SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34
32 | P a g e
A NEW CODING METHOD IN PATTERN
RECOGNITION FINGERPRINT IMAGE USING
VECTOR QUANTIZATION
NAGHAM J. SHUKUR
M.Sc in Space technologies and Communicatinon
Unit of Applied Sciences Researchs, School of Applied Sciences, University of Technology,
Baghdad, Iraq
Abstract— Fingerprints are imprints formed by friction
ridges of the skin and thumbs. They have long been used for
identification because of their immutability and individuality.
Immutability refers to the permanent and unchanging character
of the pattern on each finger. Individuality refers to the
uniqueness of ridge details across individuals; the probability
that two fingerprints are alike is about 1 in 1.9x1015. In despite of
this improvement which is adopted by the Federal Bureau of
Investigation (FBI), the fact still is “The larger the fingerprint
files became, the harder it was to identify somebody from their
fingerprints alone. Moreover, the fingerprint requires one of the
largest data templates in the biometric field”. The finger data
template can range anywhere from several hundred bytes to over
1,000 bytes depending upon the level of security that is required
and the method that is used to scan one's fingerprint. For these
reasons this work is motivated to present another way to tackle
the problem that is relies on the properties of Vector
Quantization coding algorithm.
Key words— Vector Quantization, Fingerprint, Vector
Quantization coding algorithm
I. INTRODUCTION
Nowadays, fingerprint recognition is one of the most
important biometric technologies based on fingerprint
distinctiveness, persistence and ease of acquisition. Although
there are many real applications using this technology, its
problems are still not fully solved, especially in poor quality
fingerprint images and when low-cost acquisition devices with
a small area are adopted.
Fig.1 Fingerprint Recognition process
In fingerprint recognition process, the important step which
affects on system accuracy is matching between template and
query fingerprint. Many solutions are
designed to increase this step’s accuracy ([1], [2], [3], [4],
[5], [6]). Fingerprint imaging technology looks to capture or
read the unique pattern of lines on the tip of one's finger. These
unique patterns of lines can either be in a loop, whorl, or arch
pattern [7]. There are several methods in accomplishing the
process of identifying one's fingerprint [8]. The two major
applications of fingerprint recognition are
fingerprint verification and fingerprint identification.
Verification is known as one-to-one fingerprint matching,
whereas, fingerprint identification is known as one-to-many
matching. Verification is used for access applications and
identification is used for investigation purposes. Many
successful approaches have been presented for verification
applications, where the identification field is still open
challenging area because of many problems. The main
common problem that the verification faces is the huge
database. This problem can be classified into two categories:
first is
establishing identify based on single print i.e. comparing a
latent print from the scene of a crime with prints from a file.
Second is establishing identify based on a set of ten fingerprint
records i.e. record [9]. After arrest or employment are
requirements. For reasons discussed in [10], the problem of the
first category is extremely difficult, whereas the second one has
greater quantity of information available from ten-print file
searching. The traditional systems have sequential structure
which suffers from a problem that the error propagates and
information is blocked which means that the second stage can
not use the information available at the first stage but it may
suffer from the errors caused by the first stage. Moreover,
conventionally, the matching process may use the following
features: ridges or valleys (or both), minutia i.e. its type,
location and direction, and global matching. Common Features
are shown in Table 1 and Figure 1 respectively.
Table 1. Common Features for Matching Process
Ridges Various patterns across
fingerprint
Valleys Spaces between ridges
Minutia Type (ending,
bifurcation)Location
(x,y)
Direction
Global
Patterns
Arch LoopWhorl
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34
33 | P a g e
Figure 2. Common global Patterns (above), common
Minutia
This work proposes new feature that can be used for
matching. The proposed feature is a vector generated after the
fingerprint image is compressed by Vector Quantization
Coding approach. This vector is uniquely representing the
entire image. Thus, it can
be effectively used for matching purposes. The proposed
algorithm is illustrated in section 3 and tested in section 4.
Section 5 concludes this work and gives some
recommendations. Before all, brief introduction to Vector
Quantization coding is given in next section.
2. Vector Quantization Coding Algorithm:
It uses a codebook that contains the pixel patterns with
the corresponding index on each of them. The main idea of VQ
in image coding is then to represent arrays of pixels by an
index in the codebook. In this way, compression is achieved
