Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, Index

Size: px
Start display at page:

Download "Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, Index"

Transcription

1 Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, 2003 (Copyright 2003, Springer Verlag. All rights Reserved.)

2 A Abstract labels; 239 Acceptability; 7 AFIS. See Automatic fingerprint identification systems Analysis. See Fingerprint analysis Arch; 174 Arcing; 244 Attended biometric application; 6; 8 Authentication; 3 Automatic capture; 15 Automatic fingerprint identification systems; 1; 12; 24; 27; 50; 53; 57; 79; 129; 135; 137; 150; 169; 197; 202; 264 Automatic teller machine; 43 B Bagging; 244 Behavioral characteristic; 2 Best practices; 17; 21; 169 Binarization; 113 Biometric identifier; 2; 9 Biometric recognition; 2 Biometric system; 3 applications; 5; 43 errors; 13 evaluation; 19 Biometrics. See Biometric identifier Boosting; 244 Bootstrap; 21 Borda count; 241 Border control; 43 Brute force; 280; 293; 302 Calibration; 60 Cancelable biometrics; 301 Cellular phones; 43 Certificate authority; 292 Certifier; 292 Challenge-response; 299 Circumvention; 7; 40; 281 Class set reduction; 241 Class set reordering; 241 Classification. See Fingerprint classification Classifier combination. See Integration Closed biometric system; 7 Coercion; 40; 282; 307 Collectability; 7 Collusion; 282 Combination. See Integration Common biometric exchange file format; 41; 294; 308 Comparison of biometrics; 7 Composite. See Mosaicking Compression. See Fingerprint image compression Computer network logon; 43 Confidence intervals; 21; 35 Confidence value; 239 Confusion matrix; 190 Contamination; 40; 282 C

3 342 Contextual filters; 107; 116; 208 Cooperative biometric application; 6; 8 Core; 84; 102; 150; 151; 158; 166; 176; 264 detection; 96; 102; 200 Corpse identification; 43 Correctional facility; 43 Correlation; 137 differential; 138 in Fourier domain; 140 nagative; 236 normalized; 138 Cost-benefit analysis; 308 Covert acquisition; 282 Covert biometric application; 6 Credit card; 43 Criminal investigation; 43 Criminal stigma; 46 Cross-correlation. See Correlation Crossing number; 119 Cryptographic strength; 26; 280 Cryptography; 41; 296 public-key; 297 symmetric; 296 Curse of dimensionality; 237 D Dab impressions; 58 Denial of service; 42; 281; 285 Digital signature; 296 Direction; 88 Direction difference; 141 Discrete Wavelet Transform; 79 Distance from feature space; 249 Distance learning; 43 Distinctiveness; 7 DNA biometric; 9 Double loop; 174 Driver s license; 43 Dynamic programming; 153 E Ear biometric; 9 Echography; 65 e-commerce; 43 Edit distance; 153 Edward Henry; 23; 84; 173 Electronic data security; 43 Electrostatic discharge; 63 Encryption. See Cryptography Enrollment; 3 Equal-error rate; 15 Error-correcting code; 304 Face biometric; 9 Failure to capture; 15 Failure to enroll; 15 Failure to match; 15 Fake finger; 54; 286 False acceptance; 13 False match; 13 False match rate; 14 False non-match; 13 False non-match rate; 14 False rejection; 13 Fault-line; 101 Feature language; 38 Feature saliency; 29 Feature suitability; 29 Finger geometry biometric; 10 FingerCode; 166; 167; 188; 189; 191; 197 Fingerprint acquisition. See Fingerprint sensing Fingerprint analysis; 83 Fingerprint applications; 43 Fingerprint binarization; 94 Fingerprint classification; 33; 173 continuous classification; 34; 195 sub-classification; 194 F

