Abstract Security has become major issue now a day. In order to prevent unauthorized access of confidential data there is a need for accurate and reliable personal identification system. So, biometric based identification system is one of the best solutions. Fingerprint based system is one of oldest biometric identification systems. It is used in many commercial and security applications. Even with advent of technology in fingerprint identification system, the accurate extraction and matching of features from a fingerprint image is a challenging task. The task is much more challenging when fingerprint is affected by non-linear deformations such as rotation and translation. In this paper, fingerprint identification system using improved feature vector based algorithm is presented. In the algorithm Gabor filter is implemented to enhance the fingerprint image. The salient features minutiae (ridge endings) and reference point are extracted from the image. The Euclidian distances between reference point and each minutiae point are calculated and are arranged in ascending order. These are stored in database as feature vectors. The fingerprint matching is done based on the similarity rate between the feature vector of input fingerprint and the feature vectors stored in the database. Algorithms are implemented using Visual Studio 2010 in C++ language using Open CV libraries and tested on the fingerprint database created in the laboratory. Key Words: Fingerprint, Minutiae, Reference point, Euclidian distance, Similarity rate, Identification
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesIDES Editor
Personal identification system based on pass word
and other entities are ineffective. Nowadays biometric based
systems are used for human identification in almost many
real time applications. The current state-of-art biometric
identification focuses on accuracy and hence a good
performance result in terms of response time on small scale
database is achieved. But in today’s real life scenario biometric
database are huge and without any intelligent scheme the
response time should be high, but the existing algorithms
requires an exhaustive search on the database which increases
proportionally when the size of the database grows. This paper
addresses the problem of biometric indexing in the context of
fingerprint. Indexing is a technique to reduce the number of
candidate identities to be considered by the identification
algorithm. The fingerprint indexing methodology projected
in this work is based on a combination of Level 1, Level 2 and
Level-3 fingerprint features. The result shows the fusion of
level 1, level 2 and level 3 features gives better performance
and good indexing rate than with any one level of fingerprint
feature.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Biometric system works on behavioral and physiological biometric parameters to spot a person. Every fingerprint contains distinctive options and its recognizing system primarily works on native ridge feature local ridge endings, minutiae, core point, delta, etc. However, fingerprint pictures have poor quality thanks to variations in skin and impression conditions. In personal identification, fingerprint recognition is taken into account the foremost outstanding and reliable technique for matching with keep fingerprints within the information. Minutiae extraction is additional essential step in fingerprint matching. This paper provides plan regarding numerous feature extraction and matching algorithms for fingerprint recognition systems and to seek out that technique is additional reliable and secure.
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesIDES Editor
Personal identification system based on pass word
and other entities are ineffective. Nowadays biometric based
systems are used for human identification in almost many
real time applications. The current state-of-art biometric
identification focuses on accuracy and hence a good
performance result in terms of response time on small scale
database is achieved. But in today’s real life scenario biometric
database are huge and without any intelligent scheme the
response time should be high, but the existing algorithms
requires an exhaustive search on the database which increases
proportionally when the size of the database grows. This paper
addresses the problem of biometric indexing in the context of
fingerprint. Indexing is a technique to reduce the number of
candidate identities to be considered by the identification
algorithm. The fingerprint indexing methodology projected
in this work is based on a combination of Level 1, Level 2 and
Level-3 fingerprint features. The result shows the fusion of
level 1, level 2 and level 3 features gives better performance
and good indexing rate than with any one level of fingerprint
feature.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Biometric system works on behavioral and physiological biometric parameters to spot a person. Every fingerprint contains distinctive options and its recognizing system primarily works on native ridge feature local ridge endings, minutiae, core point, delta, etc. However, fingerprint pictures have poor quality thanks to variations in skin and impression conditions. In personal identification, fingerprint recognition is taken into account the foremost outstanding and reliable technique for matching with keep fingerprints within the information. Minutiae extraction is additional essential step in fingerprint matching. This paper provides plan regarding numerous feature extraction and matching algorithms for fingerprint recognition systems and to seek out that technique is additional reliable and secure.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...IJECEIAES
The field of biometrics has evolved tremendously for over the last century. Yet scientists are still continuing to come up with precise and efficient algorithms to facilitate automatic fingerprint recognition systems. Like other applications, an efficient feature extraction method plays an important role in fingerprint based recognition systems. This paper proposes a novel feature extraction method using minutiae points of a fingerprint image and their intersections. In this method, initially, it calculates the ridge ends and ridge bifurcations of each fingerprint image. And then, it estimates the minutiae points for the intersection of each ridge end and ridge bifurcation. In the experimental evaluation, we tested the extracted features of our proposed model using a support vector machine (SVM) classifier and experimental results show that the proposed method can accurately classify different fingerprint images.
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and ValidationCSCJournals
Fingerprint has remained a very vital index in the field of security where series of Automatic Fingerprint Identification System (AFIS) have been developed for human identification. Many of these systems involve matching each of the features of a template image with each of the features in the feature sets in the reference database to determine the level of match between the template and the reference images. Matching is done on the basis of preset parameters such as feature type, location, orientation and so on. Obtaining the features from the template image and for building a reference database involves the implementation of a sound fingerprint feature detection and extraction algorithm. In this paper, the process of detecting and extracting false and valid features contained in a fingerprint image is discussed. Some of the existing fingerprint features extraction algorithms were firstly modified and the resulting algorithms were implemented. The implementation was carried out in an environment characterized by Window Vista Home Basic as platform and Matrix Laboratory (MatLab) as frontend engine. Fingerprints images of different qualities obtained from the manual (ink and paper) and electronic (fingerprint scanner) methods were used to test the adequacy of the resulting algorithms. The results obtained show that only valid and true minutiae points were extracted from the images.
Recent developments in paper currency recognition systemeSAT Journals
Abstract
Currency denomination recognition is one the active research topics at present. And this wide interest is particularly due to the
various potential applications it has. Monetary transaction is an integral part of our day to day activities. However, blind people
particularly suffer in monetary transactions. They are not able to effectively distinguish between various denominations and are often
deceived by other people. Also, a reliable currency recognition system could be used in any sector wherever monetary transaction is
of concern. Thus, there is an ardent need to design a system that is helpful in recognition of paper currency notes correctly. Currency
denomination detection is a vast area of research and significant progress had been achieved over the years. This paper presents an
extensive survey of research on various developments in recent years in identification of currency denomination. A number of
techniques applied by various researchers are discussed briefly in order to assess the state of art.
Keywords:- Currency recognition system, Artificial Neural Network
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
For security and surveillance automated personal identification is major issue. We can see a lot varieties of biometric systems like face detection, fingerprint recognition, iris recognition, voice recognition, palm recognition etc. In our project we will only go for fingerprint recognition. Never two peoples have exactly same fingerprints even twins, they are totally unique. The sensors capture the finger prints of humans and convert them into images and a minutiae extraction algorithm extracts the location of minutiae points called termination and bifurcation. A database system stores these patterns and minutiae points of fingerprint. A large storage space required to store bifurcation and termination points for the fingerprint database. LZW compression algorithm has been used to reduce the size of data. With LZW applied on these extracted minutiae points, these minutiae points get encoded which add more security feature.
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature. A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves, low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature Extraction, Finger Vein Recognition, Multimodel Biometrics
Detection and rectification of distorted fingerprintsCloudTechnologies
We are the company providing Complete Solution for all Academic Final Year/Semester Student Projects. Our projects are
suitable for B.E (CSE,IT,ECE,EEE), B.Tech (CSE,IT,ECE,EEE),M.Tech (CSE,IT,ECE,EEE) B.sc (IT & CSE), M.sc (IT & CSE),
MCA, and many more..... We are specialized on Java,Dot Net ,PHP & Andirod technologies. Each Project listed comes with
the following deliverable: 1. Project Abstract 2. Complete functional code 3. Complete Project report with diagrams 4.
Database 5. Screen-shots 6. Video File
SERVICE AT CLOUDTECHNOLOGIES
IEEE, WEB, WINDOWS PROJECTS ON DOT NET, JAVA& ANDROID TECHNOLOGIES,EMBEDDED SYSTEMS,MAT LAB,VLSI DESIGN.
ME, M-TECH PAPER PUBLISHING
COLLEGE TRAINING
Thanks&Regards
cloudtechnologies
# 304, Siri Towers,Behind Prime Hospitals
Maitrivanam, Ameerpet.
