SlideShare a Scribd company logo
1 of 5
Download to read offline
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011



 A Novel Approach to Fingerprint Identification Using
                Gabor Filter-Bank
                             Ms.Prajakta M. Mudegaonkar 1 , Prof.Ramesh P. Adgaonkar 2
           1 Student   of Master of Engineering in Computer Science, GSM’s Marathwada Institute of Technology,
                                                                                                             ,
                                     Beed By-Pass Road, Aurangabad, Maharashtra, India.
                                                   Email: pmm997@gmail.com
              2   Department of Computer Science and Engineering, GSM’s Marathwada Institute of Technology,
                                                                                                          ,
                                   Beed By-Pass Road, Aurangabad, Maharashtra, India.
                                            Email: rp_adgaonkar@rediffmail.com

Abstract ”Fingerprint Identification is a widely used Biometric          Although the fingerprints possess the discriminatory
Identification mechanism. Up till now different techniques               information, designing a reliable automatic fingerprint
have been proposed for having satisfactory Fingerprint                   matching algorithm is very challenging. As fingerprint sensors
Identification. The widely used minutiae-based representation            are becoming smaller and cheaper, automatic identification
did not utilize a significant component of the rich                      based on fingerprints is becoming an attractive alternative/
discriminatory information available in the fingerprints. Local
                                                                         complement to the traditional methods of identification. The
ridge structures could not be completely characterized by
minutiae. The proposed filter-based algorithm uses a bank of
                                                                         critical factor in the widespread use of fingerprints is in
Gabor filters to capture both local and global details in a              satisfying the performance (e.g., matching speed and
fingerprint as a compact fixed length Finger Code. The                   accuracy) requirements of the emerging civilian identification
Fingerprint Identification is based on the Euclidean distance            applications [2]. Some of these applications (e.g., fingerprint-
between the two corresponding Finger Codes and hence is                  based smartcards) will also benefit from a compact
extremely fast and accurate than the minutiae based one.                 representation of a fingerprint.
Accuracy of the system is 98.22%.
                                                                                     II. FINGERPRINT IDENTIFICATION
Index Terms ”Core Point, Euclidean Distance, Fingerprints,
Feature Vector, Finger Code, Gabor Filter-bank.                                Fingerprint matching techniques can be broadly
                                                                         classified as minutiae based and correlation based [5].
                       I. INTRODUCTION                                   Minutiae based technique first located the minutiae points in
                                                                         a given fingerprint image and matched their relative
      Fingerprint-based identification is one of the most                placements in a stored template . The performance of
important biometric technologies which has drawn a                       this technique relied on the accurate detection of
substantial amount of attention recently. Humans have used               minutiae points and the use of sophisticated matching
fingerprints for personal identification for centuries and the           techniques to compare two minutiae fields which undergo
validity of fingerprint identification has been well established.        non-rigid transformations. Correlation based techniques
Among all the biometrics fingerprint- based identification is            compared the global pattern of ridges and valleys to see if
one of the most mature and proven technique. Fingerprints                the ridges in the two fingerprints align. The global approach
are believed to be unique across individuals and across                  to fingerprint representation was typically used for indexing
fingers of same individual [1],[2]. These observations have              and did not offer reliable fingerprint discrimination.
led to the increased use of automatic fingerprint-based
identification in both civilian and law-enforcement
applications. A fingerprint is the pattern of ridges and valleys
on the surface of a fingertip. When fingerprint image is
analyzed at global level, the fingerprint pattern exhibits one
or more regions where ridge lines assume distinctive shapes.
These shapes are characterized by high curvature,
terminations, bifurcations, cross-over etc. These regions are
called singular regions or singularities [5]. These singularities
may be classified into three topologies; loop, delta and whorl.
At local level, there are other important features known as
minutiae can be found in the fingerprint patterns. Minutiae
mean small details and this refers to the various ways that
the ridges can be discontinuous. A ridge can suddenly come
to an end which is called termination or it can divide into two                  Fig.1 Ridge ending, core point and ridge bifurcation
ridges which is called bifurcations as shown in Fig. 1 [5].
                                                                    10
© 2011 ACEEE
DOI: 01.IJNS.02.03.159
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

