SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
Computer Engineering and Intelligent Systems                                                           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.5, 2012


   Detection of Singular Points from Fingerprint Images Using an
                       Innovative Algorithm
                                 Vyankatesh P. Kharat*, Sumedh S. Khodwe
            Jawaharalal Darda Institute of Engineering and Technology Yavatmal, Maharashtra, India
                                       *
                                         E-mail: vickynkharat@gmail.com

Abstract
Fingerprint scrutiny is typically based on the location and pattern of detected singular points in the images.
These singular points (cores and deltas) not only represent the characteristics of local ridge patterns but also
determine the topological structure (i.e., fingerprint type) and largely influence the orientation field. In this
report, there is an innovative algorithm for singular points detection. After an initial detection using the
conventional Poincare Index method, a so-called DORIVAC feature is used to remove spurious singular points.
Then, the optimal combination of singular points is selected to minimize the difference between the original
orientation field and the model-based orientation field reconstructed using the singular points. A core-delta
relation is used as a global constraint for the final selection of singular points.
Keywords: Orientation field, Poincare´ Index, Singular points, topological structure.

1. Introduction
Fingerprint is the pattern of ridges and valleys on the surface of a fingertip. The ridges are black and the valleys
are white. Its orientation field is defined as the local orientation the ridge-valley structures. The minutiae are
defined as ridge endings and bifurcations. The singular points can be viewed as points where the orientation field
is discontinuous, which can be classified into two types: core and delta. Fig. 1 lists five typical types of
fingerprints with singular points noticeable. As an important topological characteristic for fingerprints, singular
points can be used for fingerprint indexing (i.e., classification for fingerprint types) as well as for fingerprint
arrangement and orientation field modeling and so forth.
Several previous works have addressed singular point detection and analysis in fingerprint images. They can be
approximately classified into two groups.
The first approach is mainly based on using the Poincare´ Index to consider the irregular orientation distribution
about singular points. This sort of algorithm usually calculates the sum of the orientation changes along a close
circle about the point to judge whether it is a singular point.
The second form of approach uses probability analysis, ridge analysis, shape analysis, or template matching.
Compared with these latter techniques, Poincare´ Index-based detection techniques are generally stronger to
image rotation and relatively easy to compute, so they are more extensively used in real applications.




                                                        66
Computer Engineering and Intelligent Systems                                                                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.5, 2012




Fig 1: Various types of fingerprints with cores (marked with circles) and deltas (marked with triangles). (a) Plain
                          arch. (b) Tented arch. (c) Left loop. (d) Right loop. (e) Whorl

Poincare´ Index-based algorithms usually result in many forged detections (especially for low-quality fingerprint
images), even after post-processing. The forged detected points can greatly degrade the performance of these
algorithms in lots of applications. The forged detections result because 1) the Poincare´ Index feature alone is not
sufficient for accurate singular point detection and 2) most post-processing approaches use only local
characteristic of singular points, which is not enough to discriminate true singular points from forged detections
caused by creases, scars, blurs, damped prints, etc. In the orientation field, some forged detection actually has
almost the same local patterns as true singular points. To accurately distinguish the genuine singular points,
global discriminative information should be incorporated into the detection.
This paper, concentrate on to singular point detection based on an innovative so-called Difference of the
ORIentation Values Along a Circle (DORIVAC) characteristic and global restrictions. Compared with previous
studies, the contributions of this paper lie in the following aspects: 1) Paper is proposed using the DORIVAC
feature for singular point verification, which can provide more discriminative information to get rid of forged
detections and 2) based on an analysis of core-delta relationships, to select the best combination of singular
points by global restrictions. The optimal singular points are selected to minimize the variation between the
detected orientation field and model-based orientation field reconstructed using the singular points.
The rest of this paper is organized as follows: Part II analyses the topological structure of fingerprints. In Part III,
the DORIVAC feature is proposed to remove forged SPs. Part IV discusses how to select the optimal
combination of cores and deltas using global information. Part V finishes with conclusions.


2. Topological Analysis for Fingerprint Structures
2.1 Mathematical Background:

Index of V (u, v) along an arbitrary simple closed path ߛ is defined as
Definition. Let V (u, v) =p (u, v) + i. q (u, v) be a continuous 2-dimensional vector field. Then, the Poincare´


                                            ‫ܫ‬ሺߛሻ ൌ     ‫׬‬        ݀∅ሺ‫ݒ ,ݑ‬ሻ 																																																																													ሺ1ሻ
                                                      ଵ 	
                                                     ଶగ ሺ௨,௩ሻ∈ఊ




                                                                67
Computer Engineering and Intelligent Systems                                                                                          www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.5, 2012

where ∅ሺ‫ݒ ,ݑ‬ሻ ൌ arg ܸሺ‫ݒ ,ݑ‬ሻ is the angle at point (u, v) and ∅ ∈ ሾ0,2ߨሻ. The integration is taken anticlockwise
along ߛ.

find whether P is a singular point ሺ‫0 ് ܫ‬ሻ or a common pointሺ‫ ܫ‬ൌ 0ሻ.
The Poincare´ Index is always an integer. By computing I beside a simple closed circle around a point P, one can



singular points inside are indicated by the circles,ሼߛ௞ |݇ ൌ 1,2,3 … ሽ. C is a simple closed path inside . Two
Suppose that an area has an exterior boundary, ГExt, and an interior boundary, ГInt , as shown in Fig. 2. The

important properties of the Poincare´ Index can be formulated as follows and their evidence can be derived from
Complex Function Theory.




   Fig. 2. Region       with its boundary ߲ߗ ൌ Γா௫௧ ∪ 	 Γூ௡௧ 		ሼߛ௜ , ݅ ൌ 1,2,3, ሽ are the circles around the singular
                                    points inside . C is a simple closed path in .


Property 1. The Poincare´ Index along the boundary of a given area is equal to the sum of the Poincare´ Indices

                                                 ∑	௞ ‫ܫ‬ሺߛ௞ ሻ ൌ ‫ܫ‬ሺΓா௫௧ ሻ െ ‫ܫ‬ሺΓூ௡௧ ሻ																																																																			ሺ2ሻ
of the singular points inside this area, i.e.