4 343 Fingerprint classification methods; 176; 178 multiple classifier-based approaches; 187 neural network-based approaches; 185 performance; 190 rule-based approaches; 180 statistical approaches; 183 structural approaches; 182 syntactic approaches; 181 Fingerprint configuration; 263 Fingerprint enhancement; 104; 113; 114; 116; 132; 176; 186 recoverable region; 105 unrecoverable region; 105 well-defined region; 105 Fingerprint feature extraction; 28; 86 core detection; 96 enhancement; 104 local ridge frequency; 91 local ridge orientation; 87 minutiae detection; 113 minutiae filtering; 124 registration features; 96 ridge count; 128 segmentation; 94 singularity detection; 96 Fingerprint generation; 203 area; 208 background; 221 distortion; 219 frequency image; 213 global rotation; 221 global translation; 221 in batch; 228 orientation image; 209 perturbation; 221 ridge pattern; 214 validation; 224 variation in ridge thickness; 218 Fingerprint identification; 3 errors; 17 Fingerprint image characteristics; 55 area; 56; 75 depth; 56 dynamic range; 56 geometric accuracy; 56 number of pixels; 56 quality; 56 resolution; 55 Fingerprint image compression; 27; 79 Fingerprint image storage; 26; 79 Fingerprint indexing; 1; 19; 33; 173; 194; 241; 245 Fingerprint individuality; 25; 231; 257 Fingerprint matching; 31; 131 correlation-based; 33; 135; 137 minutiae-based; 33; 135; 141 performance; 168 ridge feature-based; 33; 135; 164 Fingerprint mosaicking; 77 Fingerprint quality; 55; 56; 104; 105 Fingerprint recognition; 3 Fingerprint registration; 102; 150; 151 Fingerprint representation; 28; 83 Fingerprint retrieval; 194 performance; 199 strategies; 197 Fingerprint scanner; 26; 42; 53; 54; 132 attack; 284; 285 cryptography; 291 examples; 69 Fingerprint scanner features; 69 automatic finger detection; 69 encryption; 69 frames per second; 69 interface; 69 operating system; 69 Fingerprint sensing; 26; 53 ink-technique; 53 live-scan; 53; 59 off-line; 53; 57

5 344 on-line; 53 Fingerprint sensor; 54 Fingerprint verification; 3 errors; 13 Focal point; 103 Formation of fingerprints; 24 Francis Galton; 22; 85; 173 Frustrated total internal reflection; 59 Fully automatic system; 5; 8 Fusion. See Integration Fuzzy vault; 307 FVC2000; 17; 75; 169; 200; 203; 229 FVC2002; 75; 136; 169; 203; 229; 279 G Gabor filters; 109 Gait biometric; 9 Galton details; 85 Galton s classification; 173 Galton-Henry classification; 174 Generation. See Fingerprint generation Genuine distribution; 14 Geometrical distortion; 60 H Habituated users; 6; 8 Habituation; 67 Hand geometry biometric; 10 Hand vein biometric; 9 Henry Fauld; 22 Henry s classification; 174 Herschel; 22 Hill climbing; 41; 231; 294 History of fingerprints; 21 Holograms; 60 Hough transform; 146 I Identical twins. See Twins Identification system. See Fingerprint identification Impostor distribution; 14 ing. See Fingerprint indexing Information content; 26; 233; 294 Infrared imaging; 9 Input; 131 Integration; 36; 236 architecture; 237 level; 239 loosely coupled; 37; 239 rules; 241 scheme; 241 strategies; 237; 241 tightly coupled; 37; 239 Inter-class variability; 28; 134; 175 Internet access; 43 Intra-class variability; 28; 31; 131; 175 displacement; 131 noise; 132 non-linear distortion; 132 partial overlap; 132 pressure; 132 rotation; 131 skin condition; 132 Intrinsic coordinate system; 155 Inverse Discrete Wavelet Transform; 80 Iris biometric; 10 IrisCode; 266; 304 Irregularity operator; 100 Juan Vucetich; 173 Key; 43; 296 private; 297 public; 297 replacement; 42 session; 299 J K