The ridge structure in a fingerprint can be viewed as an                fingerprints which are translation and rotation invariant. In
oriented texture patterns having a dominant spatial frequency           the proposed scheme, translation was taken care of by core
and orientation in a local neighborhood. The frequency is               point during the feature extraction stage and the image
due to inter ridge-spacing present in a fingerprint and the             rotation was handled by a cyclic rotation of the feature values
orientation is due to the flow pattern exhibited by ridges. By          in the feature vector. The features were cyclically rotated to
capturing the frequency and orientation of ridges in local              generate feature vectors corresponding to different
regions in the fingerprint, a distinct representation of the            orientations to perform the matching.
fingerprint is possible. In this paper I mainly focused on
                                                                        A. Core Point Detection
Gabor Filter-bank based Fingerprint Identification..Since
Gabor Filters are characterized by spatial frequencies and                   For having satisfactory Fingerprint Identification, finding
orientation capabilities, they are best suited for fingerprint          exact reference point or core point was an important task.
identification [3]. Single Gabor Filter function was not                Since core point was nothing but a high curvature region in
sufficient for capturing whole global and local fingerprint             the fingerprint, it’s totally dependent on the orientation of
information therefore bank of Gabor filters was prepared with           ridges. Therefore orientation field of the fingerprint was
8 Gabor Filters. Detailed filter-bank based feature extraction          estimated. The typical orientation field of a fingerprint is
procedure is discussed in upcoming sections.                            shown in Fig. 3 as in [8].Steps for orientation field estimation
                                                                        are discussed below. Let è be defined as the orientation field
       III. GABOR FILTER-BANK BASED FEATURE                             of a finger print image. è(i,j) represents the local ridge
                     EXTRACTION                                         orientation at pixel (i,j). Local ridge orientation, however, was
                                                                        usually specified for a block rather than that of every pixel.
    In the proposed system initially core point in fingerprint          Thus, an image was divided in to a set of non-overlapping
image was detected [2],[5]. The core point corresponds to               blocks of size w×w. Each bock held a single orientation. In
center of loop type singularity. Some fingerprints did not              connection with the work outlined in this paper, the smoothed
contain loop or whorl singularities, therefore it was difficult         orientation field based on least mean square algorithm is
to define core. In that kind of images, core is normally                summarized as follows as in [2],[8] :
associated with the maximum ridge line curvature. Detecting             1. The input image I was divided into non-overlapping blocks
a core point was not a trivial task. For finding core point,            with size w×w.
initially orientation field was estimated. [7],[8],[9]. For that        2. Gradients äx(i,j) and äy(i,j) were calculated, at each pixel
one algorithm is discussed here. Fig. 2 shows an optimal core           (i,j) which was the center of the block.
point in an fingerprint image, as in [5].After getting a core           3. Local orientation was estimated using the following
point, circular region around the core point was tessellated            equations :
into 80 sectors. The pixel intensities in each sector were              The gradient operator can be chosen according to the
normalized to a constant mean and variance. The circular                computational complexity. Generally sobel operator is used.
region was filtered using a bank of eight Gabor filters to
produce a set of eight filtered images. The average absolute
deviation with in a sector quantifies the underlying ridge
structure and was used as a feature. A feature vector (640
bytes in length) was collection of all the features, computed
from all the 80 sectors, in every filtered image. The feature
vector captured the local information and the ordered                   Subsequently,
enumeration of the tessellation captured the invariant global
relationships among the local patterns. The matching stage
computed the Euclidean distance between the two
corresponding feature vectors. It is desirable to obtain
representations for




                                                                         Fig. 3 Fingerprint Orientation Map (a) Orientation Field mapped
                                                                                    over Fingerprint (b) Orientation Field Map




                                                                        local ridge orientation at the block with the centered at pixel
                    Fig. 2 Optimal Core Point Lcation                   (i,j).

                                                                   11
© 2011 ACEEE
DOI: 01.IJNS.02.03.159
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011


4. The discontinuity of ridge and valley due to noise could            concentric bands around core point. Each band is 20 pixels
be soften by applying a low pass filter. However, to apply a           wide and segmented into sixteen two sectors. Thus there
low pass filter the orientation image must be converted to a           were total 16 x 5 = 80 sectors and the region of interest was a
continuous vector field. The continuous vector field, which            circle of radius 100 pixels, centered at the core point. The
its x and y components are defined as Öx and Öy respectively.          tessellated region of interest is shown in Fig. 5.

                                                                                                IV. FILTERING
                                                                              Before filtering the fingerprint image, the region of
                                                                       interest was normalized in each sector separately to a
With the resulted vector field, the two dimensional low- pass          constant mean and variance. Normalization was performed
filter G with unit integral was applied .The specified size of         to remove the effects of sensor noise and gray level
the filter was            ,as a result,                                deformation due to finger pressure differences as given in
                                                                       [3],[5]. I(x,y) denoted the gray value at pixel (x,y), and ,the
                                                                       estimated mean and variance of sector            , respectively,and
                                                                               , the normalized gray-level value at pixel (x,y). For all
                                                                       the pixels in sector    , the normalized image was defined as:


5. The smoothed orientation field local ridge orientation at
(i,j) was then computed as follows:



Now after finding out the smoothed orientation field, core             Where and were the desired mean and variance values,
point was found out. For locating this reference point I had           respectively. Values of them were already set according to
implemented integration of sine components method.                     experimental conditions. Normalization was a pixel-wise
Therefore further steps according to this method are given             operation which did not change the clarity of the ridge and
below:                                                                 valley structures. If normalization was performed on the entire
6. Value å was computed, an image containing only the sin              image, then it could not compensate for the intensity
component of O´.                                                       variations in different parts of the image due to the elastic
                                                                       nature of the finger. Separate normalization of each individual
                                                                       sector alleviated this problem. Fig. 6 shows normalized image.
7. A label image A was used to indicate the reference point.           Gabor filters optimally capture both local orientation and
For each pixel (i,j) in å, pixel intensities (sine component of        frequency information from a fingerprint image. By
the orientation field) were integrated in regions and        as
shown in Fig. 4 and the corresponding pixels were assigned
in A,the value of their difference was calculated as :



The regions       and         (see Fig. 4) were determined
empirically by applying the reference point location algorithm             Fig. 4 Regions for integrating å pixel intensities for A(i,j)
over a large database. The geometry of these regions was
designed to capture the maximum curvature in concave ridges.
8. Maximum value in A was found out and its co- ordinates
were assigned to the core point [2]. By repeating the steps
fixed number of times for different window sizes, accurate
core point was calculated. However, this method was not
able to find out correct core point in an arch type of
singularities. According to some authors it’s beneficial to
combine two-three methods for detecting accurate core point
as in [9].
B. Tessellation of Region of Interest
                                                                            Fig. 5 Core point (×), Region of interest and 80 sectors
  After finding out the core point, the circular region around                          Superimposed on a fingerprint
this core point was tessellated into sectors as in [2].I used 5
                                                                  12
© 2011 ACEEE
DOI: 01.IJNS.02.03.159
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

 tuning a Gabor filter to specific frequency and direction, the                                   VI .MATCHING
local frequency and orientation information can be
obtained..Thus, they are suited for extracting texture                       Fingerprint matching was based on finding the Euclidean
information from images. An even symmetric Gabor filter                  distance between the corresponding Finger Codes. The
had the following general form in the spatial domain as in               translation invariance in the Finger Code was established by
[4],[6]:                                                                 the reference point. Approximate rotation invariance was
                                                                         achieved by cyclically rotating the features in the Finger Code
                                                                         itself. For each fingerprint 5 templates were stored in the
                                                                         database. Test fingerprint template was matched with all the
                                                                         5 templates of each fingerprint and scores were noted [2].The
                                                                         minimum score corresponded to the best alignment of the
                                                                         two fingerprints being matched. If the Euclidean distance
where f was the frequency of the sinusoidal plane wave along             between two feature vectors was less than a threshold, then
the direction è from the x-axis,         and     were the space          the decision that “the two images come from the same finger”
constants of the Gaussian envelope along x’ and y’ axes,                 was made, otherwise a decision that “the two images come
respectively.It’s beneficial to set the filter frequency f to the        from different fingers” was made.
average ridge frequency ( 1/K), where K was the average
inter-ridge distance. I used eight different values for è (0,
22.5,45, 67.5, 90, 112.5, 135, and 157.5) with respect to the x-
axis. The normalized region of interest (see Fig.6) in a
fingerprint was convolved with a 0Ú-oriented filter
accentuates those ridges which are parallel to the x-axis and
smoothes the ridges in the other directions. Filters tuned to
other directions work in a similar way. These eight
directional-sensitive filters captured most of the global ridge
directionality information as well as the local ridge                          Fig.7 Filtered Images (a) 0Ú (b) 22.5Ú similarly up to
characteristics present in a fingerprint. Fig. 7 shows filtering         157.5Ú.While four directions are sufficient for classification; eight
                                                                                directions are needed for fingerprint identification.
in different directions, as in [2], [4].