Property 2. If two simple closed paths are homotopic, and there are no other singular points between them, their
Poincare´ Indices are the same. For example, I(C) = I (ΓExt), in Fig. 2.


2.2 Analysis of Fingerprint Images:
For oriented texture images, such as fingerprints and fluid flow, it is natural to establish their connection with
2-dimensional topology theory. This can relate the above definitions and properties on these images. The
singular points in fingerprints are found to be steady with the singular points defined in topology. In Fig. 3, we
list two typical singular points for fingerprints, their Poincare´ Indices, and their local patterns in the orientation
field O.
A remarkable conclusion for fingerprints can be assumed based on Property 1. Since fingerprints usually do not
have interior boundary ΓInt and only have isolated singular points (cores and deltas) with known Poincare´ index

                                                    ܰ௖௢௥௘௦ െ 	 ܰௗ௘௟௧௔௦ 	 ൌ ‫ܫ‬ሺΓா௫௧ ሻ																																																																		ሺ3ሻ
(+1 for core, -1 for delta), (2) can be written as


where Ncores is the number of the cores, Ndeltas is the number of the deltas, and ГExt is the exterior boundary of the
fingerprint.




                                                                  68
Computer Engineering and Intelligent Systems                                                               www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.5, 2012




  Fig. 3. (a) Singular points in fingerprints with the Poincare´ Indices, (b) their local patterns in the orientation
                                         field O, and (c) the vector field V.


Earlier works have pointed out that cores and deltas should appear in pairs. Two views of actual thumb are
shown as an example in Figs. 4a and 4b with the cores and the deltas marked. For the simple closed path ГExt
consisting of this kind of boundaries, I (ГExt) = 0, and then Ncores = Ndeltas.




           Fig. 4. (a) Left and (b) right views of a real thumb with singular points and boundary marked.


As for Property 2, we know that the Poincare´ Index can be calculated along any simple closed path as long as it
is homotopic with the closed circle around the same points. This allows to adaptively choose the integral path for
the boundary, for example, to choose the path where the orientation confidence is much higher.

3. Using DORIVAC Feature to Remove Forged Singular Points

3.1 DORIVAC Feature:
Many earlier researchers have shown that Poincare´ Index-based methods can usually detect nearly all true
singular points when the Index is calculated along small area boundaries, but this also guides to much forged
detection. If a bigger area is chosen, true singular points will be easy to miss. In order to get rid of forged
detections while conserving a good detection rate, an innovative feature is advised here extended from the
Poincare´ Index, which can provide more perceptive features and be used to confirm the trueness of each finding
after using Poincare´ Index algorithm.
The Poincare´ Index is defined as the sum of the orientation differences beside a closed ring L. For a given point
P, suppose that the set of sampled points along L is {T1; T2; T3; . . . ; TN-1} and oi is the orientation of point Ti.
Then, the Poincare´ Index of P can be computed by

                                                              ேିଵ
                                                             1
                                                 ‫ 					݌ܫ‬ൌ     ෍ ݂ሺ‫݋‬௜ାଵ െ ‫݋‬௜ ሻ
                                                             ߨ
                                                               ௜ୀ௜
                                                                                                                     (4)


                                                                69
Computer Engineering and Intelligent Systems                                                                                                www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.5, 2012

                                                                     ேିଵ
                                                              1
                                                         				ൌ ෍ ݂ሺߜ‫݋‬௜ ሻ,
                                                              ߨ
                                                                      ௜ୀ௜



                                                                ‫ |ݔ|																					,ݔ‬൑ ,
                                                                                                 గ
                                                            ‫ۓ‬                                    ଶ
                                                 ݂ሺ‫ݔ‬ሻ ൌ 	           ߨ െ ‫ ݔ											,ݔ‬൐ , 																																																																ሺ5ሻ
                                                                                             గ

                                                            ‫۔‬                           ଶ

                                                            ‫ ߨە‬൅ ‫ ݔ													,ݔ‬൏ െ ଶ ,
                                                                                      గ


The Poincare´ Index is only the sum ofߜ‫݋‬௜ . It contains no information about the arrangement of ߜ‫݋‬௜ , ݅ ൌ
1,2,3, … . , ܰ െ 1,	and it cannot explain the singular point fully. So, when there are creases, scars, smudges, or
damped prints in the fingerprint images, the Poincare´ Index method will easily outcome in many forged singular
points. Post-processing steps are therefore frequently essential. In this paper, two simple set of laws are used
through post-processing:
1) If a delta is too close to a core (the distance between them is smaller than 8 pixels), eradicate both of them as
well as
2) In a very small area (a circular region with a radius of 8 pixels), if there is more than one core (or delta), an

Suppose that there are N cores (or deltas) in such a area, ሼሺ‫ݒ ,ݑ‬௜ ሻ, ݅ ൌ 1,2, … . ܰሽ Then, the average core (or
average core (or delta) can be calculated instead.

delta) (u, v) is calculated by
                                                                ே
                                                      1
                                                   ‫ ݑ‬ൌ ෍ ‫ݑ‬௜ 																																																																																																ሺ6ሻ
                                                      ܰ
                                                              ௜ୀଵ


                                                                ே
                                                       1
                                                    ‫ ݒ‬ൌ ෍ ‫ݒ‬௜ 																																																																																															ሺ7ሻ
                                                       ܰ
                                                               ௜ୀଵ
However, even after this post-processing step, much forged detection still remains. Fig. 5 shows two examples
from a cheap-quality fingerprint, illustrating points that are wrongly detected as a core and a delta by using the
Poincare´ Index method and this post-processing.
In order to additional remove the forged points, an innovative characteristic is used, which contains more
information about the singular point. The characteristic on point P, which consists of the DORIVAC about P,

                                         DORIVAC (P) = ሾߜ‫݋‬ଵ , ߜ‫݋‬ଶ , … . ߜ‫݋‬ேିଵ ሿ
i.e.,
                                                                                                                                                          (8)




Fig. 5. Two examples of forged singular points detected using a conventional Poincare´ Index-based method and
    post-processing steps, in which the false core is marked with a circle and the false delta is marked with a
                                                      triangle.




