SlideShare a Scribd company logo
1 of 12
Download to read offline
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
DOI: 10.5121/ijcsity.2018.6301 1
PREPROCESSING ALGORITHM FOR DIGITAL
FINGERPRINT IMAGE RECOGNITION
Farah Dhib Tatar1
and Mohsen Machhout2
1
Department of Electrical Engineering
National school of the studies of engineer of Tunis, Tunis, Tunisia
2
Faculty of Sciences of Monastir, Monastir, Tunisia
ABSTRACT
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase.
KEYWORDS
Fingerprint Recognition Algorithm; Image processing; Image sensor; Image filtering
1. INTRODUCTION
The reliable identification of people is becoming more and more necessary to solve problems of
access and identity theft [1].
Access control is a requirement especially to sensitive places that require a high level of
confidentiality. The identification keys are of three main types: keys based on the knowledge of
passwords or encrypted codes, others based on the possession of access cards badges, keys, etc.,
or we can identify us based on the physical characteristics of person: these are biometric
identification techniques
Unlike the first two methods that can pose serious falsification problems, biometric identification
techniques are directly related to people's physical characters and therefore can not be copied or
desired.
The goals of a biometric security system can be multiple. A security system can, for example, use
the tools that biometrics makes available to manage the security of logical access of a system.
This is probably the most common use of biometrics. But it can also be used to secure the
physical access of a room containing sensitive data, from any place on which we choose to install
a biometric lock*.
------
*: http://www.agent-de-securite.be/biometrie/securite_biometrique.html
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
2
The biometric identification techniques are various: we can analyze the shape of the hand [2], the
design of the iris [3], the voice, the vascularization of the retina and the shape of the face. [4]
Likewise, the dynamic recognition of the signature [5], analyzed in real time (speed, pressure on
the pen, etc).
Given its low cost, ease of operation and reliability of fingerprint recognition results, this
technology occupies more than two-thirds of the biometric market.
Fingerprint recognition algorithms are diverse and are based on different techniques in order to
extract useful information from the input image. Obviously, the clearer and better the image, the
more reliable and fast the system is. An image sensor is composed of many photosites, each
corresponding to a picture element, it is the "pixel".Each pixel of an image sensor records the
amount of light to which it is exposed and converts it into a corresponding number of electrons.
The stronger the light, the higher the number of electrons generated.
Sensors embedded in fingerprint recognition systems are diverse and based on several
technologies, noting for example:
CCD sensors: they have been used in cameras for over 30 years and have many
advantages. In general, they still offer a slightly higher sensitivity to light than CMOS
sensors and produce a little less noise. However, they are more expensive and more
difficult to integrate into a camera.
CMOS sensors: they reduce the overall price of cameras, as they contain all the elements
necessary for the composition of cameras. They offer more integration possibilities and
more functions than CCD sensors. They also offer shorter measurement times, lower
power dissipation at the chip, and reduced footprint.
Megapixel sensors (sensors containing one million pixels or more): They are integrated
with megapixel cameras and are of a size equal to or only slightly larger than VGA sensors
that provide a resolution of 640x480 (307,200) pixels. This means that the size of each
pixel on a megapixel sensor is smaller than that on a VGA sensor. Therefore, although the
megapixel camera provides higher resolution and more detail, it is less sensitive to light
than its VGA counterpart since the pixel size is smaller and the light reflected from an
object is spread over more pixels.
Whatever the technology used, the purpose of a fingerprint recognition system is to have reliable
authentication and fast error rate as small as possible. For this purpose, we present in this paper a
preprocessing procedure of the captured image in order to increase its quality before proceeding
to the extraction step of useful information and consequently increase the overall performance of
the system by minimizing the total processing time as well as the rate of erroneous results.
2. PREPROCESSING PROCEDURE FOR DIGITAL FINGERPRINT
RECOGNITION
Digital fingerprint recognition is the most widely used biometric technique because of its ease of
use and demonstration. The chains of recognition by digital processes are based on image
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
3
processing techniques making it possible to extract the useful information of each image
(fingerprint) in order to be able to identify it and consequently compared it to other fingerprints.
Our fingerprints are unique, at least on certain points: these are called minutiae, that is to say, the
lines, the bifurcations, the "islets", the points, the ending of the peaks. The design formed by
these lines on our fingers never evolves. Depending on the level of security desired, it is
estimated that between 10 and 20 points of correspondence are required to certify a fingerprint.
A. Description of the fingerprint
A fingerprint consists of a set of locally parallel lines forming a single pattern for each individual
(Figure 1), there are streaks (or ridges, these are the lines in contact with a surface to the touch)
and the grooves (this are the hollows between two streaks). **
Fig. 1. Fingerprint characteristic
Each imprint has a set of global (centers and deltas) and local (minutiae) singular points (Figure
2).
Fig. 2. Local and Global singular points in a fingerprint
The centers correspond to places of convergence of the striations while the deltas correspond to
places of divergence.
Fingerprint recognition algorithms use several filtering methods in order to locate the useful
points for each fingerprint. The most used filter is that of Gabor given its proven performance in
this type of treatment.
------
**http://www.orcanthus.com/main/product/product.php?idpr=4
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
4
However, in order to have reliable results, the input image of the filter must be as clear as
possible, for this reason we propose a series of mathematical and morphological operations to
improve the appearance of the image before pass to the filtering step.