                    V. FEATURE VECTOR

   Let            be the è-direction filtered image for sector
  .Now,
      ,    ª {0,1,…,79} and è ª {0Ú,……,157.5Ú},the feature
value , ,was the average absolute deviation from the mean
defined as :




                                                                            Fig.8 Examples of 640-dimensional feature vectors: (a) First
  Fig. 6 Fingerprint Images: (a) Area of Interest (b) Normalized
                                                                         impression of finger 1, (b) second impression of finger 1, (c) Finger
                              Image                                                       Code of (a), (d) Finger Code of (b)
                                                                         Since the template generation for storage in the database
                                                                         was an off-line process, the verification time still dependent
                                                                         on the time taken to generate a single template.
where     was the number of pixels in      and      was the mean
of pixel values of          in sector .The average absolute                              VI. EXPERIMENTAL RESULTS
deviation of each sector in each of the eight filtered images
                                                                             For performing the whole procedure I used FVC 2000
defined the components of our feature vector. In this way a
                                                                         database. In this database there were eight fingerprint scans
640-dimensional feature vectors were formed. Fig. 8 shows
                                                                         per person and total there are 80 scans of 10 persons. When
examples of 640-dimensional feature vectors for fingerprints.
                                                                         the Gabor Filter-Based Fingerprint Identification was applied
                                                                         on this database I got overall 98.22% accuracy. The accuracy
                                                                    13
© 2011 ACEEE
DOI: 01.IJNS.02.03.159
ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011

was measured in terms FRR (False Rejection Rate) and FAR                                      REFERENCES
(False Acceptance Rate).That’s why this method was found
                                                                      [1] S.Mahadik, K.Narayanan, D.V.Bhoir, D .Shah,” Access
more reliable and extremely faster than the minutiae -based
                                                                      control system using fingerprint recognition”, International
fingerprint matching.                                                 Conference on Advances in Computing, Communication and
                                                                      Control, vol.3, 2009.
                      CONCLUSIONS                                     [2] A.K.Jain, S.Prabhakar, L.Hong, S.Pankanti, “ Filter bank –
                                                                      based fingerprint matching”, IEEE Transactions on Image
    Fingerprint Identification is one of the well known and
                                                                      Processing, vol.9, no..5, pp.846- 859, May 2000.
reliable Biometrics Authentication Techniques. Here I                 [3] C.J. Lee, S .D.Wang,” A Gabor filter-based approach to
discussed a Gabor filter-bank based technique for fingerprint         fingerprint recognition”, unpublished.
Identification. Gabor filters are characterized by frequency          [4] M.Huppmann,” Fingerprint recognition by matching of
and orientation a component that’s why they are perfectly             gabor filter-based patterns”, unpublished.
suitable for fingerprint Identification. The primary advantage        [5] M.Umer Munir and Dr. M.Y. Javed,” Fingerprint matching
of this approach was its computationally attractive matching/         using gabor filters”, unpublished.
indexing capability. For instance, if the normalized (for             [6] J.R.Movellan,”Tutorial on gabor filters”, unpublished.
orientation and size) Finger Codes of all the enrolled                [7] M. Liu, X. Jiang , A. C . Kot,” Fingerprint        reference–
                                                                      point detection”, EURASIP Journal on Applied Signal
fingerprints were stored as templates, the identification
                                                                      Processing,vol.4, pp. 498-509, 2005.
effectively involves a “bit” comparison. As a result, the             [8] H. B. Kekre,V.A. Bharadi,”Fingerprint core point detection
identification time would be relatively insensitive to the            detection algorithms using orientation field based multiple
database size. The accuracy achieved in terms of FRR and              features”,International Journal of Computer Applications vol.1,
FAR was 98.22%.Therefore the whole discussion in this paper           pp. 97- 103.
concluded that this system performs better than the minutiae-         [9] A. Julasayvake, S.       Choomchuay,” Combined technique
based system.                                                         for fingerprint core point detection”,unpublished.




                                                                 14
© 2011 ACEEE
DOI: 01.IJNS.02.03.159

More Related Content

What's hot

Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prjpublications
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...IDES Editor
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABAM Publications
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...IOSR Journals
 
Shadow Detection and Removal Techniques A Perspective View
Shadow Detection and Removal Techniques A Perspective ViewShadow Detection and Removal Techniques A Perspective View
Shadow Detection and Removal Techniques A Perspective Viewijtsrd
 
Shadow Detection and Removal in Still Images by using Hue Properties of Color...
Shadow Detection and Removal in Still Images by using Hue Properties of Color...Shadow Detection and Removal in Still Images by using Hue Properties of Color...
Shadow Detection and Removal in Still Images by using Hue Properties of Color...ijsrd.com
 
10.1.1.432.9149
10.1.1.432.914910.1.1.432.9149
10.1.1.432.9149moemi1
 
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...sipij
 
IRJET- Detection and Recognition of Text for Dusty Image using Long Short...
IRJET-  	  Detection and Recognition of Text for Dusty Image using Long Short...IRJET-  	  Detection and Recognition of Text for Dusty Image using Long Short...
IRJET- Detection and Recognition of Text for Dusty Image using Long Short...IRJET Journal
 
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...Kalle
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger imageseSAT Publishing House
 

What's hot (18)

Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
N010226872
N010226872N010226872
N010226872
 
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
A Novel Approach for Detection of Fingerprint by Constructing Relational Grap...
 
