Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT
|
|
- Derek Pierce
- 5 years ago
- Views:
Transcription
1 Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT Scientific Coordinator, PhD. Prof. Eng. Tiberiu Ștefan Leția
2 Chapter 1. Introduction 1.1 The biometry 1.2 The history of fingerprint recognition 1.3 General aspects of biometric systems 1.4 Thesis objectives 1.5 Thesis content Table of Contents Chapter 2. Conceptual models for fingerprint recognition 2.1 The steps required for the recognition process 2.2 Fingerprint image acquisition 2.3 Feature extraction 2.4 Image segmentation 2.5 Local ridge orientation and frequency 2.6 Singularity detection 2.7 Image enhancement 2.8 Image binarization and thinning 2.9 Minutiae detection 2.10 False minutiae rejection 2.11 Fingerprint matching 2.12 Experimental results 2.13 Conclusions Chapter 3. Fuzzy Logic Method for Partial Fingerprint Recognition 3.1 Introduction 3.2 Software architecture 3.3 Method presentation 3.4 Conclusions Chapter 4. The design of a distributed fingerprint identification system 4.1 Introduction 4.2 State of the art 4.3 Requirements and specifications 4.4 Use cases 4.5 General hardware architecture 4.6 Communication protocol 4.7 Hardware configuration of the servers 4.8 Server application design 4.9 Client application design 4.10 Mixt node application design 4.11 Conclusions i
3 Chapter 5. Implementation Aspects for the Proposed System 5.1 Server implementation 5.2 Fixed client implementation 5.3 Mobile client implementation 5.4 Mixt node implementation 5.5 Experimental results 5.6 Conclusions Chapter 6. Extension Modules for the Proposed System 6.1 Security module 6.2 Mobile terminal tracking using GPS 6.3 Secured communication system and method between fixed and mobile terminals 6.4 Conclusions Chapter 7. Conclusions 7.1 Remarks 7.2 Original contribution of the author 7.3 Design and implementation contribution 7.4 General conclusions. Future work ii
4 Thesis Outline This paper presents the main aspects involved in fingerprint recognition systems. Biometric recognition refers to a number of methods for uniquely recognizing a person based on one or more physical or behavioral characteristics. The most common biometric characteristics or traits used by identification and verification (authentication) applications are: iris, hand geometry, face, veins, voice, retina, handwriting, fingerprints etc. Among all the pos-sible biometric traits, fingerprint is the most widely used. According to [1], fingerprint based technology is the undisputed biometric leader, considering its market share of almost 67% in The same report forecasts that the annual biometric industry revenues will almost triple by The main objectives of the thesis are presented in Chapter 1: the evaluation of the main algorithms involved in fingerprint recognition and image processing; the design and the implementation of a partial fingerprint recognition application; the design and the implementation of a distributed fingerprint recognition system; the design and the implementation of a communication security module for the proposed system; the design and the implementation of a mobile clients tracking using GPS. Chapter 2 represents the state of the art of the main algorithms and methods involved in fingerprint recognition process. A fingerprint image is a reproduction of the fingertip epi-dermis, produced by pressing the finger against a solid surface. The most obvious structural feature of a fingerprint is the pat-tern of alternative ridges and furrows (or valleys) [2]. Ridges width can vary between 100 and 300 µm and the ridge/valley period is about 500 µm [3]. Fingerprint ridges begin to develop during the third to fourth month of fetal development. They are fully developed by the seventh month and the probability of two fingerprints being alike is 1 in [4]. Ridges and furrows are usually parallel, but they can also come to an end or split, thus creating the two most widely used types of minutiae (small details): terminations and bifurcations, respectively. There are other types of minutiae such as: pores, short ridges (dots or islands), cores, deltas etc. Although these other types of minutiae can be considered, the FBI minutiae-coordinate model uses only terminations and bifurcations [5]. Usually a minutia is defined by the triplet {x i, y i, θ i }, where xi and y i are the minutia coordinates and θ i is the angle between the tangent to the ridge line at the minutia location and the horizontal axis (refer to Fig. 1). Besides minutiae, the other major fingerprint feature class is represented by the singularities, which are distinctive patterns that the ridges form in a fingerprint. Developed by Sir Edward Henry in the late 1800s, the Henry Classification System [6] is still used for fingerprint classification in order to a)termination b)bifurcation Figura 1. Minutiae arch loop whorl Figure 2. Fingerprint typologies - Henry System 1