When capturing a fingerprint image, several factors affect image quality such as:
Scars in the finger, age of the person.
Parasitic substances (water, grease, dirt, etc.)
Capture environment: temperature (dilation, compression), humidity
These various factors greatly affect the quality of the input image of the system and consequently
increase the error rate and reduce the overall performance of the application; We must therefore
perform a specific treatment in order to reduce the parasitic effects and improve the image quality
used. The different pretreatment phases are presented in Figure 3.
Fig. 3. Preprocessing steps
B. Grayscale transformation
A fingerprint sensor in general returns a color image. For this algorithm, there is no need for color
schemes for processing. We must therefore make a transformation into grayscale. This
transformation allows us to reduce the space used for recording data included in the image; in
fact, the color pixels require 24 bits to be able to represent the different levels of colors, on the
other hand in grayscale we only need 8 bits for each pixel since we have only 256 gray levels. this
operation is performed according to the following formula (1):
I=(R+G+B)/3 (1)
Where I is the value of the pixel in gray and R, G and B are the values of the color components.
C. Image normalization
The normalization operation makes it possible to increase the contrasts in the image by making a
certain adjustment to the gray levels represented in each pixel without affecting the useful
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
5
information included in the fingerprint image.This operation is done locally on each block
according to the following steps:
Calculation of the average:
=	
	×
∑ ∑ , (2)
I (i, j) is the value of the pixel (i, j) and M is the value of the average of the image while m and n
are the dimensions of the image.
Calculation of variance:
= ×
∑ ∑ , − (3)
V is the variance of the image.
Calculation of the standardized gray level value of the pixel (i, j) [6]:
, =
+
× ,
			 	 , > 	
−
× ,
			 	 , <
!																																									(4)
M0 and V0 are the desired values for mean and variance, respectively. We chose _0=100 and
V0=100.
Normalization does not change the structure of the image, but it is used to standardize the variation
of gray levels.
D. Segmentation
This operation aims to minimize the noise present in the image as well as to center the useful
information that will be used in the comparison phase of the different signatures, so we eliminate
the noisy areas as well as the useless edges of the image because they can lead us to make false
comparisons.
The results of this step is a binary image of the same size as the original image and called "Mask",
the block corresponding to the bottom of the image will be filled with 0 in the mask, and the rest
will be filled by 1.This is not all to satisfactorily because many blocks containing no useful
information persist.
To avoid this we decided to eliminate the blocks belonging to the bottom of the image according to
their average value. The local average value of each block Ml is calculated and compared to a
threshold T:
If " < #		then we consider that the block contains no useful information and it is
eliminated.
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
6
If " > #		then the block contains part of the fingerprint and is retained.
The threshold T has been chosen according to the average value M& of the overall image such that
=
'(
)
.
The mask then undergoes two treatments:
Any non-noisy block with at least 3 adjacent blocks defined as noisy is eliminated (this
corresponds to a strongly noisy area or the edge of the fingerprint.
The set of blocks at the edge of the image is deleted.
An example of segmentation is shown in Figure 4 [7].
Fig. 4. Effect of segmentation on the image
E. Spatial estimate of the directional map
To obtain the directional map, we goes through two stages: the estimation of the orientation and
the smoothing of the directional map.
1) Estimation of the orientation:
The directional map present the orientation of each streak contained in the fingerprint.Orientation
estimation is a fundamental step in Gabor's image-based image enhancement process. (Figure 5).
Fig. 5. Local orientation of a pixel
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
7
We present here the optimized calculation of the directional map of the fingerprint [7]. This
measurement must be reliable because, in the case of directional filtering, a poor evaluation of the
direction would cause a degradation of the image. We use here the method based on the least
square approximation ([8], [9]) which is very effective in the case of very noisy images.
To calculate the direction associated with a pixel x, y of the image, we consider its neighborhood
V of size W x W pixels. We calculate the gradients, *+ , in x and *, , in y for each pixel i,
j of neighborhood V. For the calculation of the gradient, the use of Sobel masks proved to be the
most efficient in the case of our images. Thus the local direction in neighborhood V is estimated
by the following relation (the proof of this formula is detailed in the article of M. Bazen and H.
Gerez [10].
- +, , = ./0 1
∑ ∑ . *+ , . *, ,
3
3
∑ ∑ 4*+ , − *, , 5
3
3
6
3 78	*+ = +, , × 9
−
−
−
:
; <	*, = +, , × 9
− − −
:																																																			(5)
It is thus possible to calculate the local direction at each pixel of the image but this is very
expensive in computation time, so it is much more efficient to divide the image into adjacent
blocks and evaluate the local mean direction to the block leaves to interpolate the direction for
each pixel.
2) Refinement of the directional map
In the case where the input image is too noisy we can have false results when detecting the local
directions of the pixels. Thus we can note the presence of vertical lines at the directional map
levels that have no direction.
An example of the presence of vertical lines is illustrated in the figure (6) presenting the case of
estimation of the directional map with an “Arch” type fingerprint.
Fig. 6. Influence of vertical lines
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
8
This then causes a very large angular variation between two adjacent blocks. However, a
fingerprint has some directional continuity, such a variation between two adjacent blocks is then
representative of a poor estimate. To eliminate such discontinuities, a low-pass filter is applied to
the directional map. Applying a low-pass filter requires that the orientation of the image be
converted into a continuous vector field. This vector field has as components x and y respectively
defined by:
=+ , =	>?@ . - , 					; <									=, , = @A0 . - , (6)