Contact:-8121953811,8522991105.040-65511811
cloudtechnologiesprojects@gmail.com
http://cloudstechnologies.in/
Recent developments in iris based biometric authentication systemseSAT Journals
Abstract Authenticating the identity of an individual has become one of the most important aspects in many applications today. The iris based biometric system has therefore gained huge attention in this field. This strong interest is driven by its high level of accuracy and highly promising applications. This paper presents a comprehensive study of the various researches carried out in this field and the several techniques which forms a part of the biometric system using iris based recognition. The main emphasis is laid on the techniques or methods for segmentation, feature extraction and matching. Various methods for all this issues have been discussed in order to examine the state of art. Finally some challenges and future scopes have been discussed. Keywords:-Iris based recognition, segmentation, feature extraction, matching insert.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...IJECEIAES
The field of biometrics has evolved tremendously for over the last century. Yet scientists are still continuing to come up with precise and efficient algorithms to facilitate automatic fingerprint recognition systems. Like other applications, an efficient feature extraction method plays an important role in fingerprint based recognition systems. This paper proposes a novel feature extraction method using minutiae points of a fingerprint image and their intersections. In this method, initially, it calculates the ridge ends and ridge bifurcations of each fingerprint image. And then, it estimates the minutiae points for the intersection of each ridge end and ridge bifurcation. In the experimental evaluation, we tested the extracted features of our proposed model using a support vector machine (SVM) classifier and experimental results show that the proposed method can accurately classify different fingerprint images.
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and ValidationCSCJournals
Fingerprint has remained a very vital index in the field of security where series of Automatic Fingerprint Identification System (AFIS) have been developed for human identification. Many of these systems involve matching each of the features of a template image with each of the features in the feature sets in the reference database to determine the level of match between the template and the reference images. Matching is done on the basis of preset parameters such as feature type, location, orientation and so on. Obtaining the features from the template image and for building a reference database involves the implementation of a sound fingerprint feature detection and extraction algorithm. In this paper, the process of detecting and extracting false and valid features contained in a fingerprint image is discussed. Some of the existing fingerprint features extraction algorithms were firstly modified and the resulting algorithms were implemented. The implementation was carried out in an environment characterized by Window Vista Home Basic as platform and Matrix Laboratory (MatLab) as frontend engine. Fingerprints images of different qualities obtained from the manual (ink and paper) and electronic (fingerprint scanner) methods were used to test the adequacy of the resulting algorithms. The results obtained show that only valid and true minutiae points were extracted from the images.
Recent developments in paper currency recognition systemeSAT Journals
Abstract
Currency denomination recognition is one the active research topics at present. And this wide interest is particularly due to the
various potential applications it has. Monetary transaction is an integral part of our day to day activities. However, blind people
particularly suffer in monetary transactions. They are not able to effectively distinguish between various denominations and are often
deceived by other people. Also, a reliable currency recognition system could be used in any sector wherever monetary transaction is
of concern. Thus, there is an ardent need to design a system that is helpful in recognition of paper currency notes correctly. Currency
denomination detection is a vast area of research and significant progress had been achieved over the years. This paper presents an
extensive survey of research on various developments in recent years in identification of currency denomination. A number of
techniques applied by various researchers are discussed briefly in order to assess the state of art.
Keywords:- Currency recognition system, Artificial Neural Network
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
For security and surveillance automated personal identification is major issue. We can see a lot varieties of biometric systems like face detection, fingerprint recognition, iris recognition, voice recognition, palm recognition etc. In our project we will only go for fingerprint recognition. Never two peoples have exactly same fingerprints even twins, they are totally unique. The sensors capture the finger prints of humans and convert them into images and a minutiae extraction algorithm extracts the location of minutiae points called termination and bifurcation. A database system stores these patterns and minutiae points of fingerprint. A large storage space required to store bifurcation and termination points for the fingerprint database. LZW compression algorithm has been used to reduce the size of data. With LZW applied on these extracted minutiae points, these minutiae points get encoded which add more security feature.
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
Abstract
The vein structure is stable over time and can be manipulated for identifying human. The sclera portion of the human eye has blood vessel pattern which is unique for each human being. So, the sclera vein pattern can be used for a useful biometric feature. A few research works has been done over finger vein pattern recognition. Finger vein is an important biometric technique for personal identification and authentication. The finger vein is a blood vessel network under the finger skin. The network pattern is distinct for each individual, unaffected by aging and it is internal i.e. inside human skin which can always guarantee more security authentication. Sclera vein pattern recognition can face a few challenges like: the vein structure moves as the eye moves, low image quality, multilayered structure of the sclera vein and thickness of the sclera vein changes with the excitement level of the human body. To overcome this limitation, the multimodel biometrics is proposed through which the user can be authenticated either sclera vein or finger vein recognition. Sclera vein recognition used Y-shape descriptor and finger vein recognition used repeated line tracking based feature extraction method to effectively eliminate the most unlikely matches respectively. According to the available work in literatures and commercial utilization experiences, sclera vein and finger vein multimodality ensures higher performance and spoofing resistance. Thus building the multimodel biometric system increases the population coverage and improves the accuracy of the human recognition.
Keywords: Sclera Vein Recognition, Sclera Feature Matching, Sclera Matching, Sclera Segmentation, Feature Extraction, Finger Vein Recognition, Multimodel Biometrics
Detection and rectification of distorted fingerprintsCloudTechnologies
We are the company providing Complete Solution for all Academic Final Year/Semester Student Projects. Our projects are
suitable for B.E (CSE,IT,ECE,EEE), B.Tech (CSE,IT,ECE,EEE),M.Tech (CSE,IT,ECE,EEE) B.sc (IT & CSE), M.sc (IT & CSE),
MCA, and many more..... We are specialized on Java,Dot Net ,PHP & Andirod technologies. Each Project listed comes with
the following deliverable: 1. Project Abstract 2. Complete functional code 3. Complete Project report with diagrams 4.
Database 5. Screen-shots 6. Video File
SERVICE AT CLOUDTECHNOLOGIES
IEEE, WEB, WINDOWS PROJECTS ON DOT NET, JAVA& ANDROID TECHNOLOGIES,EMBEDDED SYSTEMS,MAT LAB,VLSI DESIGN.
ME, M-TECH PAPER PUBLISHING
COLLEGE TRAINING
Thanks&Regards
cloudtechnologies
# 304, Siri Towers,Behind Prime Hospitals
Maitrivanam, Ameerpet.
Contact:-8121953811,8522991105.040-65511811
cloudtechnologiesprojects@gmail.com
http://cloudstechnologies.in/
Recent developments in iris based biometric authentication systemseSAT Journals
Abstract Authenticating the identity of an individual has become one of the most important aspects in many applications today. The iris based biometric system has therefore gained huge attention in this field. This strong interest is driven by its high level of accuracy and highly promising applications. This paper presents a comprehensive study of the various researches carried out in this field and the several techniques which forms a part of the biometric system using iris based recognition. The main emphasis is laid on the techniques or methods for segmentation, feature extraction and matching. Various methods for all this issues have been discussed in order to examine the state of art. Finally some challenges and future scopes have been discussed. Keywords:-Iris based recognition, segmentation, feature extraction, matching insert.
Веб-уязвимости и безопасность данных:
- Почему важно понимать основы веб-разработки несмотря на стремительное развитие технологий
- Клиент-серверные взаимодействия и уязвимости HTTP протокола
- Как найти веб-уязвимости, а также самые распространенные ошибки веб-приложений
- Способы защиты данных и пользователей
- Использование man-in-the-middle, и почему нельзя доверять публичным Wi-Fi точкам доступа
Видео запись доклада https://www.youtube.com/watch?v=w0kMtXAQiaY
Примеры кода https://goo.gl/9DJI5c
Authentication protocols based on zero knowledge proof (Part 2 - Brief talk)Israel Buitron
Second part of a brief introduction to my PhD research titled "Authentication protocols based on zero knowledge proofs".
This presentation was given in a PhD class.
Face Recognition for Personal Photos using Online Social Network Context and ...Wesley De Neve
Thanks to easy-to-use multimedia devices and cheap storage and bandwidth, present-day social media applications host staggering numbers of personal photos. As the number of personal photos shared on social media applications continues to accelerate, the problem of organizing and retrieving relevant photos becomes more apparent for consumers. Automatic face recognition assists in bringing order to collections of personal photos. However, personal photos pose a plethora of challenges for automatic face recognition. Face images may widely differ in terms of lighting, expressions, and pose. As a result, the accuracy of appearance-based techniques for automatic face recognition in collections of personal photos cannot be considered satisfactory.
This talk aims at providing insight into timely developments in the area of socially-aware face recognition. We first discuss how online social network context can be used to substantially improve the effectiveness of appearance-based techniques for automatic face recognition, as recently demonstrated by researchers of Harvard University. Next, we pay attention to collaborative face recognition in decentralized online social networks, as studied at KAIST. For both of the aforementioned topics, we present experimental results obtained for real-world collections of personal photos, contributed by volunteers who are members of online social networks such as Facebook and Cyworld. Finally, we conclude our talk with an outline of future applications of socially-aware face recognition, including augmented identity and socially-aware robots.
