SlideShare uma empresa Scribd logo
1 de 36
Juhi Khandelwal (13/PIT/031)
Laxmi Kant(13/PIT/032)
Manish Bana(10/ICS/021)
Sonam Singh Bhati(13/PIT/038)
Sudhakar Mishra(13/PIT/040)
UNDER THE GUIDANCE OF
ER. SANDHYA TARAR
 Fingerprint Identification is the method of identification using the
impressions made by the minute ridge formations or patterns found on he
fingertips.
 No two persons have exactly the same arrangement of ridge patterns
 The patterns of any one individual remain unchanged throughout life.
 A fingerprint in its narrow sense is an impression left by the friction ridges
of a human finger.
 A friction ridge is a raised portion of the epidermis on the digits (fingers and
toes), the palm of the hand or the sole of the foot, consisting of one or more
connected ridge units of friction ridge skin.
INTRODUCTION
 Fingerprint identification is the process of comparing two instances of friction
ridge skin impressions from human fingers or toes to determine whether these
impressions could have come from the same individual
LITERATURE SURVEY
Paper 1: Arun Ross, Jidnya Shah, Anil K. Jain, “From Template to Image:
Reconstructing Fingerprints from Minutiae Points” IEEE TRANSACTION
ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 29, NO. 4,
APRIL 2007
PAPER 2: N.Lalithamani and K.P. Soman, “Irrevocable Cryptographic Key
Generation from Cancelable Fingerprint Templates: An Enhanced and
Effective Scheme”, European Journal of Scientific Research (2009)
SYSTEM REQUIREMENT
SPECIFICATION
HARDWARE REQUIREMENTS
 Operating System: Windows XP or more
 Processor: Pentium 3.0 GHz or higher
 RAM: 2 GB or more
 Hard Drive: 10 GB or more
 Database: Fingerprint database
SOFTWARE SPECIFICATION
MATLAB (R2011a):
 MATLAB (Matrix Laboratory) is a multi-paradigm numerical computing
environment and fourth-generation programming language. Developed by
Math Works.
 MATLAB allows matrix manipulations, plotting of functions and data,
implementation of algorithms, creation of user interfaces, and interfacing with
programs written in other languages, including C, C++, Java, and FORTRAN.
 The Image Processing Toolbox is a collection of functions that extend the
capability of the MATLAB numeric computing environment.
 The graphical tool provides an automatically generated threshold.
MINUTIAE
 Minutiae are major features of a fingerprint, using which comparisons
of one print with another can be made.
 Minutiae includes:
1. Ridge ending
2. Ridge bifurcation
3. Short ridge
4. Island
5. Ridge enclosure
6. Spur
7. Crossover or bridge
8. Delta
9. Core
TYPES OF FINGERPRINTS
DESIGN
EXTRACTION OF MINUTIAE
POINT FROM FINGERPRINTS
1. SEGMENTATION
The input fingerprint image is segmented from the background to actually
extract the region comprising the fingerprint, which ensures removal of
noise.
.
2. ORIENTATION FIELD ESTIMATION
A fingerprint field orientation map may be described as an ensemble
of two dimensional direction fields.
 Two approaches
1. filter band based approach
2. gradient based approaches
3. IMAGE ENHANCEMENT
 The enhancement of fingerprint images involves the following:
Average filtering and Gabor filtering.
 Initially the image is filtered with the help of average filter to
correct the frequency of the image.
 The impact of noise can be decreased through simple averaging.
Subsequently, Gabor filtering is applied to the image for further
enhancement.
4. MINUTIAE POINTS EXTRACTION
 The steps involved in the extraction of minutiae points are as
follows: Binarization, Morphological Operations, Minutiae points
extraction.
 The binary images with only two levels of interest: The black
pixels that denote ridges and the white pixels that denote valleys.
 Then thinning process is performed to reduce the thickness of
the lines so that the lines are only represented except the other
regions of the image.
RECONSTRUCTING
FINGERPRINT FROM
MINUTIAE POINTS
1. ESTIMATING RIDGE ORIENTATION USING
MINUTIAE POINTS
 This algorithm has four main steps
1. Triplet Generation
2. Orientation Prediction
3. Triplet Pruning
4. Orientation Smoothing.
Fig7:(a) Minutiae distribution of a fingerprint.
(b) Examples of a good quality triplet (blue) with
(c) Estimated orientation map.
1. Triplet Generation
Consider a minutiae template, M, of a fingerprint containing N minutiae points given
by, M {m1, m2 ,…mn) where mi = (xi, yi, 𝞱i). A set of 3 minutiae points, {mi}i=1;2;3,
characterized by a triangle with sides {L
i}i=1;2;3 and interior angles {φi}i=1;2;3 is said to
constitute a `valid' triplet, T.
2. Orientation Prediction
Consider a pixel P(x;y) located inside the triangular region defined by the triplet, T. Let
di = dist{mi, P}, i = 1; 2; 3, be the Euclidean distance of this pixel from all the three
vertices such that d1 < d2 < d3. The orientation of the pixel, O(x,y), is then computed
as,
3. Triplet Pruning
In a fingerprint image, minutiae tend to appear in clusters. For instance, the regions
near the core and delta have dense minutiae activity. It is therefore possible for a
