IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, July, 2013, Pg. 74-78

International Journal of Research in Information Technology (IJRIT)


ISSN 2001-5569

Review on Fingerprint Recognition System Using Minutiae Estimation 1


Er.Manu Kumar Garg, 2 Er.Harish Bansal

M.tech Scholar, Department of Electronics & Communication Engineering, Maharishi Markandeshwar University, Mullana (Ambala), INDIA 2

Asst. Prof. Department of Electronics & Communication Engineering, Maharishi Markandeshwar University, Mullana (Ambala), INDIA



[email protected] , [email protected]

Abstract Biometric recognition is the process of identifying the match between two identical or non-identical pattern through Biometric recognition techniques like fingerprints, face, retina, palm print and iris. Every person identifying with their own characteristics. Several studies show that the biometric authentication system based on recognizing the uni-modal biometric template suffer from insufficient accuracy caused by noisy data, limited degrees of freedom, non-distinctive and non-universal biometric traits. In this recognizing technique there are many processes involved such as histogram equalization, fast Fourier transformation, image binarization, marking region of interest, ridge thinning and marking minutiae, removing false minutiae, calculate the minutiae characteristics details for both fingerprints to be matched which help in recognition. All of these techniques suffer from a common problem of inability to differentiate between an authorized person and an impostor who fraudulently acquires the access privilege of the authorized person. In this paper some approaches for better fingerprint recognition are reviewed.

Keywords: CBM, FFT, IB, MBM.

1. Introduction Fingerprint recognition process is very much popular in the area of research for last many years. For reliable identification of fingerprint, feature extraction plays an important role. Digital processing of biometric signal (fingerprint, face, thumb) and various algorithms plays a vital role for fast and accurate automatic fingerprint recognition technology. Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. Because of their uniqueness and consistency over time, fingerprints have been used for over a century, more recently becoming automated (i.e. a biometric) due to advancement in computing capabilities. Fingerprint identification is popular because of the inherent ease in acquisition, the numerous sources (ten fingers) available for collection, and their established use and collections by law enforcement

Er.Manu Kumar Garg, IJRIT


and immigration. Fingerprint recognition (sometimes referred to as dactyls copy) is the process of comparing questioned and known fingerprint against another fingerprint to determine if the impressions are from the same finger or palm. The major advantages of this traditional personal identification are that these are very simple and can be easily integrated into different systems at low cost. However, these approaches are not based on any inherent attributes of an individual to make it a personal identification and ,thus have a number of disadvantages like tokens may be lost, stolen, forgotten, or misplaced; PIN may be forgotten or guessed by impostors. Security can be easily breached in these systems. Therefore, modern security systems are based on unique personal identification to make the same more robust and secure. Modern security systems are based on unique personal identification to make the same more robust and secure. Typical example includes biometrics such as fingerprint, face and the pattern of a retina. It includes two sub-domains: one is fingerprint verification and the other is fingerprint identification (Figure 1). In addition, different from the manual approach for fingerprint recognition by experts, the fingerprint recognition here is referred as AFRS (Automatic Fingerprint Recognition System), which is program-based.. The match score used for making the similarity of the input feature vectors to the feature vector patterns for the reference system [1].

Fig.1.General Flow of fingerprint verification System [1].

2. Biometric Authentication Techniques The biometric authentication is essentially a pattern-recognition technique that makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. The authentication can be divided into two modules [2].

2.1 Enrolment Module The enrolment module is responsible for enrolling individuals into the biometric system. During the enrolment phase, the biometric characteristic of an individual is first scanned by a biometric reader to produce a raw digital representation of the characteristic. In order to facilitate matching, the raw digital representation is usually further processed by feature extractor to generate a compact but expensive representation, called a template. Depending on the application, the template may be stored in the central database. Depending on the biometric system, a person may need to present biometric data several times in order to enroll. Either the reference template may then represent an amalgam of the captured data or several enrolment templates may be stored. The quality of the template or templates is critical in the overall success of the biometric application.

Er.Manu Kumar Garg, IJRIT


2.2 Identification or Verification Module Biometrics can be used in one of two modes: verification or identification. Verification, also called authentication, is used to verify a person’s identity. In verification systems, the step after enrolment is to verify that a person is who he or she claims to be (i.e., the person who enrolled). After the individual provides an identifier, the biometric is presented, which the biometric system captures, generating a trial template that is based on the vendor’s algorithm. The system then compares the trial biometric template with this person’s reference template, which was stored in the system during enrolment, to determine whether the individual’s trial and stored templates match. The term verification is often referred to as 1:1 (one-to-one) matching. Verification systems can contain databases ranging from dozens to millions of enrolled templates but are always predicated on matching an individual’s presented biometric against his or her reference template. There are two types of identification systems: positive and negative. Positive identification systems are designed to ensure that an individual’s biometric is enrolled in the database. The anticipated result of a search is a match. A typical positive identification system controls access to a secure building or secure computer by checking anyone who seeks access against a database of enrolled employees. Negative identification systems are designed to ensure that a person’s biometric information is not present in a database. The anticipated result of a search is a no match [3].

