This document summarizes a seminar presentation on using fingerprint images in forensic research. It outlines the objectives of studying fingerprint effectiveness, which is to play a vital role in criminal justice. It then covers fingerprint classification, identification features, sensing methods, and a literature review summarizing several papers on gender detection and machine learning approaches using fingerprint ridge density and wavelet transforms. Survey results found ridge density and ratios can help determine gender with 70-80% accuracy.
Biometrics was developed with the aim of improving the overall security level in all society contexts. A biometric system describes a set of techniques to analyze certain individual's biometric features, store and then using those patterns to identify or verify the identity of a person. The palmprint contains not only principal curves and wrinkles but also rich texture and miniscule points, so the palmprint identification is able to achieve a high accuracy because of available rich information in palmprint. Various palmprint identification methods, such as coding based methods and principal curve methods have been proposed in past decades. In addition to these methods, subspace based methods can also perform well for palmprint identification. Combining the left and right palmprint images to perform multibiometrics is easy to implement and can obtain better results.
Multimodal biometrics can provide higher identification accuracy than single or unimodal biometrics, so it is more suitable for some real-world personal identification applications that need high-standard security. A onetime password is included for higher security and accuracy.
One time passwords generally expire after using once. They are generated for using it within a certain time period after which it is useless. These passwords are set as a secondary security measure for the primary palmprint recognition.
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one.
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
Fingerprint is one of the best apparatus to identify human because of its uniqueness, details information, hard to change and long-term indicators of human identity where there are several biometric feature that can be recycled to endorse the individuality. Identification of fingerprint is very important in forensic science, trace any part of human, collection of crime part and proof from a crime. This paper presents a new method of identifying fingerprint in biometrics security system. Fingerprint is one of the best example in biometric security because it can identify personal information and it is much secure than any other biometric identification system. The experimental result exhibits the performance of the proposed method.
Biometric system works on behavioral and physiological biometric parameters to spot a person. Every fingerprint contains distinctive options and its recognizing system primarily works on native ridge feature local ridge endings, minutiae, core point, delta, etc. However, fingerprint pictures have poor quality thanks to variations in skin and impression conditions. In personal identification, fingerprint recognition is taken into account the foremost outstanding and reliable technique for matching with keep fingerprints within the information. Minutiae extraction is additional essential step in fingerprint matching. This paper provides plan regarding numerous feature extraction and matching algorithms for fingerprint recognition systems and to seek out that technique is additional reliable and secure.
Biometrics was developed with the aim of improving the overall security level in all society contexts. A biometric system describes a set of techniques to analyze certain individual's biometric features, store and then using those patterns to identify or verify the identity of a person. The palmprint contains not only principal curves and wrinkles but also rich texture and miniscule points, so the palmprint identification is able to achieve a high accuracy because of available rich information in palmprint. Various palmprint identification methods, such as coding based methods and principal curve methods have been proposed in past decades. In addition to these methods, subspace based methods can also perform well for palmprint identification. Combining the left and right palmprint images to perform multibiometrics is easy to implement and can obtain better results.
Multimodal biometrics can provide higher identification accuracy than single or unimodal biometrics, so it is more suitable for some real-world personal identification applications that need high-standard security. A onetime password is included for higher security and accuracy.
One time passwords generally expire after using once. They are generated for using it within a certain time period after which it is useless. These passwords are set as a secondary security measure for the primary palmprint recognition.
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one.
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
Fingerprint is one of the best apparatus to identify human because of its uniqueness, details information, hard to change and long-term indicators of human identity where there are several biometric feature that can be recycled to endorse the individuality. Identification of fingerprint is very important in forensic science, trace any part of human, collection of crime part and proof from a crime. This paper presents a new method of identifying fingerprint in biometrics security system. Fingerprint is one of the best example in biometric security because it can identify personal information and it is much secure than any other biometric identification system. The experimental result exhibits the performance of the proposed method.
Biometric system works on behavioral and physiological biometric parameters to spot a person. Every fingerprint contains distinctive options and its recognizing system primarily works on native ridge feature local ridge endings, minutiae, core point, delta, etc. However, fingerprint pictures have poor quality thanks to variations in skin and impression conditions. In personal identification, fingerprint recognition is taken into account the foremost outstanding and reliable technique for matching with keep fingerprints within the information. Minutiae extraction is additional essential step in fingerprint matching. This paper provides plan regarding numerous feature extraction and matching algorithms for fingerprint recognition systems and to seek out that technique is additional reliable and secure.