triplet to reside inside the triangular region of another triplet or overlap with it.
4. Averaging The Orientation Map
To obtain a smooth transition in orientations, the predicted orientation map
is convolved with a 3 *3 local averaging filter.
.
2. CONSTRUCTING STREAMLINES
 It uses a linear interpolation scheme for constructing streamlines.
 Once a streamline is initiated from a seed point, the next position
is obtained by updating its current position based on the
orientations of the immediate neighbors of the seed point.
 The streamline is terminated if it encounters a boundary point in
the grid,
 If it arrives in the vicinity of a minutia point.
Streamlines generated and original fingerprint
3. GENERATING RIDGE STRUCTURE
 In order to impart texture-like appearances to ridges, we use Linear Integral
Convolution(LIC)
 The application of the streamlines results in the generation of binarized thin
ridge lines for the estimated orientation map.
 The LIC technique involves calculating the intensity of all the pixels
constituting the streamline.
 it locally blurs an uncorrelated input texture image such as white nose,
along the path of the streamlines to impart a dense visualization of the flow
field.
4. ENHANCING THE RIDGE MAP
 To enhance the ridge width
 Use a low pass filter to smooth the texture image
 Then perform histogram equalization of the ridge structure for contrast
enhancement.
Reconstructing fingerprints. (a) Minutiae distribution of a fingerprint image.
(b) Predicted orientation map. (c) Reconstructed fingerprint.
IMPLEMENTATION
IMAGE ENHANCEMENT
 Fingerprint Image enhancement is used to make the image clearer for easy
further operations.
Original Image Enhanced Image
IMAGE THINNING
 Ridge Thinning is to eliminate the redundant pixels of ridges till the
ridges are just one pixel wide.
Thinned Image
MINUTIAE EXTRACTION
 Finally, the minutiae points are extracted from the enhanced fingerprint image.
The steps involved in the extraction of minutiae points are as follows:
1. Binarization.
2. Morphological Operations.
3. Minutiae points Extractions.
Images of Fingerprint in every step of Minutiae extraction
BINARIZATION
 The Binarization step is basically stating the obvious, which is that the true
information that could be extracted from a print is simply binary; ridges vs.
valleys.
Binarization
GUI IMAGE
CONT…..
SCOPE OF PROJECT
 An approach may be used here to enhance the accuracy of generated
friction ridge structure. More sophisticated numerical integration methods
can be used to improve the quality of streamlines.
 The major scope of this project is to answer the question: How much
information does the minutiae template reveal about the original fingerprint
image? The benefits of such a study are twofold: 1) It helps in
understanding the vulnerability of decrypted fingerprint templates to a
masquerade attack and 2) It provides insight into the individuality of
fingerprints as assessed using the minutiae distribution.
This project can also be further extended so that it can help the
organizations to generate the fingerprints from minutiae if the original
database has been manipulated or any other mishap has happened.
CONCLUSION
 In our project first minutiae points are extracted and then minutiae points are
used to generate fingerprints. Thus it is concluded that minutiae points can
reveal substantial information about the parent fingerprint.
There is a scope of further improvement in terms of efficiency and accuracy
which can be achieved by improving the hardware to capture the image or by
improving the image enhancement techniques.
REFERENCES
 C.Hill, “Risk of Masquerade Arising from the Storage of Biometrics”,
Master’s thesis, Australian Nat’l University, 2001.
 A. moenssen, Fingerprint technique. Chilton Book Company, 1971.
 B.Sherlock and D. Monro,” A Model for Interpreting Fingerprint Topology,”
Pattern Recognition. Vol. 26, no 7, pp. 1047-1055, 1993.
 K.Karu and A.Jain “Fingerprint Classification,” Pattern Recognition, vol. 29.
389-404 2000.
 D.Maltoni, D.Maio, A.K Jain, and S.Prabhakar, Handbook of Fingerprint
recognition, first ed. Springer-Verlag, 2003.
 Jain A.K, Ross, A. and Prabhakar, S,”An introduction to biometric
recognition,” IEEE Transactions on Circuit and Systems for Video
Technology vol.14, no. 1 pp.4-20, 2004.
 T.C Clancy, N.Kiyavash and D.J. Lin,”Secure smart card –based fingerprint
authentication,”proceedings of the 2003 ACM SIGMM Workshop on Biometric
Methods and Application,WBMA 2003 .
 John Chirillo and Scott Blaul, “Implementing Biometric Security,” Wiley Red
Books, ISBN 978-0764525025, April 2003.
 In.Wikipedia.org/wiki/minutiae
 F.Galton, Finger Prints. Mc Millan 1996.
 N.Lalithamani and K.P. Soman, “Irrevocable Cryptographic Key Generation
from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme”,
European Journal of Scientific Research (2009).
 Bryan Morse, ”Low-Pass Filtering”
Reconstruction of fingerprints

