SlideShare a Scribd company logo
1 of 52
FINGER PRINTS
RECOGNITION SYSTEM
S.ANITHALAKSHMI
50409621003
AbstrAct
 The minutiae are ridge endings or bifurcations on the
fingerprints. They, including their coordinates and
direction, are most distinctive features to represent the
fingerprint.
 Most fingerprint recognition systems store only the
minutiae template in the database for further usage.
 The conventional methods to utilize minutiae
information are treating it as a point set and finding the
matched points from different minutiae sets.
 This kind of minutiae-based fingerprint recognition
systems consists of two steps, i.e., minutiae
extraction and minutiae matching.
 In the minutiae matching process, the minutiae
feature of a given fingerprint is compared with the
minutiae template, and the matched minutiae will be
found out.
 The template used for fingerprint recognition is
further utilized in the matching stage to enhance the
system’s performance.
 These templates are been stored in the database for further
processing.
 Specific unique id is generated for each template stored.
 The id is stored in the database along with the template locations.
 Next is the verification process where you need to provide the id
for comparison.
 The given id is being compared with the id’s in the database and
matched with the corresponding template of that id.
 A message is being displayed on successful matching along
with the score.
 Otherwise an failure message is displayed indicating match not
found.
 In the identification stage we need not specify an id. Click on
the Identify button which searches for any match and provides
the corresponding result.
 The database records can also be deleted through the
application.
 Auto extract and Auto identify check boxes can be selected if
need which automatically extracts and identifies the matching
image
 It is also possible to load an image and compare it with the
database images.
 The colors of the template extraction can also be changed.
OrGANIZAtIONAL PrOFILE
OrAtOr sOLUtIONs
 The name “Orator”– A Good Speaker, One who speaks
well in public. A good speaker has lot of followers.
Like that, We people are good speaker by our work.
We satisfy our clients by our services. And we are here
to provide Intelligent
SKILLS
 Banking & Real Estate
 Finance & Insurance
o Hospital and health care industry
o Web Applications
o Office Automation
o Manufacturing Retailing
HArDWArE rEQUIrEMENts
 Processor PENTIUM IV
 RAM 128 MB
 Hard Disk 40 GB
sOFtWArE rEQUIrEMENts
 Browser Internet Explorer
 Server side scripting Java
 Database Ms-Access
 Client side scripting HTML
ExIstING systEM
 The conventional methods to utilize minutiae
information are treating it as a point set and finding the
matched points from different minutiae sets.
 In existing system, the Sparse areas are not considered.
So the result may not obtain correctly. And the
matching will be difficult to get an absolute result.
FingerPrint View
Red Spots Minutiae
PrOPOsED systEM
 In Proposed system, we considered the sparse area
and the fingerprint’s orientation field is reconstructed
from minutiae and further utilized in the matching
stage to enhance the system’s performance.
DESIGN OF THE PROJECT
DaTa FlOw DIaGRam
Show the matching Score
Thump Impression
Extract
Particular Identify
Entire Verification
Database
If Matches Show the Particular ID No
Does Not Exist
False
True
If Matches
Does not match
False
True
Enroll
mODulE lIST
 Minutiae Template
 Minutiae Matching
 Effective Region Estimation
 Orientation Field Matching
 Fusing Matching
mINuTIaE TEmPlaTE
 Minutiae templates are a fraction of the size of
fingerprint images, require less storage memory
and can be transmitted electronically faster than
images.
mINuTIaE maTCHING
 In this module we matches the fingerprint minutiae
by using both the local and global structures of
minutiae.
 The local structure of a minutia describes a rotation
and translation invariant feature of the minutia in its
neighborhood.
 It is used to find the correspondence of two minutiae
sets and increase the reliability of the global matching.
 The global structure of minutiae reliably determines
the uniqueness of fingerprint. Therefore, the local and
global structures of minutiae together provide a solid
basis for reliable and robust minutiae matching.
(a) X Person’s Fingerprint (b) X Person’s Fingerprint for
verification
Matching Stage
EFFECTIvE REGION
ESTImaTION
 we can extract the effective region by finding the
smallest envelope that contains all the minutiae
points. For an When only having minutiae feature, we
can extract the effective region by only using
minutiae illustration. Here, we put the original image
together for the convenience to give a visual sense.
Estimation of Effective Region
ORIENTaTION FIElD
maTCHING
 To compare two fingerprints’ orientation field, the
first step is alignment of these two fingerprints. The
alignment is mainly based on minutiae information .
Here we choose the Hough transform based approach
to finish the alignment due to its simplicity.
 Hough Transform (HT) is one of the most common
methods for detecting shapes (lines, circles, etc.) in
binary or edge images. Its advantage is its ability to
detect discontinuous patterns in noisy images, but it
requires a large amount of computing power.
FuSING maTCHING
 A variety of combination rules have been proposed. It
has shown that matching accuracy can be improved
by combining independent matchers using Neyman–
Pearson rule. Here, we will also use Neyman–Pearson
rule for the task.
 Matching of test fingerprint with template is done in
Neyman-Pearson rule. Two sets of minutiae are
compared. If matching score is found, then the
fingerprint is matched with template. Otherwise does
not matched with the template.
INPuT aND OuTPuT SCREENS
Main Page
Authentication
Load BMP Image
Extract Template
Enroll
Reports
Verify
Verify
Identify
ClearDatabase
ClearLog
Benefits of the project
 The project can be used for security purposes.
 E.g. : Attendance ,
voter registration,
Crime Investigation,
forensic fingerprint searching.
CONCLUSION
Orientation field is important for fingerprint
representation. In order to utilize the orientation
information in automatic fingerprint recognition
systems which only stores minutiae feature. So we can
reduce the usage of memory and enhancing the
performance of system.
We also utilize the reconstructed orientation field
information into the matching stage. We can reduce
the effect of wrongly detected minutiae. A fingerprint
matching based on orientation field is used to combine
with conventional minutiae matching for real
applications.
THANK YOU