With the two components of the vector obtained, one can apply the Gaussian low pass filter of size
W_θ × W_θ defined by:
=+
B
, =	 C C * D, E . =+ − E. 3, − E. 3
3-
E
3-
3-
D
3-
=,
B
, =	∑ ∑ * D, E . =, − E. 3, − E. 3
3-
E
F3-
3-
D
F3-
																										(7)
Where G is the Gaussian low pass filter and w is the block size.
Finally, the local orientation smoothed at the pixel (i,j)is given by:
G , =	 ./0
=,
H ,
=+
H ,
																																																															(8)
The Figure (7) shows the example of the estimation of the directional map for different types of
fingerprint.
Fig. 7. Estimation of the directional map for different types of fingerprint
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
9
A Spatial estimate of the frequency map
The frequency map of the image consists in estimating the local frequency of the striations in each
pixel.
1) Frequencyof each block
The frequency mapis an image of the same size as that of the fingerprint and represents the local
frequency of the streaks. The first thing to do is to divide the image into sub-blocks of size
W	 × W. Then, we have to project each pixel in the block orthogonal to its direction (that is to say
in the direction 4
J
)
− θ5 ), we obtain a vector V presenting a set of extrema (figure 8) [10].
Fig. 8. Extrema obtained after projection
2) Spatial estimation of frequency
In the extrema vector obtained, the maxima represent the centers of the striations and the minima
correspond to the centers of the valleys. The inter-striated local period is then estimated by
calculating the average distance between two consecutive maxima S (i,j):
L , =	
M ,
(9)
The maxima M_i and the minima m_i are determined by detecting the zero crossing of the
derivative of the vector V, which makes it possible to obtain the sequence
{M_1,m_1,……..,M_k,m_k,M_(k+1) }. If the difference between a maximum M_i and a
minimum m_i is less than a threshold T then we consider that M_i corresponds to a noise and it is
eliminated.
If the resultant vector contains at least two maxima then the inter-strikethrough period is calculated
by averaging the distances between two consecutive maxima, otherwise the period takes the value
of zero. When the estimated period is zero this means that the block contains no streaks
(background image) or that it is too noisy to reliably estimate the local frequency.
3. RESULTS AND DISCUSSION
We used Matlab to validate all this steps; the results are shown in the following pictures:
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
10
A. Applying the mask on the image:
Fig. 9. Mask of the image
This step allows us to eliminate the edges of the image as well as the very noisy areas.
B. Extraction of the directional map
Fig. 10. Directional map of the fingerprint
The directional map defines the local orientation of streaks contained in the fingerprint.
C. Extraction of the frequency card
Fig. 11. Frequency map of the fingerprint
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
11
The frequency map estimates the local frequency of the streaks in each pixel.
In order to highlight the importance of image preprocessing we have considered a database based
on a hundred images captured by different types of sensors, in the first place we tried to go
directly to the stage filtering without making any changes to the images, we extracted the useful
information from each fingerprint, and then we passed to the authentication phase.
Second, we went through the preprocessing of images before filtering and the steps that follow;
the different results are displayed in the following table:
Table 1. Result of Preprocessing Application
Image without
pretreatment
Images with
preprocessing
Total number of
images
100 100
Rate of
erroneous
results
46 22
We therefore note that thanks to the various operations carried out to improve the quality of the
images, the rate of the erroneous results is reduced by 24%.
The improvements noted make the system more efficient from a point of view of reliability; the
criterion of speed can not be discussed in this step since the total processing time depends directly
on the type of processor used and therefore it varies according to the hardware platform used to
implement the fingerprint recognition algorithm.
4. CONCLUSION
Some are the type of sensor used or the algorithm principle applied; the image quality to be
processed remains a very important factor that directly affects the overall system performance.
For this fact, we have proposed in this article a set of operations to apply to the image in order to
increase its quality to be able to facilitate the different phases of treatment that follow.
The results obtained are motivating in terms of total error rate reduction, however, the total
processing time remains directly related to the type of hardware platform used.
REFERENCES
[1] Debnath Bhattacharyya, Rahul Ranjan1, Farkhod Alisherov A., and Minkyu Choi, Biometric
Authentication: A Review, International Journal of u- and e- Service, Science and Technology, Vol.
2, No. 3, September, 2009.
[2] Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso and Jesus B. Alonso “Multisampling
approach applied to contactless hand biometrics” International Carnahan Conference on Security
Technology (ICCST) , IEEE 2012.
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
12
[3] Aly I. Desoky, Hesham A. Ali and Nahla B. Abdel-Hamid “Enhancing iris recognition system
performance” The International Conference on Computer Engineering & Systems. 2010.
[4] Navaneeth Bodla, Jingxiao Zheng, Hongyu Xu, Jun-Cheng Chen, Carlos Castillo and Rama
Chellappa “Deep Heterogeneous Feature Fusion for Template-Based Face Recognition” IEEE
Winter Conference on Applications of Computer Vision (WACV). 2017.
[5] Gang Li, Rui Zhang, Matthew Ritchie and Hugh Griffiths “Sparsity-based dynamic hand gesture
recognition using micro-Doppler signatures” IEEE Radar Conference (RadarConf).2017.
[6] R. Stefanelli and A. Rosenfeld, Some parallel thinning algorithms for digital pictures , Journal of the
ACM, Vol.18, No2, pp.255-264, April 1971.
[7] P.B. Wamelen, Z. Li and S.S. Iyengar, "A fast expected time algorithm for the 2-D point pattern
matching problem", Pattern Recognition, Vol. 37, No. 8, pp. 1699-1711, August 2004.
[8] N. GALY« Etude d’un système de reconnaissance d’empreintes digitales pour un capteur
microsystème à balayage : http://tima.imag.fr/publications/files/th/2006/sff_207.pdf, 2005.
[9] G.O. Williams, Iris Recognition Technology , IEEE Aerospace and Electronics Systems Magazine,
Volume 12, Issue 4, pp. 23 -29, April 1997.
[10] A.M. Bazen and S.H. Gerez, "Directional Field Computation for Fingerprints Based on the Principal
Component Analysis of Local Gradients", Veldhoven, Netherland, November 2000
.