5 simplify the search and retrieval process in the recognition system s data base. The main fingerprint typologies presented in Fig. 2 are: arch, loop and whorl. These typologies are further divided into subclasses (e.g. right loop and left loop, tented arch and plain arch). The major steps involved in an automatic fingerprint recognition application are: the fingerprint acquisition, the fingerprint image pre-processing, the feature extraction, the fingerprint classification and the fingerprint matching. There are many methods and technologies for each step involved in fingerprint recognition. The fingerprint matching is the process of comparing an input fingerprint to preprocessed ones (or templates) stored in a data base. According to [7], fingerprint matching can be grouped into three major classes: (i) correlation-based matching, (ii) minutiae-based matching and (iii) ridge feature-based matching. Reference [8] states that the fingerprint recognition approaches can be grouped into five categories: (i) based on singular points, (ii) structure-based, (iii) frequency-based, (iv) syntactic or grammar-based, and (v) based on mathematical models. High quality matching of complete fingerprints can be performed by many reasonable algorithms. Matching of poor quality or partial samples is more difficult. Fingerprint images can be affected by: high displacement and/or rotation, non-linear distortion (caused by representing a 3D shape in a 2D image), different pressure, skin condition and feature extraction errors [2]. Minutiae based recognition techniques are the most often used methods in fingerprint recognition commercial applications because of their temporal performance, but they don t perform very well on low quality inputs [9] and might not be performed at all for partial fingerprints. The loss of singular points (core and delta) is making singularity based recognition and indexing techniques impossible [10]. In Chapter 3 a novel fuzzy logic algorithm based on correlating a minutiae set and the regions between ridges is proposed for matching partial fingerprints. The proposed fuzzy logic based algorithm for partial fingerprint matching combines correlation-based and minutiae-based techniques and it is employed if no singularity is detected in the fingerprint s image. Direct application of correlation-based algorithms is computationally very expensive, due to the large number of rotations and translations needed. In order to reduce the computational time, the proposed algorithm tries to match two minutiae from the input with two minutiae from the template. After aligning the two minutiae sets the two images can be correlated. In order to compare the input to the template a region coloring step is required for the both image. First, the fingerprint regions have to be enclosed from the background. This is done by uniting the neighbor ridge endings with straight lines. Second, all the regions are colored. This process is a) b) c) d) Figure 3. a)template region enclosing, b)input region enclosing, c) Template region coloring, d)input region coloring similarly to the use of Microsoft Paint s Fill with color Tool and it is performed by a labeling algorithm [11]. Both the input and the template are colored as presented in Fig. 3. 2
6 The correlation degrees of each input region are fuzzified by using the well known membership function presented in Fig. 4. The regions are grouped according to their membership degree and the relative surface of each group is determined (rshcd, rsmcd and rslcd). A second fuzzification step is performed for these 3 variables. Based on a set of rules presented in the thesis and on the inference of rules, a global matching score is determined (matchf). Fig. 5 depicts the defuzzification function of the fuzzy output matchf. The L, M, H intervals bounds were experimentally set. Raising the lower bounds of M and H intervals means a higher security level (or higher rejection rate). The crisp values of the output variable matchf are calculated by the centre of gravity