More Related Content

What's hot

How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology workAlisha Korpal
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readersadil529
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febNavin Kumar
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Speech Recognition by Iqbal
Speech Recognition by IqbalSpeech Recognition by Iqbal
Speech Recognition by IqbalIqbal
 
A seminar report on speech recognition technology
A seminar report on speech recognition technologyA seminar report on speech recognition technology
A seminar report on speech recognition technologySrijanKumar18
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final pptAnkita Vanage
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technologylole2
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 

What's hot (20)

How fingerprint technology work
How fingerprint technology workHow fingerprint technology work
How fingerprint technology work
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Contact Bar Code Readers
Contact Bar Code ReadersContact Bar Code Readers
Contact Bar Code Readers
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 febBiometric authentication ppt by navin 6 feb
Biometric authentication ppt by navin 6 feb
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Nfc ppt
Nfc pptNfc ppt
Nfc ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Speech Recognition by Iqbal
Speech Recognition by IqbalSpeech Recognition by Iqbal
Speech Recognition by Iqbal
 
A seminar report on speech recognition technology
A seminar report on speech recognition technologyA seminar report on speech recognition technology
A seminar report on speech recognition technology
 
Handwritten Character Recognition
Handwritten Character RecognitionHandwritten Character Recognition
Handwritten Character Recognition
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics Technology
Biometrics TechnologyBiometrics Technology
Biometrics Technology
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Sign language recognizer
Sign language recognizerSign language recognizer
Sign language recognizer
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 

Viewers also liked

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Sandeep Kumar Panda
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Lakshmi Sarvani Videla
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint TechnologyJoy Dutta
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentationhimanshubhatti
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMManish Negi
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013JJ Wu
 
Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013JJ Wu
 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTSNexgen Technology
 

Viewers also liked (20)

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013
 
Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013
 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 
Ullas_CV
Ullas_CVUllas_CV
Ullas_CV
 
3 Content/Body
3 Content/Body3 Content/Body
3 Content/Body
 

Similar to Fingerprint Recognition System Using Minutiae & Orientation Field Matching

ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhhppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhhshaikfahim2127
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET Journal
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningIRJET Journal
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Sagar Deogirkar
 
Modex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex
 
Data Science in business World
Data Science in business World Data Science in business World
Data Science in business World DeepikaGauriBaijal
 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET Journal
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image ProcessingIRJET Journal
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET Journal
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsVijay Karan
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsVijay Karan
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...IJCSEIT Journal
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
 

Similar to Fingerprint Recognition System Using Minutiae & Orientation Field Matching (20)

ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhhppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
 
finger prints
finger printsfinger prints
finger prints
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 
Modex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual Overview
 
AI NOTES.docx
AI NOTES.docxAI NOTES.docx
AI NOTES.docx
 
Data Science in business World
Data Science in business World Data Science in business World
Data Science in business World
 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image Processing
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Fingerprint Recognition System Using Minutiae & Orientation Field Matching