Latent fingerprint and vein matching using ridge feature identificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Ingerprint based student attendance system with sms alert to parentseSAT Journals
Abstract
This paper is a study of a fingerprint recognition system based on minutiae based fingerprint algorithms used in various techniques. This line of track mainly involves extraction of minutiae points from the model fingerprint images and fingerprint matching based on the number of minutiae pairings among two fingerprints. This paper also provides the design method of fingerprint based student attendance with help of GSM. This system ignores the requirement for stationary materials and personnel for keeping of records.
Keywords – GSM, LCD
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Fingerprints are imprints formed by friction
ridges of the skin and thumbs. They have long been used for
identification because of their immutability and individuality.
Immutability refers to the permanent and unchanging character
of the pattern on each finger. Individuality refers to the
uniqueness of ridge details across individuals; the probability
that two fingerprints are alike is about 1 in 1.9x1015. In despite of
this improvement which is adopted by the Federal Bureau of
Investigation (FBI), the fact still is “The larger the fingerprint
files became, the harder it was to identify somebody from their
fingerprints alone. Moreover, the fingerprint requires one of the
largest data templates in the biometric field”. The finger data
template can range anywhere from several hundred bytes to over
1,000 bytes depending upon the level of security that is required
and the method that is used to scan one's fingerprint. For these
reasons this work is motivated to present another way to tackle
the problem that is relies on the properties of Vector
Quantization coding algorithm.
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
Fingerprint recognition is one of the methods used in biometric system. Most of the biometric systems which are used for human identification or person’s identification. In this paper we are discussing minutiae matching and discrete wavelet transform and comparison of these two in fingerprint recognition. In this paper, firstly it uses fingerprint identification and performance in terms of equal error rate and then by calculating using discrete wavelet transform. The main aim of this paper is to create performing and accurate program for fingerprint identification.
A Survey Based on Fingerprint Matching SystemIJTET Journal
Abstract — Fingerprint is one of the biometric features mostly used for identification and verification. Latent fingerprints are conventionally recovered coming in to existence of crime scenes and are analyzed with active databases of well-known fingerprints for finding criminals. A bulk of matching algorithms with distant uniqueness has been developed in modern years and the algorithms are depending up on minutiae features. The detection of accepted systems tries to find which fingerprint in a database matches the fingerprint needs the matching of its minutiae against the input fingerprint. Since the detection complexity are more minutiae of other fingerprints. Therefore, fingerprint matching system is a higher than verification and detection systems. This paper discussed about the various novel techniques like Minutia Cylinder Code (MCC) algorithm, Minutia score matching and Graphic Processing Unit (GPU). The feature extraction anywhere in the extracted features is sovereign of shift and rotation of the fingerprint. Meanwhile, the matching operation is performed much more easily and higher accuracy.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the
Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points
between the sample fingerprint & fingerprint under question. The main functional blocks of this system
follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae
point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the
memory space used by the fingerprint image database.
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
This paper is the implementation of fingerprint recognition system in which the matching is done using the Minutiae points. The methodology is the extracting & applying matching procedure on the Minutiae points between the sample fingerprint & fingerprint under question. The main functional blocks of this system follows steps of Image Thinning, Image Segmentation, Minutiae (feature) point Extraction, & Minutiae point Matching. The procedure of Enhanced Thinning included for the purpose of decreasing the size of the memory space used by the fingerprint image database.
Similar to Multiple features based fingerprint identification system (20)
Mechanical properties of hybrid fiber reinforced concrete for pavementseSAT Journals
Abstract
The effect of addition of mono fibers and hybrid fibers on the mechanical properties of concrete mixture is studied in the present
investigation. Steel fibers of 1% and polypropylene fibers 0.036% were added individually to the concrete mixture as mono fibers and
then they were added together to form a hybrid fiber reinforced concrete. Mechanical properties such as compressive, split tensile and
flexural strength were determined. The results show that hybrid fibers improve the compressive strength marginally as compared to
mono fibers. Whereas, hybridization improves split tensile strength and flexural strength noticeably.
Keywords:-Hybridization, mono fibers, steel fiber, polypropylene fiber, Improvement in mechanical properties.
Material management in construction – a case studyeSAT Journals
Abstract
The objective of the present study is to understand about all the problems occurring in the company because of improper application
of material management. In construction project operation, often there is a project cost variance in terms of the material, equipments,
manpower, subcontractor, overhead cost, and general condition. Material is the main component in construction projects. Therefore,
if the material management is not properly managed it will create a project cost variance. Project cost can be controlled by taking
corrective actions towards the cost variance. Therefore a methodology is used to diagnose and evaluate the procurement process
involved in material management and launch a continuous improvement was developed and applied. A thorough study was carried
out along with study of cases, surveys and interviews to professionals involved in this area. As a result, a methodology for diagnosis
and improvement was proposed and tested in selected projects. The results obtained show that the main problem of procurement is
related to schedule delays and lack of specified quality for the project. To prevent this situation it is often necessary to dedicate
important resources like money, personnel, time, etc. To monitor and control the process. A great potential for improvement was
detected if state of the art technologies such as, electronic mail, electronic data interchange (EDI), and analysis were applied to the
procurement process. These helped to eliminate the root causes for many types of problems that were detected.
Managing drought short term strategies in semi arid regions a case studyeSAT Journals
Abstract
Drought management needs multidisciplinary action. Interdisciplinary efforts among the experts in various fields of the droughts
prone areas are helpful to achieve tangible and permanent solution for this recurring problem. The Gulbarga district having the total
area around 16, 240 sq.km, and accounts 8.45 per cent of the Karnataka state area. The district has been situated with latitude 17º 19'
60" North and longitude of 76 º 49' 60" east. The district is situated entirely on the Deccan plateau positioned at a height of 300 to
750 m above MSL. Sub-tropical, semi-arid type is one among the drought prone districts of Karnataka State. The drought
management is very important for a district like Gulbarga. In this paper various short term strategies are discussed to mitigate the
drought condition in the district.
Keywords: Drought, South-West monsoon, Semi-Arid, Rainfall, Strategies etc.
Life cycle cost analysis of overlay for an urban road in bangaloreeSAT Journals
Abstract
Pavements are subjected to severe condition of stresses and weathering effects from the day they are constructed and opened to traffic
mainly due to its fatigue behavior and environmental effects. Therefore, pavement rehabilitation is one of the most important
components of entire road systems. This paper highlights the design of concrete pavement with added mono fibers like polypropylene,
steel and hybrid fibres for a widened portion of existing concrete pavement and various overlay alternatives for an existing
bituminous pavement in an urban road in Bangalore. Along with this, Life cycle cost analyses at these sections are done by Net
Present Value (NPV) method to identify the most feasible option. The results show that though the initial cost of construction of
concrete overlay is high, over a period of time it prove to be better than the bituminous overlay considering the whole life cycle cost.
The economic analysis also indicates that, out of the three fibre options, hybrid reinforced concrete would be economical without
compromising the performance of the pavement.
Keywords: - Fatigue, Life cycle cost analysis, Net Present Value method, Overlay, Rehabilitation
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialseSAT Journals
Abstract
The issue of growing demand on our nation’s roadways over that past couple of decades, decreasing budgetary funds, and the need to
provide a safe, efficient, and cost effective roadway system has led to a dramatic increase in the need to rehabilitate our existing
pavements and the issue of building sustainable road infrastructure in India. With these emergency of the mentioned needs and this
are today’s burning issue and has become the purpose of the study.
In the present study, the samples of existing bituminous layer materials were collected from NH-48(Devahalli to Hassan) site.The
mixtures were designed by Marshall Method as per Asphalt institute (MS-II) at 20% and 30% Reclaimed Asphalt Pavement (RAP).
RAP material was blended with virgin aggregate such that all specimens tested for the, Dense Bituminous Macadam-II (DBM-II)
gradation as per Ministry of Roads, Transport, and Highways (MoRT&H) and cost analysis were carried out to know the economics.
Laboratory results and analysis showed the use of recycled materials showed significant variability in Marshall Stability, and the
variability increased with the increase in RAP content. The saving can be realized from utilization of recycled materials as per the
methodology, the reduction in the total cost is 19%, 30%, comparing with the virgin mixes.
Keywords: Reclaimed Asphalt Pavement, Marshall Stability, MS-II, Dense Bituminous Macadam-II
Laboratory investigation of expansive soil stabilized with natural inorganic ...eSAT Journals
Abstract
Soil stabilization has proven to be one of the oldest techniques to improve the soil properties. Literature review conducted revealed
that uses of natural inorganic stabilizers are found to be one of the best options for soil stabilization. In this regard an attempt has
been made to evaluate the influence of RBI-81 stabilizer on properties of black cotton soil through laboratory investigations. Black
cotton soil with varying percentages of RBI-81 viz., 0, 0.5, 1, 1.5, 2, and 2.5 percent were studied for moisture density relationships
and strength behaviour of soils. Also the effect of curing period was evaluated as literature review clearly emphasized the strength
gain of soils stabilized with RBI-81 over a period of time. The results obtained shows that the unconfined compressive strength of
specimens treated with RBI-81 increased approximately by 250% for a curing period of 28 days as compared to virgin soil. Further
the CBR value improved approximately by 400%. The studies indicated an increasing trend for soil strength behaviour with
increasing percentage of RBI-81 suggesting its potential applications in soil stabilization.
