SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
Neha. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 6, ( Part -5) June 2017, pp.47-49
www.ijera.com DOI: 10.9790/9622-0706054749 47 | P a g e
Overlapped Fingerprint Separation for Fingerprint
Authentication
Neha*, P.P. Gundewar**
*(Department of Electronics & Telecommunication MIT, COE, Pune-411038
Email: neha07uiet@gmail.com)
** (Department of Electronics & Telecommunication MIT, COE , Pune-411038
Email: pooja.gundewar@mitcoe.edu.in)
ABSTRACT
Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the
criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken
ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI)
system is developed by using MATLAB R2015a software. This project also includes the development of
standalone program for this system. The main purpose of GUI development is to get the value of real end points
and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image
matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of
several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor,
and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI)
extraction, and minutiae extraction process. All processes should be done one by one.
Keywords: Fingerprint Classification, Singular point, Feature Extraction, Neural Network, Matlab.
I. INTRODUCTION
Fingerprint identification method is well
adapted approach in the many forensic, law
enforcement and civil applications for the reliable
personal authentication. The fingerprint will
continue to be the leading biometric trait and many
identity management and access control
applications will continue to rely on fingerprint
recognition because of its proven performance, the
existence of large databases and the availability of
compact and cheap fingerprint devices. New
research problems have accompanied the wide
development of fingerprint technology. It includes
feature extraction from low quality images,
liveness detection and automated latent fingerprint
identification, separating overlapped fingerprint or
recognizing one of the fingerprint from an
overlapped one. Biometrics system refers to the
recognition of a person based on their physical or
behavioral characteristics. A good biometric
system should be easily assessable, unique and
secure over period time. It should be exact, quick,
robust, secure and inexpensive. The biometric
techniques can potentially prevent unauthorized
access to or the fraudulent use of ATM, cellular
phones, smart cards, desktop PCs, workstations,
and computer networks. Fingerprints are the most
widely recognized biometric, particularly for
criminal applications and forensic applications.
Fingerprints have been routinely used as a method
for person identification for more than decades.
Fingerprint recognition has wide application
prospect in all fields which contain identity
authentication. Construction of accurate and
reliable, safe and practical Automatic Fingerprint
Identification System (AFIS) has become research
hotspot.
Fingerprint and its various features such as
minutiae, crossover, core, burification, delta, ridge
ending, island, pore. [1]
Fig.1 Fingerprint features
1.1 Overlapped fingerprint
Overlapped fingerprint image, while
difficult to process, are useful forensic evidence for
identifying suspects. Available fingerprint
matchers, however, cannot accurately match
overlapping fingerprints, because they assume that
a fingerprint image contains only a single
RESEARCH ARTICLE OPEN ACCESS
Neha. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 6, ( Part -5) June 2017, pp.47-49
www.ijera.com DOI: 10.9790/9622-0706054749 48 | P a g e
fingerprint and hence single orientation field. So
algorithms must be developed to separate
overlapping latent that will serve as a valuable tool
in forensics. In forensics, the matching accuracy of
latent is extremely critical.[2]
Fig. 2 Overlapped image
Therefore, it is desirable to develop a
technique that can automatically separate
overlapped fingerprints into their individual
fingerprints to improve the matching performance.
II. PROPOSED SYSTEM
The proposed system for fingerprint
classification involves (i) the extraction of features
of given fingerprint image, (ii) Feature Orientation
(iii) labeling of each oriented fingerprint in to six
class like arch, tented arch, right loop, left loop,
twin loop, whorl. The fingerprints have been
traditionally classified into categories based on
information in the global patterns of ridges.
Fingerprint classification provides an important
indexing mechanism in a fingerprint database. An
accurate and consistent classification can greatly
reduce fingerprint matching time from a large
database. We present a fingerprint classification
algorithm which is able to achieve an accuracy
better Efforts in automatic fingerprint classification
have been exclusively directed. The fingerprint
classification architecture that has shown
classification of fingers into the six classes. It
consist of user interface to provide interaction for
user with system, the system database is the
collections of the recorded data and enrolment
module and authentication module is present for
system input and verification of the fingerprint
image given by user.
In the proposed methodology 10 samples
are taken which is already stored in the system and
in PIC controller of hardware so used. In the
hardware, the PIC controller, driver motor for gate
to open and close by which the fingerprint is
genuine or not can be recognized.
Below figure depicts the flowchart of the complete
system:
Fig. 3 Proposed methodology
2.1 Steps involved
Step1: First we take original fingerprint image and
performing image enhancement by using histogram
equalization.
Step2: For better enhancement we use histogram
equalization image as an input to the FFT algorithm.
Step3: The enhanced image is binarized using
binarization algorithm.
Neha. Int. Journal of Engineering Research and Application www.ijera.com
ISSN : 2248-9622, Vol. 7, Issue 6, ( Part -5) June 2017, pp.47-49
www.ijera.com DOI: 10.9790/9622-0706054749 49 | P a g e
Step4: For directional map, orientational flow of
estimation is done.
Step5: For extracting the unnecessary part is done
with the help of Gabor filter through which a
specific point of the overlapped image is extracted
so that location of each point can be located.
Step6: After this classification is done by artifical
neural network, in which on the basis of region of
interest (ROI).
Step7: With the help of the classifier the output on
the command window is genuine or fake, depending
on the compared data.
III. CONCLUSION
The developed overlapped fingerprint
separation for fingerprint authentication, clearly
displayed technique has enormously enhanced
fingerprint image classification accuracy. Simulation
results verified that the proposed calculation is
precise and powerful.
In addition, Image quality of the overlapped
fingerprints used in the current experiments is
relatively good. It also compare with the data in the
fingerprint classification process, which authenticate
that the given sample is genuine or fake. We are in
the process of collecting additional latent overlapped
fingerprints of various qualities that are lifted using
different latent development methods. And also to
compare the fingerprints obtained at different ages
of a person.
REFERENCES
[1]. Sankaran, Anu sh, Mayank Vatsa, and Richa
Singh. "Automated clarity and quality
assessment for latent fingerprints." In
Biometrics: Theory, Applications and Systems
(BTAS), 2073 IEEE Sixth International
Conference on, pp. I - 6.I EEE, 20 I 3.
[2]. Hicklin, R. Austin, JoAnn Buscaglia, and
Maria Antonia Roberts. 144 "Assessing the
clarity of friction ridge impressions."
Forensic science international 226, no. I
(2013): 106-11 7.
[3]. Ramaiah, N. Pattabhi, A. Tirupathi Rao, and
C. Kri shna Mohan."Enhancements to latent
fingerprints in forensic application s. "In 2074
79th International Conference on Digital
Signal Processing, pp. 439-443. IEEE, 2014.
[4]. Cao, Kai, Eryun Liu, and Anil K. Jain .
"Segmentation and enhancement of latent
fingerprints: A coarse to fine rid gestructure
dictionary." IEEE transactions on pattern
analysis and machine intelligence 36, no. 9
2(014): 1847-1 859.