for singleton method as in (1): A distributed fingerprint identification system is proposed in Chapter 4. Here, the requirements, the specifications and the design of the system are presented. The proposed IDA System is composed of a number of mobile devices connected to centralized processing units (servers), which are responsible for the enrollment and recognition tasks. The mobile devices are used for collecting the personal data, for sending Figure 4. Input membership function Figure 5. Output membership function %, (1) where s i is the strength of the i th rule and t is the number of the activated rules for the same input set. Figure 6. The general architecture of IDA System 3
7 them to its assigned server along with the needed request identifier (enroll, verify or identify) and for receiving the answers to their requests. The servers communicate with each other, being able to forward unsolved recognition requests. The general architecture of the system is presented in Fig. 6. For interconnecting the system s servers, two different technologies were proposed: a peer-to-peer topology and a MOM-JMS based topology (refer to Fig. 7 and 8, respectively). Figure 7. Peer-to-peer servers topology Figure 8. MOM based servers topology The mobile client uses an experimental device to read the fingerprints. A mobile phone running a Java ME application is used to connect to the device (via Bluetooth) and to retrieve the fingerprint. See Fig. 9 a), b), c), d). The fixed client application is implemented in Java 2 SE and it uses an optical fingerprint sensor (Wison Corp OR100) presented in Fig. 9 e). a) b) c) d) e) Figure 9. Mobile and fixed client applications The distributed applications that compose proposed system was designed with the help of the following UML diagrams: use-case, sequence, task, activity and class. Before implementing the proposed applications, a verification of the models is required, in order to avoid deadlocks, since each distributed application deals with a fairly large number of synchronized threads. The best suited method for this purpose is the use of Petri Nets. 4
8 In Chapter 5, the implementation details of the distributed fingerprint identification system are given. This chapter focuses on presenting the main technologies and protocols used to implement the system: GSM/GPRS (TCP/IP), Bluetooth (RFCOMM), JNI, MySQL and VeriFinger SDK. The main aspects of the software implementation in Java SE and ME are also given. The proposed distributed fingerprint recognition system was tested from the next points of view: - functionality tests, - error handling tests, - temporal performances tests. Chapter 6 proposes two extension modules for enhancing the system s capabilities. The first extension module is responsible for ensuring the system s communication security. The encryption methods considered (and their temporal performance for encrypting sending - decrypting 81KB of data) are presented in Table 1. Table 1. Temporal performances Encryption technique Block size Temporal performances fără criptare 1024 B, 81 KB < 7 ms RSA (JCE) 64 B 3,5 sec DES (JCE) 1024 B 285 ms AES (JCE) 1024 B 310 ms SSL (JSSE) 1024 B 80 ms The second extension module needs involves the use of GPS modules, integrated in the mobile client applications, in order to track the terminals position by using a web application developed on top of Google Maps. A novel Diffie-Hellman based method is also proposed in this chapter. The method is used to secure the communication between the terminals of a message exchanger system. The keys used to encrypt the communication are generated from the information extracted for the GPS position and from the fingerprint image. The conclusions of the thesis are presented in Chapter 7. The main original contribution of this paper can be synthesized as follows: - A new partial fingerprint recognition method was proposed [12]. - A novel encryption system and method were proposed [13]. - The original architecture and implementation for a distributed fingerprint identification system were presented. The proposed IDA System is scalable (especially in the MOM-JMS-based architecture) and has a modular implementation. Due to its characteristics, IDA System can be easily customized to meet the requirements of practical applications. Based on the studies presented in this paper, three commercial products were developed: - fingerprint-based access code generator; - radio remote control secured with fingerprint recognition; - GPS tracking system secured with fingerprint recognition. 5