366 369
366 369366 369
366 369
 
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLABENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
ENHANCED SIGNATURE VERIFICATION AND RECOGNITION USING MATLAB
 
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
 
Iw3515281533
Iw3515281533Iw3515281533
Iw3515281533
 
Shadow Detection and Removal Techniques A Perspective View
Shadow Detection and Removal Techniques A Perspective ViewShadow Detection and Removal Techniques A Perspective View
Shadow Detection and Removal Techniques A Perspective View
 
Shadow Detection and Removal in Still Images by using Hue Properties of Color...
Shadow Detection and Removal in Still Images by using Hue Properties of Color...Shadow Detection and Removal in Still Images by using Hue Properties of Color...
Shadow Detection and Removal in Still Images by using Hue Properties of Color...
 
10.1.1.432.9149
10.1.1.432.914910.1.1.432.9149
10.1.1.432.9149
 
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
GABOR WAVELETS AND MORPHOLOGICAL SHARED WEIGHTED NEURAL NETWORK BASED AUTOMAT...
 
B221223
B221223B221223
B221223
 
IRJET- Detection and Recognition of Text for Dusty Image using Long Short...
IRJET-  	  Detection and Recognition of Text for Dusty Image using Long Short...IRJET-  	  Detection and Recognition of Text for Dusty Image using Long Short...
IRJET- Detection and Recognition of Text for Dusty Image using Long Short...
 
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
Takemura Estimating 3 D Point Of Regard And Visualizing Gaze Trajectories Und...
 
237 240
237 240237 240
237 240
 
Human identification using finger images
Human identification using finger imagesHuman identification using finger images
Human identification using finger images
 

Viewers also liked

Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintJayakrishnan U
 
Full n final prjct
Full n final prjctFull n final prjct
Full n final prjctpunu2602
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementAnkit Nayan
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsCloudTechnologies
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Viewers also liked (10)

Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 
Full n final prjct
Full n final prjctFull n final prjct
Full n final prjct
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image Enhancement
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Similar to A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank

Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...IJCI JOURNAL
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AKARTHIKEYAN V
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2prj_publication
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowAlexander Decker
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.IRJET Journal
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYDCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYIAEME Publication
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filtersIAEME Publication
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filtersIAEME Publication
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...INFOGAIN PUBLICATION
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
 
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSIRJET Journal
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 

Similar to A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank (20)

Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...An efficient method for recognizing the low quality fingerprint verification ...
An efficient method for recognizing the low quality fingerprint verification ...
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
A new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial windowA new technique to fingerprint recognition based on partial window
A new technique to fingerprint recognition based on partial window
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYDCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filters
 
Fingerprint verification using steerable filters
Fingerprint verification using steerable filtersFingerprint verification using steerable filters
Fingerprint verification using steerable filters
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
1834 1840
1834 18401834 1840
1834 1840
 
1834 1840
1834 18401834 1840
1834 1840
 
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...
 
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODSA REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
 
Og3424882497
Og3424882497Og3424882497
Og3424882497
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 