since the size of the index is usually a small fraction of that of
the block of pixels [11].
3. PROPOSED APPROCH:
A. Mechanism Of The proposed system :
In Figure 3. depicts the general mechanism of the
proposed system. After the fingerprint image is fed to the
system, it will be converted to binary image as a preprocessing
stage. Then the binary image is compressed using Vector
Quantization coding approach. The first stage in image vector
quantization is the image formation. The image data are first
partitioned into a set of vectors. A large number of vectors
from various images are then used to form a training set. The
training set is used to generate a codebook, normally using an
iterative clustering algorithm. The quantization or coding step
involves searching each input vector for the closest codeword
in the codebook. Then the corresponding index of the selected
codeword is coded and transmitted to the decoder. At the
decoder, the index is decoded and converted to the
corresponding vector with the same codebook as at the encoder
by look-up table. Thus, the design decisions in implementing
image vector quantization include [12]:
1. vector formation;
2. training set generation;
3. code book generation; and
4. quantization.
Figure 3. Flowchart for the proposed algorithm
the distance between the entire vector and the
corresponding vector in codebook is equal to zero, but because
of the entire image has not always the exact appearance to the
image that captured during the stage of building the codebook,
the distance may be greater. However, the shortest distance can
be used to point to the corresponding vector and then
fingerprint is identified.
Procedure Of Applying Proposed System:
The two important components for the system shown above
are the Vector Quantization coding compression stage and the
codebook. At compression stage the entire image which is
binary matrix is compressed using Vector Quantization coding
algorithm to produce a vector of almost 1/16 image size. For
instance, for the fingerprint image of size 256x256 or 65536
which uses 65536 bytes, the generated vector length is 4096
that is using 8192 bytes. Therefore, the memory size is
decreased by 1/8, from 65536bytes for original image to
8192bytes for corresponding vector. To build the codebook,
same procedure can be followed, by converting the database
(fingerprint images) to code vectors and assigning each one to
its corresponding owner. Thus the codebook contains vectors
rather than images. For instance, if we have 1 million finger
images for 1 million persons, this database is traditionally using
256x256x1000000 = 655360000000 bytes ~ = 154
Gigabytes, their corresponding vectors use only
20720x1000000 bytes ~= 19 Gigabytes. These simple
calculations lead to conclude that the identification rate has
gained many benefits such as high speed as well as low False
Acceptance Rate (FAR) / False Rejection Rate (FRR).
REFERENCES
[1] A. Jain, L. Hong, and R. Bolle, “On-line fingerprint
verification,” IEEE Trans. Pattern Anal. Machine Intell, vol.
19, pp 302–314, 1997. X. Jiang, W. Y. Yau, "Fingerprint
minutiae matching based on the local and global structures",
ICPR2000, vol. 2, 2000, pp 1042-1045.
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34
34 | P a g e
[2] A.K. Jain, S. Prabhakar, L. Hong, S. Pankanti, "Filterbank-
Based Fingerprint Matching", Image Processing, vol. 9, 2000, pp
846-859.
[3] K. Ito, A. Morita, T. Aoki, H. Nakajima, K. Kobayashi, T.
Higuch, "A Fingerprint Recognition Algorithm Combining
Phase-Based Image Matching and Feature-Based Matching",
International Conference on Biometrics, vol. 3832, 2006, pp
316–325.
[4] 4. L. Sha, F. Zhao, X. Tang, "Minutiae-based Fingerprint
Matching Using Subset Combination", The 18th
International
Conference on Pattern Recognition -ICPR'06, vol. 4, 2006, pp
566-569.
[5] X. Jiang, W. Y. Yau, "Fingerprint minutiae matching based on
the local and global structures", ICPR2000, vol. 2, 2000, pp.
1042-1045
[6] Xuejun Tan, Bir Bhanu, "Fingerprint matching by genetic
algorithms", Pattern Recognition, vol. 39, 2006, pp. 465 –477.
[7] Randell, N., Biometric basics, PC Magazine, April 1999, pp.
193-202.
[8] The Center for Unified Biometrics and Sensors
(CUBS), Fingerprint recognition, retrieved August 13, 2007:
http://www.cubs.buffalo.edu/fingerrecog.sht ml. Accessed
January 2008
[9] Abdurazzag Ali Aburas and Salem Ali Reheil, “New Promising
Tool for Off Line Arabic Handwritten Character Recognition
Based On JPEG2000 Image Compression”, IEEE-3rd
International Conference on Information & Communication
Technologies: From theory to Applications (ICTTA’08),
Damascus-Syria, April 47-11 2008
[10] McMahon, D.H.; Johnson, G.L.; Teeter, S.L.; Whitney, C.G.
(April 1975) A Hybrid Optical Computer Processing Technique
for Fingerprint Identification, IEEE Transactions on Computers
Volume C-24, Issue 4, Page(s):358 – 369
[11] Loben, C.: Introduction to Image Compression,
http://www/image.cityu.edu.hkl~/thesis/node9.html; 1998.
[12] Shi, Y.Q. and Sun, H.: Image and Video Compression for
Multimedia Engineering: Fundamentals, Algorithms and
Standards (1st ed.). CRC Press LLC, New York; 2000

