SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print),
ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014)
85
REVIEW OF THREE CATEGORIES OF FINGERPRINT RECOGNITION
Prof Vikram M. Agrawal1
, Prof. Vatsal H. Shah2
, Avni P. Patel3
1
IT dept, B.V.M. Engineering College, GTU, V.V. Nagar
2
IT dept, B.V.M. Engineering College, GTU, V.V. Nagar
3
B.V.M. Engineering College, GTU, V.V. Nagar
ABSTRACT
Fingerprint recognition is the broadly used in biometric authentication and security as it is
unchangeable throughout our lifetime. They are formed by minutiae (these are major features of a
fingerprint, using which comparison of one print with another can be made.) ridges and furrows on
the fingers. This paper presents the review of different methods of fingerprint recognition. The
minutiae based matching is used in most automated systems but it is time consuming. Pattern based
matching make use of a virtual core point and pattern based point. The correlation is parts of one
image with parts of the next (in order to find image flow) has been used more often as part of flow
estimating algorithms than as a single method in its own right. The method does not perform the data
reduction of the feature-based techniques, and is computationally expensive.
Keywords: biometric, core-point, minutiae.
I. INTRODUCTION
Fingerprints are the oldest and most widely recognized biometric trait. All human being
posses fingerprint and these fingerprints are result of unique ridge and valley structure formed by
skin over the fingers [1]. Ridges and valleys are often run in analogous. These structures have
bifurcation and ridge endings called as termination. The ridge structure as a whole takes different
shapes, characterized by high twist, terminations, bifurcations, crossover etc. These regions are
called singularities. According to the methodology of Henry Classification System [2], [3], there
exist three main fingerprint textures: loop, whorl and arch. Generally, Automatic Fingerprint
Identification Systems (AFIS) performs three basic steps to recognize fingerprint: pre-processing,
region of interest (ROI) extraction and finally classification.
IJMRD
© PRJ
PUBLICATION
International Journal of Management Research and
Development (IJMRD)
ISSN 2248 – 938X (Print), ISSN 2248 – 9398(Online),
Volume 4, Number 1, January - March (2014), pp. 85-89
© PRJ Publication,
http://www.prjpublication.com/IJMRD.asp
International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print),
ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014)
86
II. Types of fingerprint:
FIGURE: 1 FIGURE: 2
FIGURE: 3 FIGURE: 4
FIGURE: 5 FIGURE: 6
FIGURE: 7
International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print),
ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014)
87
III. LITERATURE REVIEW
There are three categories of fingerprint matching techniques:
a. Correlation-based technique.
b. Minutiae-based technique.
c. Pattern based technique.
a) Correlation-based technique: Two fingerprint images are super overlapped and the correlation
between corresponding pixels is computed for different alignments (e.g. various displacements and
rotations).
b) Minutiae-based technique: This is the most popular and widely used technique. Here the two
basic steps are 1. Minutiae Extraction. 2. Minutiae matching. Minutiae’s are removed from the two
fingerprints and stored as sets of points in the two- dimensional plane. Minutiae-based matching
essentially consists of finding the alignment between the template and the input minutiae sets the
result in the maximum number of minutiae pairings.
c) Pattern-based technique: Pattern based algorithms compare the basic fingerprint patterns (arch,
whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that
the images be aligned in the same orientation. To do this, the algorithm finds a central point in the
fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type,
size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint
image is graphically compared with the template to determine the degree to which they match.
Most of the automatic fingerprint recognition systems today depend on minutiae-based
matching because minutiae are easy to store and take much lesser space than correlation based