6 345 Keystroke biometric; 10 L Latent; 1; 26; 58; 176 Left loop; 174 Linear symmetry; 124 Logistic regression; 241 M Magnetic card; 3 Masquerade attack; 204 Master fingerprint; 204; 208 Matcher; 33 Matching. See Fingerprint matching Matching pairs; 13 Matching score; 13 Mated pair; 33 Mayer; 22 Measurement value; 239 Mechanical guide; 77 Medical records management; 43 Minute details. See Minutiae Minutiae; 30; 85 bifurcation; 30; 85; 119 crossover; 85 duality; 86 termination; 30; 85; 119 trifurcation; 85 Minutiae correspondence; 143 Minutiae detection; 113 binarization-based; 114 grayscale-based; 120 Minutiae filtering; 124 gray-scale-based; 126 structure-based; 124 Minutiae matching; 141 alignment; 142 distortion; 160 global vs local; 156 point pattern matching; 144; 145 problem formulation; 141 with pre-alignment; 150 without alignment; 154 Missing children; 43 Mix-spectrum; 92 Modulation transfer function; 57; 110 Morphological operators; 95; 118; 218 Mosaicking; 78. See Fingerprint mosaicking Multibiometric system; 233 Multiclassifier system; 236 Multimodal biometric system; 36; 233 N National ID card; 43 Natural distribution; 176 Negative recognition system; 5; 13 Nehemiah Grew; 21 Neyman-Pearson; 242; 250; 252 NIST Special Database 14; 35; 58; 191; 199 classification results; 192 NIST Special Database 4; 34; 35; 190 classification results; 191 NIST Special Databases; 169 Non-attended biometric application; 6 Nonce; 299 Non-contact; 9; 10 Non-cooperative biometric application; 6; 8 Non-habituated users; 6 Non-invertible transform; 302 Non-linear distortion; 35; 132; 138; 160; 216; 219; 273; 289 Non-matching pairs; 13 Non-standard environment; 6 Odor biometric; 10 Off-line system; 4 O

7 346 One-way hash function; 298; 302 On-line system; 4 Open biometric system; 7 Operational evaluation; 20 Optical sensors; 59 direct reading; 62 electro-optical; 62 FTIR; 59 FTIR with a sheet prism; 61 optical fibers; 61 Orientation; 87 consistency; 88 reliability; 88 Overt biometric application; 6; 8 P Parenthood determination; 43 Passport control; 43 PCASYS; 187 Penetration rate; 19; 190 Performance; 7 Permanence; 7; 258 Personal digital assistant; 43 Personal identification number; 282 Physical access control; 43 Physiological characteristic; 2 Plain whorl; 174 Plastic lens; 60 Poincaré index; 97 Points of attack; 283 Pores. See Sweat pores Positive recognition system; 5; 13 Pre-alignment; 150 absolute; 150 relative; 151 Principal component analysis; 89; 251 Privacy; 9; 45; 50 covert recognition; 47 unintended application scope; 46 unintended functional scope; 46 Private biometric application; 6 Private biometrics; 301 Probability of (minutiae) occurrence; 262; 263 Probability of a false association; 265 Probability of a false correspondence; 259 Probability of fingerprint configuration; 261 Public biometric application; 6 Purkinje; 22; 173 Q Quality index. See Fingerprint quality R Rank label; 241 Rank values; 239 Receiver operating characteristic curve; 15 Recognition; 3 Recognition system; 3 Registration point; 103 Replay attack; 40; 285; 296 Representation. See Fingerprint representation Repudiation; 40; 281 Retina biometric; 10 Retrieval error rate; 19 Ridge count; 128 Ridge line following; 121 Ridge lines. See Ridges Ridges; 83 Right loop; 174 Rolled impressions; 58 Sample size; 20 Scenario evaluation; 19 Scientific testimony; 257 Security by obscurity; 290; 294 S

8 347 Semi automatic system; 5; 8 Sensing area; 27; 56; 75 Sensitivity; 9 SFINGE; 203 method; 205 software tool; 228 Signal-to-noise ratio; 57 Signature biometric; 11 Silicone coating; 60 Singular points; 30 Singular regions. See Singularities Singularities; 84 delta; 84 loop; 84 whorl; 84 Singularity detection; 96 orientation image; 100 partitioning-based; 101 Poincaré index; 97 Skeletons; 118 Smartcard; 3; 29; 47; 170; 285; 292 Sobel; 89 Social engineering; 283 Social security; 43 Software development kit; 39 Solid-state sensors; 62 capacitive; 63 electric field; 64 piezoelectric; 64 thermal; 64 Spatial distance; 141 Stacking; 244 Standard environment; 6 Storage; 79 Structural post-processing; 124 Subset bootstrap; 21 Sweat pores; 31; 58; 86; 165; 221; 259; 260; 289 Sweep sensors; 65 image reconstruction; 67 Synthetic fingerprint; 35; 112; 203; 293; 295 System database; 3 T Technology evaluation; 19; 203 Template; 3; 131 consolidation; 78 improvement; 78 Ten-print identification; 176 Tented arch; 174 Terrorist identification; 43 Thermogram-based biometric; 9 Thinning; 113 Thomas Bewick; 22 Threat model; 281; 308 Threshold; 13 global; 114 local; 114 Timestamp; 299 Tolerance box; 141 Touch sensors; 65 Trapezoidal distortion; 60 Trojan horse; 231; 284; 291 Twelve-point guideline; 276 Twins; 9; 25; 26 U Ultrasound sensors; 65 Unattended biometric application; 8 Unibiometric system; 233 Unimodal biometric system; 233 Uniqueness; 258 Universality; 7; 234 User enrollment; 3 Valleys; 83 V