                                                                      70
Computer Engineering and Intelligent Systems                                                             www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.5, 2012

As DORIVAC contains allߜ‫݋‬௜ , it can illustrate the singular point more absolutely. The Poincare´ Index can be
seen as the summation of DORIVAC features and DORIVAC features can be considered as an extended form of
Poincare´ Index. Fig. 6 shows six singular points detected by the Poincare´ Index method and their DORIVAC
features are plotted as curves (among them, Figs. 6a, 6b, 6c, and 6d are true and Figs. 6e and 6f are forged
detections).




Fig. 6. Singular points detected by using the Poincare´ Index algorithm and their DORIVAC features (plotted as
                         curves): (a), (b), (c), and (d) are true while (e) and (f) are forged.


Since the orientation field is defined in [0, π), there will be one DORIVAC feature pulse for each singular point
(positive pulse for core, and negative pulse for delta) if the orientation field is detected completely. See Figs. 6a
and 6b for examples. Although the noise around the true singular points may change the curves a little, there
exists a clearly obvious difference between true and forged singular points. These phenomena can be observed in
Fig. 6.
After post-processing steps, the detected singular points are isolated, i.e., there is only one singular point for any
fairly large region. Thus, it is more suitable to calculate the DORIVAC features along a large circle. Then, N can
be a large number, and accordingly, the curves of DORIVAC features will be more continuous.


3.2 Removing Forged Singular Points:
To distinguish true singular points from forged ones, a two-step classifier is projected as below. For each point
with nonzero Poincare´ Index in the applicant set S, the DORIVAC feature is calculated. If there is exactly one
pulse (i.e., positive pulse for core and negative pulse for delta) with the height nearly up to	ߨ, it is a legitimate
singular point and will be kept in the final set S of singular points; otherwise, it will be removed from applicant
set S and placed into an supplementary set S’ of applicants for further processing. This process is outlined in
Algorithm 1.


Algorithm 1:- Pseudo-code of the first step for removing forged SPs


                        DORIVAC (P) =ሾߜ‫݋‬ଵ , ߜ‫݋‬ଶ , … . . , ߜ‫݋‬ேିଵ ሿ;
               1 for each detection point P in S do


                       if ∃! ݇ ∈ ሾ1, ܰ െ 1ሿ, ‫݋ߜ|	ݐ݄ܽݐ‬௞ | ൐ ‫݄݊݁ݐ ,ݐ‬
               2
               3
               4              keep P in S;
               5       end
               6       else
               7              remove P to S´

                                                          71
Computer Engineering and Intelligent Systems                                                              www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.5, 2012

               8       end
               9.       end
The supplementary point set S’ can contain a mixture of true singular point and forged detections. The classifier
is designed, based on training samples to differentiate between the true points (e.g., Figs. 6c and 6d) and the
forged ones (e.g., Figs. 6e and 6f).
Since it is time consuming to physically tag true and forged singular point samples for the training of the
classifier, the taster learning methods are used suitable for small-numbered samples. The Support Vector
Machine (SVM) is chosen to design the classifier. SVMs try to find a best separating hyper-plane in the feature
space and lessen the classification error for the training data using a nonlinear transform function.

The separating hyper-plane is defined by ܽ௜ ሺ݅ ൌ 1,2 … . ܰሻ	and b. In this paper, an optimal b0 is selected to move
In this problem, the missed detection rate (classifying true singular points as forged ones) should be very small.

the separating plane to a suitable position that will misclassify less than 2 percent of true singular points as
forged ones and, meanwhile, decrease the error of classifying forged singular points as true ones.
From the definition of DORIVAC features, it is observed that this vector is sensitive to image rotation. To
prevail over the influence of image rotation, the training set is enlarged by rotating each fingerprint sample
image by 10 degree increments. All of the samples are used for training the SVM classifier to make it insensible
to image rotation.
Based on the SVM result, the decision can be made whether a point P in S’ should be moved back to the final
candidate set S or not. After this two-step classification process, a set of the forged singular points are removed.
For example, Figs. 6e and 6f can be successfully judged as forged singular points while the other four are kept as
true ones.

4. Singular Points Selection with Global Information
As pointed out earlier, local features alone are not enough to fully distinguish the true singular points from
forged detections, which can actually have similar local characteristics as the true ones. This inspires to
incorporate more global discriminative information for detection.

4.1 Removing Invalid Combinations:
The core-delta relation deduced in Part II is used as a global restriction for selecting the best set of final singular
points. In real applications, many fingerprint images captured by optical or capacitive sensors are not complete.
Often they will lose one or two deltas. In this case, the number of cores is not necessarily equal to the number of

region of the fingerprints is . By computing ‫ܫ‬ሺ∂ ሻ,	 we can know that only a few combinations of the
deltas. Nevertheless, (3) still presents us a global topological restriction for singular points. Suppose the effective

singular points are valid. In Table 1, most of the possible combinations of singular points are listed for
fingerprints with the Poincare´ Index and the possible types (PA—plain arch, TA—tented arch, LL—left loop,
RL—right loop, TL—twin loop).
                    Table I. Frequent Combinations of Singular Points in a Complete Fingerprint
        I(ࣔΏሻ                     Core                 Delta                          Possible Types
                                    0                    0                                   PA
           0                        1                    1                               LL,RL,TA
                                    2                    2                               TL,Whorl
                                    1                    0                               LL,RL,TA
           1
                                    2                    1                               TL, Whorl
           2                        2                    0                               TL, Whorl


By calculating the global Poincare´ Index I (߲ߗ) some invalid combinations of singular points can be removed.
For example, when the global Poincare´ Index is equal to 1, the combinations of 1-core-0-delta and
2-core-1-delta are calculated and other situations are not considered. This speeds up the algorithm greatly.




                                                         72
Computer Engineering and Intelligent Systems                                                           www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.5, 2012

4.2 Selection of Optimal Singular Points:
As known, singular points can be used to determine the global structure of the orientation field of fingerprints.
The basic idea is to select the best singular points by decreasing the difference between the original orientation
field and the model-based orientation field rebuilt using the singular points.
Denote the original orientation field as O0 and the rebuilt orientation field as O (Ө.s), where Ө is the model’s
parameter. The original orientation field, O0, is calculated by the hierarchical gradient-based method. As for the
model-based rebuilt orientation field, O(Ө.s), the Zero-Pole model proposed by Sherlock and Monro is choose,
considering both the model accuracy and the computational efficiency.