Weitere ähnliche Inhalte

Was ist angesagt?

Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388
Editor IJARCET
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
IJRAT
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Correlation Based Fingerprint Liveness Detection
Correlation Based Fingerprint Liveness DetectionCorrelation Based Fingerprint Liveness Detection
Correlation Based Fingerprint Liveness Detection
Ashish Pawar
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
prjpublications
 

Was ist angesagt? (18)

Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...Segmentation and recognition of handwritten digit numeral string using a mult...
Segmentation and recognition of handwritten digit numeral string using a mult...
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 
Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388
 
Paper id 252014130
Paper id 252014130Paper id 252014130
Paper id 252014130
 
IRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry DetectionIRJET- A Review on Fake Biometry Detection
IRJET- A Review on Fake Biometry Detection
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
ANN Based Handwritten Signature Recognition System
ANN Based Handwritten Signature Recognition SystemANN Based Handwritten Signature Recognition System
ANN Based Handwritten Signature Recognition System
 
Handwriting identification using deep convolutional neural network method
Handwriting identification using deep convolutional neural network methodHandwriting identification using deep convolutional neural network method
Handwriting identification using deep convolutional neural network method
 
Cc4301455457
Cc4301455457Cc4301455457
Cc4301455457
 
Correlation Based Fingerprint Liveness Detection
Correlation Based Fingerprint Liveness DetectionCorrelation Based Fingerprint Liveness Detection
Correlation Based Fingerprint Liveness Detection
 
Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints dataset
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
 
Fingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A ReviewFingerprint Feature Extraction, Identification and Authentication: A Review
Fingerprint Feature Extraction, Identification and Authentication: A Review
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
 
An interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’sAn interactive image segmentation using multiple user input’s
An interactive image segmentation using multiple user input’s
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 

Andere mochten auch

Keamanan Jaringan Komputer
Keamanan Jaringan KomputerKeamanan Jaringan Komputer
Keamanan Jaringan Komputer
Ari Yandi
 
STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...
STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...
STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...
International Journal of Technical Research & Application
 
APRENDIZAJE AUTONOMO NANCY
APRENDIZAJE AUTONOMO NANCYAPRENDIZAJE AUTONOMO NANCY
APRENDIZAJE AUTONOMO NANCY
UNIVIM
 
Social media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnisSocial media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnis
monicamcg0789
 
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLESASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
International Journal of Technical Research & Application
 

Andere mochten auch (20)

Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Providing incentives
Providing incentivesProviding incentives
Providing incentives
 
Uso de comandos insert, update y delete en bases de datos de sql server
Uso de comandos insert, update y delete en bases de datos de sql serverUso de comandos insert, update y delete en bases de datos de sql server
Uso de comandos insert, update y delete en bases de datos de sql server
 
1415650144 chapter10 --- (1)
1415650144 chapter10 --- (1)1415650144 chapter10 --- (1)
1415650144 chapter10 --- (1)
 
Furuvik
Furuvik Furuvik
Furuvik
 
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
 
Keamanan Jaringan Komputer
Keamanan Jaringan KomputerKeamanan Jaringan Komputer
Keamanan Jaringan Komputer
 
STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...
STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...
STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...
 