Influence of reinforcement on the behavior of hollow concrete block masonry p...eSAT Journals
Abstract
Reinforced masonry was developed to exploit the strength potential of masonry and to solve its lack of tensile strength. Experimental
and analytical studies have been carried out to investigate the effect of reinforcement on the behavior of hollow concrete block
masonry prisms under compression and to predict ultimate failure compressive strength. In the numerical program, three dimensional
non-linear finite elements (FE) model based on the micro-modeling approach is developed for both unreinforced and reinforced
masonry prisms using ANSYS (14.5). The proposed FE model uses multi-linear stress-strain relationships to model the non-linear
behavior of hollow concrete block, mortar, and grout. Willam-Warnke’s five parameter failure theory has been adopted to model the
failure of masonry materials. The comparison of the numerical and experimental results indicates that the FE models can successfully
capture the highly nonlinear behavior of the physical specimens and accurately predict their strength and failure mechanisms.
Keywords: Structural masonry, Hollow concrete block prism, grout, Compression failure, Finite element method,
Numerical modeling.
Influence of compaction energy on soil stabilized with chemical stabilizereSAT Journals
Abstract
Increase in traffic along with heavier magnitude of wheel loads cause rapid deterioration in pavements. There is a need to improve
density, strength of soil subgrade and other pavement layers. In this study an attempt is made to improve the properties of locally
available loamy soil using twin approaches viz., i) increasing the compaction of soil and ii) treating the soil with chemical stabilizer.
Laboratory studies are carried out on both untreated and treated soil samples compacted by different compaction efforts. Studies
show that increase in compaction effort results in increase in density of soil. However in soil treated with chemical stabilizer, rate of
increase in density is not significant. The soil treated with chemical stabilizer exhibits improvement in both strength and performance
properties.
Keywords: compaction, density, subgradestabilization, resilient modulus
Geographical information system (gis) for water resources managementeSAT Journals
Abstract
Water resources projects are inherited with overlapping and at times conflicting objectives. These projects are often of varied sizes
ranging from major projects with command areas of millions of hectares to very small projects implemented at the local level. Thus,
in all these projects there is seldom proper coordination which is essential for ensuring collective sustainability.
Integrated watershed development and management is the accepted answer but in turn requires a comprehensive framework that can
enable planning process involving all the stakeholders at different levels and scales is compulsory. Such a unified hydrological
framework is essential to evaluate the cause and effect of all the proposed actions within the drainage basins.
The present paper describes a hydrological framework developed in the form of a Hydrologic Information System (HIS) which is
intended to meet the specific information needs of the various line departments of a typical State connected with water related aspects.
The HIS consist of a hydrologic information database coupled with tools for collating primary and secondary data and tools for
analyzing and visualizing the data and information. The HIS also incorporates hydrological model base for indirect assessment of
various entities of water balance in space and time. The framework would be maintained and updated to reflect fully the most
accurate ground truth data and the infrastructure requirements for planning and management.
Keywords: Hydrological Information System (HIS); WebGIS; Data Model; Web Mapping Services
Forest type mapping of bidar forest division, karnataka using geoinformatics ...eSAT Journals
Abstract
The study demonstrate the potentiality of satellite remote sensing technique for the generation of baseline information on forest types
including tree plantation details in Bidar forest division, Karnataka covering an area of 5814.60Sq.Kms. The Total Area of Bidar
forest division is 5814Sq.Kms analysis of the satellite data in the study area reveals that about 84% of the total area is Covered by
crop land, 1.778% of the area is covered by dry deciduous forest, 1.38 % of mixed plantation, which is very threatening to the
environmental stability of the forest, future plantation site has been mapped. With the use of latest Geo-informatics technology proper
and exact condition of the trees can be observed and necessary precautions can be taken for future plantation works in an appropriate
manner
Keywords:-RS, GIS, GPS, Forest Type, Tree Plantation
Factors influencing compressive strength of geopolymer concreteeSAT Journals
Abstract
To study effects of several factors on the properties of fly ash based geopolymer concrete on the compressive strength and also the
cost comparison with the normal concrete. The test variables were molarities of sodium hydroxide(NaOH) 8M,14M and 16M, ratio of
NaOH to sodium silicate (Na2SiO3) 1, 1.5, 2 and 2.5, alkaline liquid to fly ash ratio 0.35 and 0.40 and replacement of water in
Na2SiO3 solution by 10%, 20% and 30% were used in the present study. The test results indicated that the highest compressive
strength 54 MPa was observed for 16M of NaOH, ratio of NaOH to Na2SiO3 2.5 and alkaline liquid to fly ash ratio of 0.35. Lowest
compressive strength of 27 MPa was observed for 8M of NaOH, ratio of NaOH to Na2SiO3 is 1 and alkaline liquid to fly ash ratio of
0.40. Alkaline liquid to fly ash ratio of 0.35, water replacement of 10% and 30% for 8 and 16 molarity of NaOH and has resulted in
compressive strength of 36 MPa and 20 MPa respectively. Superplasticiser dosage of 2 % by weight of fly ash has given higher
strength in all cases.
Keywords: compressive strength, alkaline liquid, fly ash
Experimental investigation on circular hollow steel columns in filled with li...eSAT Journals
Abstract
Composite Circular hollow Steel tubes with and without GFRP infill for three different grades of Light weight concrete are tested for
ultimate load capacity and axial shortening , under Cyclic loading. Steel tubes are compared for different lengths, cross sections and
thickness. Specimens were tested separately after adopting Taguchi’s L9 (Latin Squares) Orthogonal array in order to save the initial
experimental cost on number of specimens and experimental duration. Analysis was carried out using ANN (Artificial Neural
Network) technique with the assistance of Mini Tab- a statistical soft tool. Comparison for predicted, experimental & ANN output is
obtained from linear regression plots. From this research study, it can be concluded that *Cross sectional area of steel tube has most
significant effect on ultimate load carrying capacity, *as length of steel tube increased- load carrying capacity decreased & *ANN
modeling predicted acceptable results. Thus ANN tool can be utilized for predicting ultimate load carrying capacity for composite
columns.
Keywords: Light weight concrete, GFRP, Artificial Neural Network, Linear Regression, Back propagation, orthogonal
Array, Latin Squares
Experimental behavior of circular hsscfrc filled steel tubular columns under ...eSAT Journals
Abstract
This paper presents an outlook on experimental behavior and a comparison with predicted formula on the behaviour of circular
concentrically loaded self-consolidating fibre reinforced concrete filled steel tube columns (HSSCFRC). Forty-five specimens were
tested. The main parameters varied in the tests are: (1) percentage of fiber (2) tube diameter or width to wall thickness ratio (D/t
from 15 to 25) (3) L/d ratio from 2.97 to 7.04 the results from these predictions were compared with the experimental data. The
experimental results) were also validated in this study.
Keywords: Self-compacting concrete; Concrete-filled steel tube; axial load behavior; Ultimate capacity.
Evaluation of punching shear in flat slabseSAT Journals
Abstract
Flat-slab construction has been widely used in construction today because of many advantages that it offers. The basic philosophy in
the design of flat slab is to consider only gravity forces; this method ignores the effect of punching shear due to unbalanced moments
at the slab column junction which is critical. An attempt has been made to generate generalized design sheets which accounts both
punching shear due to gravity loads and unbalanced moments for cases (a) interior column; (b) edge column (bending perpendicular
to shorter edge); (c) edge column (bending parallel to shorter edge); (d) corner column. These design sheets are prepared as per
codal provisions of IS 456-2000. These design sheets will be helpful in calculating the shear reinforcement to be provided at the
critical section which is ignored in many design offices. Apart from its usefulness in evaluating punching shear and the necessary
shear reinforcement, the design sheets developed will enable the designer to fix the depth of flat slab during the initial phase of the
design.
Keywords: Flat slabs, punching shear, unbalanced moment.
Evaluation of performance of intake tower dam for recent earthquake in indiaeSAT Journals
Abstract
Intake towers are typically tall, hollow, reinforced concrete structures and form entrance to reservoir outlet works. A parametric
study on dynamic behavior of circular cylindrical towers can be carried out to study the effect of depth of submergence, wall thickness
and slenderness ratio, and also effect on tower considering dynamic analysis for time history function of different soil condition and
by Goyal and Chopra accounting interaction effects of added hydrodynamic mass of surrounding and inside water in intake tower of
dam
Key words: Hydrodynamic mass, Depth of submergence, Reservoir, Time history analysis,
Evaluation of operational efficiency of urban road network using travel time ...eSAT Journals
Abstract
Efficiency of the road network system is analyzed by travel time reliability measures. The study overlooks on an important measure of
travel time reliability and prioritizing Tiruchirappalli road network. Traffic volume and travel time were collected using license plate
matching method. Travel time measures were estimated from average travel time and 95th travel time. Effect of non-motorized vehicle
on efficiency of road system was evaluated. Relation between buffer time index and traffic volume was created. Travel time model has
been developed and travel time measure was validated. Then service quality of road sections in network were graded based on
travel time reliability measures.