technique but are more time consuming. Sangram Bana nad Dr. Davinder Kaur [4] proposed
minutiae extraction and minutiae matching using segmentation and thinning for fingerprint
recognition. Sarnali Basak, Md. Imdadul Islam, M. R. Amin [5] proposed a new method of virtual
core point detection based on the change in gradient of maxima and minima points and the region of
interest is obtained for further processing. Ashish Mishra and Dr. Madhu Shandilya[6] introduced
gradient based technique and optimized neighborhood averaging to generate a smoother orientation
field for detecting core point. Dr. H.B.Kekre, Dr.Tanuja Sarode and Rekha Vig[7] proposed image
based method for extraction of feature vectors using sectorization of cepstrum. K.B.Raja, Shashi
Kumar D R, R K chhotaray, Sabyasachi Pattanaik[8] proposed a DWT based recognition using Non-
Minutiae (DWTFR) algorithm. Vipul Awasthi, Vanchha Awasthi and Krishna Kumar Tiwari[9]
proposed a technique of minutiae extraction with a combination of several pre-processing and post-
processing and also termination and bifurcation are used.
The correlation-based fingerprint verification that is proposed in this section, it is compared
to the traditional minutiae-based methods:
The advantages of the correlation based method over minutiae are:
The method uses the much richer gray-level information of the fingerprint image instead of
only positions of minutiae.
The method is also accomplished of dealing with fingerprints of bad image quality from
which no minutiae can be extracted reliably.
False and missed minutiae do not decrease the matching performance.
Unlike the minutiae templates, the template locations are already paired, which results in
much simpler matching methods. When registering minutiae sets, it is not known in advance
which minutiae from both sets should correspond.
The first decision stage only classifies relative template positions. This method tolerates non-
uniform local shape distortions in the fingerprint, unlike the minutiae templates for which the
optimal global transform is searched.
International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print),
ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014)
88
The disadvantages of the correlation-based fingerprint verification method are:
Template matching requires high computational power, which makes the method less applicable
for real time applications.
The method is at the instant not capable of dealing with rotations of more than about 10
degrees. This is caused by the actuality that for larger rotations, the templates don't match
well anymore, causing incorrect positions to be found. A solution to this problem is rotating the
templates and then performing the matching again. However, this is a solution that requires a
lot of additional computational power.
Problems might come if the minutiae-based or coherence-based template selection methods are
used while 2 minutiae surroundings look like a lot. In this case, there is a probability that
template matching will and the incorrect template position, which degrades the matching
performance. Use of the correlation characteristic template selection will solve this problem.
IV. CHALLENGES WITH FINGERPRINT IDENTIFICATION
Some of the common challenges related to fingerprint technology are low quality or
corrupted input images, noise reduction, etc. The low quality or degraded images is the most
common problem. The degradation can be due to burns, cuts, dust particles, etc. The fingerprint
enhancement techniques not only enhance the low quality image but also remove the noise.
O’Gonnan and Nickerson [10] proposed the method contextual filtering for fingerprint
enhancement. Shlomo Greenberg [11] applied anisotrophic filter for fingerprint enhancement. Hong
et al. [12], reported fingerprint enhancement based on the estimated local ridge orientation and
frequency clarification of ridge and valley structures of input. Lin Hong [13] employed Gabor filter
in enhancing the image because gabor filters have both frequency selective and orientation selective
properties. D.Maio [14] used a Gaussian shape mask filter to filter selected section in every step.
Wang [15] proposed a method of Log-Gabor filter. Cavuso Glu [16] proposed a fast filtering method