5. Conclusion
To sum up, the paper is focused on the detection of singular points in fingerprints. The contributions lie in two
aspects. 1) a new feature, DORIVAC, in addition to the Poincare´ Index, which can successfully remove forged
detections and 2) the topological relations of singular points is taken as a global restriction for fingerprints The
optimal singular points can be selected by decreasing the difference between the original orientation field and the
model-based orientation field rebuilt from the singular points.

References
Jie Zhou, Fanglin Chen, and Jinwei Gu; “A Novel Algorithm for Detecting Singular Points from Fingerprint
Images”, IEEE transactions on pattern analysis and machine intelligence, vol. 31, no. 7, july 2009
Maltoni, D. Maio, A.K. Jain, and S. Probhaker, Handbook of Fingerprint Recognition. Springer-Verlag, 2003.
K. Karu and A.K. Jain, “Fingerprint Classification,” Pattern Recognition, vol. 17, no. 3, pp. 389-404, 1996.
Q. Zhang and H. Yan, “Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudo
Ridges,” Pattern Recognition, vol. 37, no. 11, pp. 2233-2243, 2004.
B. Sherlock and D. Monro, “A Model for Interpreting Fingerprint Topology,” Pattern Recognition, vol. 26, no.
7, pp. 1047-1055, 1993.
J. Gu and J. Zhou, “A Novel Model for Orientation Field of Fingerprints,” Proc. IEEE Int’l Conf. Computer
Vision and Pattern Recognition, vol. 2, pp. 493-498, June 2003.
A.K. Jain, S. Prabhakar, and L. Hong, “A Multichannel Approach to Fingerprint Classification,” IEEE Trans.
Pattern Analysis and Machine Intelligence, vol. 21, no. 4, pp. 348-359, Apr. 1999.
M. Tico and P. Kuosmanen, “A Multiresolution Method for Singular Points Detection in Fingerprint Images,”
Proc. IEEE Int’l Symp. Circuits and Systems, vol. 4, pp. 183-186, July 1999.
A.M. Bazen and S.H. Gerez, “Systematic Methods for the Computation of the Directional Fields and Singular
Points of Fingerprints,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 905-919, July
2002.
R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, “Fingerprint Classification by Directional Image Partitioning,”
IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 21, no. 5, pp. 402-421 May 1999.
P. Ramo, M. Tico, V. Onnia, and J. Saarinen, “Optimized Singular Point Detection Algorithm for Fingerprint
Images,” Proc. IEEE Int’l Conf. Image Processing, vol. 3, no. 3, pp. 242-245, Oct. 2001.
C.-H. Park, J.-J. Lee, M.J.T. Smith, and K.-H. Park, “Singular Point Detection by Shape Analysis of Directional
Fields in Fingerprints,” Pattern Recognition, vol. 39, no. 5, pp. 839-855, 2006.
X. Wang, J. Li, and Y. Niu, “Definition and Extraction of Stable Points from Fingerprint Images,” Pattern
Recognition, vol. 40, no. 6, pp. 1804-1815, 2007.
K. Nilsson and J. Bigun, “Complex Filters Applied to Fingerprint Images Detecting Prominent Symmetry Points
Used for Alignment,” Proc. ECCV 2002 Workshop Biometric Authentification, pp. 39-47, 2002.
K. Nilsson, “Symmetry Filters Applied to Fingerprints,” PhD dissertation, Chalmers Univ. of Technology, 2005.
K. Nilsson and J. Bigu¨ n, “Localization of Corresponding Points in Fingerprints by Complex Filtering,” Pattern
Recognition Letters, vol. 24, no. 13, pp. 2135-2144, 2003.
S. Chikkerur and N.K. Ratha, “Impact of Singular Point Detectionon Fingerprint Matching Performance,” Proc.
Fourth IEEE Workshop Automatic Identification Advanced Technologies, pp. 207-212, 2005.
P. Perona, “Orientation Diffusions,” IEEE Trans. Image Processing, vol. 7, no. 3, pp. 457-467, 1998.



                                                        73
Computer Engineering and Intelligent Systems                                                   www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol 3, No.5, 2012

E.B. Saff and A.D. Snider, Fundamentals of Complex Analysis with Applications to Engineering, Science, and
Mathematics, third ed. Prentice Hall, 2002.
C Burges, “A Tutorial on Support Vector Machines for Pattern Recognition,” Data Mining and Knowledge
Discovery, vol. 2, no. 2, pp. 121-167, 1998.
A.K. Jain and L. Hong, “On-Line Fingerprint Verification,” IEEE Trans. Pattern Analysis and Machine
Intelligence, vol. 19, no. 4, pp. 302-314, Apr. 1997.




                                                   74
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.

More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org


The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. Prospective authors of
IISTE journals can find the submission instruction on the following page:
http://www.iiste.org/Journals/

The IISTE editorial team promises to the review and publish all the qualified
submissions in a fast manner. All the journals articles are available online to the
readers all over the world without financial, legal, or technical barriers other than
those inseparable from gaining access to the internet itself. Printed version of the
journals is also available upon request of readers and authors.

IISTE Knowledge Sharing Partners

EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

Weitere ähnliche Inhalte

Ähnlich wie Detection of singular points from fingerprint images using an innovative algorithm

A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowAlexander Decker
 
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...IDES Editor
 
mathpsy2012 poster_Shweta_3(1)
mathpsy2012 poster_Shweta_3(1)mathpsy2012 poster_Shweta_3(1)
mathpsy2012 poster_Shweta_3(1)Shweta Gupte
 
Gupte - first year paper_approved (1)
Gupte - first year paper_approved (1)Gupte - first year paper_approved (1)
Gupte - first year paper_approved (1)Shweta Gupte
 
Open Topology: A Toolkit for Brain Isosurface Correction-776
Open Topology: A Toolkit for Brain Isosurface Correction-776Open Topology: A Toolkit for Brain Isosurface Correction-776
Open Topology: A Toolkit for Brain Isosurface Correction-776Kitware Kitware
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmEditor IJCATR
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...ijfcstjournal
 