Pixel Based Fusion Methods for Concealed Weapon DetectionIJERA Editor
Concealed Weapon Detection(CWD) is the detection of weapons underneath a person’s clothing which is an important obstacle for the security of general public as well as safety of public assets like airports and buildings. Concealed weapons such as handbags , knives and explosives are detected using manual screening procedures. It is desirable to detect the concealed weapons from a far off distance at airports and other secured places. A number of sensors with different phenomenology have been developed to observe objects underneath’s persons clothing. As no single technology provide improved performance in CWD applications, different image fusion schemes based on pixel level is proposed . Image obtained from visual camera does not reveal any information hidden under persons clothing whereas MWM image obtained from MWM (Millimeter Wave Imaging )sensor reveal clothing penetration underneath persons cloth but cannot identify the person. In this paper fusion of MWM image with visible image based on pixels is proposed. Experimental results reveal that fused image can identify the person with concealed weapons. Performance metrics such as standard deviation, entropy and cross entropy is calculated and from simulation results it is observed that PCA based fusion method is similar to DWT based fusion scheme.
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
M.Selvi, T.Manickam, C.N.Marimuthu"Gaussian Filter based Biometric System Security Enhancement", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. To enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment.
The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. Multi-biometric and Multi-attack protection method which targets to overcome part of these limitations through the use of Image Quality Assessment (IQA).
Moreover, being software-based, it presents the usual advantages of this type of approaches: fast, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake, non-intrusive; user-friendly (transparent to the user), cheap and easy to embed in already functional systems and no hardware is required).
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
Fingerprint recognition is one of the methods used in biometric system. Most of the biometric systems which are used for human identification or person’s identification. In this paper we are discussing minutiae matching and discrete wavelet transform and comparison of these two in fingerprint recognition. In this paper, firstly it uses fingerprint identification and performance in terms of equal error rate and then by calculating using discrete wavelet transform. The main aim of this paper is to create performing and accurate program for fingerprint identification.
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
In this paper, a minutiae-based algorithm for fingerprint pattern recognition and matching is
proposed. The algorithm uses the distance between the minutiae and core points to determine
the pattern matching scores for fingerprint images. Experiments were conducted using
FVC2002 fingerprint database comprising four datasets of images of different sources and
qualities. False Match Rate (FMR), False Non-Match Rate (FNMR) and the Average Matching
Time (AMT) were the statistics generated for testing and measuring the performance of the
proposed algorithm. The comparative analysis of the proposed algorithm and some existing
minutiae based algorithms was carried out as well. The findings from the experimental study
were presented, interpreted and some conclusions were drawn.
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
In this Paper,the actual presence of a real legitimate trait in contrast to a fake self - manufactured synthetic or reconstructed sample is a significant problem in biometric authentication,which requires the development of new and efficient protection measures. In this paper,we present a novel software - based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The obje ctive of the proposed system is to enhance the security of biometric recognition frameworks,by adding livens assessment in a fast,user - friendly,and non - intrusive manner,through the use of image quality assessment. The proposed approach presents a very low degree of complexity,which makes it suitable for real - time applications,using 25 general image quality features extracted from one image (i.e.,the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results,obtained on publicly available data sets of fingerprint,iris,and 2D face,show that the proposed method is highly competitive compared with other state - of - the - art approaches and that the analysis of the general image quality of rea l biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
Abstract: Fingerprint recognition is one of the most popular and successful methods used for person
identification which takes advantage of the fact that the fingerprint has some unique characteristics called
minutiae which are points where a extracts the ridges and bifurcation from a fingerprint image. A critical step in
studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images.
However fingerprint images are rarely of perfect quality. Fingerprint image enhancement techniques are
employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations.
Fingerprint matching is often affected by the presence of intrinsically low quality fingerprints and various
distortions introduced during the acquisition process. In this paper we have used the rural fingerprints
database which is collected from IIIT Delhi research lab which consists of 1634 fingerprints images. Out of
which we have preprocess 600 sample preprocessing extracts the ridges and bifurcation from a fingerprint
image and tried to improve the quality of images. The Resultant images quality is verified by using different
quality measures.
Keywords: minutiae extraction, extracts the ridges and bifurcation, rural fingerprint authentication.
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase.
As we know the fingerprint is unique of every living objects. It is quite difficult to find out the prints.
Usually the Forensics use Fine powder and duct tapes to identify the prints of living object. As powder is
exceptionally muddled, so such molecule can cause loss of information after that examination the information is
coordinated with the system. The proposed system consists of an embedded device in which it consists of ultra
light to glow the fingerprints details. After that we can detect the fingerprint, analysis and it will checks on the
database, and it will return the output after matching. For matching and analysis of the Fingerprint, we will be
using the Algorithm for matching.