More Related Content

What's hot

novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
A Study on Fingerprint (biometrics) Recognition
A Study on Fingerprint (biometrics) RecognitionA Study on Fingerprint (biometrics) Recognition
A Study on Fingerprint (biometrics) Recognitioneditor1knowledgecuddle
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
 
A04820104
A04820104A04820104
A04820104IOSR-JEN
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...IRJET Journal
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET Journal
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
A Review on Overview of Image Processing Techniques
A Review on Overview of Image Processing TechniquesA Review on Overview of Image Processing Techniques
A Review on Overview of Image Processing Techniquesijtsrd
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment applicationeSAT Journals
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment applicationeSAT Publishing House
 

What's hot (17)

novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
A Study on Fingerprint (biometrics) Recognition
A Study on Fingerprint (biometrics) RecognitionA Study on Fingerprint (biometrics) Recognition
A Study on Fingerprint (biometrics) Recognition
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
A04820104
A04820104A04820104
A04820104
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...IRJET-  	  Convenience Improvement for Graphical Interface using Gesture Dete...
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
IRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android AppIRJET- Analysing Wound Area Measurement using Android App
IRJET- Analysing Wound Area Measurement using Android App
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
20120140502012
2012014050201220120140502012
20120140502012
 
A Review on Overview of Image Processing Techniques
A Review on Overview of Image Processing TechniquesA Review on Overview of Image Processing Techniques
A Review on Overview of Image Processing Techniques
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment application
 
License plate recognition for toll payment application
License plate recognition for toll payment applicationLicense plate recognition for toll payment application
License plate recognition for toll payment application
 

Similar to PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION

PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
Gesture Recognition System
Gesture Recognition SystemGesture Recognition System
Gesture Recognition SystemIRJET Journal
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AKARTHIKEYAN V
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyAM Publications,India
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemIJTET Journal
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATMIRJET Journal
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionTELKOMNIKA JOURNAL
 