Discrete Mathematics in Real Life ppt.pdf
Discrete Mathematics in Real Life ppt.pdfDiscrete Mathematics in Real Life ppt.pdf
Discrete Mathematics in Real Life ppt.pdfrushikeshchaudhari43
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODijwmn
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODijwmn
 
Elastic path2path (International Conference on Image Processing'18)
Elastic path2path (International Conference on Image Processing'18)Elastic path2path (International Conference on Image Processing'18)
Elastic path2path (International Conference on Image Processing'18)TamalBatabyal
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionIJERA Editor
 
Spatially resolved pair correlation functions for point cloud data
Spatially resolved pair correlation functions for point cloud dataSpatially resolved pair correlation functions for point cloud data
Spatially resolved pair correlation functions for point cloud dataTony Fast
 
Time of arrival based localization in wireless sensor networks a non linear ...
Time of arrival based localization in wireless sensor networks  a non linear ...Time of arrival based localization in wireless sensor networks  a non linear ...
Time of arrival based localization in wireless sensor networks a non linear ...sipij
 

Ähnlich wie Detection of singular points from fingerprint images using an innovative algorithm (20)

A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial window
 
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
 
mathpsy2012 poster_Shweta_3(1)
mathpsy2012 poster_Shweta_3(1)mathpsy2012 poster_Shweta_3(1)
mathpsy2012 poster_Shweta_3(1)
 
Gupte - first year paper_approved (1)
Gupte - first year paper_approved (1)Gupte - first year paper_approved (1)
Gupte - first year paper_approved (1)
 
Open Topology: A Toolkit for Brain Isosurface Correction-776
Open Topology: A Toolkit for Brain Isosurface Correction-776Open Topology: A Toolkit for Brain Isosurface Correction-776
Open Topology: A Toolkit for Brain Isosurface Correction-776
 
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris RecognitionComparison of Phase Only Correlation and Neural Network for Iris Recognition
Comparison of Phase Only Correlation and Neural Network for Iris Recognition
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmIris Localization - a Biometric Approach Referring Daugman's Algorithm
Iris Localization - a Biometric Approach Referring Daugman's Algorithm
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
Discrete Mathematics in Real Life ppt.pdf
Discrete Mathematics in Real Life ppt.pdfDiscrete Mathematics in Real Life ppt.pdf
Discrete Mathematics in Real Life ppt.pdf
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHODNONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
NONLINEAR MODELING AND ANALYSIS OF WSN NODE LOCALIZATION METHOD
 
Elastic path2path (International Conference on Image Processing'18)
Elastic path2path (International Conference on Image Processing'18)Elastic path2path (International Conference on Image Processing'18)
Elastic path2path (International Conference on Image Processing'18)
 
New Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral RecognitionNew Approach of Preprocessing For Numeral Recognition
New Approach of Preprocessing For Numeral Recognition
 
Spatially resolved pair correlation functions for point cloud data
Spatially resolved pair correlation functions for point cloud dataSpatially resolved pair correlation functions for point cloud data
Spatially resolved pair correlation functions for point cloud data
 
13 pradeep kumar_137-149
13 pradeep kumar_137-14913 pradeep kumar_137-149
13 pradeep kumar_137-149
 
9.venkata naga vamsi. a
9.venkata naga vamsi. a9.venkata naga vamsi. a
9.venkata naga vamsi. a
 
Time of arrival based localization in wireless sensor networks a non linear ...
Time of arrival based localization in wireless sensor networks  a non linear ...Time of arrival based localization in wireless sensor networks  a non linear ...
Time of arrival based localization in wireless sensor networks a non linear ...
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Detection of singular points from fingerprint images using an innovative algorithm