9 348 Verification system. See Fingerprint verification Vitality detection; 42; 288 Voice biometric; 11 Vucetich classification; 173 W Watermarking; 41 Wavelet Scalar Quantization; 79; 301 Welfare disbursement; 43 Whorl; 174 x-signature; 91; 129 ZeroFMR; 15 ZeroFNMR; 15 X Z

Development of an Automated Fingerprint Verification System

Development of an Automated Fingerprint Verification System Development of an Automated Development of an Automated Fingerprint Verification System Fingerprint Verification System Martin Saveski 18 May 2010 Introduction Biometrics the use of distinctive anatomical

More information

Fingerprint Recognition

Fingerprint Recognition Fingerprint Recognition Anil K. Jain Michigan State University jain@cse.msu.edu http://biometrics.cse.msu.edu Outline Brief History Fingerprint Representation Minutiae-based Fingerprint Recognition Fingerprint

More information

Minutiae Based Fingerprint Authentication System

Minutiae Based Fingerprint Authentication System Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising

More information

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION

More information

Index. B pictures, 69 Backing off, 220 Backward-predicted vectors, 71 Baird-Atomics, 17 Balthazard, 12 Behavioral biometric, 80 component, 83

Index. B pictures, 69 Backing off, 220 Backward-predicted vectors, 71 Baird-Atomics, 17 Balthazard, 12 Behavioral biometric, 80 component, 83 Index Accuracy, 21 in manual systems, 20 Affine motion, 75 parameters, 77 AFIS, 18, 19, 21 Ambiguities, 88 in LRO, 106 when processing orientations, 106 AM-FM model for fingerprint, 317, 319 Amputated

More information

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah Filterbank-Based Fingerprint Matching Multimedia Systems Project Niveditha Amarnath Samir Shah Presentation overview Introduction Background Algorithm Limitations and Improvements Conclusions and future

More information

Local Correlation-based Fingerprint Matching

Local Correlation-based Fingerprint Matching Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of

More information

Finger Print Recognition System CONTENTS

Finger Print Recognition System CONTENTS Finger Print Recognition System CONTENTS 1. ABSTRACT 2. INTRODUCTION 3. DESIGN PRINCIPLES & EXPLANATION 3.1. MODULES 3.2. MODULE DESCRIPTIOIN 4. PROJECT DICTIONARY 4.1. DATAFLOW DIAGRAMS 4.2. E-R DIAGRAMS

More information

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav Abstract- Fingerprints have been used in identification of individuals for many years because of the famous fact that each

More information

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

FVC2004: Third Fingerprint Verification Competition

FVC2004: Third Fingerprint Verification Competition FVC2004: Third Fingerprint Verification Competition D. Maio 1, D. Maltoni 1, R. Cappelli 1, J.L. Wayman 2, A.K. Jain 3 1 Biometric System Lab - DEIS, University of Bologna, via Sacchi 3, 47023 Cesena -

More information

A New Pairing Method for Latent and Rolled Finger Prints Matching

A New Pairing Method for Latent and Rolled Finger Prints Matching International Journal of Emerging Engineering Research and Technology Volume 2, Issue 3, June 2014, PP 163-167 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A New Pairing Method for Latent and Rolled

More information

FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1 S.A.Imam 2

FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1 S.A.Imam 2 Review Article FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1.A.Imam 2 Address for Correspondence 1 Asst. Prof, ECE Deptt, Ajay Kumar Garg Engineering College, Ghaziabad 2 Asst. Prof,

More information

Fingerprint Recognition using Fuzzy based image Enhancement

Fingerprint Recognition using Fuzzy based image Enhancement Fingerprint Recognition using Fuzzy based image Enhancement BhartiYadav 1, Ram NivasGiri 2 P.G. Student, Department of Computer Engineering, Raipur Institute of technology, Raipur, Chhattisgarh, India