Keywords: Buffer Time Index (BTI); Average Travel Time (ATT); Travel Time Reliability (TTR); Buffer Time (BT).
Estimation of surface runoff in nallur amanikere watershed using scs cn methodeSAT Journals
Abstract
The development of watershed aims at productive utilization of all the available natural resources in the entire area extending from
ridge line to stream outlet. The per capita availability of land for cultivation has been decreasing over the years. Therefore, water and
the related land resources must be developed, utilized and managed in an integrated and comprehensive manner. Remote sensing and
GIS techniques are being increasingly used for planning, management and development of natural resources. The study area, Nallur
Amanikere watershed geographically lies between 110 38’ and 110 52’ N latitude and 760 30’ and 760 50’ E longitude with an area of
415.68 Sq. km. The thematic layers such as land use/land cover and soil maps were derived from remotely sensed data and overlayed
through ArcGIS software to assign the curve number on polygon wise. The daily rainfall data of six rain gauge stations in and around
the watershed (2001-2011) was used to estimate the daily runoff from the watershed using Soil Conservation Service - Curve Number
(SCS-CN) method. The runoff estimated from the SCS-CN model was then used to know the variation of runoff potential with different
land use/land cover and with different soil conditions.
Keywords: Watershed, Nallur watershed, Surface runoff, Rainfall-Runoff, SCS-CN, Remote Sensing, GIS.
Estimation of morphometric parameters and runoff using rs & gis techniqueseSAT Journals
Abstract
Land and water are the two vital natural resources, the optimal management of these resources with minimum adverse environmental
impact are essential not only for sustainable development but also for human survival. Satellite remote sensing with geographic
information system has a pragmatic approach to map and generate spatial input layers of predicting response behavior and yield of
watershed. Hence, in the present study an attempt has been made to understand the hydrological process of the catchment at the
watershed level by drawing the inferences from moprhometric analysis and runoff. The study area chosen for the present study is
Yagachi catchment situated in Chickamaglur and Hassan district lies geographically at a longitude 75⁰52’08.77”E and
13⁰10’50.77”N latitude. It covers an area of 559.493 Sq.km. Morphometric analysis is carried out to estimate morphometric
parameters at Micro-watershed to understand the hydrological response of the catchment at the Micro-watershed level. Daily runoff
is estimated using USDA SCS curve number model for a period of 10 years from 2001 to 2010. The rainfall runoff relationship of the
study shows there is a positive correlation.
Keywords: morphometric analysis, runoff, remote sensing and GIS, SCS - method
-
Effect of variation of plastic hinge length on the results of non linear anal...eSAT Journals
Abstract The nonlinear Static procedure also well known as pushover analysis is method where in monotonically increasing loads are applied to the structure till the structure is unable to resist any further load. It is a popular tool for seismic performance evaluation of existing and new structures. In literature lot of research has been carried out on conventional pushover analysis and after knowing deficiency efforts have been made to improve it. But actual test results to verify the analytically obtained pushover results are rarely available. It has been found that some amount of variation is always expected to exist in seismic demand prediction of pushover analysis. Initial study is carried out by considering user defined hinge properties and default hinge length. Attempt is being made to assess the variation of pushover analysis results by considering user defined hinge properties and various hinge length formulations available in literature and results compared with experimentally obtained results based on test carried out on a G+2 storied RCC framed structure. For the present study two geometric models viz bare frame and rigid frame model is considered and it is found that the results of pushover analysis are very sensitive to geometric model and hinge length adopted. Keywords: Pushover analysis, Base shear, Displacement, hinge length, moment curvature analysis
Effect of use of recycled materials on indirect tensile strength of asphalt c...eSAT Journals
Abstract
Depletion of natural resources and aggregate quarries for the road construction is a serious problem to procure materials. Hence
recycling or reuse of material is beneficial. On emphasizing development in sustainable construction in the present era, recycling of
asphalt pavements is one of the effective and proven rehabilitation processes. For the laboratory investigations reclaimed asphalt
pavement (RAP) from NH-4 and crumb rubber modified binder (CRMB-55) was used. Foundry waste was used as a replacement to
conventional filler. Laboratory tests were conducted on asphalt concrete mixes with 30, 40, 50, and 60 percent replacement with RAP.
These test results were compared with conventional mixes and asphalt concrete mixes with complete binder extracted RAP
aggregates. Mix design was carried out by Marshall Method. The Marshall Tests indicated highest stability values for asphalt
concrete (AC) mixes with 60% RAP. The optimum binder content (OBC) decreased with increased in RAP in AC mixes. The Indirect
Tensile Strength (ITS) for AC mixes with RAP also was found to be higher when compared to conventional AC mixes at 300C.
Keywords: Reclaimed asphalt pavement, Foundry waste, Recycling, Marshall Stability, Indirect tensile strength.
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxnikitacareer3
Looking for the best engineering colleges in Jaipur for 2024?
Check out our list of the top 10 B.Tech colleges to help you make the right choice for your future career!
1) MNIT
2) MANIPAL UNIV
3) LNMIIT
4) NIMS UNIV
5) JECRC
6) VIVEKANANDA GLOBAL UNIV
7) BIT JAIPUR
8) APEX UNIV
9) AMITY UNIV.
10) JNU
TO KNOW MORE ABOUT COLLEGES, FEES AND PLACEMENT, WATCH THE FULL VIDEO GIVEN BELOW ON "TOP 10 B TECH COLLEGES IN JAIPUR"
https://www.youtube.com/watch?v=vSNje0MBh7g
VISIT CAREER MANTRA PORTAL TO KNOW MORE ABOUT COLLEGES/UNIVERSITITES in Jaipur:
https://careermantra.net/colleges/3378/Jaipur/b-tech
Get all the information you need to plan your next steps in your medical career with Career Mantra!
https://careermantra.net/
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Multiple features based fingerprint identification system
1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 142
MULTIPLE FEATURES BASED FINGERPRINT IDENTIFICATION
SYSTEM
Sumitha.S.M1
, A.N.Mukunda Rao2
1
PG Scholar, Dept of Electronics and Communication, Siddaganga Institute of Technology, Karnataka, India
2
Associate Professor, Dept of Electronics and Communication, Siddaganga Institute of Technology, Karnataka, India
Abstract
Security has become major issue now a day. In order to prevent unauthorized access of confidential data there is a need for
accurate and reliable personal identification system. So, biometric based identification system is one of the best solutions.
Fingerprint based system is one of oldest biometric identification systems. It is used in many commercial and security
applications. Even with advent of technology in fingerprint identification system, the accurate extraction and matching of features
from a fingerprint image is a challenging task. The task is much more challenging when fingerprint is affected by non-linear
deformations such as rotation and translation. In this paper, fingerprint identification system using improved feature vector based
algorithm is presented. In the algorithm Gabor filter is implemented to enhance the fingerprint image. The salient features
minutiae (ridge endings) and reference point are extracted from the image. The Euclidian distances between reference point and
each minutiae point are calculated and are arranged in ascending order. These are stored in database as feature vectors. The
fingerprint matching is done based on the similarity rate between the feature vector of input fingerprint and the feature vectors
stored in the database. Algorithms are implemented using Visual Studio 2010 in C++ language using Open CV libraries and
tested on the fingerprint database created in the laboratory.
Key Words: Fingerprint, Minutiae, Reference point, Euclidian distance, Similarity rate, Identification
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Biometric systems are automated systems used to identify a
person or verify his/her identity based on behavioral or
physiological characteristics. The term biometric is derived
from the Greek words, bio which means life and metric
means to measure. Biometric systems have the ability to
correctly recognize whether it is an authorized person or an
imposter. The biometric traits include fingerprints, face,
hand geometry, iris scans, ear, speech, gait, signature, key
stroke dynamics and odor. Among all the biometrics the
fingerprint based identification is one of the important and
reliable techniques. Due to high level of uniqueness and
permanence of fingerprint, the system has picked up
enormous popularity. The solid state sensors are easily
available at lower cost. So that it can be embedded in
various devices that require user authentication. Fingerprint
authentication is having higher user acceptance compared to
other biometrics. Moreover, fingerprints cannot be forgotten
and it is very difficult to steal and reproduce them. An
example for a fingerprint captured using optical fingerprint
sensor is shown in Fig 1.
In the finger tip, a ridge is the raised portion and the gap
between two consecutive ridges is termed as a valley. In the
fingerprint images, the dark lines are the ridges and the
brighter ones are valleys. This is shown in Fig 1. There are
five types of fingerprint. They are arch (Fig 2(a)), tented
arch (Fig 2(b)), whorl (Fig 2(c)), right loop (Fig 2(d)) and
left loop (Fig 2(e)).