Social media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnisSocial media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnis
 
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACHIMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
 
2015 опис досвіду обдаровані блог
2015 опис досвіду обдаровані  блог2015 опис досвіду обдаровані  блог
2015 опис досвіду обдаровані блог
 
STRUCTURAL AND DIELECTRIC STUDIES OF TERBIUM SUBSTITUTED NICKEL FERRITE NANOP...
STRUCTURAL AND DIELECTRIC STUDIES OF TERBIUM SUBSTITUTED NICKEL FERRITE NANOP...STRUCTURAL AND DIELECTRIC STUDIES OF TERBIUM SUBSTITUTED NICKEL FERRITE NANOP...
STRUCTURAL AND DIELECTRIC STUDIES OF TERBIUM SUBSTITUTED NICKEL FERRITE NANOP...
 
Final assignment
Final assignmentFinal assignment
Final assignment
 
APRENDIZAJE AUTONOMO NANCY
APRENDIZAJE AUTONOMO NANCYAPRENDIZAJE AUTONOMO NANCY
APRENDIZAJE AUTONOMO NANCY
 
Social media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnisSocial media mediasharing-monicamcginnis
Social media mediasharing-monicamcginnis
 
Ijtra150135
Ijtra150135Ijtra150135
Ijtra150135
 
COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...
COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...
COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...
 
Ijtra130519
Ijtra130519Ijtra130519
Ijtra130519
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
 
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLESASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
 

Ähnlich wie A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUANTIZATION

Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
eSAT Journals
 
Sign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture AnalysisSign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture Analysis
paperpublications3
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
prjpublications
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
prj_publication
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
CSCJournals
 

Ähnlich wie A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUANTIZATION (20)

Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
 
1834 1840
1834 18401834 1840
1834 1840
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.AV.KARTHIKEYAN PUBLISHED ARTICLE A.A
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
 
System for Fingerprint Image Analysis
System for Fingerprint Image AnalysisSystem for Fingerprint Image Analysis
System for Fingerprint Image Analysis
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
Sign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture AnalysisSign Language Recognition with Gesture Analysis
Sign Language Recognition with Gesture Analysis
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
 
Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition 2
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
 
A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.A Survey on Fingerprint Identification for Different Orientation Images.
A Survey on Fingerprint Identification for Different Orientation Images.
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 

Mehr von International Journal of Technical Research & Application

EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
International Journal of Technical Research & Application
 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
International Journal of Technical Research & Application
 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
International Journal of Technical Research & Application
 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIRAN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
International Journal of Technical Research & Application
 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTYEFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
International Journal of Technical Research & Application
 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
International Journal of Technical Research & Application
 

Mehr von International Journal of Technical Research & Application (20)

STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEWSTUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
 
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
 
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONSSTUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
 
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
 
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTERPOD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
 
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGADIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIRAN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
 
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESSLI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
 
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
 
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEWSCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTYEFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
 
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
 
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
 
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASHA STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
 