GANNON UNIVERSITY
ELECTRICAL AND COMPUTER ENGINEERING DEPARTMENT
FALL2015
GECE 572: DIGITAL SIGNAL PROCESSING
FINGER PRINT RECOGNITION USING MINUTIAE BASED FEATURE
FINAL PROJECT
Prepared by
THADASINA PRUTHVIN REDDY
[email protected]
SALMAN SIDDIQUI
[email protected]
Instructor:
Dr. Ram Sundaram
Table of contents
1. Abstract
2. Introduction
3. Fingerprint matching
4. Pre-processing stage
5. Minutiae extraction stage
6. Post-processing stage
7. Merits & Demerits
8. Applications & future scope
9. Conclusions
10.References
1. Abstract
Nowadays, conventional identification methods such as driver's license, passport, ATM cards and PIN codes do not meet the demands of this wide scale connectivity. Automated biometrics in general, and automated fingerprint authentication in particular, provide efficient solutions to these modern identification problems. Fingerprints have been used for many centuries as a means of identifying people. The fingerprints of individual are unique and are stay unchanged during the life time. Fingerprint matching techniques can be placed into two categories, minutiae-based and correlation based. Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. However, there are some difficulties when using this approach. It is difficult to extract the minutiae points accurately when the fingerprint is of low quality the correlation-based method is able to overcome some of the difficulties of the minutiae-based approach. However, it has some of its own shortcomings. Correlation-based techniques require the precise location of a registration point and are affected by image translation and rotation.
2. Introduction
Biometric recognition refers to the use of distinctive physiological (e.g. fingerprint, palm print, iris, face) and behavioral (e.g. gait, signature) characteristics, called biometric identifiers for recognizing individuals.
Fingerprint recognition is one of the oldest and most reliable biometric used for personal identification. Fingerprint recognition has been used for over 100 years now and has come a long way from tedious manual fingerprint matching. The ancient procedure of matching fingerprints manually was extremely cumbersome and time-consuming and required skilled personnel.
Finger skin is made up of friction ridges and sweat pores all along these ridges. Friction ridges are created during fetal life and only the general shape is genetically defined. The distinguishing nature of physical characteristics of a person is due to both the inherent individual genetic diversity within the human population as well as the random processes affecting the development of the embryo. Friction ridges ...
Pixel Based Fusion Methods for Concealed Weapon DetectionIJERA Editor
Concealed Weapon Detection(CWD) is the detection of weapons underneath a person’s clothing which is an important obstacle for the security of general public as well as safety of public assets like airports and buildings. Concealed weapons such as handbags , knives and explosives are detected using manual screening procedures. It is desirable to detect the concealed weapons from a far off distance at airports and other secured places. A number of sensors with different phenomenology have been developed to observe objects underneath’s persons clothing. As no single technology provide improved performance in CWD applications, different image fusion schemes based on pixel level is proposed . Image obtained from visual camera does not reveal any information hidden under persons clothing whereas MWM image obtained from MWM (Millimeter Wave Imaging )sensor reveal clothing penetration underneath persons cloth but cannot identify the person. In this paper fusion of MWM image with visible image based on pixels is proposed. Experimental results reveal that fused image can identify the person with concealed weapons. Performance metrics such as standard deviation, entropy and cross entropy is calculated and from simulation results it is observed that PCA based fusion method is similar to DWT based fusion scheme.
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
Abstract— In the field of biometric modality fingerprint is considered to be one of the most widely used method for individual identity. The fingerprint authentication is used in most application for security purpose. In the biometric systems, the input images are binarized and feature is extraction. The Minutiae matching in fingerprint identification is done by identifying the minutiae point of interest and their relationship. The validation testing in the proposed system using the method of K- fold cross validation by using two , a training set and test set of images to find the appropriate image that matches the input image ,increase the accuracy of recognition by reducing the false acceptance rate of the system.
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
M.Selvi, T.Manickam, C.N.Marimuthu"Gaussian Filter based Biometric System Security Enhancement", International Research Journal of Engineering and Technology (IRJET), Volume2,issue-01 April 2015.e-ISSN:2395-0056, p-ISSN:2395-0072. www.irjet.net
Abstract
A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. To enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment.
The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. Multi-biometric and Multi-attack protection method which targets to overcome part of these limitations through the use of Image Quality Assessment (IQA).
Moreover, being software-based, it presents the usual advantages of this type of approaches: fast, as it only needs one image (i.e., the same sample acquired for biometric recognition) to detect whether it is real or fake, non-intrusive; user-friendly (transparent to the user), cheap and easy to embed in already functional systems and no hardware is required).
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
Fingerprint recognition is one of the methods used in biometric system. Most of the biometric systems which are used for human identification or person’s identification. In this paper we are discussing minutiae matching and discrete wavelet transform and comparison of these two in fingerprint recognition. In this paper, firstly it uses fingerprint identification and performance in terms of equal error rate and then by calculating using discrete wavelet transform. The main aim of this paper is to create performing and accurate program for fingerprint identification.
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
In this paper, a minutiae-based algorithm for fingerprint pattern recognition and matching is
proposed. The algorithm uses the distance between the minutiae and core points to determine
the pattern matching scores for fingerprint images. Experiments were conducted using
FVC2002 fingerprint database comprising four datasets of images of different sources and
qualities. False Match Rate (FMR), False Non-Match Rate (FNMR) and the Average Matching
Time (AMT) were the statistics generated for testing and measuring the performance of the
proposed algorithm. The comparative analysis of the proposed algorithm and some existing
minutiae based algorithms was carried out as well. The findings from the experimental study
were presented, interpreted and some conclusions were drawn.