More information

User Identification by Hierarchical Fingerprint and Palmprint Matching

User Identification by Hierarchical Fingerprint and Palmprint Matching User Identification by Hierarchical Fingerprint and Palmprint Matching Annapoorani D #1, Caroline Viola Stella Mary M *2 # PG Scholar, Department of Information Technology, * Prof. and HOD, Department

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

A Survey on Security in Palmprint Recognition: A Biometric Trait

A Survey on Security in Palmprint Recognition: A Biometric Trait A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or

More information

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

A Framework for Efficient Fingerprint Identification using a Minutiae Tree A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a

More information

Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA

Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA Pravin M.Sonsare

More information

Encryption of Text Using Fingerprints

Encryption of Text Using Fingerprints Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

Segmentation and Enhancement of Latent Fingerprints: A Coarse to Fine Ridge Structure Dictionary. Kai Cao January 16, 2014

Segmentation and Enhancement of Latent Fingerprints: A Coarse to Fine Ridge Structure Dictionary. Kai Cao January 16, 2014 Segmentation and Enhancement of Latent Fingerprints: A Coarse to Fine Ridge Structure Dictionary Kai Cao January 16, 2014 Fingerprint Fingerprint Image D. Maltoni et al., Handbook of Fingerprint Recognition,

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems

From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems From the Iriscode to the Iris: A New Vulnerability Of Iris Recognition Systems Javier Galbally Biometrics Recognition Group - ATVS Escuela Politécnica Superior Universidad Autónoma de Madrid, SPAIN http://atvs.ii.uam.es

More information

Finger Print Analysis and Matching Daniel Novák

Finger Print Analysis and Matching Daniel Novák Finger Print Analysis and Matching Daniel Novák 1.11, 2016, Prague Acknowledgments: Chris Miles,Tamer Uz, Andrzej Drygajlo Handbook of Fingerprint Recognition, Chapter III Sections 1-6 Outline - Introduction

More information

Fingerprint Matching using Gabor Filters

Fingerprint Matching using Gabor Filters Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.

More information

Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT

Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT Scientific Coordinator, PhD. Prof. Eng. Tiberiu Ștefan Leția Chapter

More information

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System Vol.2, Issue.6, Nov-Dec. 2012 pp-4643-4647 ISSN: 2249-6645 Feature Level Fusion of Multibiometric Cryptosystem in Distributed System N. Geethanjali 1, Assistant.Prof. K.Thamaraiselvi 2, R. Priyadharshini

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic

More information

Fingerprint Mosaicking &

Fingerprint Mosaicking & 72 1. New matching methods for comparing the ridge feature maps of two images. 2. Development of fusion architectures to improve performance of the hybrid matcher. 3. Constructing the ridge feature maps

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

Fingerprint Verification System using Minutiae Extraction Technique

Fingerprint Verification System using Minutiae Extraction Technique Fingerprint Verification System using Minutiae Extraction Technique Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu Abstract Most fingerprint recognition techniques are based on

More information

Biometrics: Machines recognizing people

Biometrics: Machines recognizing people Biometrics: Machines recognizing people Biometrics & Authentication Technologies: security issues Andy Adler Systems and Computer Engineering, Carleton Finger anatomy Fingerprint: Rolled ink Ink Roller

More information

Fingerprint Recognition System

Fingerprint Recognition System Fingerprint Recognition System Praveen Shukla 1, Rahul Abhishek 2, Chankit jain 3 M.Tech (Control & Automation), School of Electrical Engineering, VIT University, Vellore Abstract - Fingerprints are one

More information

Partially Acquired Fingerprint Recognition Using Correlation Based Technique.

Partially Acquired Fingerprint Recognition Using Correlation Based Technique. Partially Acquired Fingerprint Recognition Using Correlation Based Technique. 1 Hrushikesh G. Manoli, 2 K.S. Tiwari 1,2, Dept. of Electronics and Telecommunication Engineering, Modern Education Society

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

FINGERPRINT BASED LICENSE CHECKING FOR AUTO-MOBILES J.Angeline Rubella, M.Suganya 1, K.Senathipathi, 2 B.Santhosh Kumar, K.R.Gowdham, M.