based on reference mask of parabolic coefficients.
V. CONCLUSION
Fingerprint identification is one of the common and oldest forms of biometrics but the actual
truth is that still a lot of research is to be done due to its complexity and Intractability. The future
research work in this field is:
a. Secure biometric systems: The fingerprint has proved to be secure due to its unique and
unchanging behavior but there are various threats like attacks on communication, attack on
database like able to obtain a fingerprint from database or injecting a new fingerprint in
database, presenting fake fingerprint.
b. Better feature extraction: We need to improve the various extraction algorithms for feature
extraction and give accurate result and more features to be extracted in less time.
c. Better matching and alignment: The matching and alignment needs to be faster and accuracy
should be improved.
REFERENCES:
[1] Woodward, J. ,Orlans, P. , Higgins T.(2003), Biometrics, McGraw-Hill/Osborne.
[2] D. Batra, G. Singhal and S. Chaudhury, ‘Gabor filter based fingerprint classification using
support vector machines’, IEEE India Annual Conference, pp. 256-261, Dec. 2004.
[3] E. R.Henry, ‘Classification and uses of finger prints, London: George Rutledge & Sons, Ltd.,
pp. 17-18’, 1900.
International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print),
ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014)
89
[4] Sangram Bana, Dr. Davinder Kaur , ‘Fingerprint Recognition using image segmentation’ , feb-
2011
[5] Basak, Md. Imdadul Islam, M. R. Amin, ‘Detection of a virtual core point a fingerprint: A new
approach’, May-2012
[6] Ashish Mishra, Dr. Madhu Shandilya, ‘Fingerprint core point detection using gardient field
mask’, June-2010.
[7] Dr. H.B.kehre, Dr. Tanuja Sarade, Rekha Vig, ‘Fingerprint identification using sectorized
cepstrum’, oct-2010.
[8] Shashi Kumar D R, K B Raja, R K Chhotaray, Sabyasachi Pattanaik, ‘DWT based fingerprint
recognition using Non Minutiae features’, March-2011
[9] Vipul Awasthi, Vanchha Awasthi, Krishna Kumar Tiwari, ‘Fingerprint analysis using
termination and bifurcation minutiae’, Feb-2012.
[10] L. O’Gonnan, J.V. Nickerson, ‘Matched filter design for fingerprint image enhancement, in
International Conference on Acoustics, Speech, and Signal Processing’, 1988, pp. 916–919
[11] Shlomo Greenberg, Mayer Aladjem, Daniel Kogan , Itshak Dimitrov, ‘Fingerprint Image
Enhancement Using Filtering Techniques, 15th Int. Conf. on Pattern Recognition, Barcelona,
September 3-8, IEEE Computer Society Press’
[12] L. Hong, Y. Wan, A. Jain, ‘Fingerprint image enhancement: Algorithm and performance
evaluation,IEEE Trans. Pattern Anal. Mach. Intell. (1998) 777–789.’
[13] Lin Hong, Yifei Wan, Anil Jain, ‘Fingerprint Image Enhancement: Algorithm and Performance
Evaluation’, IEEE Trans. Pattern Anal. Mach. Intell. Vol. 20, No.8 pp.777-789, Aug. 1998.
[14] D. Maio, D. Maltoni, ‘Direct Gray-scale Minutiae Detection in Fingerprints,’ IEEE Trans.
Pattern Anal. Mach. Intell.19, pp.27-39, 1997.
[15] W. Wang, J. Li, F. Huang, H. Feng, ‘Design and implementation of log-Gabor filter in
fingerprint image enhancement, Pattern Recognition Lett. 29 (2008) 301–308.’
[16] A. Çavuso lu, S. Görgüno lu, ‘A fast fingerprint image enhancement algorithm using a
parabolic mask, Comput. Electr. Eng. (2008) 250–256.’
[17] Dr. Mustafa Dhiaa Al-Hassani, Dr. Abdulkareem A. Kadhim and Dr. Venus W. Samawi,
“Fingerprint Identification Technique Based on Wavelet-Bands Selection Features (WBSF)”
International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3,
2013, pp. 308 - 323, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[18] Soukaena H. Hashem, Abeer T. Maolod And Anmar A. Mohammad, “Proposal To Enhance
Fingerprint Recognition System” International journal of Computer Engineering & Technology
(IJCET), Volume 4, Issue 3, 2013, pp. 10 - 22, ISSN Print: 0976 – 6367, ISSN Online: 0976 –
6375.
[19] Shekhar R Suralkar and Prof (Dr) Pradeep M. Patil, “Fingerprint Verification Using Steerable
Filters” International journal of Electronics and Communication Engineering &Technology
(IJECET), Volume 4, Issue 2, 2013, pp. 264 - 268, ISSN Print: 0976- 6464, ISSN Online: 0976
–6472.