  • 1. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.5, 2012 Detection of Singular Points from Fingerprint Images Using an Innovative Algorithm Vyankatesh P. Kharat*, Sumedh S. Khodwe Jawaharalal Darda Institute of Engineering and Technology Yavatmal, Maharashtra, India * E-mail: vickynkharat@gmail.com Abstract Fingerprint scrutiny is typically based on the location and pattern of detected singular points in the images. These singular points (cores and deltas) not only represent the characteristics of local ridge patterns but also determine the topological structure (i.e., fingerprint type) and largely influence the orientation field. In this report, there is an innovative algorithm for singular points detection. After an initial detection using the conventional Poincare Index method, a so-called DORIVAC feature is used to remove spurious singular points. Then, the optimal combination of singular points is selected to minimize the difference between the original orientation field and the model-based orientation field reconstructed using the singular points. A core-delta relation is used as a global constraint for the final selection of singular points. Keywords: Orientation field, Poincare´ Index, Singular points, topological structure. 1. Introduction Fingerprint is the pattern of ridges and valleys on the surface of a fingertip. The ridges are black and the valleys are white. Its orientation field is defined as the local orientation the ridge-valley structures. The minutiae are defined as ridge endings and bifurcations. The singular points can be viewed as points where the orientation field is discontinuous, which can be classified into two types: core and delta. Fig. 1 lists five typical types of fingerprints with singular points noticeable. As an important topological characteristic for fingerprints, singular points can be used for fingerprint indexing (i.e., classification for fingerprint types) as well as for fingerprint arrangement and orientation field modeling and so forth. Several previous works have addressed singular point detection and analysis in fingerprint images. They can be approximately classified into two groups. The first approach is mainly based on using the Poincare´ Index to consider the irregular orientation distribution about singular points. This sort of algorithm usually calculates the sum of the orientation changes along a close circle about the point to judge whether it is a singular point. The second form of approach uses probability analysis, ridge analysis, shape analysis, or template matching. Compared with these latter techniques, Poincare´ Index-based detection techniques are generally stronger to image rotation and relatively easy to compute, so they are more extensively used in real applications. 66
  • 2. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.5, 2012 Fig 1: Various types of fingerprints with cores (marked with circles) and deltas (marked with triangles). (a) Plain arch. (b) Tented arch. (c) Left loop. (d) Right loop. (e) Whorl Poincare´ Index-based algorithms usually result in many forged detections (especially for low-quality fingerprint images), even after post-processing. The forged detected points can greatly degrade the performance of these algorithms in lots of applications. The forged detections result because 1) the Poincare´ Index feature alone is not sufficient for accurate singular point detection and 2) most post-processing approaches use only local characteristic of singular points, which is not enough to discriminate true singular points from forged detections caused by creases, scars, blurs, damped prints, etc. In the orientation field, some forged detection actually has almost the same local patterns as true singular points. To accurately distinguish the genuine singular points, global discriminative information should be incorporated into the detection. This paper, concentrate on to singular point detection based on an innovative so-called Difference of the ORIentation Values Along a Circle (DORIVAC) characteristic and global restrictions. Compared with previous studies, the contributions of this paper lie in the following aspects: 1) Paper is proposed using the DORIVAC feature for singular point verification, which can provide more discriminative information to get rid of forged detections and 2) based on an analysis of core-delta relationships, to select the best combination of singular points by global restrictions. The optimal singular points are selected to minimize the variation between the detected orientation field and model-based orientation field reconstructed using the singular points. The rest of this paper is organized as follows: Part II analyses the topological structure of fingerprints. In Part III, the DORIVAC feature is proposed to remove forged SPs. Part IV discusses how to select the optimal combination of cores and deltas using global information. Part V finishes with conclusions. 2. Topological Analysis for Fingerprint Structures 2.1 Mathematical Background: Index of V (u, v) along an arbitrary simple closed path ߛ is defined as Definition. Let V (u, v) =p (u, v) + i. q (u, v) be a continuous 2-dimensional vector field. Then, the Poincare´ ‫ܫ‬ሺߛሻ ൌ ‫׬‬ ݀∅ሺ‫ݒ ,ݑ‬ሻ ሺ1ሻ ଵ ଶగ ሺ௨,௩ሻ∈ఊ 67
  • 3. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.5, 2012 where ∅ሺ‫ݒ ,ݑ‬ሻ ൌ arg ܸሺ‫ݒ ,ݑ‬ሻ is the angle at point (u, v) and ∅ ∈ ሾ0,2ߨሻ. The integration is taken anticlockwise along ߛ. find whether P is a singular point ሺ‫0 ് ܫ‬ሻ or a common pointሺ‫ ܫ‬ൌ 0ሻ. The Poincare´ Index is always an integer. By computing I beside a simple closed circle around a point P, one can singular points inside are indicated by the circles,ሼߛ௞ |݇ ൌ 1,2,3 … ሽ. C is a simple closed path inside . Two Suppose that an area has an exterior boundary, ГExt, and an interior boundary, ГInt , as shown in Fig. 2. The important properties of the Poincare´ Index can be formulated as follows and their evidence can be derived from Complex Function Theory. Fig. 2. Region with its boundary ߲ߗ ൌ Γா௫௧ ∪ Γூ௡௧ ሼߛ௜ , ݅ ൌ 1,2,3, ሽ are the circles around the singular points inside . C is a simple closed path in . Property 1. The Poincare´ Index along the boundary of a given area is equal to the sum of the Poincare´ Indices ∑ ௞ ‫ܫ‬ሺߛ௞ ሻ ൌ ‫ܫ‬ሺΓா௫௧ ሻ െ ‫ܫ‬ሺΓூ௡௧ ሻ ሺ2ሻ of the singular points inside this area, i.e. Property 2. If two simple closed paths are homotopic, and there are no other singular points between them, their Poincare´ Indices are the same. For example, I(C) = I (ΓExt), in Fig. 2. 2.2 Analysis of Fingerprint Images: For oriented texture images, such as fingerprints and fluid flow, it is natural to establish their connection with 2-dimensional topology theory. This can relate the above definitions and properties on these images. The singular points in fingerprints are found to be steady with the singular points defined in topology. In Fig. 3, we list two typical singular points for fingerprints, their Poincare´ Indices, and their local patterns in the orientation field O. A remarkable conclusion for fingerprints can be assumed based on Property 1. Since fingerprints usually do not have interior boundary ΓInt and only have isolated singular points (cores and deltas) with known Poincare´ index ܰ௖௢௥௘௦ െ ܰௗ௘௟௧௔௦ ൌ ‫ܫ‬ሺΓா௫௧ ሻ ሺ3ሻ (+1 for core, -1 for delta), (2) can be written as where Ncores is the number of the cores, Ndeltas is the number of the deltas, and ГExt is the exterior boundary of the fingerprint. 68
