Sie sind auf Seite 1von 5

International Journal of Trend in Scientific

Research and Development (IJTSRD)


International Open Access Journal
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3

Overview of Biometric Fingerprint Identification


Mradula Jain1, Anshul Khurana2
1
Scholar, 2Assistant Professor & Guide
Research Scholar
Shri Ram Institute of Technology, Jabalpur
Jabalpur, Madhya Pradesh, India

ABSTRACT
Fingerprint identification of a person is widely used in are still not satisfied in recognizing fingerprint.
all over the world, as there are no two fingerprints However, all fingerprint recognition verification or
like. Authentication and validation of an individual is identification, are eventually based on a well-defined
wel
done with the help of various factors like signature, representation of a fingerprint. The underlying
user-ids
ids and passwords, palm, fingerprint, face, voice, principle of well-defined
defined representation of a
heart-beat,
beat, iris, etc. The fingerprint technique is fingerprint and matching remains the same. The
advantageous for such recognition as compare
compared to verification would be straightforward if the
other techniques. This paper is a brief review in the representation of fingerprints remains the uniqueness
field of fingerprint identification. The aim of this and kept simple [2].
paper is to review various latest minutiae based,
correlation based and other global, local methods for
fingerprint matching and status of succe success of
concurrent methods.

Keywords: Fingerprint Identification, Fingerprint


Biometrics, fingerprint Enhancement. Fig. 1Fingerprint
Fingerprint image
Fingerprint is one of the important and most widely
1. INTRODUCTION used biometric systems in the modern automated
Fingerprint identification of a person is widely used in world where machines are replacing the human in
all over the world, As there are no two fingerprints almost every aspect of life. Automatic fingerprint
like. It is used in forensic science, commercial and authentication systems can be broadly classified into
non-commercial
commercial organization for check the two categories [3].
unauthorized entry of the person and also other type 1. Minutiae based systems
of criminal detection. It is very much key point of bio- 2. Patter (Image) based systems
metric base human recognition [1.7]. A fingerprint is
comprised of ridges and valleys. The ridges are the Minutiae based fingerprint authentication systems are
dark area of the fingerprint and the valleys are the widely used by both human experts and machines.
white area in case of black and white image that exists These systems usually rely on “local discontinuities in
between the ridges (lines). The biometric features are the ridge flow pattern” called minutiae. According to
consists of anatomical (fingerprints, palm, face, iris, the empirical study, two individuals will not have
etc.) and behavioural characteristics (voice, heart
heart- more than seven common minutiae [4, 5]. The set of
beat, etc.) [1]. Fingerprint identification is popular minutiae are restricted into two types Ridge endings
among them because of the inherent ease in and Ridge bifurcations. Ridge endings are the points
acquisition. For a long time, researchers had come up where the ridge curve urve terminates, and ridge
with many approached identify and verify a bifurcations are the points where a ridge splits from a
fingerprint.
gerprint. Although the position, type of minutiae, single path to two paths at a Y-junction
Y as shown in
ridges and many other parameters are used, the results Figure 1. The positions and angular orientations of

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr


Apr 2018 Page: 2721
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
2456
these points within a fingerprint uniquely characterize memory requirement is more. But these algorithms
the fingerprint. are computationally more efficient because they can
be directly applied to the gray scale fingerprint image
without or very less pre-processing.
processing.

Fig. 2Minutiae
Minutiae points (a) Ridge ending (b) Ridge An identification system can be defined as the one
bifurcation which helps in identifying the individual
individua from many
Some of the advantages of fingerprint identification people available. It generally involves matching
are: high distinctiveness, high permanence, low available biometrics feature like fingerprint with the
potential for fraud and high performance with fingerprints which are already enrolled in the
medium collectively and acceptability. T
The method of database.
identification is suitable for workstation access
control, physical access control, Information system Fingerprint Recognition is the recognition of
control etc. individual using fingerprint. It consists
co of verification
and validation process for fingerprint recognition.
There are various approaches for the fingerprint
recognition are:

A. Minutiae Based [6]: In this approach, minutiae are


extracted from fingerprint image. Before extraction of
minutiae,
nutiae, some operations are performed on it.
Minutiae are used for recognising an individual.

