Beruflich Dokumente
Kultur Dokumente
ABSTRACT
Fingerprint identification of a person is widely used in are still not satisfied in recognizing fingerprint.
all over the world, as there are no two fingerprints However, all fingerprint recognition verification or
like. Authentication and validation of an individual is identification, are eventually based on a well-defined
wel
done with the help of various factors like signature, representation of a fingerprint. The underlying
user-ids
ids and passwords, palm, fingerprint, face, voice, principle of well-defined
defined representation of a
heart-beat,
beat, iris, etc. The fingerprint technique is fingerprint and matching remains the same. The
advantageous for such recognition as compare
compared to verification would be straightforward if the
other techniques. This paper is a brief review in the representation of fingerprints remains the uniqueness
field of fingerprint identification. The aim of this and kept simple [2].
paper is to review various latest minutiae based,
correlation based and other global, local methods for
fingerprint matching and status of succe success of
concurrent methods.
Fig. 2Minutiae
Minutiae points (a) Ridge ending (b) Ridge An identification system can be defined as the one
bifurcation which helps in identifying the individual
individua from many
Some of the advantages of fingerprint identification people available. It generally involves matching
are: high distinctiveness, high permanence, low available biometrics feature like fingerprint with the
potential for fraud and high performance with fingerprints which are already enrolled in the
medium collectively and acceptability. T
The method of database.
identification is suitable for workstation access
control, physical access control, Information system Fingerprint Recognition is the recognition of
control etc. individual using fingerprint. It consists
co of verification
and validation process for fingerprint recognition.
There are various approaches for the fingerprint
recognition are:
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2723
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
features can be easily collected from human body. 4. Sehasnainjot Singh et-al, “Finger Print Fusion
This paper presents a merging technique with Using Daubechies (Db1) Wavelet Transformation
these two biometric features and identifying a & Quality Measures”, 2nd IEEE International
human using cross correlation process. For Conference on Computing for Sustainable Global
experimental authors purposed use of Yale Development (INDIA Com), Pp. 822-826, 2015.
illumination varying cropped face database and
5. R. Priya et-al, “A Novel algorithm for Secure
for finger print they have taken FVC2004,
Internet Banking with finger print recognition”,
DB1_B.zip (4.5MB) - Set "B" of Database 1.
IEEE International Conference on Embedded
Some of the common challenges related with
Systems (ICES), Pp.104-109, Coimbatore, 2014.
fingerprint technology are low quality or degraded
input images, noise reduction, data security related 6. SayakBhowal et-al, “A Case Study of Illumination
issues with fingerprint systems etc. Robust Face & Finger Print Merging
The low quality or distorted fingerprint images are Identification Technique using Cross Correlation”,
perhaps the most common problem. The IEEE International Conference on Emerging
degradation can be of types like natural effects Trends in Communication, Control, Signal
like cuts, bruises etc or it may be appearance of Processing & Computing Applications (C2SPCA),
gaps on ridges or parallel ridge intercepts. The 2013.
fingerprint enhancement techniques not only have 7. Dr. V. Vijayalakshmi et-al, “Finger & Palm print
to enhance the quality of image but at the same based Multi biometric Authentication System with
time, also have to reduce noise. GUI Interface”, IEEE International conference on
Communication & Signal Processing, Pp. 738-
4. CONCLUSION 742, 2013.
The fingerprint identification is one of the oldest and
most common forms of biometric identification. As a 8. Smital D. Patil & Shailaja A. Patil, “Fingerprint
result, it’s a common misconception that fingerprint Recognition Using Minutia Matching”, in
recognition is a completely solved problem. The truth Proceedings of "Conference on Advances in
is, the research on fingerprint recognition never stops Communication & Computing (NCACC'12)”,
due to its complexity and Intractability. Fingerprint 2012.
biometric systems are of minutiae-based and image 9. M. N. ShahZainudin, Radi et-al ., “Face
based. In this paper various algorithms of image based Recognition using Principle Component Analysis
fingerprint authentication systems have been (PCA) & Linear Discriminant Analysis (LDA)”,
described. Although good results have been obtained International Journal of Electrical & Computer
in the image based fingerprint authentication system Sciences, Vol-12, No-05, 2012.
but still a lot of work is required to be done to make
this system fool proof. 10. Vikram Singh & Kalpna Kashyap, “A survey
paper on “hybrid system for finger print
identification”, International Journal of Emerging
REFERENCES
Trends & Technology in Computer Science
1. MuzhirShaban et-al, “Effective Fingerprint (IJETTCS), Volume 1, Issue 4, 2012.
Recognition Approach Based on Double
Fingerprint Thumb”, International Conference on 11. Vaidehi.V, NareshBabu N T, Ponsamuel Mervin.