More Related Content

What's hot

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification systemeSAT Journals
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsCloudTechnologies
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesIDES Editor
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsredpel dot com
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour FeaturesIRJET Journal
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET Journal
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...iosrjce
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
 
Appearance based static hand gesture alphabet recognition
Appearance based static hand gesture alphabet recognitionAppearance based static hand gesture alphabet recognition
Appearance based static hand gesture alphabet recognitionIAEME Publication
 

What's hot (18)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
N010226872
N010226872N010226872
N010226872
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
50120130405034
5012013040503450120130405034
50120130405034
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
IRJET- Face Spoof Detection using Machine Learning with Colour Features
IRJET-  	  Face Spoof Detection using Machine Learning with Colour FeaturesIRJET-  	  Face Spoof Detection using Machine Learning with Colour Features
IRJET- Face Spoof Detection using Machine Learning with Colour Features
 
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity MethodIRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
IRJET - Human Eye Pupil Detection Technique using Center of Gravity Method
 
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
Handwritten Character Recognition: A Comprehensive Review on Geometrical Anal...
 
A Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature ExtractionA Hybrid Approach to Face Detection And Feature Extraction
A Hybrid Approach to Face Detection And Feature Extraction
 
Offline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural NetworkOffline Signature Verification and Recognition using Neural Network
Offline Signature Verification and Recognition using Neural Network
 
Appearance based static hand gesture alphabet recognition
Appearance based static hand gesture alphabet recognitionAppearance based static hand gesture alphabet recognition
Appearance based static hand gesture alphabet recognition
 

Viewers also liked

Effect of controlled temperature (27°c 42°c)
Effect of controlled temperature (27°c  42°c)Effect of controlled temperature (27°c  42°c)
Effect of controlled temperature (27°c 42°c)prjpublications
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 nprjpublications
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...prjpublications
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
03 agricultural information to the farmers in tamil nadu 2
03 agricultural information to the farmers in tamil nadu 203 agricultural information to the farmers in tamil nadu 2
03 agricultural information to the farmers in tamil nadu 2prjpublications
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...prjpublications
 
An empirical study on skewness of test scores of a management subject in an a...
An empirical study on skewness of test scores of a management subject in an a...An empirical study on skewness of test scores of a management subject in an a...
An empirical study on skewness of test scores of a management subject in an a...prjpublications
 
Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementprjpublications
 

Viewers also liked (9)

Effect of controlled temperature (27°c 42°c)
Effect of controlled temperature (27°c  42°c)Effect of controlled temperature (27°c  42°c)
Effect of controlled temperature (27°c 42°c)
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 n
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
03 agricultural information to the farmers in tamil nadu 2
03 agricultural information to the farmers in tamil nadu 203 agricultural information to the farmers in tamil nadu 2
03 agricultural information to the farmers in tamil nadu 2
 
Aircraft
AircraftAircraft
Aircraft
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
 
An empirical study on skewness of test scores of a management subject in an a...
An empirical study on skewness of test scores of a management subject in an a...An empirical study on skewness of test scores of a management subject in an a...
An empirical study on skewness of test scores of a management subject in an a...
 
Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurement
 

Similar to Review of three categories of fingerprint recognition

COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm IJECEIAES
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...IJERA Editor
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmIJARIIT
 
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSIRJET Journal
 
A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...IRJET Journal
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.IRJET Journal
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...INFOGAIN PUBLICATION
 
A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...Editor IJCATR
 
Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)IRJET Journal
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsPvrtechnologies Nellore
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologiesiosrjce
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysisvivatechijri
 

Similar to Review of three categories of fingerprint recognition (20)

COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
 
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
Analysis of Image Fusion Techniques for fingerprint Palmprint Multimodal Biom...
 
Biometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithmBiometric identification with improved efficiency using sift algorithm
Biometric identification with improved efficiency using sift algorithm
 
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
 
A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...A Review Paper on Personal Identification with An Efficient Method Of Combina...
A Review Paper on Personal Identification with An Efficient Method Of Combina...
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.
 
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
Ijaems apr-2016-1 Multibiometric Authentication System Processed by the Use o...
 
A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...A Review on Feature Extraction Techniques and General Approach for Face Recog...
A Review on Feature Extraction Techniques and General Approach for Face Recog...
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)Face Recognition Smart Attendance System: (InClass System)
Face Recognition Smart Attendance System: (InClass System)
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
An Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint TechnologiesAn Enhanced Authentication System Using Face and Fingerprint Technologies
An Enhanced Authentication System Using Face and Fingerprint Technologies
 
M017637484
M017637484M017637484
M017637484
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
finger prints
finger printsfinger prints
finger prints
 