Mais conteúdo relacionado

Mais procurados

Image segmentation
Image segmentationImage segmentation
Image segmentationDeepak Kumar
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2Aly Abdelkareem
 
Image segmentation
Image segmentationImage segmentation
Image segmentationMukul Jindal
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...IJECEIAES
 
Hand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in HardwareHand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in Hardwareijsrd.com
 
Computer Graphics and Virtual Reality
Computer Graphics and Virtual RealityComputer Graphics and Virtual Reality
Computer Graphics and Virtual Realitychirag patil
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
COM2304: Morphological Image Processing
COM2304: Morphological Image ProcessingCOM2304: Morphological Image Processing
COM2304: Morphological Image ProcessingHemantha Kulathilake
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGKamana Tripathi
 
Concept of stereo vision based virtual touch
Concept of stereo vision based virtual touchConcept of stereo vision based virtual touch
Concept of stereo vision based virtual touchVivek Chamorshikar
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentationwolf
 

Mais procurados (20)

Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
FEATURE EXTRACTION USING SURF ALGORITHM FOR OBJECT RECOGNITION
FEATURE EXTRACTION USING SURF ALGORITHM FOR OBJECT RECOGNITIONFEATURE EXTRACTION USING SURF ALGORITHM FOR OBJECT RECOGNITION
FEATURE EXTRACTION USING SURF ALGORITHM FOR OBJECT RECOGNITION
 
1288
12881288
1288
 
PPT s07-machine vision-s2
PPT s07-machine vision-s2PPT s07-machine vision-s2
PPT s07-machine vision-s2
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
 
Hit and-miss transform
Hit and-miss transformHit and-miss transform
Hit and-miss transform
 
Visual realism
Visual realismVisual realism
Visual realism
 
Hand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in HardwareHand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in Hardware
 
Template matching03
Template matching03Template matching03
Template matching03
 
Computer Graphics and Virtual Reality
Computer Graphics and Virtual RealityComputer Graphics and Virtual Reality
Computer Graphics and Virtual Reality
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Morphological operations
Morphological operationsMorphological operations
Morphological operations
 
COM2304: Morphological Image Processing
COM2304: Morphological Image ProcessingCOM2304: Morphological Image Processing
COM2304: Morphological Image Processing
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
Concept of stereo vision based virtual touch
Concept of stereo vision based virtual touchConcept of stereo vision based virtual touch
Concept of stereo vision based virtual touch
 
Michal Erel's SIFT presentation
Michal Erel's SIFT presentationMichal Erel's SIFT presentation
Michal Erel's SIFT presentation
 

Destaque (19)

Kitchen Appliances India
Kitchen Appliances IndiaKitchen Appliances India
Kitchen Appliances India
 