Fig -1: A fingerprint image captured using optical
fingerprint sensor.
Fig -2: Types of fingerprint. (a)Arch, (b)Tented arch,
(c)Whorl, (d)Right loop, (e)Left loop.
Fingerprint features are categorized into three levels. This is
shown in Fig 3. Features in level-1 are ridge orientation field
and singular points such as core and delta. These features
give the macro details of the fingerprint such as flow of
ridges and pattern type. The ridge orientation field is defined
by local ridge orientation. Core point is a point at which
ridge curvature is maximum and most it lies at center of the
2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 143
fingerprint image. Delta point is on a ridge at or in front of
and nearest the center of the divergence of the type lines.
Even though these features do not have uniqueness, they are
useful for classification of fingerprint. Features in level-2
include minutiae points such as ridge bifurcations and ridge
endings. These features would differentiate a person form
others and it preserves individuality. Features in level-3
incorporate attributes in all dimension of a ridge such as
ridge path deviation, shape, width, pores, breaks, incipient
ridges, scars, edge contour and creases. These features also
discriminate individual's fingerprint as they are permanent,
immutable and unique.
Fig -3: Fingerprint features. (a)Level-1 features (Ridge
orientation field and singular points), (b)Level-2 features
(Ridge ending and ridge bifurcation), (c)Level-3 features
(pore, dot, incipient ridge and ridge edge protrusion).
Fingerprint recognition is a complex pattern recognition
problem. Designing of an accurate algorithm that is able to
extract and match the features of a fingerprint image in
robust way is a challenging task. The real challenges in
matching fingerprints are: (i)High displacements/rotation
(ii)Distortion (iii)Different pressure and skin conditions
(iv)Errors occur during extraction of feature may result in
false or missing features. A general fingerprint identification
system is shown in Fig 4. It operates in two phases.
Enrollment phase
Identification phase
Enrollment phase – In this phase fingerprint images are
captured and it undergoes pre-processing stage. Then
features are extracted and stored in database.
Fig -4: General fingerprint identification system.
Identification phase – In this phase first the test fingerprint
is captured and its features are calculated. Then it is matched
with the features of stored fingerprint images in the
database. The matching score is obtained. If the matching
score is above the predetermined threshold value, then the
system outputs the positive decision (i.e., person is
identified) otherwise it outputs the negative decision (i.e.,
person is not identified). Also it provides the identity of the
person if the person is identified.
2. RELATED WORK
The most of the conventional fingerprint authentication
system are based on minutiae features. One of such systems
is proposed by Anil K. Jain [1]. In this approach minutiae
matching are done in 2 stages. First is alignment stage and
then matching stage. In alignment stage the input minutiae
are aligned with minutiae in template by estimating the
parameters such as rotation, scaling and translation between
an input and a template in the database. In the matching
stage the number of overlapping minutiae points and
minutiae points differ by small distance are calculated.
Based on the number of minutiae points matched the
decision is taken. In this approach the problem of non linear
deformation is overcome by alignment stage before minutiae
matching. But there is false minutiae extraction in case of
poor quality fingerprint. Ridge feature based matching is
proposed by Anil K. Jain [2]. In this approach the feature
vector that is FingerCode obtained by applying bank of
Gabor filter to the circular region around the core point of
fingerprint. Matching is based on Euclidian distance
between the FingerCodes of input and a template. The
computational complexity is low. So, it works faster but it
does not overcome the problem of non linear deformations.
Lot of work has been carried out for designing fingerprint
recognition system using multiple features. It overcomes the
constraints like non linear deformations and also it increases
the performance of the system. One of such systems is
proposed by Arun Ross [3]. In that, minutiae and texture
features are considered. Texture features are obtained using
set of 8 Gabor filters. Texture feature matching is based on
Euclidian distance between the features of input and a
template. Minutiae matching are based on number of
overlapping minutiae points of input fingerprint and
template. Fusion is done at score level using sum rule.
3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 144
Performance is better compared to the method based on
minutiae alone.
Another approach in which orientation field and minutiae
are considered as features. This method is proposed by
Jinwei Gu [4]. The orientation field covers global and
minutiae cover local information of the fingerprint.
Combination model is used for orientation field matching.
General Hough transform is used for minutiae matching.
Fusion is done in decision level. This approach requires less
storage and has high performance than Hybrid matcher [3].
Instead of orientation field as feature ridge density map is
considered along with the minutiae. This method is
proposed by Dingrui Wan [5]. Ridge density map is
calculated by finding the inter ridge distance at each pixel.
This ridge density map is modeled by polynomial
approximation. Weighted Least Square (WLS) algorithm is
used for polynomial approximation. Hough-transform based
alignment is done in ridge density map matching. Fusion is
at decision level using Neyman–pearson rule. This method
performs better than the minutiae based method. As only
model parameters are stored the memory required is less.
There is another method in which ridge features with
minutiae is considered. This method is proposed by
Heeseung Choi [6]. Minutiae extraction is done using cross
number method. Ridge based coordinate system is
considered to extract ridge feature vector which consists of
ridge count, ridge length, ridge curvature direction and ridge
type. By dynamic programming the matched ridge based
coordinate system is detected. Using breath first search
matched ridge features are detected. Matching is done for
corresponding minutiae pairs of matched ridge feature
vector to calculate minutiae matching score. Depending on
the score, decision is taken. This approach overcomes
problem of non-linear deformation as the ridge features are
considered which remains same for any non-linear
deformation.
There is another method in which core point and minutiae
are considered. This method is proposed by Ala Balti [7].
Core point is detected using orientation at each pixel in
fingerprint. Using crossing number method minutiae are
extracted. Feature vector that consists the Euclidian distance
between minutiae and core point is arranged in ascending
order. Feature vector for ridge bifurcations and ridge ending
is stored separately. Matching is based on similarity between
input feature vector and feature vectors stored in database.
Separate scores for ridge ending and ridge bifurcation are
calculated. Score level fusion is done. In this method
computational complexity is less and also it overcomes the
problem of geometric rotation and translation that occur
during acquisition of fingerprint image.
HOG (Histogram of Oriented Gradients) is a feature
extracted from fingerprint. Minutiae and HOG can be used
as features for fingerprint recognition. This approach is
proposed by Gaurav Aggarwaltt [8]. Fingerprint is enhanced
and minutiae are extracted. Fingerprint is divided into
blocks. In the block if a minutia is present then HOG is
calculated for sub regions in neighborhood of minutiae.
HOG gives textural information of fingerprint. Then
histogram of all segments is combined together to form bag
of HOG feature. Matching is based on calculating the
correlation between bags of HOG features of input and the
stored template.
There is other approach in which Level 3 features pores and
ridges are considered. This method is proposed by Anil K.
Jain [9]. Pores and ridges are extracted using Gabor filter
and wavelet transform. By linear combination of Gabor
filtered image and wavelet response and by applying
threshold pore features are extracted. Ridge contour
enhancement is done by linear subtraction of wavelet
response and Gabor filtered image. Then it is binarized and
thinned to get ridge feature. Here high resolution fingerprint
image is required (1000ppi). Equal error rate is decreased
when these features are combined with level 1 or level 2
features. Matching and fusion is hierarchical.
It can be observed that by considering multiple features the
performance of the fingerprint recognition system is
improved and it also overcome the constraints like non
linear deformations which were faced by the system
considering single feature. So, fingerprint identification
system explained in this paper is based on two features.
They are minutiae (ridge endings) and reference point (core
point).
3. PROPOSED APPROACH
In fingerprint identification system process involved are
fingerprint acquisition, pre-processing, feature extraction
and feature matching.
3.1 Pre-processing
Fingerprint sensor is used to capture a digital image of the
fingerprint pattern. The captured image is called as live
scan. Fingerprint pattern of user can be captured using
thermal, capacitive or optical fingerprint sensor. The
fingerprint sensor used is optical fingerprint sensor Secugen
Hamster Plus. The size of the fingerprint image captured is
260×300 pixels and the resolution is 500 DPI. Fingerprint
image captured is in bitmap format (gray image).
Fingerprint image captured contains noise which is not
suitable to directly extract the features. So, it has to be
enhanced. The steps involved in pre-processing are shown in
Fig 5.
Fig -5: General fingerprint identification system.
4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 145
3.1.1 Normalization
The first step in pre-processing is normalization.
Normalization is a process to decrease the variations in the
gray level values along ridges and valleys [10]. After
normalization the clarity of ridge and valley structures are
not changed.