More from IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank

  • 1. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank Ms.Prajakta M. Mudegaonkar 1 , Prof.Ramesh P. Adgaonkar 2 1 Student of Master of Engineering in Computer Science, GSM’s Marathwada Institute of Technology, , Beed By-Pass Road, Aurangabad, Maharashtra, India. Email: pmm997@gmail.com 2 Department of Computer Science and Engineering, GSM’s Marathwada Institute of Technology, , Beed By-Pass Road, Aurangabad, Maharashtra, India. Email: rp_adgaonkar@rediffmail.com Abstract ”Fingerprint Identification is a widely used Biometric Although the fingerprints possess the discriminatory Identification mechanism. Up till now different techniques information, designing a reliable automatic fingerprint have been proposed for having satisfactory Fingerprint matching algorithm is very challenging. As fingerprint sensors Identification. The widely used minutiae-based representation are becoming smaller and cheaper, automatic identification did not utilize a significant component of the rich based on fingerprints is becoming an attractive alternative/ discriminatory information available in the fingerprints. Local complement to the traditional methods of identification. The ridge structures could not be completely characterized by minutiae. The proposed filter-based algorithm uses a bank of critical factor in the widespread use of fingerprints is in Gabor filters to capture both local and global details in a satisfying the performance (e.g., matching speed and fingerprint as a compact fixed length Finger Code. The accuracy) requirements of the emerging civilian identification Fingerprint Identification is based on the Euclidean distance applications [2]. Some of these applications (e.g., fingerprint- between the two corresponding Finger Codes and hence is based smartcards) will also benefit from a compact extremely fast and accurate than the minutiae based one. representation of a fingerprint. Accuracy of the system is 98.22%. II. FINGERPRINT IDENTIFICATION Index Terms ”Core Point, Euclidean Distance, Fingerprints, Feature Vector, Finger Code, Gabor Filter-bank. Fingerprint matching techniques can be broadly classified as minutiae based and correlation based [5]. I. INTRODUCTION Minutiae based technique first located the minutiae points in a given fingerprint image and matched their relative Fingerprint-based identification is one of the most placements in a stored template . The performance of important biometric technologies which has drawn a this technique relied on the accurate detection of substantial amount of attention recently. Humans have used minutiae points and the use of sophisticated matching fingerprints for personal identification for centuries and the techniques to compare two minutiae fields which undergo validity of fingerprint identification has been well established. non-rigid transformations. Correlation based techniques Among all the biometrics fingerprint- based identification is compared the global pattern of ridges and valleys to see if one of the most mature and proven technique. Fingerprints the ridges in the two fingerprints align. The global approach are believed to be unique across individuals and across to fingerprint representation was typically used for indexing fingers of same individual [1],[2]. These observations have and did not offer reliable fingerprint discrimination. led to the increased use of automatic fingerprint-based identification in both civilian and law-enforcement applications. A fingerprint is the pattern of ridges and valleys on the surface of a fingertip. When fingerprint image is analyzed at global level, the fingerprint pattern exhibits one or more regions where ridge lines assume distinctive shapes. These shapes are characterized by high curvature, terminations, bifurcations, cross-over etc. These regions are called singular regions or singularities [5]. These singularities may be classified into three topologies; loop, delta and whorl. At local level, there are other important features known as minutiae can be found in the fingerprint patterns. Minutiae mean small details and this refers to the various ways that the ridges can be discontinuous. A ridge can suddenly come to an end which is called termination or it can divide into two Fig.1 Ridge ending, core point and ridge bifurcation ridges which is called bifurcations as shown in Fig. 1 [5]. 10 © 2011 ACEEE DOI: 01.IJNS.02.03.159
  • 2. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 The ridge structure in a fingerprint can be viewed as an fingerprints which are translation and rotation invariant. In oriented texture patterns having a dominant spatial frequency the proposed scheme, translation was taken care of by core and orientation in a local neighborhood. The frequency is point during the feature extraction stage and the image due to inter ridge-spacing present in a fingerprint and the rotation was handled by a cyclic rotation of the feature values orientation is due to the flow pattern exhibited by ridges. By in the feature vector. The features were cyclically rotated to capturing the frequency and orientation of ridges in local generate feature vectors corresponding to different regions in the fingerprint, a distinct representation of the orientations to perform the matching. fingerprint is possible. In this paper I mainly focused on A. Core Point Detection Gabor Filter-bank based Fingerprint Identification..Since Gabor Filters are characterized by spatial frequencies and For having satisfactory Fingerprint Identification, finding orientation capabilities, they are best suited for fingerprint exact reference point or core point was an important task. identification [3]. Single Gabor Filter function was not Since core point was nothing but a high curvature region in sufficient for capturing whole global and local fingerprint the fingerprint, it’s totally dependent on the orientation of information therefore bank of Gabor filters was prepared with ridges. Therefore orientation field of the fingerprint was 8 Gabor Filters. Detailed filter-bank based feature extraction estimated. The typical orientation field of a