IMAGE QUALITY ASSESSMENT FOR FAKE BIOMETRIC DETECTION: APPLICATION TO IRIS, F...ijiert bestjournal
In this Paper,the actual presence of a real legitimate trait in contrast to a fake self - manufactured synthetic or reconstructed sample is a significant problem in biometric authentication,which requires the development of new and efficient protection measures. In this paper,we present a novel software - based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The obje ctive of the proposed system is to enhance the security of biometric recognition frameworks,by adding livens assessment in a fast,user - friendly,and non - intrusive manner,through the use of image quality assessment. The proposed approach presents a very low degree of complexity,which makes it suitable for real - time applications,using 25 general image quality features extracted from one image (i.e.,the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results,obtained on publicly available data sets of fingerprint,iris,and 2D face,show that the proposed method is highly competitive compared with other state - of - the - art approaches and that the analysis of the general image quality of rea l biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
Abstract: Fingerprint recognition is one of the most popular and successful methods used for person
identification which takes advantage of the fact that the fingerprint has some unique characteristics called
minutiae which are points where a extracts the ridges and bifurcation from a fingerprint image. A critical step in
studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images.
However fingerprint images are rarely of perfect quality. Fingerprint image enhancement techniques are
employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations.
Fingerprint matching is often affected by the presence of intrinsically low quality fingerprints and various
distortions introduced during the acquisition process. In this paper we have used the rural fingerprints
database which is collected from IIIT Delhi research lab which consists of 1634 fingerprints images. Out of
which we have preprocess 600 sample preprocessing extracts the ridges and bifurcation from a fingerprint
image and tried to improve the quality of images. The Resultant images quality is verified by using different
quality measures.
Keywords: minutiae extraction, extracts the ridges and bifurcation, rural fingerprint authentication.
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
Fingerprint recognition technology is becoming increasingly popular and widely used for many applications that require a high level of security. We can meet several types of sensors integrated in the fingerprint recognition system as well as several types of image processing algorithm in order to ensure
reliable and fast authentication of people. Embedded systems have a wide variety and the choice of a welldesigned
processor is one of the most important factors that directly affect the overall performance of the system. This paper introduces a preliminary treatment to the image in order to improve the quality, and then present a hardware implementation.
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase.
As we know the fingerprint is unique of every living objects. It is quite difficult to find out the prints.
Usually the Forensics use Fine powder and duct tapes to identify the prints of living object. As powder is
exceptionally muddled, so such molecule can cause loss of information after that examination the information is
coordinated with the system. The proposed system consists of an embedded device in which it consists of ultra
light to glow the fingerprints details. After that we can detect the fingerprint, analysis and it will checks on the
database, and it will return the output after matching. For matching and analysis of the Fingerprint, we will be
using the Algorithm for matching.
GANNON UNIVERSITY
ELECTRICAL AND COMPUTER ENGINEERING DEPARTMENT
FALL2015
GECE 572: DIGITAL SIGNAL PROCESSING
FINGER PRINT RECOGNITION USING MINUTIAE BASED FEATURE
FINAL PROJECT
Prepared by
THADASINA PRUTHVIN REDDY
[email protected]
SALMAN SIDDIQUI
[email protected]
Instructor:
Dr. Ram Sundaram
Table of contents
1. Abstract
2. Introduction
3. Fingerprint matching
4. Pre-processing stage
5. Minutiae extraction stage
6. Post-processing stage
7. Merits & Demerits
8. Applications & future scope
9. Conclusions
10.References
1. Abstract
Nowadays, conventional identification methods such as driver's license, passport, ATM cards and PIN codes do not meet the demands of this wide scale connectivity. Automated biometrics in general, and automated fingerprint authentication in particular, provide efficient solutions to these modern identification problems. Fingerprints have been used for many centuries as a means of identifying people. The fingerprints of individual are unique and are stay unchanged during the life time. Fingerprint matching techniques can be placed into two categories, minutiae-based and correlation based. Minutiae-based techniques first find minutiae points and then map their relative placement on the finger. However, there are some difficulties when using this approach. It is difficult to extract the minutiae points accurately when the fingerprint is of low quality the correlation-based method is able to overcome some of the difficulties of the minutiae-based approach. However, it has some of its own shortcomings. Correlation-based techniques require the precise location of a registration point and are affected by image translation and rotation.
2. Introduction
Biometric recognition refers to the use of distinctive physiological (e.g. fingerprint, palm print, iris, face) and behavioral (e.g. gait, signature) characteristics, called biometric identifiers for recognizing individuals.
Fingerprint recognition is one of the oldest and most reliable biometric used for personal identification. Fingerprint recognition has been used for over 100 years now and has come a long way from tedious manual fingerprint matching. The ancient procedure of matching fingerprints manually was extremely cumbersome and time-consuming and required skilled personnel.