FINGERPRINT BASED LICENSE CHECKING FOR AUTO-MOBILES J.Angeline Rubella, M.Suganya 1, K.Senathipathi, 2 B.Santhosh Kumar, K.R.Gowdham, M. FINGERPRINT BASED LICENSE CHECKING FOR AUTO-MOBILES J.Angeline Rubella, M.Suganya 1, K.Senathipathi, 2 B.Santhosh Kumar, K.R.Gowdham, M.Ranjithkumar 3 1 Assistant Professor, K.P.R Institute of Engineering

More information

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova Biometric goals Verify users Identify users Synthesis - recently Biometric identifiers Courtesy of Bromba GmbH Classification of identifiers

More information

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM 109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such

More information

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre

More information

FINGER PRINT RECOGNITION SYSTEM USING RIDGE THINNING METHOD

FINGER PRINT RECOGNITION SYSTEM USING RIDGE THINNING METHOD FINGER PRINT RECOGNITION SYSTEM USING RIDGE THINNING METHOD K.Sapthagiri *1, P.Sravya *2 M.Tech(CS), Department of Electronics and Communication Engineering, A.p, India. B.Tech(IT) Information Technology,

More information

Chapter 6. Multibiometrics

Chapter 6. Multibiometrics 148 Chapter 6 Multibiometrics 149 Chapter 6 Multibiometrics In the previous chapters information integration involved looking for complementary information present in a single biometric trait, namely,

More information

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of

More information

FINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY

FINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY FINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY M. POULOS Dept. of Informatics University of Piraeus, P.O. BOX 96, 49100 Corfu, Greece

More information

BIOMETRIC TECHNOLOGY: A REVIEW

BIOMETRIC TECHNOLOGY: A REVIEW International Journal of Computer Science and Communication Vol. 2, No. 2, July-December 2011, pp. 287-291 BIOMETRIC TECHNOLOGY: A REVIEW Mohmad Kashif Qureshi Research Scholar, Department of Computer

More information

CHAPTER 2 LITERATURE REVIEW

CHAPTER 2 LITERATURE REVIEW 9 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION In this chapter the literature available within the purview of the objectives of the present study is reviewed and the need for the proposed work is discussed.

More information

Verifying Fingerprint Match by Local Correlation Methods

Verifying Fingerprint Match by Local Correlation Methods Verifying Fingerprint Match by Local Correlation Methods Jiang Li, Sergey Tulyakov and Venu Govindaraju Abstract Most fingerprint matching algorithms are based on finding correspondences between minutiae

More information

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric

More information

A HIERARCHICAL FINGERPRINT MATCHING SYSTEM

A HIERARCHICAL FINGERPRINT MATCHING SYSTEM A HIERARCHICAL FINGERPRINT MATCHING SYSTEM A thesis submitted in partial fulfillment of the requirements for the degree of Bachelor-Master of Technology (Dual) by ABHISHEK RAWAT to the Department of Computer

More information

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 10. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Biometrics Identify a person based on physical or behavioral characteristics scanned_fingerprint = capture();

More information

Biometric quality for error suppression

Biometric quality for error suppression Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?

More information

Computer Security 4/15/18

Computer Security 4/15/18 Biometrics Identify a person based on physical or behavioral characteristics Computer Security 10. Biometric authentication scanned_fingerprint = capture(); if (scanned_fingerprint == stored_fingerprint)

More information

PCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO

PCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Combined Fingerprint Minutiae Template Generation

Combined Fingerprint Minutiae Template Generation Combined Fingerprint Minutiae Template Generation Guruprakash.V 1, Arthur Vasanth.J 2 PG Scholar, Department of EEE, Kongu Engineering College, Perundurai-52 1 Assistant Professor (SRG), Department of

More information

Secure and Private Identification through Biometric Systems

Secure and Private Identification through Biometric Systems Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant

More information

Biometrics- Fingerprint Recognition

Biometrics- Fingerprint Recognition International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint

More information

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS Emil PRICOP Petroleum-Gas University of Ploiesti, emil.pricop@gmail.com Keywords: fingerprint, RFID, access control, biometric,

More information

FM Model Based Fingerprint Reconstruction from Minutiae Template

FM Model Based Fingerprint Reconstruction from Minutiae Template FM Model Based Fingerprint Reconstruction from Minutiae Template Jianjiang Feng and Anil K. Jain Department of Computer Science and Engineering Michigan State University {jfeng,jain}@cse.msu.edu Abstract.