9 Selective Bibliography The thesis contains 140 references from which the next were used in this abstract: [1] Biometrics Market Report International Biometrics Group, [2] D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, Handbook of Fingerprint Recognition, Springer-Verlag, New York, [3] J.D.Stosz, L.A. Alyea, Automated System forfingerprint Authentication Using Pores and Ridge Structure, Proc. of SPIE (Automatic Systems for the Identification and Inspection of Human), vol. 2277, 1994, pp [4] W. F. Leung, S. H. Leung, W.H. Lau, A. Luk, Fingerprint Recognition Using Neural Network, Neural Networks For Signal Processing, Proceedings Of The 1991 IEEE Workshop. [5] Wegstein An Automated Fingerprint Identification System, U.S. Government Publication, Washington, DC: U.S. Dept. of Commerce, National Bureau of Standards, [6] E. R. Henry, Classification and Uses of Fingerprints, London: Routledge, [7] D. Maltoni, A Tutorial on Fingerprint Recognition, Biometric Systems Laboratory - DEIS - University of Bologna, [8] S. C. Dass, A. K. Jain, Fingerprint Classification Using Orientation Field Flow Curves, ICVGIP 2004, p [9] A. N. Marana, A. K. Jain, Ridge-Based Fingerprint Matching Using Hough Transform, Computer Graphics and Image Processing, SIBGRAPI, 2005, p [10] H. Le, D. Bui, Online fingerprint identification with a fast and distortion tolerant hashing, Journal of Information Assurance and Security 4, 2009, p [11] Yang, X. D., An Improved Algorithm for Labeling Connected Components in a Binary Image, TR , [12] Miron, R., Letia, T. OSIM Patent Request for Partial Fingerprint Recognition Method A/10014/2010 from [13] Astilean, A., Folea, S., Avram, C., Hulea, M., Miron, R., Letia, T., OSIM Patent Request for Method and System for Ensuring the Communication Security between Fixed and Mobile Terminals A/10037/2010 from
Minutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationDevelopment of an Automated Fingerprint Verification System
Development of an Automated Development of an Automated Fingerprint Verification System Fingerprint Verification System Martin Saveski 18 May 2010 Introduction Biometrics the use of distinctive anatomical
More informationFingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav
Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav Abstract- Fingerprints have been used in identification of individuals for many years because of the famous fact that each
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationEncryption of Text Using Fingerprints
Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,
More informationFingerprint Classification Using Orientation Field Flow Curves
Fingerprint Classification Using Orientation Field Flow Curves Sarat C. Dass Michigan State University sdass@msu.edu Anil K. Jain Michigan State University ain@msu.edu Abstract Manual fingerprint classification
More informationFingerprint Identification System Based On Neural Network
Fingerprint Identification System Based On Neural Network Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI & Embedded Systems), Vishwabharati Academy s College of Engineering, Ahmednagar (MS), India
More informationUser Identification by Hierarchical Fingerprint and Palmprint Matching
User Identification by Hierarchical Fingerprint and Palmprint Matching Annapoorani D #1, Caroline Viola Stella Mary M *2 # PG Scholar, Department of Information Technology, * Prof. and HOD, Department
More informationKeywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A novel approach
More informationFingerprint Verification System using Minutiae Extraction Technique
Fingerprint Verification System using Minutiae Extraction Technique Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu Abstract Most fingerprint recognition techniques are based on
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Minutiae Points Extraction using Biometric Fingerprint- Enhancement Vishal Wagh 1, Shefali Sonavane 2 1 Computer Science and Engineering Department, Walchand College of Engineering, Sangli, Maharashtra-416415,
More informationFilterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah
Filterbank-Based Fingerprint Matching Multimedia Systems Project Niveditha Amarnath Samir Shah Presentation overview Introduction Background Algorithm Limitations and Improvements Conclusions and future
More informationFingerprint Matching using Gabor Filters
Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.
More informationBIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS
BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS Emil PRICOP Petroleum-Gas University of Ploiesti, emil.pricop@gmail.com Keywords: fingerprint, RFID, access control, biometric,
More informationA Full Analytical Review on Fingerprint Recognition using Neural Networks
e t International Journal on Emerging Technologies (Special Issue on RTIESTM-2016) 7(1): 45-49(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 A Full Analytical Review on Fingerprint Recognition
More informationREINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of
More informationFingerprint Recognition using Fuzzy based image Enhancement
Fingerprint Recognition using Fuzzy based image Enhancement BhartiYadav 1, Ram NivasGiri 2 P.G. Student, Department of Computer Engineering, Raipur Institute of technology, Raipur, Chhattisgarh, India
More informationExtract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, Index
Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, 2003 (Copyright 2003, Springer Verlag. All rights Reserved.) A Abstract labels; 239 Acceptability;
More informationFingerprint Feature Extraction Using Hough Transform and Minutiae Extraction
International Journal of Computer Science & Management Studies, Vol. 13, Issue 05, July 2013 Fingerprint Feature Extraction Using Hough Transform and Minutiae Extraction Nitika 1, Dr. Nasib Singh Gill
More informationVerifying Fingerprint Match by Local Correlation Methods
Verifying Fingerprint Match by Local Correlation Methods Jiang Li, Sergey Tulyakov and Venu Govindaraju Abstract Most fingerprint matching algorithms are based on finding correspondences between minutiae
More informationFingerprint Recognition
Fingerprint Recognition Anil K. Jain Michigan State University jain@cse.msu.edu http://biometrics.cse.msu.edu Outline Brief History Fingerprint Representation Minutiae-based Fingerprint Recognition Fingerprint
More informationLocal Correlation-based Fingerprint Matching
Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of
More informationReducing FMR of Fingerprint Verification by Using the Partial Band of Similarity
Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,
More informationA New Pairing Method for Latent and Rolled Finger Prints Matching
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 3, June 2014, PP 163-167 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A New Pairing Method for Latent and Rolled
More informationAvailable online at ScienceDirect. Procedia Computer Science 58 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 58 (2015 ) 552 557 Second International Symposium on Computer Vision and the Internet (VisionNet 15) Fingerprint Recognition
More informationImplementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept
Implementation of Based Fingerprint Identification System using Crossing Number Concept Atul S. Chaudhari #1, Dr. Girish K. Patnaik* 2, Sandip S. Patil +3 #1 Research Scholar, * 2 Professor and Head, +3
More informationMultimodal Biometric Authentication using Face and Fingerprint
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Multimodal Biometric Authentication using Face and Fingerprint Gayathri. R 1 Viji. A 2 1 M.E Student 2 Teaching Fellow
More informationAn approach for Fingerprint Recognition based on Minutia Points
An approach for Fingerprint Recognition based on Minutia Points Vidita Patel 1, Kajal Thacker 2, Ass. Prof. Vatsal Shah 3 1 Information and Technology Department, BVM Engineering College, patelvidita05@gmail.com
More informationA Framework for Efficient Fingerprint Identification using a Minutiae Tree
A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationKeywords:- Fingerprint Identification, Hong s Enhancement, Euclidian Distance, Artificial Neural Network, Segmentation, Enhancement.
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Embedded Algorithm
More informationFinger Print Analysis and Matching Daniel Novák
Finger Print Analysis and Matching Daniel Novák 1.11, 2016, Prague Acknowledgments: Chris Miles,Tamer Uz, Andrzej Drygajlo Handbook of Fingerprint Recognition, Chapter III Sections 1-6 Outline - Introduction
More informationFINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION
International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION
More informationCPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova
CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers
More informationOutline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience
Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele
More informationImplementation of Fingerprint Matching Algorithm
RESEARCH ARTICLE International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar Apr 2016 Implementation of Fingerprint Matching Algorithm Atul Ganbawle 1, Prof J.A. Shaikh 2 Padmabhooshan
More informationFingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask
Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask Laurice Phillips PhD student laurice.phillips@utt.edu.tt Margaret Bernard Senior Lecturer and Head of Department Margaret.Bernard@sta.uwi.edu
More informationFingerprint Recognition System
Fingerprint Recognition System Praveen Shukla 1, Rahul Abhishek 2, Chankit jain 3 M.Tech (Control & Automation), School of Electrical Engineering, VIT University, Vellore Abstract - Fingerprints are one
More informationFingerprint Image Enhancement Algorithm and Performance Evaluation
Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationFingerprint Recognition System for Low Quality Images
Fingerprint Recognition System for Low Quality Images Zin Mar Win and Myint Myint Sein University of Computer Studies, Yangon, Myanmar zmwucsy@gmail.com Department of Research and Development University
More informationBiometric Security Technique: A Review
ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106905, December 2016 Biometric Security Technique: A Review N. K.