Finger skin is made up of friction ridges and sweat pores all along these ridges. Friction ridges are created during fetal life and only the general shape is genetically defined. The distinguishing nature of physical characteristics of a person is due to both the inherent individual genetic diversity within the human population as well as the random processes affecting the development of the embryo. Friction ridges ...
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
For security and surveillance automated personal identification is major issue. We can see a lot varieties of biometric systems like face detection, fingerprint recognition, iris recognition, voice recognition, palm recognition etc. In our project we will only go for fingerprint recognition. Never two peoples have exactly same fingerprints even twins, they are totally unique. The sensors capture the finger prints of humans and convert them into images and a minutiae extraction algorithm extracts the location of minutiae points called termination and bifurcation. A database system stores these patterns and minutiae points of fingerprint. A large storage space required to store bifurcation and termination points for the fingerprint database. LZW compression algorithm has been used to reduce the size of data. With LZW applied on these extracted minutiae points, these minutiae points get encoded which add more security feature.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
An Improved Self Organizing Feature Map Classifier for Multimodal Biometric R...ijtsrd
Multimodal biometric system is a system that is viable in authentication and capable of carrying the robustness of the system. Most existing biometric systems ear fingerprint and face ear suffer varying challenges such as large variability, high dimensionality, small sample size and average recognition time. These lead to the degrading performance and accuracy of the system. Sequel to this, multimodal biometric system was developed to overcome those challenges. The system was implemented in MATLAB environment. Am improved self organizing feature map was used to classify the fused features into known and unknown. The performance of the developed multimodal was evaluated based on sensitivity, recognition accuracy and time. Olabode, A. O | Amusan, D. G | Ajao, T. A "An Improved Self Organizing Feature Map Classifier for Multimodal Biometric Recognition System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26458.pdfPaper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/26458/an-improved-self-organizing-feature-map-classifier-for-multimodal-biometric-recognition-system/olabode-a-o
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...TELKOMNIKA JOURNAL
The idea of security is as old as humanity itself. Between oldest methods of security were
included simple mechanical locks whose authentication element was the key. At first, a universal–simple
type, later unique for each lock. A long time had mechanical locks been the sole option for protection
against unauthorized access. The boom of biometrics has come in the 20th century, and especially in
recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security
methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits
are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the
impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric
fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create
a system that is capable of recognizing fingerprints from a user and then processing them. The main part
of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint
with a name Adafruit R305 (special reader). This microcontroller communicates with the external database,
which ensures the exchange of data between Arduino Yun and user application. This application was
created for (currently) most widespread mobile operating system-Android.
MDD Project Report By Dharmendra singh [Srm University] Ncr DelhiDharmendrasingh417
In this modern era, a huge revolution in technology is the introduction of biometric recognition system. One of the most useful biometric recognition system is fingerprint recognition system. The fingerprint recognition system is considered to most important biometric system in addition to other biometrics recognition systems
According to a report by Frost and Sullivan in 2007, revenues for non-AFIS fingerprint devices in notebook PC's and wireless devices is anticipated to grow from $148.5 million to $1588.0 million by 2014, a compound annual growth rate of 40.3% [1]. The AFIS market has a compound annual growth rate of 15.2% with revenues of $445.0 million in 2007. With the development of mobile applications in a number of different market segments, such as healthcare, retail, and law enforcement, this paper analyzed the performance of fingerprints of different sizes, from different sensors...
Biometric is a technology which deals with unique bio elements of an individual.
It is used to verify an individual by its own bio elements saved in system.
Estimation of Age Through Fingerprints Using Wavelet Transform and Singular V...CSCJournals
The forensic investigators always search for fingerprint evidence which is seen as one of the best types of physical evidence linking a suspect to the crime. In this paper discrete wavelet transform (DWT) and the singular value decomposition (SVD) has been used to estimate a person’s age using his/her fingerprint. The most robust K nearest neighbor (KNN) used as a classifier. The evaluation of the system is carried on using internal database of 3570 fingerprints in which 1980 were male fingerprints and 1590 were female fingerprints. Tested fingerprint is grouped into any one of the following five groups: up to 12, 13-19, 20-25, 26-35 and 36 and above. By the proposed method, fingerprints were classified accurately by 96.67%, 71.75%, 86.26%, 76.39% and 53.14% in five groups respectively for male and similarly classified by 66.67%, 63.64%, 76.77%, 72.41% and 16.79% in five groups respectively for female.