More information

Fingerprint Verification applying Invariant Moments

Fingerprint Verification applying Invariant Moments Fingerprint Verification applying Invariant Moments J. Leon, G Sanchez, G. Aguilar. L. Toscano. H. Perez, J. M. Ramirez National Polytechnic Institute SEPI ESIME CULHUACAN Mexico City, Mexico National

More information

Human Identification Using Biometry

Human Identification Using Biometry Human Identification Using Biometry by Marco César Chaul, CBP. CIO/CEO Neokoros - Brasil CBP Certified Biometric Professional. Fundamentals of Biometrics Biometry Definition Generic therm that describes

More information

Minutiae Triplet-based Features with Extended Ridge Information for Determining Sufficiency in Fingerprints

Minutiae Triplet-based Features with Extended Ridge Information for Determining Sufficiency in Fingerprints Minutiae Triplet-based Features with Extended Ridge Information for Determining Sufficiency in Fingerprints Kevin Hoyle Thesis submitted to the faculty of the Virginia Polytechnic Institute and State University

More information

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication

Tutorial 1. Jun Xu, Teaching Asistant January 26, COMP4134 Biometrics Authentication Tutorial 1 Jun Xu, Teaching Asistant csjunxu@comp.polyu.edu.hk COMP4134 Biometrics Authentication January 26, 2017 Table of Contents Problems Problem 1: Answer the following questions Problem 2: Biometric

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu Except as otherwise noted, the content of this presentation is licensed under the Creative Commons Attribution

More information

Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints

Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints Jianjiang Feng, Soweon Yoon, and Anil K. Jain Department of Computer Science and Engineering Michigan State University {jfeng,yoonsowo,jain}@cse.msu.edu

More information

Analysis and Selection of Features for the Fingerprint Vitality Detection

Analysis and Selection of Features for the Fingerprint Vitality Detection Analysis and Selection of Features for the Fingerprint Vitality Detection Pietro Coli, Gian Luca Marcialis, and Fabio Roli Department of Electrical and Electronic Engineering University of Cagliari Piazza

More information

Keywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake

Keywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A novel approach

More information

Information Security Identification and authentication. Advanced User Authentication III

Information Security Identification and authentication. Advanced User Authentication III Information Security Identification and authentication Advanced User Authentication III 2016-02-02 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture II within this part of the course Background

More information

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski

Distributed Systems. Smart Cards, Biometrics, & CAPTCHA. Paul Krzyzanowski Distributed Systems Smart Cards, Biometrics, & CAPTCHA Paul Krzyzanowski pxk@cs.rutgers.edu ds@pk.org Except as otherwise noted, the content of this presentation is licensed under the Creative Commons

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,

More information

Authentication: Beyond Passwords

Authentication: Beyond Passwords HW2 Review CS 166: Information Security Authentication: Beyond Passwords Prof. Tom Austin San José State University Biometrics Biometric Something You Are You are your key ¾ Schneier Examples Fingerprint

More information

Multimodal Biometric Authentication using Face and Fingerprint

Multimodal Biometric Authentication using Face and Fingerprint IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Multimodal Biometric Authentication using Face and Fingerprint Gayathri. R 1 Viji. A 2 1 M.E Student 2 Teaching Fellow

More information

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 09. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 09. Biometric authentication Paul Krzyzanowski Rutgers University Spring 2017 April 17, 2017 CS 419 2017 Paul Krzyzanowski 1 Biometrics Identify a person based on physical or behavioral

More information

A Novel Approach to Improve the Biometric Security using Liveness Detection

A Novel Approach to Improve the Biometric Security using Liveness Detection Volume 8, No. 5, May June 2017 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No. 0976-5697 A Novel Approach to Improve the Biometric

More information

FINGERPRINT BIOMETRICS

FINGERPRINT BIOMETRICS FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...

More information

Biometrics (CSE 40537/60537)

Biometrics (CSE 40537/60537) c Adam Czajka 1/100 Adam Czajka Biometrics and Machine Learning Group Warsaw University of Technology, Poland Fall 2014 University of Notre Dame, IN, USA c Adam Czajka 2/100 Historical background What

More information

Synopsis. An Efficient Approach for Partial Fingerprint Recognition Based on Pores and SIFT Features using Fusion Methods

Synopsis. An Efficient Approach for Partial Fingerprint Recognition Based on Pores and SIFT Features using Fusion Methods Synopsis An Efficient Approach for Partial Fingerprint Recognition Based on Pores and SIFT Features using Fusion Methods Submitted By Mrs.S.Malathi Supervisor Dr(Mrs.) C.Meena Submitted To Avinashilingam