fingerprint is procedure is discussed in upcoming sections. shown in Fig. 3 as in [8].Steps for orientation field estimation are discussed below. Let è be defined as the orientation field III. GABOR FILTER-BANK BASED FEATURE of a finger print image. è(i,j) represents the local ridge EXTRACTION orientation at pixel (i,j). Local ridge orientation, however, was usually specified for a block rather than that of every pixel. In the proposed system initially core point in fingerprint Thus, an image was divided in to a set of non-overlapping image was detected [2],[5]. The core point corresponds to blocks of size w×w. Each bock held a single orientation. In center of loop type singularity. Some fingerprints did not connection with the work outlined in this paper, the smoothed contain loop or whorl singularities, therefore it was difficult orientation field based on least mean square algorithm is to define core. In that kind of images, core is normally summarized as follows as in [2],[8] : associated with the maximum ridge line curvature. Detecting 1. The input image I was divided into non-overlapping blocks a core point was not a trivial task. For finding core point, with size w×w. initially orientation field was estimated. [7],[8],[9]. For that 2. Gradients äx(i,j) and äy(i,j) were calculated, at each pixel one algorithm is discussed here. Fig. 2 shows an optimal core (i,j) which was the center of the block. point in an fingerprint image, as in [5].After getting a core 3. Local orientation was estimated using the following point, circular region around the core point was tessellated equations : into 80 sectors. The pixel intensities in each sector were The gradient operator can be chosen according to the normalized to a constant mean and variance. The circular computational complexity. Generally sobel operator is used. region was filtered using a bank of eight Gabor filters to produce a set of eight filtered images. The average absolute deviation with in a sector quantifies the underlying ridge structure and was used as a feature. A feature vector (640 bytes in length) was collection of all the features, computed from all the 80 sectors, in every filtered image. The feature vector captured the local information and the ordered Subsequently, enumeration of the tessellation captured the invariant global relationships among the local patterns. The matching stage computed the Euclidean distance between the two corresponding feature vectors. It is desirable to obtain representations for Fig. 3 Fingerprint Orientation Map (a) Orientation Field mapped over Fingerprint (b) Orientation Field Map local ridge orientation at the block with the centered at pixel Fig. 2 Optimal Core Point Lcation (i,j). 11 © 2011 ACEEE DOI: 01.IJNS.02.03.159
  • 3. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 4. The discontinuity of ridge and valley due to noise could concentric bands around core point. Each band is 20 pixels be soften by applying a low pass filter. However, to apply a wide and segmented into sixteen two sectors. Thus there low pass filter the orientation image must be converted to a were total 16 x 5 = 80 sectors and the region of interest was a continuous vector field. The continuous vector field, which circle of radius 100 pixels, centered at the core point. The its x and y components are defined as Öx and Öy respectively. tessellated region of interest is shown in Fig. 5. IV. FILTERING Before filtering the fingerprint image, the region of interest was normalized in each sector separately to a With the resulted vector field, the two dimensional low- pass constant mean and variance. Normalization was performed filter G with unit integral was applied .The specified size of to remove the effects of sensor noise and gray level the filter was ,as a result, deformation due to finger pressure differences as given in [3],[5]. I(x,y) denoted the gray value at pixel (x,y), and ,the estimated mean and variance of sector , respectively,and , the normalized gray-level value at pixel (x,y). For all the pixels in sector , the normalized image was defined as: 5. The smoothed orientation field local ridge orientation at (i,j) was then computed as follows: Now after finding out the smoothed orientation field, core Where and were the desired mean and variance values, point was found out. For locating this reference point I had respectively. Values of them were already set according to implemented integration of sine components method. experimental conditions. Normalization was a pixel-wise Therefore further steps according to this method are given operation which did not change the clarity of the ridge and below: valley structures. If normalization was performed on the entire 6. Value å was computed, an image containing only the sin image, then it could not compensate for the intensity component of O´. variations in different parts of the image due to the elastic nature of the finger. Separate normalization of each individual sector alleviated this problem. Fig. 6 shows normalized image. 7. A label image A was used to indicate the reference point. Gabor filters optimally capture both local orientation and For each pixel (i,j) in å, pixel intensities (sine component of frequency information from a fingerprint image. By the orientation field) were integrated in regions and as shown in Fig. 4 and the corresponding pixels were assigned in A,the value of their difference was calculated as : The regions and (see Fig. 4) were determined empirically by applying the reference point location algorithm Fig. 4 Regions for integrating å pixel intensities for A(i,j) over a large database. The geometry of these regions was designed to capture the maximum curvature in concave ridges. 8. Maximum value in A was found out and its co- ordinates were assigned to the core point [2]. By repeating the steps fixed number of times for different window sizes, accurate core point was calculated. However, this method was not able to find out correct core point in an arch type of singularities. According to some authors it’s beneficial to combine two-three methods for detecting accurate core point as in [9]. B. Tessellation of Region of Interest Fig. 5 Core point (×), Region of interest and 80 sectors After finding out the core point, the circular region around Superimposed on a fingerprint this core point was tessellated into sectors as in [2].I used 5 12 © 2011 ACEEE DOI: 01.IJNS.02.03.159