B. Frequency Content and Ridge Orientation [6]: In


Fig 3. Types of Fingerprint Patterns
this approach, Gabor filter is used for fingerprint
enhancement in fingerprint recognition. Some
The uniqueness of fingerprint is determined by global
operations are performed as the minutiae based
features like valleys and ridges, and by local features
approach.
like ridge endings and ridge bifurcations, which are
called minutiae.
C. Filter Bank based Algorithm [7]: The Filter Bank-
based algorithm uses a bank of Gabor filters to
2. IMAGE BASED FINGERPRINT
capture both local and global information in a
AUTHENTICATION SYSTEM
fingerprint as a compact fixed length Finger Code,
In image based fingerprint authentication system the
which is suitable for matching and storage [7].
fingerprint image itself is used as a template or
reference image and the intensity values at each and
every point of this template are compared with the 3. LITERATURE REVIEW
intensity values of the query image. Depending up upon Fingerprint identification is based upon unique and
the correlation between the intensity values of the two invariant features of fingerprints. Fingerprints are
images the authenticity of the person is determined. graphical flow like ridges present in human fingers
Minutiae based algorithms which depend upon the which are formed during embryonic development,
local discontinuities in the ridge flow pattern and are caused by ridges underneath the skin. According to
used when template size is important as only a small FBI,
BI, the odds of two people sharing the same
part of finger image is required for verification in fingerprints are one in 64,000,000,000. Fingerprints
minutiae based systems. It would be ideal to use these differ even for ten fingers of the same person [8].
algorithms where space restrictions impact the use 1. M. Shaban et-al, al, “Effective Fingerprint
and deployment of biometrics but this type of system Recognition Approach Based on Double
requires high quality of fingerprint
rprint image. Fingerprint Thumb”, International
Internati Conference on
Current Research in Computer Science and
The size of the image required for image based Information Technology (ICCIT), Iraq, 2017.
authentication must be larger as compared to minutiae The aim of this work is to find an efficient
based algorithm. This algorithm requires more of the fingerprint recognition technique. This paper tries
image area to be present during verification. So, the

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr


Apr 2018 Page: 2722
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
to offer a simple high performance approach to This algorithm is executed to reduce the size of
perform fingerprint recognition. This approach overall program complexity with recognition and
based on two main stages; the first one is the real increased the execution speed. The result of
data collection of human fingerprint samples and fingerprint recognition is 99% result and also
the second stage is concentrated on design and achieved 0.4% FAR.
implementation of high performance fingerprint 4. S. Singh et-al, “Finger Print Fusion Using
recognition approach. The implemented approach Daubechies (Db1) Wavelet Transformation &
concentrated on the feature extraction part in Quality Measures”, 2nd IEEE International
which many levels of two dimensional discrete Conference on Computing for Sustainable Global
wavelet transform (2D-DWT) are used to generate Development (INDIA Com), Pp. 822-826, 2015.
high performance feature. This approach is Image Fusion is mechanism that is used to
implemented via mixing the features of both right associate admissible information from a set of
hand thumb and left hand thumb. The results images of same scene into a single image. A
indicate that a good accuracy of recognition is Fused image is more informative, clear, noise free.
obtained by this approach. In this paper Finger prints are used as input to
2. C. Kauba et-al, “Fingerprint recognition under the image fusion mechanism. Daubechies Wavelet
influence of image sensor ageing”, IEEE IET transformation is applied on them. Various fusion
journal International Workshop on Biometrics and rules are applied on wavelet coefficients like
Forensics (IWBF), 2017. mean, add, maximum, minimum. Quality of
In this paper the authors had investigated the fingerprints are being tested using parameters are
impact of these image sensor ageing related pixel PSNR, Average Difference, Entropy, Chi-Square.
defects on the performance of different fingerprint 5. R. Priya et-al, “A Novel algorithm for Secure
(NBIS, Veri Finger, Finger Code and Phase Only Internet Banking with finger print recognition”,
Correlation) recognition systems. Their IEEE International Conference on Embedded
performances are compared against each other to Systems (ICES), Pp.104-109, Coimbatore, 2014.
quantify the differences in the impact. In practice, Now a days, the banking and financial systems
besides image sensor ageing related effects, other have been totally changed due to the environment
influences are also present. As the authors aim to and globalization changes and competition of
evaluate the impact of the defective pixels only, business services (Majid Karimzadeh and
disregarding subject ageing and other external DastgirAlam, 2012). Web Banking or Internet
influences, it is not possible to use real image Banking is used to describe banking transactions
data. Instead, an experimental study utilising an through internet application. But there are many
ageing simulation algorithm introducing hot and security problems like fraudulent websites, fake
stuck pixels is conducted on the FVC2002 and emails from banks, capturing user IDs and
FVC2004 data sets, including tests with different passwords, hacking personal bank accounts and
enoising approaches trying to mitigate the effects steal money etc. To overcome these problems, this
of image sensor ageing while maintaining the research paper gives a solution through novel
baseline recognition accuracy. algorithm with finger print recognition.
3. U.M. Tomar et-al, “Fingerprint Recognition by 6. SayakBhowal et-al, “A Case Study of Illumination
Hybrid Optimization Based On Minutaies Robust Face & Finger Print Merging
Distance and Pattern Matching”, International Identification Technique using Cross Correlation”,
conference on Signal Processing, Communication, IEEE International Conference on Emerging
Power and Embedded System (SCOPES)-2016. Trends in Communication, Control, Signal
This paper proposed fingerprint recognition by Processing & Computing Applications (C2SPCA),
containing a very accurate recognized method. 2013.
Here first we calculate enhance binary image by Human face is not a reliable biometric feature for
using morphological and histogram enhancement identification due to several degree of freedoms
method, after that identifies all minutias with like pose, expression, illumination, age, picture
coordinate position. Now we draw a matrix of quality etc whereas finger print is more reliable
minutiae’s distance and calculate hybrid biometric feature for authentication. Besides,
optimization distance by different- 2 distance finger print quality depends on pressing pressure
function and also calculate the stance of image . and sharpness of ridges. These two biometric