Similar to survey on effectiveness of using fingerprint images in forensic research (20)
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSveerababupersonal22
It consists of cw radar and fmcw radar ,range measurement,if amplifier and fmcw altimeterThe CW radar operates using continuous wave transmission, while the FMCW radar employs frequency-modulated continuous wave technology. Range measurement is a crucial aspect of radar systems, providing information about the distance to a target. The IF amplifier plays a key role in signal processing, amplifying intermediate frequency signals for further analysis. The FMCW altimeter utilizes frequency-modulated continuous wave technology to accurately measure altitude above a reference point.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
survey on effectiveness of using fingerprint images in forensic research
1. Survey on Effectiveness of using
Fingerprint Images in Forensic
research
Third Semester M. Tech. Seminar II (10EC 7301)
by
ANJU NARAYANAN
Roll No. M174102
M. Tech. in Signal Processing and Embedded Systems
Guided by
Dr. SAJITH K
Department of Electronics & Communication Engineering
Govt. College of Engineering Kannur
on
10th September 2018
2. Outline
Objective
Fingerprints
Classification of fingerprint
Different identification of fingerprint
Fingerprint sensing
Literature Review
Survey
Conclusion
References
Survey on Effectiveness of using Fingerprint Images in
Forensic research
3. Objective
Survey on Effectiveness of using Fingerprint Images in
Forensic research
Forensic science plays a vital role in the criminal
justice system.
The recovery of fingerprints from a crime scene is
an important method of forensic science.
4. Fingerprints
Fingerprints are impressions created by ridges on skin.
Purpose of these ridges is to give grasp and to avoid
slippage.
All fingerprint are unique in nature.
Fingerprints can solve crimes.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
5. Fingerprints(contd…)
Ridges contain sweat pores, allow sweat and oil to exit
from glands.
Fingerprints are left, by transfer of oils or amino acids to
a surface.
Ridges form under pregnancy and maintain their pattern
throughout life.
As you grow, pattern gets larger, but does not change.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
6. Classification of Fingerprints: Patterns
Arch: Ridges enter from one side, rise in centre forming
an arc, then exit other side of finger.
Loop: Ridges enter from one side of finger, form a
curve, then exit on that same side.
Whorl: Ridges form circularly around a central point on
finger.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
7. Classification of Fingerprints: At crime
scene
Latent prints: Commonly Invisible image of prints.
Visible prints: Visible to naked eye, formed when a
visible contaminants are present.
Plastic prints: Fingers comes in contact with soft
surface such as soap, butter, wax etc.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
Visible prints Plastic prints
8. Different identification on fingerprint
Crossover: Two ridges cross
each other.
Core: centre
Bifurcation: Ridge separates
Ridge ending: End point.
Island: Small ridge b/w two
spaces.
Delta: Space between ridges.
Pore: Human pore
Survey on Effectiveness of using
Fingerprint Images in Forensic
research
10. Fingerprint Sensing
Based on mode of acquisition, fingerprint image is
classified as
Off line image
Live-scan image
Number of live-scan sensing mechanisms that can detect
ridges and valleys present in fingertip.
Examples are
Optical
Capacitive
Pressure-based
Survey on Effectiveness of using Fingerprint Images in
Forensic research
Optical sensor Capacitive sensor
11. Literature Review
Survey on Effectiveness of using Fingerprint Images in
Forensic research
Author, year Title Publication
Anil K. Jain, Jianjiang Feng,
Karthik Nandakumar
Fingerprint matching Published by the IEEE
Computer Society-2010
A. S. Falohun, O. D. Fenwa,
F. A. Ajala
2.A Fingerprint-based Age
and Gender Detector System
using Fingerprint Pattern
Analysis
International Journal of
Computer Applications-2016
S. F. Abdullah, A. F. N. A.
Rahman and Z. A. Abas
4. Classification of
gender by using fingerprint
ridge density in northern
part of malaysia
ARPN Journal of Engineering
and Applied Sciences-2016
12. Literature Review(contd…)
Survey on Effectiveness of using Fingerprint Images in
Forensic research
Author, year Title Publication
Arun K.S, Sarath K.S,
2013.
A Machine Learning Approach
for Fingerprint Based
Gender Identification
IEEE Recent Advances in
Intelligent Computational
Systems.
Suchita Tarare, Akhil Anjikar,
Hemant Turkar
Fingerprint Based Gender
Classification Using DWT
Transform
IEEE International Conference
on Computing Communication
Control and Automation.
13. 1. Fingerprint matching
Skin on our palms consists of ridges and valleys.
Friction ridge patterns are influenced by
Genetic factors.
Random physical stresses and tensions during foetal development.
Due to concerns on security government and commercial
organizations proposed fingerprint-based recognition
systems.
Fingerprint recognition system includes verification
(1:1 match) and identification(1:N match).
Survey on Effectiveness of using Fingerprint Images in
Forensic research
14. Fingerprint matching(contd…)
AUTOMATED FINGERPRINT RECOGNITION
Enrolment phase and Identification/Authentication phase.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
15. Fingerprint matching(contd…)
Fingerprint Sensing
Feature extraction:
Level 1 , Level 2 , Level 3 features
Matching
Survey on Effectiveness of using Fingerprint Images in
Forensic research
16. 2. Gender Detector System using
Fingerprint Pattern Analysis
Human gender detection using fingerprint analysis
trained with Back Propagation Neural Network.