Analýza ŠK Hádzaná Detva
Analýza ŠK Hádzaná DetvaAnalýza ŠK Hádzaná Detva
Analýza ŠK Hádzaná Detva
 
Best mobile phone
Best mobile phoneBest mobile phone
Best mobile phone
 
Caution this information can blow your head
Caution this information can blow your headCaution this information can blow your head
Caution this information can blow your head
 
Geospatial Analytics
Geospatial AnalyticsGeospatial Analytics
Geospatial Analytics
 
štrukturované produkty
štrukturované produktyštrukturované produkty
štrukturované produkty
 
šK hádzaná detva prezentácia
šK hádzaná detva prezentáciašK hádzaná detva prezentácia
šK hádzaná detva prezentácia
 
Rust Intro
Rust IntroRust Intro
Rust Intro
 
Food Processor
Food ProcessorFood Processor
Food Processor
 
Learning culture
Learning cultureLearning culture
Learning culture
 
Sejam bem vindos
Sejam bem vindosSejam bem vindos
Sejam bem vindos
 
Massage Chairs
Massage ChairsMassage Chairs
Massage Chairs
 
01 triangle new
01 triangle new01 triangle new
01 triangle new
 
Communication devices
Communication devicesCommunication devices
Communication devices
 
Massage chair
Massage chairMassage chair
Massage chair
 
Panasonic air conditioners
Panasonic air conditionersPanasonic air conditioners
Panasonic air conditioners
 
Seri dreamweaver -_membuat_menu_bertingkat_tree_menu
Seri dreamweaver -_membuat_menu_bertingkat_tree_menuSeri dreamweaver -_membuat_menu_bertingkat_tree_menu
Seri dreamweaver -_membuat_menu_bertingkat_tree_menu
 
Ingreso a exel
Ingreso a exelIngreso a exel
Ingreso a exel
 
Home Theater System
Home Theater SystemHome Theater System
Home Theater System
 

Semelhante a Reconstruction of fingerprints

"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”Er. Arpit Sharma
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint ijasuc
 
Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino unoVibhuThakur3
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING cscpconf
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithmijsrd.com
 
Improvement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition ProcessImprovement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition Processijbbjournal
 
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSIMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSADEIJ Journal
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 

Semelhante a Reconstruction of fingerprints (20)

"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
 
Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint Generate a key for MAC Algorithm using Biometric Fingerprint
Generate a key for MAC Algorithm using Biometric Fingerprint
 
Finger print recognition technique using arduino uno
Finger print recognition technique using arduino unoFinger print recognition technique using arduino uno
Finger print recognition technique using arduino uno
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
EXPERIMENTAL STUDY OF MINUTIAE BASED ALGORITHM FOR FINGERPRINT MATCHING
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matching
 
El4301832837
El4301832837El4301832837
El4301832837
 
1834 1840
1834 18401834 1840
1834 1840
 
1834 1840
1834 18401834 1840
1834 1840
 
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW AlgorithmFingerprint Minutiae Extraction and Compression using LZW Algorithm
Fingerprint Minutiae Extraction and Compression using LZW Algorithm
 
Improvement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition ProcessImprovement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition Process
 
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSIMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Og3424882497
Og3424882497Og3424882497
Og3424882497
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Reconstruction of fingerprints