  • 2. AbstrAct  The minutiae are ridge endings or bifurcations on the fingerprints. They, including their coordinates and direction, are most distinctive features to represent the fingerprint.  Most fingerprint recognition systems store only the minutiae template in the database for further usage.  The conventional methods to utilize minutiae information are treating it as a point set and finding the matched points from different minutiae sets.
  • 3.  This kind of minutiae-based fingerprint recognition systems consists of two steps, i.e., minutiae extraction and minutiae matching.  In the minutiae matching process, the minutiae feature of a given fingerprint is compared with the minutiae template, and the matched minutiae will be found out.  The template used for fingerprint recognition is further utilized in the matching stage to enhance the system’s performance.
  • 4.  These templates are been stored in the database for further processing.  Specific unique id is generated for each template stored.  The id is stored in the database along with the template locations.  Next is the verification process where you need to provide the id for comparison.  The given id is being compared with the id’s in the database and matched with the corresponding template of that id.
  • 5.  A message is being displayed on successful matching along with the score.  Otherwise an failure message is displayed indicating match not found.  In the identification stage we need not specify an id. Click on the Identify button which searches for any match and provides the corresponding result.
  • 6.  The database records can also be deleted through the application.  Auto extract and Auto identify check boxes can be selected if need which automatically extracts and identifies the matching image  It is also possible to load an image and compare it with the database images.  The colors of the template extraction can also be changed.
  • 7. OrGANIZAtIONAL PrOFILE OrAtOr sOLUtIONs  The name “Orator”– A Good Speaker, One who speaks well in public. A good speaker has lot of followers. Like that, We people are good speaker by our work. We satisfy our clients by our services. And we are here to provide Intelligent SKILLS  Banking & Real Estate  Finance & Insurance
  • 8. o Hospital and health care industry o Web Applications o Office Automation o Manufacturing Retailing
  • 9. HArDWArE rEQUIrEMENts  Processor PENTIUM IV  RAM 128 MB  Hard Disk 40 GB
  • 10. sOFtWArE rEQUIrEMENts  Browser Internet Explorer  Server side scripting Java  Database Ms-Access  Client side scripting HTML
  • 11. ExIstING systEM  The conventional methods to utilize minutiae information are treating it as a point set and finding the matched points from different minutiae sets.  In existing system, the Sparse areas are not considered. So the result may not obtain correctly. And the matching will be difficult to get an absolute result.
  • 13. PrOPOsED systEM  In Proposed system, we considered the sparse area and the fingerprint’s orientation field is reconstructed from minutiae and further utilized in the matching stage to enhance the system’s performance.
  • 14. DESIGN OF THE PROJECT
  • 15. DaTa FlOw DIaGRam Show the matching Score Thump Impression Extract Particular Identify Entire Verification Database If Matches Show the Particular ID No Does Not Exist False True If Matches Does not match False True Enroll
  • 16. mODulE lIST  Minutiae Template  Minutiae Matching  Effective Region Estimation  Orientation Field Matching  Fusing Matching
  • 17. mINuTIaE TEmPlaTE  Minutiae templates are a fraction of the size of fingerprint images, require less storage memory and can be transmitted electronically faster than images.
  • 18. mINuTIaE maTCHING  In this module we matches the fingerprint minutiae by using both the local and global structures of minutiae.  The local structure of a minutia describes a rotation and translation invariant feature of the minutia in its neighborhood.  It is used to find the correspondence of two minutiae sets and increase the reliability of the global matching.  The global structure of minutiae reliably determines the uniqueness of fingerprint. Therefore, the local and global structures of minutiae together provide a solid basis for reliable and robust minutiae matching.
  • 19. (a) X Person’s Fingerprint (b) X Person’s Fingerprint for verification Matching Stage
  • 20. EFFECTIvE REGION ESTImaTION  we can extract the effective region by finding the smallest envelope that contains all the minutiae points. For an When only having minutiae feature, we can extract the effective region by only using minutiae illustration. Here, we put the original image together for the convenience to give a visual sense.
  • 22. ORIENTaTION FIElD maTCHING  To compare two fingerprints’ orientation field, the first step is alignment of these two fingerprints. The alignment is mainly based on minutiae information . Here we choose the Hough transform based approach to finish the alignment due to its simplicity.  Hough Transform (HT) is one of the most common methods for detecting shapes (lines, circles, etc.) in binary or edge images. Its advantage is its ability to detect discontinuous patterns in noisy images, but it requires a large amount of computing power.
  • 23. FuSING maTCHING  A variety of combination rules have been proposed. It has shown that matching accuracy can be improved by combining independent matchers using Neyman– Pearson rule. Here, we will also use Neyman–Pearson rule for the task.  Matching of test fingerprint with template is done in Neyman-Pearson rule. Two sets of minutiae are compared. If matching score is found, then the fingerprint is matched with template. Otherwise does not matched with the template.
  • 24. INPuT aND OuTPuT SCREENS
  • 28.
  • 29.
  • 30.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 42.
  • 44.
  • 46.
  • 50. Benefits of the project  The project can be used for security purposes.  E.g. : Attendance , voter registration, Crime Investigation, forensic fingerprint searching.
  • 51. CONCLUSION Orientation field is important for fingerprint representation. In order to utilize the orientation information in automatic fingerprint recognition systems which only stores minutiae feature. So we can reduce the usage of memory and enhancing the performance of system. We also utilize the reconstructed orientation field information into the matching stage. We can reduce the effect of wrongly detected minutiae. A fingerprint matching based on orientation field is used to combine with conventional minutiae matching for real applications.