METHODOLOGY
Fingerprint acquisition/Data collection
Enhancement
Performance depends on quality of fingerprint images.
Histogram equalization
Survey on Effectiveness of using Fingerprint Images in
Forensic research
17. Gender Detection using fingerprint
pattern(contd…)
Image Binarization
Ridges in black and valleys are white in colour.
Local adaptive Binarization method is performed.
Segmentation
Image area without effective ridges and valleys are discarded.
Fingerprint Ridge Thinning
Eliminate redundant pixels of ridges till ridges are one pixel wide.
Skeltonisation method is used.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
18. Gender Detection using fingerprint
pattern(contd…)
Minutia Marking
Crossing Number (CN) concept.
Training with Back Propagation Neural Network.
Total 280 fingerprint samples with various gender was
collected. 140 samples used for training system’s
Database; 70 males and 70 females.
Result: 80% classification accuracy for females and
72.86 % for males.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
19. 3.Gender classification using fingerprint
ridge density in northern part of malaysia
Ridge of fingerprint from two topological areas, radial
and ulnar can be counted and mean can be calculated.
METHODOLOGY
Collection of fingerprint images
Plain technique is adopted for collection of fingerprint images.
Material use in this data collection is Unicorn thumb print pad,
ruler, pen, measuring tape and data personal form.
pre-processing
Original fingerprint image is turned into the grayscale.
Binarization
Survey on Effectiveness of using Fingerprint Images in
Forensic research
20. Gender classification using fingerprint
ridge density(contd…)
Use method of Acree to calculate ridge density.
A square box measured by 5 x 5 mm is placed at upper
portion of radial and ulnar border in fingerprint image.
Value of ridges density represented in number of ridges/
25mm² square areas is calculated by using the formula:
Ridge density=
𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑟𝑖𝑑𝑔𝑒 𝑖𝑛 𝑠𝑞𝑢𝑎𝑟𝑒
25𝑚𝑚2
Result: Male respondents have lower number of ridge
density than female respondents.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
21. 4. Machine Learning Approach for
Gender Identification
Use machine learning approach.
Feature vector consisting of ridge thickness to valley
thickness ratio (RTVTR) and ridge density values.
RTVTR is average ratio between ridge thickness and
valley thickness of a fingerprint.
Females have higher RTVTR value compared to male.
150 male and 125 female fingerprint images.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
22. Machine Learning Approach(contd…)
Fingerprint image is divided into 32x32 non overlapping
blocks.
Local ridge orientation within each block is calculated.
Projection profile of valleys and ridges in each block is
calculated.
Projection profile was binarized using 1D optimal
thresholding.
Resultant binary profile represents the ridges and valleys in
this block.
RTVTR is calculated for each block.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
23. Machine Learning Approach(contd…)
.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
FINGERPRINT ACQUISITION IMAGE NORMALIZATION
FINDING LOCAL RIDGE
ORIENTATION
IMAGE BINARIZATION
FINDING PROJECTION PROFILE CALCULATION OF RIDGE
DENSITY
SVM CLASSIFIER
MALE & FEMALE OUTPUT
Methodology
24. 5. Fingerprint Based Gender
Classification Using DWT Transform
Pre-processing of all dataset images.
Calculate feature vector of training images using discrete
wavelet transform.
Classification of testing fingerprint using KNN classifier.
Dataset of 100 male and 100 female fingerprints.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
25. Gender Classification Using DWT
Transform(contd…)
Over all process of gender classification
Survey on Effectiveness of using Fingerprint Images in
Forensic research
Male Female
Training Images
Pre-processed Images
Decomposed Image
Feature database
Testing Image
Pre-processed Images
Decomposed Image
Feature vector
Knn classifier
preprocessing
6 Level DWT
Feature calculation Feature calculation
6 Level DWT
preprocessing
26. Gender Classification Using DWT
Transform(contd…)
Pre-processing: Image resizing, Binarization
DWT Based Feature Extraction:
Dwt uses wavelet as its basis function.
Decomposition of images into different frequency bands helps to
isolate different frequency components.
2-D wavelet decomposition results in 4 decomposed sub-band
images :low–low (LL), low–high (LH), high–low (HL), and high–
high (HH).
These sub-bands help to study different image details.
For k level DWT, there are (3*k) + 1 sub-bands available.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
27. Gender Classification Using DWT
Transform(contd…)
Energy of all these sub-band coefficients is used as feature vector
called sub-band energy vector (E).
Calculating features of all training images and stored in database.
Energy of each sub band is calculated by 𝐸 𝑘 =
1
𝑀𝑁 𝑖=1
𝑁
𝐽=1
𝑀
𝑥 𝑘 ⅈ, 𝑗
k is specific sub-band.
M and N is the width and height of particular sub-band.
𝑥 𝑘 ⅈ, 𝑗 represents the specific pixel of particular sub-band.
K nearest neighbor (knn) classifier is used as a classifier.