More from prjpublications

An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...prjpublications
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...prjpublications
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsprjpublications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...prjpublications
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageprjpublications
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality modelprjpublications
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...prjpublications
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...prjpublications
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood managementprjpublications
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumersprjpublications
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...prjpublications
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...prjpublications
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...prjpublications
 
Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...prjpublications
 
Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...prjpublications
 
Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...prjpublications
 
Impact of mergers and acquisitions
Impact of mergers and acquisitionsImpact of mergers and acquisitions
Impact of mergers and acquisitionsprjpublications
 
Role of fdi in india an emerging option for sustainable economic growth
Role of fdi in india an emerging option for sustainable economic growthRole of fdi in india an emerging option for sustainable economic growth
Role of fdi in india an emerging option for sustainable economic growthprjpublications
 

More from prjpublications (20)

An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality model
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood management
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...
 
Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...
 
Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...
 
Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...
 
Impact of mergers and acquisitions
Impact of mergers and acquisitionsImpact of mergers and acquisitions
Impact of mergers and acquisitions
 
Role of fdi in india an emerging option for sustainable economic growth
Role of fdi in india an emerging option for sustainable economic growthRole of fdi in india an emerging option for sustainable economic growth
Role of fdi in india an emerging option for sustainable economic growth
 

Recently uploaded

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Review of three categories of fingerprint recognition