  • 4. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.5, 2012 Fig. 3. (a) Singular points in fingerprints with the Poincare´ Indices, (b) their local patterns in the orientation field O, and (c) the vector field V. Earlier works have pointed out that cores and deltas should appear in pairs. Two views of actual thumb are shown as an example in Figs. 4a and 4b with the cores and the deltas marked. For the simple closed path ГExt consisting of this kind of boundaries, I (ГExt) = 0, and then Ncores = Ndeltas. Fig. 4. (a) Left and (b) right views of a real thumb with singular points and boundary marked. As for Property 2, we know that the Poincare´ Index can be calculated along any simple closed path as long as it is homotopic with the closed circle around the same points. This allows to adaptively choose the integral path for the boundary, for example, to choose the path where the orientation confidence is much higher. 3. Using DORIVAC Feature to Remove Forged Singular Points 3.1 DORIVAC Feature: Many earlier researchers have shown that Poincare´ Index-based methods can usually detect nearly all true singular points when the Index is calculated along small area boundaries, but this also guides to much forged detection. If a bigger area is chosen, true singular points will be easy to miss. In order to get rid of forged detections while conserving a good detection rate, an innovative feature is advised here extended from the Poincare´ Index, which can provide more perceptive features and be used to confirm the trueness of each finding after using Poincare´ Index algorithm. The Poincare´ Index is defined as the sum of the orientation differences beside a closed ring L. For a given point P, suppose that the set of sampled points along L is {T1; T2; T3; . . . ; TN-1} and oi is the orientation of point Ti. Then, the Poincare´ Index of P can be computed by ேିଵ 1 ‫ ݌ܫ‬ൌ ෍ ݂ሺ‫݋‬௜ାଵ െ ‫݋‬௜ ሻ ߨ ௜ୀ௜ (4) 69
  • 5. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.5, 2012 ேିଵ 1 ൌ ෍ ݂ሺߜ‫݋‬௜ ሻ, ߨ ௜ୀ௜ ‫ |ݔ| ,ݔ‬൑ , గ ‫ۓ‬ ଶ ݂ሺ‫ݔ‬ሻ ൌ ߨ െ ‫ ݔ ,ݔ‬൐ , ሺ5ሻ గ ‫۔‬ ଶ ‫ ߨە‬൅ ‫ ݔ ,ݔ‬൏ െ ଶ , గ The Poincare´ Index is only the sum ofߜ‫݋‬௜ . It contains no information about the arrangement of ߜ‫݋‬௜ , ݅ ൌ 1,2,3, … . , ܰ െ 1, and it cannot explain the singular point fully. So, when there are creases, scars, smudges, or damped prints in the fingerprint images, the Poincare´ Index method will easily outcome in many forged singular points. Post-processing steps are therefore frequently essential. In this paper, two simple set of laws are used through post-processing: 1) If a delta is too close to a core (the distance between them is smaller than 8 pixels), eradicate both of them as well as 2) In a very small area (a circular region with a radius of 8 pixels), if there is more than one core (or delta), an Suppose that there are N cores (or deltas) in such a area, ሼሺ‫ݒ ,ݑ‬௜ ሻ, ݅ ൌ 1,2, … . ܰሽ Then, the average core (or average core (or delta) can be calculated instead. delta) (u, v) is calculated by ே 1 ‫ ݑ‬ൌ ෍ ‫ݑ‬௜ ሺ6ሻ ܰ ௜ୀଵ ே 1 ‫ ݒ‬ൌ ෍ ‫ݒ‬௜ ሺ7ሻ ܰ ௜ୀଵ However, even after this post-processing step, much forged detection still remains. Fig. 5 shows two examples from a cheap-quality fingerprint, illustrating points that are wrongly detected as a core and a delta by using the Poincare´ Index method and this post-processing. In order to additional remove the forged points, an innovative characteristic is used, which contains more information about the singular point. The characteristic on point P, which consists of the DORIVAC about P, DORIVAC (P) = ሾߜ‫݋‬ଵ , ߜ‫݋‬ଶ , … . ߜ‫݋‬ேିଵ ሿ i.e., (8) Fig. 5. Two examples of forged singular points detected using a conventional Poincare´ Index-based method and post-processing steps, in which the false core is marked with a circle and the false delta is marked with a triangle. 70
  • 6. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.5, 2012 As DORIVAC contains allߜ‫݋‬௜ , it can illustrate the singular point more absolutely. The Poincare´ Index can be seen as the summation of DORIVAC features and DORIVAC features can be considered as an extended form of Poincare´ Index. Fig. 6 shows six singular points detected by the Poincare´ Index method and their DORIVAC features are plotted as curves (among them, Figs. 6a, 6b, 6c, and 6d are true and Figs. 6e and 6f are forged detections). Fig. 6. Singular points detected by using the Poincare´ Index algorithm and their DORIVAC features (plotted as curves): (a), (b), (c), and (d) are true while (e) and (f) are forged. Since the orientation field is defined in [0, π), there will be one DORIVAC feature pulse for each singular point (positive pulse for core, and negative pulse for delta) if the orientation field is detected completely. See Figs. 6a and 6b for examples. Although the noise around the true singular points may change the curves a little, there exists a clearly obvious difference between true and forged singular points. These phenomena can be observed in Fig. 6. After post-processing steps, the detected singular points are isolated, i.e., there is only one singular point for any fairly large region. Thus, it is more suitable to calculate the DORIVAC features along a large circle. Then, N can be a large number, and accordingly, the curves of DORIVAC features will be more continuous. 3.2 Removing Forged Singular Points: To distinguish true singular points from forged ones, a two-step classifier is projected as below. For each point with nonzero Poincare´ Index in the applicant set S, the DORIVAC feature is calculated. If there is exactly one pulse (i.e., positive pulse for core and negative pulse for delta) with the height nearly up to ߨ, it is a legitimate singular point and will be kept in the final set S of singular points; otherwise, it will be removed from applicant set S and placed into an supplementary set S’ of applicants for further processing. This process is outlined in Algorithm 1. Algorithm 1:- Pseudo-code of the first step for removing forged SPs DORIVAC (P) =ሾߜ‫݋‬ଵ , ߜ‫݋‬ଶ , … . . , ߜ‫݋‬ேିଵ ሿ; 1 for each detection point P in S do if ∃! ݇ ∈ ሾ1, ܰ െ 1ሿ, ‫݋ߜ| ݐ݄ܽݐ‬௞ | ൐ ‫݄݊݁ݐ ,ݐ‬ 2 3 4 keep P in S; 5 end 6 else 7 remove P to S´ 71