Mais conteúdo relacionado

Mais procurados

Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET Journal
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep LearningIRJET Journal
 
survey on effectiveness of using fingerprint images in forensic research
survey on effectiveness of using fingerprint images in forensic researchsurvey on effectiveness of using fingerprint images in forensic research
survey on effectiveness of using fingerprint images in forensic researchanjunarayanan
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...IJAEMSJORNAL
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User InputIRJET Journal
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYsumitgupta575
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance Systemijtsrd
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 

Mais procurados (18)

Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
IRJET - Biometric Identification using Gait Analyis by Deep Learning
IRJET -  	  Biometric Identification using Gait Analyis by Deep LearningIRJET -  	  Biometric Identification using Gait Analyis by Deep Learning
IRJET - Biometric Identification using Gait Analyis by Deep Learning
 
survey on effectiveness of using fingerprint images in forensic research
survey on effectiveness of using fingerprint images in forensic researchsurvey on effectiveness of using fingerprint images in forensic research
survey on effectiveness of using fingerprint images in forensic research
 
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...
 
Iciea08
Iciea08Iciea08
Iciea08
 
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
 
BIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGYBIOMETRICS TECHNOLGY
BIOMETRICS TECHNOLGY
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
C6524029320
C6524029320C6524029320
C6524029320
 

Semelhante a Overlapped Fingerprint Separation for Authentication

System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysisvivatechijri
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningIRJET Journal
 
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...IRJET Journal
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetTELKOMNIKA JOURNAL
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET Journal
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applicationsInternational Center for Biometric Research
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
 
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET Journal
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...IJECEIAES
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 

Semelhante a Overlapped Fingerprint Separation for Authentication (20)

System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
(2007) Performance Analysis for Multi Sensor Fingerprint Recognition System
 
N010438890
N010438890N010438890
N010438890
 
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
A Novel Method for Facial Recognition Based Smart Voting System Using Machine...
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints dataset
 
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...IRJET-  	  FASSBTR : Fingerprint Authentication System Security using Barcode...
IRJET- FASSBTR : Fingerprint Authentication System Security using Barcode...
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications(2010) Fingerprint recognition performance evaluation for mobile ID applications
(2010) Fingerprint recognition performance evaluation for mobile ID applications
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
IRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security EnhancementIRJET-Gaussian Filter based Biometric System Security Enhancement
IRJET-Gaussian Filter based Biometric System Security Enhancement
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 

Último

Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 

Último (20)

Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 

Overlapped Fingerprint Separation for Authentication

  • 1. Neha. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 6, ( Part -5) June 2017, pp.47-49 www.ijera.com DOI: 10.9790/9622-0706054749 47 | P a g e Overlapped Fingerprint Separation for Fingerprint Authentication Neha*, P.P. Gundewar** *(Department of Electronics & Telecommunication MIT, COE, Pune-411038 Email: neha07uiet@gmail.com) ** (Department of Electronics & Telecommunication MIT, COE , Pune-411038 Email: pooja.gundewar@mitcoe.edu.in) ABSTRACT Overlapped fingerprints captured at the crime scene plays significant role as an evidence to capture the criminals. As latent fingerprints are the accidently left skin impressions, so these are found to be with broken ridge composition, overlapped patterns and spoiled minutiae information. The Graphical User Interface (GUI) system is developed by using MATLAB R2015a software. This project also includes the development of standalone program for this system. The main purpose of GUI development is to get the value of real end points and real-branch points of a overlapped fingerprint image. The value of this point is used in fingerprint image matching process to identify the owner of an overlapped fingerprint image. The image enhancement consists of several process such as histogram equalization process, enhancement by Fast Fourier Transform (FFT) factor, and image binarization while minutiae extraction consist of ridge thinning process, region of interest (ROI) extraction, and minutiae extraction process. All processes should be done one by one. Keywords: Fingerprint Classification, Singular point, Feature Extraction, Neural Network, Matlab. I. INTRODUCTION Fingerprint identification method is well adapted approach in the many forensic, law enforcement and civil applications for the reliable personal authentication. The fingerprint will continue to be the leading biometric trait and many identity management and access control applications will continue to rely on fingerprint recognition because of its proven performance, the existence of large databases and the availability of compact and cheap fingerprint devices. New research problems have accompanied the wide development of fingerprint technology. It includes feature extraction from low quality images, liveness detection and automated latent fingerprint identification, separating overlapped fingerprint or recognizing one of the fingerprint from an overlapped one. Biometrics system refers to the recognition of a person based on their physical or behavioral characteristics. A good biometric system should be easily assessable, unique and secure over period time. It should be exact, quick, robust, secure and inexpensive. The biometric techniques can potentially prevent unauthorized access to or the fraudulent use of ATM, cellular phones, smart cards, desktop PCs, workstations, and computer networks. Fingerprints are the most widely recognized biometric, particularly for criminal applications and forensic applications. Fingerprints have been routinely used as a method for person identification for more than decades. Fingerprint recognition has wide application prospect in all fields which contain identity authentication. Construction of accurate and reliable, safe and practical Automatic Fingerprint Identification System (AFIS) has become research hotspot. Fingerprint and its various features such as minutiae, crossover, core, burification, delta, ridge ending, island, pore. [1] Fig.1 Fingerprint features 1.1 Overlapped fingerprint Overlapped fingerprint image, while difficult to process, are useful forensic evidence for identifying suspects. Available fingerprint matchers, however, cannot accurately match overlapping fingerprints, because they assume that a fingerprint image contains only a single RESEARCH ARTICLE OPEN ACCESS