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2723
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
features can be easily collected from human body. 4. Sehasnainjot Singh et-al, “Finger Print Fusion
This paper presents a merging technique with Using Daubechies (Db1) Wavelet Transformation
these two biometric features and identifying a & Quality Measures”, 2nd IEEE International
human using cross correlation process. For Conference on Computing for Sustainable Global
experimental authors purposed use of Yale Development (INDIA Com), Pp. 822-826, 2015.
illumination varying cropped face database and
5. R. Priya et-al, “A Novel algorithm for Secure
for finger print they have taken FVC2004,
Internet Banking with finger print recognition”,
DB1_B.zip (4.5MB) - Set "B" of Database 1.
IEEE International Conference on Embedded
Some of the common challenges related with
Systems (ICES), Pp.104-109, Coimbatore, 2014.
fingerprint technology are low quality or degraded
input images, noise reduction, data security related 6. SayakBhowal et-al, “A Case Study of Illumination
issues with fingerprint systems etc. Robust Face & Finger Print Merging
The low quality or distorted fingerprint images are Identification Technique using Cross Correlation”,
perhaps the most common problem. The IEEE International Conference on Emerging
degradation can be of types like natural effects Trends in Communication, Control, Signal
like cuts, bruises etc or it may be appearance of Processing & Computing Applications (C2SPCA),
gaps on ridges or parallel ridge intercepts. The 2013.
fingerprint enhancement techniques not only have 7. Dr. V. Vijayalakshmi et-al, “Finger & Palm print
to enhance the quality of image but at the same based Multi biometric Authentication System with
time, also have to reduce noise. GUI Interface”, IEEE International conference on
Communication & Signal Processing, Pp. 738-
4. CONCLUSION 742, 2013.
The fingerprint identification is one of the oldest and
most common forms of biometric identification. As a 8. Smital D. Patil & Shailaja A. Patil, “Fingerprint
result, it’s a common misconception that fingerprint Recognition Using Minutia Matching”, in
recognition is a completely solved problem. The truth Proceedings of "Conference on Advances in
is, the research on fingerprint recognition never stops Communication & Computing (NCACC'12)”,
due to its complexity and Intractability. Fingerprint 2012.
biometric systems are of minutiae-based and image 9. M. N. ShahZainudin, Radi et-al ., “Face
based. In this paper various algorithms of image based Recognition using Principle Component Analysis
fingerprint authentication systems have been (PCA) & Linear Discriminant Analysis (LDA)”,
described. Although good results have been obtained International Journal of Electrical & Computer
in the image based fingerprint authentication system Sciences, Vol-12, No-05, 2012.
but still a lot of work is required to be done to make
this system fool proof. 10. Vikram Singh & Kalpna Kashyap, “A survey
paper on “hybrid system for finger print
identification”, International Journal of Emerging
REFERENCES
Trends & Technology in Computer Science
1. MuzhirShaban et-al, “Effective Fingerprint (IJETTCS), Volume 1, Issue 4, 2012.
Recognition Approach Based on Double
Fingerprint Thumb”, International Conference on 11. Vaidehi.V, NareshBabu N T, Ponsamuel Mervin.
Current Research in Computer Science and A, Praveen Kumar. S, Velmurugan. S, Balamurali,
Information Technology (ICCIT), Iraq, 2017. Girish Chandra, "Fingerprint Identification Using
Cross Correlation of Field Orientation," Second
2. C. Kauba et-al, “Fingerprint recognition under the International Conference on Advanced Computing
influence of image sensor ageing”, IEEE IET (ICoAC), Pp. 66- 69, 2010.
journal International Workshop on Biometrics and
Forensics (IWBF), 2017. 12. Ashwini R. Patil, Mukesh A. Zaveri, “Novel
Approach for Fingerprint Matching using
3. U.M. Tomar et-al, “Fingerprint Recognition by Minutiae”, in Fourth Asia IEEE International
Hybrid Optimization Based On Minutaies Conference on Mathematical/Analytical Modeling
Distance and Pattern Matching”, International and Computer Simulation, 2010.
conference on Signal Processing, Communication,
Power and Embedded System (SCOPES)-2016.