  • 1. Juhi Khandelwal (13/PIT/031) Laxmi Kant(13/PIT/032) Manish Bana(10/ICS/021) Sonam Singh Bhati(13/PIT/038) Sudhakar Mishra(13/PIT/040) UNDER THE GUIDANCE OF ER. SANDHYA TARAR
  • 2.  Fingerprint Identification is the method of identification using the impressions made by the minute ridge formations or patterns found on he fingertips.  No two persons have exactly the same arrangement of ridge patterns  The patterns of any one individual remain unchanged throughout life.  A fingerprint in its narrow sense is an impression left by the friction ridges of a human finger.  A friction ridge is a raised portion of the epidermis on the digits (fingers and toes), the palm of the hand or the sole of the foot, consisting of one or more connected ridge units of friction ridge skin. INTRODUCTION
  • 3.  Fingerprint identification is the process of comparing two instances of friction ridge skin impressions from human fingers or toes to determine whether these impressions could have come from the same individual
  • 4. LITERATURE SURVEY Paper 1: Arun Ross, Jidnya Shah, Anil K. Jain, “From Template to Image: Reconstructing Fingerprints from Minutiae Points” IEEE TRANSACTION ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 29, NO. 4, APRIL 2007 PAPER 2: N.Lalithamani and K.P. Soman, “Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme”, European Journal of Scientific Research (2009)
  • 5. SYSTEM REQUIREMENT SPECIFICATION HARDWARE REQUIREMENTS  Operating System: Windows XP or more  Processor: Pentium 3.0 GHz or higher  RAM: 2 GB or more  Hard Drive: 10 GB or more  Database: Fingerprint database
  • 6. SOFTWARE SPECIFICATION MATLAB (R2011a):  MATLAB (Matrix Laboratory) is a multi-paradigm numerical computing environment and fourth-generation programming language. Developed by Math Works.  MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs written in other languages, including C, C++, Java, and FORTRAN.  The Image Processing Toolbox is a collection of functions that extend the capability of the MATLAB numeric computing environment.  The graphical tool provides an automatically generated threshold.
  • 7.
  • 8. MINUTIAE  Minutiae are major features of a fingerprint, using which comparisons of one print with another can be made.  Minutiae includes: 1. Ridge ending 2. Ridge bifurcation 3. Short ridge 4. Island 5. Ridge enclosure 6. Spur 7. Crossover or bridge 8. Delta 9. Core
  • 11. 1. SEGMENTATION The input fingerprint image is segmented from the background to actually extract the region comprising the fingerprint, which ensures removal of noise. .
  • 12. 2. ORIENTATION FIELD ESTIMATION A fingerprint field orientation map may be described as an ensemble of two dimensional direction fields.  Two approaches 1. filter band based approach 2. gradient based approaches 3. IMAGE ENHANCEMENT  The enhancement of fingerprint images involves the following: Average filtering and Gabor filtering.  Initially the image is filtered with the help of average filter to correct the frequency of the image.  The impact of noise can be decreased through simple averaging. Subsequently, Gabor filtering is applied to the image for further enhancement.
  • 13.
  • 14. 4. MINUTIAE POINTS EXTRACTION  The steps involved in the extraction of minutiae points are as follows: Binarization, Morphological Operations, Minutiae points extraction.  The binary images with only two levels of interest: The black pixels that denote ridges and the white pixels that denote valleys.  Then thinning process is performed to reduce the thickness of the lines so that the lines are only represented except the other regions of the image.
  • 16. 1. ESTIMATING RIDGE ORIENTATION USING MINUTIAE POINTS  This algorithm has four main steps 1. Triplet Generation 2. Orientation Prediction 3. Triplet Pruning 4. Orientation Smoothing.
  • 17. Fig7:(a) Minutiae distribution of a fingerprint. (b) Examples of a good quality triplet (blue) with (c) Estimated orientation map.
  • 18. 1. Triplet Generation Consider a minutiae template, M, of a fingerprint containing N minutiae points given by, M {m1, m2 ,…mn) where mi = (xi, yi, 𝞱i). A set of 3 minutiae points, {mi}i=1;2;3, characterized by a triangle with sides {L i}i=1;2;3 and interior angles {φi}i=1;2;3 is said to constitute a `valid' triplet, T. 2. Orientation Prediction Consider a pixel P(x;y) located inside the triangular region defined by the triplet, T. Let di = dist{mi, P}, i = 1; 2; 3, be the Euclidean distance of this pixel from all the three vertices such that d1 < d2 < d3. The orientation of the pixel, O(x,y), is then computed as,
  • 19. 3. Triplet Pruning In a fingerprint image, minutiae tend to appear in clusters. For instance, the regions near the core and delta have dense minutiae activity. It is therefore possible for a triplet to reside inside the triangular region of another triplet or overlap with it. 4. Averaging The Orientation Map To obtain a smooth transition in orientations, the predicted orientation map is convolved with a 3 *3 local averaging filter.