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...IRJET Journal
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesIRJET Journal
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7IRJET Journal
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET Journal
 
Virtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorVirtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorIRJET Journal
 

Similar to PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION (20)

PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
1834 1840
1834 18401834 1840
1834 1840
 
Gesture Recognition System
Gesture Recognition SystemGesture Recognition System
Gesture Recognition System
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
M017637484
M017637484M017637484
M017637484
 
E0543135
E0543135E0543135
E0543135
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
IRJET - Cardless ATM
IRJET -  	  Cardless ATMIRJET -  	  Cardless ATM
IRJET - Cardless ATM
 
Deep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognitionDeep hypersphere embedding for real-time face recognition
Deep hypersphere embedding for real-time face recognition
 
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
 
A Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection TechniquesA Survey on Fingerprint Protection Techniques
A Survey on Fingerprint Protection Techniques
 
Criminal Identification using Arm7
Criminal Identification using Arm7Criminal Identification using Arm7
Criminal Identification using Arm7
 
IRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency RecognitionIRJET- Fake Paper Currency Recognition
IRJET- Fake Paper Currency Recognition
 
Virtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect SensorVirtual Yoga System Using Kinect Sensor
Virtual Yoga System Using Kinect Sensor
 

More from ijcsity

International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION ijcsity
 
4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023) International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023) ijcsity
 
SPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdfSPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdfijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...ijcsity
 

More from ijcsity (20)

International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION NETWORK MEDIA ATTENTION AND  GREEN TECHNOLOGY INNOVATION
NETWORK MEDIA ATTENTION AND GREEN TECHNOLOGY INNOVATION
 
4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...4th International Conference on Artificial Intelligence and Machine Learning ...
4th International Conference on Artificial Intelligence and Machine Learning ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)5th International Conference on Machine Learning & Applications (CMLA 2023)
5th International Conference on Machine Learning & Applications (CMLA 2023)
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...8th International Conference on Networks, Communications, Wireless and Mobile...
8th International Conference on Networks, Communications, Wireless and Mobile...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...10th International Conference on Computer Science and Information Technology ...
10th International Conference on Computer Science and Information Technology ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023) International Conference on Speech and NLP (SPNLP 2023)
International Conference on Speech and NLP (SPNLP 2023)
 
SPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdfSPNLP CFP - 27 mar.pdf
SPNLP CFP - 27 mar.pdf
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION

  • 1. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 DOI: 10.5121/ijcsity.2018.6301 1 PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION Farah Dhib Tatar1 and Mohsen Machhout2 1 Department of Electrical Engineering National school of the studies of engineer of Tunis, Tunis, Tunisia 2 Faculty of Sciences of Monastir, Monastir, Tunisia ABSTRACT Biometrics is one of the most used technologies in the field of security due to its reliability and performance. It is based on several physical human characteristics but the most used technology is the fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in each fingerprint we propose in this article an image preprocessing procedure in order to improve its quality before extracting the necessary information for the comparison phase. KEYWORDS Fingerprint Recognition Algorithm; Image processing; Image sensor; Image filtering 1. INTRODUCTION The reliable identification of people is becoming more and more necessary to solve problems of access and identity theft [1]. Access control is a requirement especially to sensitive places that require a high level of confidentiality. The identification keys are of three main types: keys based on the knowledge of passwords or encrypted codes, others based on the possession of access cards badges, keys, etc., or we can identify us based on the physical characteristics of person: these are biometric identification techniques Unlike the first two methods that can pose serious falsification problems, biometric identification techniques are directly related to people's physical characters and therefore can not be copied or desired. The goals of a biometric security system can be multiple. A security system can, for example, use the tools that biometrics makes available to manage the security of logical access of a system. This is probably the most common use of biometrics. But it can also be used to secure the physical access of a room containing sensitive data, from any place on which we choose to install a biometric lock*. ------ *: http://www.agent-de-securite.be/biometrie/securite_biometrique.html
  • 2. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 2 The biometric identification techniques are various: we can analyze the shape of the hand [2], the design of the iris [3], the voice, the vascularization of the retina and the shape of the face. [4] Likewise, the dynamic recognition of the signature [5], analyzed in real time (speed, pressure on the pen, etc). Given its low cost, ease of operation and reliability of fingerprint recognition results, this technology occupies more than two-thirds of the biometric market. Fingerprint recognition algorithms are diverse and are based on different techniques in order to extract useful information from the input image. Obviously, the clearer and better the image, the more reliable and fast the system is. An image sensor is composed of many photosites, each corresponding to a picture element, it is the "pixel".Each pixel of an image sensor records the amount of light to which it is exposed and converts it into a corresponding number of electrons. The stronger the light, the higher the number of electrons generated. Sensors embedded in fingerprint recognition systems are diverse and based on several technologies, noting for example: CCD sensors: they have been used in cameras for over 30 years and have many advantages. In general, they still offer a slightly higher sensitivity to light than CMOS sensors and produce a little less noise. However, they are more expensive and more difficult to integrate into a camera. CMOS sensors: they reduce the overall price of cameras, as they contain all the elements necessary for the composition of cameras. They offer more integration possibilities and more functions than CCD sensors. They also offer shorter measurement times, lower power dissipation at the chip, and reduced footprint. Megapixel sensors (sensors containing one million pixels or more): They are integrated with megapixel cameras and are of a size equal to or only slightly larger than VGA sensors that provide a resolution of 640x480 (307,200) pixels. This means that the size of each pixel on a megapixel sensor is smaller than that on a VGA sensor. Therefore, although the megapixel camera provides higher resolution and more detail, it is less sensitive to light than its VGA counterpart since the pixel size is smaller and the light reflected from an object is spread over more pixels. Whatever the technology used, the purpose of a fingerprint recognition system is to have reliable authentication and fast error rate as small as possible. For this purpose, we present in this paper a preprocessing procedure of the captured image in order to increase its quality before proceeding to the extraction step of useful information and consequently increase the overall performance of the system by minimizing the total processing time as well as the rate of erroneous results. 2. PREPROCESSING PROCEDURE FOR DIGITAL FINGERPRINT RECOGNITION Digital fingerprint recognition is the most widely used biometric technique because of its ease of use and demonstration. The chains of recognition by digital processes are based on image
  • 3. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 3 processing techniques making it possible to extract the useful information of each image (fingerprint) in order to be able to identify it and consequently compared it to other fingerprints. Our fingerprints are unique, at least on certain points: these are called minutiae, that is to say, the lines, the bifurcations, the "islets", the points, the ending of the peaks. The design formed by these lines on our fingers never evolves. Depending on the level of security desired, it is estimated that between 10 and 20 points of correspondence are required to certify a fingerprint. A. Description of the fingerprint A fingerprint consists of a set of locally parallel lines forming a single pattern for each individual (Figure 1), there are streaks (or ridges, these are the lines in contact with a surface to the touch) and the grooves (this are the hollows between two streaks). ** Fig. 1. Fingerprint characteristic Each imprint has a set of global (centers and deltas) and local (minutiae) singular points (Figure 2). Fig. 2. Local and Global singular points in a fingerprint The centers correspond to places of convergence of the striations while the deltas correspond to places of divergence. Fingerprint recognition algorithms use several filtering methods in order to locate the useful points for each fingerprint. The most used filter is that of Gabor given its proven performance in this type of treatment. ------ **http://www.orcanthus.com/main/product/product.php?idpr=4