More informationA New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features
A New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features R.Josphineleela a, M.Ramakrishnan b And Gunasekaran c a Department of information technology, Panimalar
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationFingerprint Recognition Using Gabor Filter And Frequency Domain Filtering
IOSR Journal of Electronics and Communication Engineering (IOSRJECE) ISSN : 2278-2834 Volume 2, Issue 6 (Sep-Oct 2012), PP 17-21 Fingerprint Recognition Using Gabor Filter And Frequency Domain Filtering
More informationIndexing Fingerprints using Minutiae Quadruplets
Indexing Fingerprints using Minutiae Quadruplets Ogechukwu Iloanusi University of Nigeria, Nsukka oniloanusi@gmail.com Aglika Gyaourova and Arun Ross West Virginia University http://www.csee.wvu.edu/~ross
More informationCombined Fingerprint Minutiae Template Generation
Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of
More informationFINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING)
FINGERPRINT DATABASE NUR AMIRA BINTI ARIFFIN THESIS SUBMITTED IN FULFILMENT OF THE DEGREE OF COMPUTER SCIENCE (COMPUTER SYSTEM AND NETWORKING) FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2015 i
More informationUse of Mean Square Error Measure in Biometric Analysis of Fingerprint Tests
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 5, September 2015 Use of Mean Square Error Measure in Biometric Analysis of
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:
SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,
More informationIMAGE PROCESSING AND FEATURES EXTRACTION OF FINGERPRINT IMAGES
IMAGE PROCESSING AND FEATURES EXTRACTION OF FINGERPRINT IMAGES ILOAÑUSI, O. N. 1 oniloanusi@yahoo.com OSUAGWU, C. C. 1, 2 1 Department of Electronic Engineering, University of Nigeria Nsukka, Enugu State,
More informationFINGERPRINT RECOGNITION SYSTEM USING SUPPORT VECTOR MACHINE AND NEURAL NETWORK
International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN(P): 2249-6831; ISSN(E): 2249-7943 Vol. 4, Issue 1, Feb 2014, 103-110 TJPRC Pvt. Ltd. FINGERPRINT
More informationFusion of Hand Geometry and Palmprint Biometrics
(Working Paper, Dec. 2003) Fusion of Hand Geometry and Palmprint Biometrics D.C.M. Wong, C. Poon and H.C. Shen * Department of Computer Science, Hong Kong University of Science and Technology, Clear Water
More informationA Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key
www.ijcsi.org 209 A Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key Tanmay Bhattacharya 1, Sirshendu Hore 2 and S. R. Bhadra Chaudhuri
More informationLogical Templates for Feature Extraction in Fingerprint Images
Logical Templates for Feature Extraction in Fingerprint Images Bir Bhanu, Michael Boshra and Xuejun Tan Center for Research in Intelligent Systems University of Califomia, Riverside, CA 9252 1, USA Email:
More informationA New Approach To Fingerprint Recognition
A New Approach To Fingerprint Recognition Ipsha Panda IIIT Bhubaneswar, India ipsha23@gmail.com Saumya Ranjan Giri IL&FS Technologies Ltd. Bhubaneswar, India saumya.giri07@gmail.com Prakash Kumar IL&FS
More informationFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645 Feature Level Fusion of Multibiometric Cryptosystem in Distributed System N. Geethanjali 1, Assistant.Prof. K.Thamaraiselvi 2, R. Priyadharshini
More informationFC-QIA: Fingerprint-Classification based Quick Identification Algorithm
212 FC-QIA: Fingerprint-Classification based Quick Identification Algorithm Ajay Jangra 1, Vedpal Singh 2, Priyanka 3 1, 2 CSE Department UIET, Kurukshetra University, Kurukshetra, INDIA 3 ECE Department
More informationImproving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationFingerprint Indexing using Minutiae and Pore Features
Fingerprint Indexing using Minutiae and Pore Features R. Singh 1, M. Vatsa 1, and A. Noore 2 1 IIIT Delhi, India, {rsingh, mayank}iiitd.ac.in 2 West Virginia University, Morgantown, USA, afzel.noore@mail.wvu.edu
More informationA FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING