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
 
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUANTIZATION

  • 1. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34 32 | P a g e A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUANTIZATION NAGHAM J. SHUKUR M.Sc in Space technologies and Communicatinon Unit of Applied Sciences Researchs, School of Applied Sciences, University of Technology, Baghdad, Iraq Abstract— Fingerprints are imprints formed by friction ridges of the skin and thumbs. They have long been used for identification because of their immutability and individuality. Immutability refers to the permanent and unchanging character of the pattern on each finger. Individuality refers to the uniqueness of ridge details across individuals; the probability that two fingerprints are alike is about 1 in 1.9x1015. In despite of this improvement which is adopted by the Federal Bureau of Investigation (FBI), the fact still is “The larger the fingerprint files became, the harder it was to identify somebody from their fingerprints alone. Moreover, the fingerprint requires one of the largest data templates in the biometric field”. The finger data template can range anywhere from several hundred bytes to over 1,000 bytes depending upon the level of security that is required and the method that is used to scan one's fingerprint. For these reasons this work is motivated to present another way to tackle the problem that is relies on the properties of Vector Quantization coding algorithm. Key words— Vector Quantization, Fingerprint, Vector Quantization coding algorithm I. INTRODUCTION Nowadays, fingerprint recognition is one of the most important biometric technologies based on fingerprint distinctiveness, persistence and ease of acquisition. Although there are many real applications using this technology, its problems are still not fully solved, especially in poor quality fingerprint images and when low-cost acquisition devices with a small area are adopted. Fig.1 Fingerprint Recognition process In fingerprint recognition process, the important step which affects on system accuracy is matching between template and query fingerprint. Many solutions are designed to increase this step’s accuracy ([1], [2], [3], [4], [5], [6]). Fingerprint imaging technology looks to capture or read the unique pattern of lines on the tip of one's finger. These unique patterns of lines can either be in a loop, whorl, or arch pattern [7]. There are several methods in accomplishing the process of identifying one's fingerprint [8]. The two major applications of fingerprint recognition are fingerprint verification and fingerprint identification. Verification is known as one-to-one fingerprint matching, whereas, fingerprint identification is known as one-to-many matching. Verification is used for access applications and identification is used for investigation purposes. Many successful approaches have been presented for verification applications, where the identification field is still open challenging area because of many problems. The main common problem that the verification faces is the huge database. This problem can be classified into two categories: first is establishing identify based on single print i.e. comparing a latent print from the scene of a crime with prints from a file. Second is establishing identify based on a set of ten fingerprint records i.e. record [9]. After arrest or employment are requirements. For reasons discussed in [10], the problem of the first category is extremely difficult, whereas the second one has greater quantity of information available from ten-print file searching. The traditional systems have sequential structure which suffers from a problem that the error propagates and information is blocked which means that the second stage can not use the information available at the first stage but it may suffer from the errors caused by the first stage. Moreover, conventionally, the matching process may use the following features: ridges or valleys (or both), minutia i.e. its type, location and direction, and global matching. Common Features are shown in Table 1 and Figure 1 respectively. Table 1. Common Features for Matching Process Ridges Various patterns across fingerprint Valleys Spaces between ridges Minutia Type (ending, bifurcation)Location (x,y) Direction Global Patterns Arch LoopWhorl
  • 2. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34 33 | P a g e Figure 2. Common global Patterns (above), common Minutia This work proposes new feature that can be used for matching. The proposed feature is a vector generated after the fingerprint image is compressed by Vector Quantization Coding approach. This vector is uniquely representing the entire image. Thus, it can be effectively used for matching purposes. The proposed algorithm is illustrated in section 3 and tested in section 4. Section 5 concludes this work and gives some recommendations. Before all, brief introduction to Vector Quantization coding is given in next section. 2. Vector Quantization Coding Algorithm: It uses a codebook that contains the pixel patterns with the corresponding index on each of them. The main idea of VQ in image coding is then to represent arrays of pixels by an index in the codebook. In this way, compression is achieved since the size of the index is usually a small fraction of that of the block of pixels [11]. 