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2724
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
13. J. A. Carrasco-Ochoa et al. (Eds.): “Fingerprint Representation of a Minutiae Set Proceedings of
verification with Non-linear Composite Biometrics, Pp. 1-6, June 2008.
Correlation Filters ,” MCPR 2010, LNCS 6256,
22. K. Nallaperumall, A. L. Fred and S. Padmapriya,
pp. 90–97, Springer-Verlag Berlin Heidelberg,
“A Novel for Fingerprint Feature Extraction Using
2010.
Fixed Size Templates”, IEEE 2005 Conference,
14. S. L. de O. Gonzaga, “A Method for Fingerprint Pp. 371-374, 2005.
Image Identification Based on Gabor Filter and
23. P. Komarinski, P. T. Higgins, and K. M. Higgins,
Power Spectrum”, 2010.
K. Fox Lisa , “Automated Fingerprint
15. R. N. Rodrigues, L. L. Ling, and V. Govindarju, “: Identification Systems (AFIS)”, Elsevier
Robustness of Multimodal Biometric Fusion Academic Press, pp. 1-118, 2005.
methods against Spoof Attacks,” Journal of Visual
24. S M Mohsen, S M Zamshed Farhan and M MA
Languages Communication, vol. 20, no. 3, pp.
Hashem, “Automated Fingerprint Recognition:
169–179, 2009.
Using Minutiae Matching Technique for the Large
16. A. Nagar and A. K. Jain, “On the Security of Non- Fingerprint Database”, 3rd IEEE International
invertible Finger Print Template Transforms,” Conference on Electrical & Computer
Proceedings of IEEE Workshop on Information Engineering (ICECE), Pp. 28-30, 2004.
Forensic sand Security, London, U.K, 2009.
25. D. Maltoni, D. Maio, and A. Jain, S. Prabhakar,
17. Haiyun Xu, Raymond N. J. Veldhuis, Tom A. M. “4.3: Minutiae-based Methods‟ (extract) from
Kevenaar and Ton A. H. M. Akkermans, “A Fast Handbook of Fingerprint Recognition”, Springer,
Minutiae-Based Fingerprint Recognition System” New York, Pp. 141-144, 2003.
in IEEE Systems Journal, Vol.3, No.4, Pp. 418-
26. Salil Prabhakar, Anil K Jain and Sharath Pankanti,
427, 2009.
“Learning fingerprint minutiae location and type”,
18. Ravi. J, K. B. Raja, Venugopal K. R, “Fingerprint Pattern recognition, Pp. 1847-1857, 2003.
Recognition Using Minutia Score Matching”,
27. Lin Hong, Student Member, IEEE, Yifei Wan,
International Journal of Engineering Science and
and Anil Jain, “Fingerprint Image Enhancement:
Technology Vol.1 (2), Pp. 35-42, 2009.
Algorithm and Performance Evaluation” IEEE
19. D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar,
Transactions on Pattern Analysis And Machine
"Handbook of Fingerprint Recognition (Second
Intelligence, Vol. 20, Pp. 777-787, 1998.
Edition)," Springer, London, 2009.
28. D. Maio, and D. Maltoni, “Direct gray-scale
20. A. Jain, K. Nandakumar, and A. Nagar, “
minutiae detection in fingerprints”, IEEE
Biometric Template Security EURASIP Journal
Transactions Pattern Analysis and Machine
on Advance Signal Processing vol.4, 2008.
Intelligence, vol. 19(1), Pp. 27-40, 1997.
21. H. Xu, R. Veldhuis, T. Kevenaar, A. Akkermans,
and A. Bazen, “ Spectral Minutiae A Fixed Length

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2725

Das könnte Ihnen auch gefallen