Uses Euclidean distance measure for classifying testing fingerprint as
male or female fingerprint.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
28. Conclusion
As fingerprints are unique for individuals in universe, it
gives a unique identification.
Most of traditional methods used in identification of
gender gave the satisfactory results but an efficient
attempt is needed to give effective results with higher
accuracy.
Image clarity, Frequency domain analysis, application of
neural network will have important role to increase
efficiency, still there is scope to improve results.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
29. References
Survey on Effectiveness of using Fingerprint Images in
Forensic research
[1] Anil K. Jain, Arun Ross, Sharath Pankanti ” Biometrics: A Tool
for Information Security.”, IEEE transactions on information
forensics and security, pp. 753-764, May 2010.
[2] Gualberto, Gabriel ,” Fingerprint Recognition “, IEEE
International Conference on Internet Monitoring and
Protection, pp.1212-1215, 2012.
[3] Anil K. Jain, Jian Feng,” A multistage fingerprint recognition
method for payment verification system”, IEEE transactions on
pattern analysis and machine intelligence., pp.641-643, 2011.
30. References
Survey on Effectiveness of using Fingerprint Images in
Forensic research
[4] Arun K.S, Sarath K.S, ” A Machine Learning Approach for
Fingerprint Based Gender Identification”, IEEE Recent Advances in
Intelligent Computational Systems, pp. 110-124, December 2014.
[5] Saptarshi Rudra, Abhisek Roy, Soham Mitra, ” Gender
Classification System from Offline Survey Data Using Neural
Networks “, IEEE 7th Annual Ubiquitous Computing, Electronics &
Mobile Communication Conference ,pp.200-241, December 2016.
32. 3.Fingerprint image normalization.
Let N (i, j) represent the normalized grey-level value at
pixel (i, j).
The normalized image is defined as:
M0 and VAR0 are desired mean and variance respectively.
M and VAR are mean and variance of image.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
33. 3. Finding Local Ridge Orientation
Divide G into blocks of size WxW (32x32). Let the umber of blocks be
N.
Compute gradients δx(i,j) and δy(i,j) at each pixel (i,j). Operator
used is Sobel operator.
Estimate local orientation of each block centered at pixel (i, j) using:
Where Θ(i, j) is least square estimate of local ridge orientation at block
centered at pixel (i, j).
Survey on Effectiveness of using Fingerprint Images in
Forensic research
34. 3. Binarizing Fingerprint Image
Grayscale image is categorized into only two levels, black and
white (0 and 1).
Thresholding is used for binarizing image.
The following algorithm is used to obtain T automatically.
Select an initial estimate for T0.
Segment the image using T0. This will produce two groups of pixels: G1
consisting of all pixels with gray level values greater than T0 and G2
consisting of pixels with values ≤ T0.
Compute average gray level values μ1 and μ2 for pixels in regions G1 and
G2.
Compute a new threshold value:
Repeat steps 2 through 4 until difference in T in successive iterations is
smaller than a predefined parameter T0.
Survey on Effectiveness of using Fingerprint Images in
Forensic research
Fingerprints are graphical flow-like ridges present on human fingers. Fingerprints ridges are formed during 3rd to 4th month of foetal development.
These ridges allow fingers to pick up objects.
Ridge configurations do not change throughout life except due to accidents such as bruises and cuts on the fingertips.
Visible prints: Visible to naked eye, they may be formed when a visible contaminants are present on fingers of the perpetrator • Plastic prints: Fingers or the palm comes in contact with soft surface such as soap, butter, wax, soft putty, tar, grease or freshly painted surface
Skin on our palms and soles exhibits a flow-like pattern of ridges and valleys.
In verification, system compares an input fingerprint to “enrolled” fingerprint of a specific user to determine if they are from the same finger (1:1 match).
In identification, system compares an input fingerprint with prints of all enrolled users in database to determine if person is already known under a duplicate or false identity (1:N match).
Total 280 fingerprint samples with various gender was collected. 140 samples used for training system’s Database; 70 males and 70 females.
Location of square area is chosen because from the previous studies, this region will give a similar and clear ridge flow. The value of ridges density represented in the number of ridges/ 25mm² square areas is calculated by using the formula:
Classification of testing fingerprint as male fingerprint or female fingerprint using KNN classifier which uses Euclidean distance measure for distance calculation.
Calculating features of all training images and storing them in database along with class as male or female fingerprint to use it as a look up table for classifying gender of unknown fingerprint
The testing fingerprint feature vector is compared with all the feature vector in database that is Euclidean distance is calculated between them.
As fingerprints are unique for individuals in universe, it gives a unique identification.
and there is no doubt that ingerprint evidence is most acceptable and reliable evidence. Most of the traditional methods used in identification of gender gave the satisfactory results but an efficient attempt is needed to give effective results with higher accuracy. Clarity of Image, Frequency domain analysis, singular value decomposition techniques etc. will play a very important role to increase the efficiency and still there is a scope to work on this to improve the results
F