  • 4. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 4 However, in order to have reliable results, the input image of the filter must be as clear as possible, for this reason we propose a series of mathematical and morphological operations to improve the appearance of the image before pass to the filtering step. When capturing a fingerprint image, several factors affect image quality such as: Scars in the finger, age of the person. Parasitic substances (water, grease, dirt, etc.) Capture environment: temperature (dilation, compression), humidity These various factors greatly affect the quality of the input image of the system and consequently increase the error rate and reduce the overall performance of the application; We must therefore perform a specific treatment in order to reduce the parasitic effects and improve the image quality used. The different pretreatment phases are presented in Figure 3. Fig. 3. Preprocessing steps B. Grayscale transformation A fingerprint sensor in general returns a color image. For this algorithm, there is no need for color schemes for processing. We must therefore make a transformation into grayscale. This transformation allows us to reduce the space used for recording data included in the image; in fact, the color pixels require 24 bits to be able to represent the different levels of colors, on the other hand in grayscale we only need 8 bits for each pixel since we have only 256 gray levels. this operation is performed according to the following formula (1): I=(R+G+B)/3 (1) Where I is the value of the pixel in gray and R, G and B are the values of the color components. C. Image normalization The normalization operation makes it possible to increase the contrasts in the image by making a certain adjustment to the gray levels represented in each pixel without affecting the useful
  • 5. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 5 information included in the fingerprint image.This operation is done locally on each block according to the following steps: Calculation of the average: = × ∑ ∑ , (2) I (i, j) is the value of the pixel (i, j) and M is the value of the average of the image while m and n are the dimensions of the image. Calculation of variance: = × ∑ ∑ , − (3) V is the variance of the image. Calculation of the standardized gray level value of the pixel (i, j) [6]: , = + × , , > − × , , < ! (4) M0 and V0 are the desired values for mean and variance, respectively. We chose _0=100 and V0=100. Normalization does not change the structure of the image, but it is used to standardize the variation of gray levels. D. Segmentation This operation aims to minimize the noise present in the image as well as to center the useful information that will be used in the comparison phase of the different signatures, so we eliminate the noisy areas as well as the useless edges of the image because they can lead us to make false comparisons. The results of this step is a binary image of the same size as the original image and called "Mask", the block corresponding to the bottom of the image will be filled with 0 in the mask, and the rest will be filled by 1.This is not all to satisfactorily because many blocks containing no useful information persist. To avoid this we decided to eliminate the blocks belonging to the bottom of the image according to their average value. The local average value of each block Ml is calculated and compared to a threshold T: If " < # then we consider that the block contains no useful information and it is eliminated.
  • 6. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 6 If " > # then the block contains part of the fingerprint and is retained. The threshold T has been chosen according to the average value M& of the overall image such that = '( ) . The mask then undergoes two treatments: Any non-noisy block with at least 3 adjacent blocks defined as noisy is eliminated (this corresponds to a strongly noisy area or the edge of the fingerprint. The set of blocks at the edge of the image is deleted. An example of segmentation is shown in Figure 4 [7]. Fig. 4. Effect of segmentation on the image E. Spatial estimate of the directional map To obtain the directional map, we goes through two stages: the estimation of the orientation and the smoothing of the directional map. 1) Estimation of the orientation: The directional map present the orientation of each streak contained in the fingerprint.Orientation estimation is a fundamental step in Gabor's image-based image enhancement process. (Figure 5). Fig. 5. Local orientation of a pixel
  • 7. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 7 We present here the optimized calculation of the directional map of the fingerprint [7]. This measurement must be reliable because, in the case of directional filtering, a poor evaluation of the direction would cause a degradation of the image. We use here the method based on the least square approximation ([8], [9]) which is very effective in the case of very noisy images. To calculate the direction associated with a pixel x, y of the image, we consider its neighborhood V of size W x W pixels. We calculate the gradients, *+ , in x and *, , in y for each pixel i, j of neighborhood V. For the calculation of the gradient, the use of Sobel masks proved to be the most efficient in the case of our images. Thus the local direction in neighborhood V is estimated by the following relation (the proof of this formula is detailed in the article of M. Bazen and H. Gerez [10]. - +, , = ./0 1 ∑ ∑ . *+ , . *, , 3 3 ∑ ∑ 4*+ , − *, , 5 3 3 6 3 78 *+ = +, , × 9 − − − : ; < *, = +, , × 9 − − − : (5) It is thus possible to calculate the local direction at each pixel of the image but this is very expensive in computation time, so it is much more efficient to divide the image into adjacent blocks and evaluate the local mean direction to the block leaves to interpolate the direction for each pixel. 2) Refinement of the directional map In the case where the input image is too noisy we can have false results when detecting the local directions of the pixels. Thus we can note the presence of vertical lines at the directional map levels that have no direction. An example of the presence of vertical lines is illustrated in the figure (6) presenting the case of estimation of the directional map with an “Arch” type fingerprint. Fig. 6. Influence of vertical lines
  • 8. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 8 This then causes a very large angular variation between two adjacent blocks. However, a fingerprint has some directional continuity, such a variation between two adjacent blocks is then representative of a poor estimate. To eliminate such discontinuities, a low-pass filter is applied to the directional map. Applying a low-pass filter requires that the orientation of the image be converted into a continuous vector field. This vector field has as components x and y respectively defined by: =+ , = >?@ . - , ; < =, , = @A0 . - , (6) With the two components of the vector obtained, one can apply the Gaussian low pass filter of size W_θ × W_θ defined by: =+ B , = C C * D, E . =+ − E. 3, − E. 3 3- E 3- 3- D 3- =, B , = ∑ ∑ * D, E . =, − E. 3, − E. 3 3- E F3- 3- D F3- (7) Where G is the Gaussian low pass filter and w is the block size. Finally, the local orientation smoothed at the pixel (i,j)is given by: G , = ./0 =, H , =+ H , (8) The Figure (7) shows the example of the estimation of the directional map for different types of fingerprint. Fig. 7. Estimation of the directional map for different types of fingerprint
  • 9. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 9 A Spatial estimate of the frequency map The frequency map of the image consists in estimating the local frequency of the striations in each pixel. 1) Frequencyof each block The frequency mapis an image of the same size as that of the fingerprint and represents the local frequency of the streaks. The first thing to do is to divide the image into sub-blocks of size W × W. Then, we have to project each pixel in the block orthogonal to its direction (that is to say in the direction 4 J ) − θ5 ), we obtain a vector V presenting a set of extrema (figure 8) [10]. Fig. 8. Extrema obtained after projection 2) Spatial estimation of frequency In the extrema vector obtained, the maxima represent the centers of the striations and the minima correspond to the centers of the valleys. The inter-striated local period is then estimated by calculating the average distance between two consecutive maxima S (i,j): L , = M , (9) The maxima M_i and the minima m_i are determined by detecting the zero crossing of the derivative of the vector V, which makes it possible to obtain the sequence {M_1,m_1,……..,M_k,m_k,M_(k+1) }. If the difference between a maximum M_i and a minimum m_i is less than a threshold T then we consider that M_i corresponds to a noise and it is eliminated. If the resultant vector contains at least two maxima then the inter-strikethrough period is calculated by averaging the distances between two consecutive maxima, otherwise the period takes the value of zero. When the estimated period is zero this means that the block contains no streaks (background image) or that it is too noisy to reliably estimate the local frequency. 3. RESULTS AND DISCUSSION We used Matlab to validate all this steps; the results are shown in the following pictures:
  • 10. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 10 A. Applying the mask on the image: Fig. 9. Mask of the image This step allows us to eliminate the edges of the image as well as the very noisy areas. B. Extraction of the directional map Fig. 10. Directional map of the fingerprint The directional map defines the local orientation of streaks contained in the fingerprint. C. Extraction of the frequency card Fig. 11. Frequency map of the fingerprint
  • 11. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 11 The frequency map estimates the local frequency of the streaks in each pixel. In order to highlight the importance of image preprocessing we have considered a database based on a hundred images captured by different types of sensors, in the first place we tried to go directly to the stage filtering without making any changes to the images, we extracted the useful information from each fingerprint, and then we passed to the authentication phase. Second, we went through the preprocessing of images before filtering and the steps that follow; the different results are displayed in the following table: Table 1. Result of Preprocessing Application Image without pretreatment Images with preprocessing Total number of images 100 100 Rate of erroneous results 46 22 We therefore note that thanks to the various operations carried out to improve the quality of the images, the rate of the erroneous results is reduced by 24%. The improvements noted make the system more efficient from a point of view of reliability; the criterion of speed can not be discussed in this step since the total processing time depends directly on the type of processor used and therefore it varies according to the hardware platform used to implement the fingerprint recognition algorithm. 4. CONCLUSION Some are the type of sensor used or the algorithm principle applied; the image quality to be processed remains a very important factor that directly affects the overall system performance. For this fact, we have proposed in this article a set of operations to apply to the image in order to increase its quality to be able to facilitate the different phases of treatment that follow. The results obtained are motivating in terms of total error rate reduction, however, the total processing time remains directly related to the type of hardware platform used. REFERENCES [1] Debnath Bhattacharyya, Rahul Ranjan1, Farkhod Alisherov A., and Minkyu Choi, Biometric Authentication: A Review, International Journal of u- and e- Service, Science and Technology, Vol. 2, No. 3, September, 2009. [2] Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso and Jesus B. Alonso “Multisampling approach applied to contactless hand biometrics” International Carnahan Conference on Security Technology (ICCST) , IEEE 2012.
  • 12. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 12 [3] Aly I. Desoky, Hesham A. Ali and Nahla B. Abdel-Hamid “Enhancing iris recognition system performance” The International Conference on Computer Engineering & Systems. 2010. [4] Navaneeth Bodla, Jingxiao Zheng, Hongyu Xu, Jun-Cheng Chen, Carlos Castillo and Rama Chellappa “Deep Heterogeneous Feature Fusion for Template-Based Face Recognition” IEEE Winter Conference on Applications of Computer Vision (WACV). 2017. [5] Gang Li, Rui Zhang, Matthew Ritchie and Hugh Griffiths “Sparsity-based dynamic hand gesture recognition using micro-Doppler signatures” IEEE Radar Conference (RadarConf).2017. [6] R. Stefanelli and A. Rosenfeld, Some parallel thinning algorithms for digital pictures , Journal of the ACM, Vol.18, No2, pp.255-264, April 1971. [7] P.B. Wamelen, Z. Li and S.S. Iyengar, "A fast expected time algorithm for the 2-D point pattern matching problem", Pattern Recognition, Vol. 37, No. 8, pp. 1699-1711, August 2004. [8] N. GALYÂŤ Etude d’un système de reconnaissance d’empreintes digitales pour un capteur microsystème Ă  balayageÂť : http://tima.imag.fr/publications/files/th/2006/sff_207.pdf, 2005. [9] G.O. Williams, Iris Recognition Technology , IEEE Aerospace and Electronics Systems Magazine, Volume 12, Issue 4, pp. 23 -29, April 1997. [10] A.M. Bazen and S.H. Gerez, "Directional Field Computation for Fingerprints Based on the Principal Component Analysis of Local Gradients", Veldhoven, Netherland, November 2000 .