Current Research in Computer Science and A, Praveen Kumar. S, Velmurugan. S, Balamurali,
Information Technology (ICCIT), Iraq, 2017. Girish Chandra, "Fingerprint Identification Using
Cross Correlation of Field Orientation," Second
2. C. Kauba et-al, “Fingerprint recognition under the International Conference on Advanced Computing
influence of image sensor ageing”, IEEE IET (ICoAC), Pp. 66- 69, 2010.
journal International Workshop on Biometrics and
Forensics (IWBF), 2017. 12. Ashwini R. Patil, Mukesh A. Zaveri, “Novel
Approach for Fingerprint Matching using
3. U.M. Tomar et-al, “Fingerprint Recognition by Minutiae”, in Fourth Asia IEEE International
Hybrid Optimization Based On Minutaies Conference on Mathematical/Analytical Modeling
Distance and Pattern Matching”, International and Computer Simulation, 2010.
conference on Signal Processing, Communication,
Power and Embedded System (SCOPES)-2016.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2724
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
13. J. A. Carrasco-Ochoa et al. (Eds.): “Fingerprint Representation of a Minutiae Set Proceedings of
verification with Non-linear Composite Biometrics, Pp. 1-6, June 2008.
Correlation Filters ,” MCPR 2010, LNCS 6256,
22. K. Nallaperumall, A. L. Fred and S. Padmapriya,
pp. 90–97, Springer-Verlag Berlin Heidelberg,
“A Novel for Fingerprint Feature Extraction Using
2010.
Fixed Size Templates”, IEEE 2005 Conference,
14. S. L. de O. Gonzaga, “A Method for Fingerprint Pp. 371-374, 2005.
Image Identification Based on Gabor Filter and
23. P. Komarinski, P. T. Higgins, and K. M. Higgins,
Power Spectrum”, 2010.
K. Fox Lisa , “Automated Fingerprint
15. R. N. Rodrigues, L. L. Ling, and V. Govindarju, “: Identification Systems (AFIS)”, Elsevier
Robustness of Multimodal Biometric Fusion Academic Press, pp. 1-118, 2005.
methods against Spoof Attacks,” Journal of Visual
24. S M Mohsen, S M Zamshed Farhan and M MA
Languages Communication, vol. 20, no. 3, pp.
Hashem, “Automated Fingerprint Recognition:
169–179, 2009.
Using Minutiae Matching Technique for the Large
16. A. Nagar and A. K. Jain, “On the Security of Non- Fingerprint Database”, 3rd IEEE International
invertible Finger Print Template Transforms,” Conference on Electrical & Computer
Proceedings of IEEE Workshop on Information Engineering (ICECE), Pp. 28-30, 2004.
Forensic sand Security, London, U.K, 2009.
25. D. Maltoni, D. Maio, and A. Jain, S. Prabhakar,
17. Haiyun Xu, Raymond N. J. Veldhuis, Tom A. M. “4.3: Minutiae-based Methods‟ (extract) from
Kevenaar and Ton A. H. M. Akkermans, “A Fast Handbook of Fingerprint Recognition”, Springer,
Minutiae-Based Fingerprint Recognition System” New York, Pp. 141-144, 2003.
in IEEE Systems Journal, Vol.3, No.4, Pp. 418-
26. Salil Prabhakar, Anil K Jain and Sharath Pankanti,
427, 2009.
“Learning fingerprint minutiae location and type”,
18. Ravi. J, K. B. Raja, Venugopal K. R, “Fingerprint Pattern recognition, Pp. 1847-1857, 2003.
Recognition Using Minutia Score Matching”,
27. Lin Hong, Student Member, IEEE, Yifei Wan,
International Journal of Engineering Science and
and Anil Jain, “Fingerprint Image Enhancement:
Technology Vol.1 (2), Pp. 35-42, 2009.
Algorithm and Performance Evaluation” IEEE
19. D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar,
Transactions on Pattern Analysis And Machine
"Handbook of Fingerprint Recognition (Second
Intelligence, Vol. 20, Pp. 777-787, 1998.
Edition)," Springer, London, 2009.
28. D. Maio, and D. Maltoni, “Direct gray-scale
20. A. Jain, K. Nandakumar, and A. Nagar, “
minutiae detection in fingerprints”, IEEE
Biometric Template Security EURASIP Journal
Transactions Pattern Analysis and Machine
on Advance Signal Processing vol.4, 2008.
Intelligence, vol. 19(1), Pp. 27-40, 1997.
21. H. Xu, R. Veldhuis, T. Kevenaar, A. Akkermans,
and A. Bazen, “ Spectral Minutiae A Fixed Length
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 2725