  • 4. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 tuning a Gabor filter to specific frequency and direction, the VI .MATCHING local frequency and orientation information can be obtained..Thus, they are suited for extracting texture Fingerprint matching was based on finding the Euclidean information from images. An even symmetric Gabor filter distance between the corresponding Finger Codes. The had the following general form in the spatial domain as in translation invariance in the Finger Code was established by [4],[6]: the reference point. Approximate rotation invariance was achieved by cyclically rotating the features in the Finger Code itself. For each fingerprint 5 templates were stored in the database. Test fingerprint template was matched with all the 5 templates of each fingerprint and scores were noted [2].The minimum score corresponded to the best alignment of the two fingerprints being matched. If the Euclidean distance where f was the frequency of the sinusoidal plane wave along between two feature vectors was less than a threshold, then the direction è from the x-axis, and were the space the decision that “the two images come from the same finger” constants of the Gaussian envelope along x’ and y’ axes, was made, otherwise a decision that “the two images come respectively.It’s beneficial to set the filter frequency f to the from different fingers” was made. average ridge frequency ( 1/K), where K was the average inter-ridge distance. I used eight different values for è (0, 22.5,45, 67.5, 90, 112.5, 135, and 157.5) with respect to the x- axis. The normalized region of interest (see Fig.6) in a fingerprint was convolved with a 0Ú-oriented filter accentuates those ridges which are parallel to the x-axis and smoothes the ridges in the other directions. Filters tuned to other directions work in a similar way. These eight directional-sensitive filters captured most of the global ridge directionality information as well as the local ridge Fig.7 Filtered Images (a) 0Ú (b) 22.5Ú similarly up to characteristics present in a fingerprint. Fig. 7 shows filtering 157.5Ú.While four directions are sufficient for classification; eight directions are needed for fingerprint identification. in different directions, as in [2], [4]. V. FEATURE VECTOR Let be the è-direction filtered image for sector .Now, , ª {0,1,…,79} and è ª {0Ú,……,157.5Ú},the feature value , ,was the average absolute deviation from the mean defined as : Fig.8 Examples of 640-dimensional feature vectors: (a) First Fig. 6 Fingerprint Images: (a) Area of Interest (b) Normalized impression of finger 1, (b) second impression of finger 1, (c) Finger Image Code of (a), (d) Finger Code of (b) Since the template generation for storage in the database was an off-line process, the verification time still dependent on the time taken to generate a single template. where was the number of pixels in and was the mean of pixel values of in sector .The average absolute VI. EXPERIMENTAL RESULTS deviation of each sector in each of the eight filtered images For performing the whole procedure I used FVC 2000 defined the components of our feature vector. In this way a database. In this database there were eight fingerprint scans 640-dimensional feature vectors were formed. Fig. 8 shows per person and total there are 80 scans of 10 persons. When examples of 640-dimensional feature vectors for fingerprints. the Gabor Filter-Based Fingerprint Identification was applied on this database I got overall 98.22% accuracy. The accuracy 13 © 2011 ACEEE DOI: 01.IJNS.02.03.159
  • 5. ACEEE Int. J. on Network Security , Vol. 02, No. 03, July 2011 was measured in terms FRR (False Rejection Rate) and FAR REFERENCES (False Acceptance Rate).That’s why this method was found [1] S.Mahadik, K.Narayanan, D.V.Bhoir, D .Shah,” Access more reliable and extremely faster than the minutiae -based control system using fingerprint recognition”, International fingerprint matching. Conference on Advances in Computing, Communication and Control, vol.3, 2009. CONCLUSIONS [2] A.K.Jain, S.Prabhakar, L.Hong, S.Pankanti, “ Filter bank – based fingerprint matching”, IEEE Transactions on Image Fingerprint Identification is one of the well known and Processing, vol.9, no..5, pp.846- 859, May 2000. reliable Biometrics Authentication Techniques. Here I [3] C.J. Lee, S .D.Wang,” A Gabor filter-based approach to discussed a Gabor filter-bank based technique for fingerprint fingerprint recognition”, unpublished. Identification. Gabor filters are characterized by frequency [4] M.Huppmann,” Fingerprint recognition by matching of and orientation a component that’s why they are perfectly gabor filter-based patterns”, unpublished. suitable for fingerprint Identification. The primary advantage [5] M.Umer Munir and Dr. M.Y. Javed,” Fingerprint matching of this approach was its computationally attractive matching/ using gabor filters”, unpublished. indexing capability. For instance, if the normalized (for [6] J.R.Movellan,”Tutorial on gabor filters”, unpublished. orientation and size) Finger Codes of all the enrolled [7] M. Liu, X. Jiang , A. C . Kot,” Fingerprint reference– point detection”, EURASIP Journal on Applied Signal fingerprints were stored as templates, the identification Processing,vol.4, pp. 498-509, 2005. effectively involves a “bit” comparison. As a result, the [8] H. B. Kekre,V.A. Bharadi,”Fingerprint core point detection identification time would be relatively insensitive to the detection algorithms using orientation field based multiple database size. The accuracy achieved in terms of FRR and features”,International Journal of Computer Applications vol.1, FAR was 98.22%.Therefore the whole discussion in this paper pp. 97- 103. concluded that this system performs better than the minutiae- [9] A. Julasayvake, S. Choomchuay,” Combined technique based system. for fingerprint core point detection”,unpublished. 14 © 2011 ACEEE DOI: 01.IJNS.02.03.159