  • 2. Neha. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 6, ( Part -5) June 2017, pp.47-49 www.ijera.com DOI: 10.9790/9622-0706054749 48 | P a g e fingerprint and hence single orientation field. So algorithms must be developed to separate overlapping latent that will serve as a valuable tool in forensics. In forensics, the matching accuracy of latent is extremely critical.[2] Fig. 2 Overlapped image Therefore, it is desirable to develop a technique that can automatically separate overlapped fingerprints into their individual fingerprints to improve the matching performance. II. PROPOSED SYSTEM The proposed system for fingerprint classification involves (i) the extraction of features of given fingerprint image, (ii) Feature Orientation (iii) labeling of each oriented fingerprint in to six class like arch, tented arch, right loop, left loop, twin loop, whorl. The fingerprints have been traditionally classified into categories based on information in the global patterns of ridges. Fingerprint classification provides an important indexing mechanism in a fingerprint database. An accurate and consistent classification can greatly reduce fingerprint matching time from a large database. We present a fingerprint classification algorithm which is able to achieve an accuracy better Efforts in automatic fingerprint classification have been exclusively directed. The fingerprint classification architecture that has shown classification of fingers into the six classes. It consist of user interface to provide interaction for user with system, the system database is the collections of the recorded data and enrolment module and authentication module is present for system input and verification of the fingerprint image given by user. In the proposed methodology 10 samples are taken which is already stored in the system and in PIC controller of hardware so used. In the hardware, the PIC controller, driver motor for gate to open and close by which the fingerprint is genuine or not can be recognized. Below figure depicts the flowchart of the complete system: Fig. 3 Proposed methodology 2.1 Steps involved Step1: First we take original fingerprint image and performing image enhancement by using histogram equalization. Step2: For better enhancement we use histogram equalization image as an input to the FFT algorithm. Step3: The enhanced image is binarized using binarization algorithm.
  • 3. Neha. Int. Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 7, Issue 6, ( Part -5) June 2017, pp.47-49 www.ijera.com DOI: 10.9790/9622-0706054749 49 | P a g e Step4: For directional map, orientational flow of estimation is done. Step5: For extracting the unnecessary part is done with the help of Gabor filter through which a specific point of the overlapped image is extracted so that location of each point can be located. Step6: After this classification is done by artifical neural network, in which on the basis of region of interest (ROI). Step7: With the help of the classifier the output on the command window is genuine or fake, depending on the compared data. III. CONCLUSION The developed overlapped fingerprint separation for fingerprint authentication, clearly displayed technique has enormously enhanced fingerprint image classification accuracy. Simulation results verified that the proposed calculation is precise and powerful. In addition, Image quality of the overlapped fingerprints used in the current experiments is relatively good. It also compare with the data in the fingerprint classification process, which authenticate that the given sample is genuine or fake. We are in the process of collecting additional latent overlapped fingerprints of various qualities that are lifted using different latent development methods. And also to compare the fingerprints obtained at different ages of a person. REFERENCES [1]. Sankaran, Anu sh, Mayank Vatsa, and Richa Singh. "Automated clarity and quality assessment for latent fingerprints." In Biometrics: Theory, Applications and Systems (BTAS), 2073 IEEE Sixth International Conference on, pp. I - 6.I EEE, 20 I 3. [2]. Hicklin, R. Austin, JoAnn Buscaglia, and Maria Antonia Roberts. 144 "Assessing the clarity of friction ridge impressions." Forensic science international 226, no. I (2013): 106-11 7. [3]. Ramaiah, N. Pattabhi, A. Tirupathi Rao, and C. Kri shna Mohan."Enhancements to latent fingerprints in forensic application s. "In 2074 79th International Conference on Digital Signal Processing, pp. 439-443. IEEE, 2014. [4]. Cao, Kai, Eryun Liu, and Anil K. Jain . "Segmentation and enhancement of latent fingerprints: A coarse to fine rid gestructure dictionary." IEEE transactions on pattern analysis and machine intelligence 36, no. 9 2(014): 1847-1 859.