  • 1. International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print), ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014) 85 REVIEW OF THREE CATEGORIES OF FINGERPRINT RECOGNITION Prof Vikram M. Agrawal1 , Prof. Vatsal H. Shah2 , Avni P. Patel3 1 IT dept, B.V.M. Engineering College, GTU, V.V. Nagar 2 IT dept, B.V.M. Engineering College, GTU, V.V. Nagar 3 B.V.M. Engineering College, GTU, V.V. Nagar ABSTRACT Fingerprint recognition is the broadly used in biometric authentication and security as it is unchangeable throughout our lifetime. They are formed by minutiae (these are major features of a fingerprint, using which comparison of one print with another can be made.) ridges and furrows on the fingers. This paper presents the review of different methods of fingerprint recognition. The minutiae based matching is used in most automated systems but it is time consuming. Pattern based matching make use of a virtual core point and pattern based point. The correlation is parts of one image with parts of the next (in order to find image flow) has been used more often as part of flow estimating algorithms than as a single method in its own right. The method does not perform the data reduction of the feature-based techniques, and is computationally expensive. Keywords: biometric, core-point, minutiae. I. INTRODUCTION Fingerprints are the oldest and most widely recognized biometric trait. All human being posses fingerprint and these fingerprints are result of unique ridge and valley structure formed by skin over the fingers [1]. Ridges and valleys are often run in analogous. These structures have bifurcation and ridge endings called as termination. The ridge structure as a whole takes different shapes, characterized by high twist, terminations, bifurcations, crossover etc. These regions are called singularities. According to the methodology of Henry Classification System [2], [3], there exist three main fingerprint textures: loop, whorl and arch. Generally, Automatic Fingerprint Identification Systems (AFIS) performs three basic steps to recognize fingerprint: pre-processing, region of interest (ROI) extraction and finally classification. IJMRD © PRJ PUBLICATION International Journal of Management Research and Development (IJMRD) ISSN 2248 – 938X (Print), ISSN 2248 – 9398(Online), Volume 4, Number 1, January - March (2014), pp. 85-89 © PRJ Publication, http://www.prjpublication.com/IJMRD.asp
  • 2. International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print), ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014) 86 II. Types of fingerprint: FIGURE: 1 FIGURE: 2 FIGURE: 3 FIGURE: 4 FIGURE: 5 FIGURE: 6 FIGURE: 7
  • 3. International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print), ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014) 87 III. LITERATURE REVIEW There are three categories of fingerprint matching techniques: a. Correlation-based technique. b. Minutiae-based technique. c. Pattern based technique. a) Correlation-based technique: Two fingerprint images are super overlapped and the correlation between corresponding pixels is computed for different alignments (e.g. various displacements and rotations). b) Minutiae-based technique: This is the most popular and widely used technique. Here the two basic steps are 1. Minutiae Extraction. 2. Minutiae matching. Minutiae’s are removed from the two fingerprints and stored as sets of points in the two- dimensional plane. Minutiae-based matching essentially consists of finding the alignment between the template and the input minutiae sets the result in the maximum number of minutiae pairings. c) Pattern-based technique: Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a pattern-based algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match. Most of the automatic fingerprint recognition systems today depend on minutiae-based matching because minutiae are easy to store and take much lesser space than correlation based technique but are more time consuming. Sangram Bana nad Dr. Davinder Kaur [4] proposed minutiae extraction and minutiae matching using segmentation and thinning for fingerprint recognition. Sarnali Basak, Md. Imdadul Islam, M. R. Amin [5] proposed a new method of virtual core point detection based on the change in gradient of maxima and minima points and the region of interest is obtained for further processing. Ashish Mishra and Dr. Madhu Shandilya[6] introduced gradient based technique and optimized neighborhood averaging to generate a smoother orientation field for detecting core point. Dr. H.B.Kekre, Dr.Tanuja Sarode and Rekha Vig[7] proposed image based method for extraction of feature vectors using sectorization of cepstrum. K.B.Raja, Shashi Kumar D R, R K chhotaray, Sabyasachi Pattanaik[8] proposed a DWT based recognition using Non- Minutiae (DWTFR) algorithm. Vipul Awasthi, Vanchha Awasthi and Krishna Kumar Tiwari[9] proposed a technique of minutiae extraction with a combination of several pre-processing and post- processing and also termination and bifurcation are used. The correlation-based fingerprint verification that is proposed in this section, it is compared to the traditional minutiae-based methods: The advantages of the correlation based method over minutiae are: The method uses the much richer gray-level information of the fingerprint image instead of only positions of minutiae. The method is also accomplished of dealing with fingerprints of bad image quality from which no minutiae can be extracted reliably. False and missed minutiae do not decrease the matching performance. Unlike the minutiae templates, the template locations are already paired, which results in much simpler matching methods. When registering minutiae sets, it is not known in advance which minutiae from both sets should correspond. The first decision stage only classifies relative template positions. This method tolerates non- uniform local shape distortions in the fingerprint, unlike the minutiae templates for which the optimal global transform is searched.