A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING Author1: Author2: K.Raghu Ram K.Krishna Chaitanya 4 th E.C.E 4 th E.C.E raghuram.kolipaka@gmail.com chaitu_kolluri@yahoo.com Newton s Institute
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationSmart Card and Biometrics Used for Secured Personal Identification System Development
Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica
More informationClassification of Fingerprint Images
Classification of Fingerprint Images Lin Hong and Anil Jain Department of Computer Science, Michigan State University, East Lansing, MI 48824 fhonglin,jaing@cps.msu.edu Abstract Automatic fingerprint identification
More informationUsing Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification
Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors
More informationThe Design of Fingerprint Biometric Authentication on Smart Card for
The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System Computer Science Department, Faculty of Technology Science and Defence Universiti Pertahanan Nasional Malaysia
More informationBiometrics- Fingerprint Recognition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint
More informationAn introduction on several biometric modalities. Yuning Xu
An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11
More informationMinutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System
Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System Bharti Nagpal, Manoj Kumar, Priyank Pandey, Sonakshi Vij, Vaishali Abstract Identification and verification
More informationFINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY
FINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY M. POULOS Dept. of Informatics University of Piraeus, P.O. BOX 96, 49100 Corfu, Greece
More informationImprove Fingerprint Recognition Using Both Minutiae Based and Pattern Based Method
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationAN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE
AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric
More informationImage Stitching Using Partial Latent Fingerprints
Image Stitching Using Partial Latent Fingerprints by Stuart Christopher Ellerbusch Bachelor of Science Business Administration, Accounting University of Central Florida, 1996 Master of Science Computer
More informationReconstructing Ridge Frequency Map from Minutiae Template of Fingerprints
Reconstructing Ridge Frequency Map from Minutiae Template of Fingerprints Wei Tang, Yukun Liu College of Measurement & Control Technology and Communication Engineering Harbin University of Science and
More informationFINGERPRINT RECOGNITION BASED ON SPECTRAL FEATURE EXTRACTION
FINGERPRINT RECOGNITION BASED ON SPECTRAL FEATURE EXTRACTION Nadder Hamdy, Magdy Saeb 2, Ramy Zewail, and Ahmed Seif Arab Academy for Science, Technology & Maritime Transport School of Engineering,. Electronics
More informationImplementation of the USB Token System for Fingerprint Verification
Implementation of the USB Token System for Fingerprint Verification Daesung Moon, Youn Hee Gil, Sung Bum Pan, and Yongwha Chung Biometrics Technology Research Team, ETRI, Daejeon, Korea {daesung, yhgil,
More informationFVC2004: Third Fingerprint Verification Competition
FVC2004: Third Fingerprint Verification Competition D. Maio 1, D. Maltoni 1, R. Cappelli 1, J.L. Wayman 2, A.K. Jain 3 1 Biometric System Lab - DEIS, University of Bologna, via Sacchi 3, 47023 Cesena -
More informationA New Technique in saving Fingerprint with low volume by using Chaos Game and Fractal Theory
A New Technique in saving Fingerprint with low volume by using Chaos Game and Fractal Theory Mahdi Jampour 1 Member of IEEE and Senior Member of IACSIT; Mohammad M. Javidi 2, Adel Soleymani Nejad 3, Maryam
More informationAn Approach to Demonstrate the Fallacies of Current Fingerprint Technology
An Approach to Demonstrate the Fallacies of Current Fingerprint Technology Pinaki Satpathy 1, Banibrata Bag 1, Akinchan Das 1, Raj Kumar Maity 1, Moumita Jana 1 Assistant Professor in Electronics & Comm.
More informationFINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationAnalysis and Selection of Features for the Fingerprint Vitality Detection
Analysis and Selection of Features for the Fingerprint Vitality Detection Pietro Coli, Gian Luca Marcialis, and Fabio Roli Department of Electrical and Electronic Engineering University of Cagliari Piazza
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationImplementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept
Informatica Economică vol. 18, no. 1/2014 17 Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept Atul S. CHAUDHARI, Girish K. PATNAIK, Sandip S. PATIL Department
More informationMining Rare Features in Fingerprints Using Core Points and Triplet-based Features
Mining Rare Features in Fingerprints Using Core Points and Triplet-based Features Indira Munagani Thesis submitted to the faculty of the Virginia Polytechnic Institute and State University in partial fulfillment
More informationFingerprint Verification applying Invariant Moments
Fingerprint Verification applying Invariant Moments J. Leon, G Sanchez, G. Aguilar. L. Toscano. H. Perez, J. M. Ramirez National Polytechnic Institute SEPI ESIME CULHUACAN Mexico City, Mexico National
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationNOVATEUR PUBLICATIONS INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN: VOLUME 2, ISSUE 1 JAN-2015
Offline Handwritten Signature Verification using Neural Network Pallavi V. Hatkar Department of Electronics Engineering, TKIET Warana, India Prof.B.T.Salokhe Department of Electronics Engineering, TKIET
More informationHuman Identification Using Biometry
Human Identification Using Biometry by Marco César Chaul, CBP. CIO/CEO Neokoros - Brasil CBP Certified Biometric Professional. Fundamentals of Biometrics Biometry Definition Generic therm that describes
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationA hierarchical Hough transform for fingerprint. matching. Liu Chaoqiang,
A hierarchical Hough transform for fingerprint 1 matching Liu Chaoqiang, Temasek Laboratories and Centre for Wavelets, Approximation and Information Processing, National University of Singapore, tslliucq@nus.edu.sg
More informationIndexing Biometric Databases using Pyramid Technique
Indexing Biometric Databases using Pyramid Technique Amit Mhatre, Sharat Chikkerur and Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS), University at Buffalo, New York, U.S.A http://www.cubs.buffalo.edu
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationFAST FINGERPRINT IMAGE SYNTHESIS
FAST FINGERPRINT IMAGE SYNTHESIS Andrej Kisel Vilnius University, Faculty of Mathematics and Informatics, Department of Computer Science II, Naugarduko 24 Vilnius LT-03225 Lithuania, kisel.andrej@gmail.com
More informationEfficient Rectification of Malformation Fingerprints
Efficient Rectification of Malformation Fingerprints Ms.Sarita Singh MCA 3 rd Year, II Sem, CMR College of Engineering & Technology, Hyderabad. ABSTRACT: Elastic distortion of fingerprints is one of the
More informationPCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationCHAPTER 2 LITERATURE REVIEW
9 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION In this chapter the literature available within the purview of the objectives of the present study is reviewed and the need for the proposed work is discussed.
More informationRemote authentication using Vaulted Fingerprint Verification
Remote authentication using Vaulted Fingerprint Verification Hamdan Alzahrani, a Terrance E. Boult University of Colorado, Colorado Springs, CO, USA ABSTRACT This paper presents a novel approach to remotely
More informationAdaptive Fingerprint Image Enhancement Techniques and Performance Evaluations
Adaptive Fingerprint Image Enhancement Techniques and Performance Evaluations Kanpariya Nilam [1], Rahul Joshi [2] [1] PG Student, PIET, WAGHODIYA [2] Assistant Professor, PIET WAGHODIYA ABSTRACT: Image
More information