3.1.2 Segmentation
The process in which the foreground regions in the image
are separated from the background regions is called
segmentation. The area of interest is the foreground regions
which contains clear fingerprint area where the ridges and
valleys are present. There is no valid information of
fingerprint present in the region outside the border of the
fingerprint which is called as the background region. During
minutiae extraction from these background regions noisy
and false minutiae are extracted. So, segmentation is used to
retain only the foreground region excluding background
region, which helps in extraction of valid minutiae. The gray
scale variance value is very low at the background regions
and is very high at the foreground regions for the fingerprint
image. Hence, segmentation can be performed using
variance threshold method [11].
3.1.3 Orientation estimation
The local orientation of the ridges preset in the fingerprint is
defined by the orientation field of a fingerprint image. When
Gabor filter is used to enhance the fingerprint image there is
requirement for orientation estimation. To compute the
orientation image the least mean square estimation method
is used [10].
3.1.4 Frequency estimation
The gray level values along ridges and valleys in the
direction normal to the local ridge orientation forms a
sinusoidal shaped wave, if there is no minutiae and singular
points present in local neighborhood. Therefore another
intrinsic property of a fingerprint image is local ridge
frequency. The fingerprint image is divided into non-
overlapping blocks, then x-signature values are calculated
for each block and it forms sinusoidal-shaped wave. Using
the distance between the consecutive peaks in x-signature
the frequency is calculated [10].
3.1.5 Filtering
After the ridge orientation and ridge frequency information
has been obtained, using these parameters even-symmetric
Gabor filter can be constructed. A Gabor filter is a two
dimensional band pass filter consists of a sinusoidal plane
wave of a specific orientation and frequency and it is
modulated by a Gaussian envelope. Gabor filters have
frequency-selective and orientation-selective properties
hence it is used to enhance the ridges and valleys of
fingerprint [10]. When the Gabor filter used is tuned
perfectly it preserves the ridge structures and reduces noise.
3.1.6 Binarization
The process in which a gray level image is converted into a
binary image is called binarization. By this contrast between
the ridges and valleys in a fingerprint image is improved and
it also helps in extraction of minutiae. A locally adaptive
binarization method can be used. It is the process in which
pixel with value more than the mean intensity value of
selected block will be transformed to a pixel with value 1.
Otherwise it will be transformed to a pixel with value 0.
3.1.7 Thinning
The process in which foreground pixels are successfully
eroded until they are with width of one pixel is called
thinning. The thinning operation is done using two sub-
iterations. At each sub-iteration it starts with considering the
neighborhood of each pixel in the binary image. A pixel
should be deleted or retained is decided based on a
particular set of criteria for pixel deletion. Until no more
pixels can be deleted sub-iterations are continued. It also
preserves the connectivity of ridges [12].
3.2 Feature extraction
After a fingerprint image has been enhanced, the next step is
to extract the features from the enhanced image. The
features establish the uniqueness of an individual's
fingerprint. The features to be extracted are minutiae (ridge
endings) and reference point. After the minutiae extraction,
the false minutiae should be removed.
3.2.1 Minutiae extraction
Minutiae are the minute, precise and trivial details of the
fingerprint image. These mainly include ridge endings and
ridge bifurcations which are shown in Fig 6. The most
commonly used method of minutiae extraction is the
crossing number concept [13]. In this method, the thinned
image is used where the ridge pattern is eight connected.
The minutiae are extracted by scanning the local
neighborhood of each ridge pixel in the eight-neighborhood.
Using the properties of the crossing number the ridge pixel
can then be classified as a ridge ending, bifurcation or non-
minutiae point. The crossing number for a ridge pixel
is given by equation 1,
Fig -6: Minutiae. (a)Ridge ending, (b)Ridge bifurcation
(Pixels with value 0 is considered as ridge)
Fig -7: Order of scan around pixel
5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 146
Where, is the value of pixel in the neighborhood of .
The eight neighboring pixels of a pixel is scanned in an
order is shown in Fig 7. After obtaining the crossing number
using equation 1, minutiae are marked. If then
pixel is ridge ending point and if then pixel is
ridge bifurcation point.
The fingerprint image is not totally healed by pre-processing
stage. Though the scanned fingerprint image gets better
clarity through pre-processing stage, each of the stages in
pre-processing introduce small amount of errors that leads to
extraction of false minutiae. Therefore removal of false
minutiae is necessary in an effective fingerprint
identification system.
To remove false minutiae following steps are carried out at
each minutia such as ridge ending [14]:
With the size of an image is created and
initialized with value 0. A pixel located in
neighborhood of minutia in thinned image is
corresponded by each pixel of .Where the center of the
image is positioned at minutia.
The center pixel of is Labeled with -1 (Fig 8(a)). In
the thinned image corresponding minutiae point is
indicated by this pixel.
In an image all the pixels which are corresponding to
the pixels that are connected to the ridge ending is
labeled with 1 (Fig 8(b)).
At an image border, scanning is done in clockwise
direction. The number of transitions from 0 to 1 ( ) are
counted (Fig 8(c)).
When , the minutia is considered as valid ridge
ending.
Fig -8: Steps to remove false ridge ending
Around each candidate minutia the neighborhood of
dimension is analyzed. The dimension is chosen
larger than two times the average inter-ridge distance and it
should not be too large which would result in retaining of
some false minutiae.
There exist false minutiae at boundary of fingerprint image
even after false minutiae are removed. Some of pixels in
border of fingerprint is marked as ridge ending but they are
not actual ridge ending. These false minutiae are removed
using plus rule [15]. The pixels around each minutia are
scanned with a pattern of plus sign. The scanning is done to
find presence of white pixels (i.e. „1‟ value) across these
lines. If no white pixel is detected, in any one of the lines,
the minutia is considered as boundary minutiae and it is
eliminated.
3.2.2 Reference point location
The core point is the most commonly used reference point
[16]. The core point of a fingerprint is a point at which the
concave ridges have maximum curvature. This point occurs
around the central portion of the finger tip. Therefore, in
captured fingerprint image reference point lies somewhere
around the central part of the image. This point is found
using Poincare index method [10]. This method is applied
after orientation field of a fingerprint image is estimated.
The estimation of orientation field is done in pre-processing
steps.
Let be the size of block considered for orientation
estimation. Let be the local orientation estimated at
the block centered at pixel and .
The Poincare index is defined for each position at
which local orientation is estimated and computed by
considering local orientation of neighboring blocks. The 8
elements contiguous to the target position are considered.
For a position , let
Let
For and Then, the
Poincare index of an element is defined to be
Where,
6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 147
The Poincare index has the value -1/2, 0, 1/2, or 1. A core
point and a delta point are expected to occur at the position
of which Poincare index is 1/2 and -1/2, respectively. The
point is invariant for rotations. An example for fingerprint
image with reference point located is shown in Fig 9.
Fig -9: Reference point of fingerprint.
3.2.3 Feature vector calculation
The steps involved in calculating feature vector are:
Reference point is detected.
Minutiae points (ridge endings) are detected.
For until , The Euclidian Distance between the
reference point and minutiae points are computed using
the formula
Where, is the number of minutiae points. and are
the spatial coordinates with and pixels for the reference
point, and are the spatial coordinates with and
pixels for minutiae points.
The Euclidian Distance between the reference point and
deduced minutiae points are sorted in ascending order to
get Euclidian distance vector.
The Euclidian distance vector is stored in the database.
3.3 Feature matching
Fingerprint matching is based on similarity rate between the
feature vector of input fingerprint and feature vectors stored
in database. The Similarity rate is given by
Where the reference Euclidian distance vector is
saved on the database and is the Euclidian distance
vector of test fingerprint. is the length of the large feature
vector. Zero padding is done for the small feature vector to
make length equal to
These features are invariant for rotation and translation. The
length of feature vectors and variation in Euclidian distance
value along vector of particular fingerprint is similar and
differ for samples of different fingerprint. Hence, similarity
rate is high for samples of same person's fingerprint images.
Then the decision D is taken according to
Where is the positive decision (valid user) and is
negative decision (invalid user) and is the threshold value.
For the given input fingerprint, if the decision obtained is
positive then identity of the person is obtained by the class
of feature vectors stored in database with which maximum
similarity rate is obtained.
4. EXPERIMENTAL RESULTS
A fingerprint image database is created in the lab by taking
right hand, fore-fingerprint images from 10 persons. From
each person 15 fingerprint image samples are collected.
From different persons other than those 10 members 50
fingerprints are randomly collected to calculate false
acceptance of the fingerprint identification system. So a total
of 200 fingerprint images are available in the database. The
scanned fingerprint images are of bit map format with
resolution 500dpi and the size of fingerprint captured is 260
× 300 pixels. Among the 15 samples obtained from each
person, Euclidian distance vectors are stored in database for
10 samples and remaining 5 samples are used for testing
purpose.
Fig -10: (a) Input image, (b) Normalized image,
(c) Segmentation mask, (d) Segmented normalized image
Input fingerprint image is shown in Fig 10(a). Results
obtained at preprocessing steps and feature extraction is
shown in Fig 10 and Fig 11. Fingerprint image after
normalization is shown in Fig 10(b). Segmentation mask is
shown in Fig 10(c). Foreground regions are indicated by
white and background region is indicated by black.