  • 4. International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print), ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014) 88 The disadvantages of the correlation-based fingerprint verification method are: Template matching requires high computational power, which makes the method less applicable for real time applications. The method is at the instant not capable of dealing with rotations of more than about 10 degrees. This is caused by the actuality that for larger rotations, the templates don't match well anymore, causing incorrect positions to be found. A solution to this problem is rotating the templates and then performing the matching again. However, this is a solution that requires a lot of additional computational power. Problems might come if the minutiae-based or coherence-based template selection methods are used while 2 minutiae surroundings look like a lot. In this case, there is a probability that template matching will and the incorrect template position, which degrades the matching performance. Use of the correlation characteristic template selection will solve this problem. IV. CHALLENGES WITH FINGERPRINT IDENTIFICATION Some of the common challenges related to fingerprint technology are low quality or corrupted input images, noise reduction, etc. The low quality or degraded images is the most common problem. The degradation can be due to burns, cuts, dust particles, etc. The fingerprint enhancement techniques not only enhance the low quality image but also remove the noise. O’Gonnan and Nickerson [10] proposed the method contextual filtering for fingerprint enhancement. Shlomo Greenberg [11] applied anisotrophic filter for fingerprint enhancement. Hong et al. [12], reported fingerprint enhancement based on the estimated local ridge orientation and frequency clarification of ridge and valley structures of input. Lin Hong [13] employed Gabor filter in enhancing the image because gabor filters have both frequency selective and orientation selective properties. D.Maio [14] used a Gaussian shape mask filter to filter selected section in every step. Wang [15] proposed a method of Log-Gabor filter. Cavuso Glu [16] proposed a fast filtering method based on reference mask of parabolic coefficients. V. CONCLUSION Fingerprint identification is one of the common and oldest forms of biometrics but the actual truth is that still a lot of research is to be done due to its complexity and Intractability. The future research work in this field is: a. Secure biometric systems: The fingerprint has proved to be secure due to its unique and unchanging behavior but there are various threats like attacks on communication, attack on database like able to obtain a fingerprint from database or injecting a new fingerprint in database, presenting fake fingerprint. b. Better feature extraction: We need to improve the various extraction algorithms for feature extraction and give accurate result and more features to be extracted in less time. c. Better matching and alignment: The matching and alignment needs to be faster and accuracy should be improved. REFERENCES: [1] Woodward, J. ,Orlans, P. , Higgins T.(2003), Biometrics, McGraw-Hill/Osborne. [2] D. Batra, G. Singhal and S. Chaudhury, ‘Gabor filter based fingerprint classification using support vector machines’, IEEE India Annual Conference, pp. 256-261, Dec. 2004. [3] E. R.Henry, ‘Classification and uses of finger prints, London: George Rutledge & Sons, Ltd., pp. 17-18’, 1900.
  • 5. International Journal of Management Research and Development (IJMRD) ISSN 2248-938X (Print), ISSN 2248-9398 (Online) Volume 4, Number 1, January-March (2014) 89 [4] Sangram Bana, Dr. Davinder Kaur , ‘Fingerprint Recognition using image segmentation’ , feb- 2011 [5] Basak, Md. Imdadul Islam, M. R. Amin, ‘Detection of a virtual core point a fingerprint: A new approach’, May-2012 [6] Ashish Mishra, Dr. Madhu Shandilya, ‘Fingerprint core point detection using gardient field mask’, June-2010. [7] Dr. H.B.kehre, Dr. Tanuja Sarade, Rekha Vig, ‘Fingerprint identification using sectorized cepstrum’, oct-2010. [8] Shashi Kumar D R, K B Raja, R K Chhotaray, Sabyasachi Pattanaik, ‘DWT based fingerprint recognition using Non Minutiae features’, March-2011 [9] Vipul Awasthi, Vanchha Awasthi, Krishna Kumar Tiwari, ‘Fingerprint analysis using termination and bifurcation minutiae’, Feb-2012. [10] L. O’Gonnan, J.V. Nickerson, ‘Matched filter design for fingerprint image enhancement, in International Conference on Acoustics, Speech, and Signal Processing’, 1988, pp. 916–919 [11] Shlomo Greenberg, Mayer Aladjem, Daniel Kogan , Itshak Dimitrov, ‘Fingerprint Image Enhancement Using Filtering Techniques, 15th Int. Conf. on Pattern Recognition, Barcelona, September 3-8, IEEE Computer Society Press’ [12] L. Hong, Y. Wan, A. Jain, ‘Fingerprint image enhancement: Algorithm and performance evaluation,IEEE Trans. Pattern Anal. Mach. Intell. (1998) 777–789.’ [13] Lin Hong, Yifei Wan, Anil Jain, ‘Fingerprint Image Enhancement: Algorithm and Performance Evaluation’, IEEE Trans. Pattern Anal. Mach. Intell. Vol. 20, No.8 pp.777-789, Aug. 1998. [14] D. Maio, D. Maltoni, ‘Direct Gray-scale Minutiae Detection in Fingerprints,’ IEEE Trans. Pattern Anal. Mach. Intell.19, pp.27-39, 1997. [15] W. Wang, J. Li, F. Huang, H. Feng, ‘Design and implementation of log-Gabor filter in fingerprint image enhancement, Pattern Recognition Lett. 29 (2008) 301–308.’ [16] A. Çavuso lu, S. Görgüno lu, ‘A fast fingerprint image enhancement algorithm using a parabolic mask, Comput. Electr. Eng. (2008) 250–256.’ [17] Dr. Mustafa Dhiaa Al-Hassani, Dr. Abdulkareem A. Kadhim and Dr. Venus W. Samawi, “Fingerprint Identification Technique Based on Wavelet-Bands Selection Features (WBSF)” International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 308 - 323, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [18] Soukaena H. Hashem, Abeer T. Maolod And Anmar A. Mohammad, “Proposal To Enhance Fingerprint Recognition System” International journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 3, 2013, pp. 10 - 22, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [19] Shekhar R Suralkar and Prof (Dr) Pradeep M. Patil, “Fingerprint Verification Using Steerable Filters” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 4, Issue 2, 2013, pp. 264 - 268, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.