  • 20. .
  • 21. 2. CONSTRUCTING STREAMLINES  It uses a linear interpolation scheme for constructing streamlines.  Once a streamline is initiated from a seed point, the next position is obtained by updating its current position based on the orientations of the immediate neighbors of the seed point.  The streamline is terminated if it encounters a boundary point in the grid,  If it arrives in the vicinity of a minutia point. Streamlines generated and original fingerprint
  • 22. 3. GENERATING RIDGE STRUCTURE  In order to impart texture-like appearances to ridges, we use Linear Integral Convolution(LIC)  The application of the streamlines results in the generation of binarized thin ridge lines for the estimated orientation map.  The LIC technique involves calculating the intensity of all the pixels constituting the streamline.  it locally blurs an uncorrelated input texture image such as white nose, along the path of the streamlines to impart a dense visualization of the flow field.
  • 23. 4. ENHANCING THE RIDGE MAP  To enhance the ridge width  Use a low pass filter to smooth the texture image  Then perform histogram equalization of the ridge structure for contrast enhancement. Reconstructing fingerprints. (a) Minutiae distribution of a fingerprint image. (b) Predicted orientation map. (c) Reconstructed fingerprint.
  • 24. IMPLEMENTATION IMAGE ENHANCEMENT  Fingerprint Image enhancement is used to make the image clearer for easy further operations. Original Image Enhanced Image
  • 25. IMAGE THINNING  Ridge Thinning is to eliminate the redundant pixels of ridges till the ridges are just one pixel wide. Thinned Image
  • 26. MINUTIAE EXTRACTION  Finally, the minutiae points are extracted from the enhanced fingerprint image. The steps involved in the extraction of minutiae points are as follows: 1. Binarization. 2. Morphological Operations. 3. Minutiae points Extractions.
  • 27. Images of Fingerprint in every step of Minutiae extraction
  • 28. BINARIZATION  The Binarization step is basically stating the obvious, which is that the true information that could be extracted from a print is simply binary; ridges vs. valleys. Binarization
  • 29.
  • 32. SCOPE OF PROJECT  An approach may be used here to enhance the accuracy of generated friction ridge structure. More sophisticated numerical integration methods can be used to improve the quality of streamlines.  The major scope of this project is to answer the question: How much information does the minutiae template reveal about the original fingerprint image? The benefits of such a study are twofold: 1) It helps in understanding the vulnerability of decrypted fingerprint templates to a masquerade attack and 2) It provides insight into the individuality of fingerprints as assessed using the minutiae distribution. This project can also be further extended so that it can help the organizations to generate the fingerprints from minutiae if the original database has been manipulated or any other mishap has happened.
  • 33. CONCLUSION  In our project first minutiae points are extracted and then minutiae points are used to generate fingerprints. Thus it is concluded that minutiae points can reveal substantial information about the parent fingerprint. There is a scope of further improvement in terms of efficiency and accuracy which can be achieved by improving the hardware to capture the image or by improving the image enhancement techniques.
  • 34. REFERENCES  C.Hill, “Risk of Masquerade Arising from the Storage of Biometrics”, Master’s thesis, Australian Nat’l University, 2001.  A. moenssen, Fingerprint technique. Chilton Book Company, 1971.  B.Sherlock and D. Monro,” A Model for Interpreting Fingerprint Topology,” Pattern Recognition. Vol. 26, no 7, pp. 1047-1055, 1993.  K.Karu and A.Jain “Fingerprint Classification,” Pattern Recognition, vol. 29. 389-404 2000.  D.Maltoni, D.Maio, A.K Jain, and S.Prabhakar, Handbook of Fingerprint recognition, first ed. Springer-Verlag, 2003.  Jain A.K, Ross, A. and Prabhakar, S,”An introduction to biometric recognition,” IEEE Transactions on Circuit and Systems for Video Technology vol.14, no. 1 pp.4-20, 2004.
  • 35.  T.C Clancy, N.Kiyavash and D.J. Lin,”Secure smart card –based fingerprint authentication,”proceedings of the 2003 ACM SIGMM Workshop on Biometric Methods and Application,WBMA 2003 .  John Chirillo and Scott Blaul, “Implementing Biometric Security,” Wiley Red Books, ISBN 978-0764525025, April 2003.  In.Wikipedia.org/wiki/minutiae  F.Galton, Finger Prints. Mc Millan 1996.  N.Lalithamani and K.P. Soman, “Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme”, European Journal of Scientific Research (2009).  Bryan Morse, ”Low-Pass Filtering”