Segmented normalized image is shown in Fig 10(d).
Enhanced image obtained after Gabor filtering is shown in
Fig 11(a). Inverse binarized image is shown in Fig 11(b).
Thinned image obtained using Guo-Hall‟s thinning
7. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 148
algorithm is shown in Fig 11(c). Minutiae are marked using
cross number method is shown in Fig 11(d). Red dots
indicate ridge bifurcation and green dots indicate ridge
ending. False minutiae are removed at boundary of
fingerprint using plus rule is shown in Fig 11(e). Connected
component based method is used to remove false minutiae.
The fingerprint image with only valid minutiae marked is
shown in Fig 11(f). Core point of fingerprint marked is
shown in Fig 11(g). Blue dot indicates core point.
Fig - 11: (a) Enhanced image, (b) Inverse binarized image,
(c) Thinned image, (d) Minutiae marked image, (e) Minutiae
after boundary elimination, (f) Valid minutiae after
removing false minutiae, (g) Core point of fingerprint
Chart -1: Probability distribution curves for authorized and
unauthorized users fingerprints
At the matching stage for a given test fingerprint's feature
vector, the similarity rate with each feature vector stored in
database is calculated. So, maximum similarity rate for each
fingerprint in set of test fingerprints of authorized users and
in set of fingerprints of unauthorized users are calculated.
The plot of maximum similarity rate v/s probability of
occurrence of the maximum similarity rate in particular set
of fingerprints is shown in Chart -1.
The distribution curve with blue color indicates for
fingerprints of authorized users and red color indicates for
fingerprints of unauthorized users. For different threshold
value the false acceptance rate and false rejection rates are
listed in Table -1. Using these values the plot of FAR-FRR
v/s threshold is shown in Chart -2. It can be seen that the
false acceptance rate decreases with increase in threshold
but false rejection rate increases with increase in threshold.
Equal error rate obtained for the fingerprint identification
system is 19%. From this plot the threshold value can be
decided. At the threshold value of 90.5, the FAR and FRR
values are optimum.
Table -1: False acceptance and false rejection rates with
different threshold value for the database created in
laboratory
Threshold (%)
False acceptance
rate
False rejection
rate
85 80 2
86 70 2
87 54 2
88 40 4
89 28 4
90 24 8
91 16 26
92 6 48
93 2 64
94 0 82
95 0 90
Chart -2: FAR-FRR curves of fingerprint identification
system
Performance of fingerprint identification system is tabulated
in Table -2 for threshold 90.5. The accuracy of the system is
given by
8. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 149
Identification results of fingerprint identification system are
tabulated in Table -3 for threshold 90.5. The accuracy of the
system is given by
Table -2: Performance of fingerprint identification system
Identified
Actual
Authorized
user
Unauthorized
user
Authorized user 46 4
Unauthorized user 12 38
Table -3: Identification results of fingerprint identification
system for test fingerprint samples
N: Not identified (Rejected)
Authorize
d users
Samples
Sampl
e
1
Sampl
e 2
Sampl
e 3
Sampl
e
4
Sampl
e 5
Person 1 1 1 N N 1
Person 2 2 2 2 2 2
Person 3 3 3 3 3 1
Person 4 4 4 10 4 4
Person 5 N 5 5 5 5
Person 6 6 6 6 6 6
Person 7 4 7 9 7 7
Person 8 8 8 8 4 N
Person 9 9 9 4 9 9
Person 10 10 10 9 10 10
5. CONCLUSIONS AND FUTURE WORK
The proposed method uses level 1 and level 2 fingerprint
features to identify a person. A Euclidian distance vector is
extracted from each fingerprint. The feature vector requires
only few bytes for storage and hence saves memory.
Matching stage involves only calculation of similarity rates
and comparing then with threshold T. Hence, there is no
complex computation. This proposed method overcomes the
problem of geometric rotation and translations.
The time taken for fingerprint identification is 35 seconds on
personal computer with Intel Core 2 Duo processor with
speed 2.2GHz and the software used is Microsoft Visual
Studio 2010 interfaced with Open CV 2.4.8 library. So,
there is scope for improvement in order to obtain
satisfactorily fast fingerprint identification system. The error
in estimation of local ridge orientation and ridge frequency
cause block artifacts in the enhanced image. This leads to
occurrence of many false minutiae. So, accurate estimation
of local ridge orientation and ridge frequency would
improve the fingerprint enhancement and occurrence of
false minutiae would be less. Along with the Euclidian
distance between minutiae and reference point, orientation
of the line joining minutiae and reference point can also be
considered as the feature vector and that would increase the
performance of the fingerprint identification system.
REFERENCES
[1]. Lin Hong, Anil Jain, Sharath Pankanti and Ruud Bolle,
“Identity Authentication Using Fingerprints”,
Proceedings of the IEEE, Vol. 85, No. 9, pp. 1365-
1388, 1997.
[2]. Anil K. Jain, Salil Prabhakar, Lin Hong and Sharath
Pankanti, “Filterbank-Based Fingerprint Matching”,
IEEE Transactions on Image Processing, Vol. 9, No.
5, May 2000.
[3]. Anil k. Jain, Arun Ross and Salil Prabhakar,
“Fingerprint Matching Using Minutiae And Texture
Features”, Appeared in Proceedings Of International
Conference on Image Processing (ICIP), pp. 282-285,
Thessaloniki, Greece, Oct 7-10, 2001.
[4]. Jinwei Gu, Jie Zhou and Chunyu Yang, “Fingerprint
Recognition by Combining Global Structures and
Local Cues”, IEEE Transactions on Image Processing,
Vol. 15, No. 7, July 2006.
[5]. Dingrui Wan and Jie Zhou, “Fingerprint Recognition
Using Model-Based Density Map”, IEEE Transactions
on Image Processing, Vol. 15, No. 6, June 2006.
[6]. Heeseung Choi, Kyoungtaek Choi and Jaihie Kim,
“Fingerprint Matching Incorporating Ridge Features
with Minutiae”, IEEE Transactions on Information
Forensics and Security, Vol. 6, No. 2, June 2011.
[7]. Ala Balti, Mounir Sayadi and Farhat Fnaiech,
“Improved features for fingerprint identification”,
Appeared in Proceedings Of IEEE conference on
Electrotechnical, pp 878-883, Yasmine Hammamet,
Mar 25-28, 2012.
[8]. Gaurav Aggarwaltt, Nalini K. Rathat, Tsai-Yang Jeat
and Ruud M. Bollet, “Gradient based Textural
Characterization of Fingerprints”, Appeared in
Proceedings Of IEEE conference on Biometrics:
Theory, Applications and Systems, pp 1-5, Arlington,
VA, Sept.29-Oct.1, 2008.
[9]. Anil K. Jain, Yi Chen and Meltem Demirkus, ”Pores
and Ridges: High-Resolution Fingerprint Matching
Using Level 3 Features”, IEEE Transactions on
Pattern Analysis And Machine Intelligence, Vol. 29,
No. 1, January 2007.
[10]. Lin Hong, Yifei Wan and Anil Jain, “Fingerprint
Image Enhancement: Algorithm and Performance
Evaluation”, IEEE Transactions on Pattern Analysis
And Machine Intelligence, Vol. 20, No. 8, August
1998.
[11]. Ishmael S. Msiza, Mmamolatelo E. Mathekga,
Fulufhelo V. Nelwamondo and Tshilidzi Marwala2,
“Fingerprint Segmentation: An Investigation Of
Various Techniques And A Parameter Study Of A
9. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 09 | September-2015, Available @ http://www.ijret.org 150
Variance-Based Method”, International Journal of
Innovative Computing, Information and Control,
Volume 7, Number 9, September 2011.
[12]. Z. Guo and R. Hall, “Parallel thinning with two-
subiteration algorithms”, Communications of the ACM,
Vol. 32, pp. 359–373, Mar 1989.
[13]. Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar
and Parvinder S. Sandhu, “Fingerprint Verification
System using Minutiae Extraction Technique”, World
Academy of Science, Engineering and Technology,
Vol. 2, Oct 2008.
[14]. Marius Tico and Pauli Kuosmanen, “An Algorithm for
Fingerprint Image Postprocessing”, IEEE Conference
Record of the Thirty-Fourth Asilomar Conference on
Signals, Systems and Computers, pp. 1735 – 1739,
Vol. 2, Nov 2000.
[15]. Shahida Jabeen and Shoab A. Khan, “A Hybrid False
Minutiae Removal Algorithm with Boundary
Elimination”, IEEE International Conference on
System of Systems Engineering, pp. 1-6, June 2008.
[16]. Ali Ismail Awady and Kensuke Baba, “Singular Point
Detection for Efficient Fingerprint Classification”,
International Journal on New Computer Architectures
and Their Applications, 2012.