3. PROPOSED APPROCH: A. Mechanism Of The proposed system : In Figure 3. depicts the general mechanism of the proposed system. After the fingerprint image is fed to the system, it will be converted to binary image as a preprocessing stage. Then the binary image is compressed using Vector Quantization coding approach. The first stage in image vector quantization is the image formation. The image data are first partitioned into a set of vectors. A large number of vectors from various images are then used to form a training set. The training set is used to generate a codebook, normally using an iterative clustering algorithm. The quantization or coding step involves searching each input vector for the closest codeword in the codebook. Then the corresponding index of the selected codeword is coded and transmitted to the decoder. At the decoder, the index is decoded and converted to the corresponding vector with the same codebook as at the encoder by look-up table. Thus, the design decisions in implementing image vector quantization include [12]: 1. vector formation; 2. training set generation; 3. code book generation; and 4. quantization. Figure 3. Flowchart for the proposed algorithm the distance between the entire vector and the corresponding vector in codebook is equal to zero, but because of the entire image has not always the exact appearance to the image that captured during the stage of building the codebook, the distance may be greater. However, the shortest distance can be used to point to the corresponding vector and then fingerprint is identified. Procedure Of Applying Proposed System: The two important components for the system shown above are the Vector Quantization coding compression stage and the codebook. At compression stage the entire image which is binary matrix is compressed using Vector Quantization coding algorithm to produce a vector of almost 1/16 image size. For instance, for the fingerprint image of size 256x256 or 65536 which uses 65536 bytes, the generated vector length is 4096 that is using 8192 bytes. Therefore, the memory size is decreased by 1/8, from 65536bytes for original image to 8192bytes for corresponding vector. To build the codebook, same procedure can be followed, by converting the database (fingerprint images) to code vectors and assigning each one to its corresponding owner. Thus the codebook contains vectors rather than images. For instance, if we have 1 million finger images for 1 million persons, this database is traditionally using 256x256x1000000 = 655360000000 bytes ~ = 154 Gigabytes, their corresponding vectors use only 20720x1000000 bytes ~= 19 Gigabytes. These simple calculations lead to conclude that the identification rate has gained many benefits such as high speed as well as low False Acceptance Rate (FAR) / False Rejection Rate (FRR). REFERENCES [1] A. Jain, L. Hong, and R. Bolle, “On-line fingerprint verification,” IEEE Trans. Pattern Anal. Machine Intell, vol. 19, pp 302–314, 1997. X. Jiang, W. Y. Yau, "Fingerprint minutiae matching based on the local and global structures", ICPR2000, vol. 2, 2000, pp 1042-1045.
  • 3. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34 34 | P a g e [2] A.K. Jain, S. Prabhakar, L. Hong, S. Pankanti, "Filterbank- Based Fingerprint Matching", Image Processing, vol. 9, 2000, pp 846-859. [3] K. Ito, A. Morita, T. Aoki, H. Nakajima, K. Kobayashi, T. Higuch, "A Fingerprint Recognition Algorithm Combining Phase-Based Image Matching and Feature-Based Matching", International Conference on Biometrics, vol. 3832, 2006, pp 316–325. [4] 4. L. Sha, F. Zhao, X. Tang, "Minutiae-based Fingerprint Matching Using Subset Combination", The 18th International Conference on Pattern Recognition -ICPR'06, vol. 4, 2006, pp 566-569. [5] X. Jiang, W. Y. Yau, "Fingerprint minutiae matching based on the local and global structures", ICPR2000, vol. 2, 2000, pp. 1042-1045 [6] Xuejun Tan, Bir Bhanu, "Fingerprint matching by genetic algorithms", Pattern Recognition, vol. 39, 2006, pp. 465 –477. [7] Randell, N., Biometric basics, PC Magazine, April 1999, pp. 193-202. [8] The Center for Unified Biometrics and Sensors (CUBS), Fingerprint recognition, retrieved August 13, 2007: http://www.cubs.buffalo.edu/fingerrecog.sht ml. Accessed January 2008 [9] Abdurazzag Ali Aburas and Salem Ali Reheil, “New Promising Tool for Off Line Arabic Handwritten Character Recognition Based On JPEG2000 Image Compression”, IEEE-3rd International Conference on Information & Communication Technologies: From theory to Applications (ICTTA’08), Damascus-Syria, April 47-11 2008 [10] McMahon, D.H.; Johnson, G.L.; Teeter, S.L.; Whitney, C.G. (April 1975) A Hybrid Optical Computer Processing Technique for Fingerprint Identification, IEEE Transactions on Computers Volume C-24, Issue 4, Page(s):358 – 369 [11] Loben, C.: Introduction to Image Compression, http://www/image.cityu.edu.hkl~/thesis/node9.html; 1998. [12] Shi, Y.Q. and Sun, H.: Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms and Standards (1st ed.). CRC Press LLC, New York; 2000