More information

Fingerprint Matching Using Minutiae-Singular Points Network

Fingerprint Matching Using Minutiae-Singular Points Network , pp. 375-388 http://dx.doi.org/1.14257/ijsip.215.8.2.35 Fingerprint Matching Using Minutiae-Singular Points Network Iwasokun Gabriel Babatunde Department of Computer Science Federal University of Technology,

More information

Fingerprint Image Enhancement Algorithm and Performance Evaluation

Fingerprint Image Enhancement Algorithm and Performance Evaluation Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,

More information

Advanced Touchless Biometric Identification using SIFT Features

Advanced Touchless Biometric Identification using SIFT Features Advanced Touchless Biometric Identification using SIFT Features H.Abubacker Siddique PG Scholar, Department of CSE National College of Engineering Tirunelveli, Tamilnadu, India. ahamedabdul786@gmail.com

More information

Fingerprint Recognition System for Low Quality Images

Fingerprint Recognition System for Low Quality Images Fingerprint Recognition System for Low Quality Images Zin Mar Win and Myint Myint Sein University of Computer Studies, Yangon, Myanmar zmwucsy@gmail.com Department of Research and Development University

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

Implementation of Fingerprint Matching Algorithm

Implementation of Fingerprint Matching Algorithm RESEARCH ARTICLE International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar Apr 2016 Implementation of Fingerprint Matching Algorithm Atul Ganbawle 1, Prof J.A. Shaikh 2 Padmabhooshan

More information

Fingerprint Identification System Based On Neural Network

Fingerprint Identification System Based On Neural Network Fingerprint Identification System Based On Neural Network Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI & Embedded Systems), Vishwabharati Academy s College of Engineering, Ahmednagar (MS), India

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Minutiae Points Extraction using Biometric Fingerprint- Enhancement Vishal Wagh 1, Shefali Sonavane 2 1 Computer Science and Engineering Department, Walchand College of Engineering, Sangli, Maharashtra-416415,

More information

Fingerprint Verification System

Fingerprint Verification System Fingerprint Verification System Extended Abstract of a B.Tech. Project By Mr. Jagdeep Kumar, Mr. Tsering Wangdus, Mr. Vipin Sachdeva Supervisor Dr. Rajeev Srivastava Abstract Fingerprints are the oldest

More information

Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control

Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control Fatai Olawale W. Department of Computer Science University of Ilorin, Ilorin, Kwara State Oluwade Bamidele A. Department

More information

Classification of Fingerprint Images

Classification of Fingerprint Images Classification of Fingerprint Images Lin Hong and Anil Jain Department of Computer Science, Michigan State University, East Lansing, MI 48824 fhonglin,jaing@cps.msu.edu Abstract Automatic fingerprint identification

More information

SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION

SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION SECURE INTERNET VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION 1 Shiv Kumar Tripathi, 2 Anshul Maheshwari Computer Science & Engineering Babu Banarasi Das Institute of Engineering Technology & Research

More information

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT

MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 111-115 MULTIMODAL BIOMETRICS IN IDENTITY MANAGEMENT A. Jaya Lakshmi 1, I. Ramesh Babu 2,

More information

Genetic Algorithm For Fingerprint Matching

Genetic Algorithm For Fingerprint Matching Genetic Algorithm For Fingerprint Matching B. POORNA Department Of Computer Applications, Dr.M.G.R.Educational And Research Institute, Maduravoyal, Chennai 600095,TamilNadu INDIA. Abstract:- An efficient

More information

Ageing Effects in Fingerprint Recognition

Ageing Effects in Fingerprint Recognition Ageing Effects in Fingerprint Recognition Masterthesis submitted by Simon Kirchgasser, BSc Advisor: Univ.-Prof. Dr. Andreas Uhl University of Salzburg Department of Computer Sciences Jakob Haringer Str.

More information

Biometric system for identification and authentication

Biometric system for identification and authentication Biometric system for identification and authentication Foudil Belhadj To cite this version: Foudil Belhadj. Biometric system for identification and authentication. Computer Vision and Pattern Recognition

More information

A New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features

A New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features A New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features R.Josphineleela a, M.Ramakrishnan b And Gunasekaran c a Department of information technology, Panimalar

More information