  • 7. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.5, 2012 8 end 9. end The supplementary point set S’ can contain a mixture of true singular point and forged detections. The classifier is designed, based on training samples to differentiate between the true points (e.g., Figs. 6c and 6d) and the forged ones (e.g., Figs. 6e and 6f). Since it is time consuming to physically tag true and forged singular point samples for the training of the classifier, the taster learning methods are used suitable for small-numbered samples. The Support Vector Machine (SVM) is chosen to design the classifier. SVMs try to find a best separating hyper-plane in the feature space and lessen the classification error for the training data using a nonlinear transform function. The separating hyper-plane is defined by ܽ௜ ሺ݅ ൌ 1,2 … . ܰሻ and b. In this paper, an optimal b0 is selected to move In this problem, the missed detection rate (classifying true singular points as forged ones) should be very small. the separating plane to a suitable position that will misclassify less than 2 percent of true singular points as forged ones and, meanwhile, decrease the error of classifying forged singular points as true ones. From the definition of DORIVAC features, it is observed that this vector is sensitive to image rotation. To prevail over the influence of image rotation, the training set is enlarged by rotating each fingerprint sample image by 10 degree increments. All of the samples are used for training the SVM classifier to make it insensible to image rotation. Based on the SVM result, the decision can be made whether a point P in S’ should be moved back to the final candidate set S or not. After this two-step classification process, a set of the forged singular points are removed. For example, Figs. 6e and 6f can be successfully judged as forged singular points while the other four are kept as true ones. 4. Singular Points Selection with Global Information As pointed out earlier, local features alone are not enough to fully distinguish the true singular points from forged detections, which can actually have similar local characteristics as the true ones. This inspires to incorporate more global discriminative information for detection. 4.1 Removing Invalid Combinations: The core-delta relation deduced in Part II is used as a global restriction for selecting the best set of final singular points. In real applications, many fingerprint images captured by optical or capacitive sensors are not complete. Often they will lose one or two deltas. In this case, the number of cores is not necessarily equal to the number of region of the fingerprints is . By computing ‫ܫ‬ሺ∂ ሻ, we can know that only a few combinations of the deltas. Nevertheless, (3) still presents us a global topological restriction for singular points. Suppose the effective singular points are valid. In Table 1, most of the possible combinations of singular points are listed for fingerprints with the Poincare´ Index and the possible types (PA—plain arch, TA—tented arch, LL—left loop, RL—right loop, TL—twin loop). Table I. Frequent Combinations of Singular Points in a Complete Fingerprint I(ࣔΏሻ Core Delta Possible Types 0 0 PA 0 1 1 LL,RL,TA 2 2 TL,Whorl 1 0 LL,RL,TA 1 2 1 TL, Whorl 2 2 0 TL, Whorl By calculating the global Poincare´ Index I (߲ߗ) some invalid combinations of singular points can be removed. For example, when the global Poincare´ Index is equal to 1, the combinations of 1-core-0-delta and 2-core-1-delta are calculated and other situations are not considered. This speeds up the algorithm greatly. 72
  • 8. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.5, 2012 4.2 Selection of Optimal Singular Points: As known, singular points can be used to determine the global structure of the orientation field of fingerprints. The basic idea is to select the best singular points by decreasing the difference between the original orientation field and the model-based orientation field rebuilt using the singular points. Denote the original orientation field as O0 and the rebuilt orientation field as O (Ө.s), where Ө is the model’s parameter. The original orientation field, O0, is calculated by the hierarchical gradient-based method. As for the model-based rebuilt orientation field, O(Ө.s), the Zero-Pole model proposed by Sherlock and Monro is choose, considering both the model accuracy and the computational efficiency. 5. Conclusion To sum up, the paper is focused on the detection of singular points in fingerprints. The contributions lie in two aspects. 1) a new feature, DORIVAC, in addition to the Poincare´ Index, which can successfully remove forged detections and 2) the topological relations of singular points is taken as a global restriction for fingerprints The optimal singular points can be selected by decreasing the difference between the original orientation field and the model-based orientation field rebuilt from the singular points. References Jie Zhou, Fanglin Chen, and Jinwei Gu; “A Novel Algorithm for Detecting Singular Points from Fingerprint Images”, IEEE transactions on pattern analysis and machine intelligence, vol. 31, no. 7, july 2009 Maltoni, D. Maio, A.K. Jain, and S. Probhaker, Handbook of Fingerprint Recognition. Springer-Verlag, 2003. K. Karu and A.K. Jain, “Fingerprint Classification,” Pattern Recognition, vol. 17, no. 3, pp. 389-404, 1996. Q. Zhang and H. Yan, “Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudo Ridges,” Pattern Recognition, vol. 37, no. 11, pp. 2233-2243, 2004. B. Sherlock and D. Monro, “A Model for Interpreting Fingerprint Topology,” Pattern Recognition, vol. 26, no. 7, pp. 1047-1055, 1993. J. Gu and J. Zhou, “A Novel Model for Orientation Field of Fingerprints,” Proc. IEEE Int’l Conf. Computer Vision and Pattern Recognition, vol. 2, pp. 493-498, June 2003. A.K. Jain, S. Prabhakar, and L. Hong, “A Multichannel Approach to Fingerprint Classification,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 21, no. 4, pp. 348-359, Apr. 1999. M. Tico and P. Kuosmanen, “A Multiresolution Method for Singular Points Detection in Fingerprint Images,” Proc. IEEE Int’l Symp. Circuits and Systems, vol. 4, pp. 183-186, July 1999. A.M. Bazen and S.H. Gerez, “Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 905-919, July 2002. R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, “Fingerprint Classification by Directional Image Partitioning,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 21, no. 5, pp. 402-421 May 1999. P. Ramo, M. Tico, V. Onnia, and J. Saarinen, “Optimized Singular Point Detection Algorithm for Fingerprint Images,” Proc. IEEE Int’l Conf. Image Processing, vol. 3, no. 3, pp. 242-245, Oct. 2001. C.-H. Park, J.-J. Lee, M.J.T. Smith, and K.-H. Park, “Singular Point Detection by Shape Analysis of Directional Fields in Fingerprints,” Pattern Recognition, vol. 39, no. 5, pp. 839-855, 2006. X. Wang, J. Li, and Y. Niu, “Definition and Extraction of Stable Points from Fingerprint Images,” Pattern Recognition, vol. 40, no. 6, pp. 1804-1815, 2007. K. Nilsson and J. Bigun, “Complex Filters Applied to Fingerprint Images Detecting Prominent Symmetry Points Used for Alignment,” Proc. ECCV 2002 Workshop Biometric Authentification, pp. 39-47, 2002. K. Nilsson, “Symmetry Filters Applied to Fingerprints,” PhD dissertation, Chalmers Univ. of Technology, 2005. K. Nilsson and J. Bigu¨ n, “Localization of Corresponding Points in Fingerprints by Complex Filtering,” Pattern Recognition Letters, vol. 24, no. 13, pp. 2135-2144, 2003. S. Chikkerur and N.K. Ratha, “Impact of Singular Point Detectionon Fingerprint Matching Performance,” Proc. Fourth IEEE Workshop Automatic Identification Advanced Technologies, pp. 207-212, 2005. P. Perona, “Orientation Diffusions,” IEEE Trans. Image Processing, vol. 7, no. 3, pp. 457-467, 1998. 73
  • 9. Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol 3, No.5, 2012 E.B. Saff and A.D. Snider, Fundamentals of Complex Analysis with Applications to Engineering, Science, and Mathematics, third ed. Prentice Hall, 2002. C Burges, “A Tutorial on Support Vector Machines for Pattern Recognition,” Data Mining and Knowledge Discovery, vol. 2, no. 2, pp. 121-167, 1998. A.K. Jain and L. Hong, “On-Line Fingerprint Verification,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp. 302-314, Apr. 1997. 74
  • 10. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/Journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar