equations ( , ) ( 2 ) ( 2 ) 7 8 9 1 2 3 y p q  z  z  z  z  z  z (2) ( , ) ( 2 ) ( 2 ) 3 6 9 1 4 7 x p q  z  z  z  z  z  z (3) D. Dividing image into blocks, and calculating blocks orientation The fingerprint image will be divided into non overlap blocks with size of (W×W) , and the orientation of each block will be calculated as follows ( , ) 2 ( , ) ( , ) 2 2 2 2 v i j p q p q y w i w p i w j w q j y x            (4) ( , ) ( , ) ( , ) 2 2 2 2 2 2 v i j p q p q y w i w p i w j w q j x x           (5) ( , ) ( , ) tan 2 1 ( , ) 1 v i j v i j i j x  y   (6) Where θ is The block orientation and (w =17) E. Translating fingerprint image into binary image The fingerprint image will be converted into a binary representation as shown in figure (5) by dividing the image into (W×W) non overlap blocks and calculating the mean for each block by using equation (7)        1 0 1 0 ( , ) 1 w i w j image i j w w bloack mean (7) Binary image (i, j) =255 if enhanced image pixel (i, j) ≥ block mean Binary image (i, j) =0 if enhanced image pixel (i, j) < block mean a-original image b- enhanced image c- binary image Fig. 5 Binary image F. Calculating Gabor filter for each pixel The fingerprint image will be divided into (W × W) overlap blocks and these blocks will be filtered with Gabor filter. An even symmetric Gabor filter has the following general form in the spatial domain cos(2 fx ) 2 1 ( , , , ) 2 1 2 1 2 2 1                   x y x y G x y f Exp    (8) cos sin 1 X  x  y (9) sin cos 1 Y  x  y (10) Where, (ƒ) is the frequency of the sinusoidal plane wave along the direction (θ) from the x-axis, and (δx, δy) are the space constants of the Gaussian envelope along x and y axes, respectively. In our proposed method we used ƒ =0.1, δx=4,and δy=4, The result of applying Gabor filter is illustrate in figure (6). a- Original image b- Image after apply Gabor filter Fig. 6 Applying Gabor filter
  • 4. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 95 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com III. RESULTS After applying the proposed method on fingerprint images the results of three examples will be illustrated Example 1:- a-original image b-enhanced image c-binary image d-Gabor image Fig. 7 results (1) Example 2:- a-original image b-enhanced image c-binary image d-Gabor image Fig. 8 results (2) Example 3:- a-original image b-enhanced image c-binary image d-Gabor image Fig. 9 results (3) IV. CONCLUSION  Applying Gabor filter on binary image simplified calculation and makes perfect enhanced results.  Multi resolution filters are time consuming compared with simple filters.
  • 5. ISSN: 2312-7694 Ali et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 96 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com  Good enhancement methods make fingerprint system more reliable. REFERENCES 1- [Iwasokun 2012] Iwasokun Gabriel Babatunde, AkinyokunOluwole Charles, Alese Boniface Kayode, and OlabodeOlatubosun "Fingerprint Image Enhancement: Segmentation to Thinning",(IJACSA) International Journal of Advanced Computer Science and Applications, 2012. 2- [Kumud 2011] KumudArora, and Dr.PoonamGarg "A Quantitative Survey of various Fingerprint Enhancement techniques", International Journal of Computer Applications, 2011. 3- [Liu 2008] Liu Wei "Fingerprint Classification Using Singularities Detection", international journal of mathematics and computers in simulation, 2008. 4- [Peihao 2007] Peihao Huang, Chia-Yung Chang, Chaur-Chin Chen "Implementation of an Automatic Fingerprint Identification System", IEEE, 2007. 5- [Salil 2002] Salil Prabhakar, Anil K. Jain, and Sharath Pankanti "Learning fingerprint minutiae location and type", Watson Research Center, Yorktown Heights, NY 10598, USA, 2002. 6- [William 2001] William K. Pratt "digital image processing ", Los Altos, California, USA, 2001.