3. Fingerprint Matching Technique The large number of approaches to fingerprints matching can be classified into three families [1]. 3.1 Correlation-based matching (CBM) Two fingerprint images are superimposed and the correlation between corresponding pixels is computed for different alignments (e.g. various displacements and rotations). 3.2 Minutiae-based matching (MBM) This is the most popular and widely used technique, being the basis of the fingerprint comparison made by fingerprint examiners. Minutiae are extracted from the two fingerprints and stored as sets of points in the twodimensional plane. Minutiae-based matching essentially consists of finding the alignment between the template and the input minutiae sets that results in the maximum number of minutiae. 3.3 Pattern-based matching (PBM) Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a previously stored template and a candidate fingerprint. This requires that the images be aligned in the same orientation. To do this, the algorithm finds a central point in the fingerprint image and centers on that. In a patternbased algorithm, the template contains the type, size, and orientation of patterns within the aligned fingerprint image. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match.

Er.Manu Kumar Garg, IJRIT


4. Implementation Method 4.1 Algorithm The fingerprint recognition system mentioned in this dissertation is based on two broad steps: a) Minutiae Extractor. b) Minutiae Matcher. These further comprises of many steps as mentioned below [4]. Minutiae Extraction Step 1 Histogram Equalization Step 2

Fast Fourier Transformation

Step 3

Image Binarization

Step 4

Marking Region of Interest

Step 5

Ridge Thinning and Marking Minutiae

Step 6

Removing False Minutiae

Minutiae Matching Step 7 Calculate the Minutiae Characteristics details for both fingerprints to be matched Step 8

Transform Minutiae sets and calculate percentage match and compare the results against set threshold

5. Conclusion From past six decades, many researches and advancements have taken place in this area, many systems have been developed but still after years of research and development the accuracy of automatic fingerprint recognition through minutiae estimation is one of the important research challenges. During the years ahead, it is hoped that fingerprint recognition will make it possible to verify the identity of persons accessing systems; allow automated control of services by minutiae estimation , such as banking transactions; and also control the flow of private and confidential data. In this review paper some a brief overview of the techniques for fingerprint recognition has been discussed. Thus CBM, MBM, PBM etc. are some examples of fingerprint recognizing techniques that enhanced and played a prominent role in the fingerprint recognition area. But MBM technique is mostly prefer than other technique which gives better results. The work can be improved in the future by use of other region of interest calculation algorithm of images. It is because these are the most time consuming step in this algorithm.

Er.Manu Kumar Garg, IJRIT


6. References

[1] Sangram Bana, et al. International Journal of Advanced Engineering Sciences and Technologies (IJAEST) Vol No. 5, Issue No. 1, 012 - 023, February- 2011. [2] A. Majumdar and R. K. Ward “Fingerprint Recognition with Curve let Features and Fuzzy KNN Classifier” Signal and Image Processing, 2008. [3] Musa MohdMokji and Syed Abd. Rahman Syed Abu Bakar, “Directional Image Construction Based on Wavelet Transform for Fingerprint Classification and Matching”, National Conference on Computer Graphics and Multimedia, pp. 331 -335, 2002Veera Ala-Keturi, ‘Speech Recognition Based on Artificial Neural Networks.’’ [4] Veer Wan Azizun, Wan Adnan, Lim Tze Siang and SalasiahHitam, “Fingerprint Recognition in Wavelet Domain,” Jurnalteknologi,Dis.,pp5-42, 2004Douglas L. Jones, Swaroop Appadwedula, Matthew Berry, Mark Haun, Jake Janovetz, Michael Kramer, Dima Moussa, Daniel Sachs, Brian Wade,’’ Speech Processing: Theory of LPC Analysis and Synthesis’’ Connexions module: m10482, Version 2.19: Jun 1, 2009. [5] Zhang Qinghui and Zhang Xiangfei, “Research of Key Algorithm in the Technology of Fingerprint Identification,” Second IEEE International Conference on Computer Modeling and Simulation, pp. 282-284, 2010.

Er.Manu Kumar Garg, IJRIT


Review on Fingerprint Recognition System Using Minutiae ... - IJRIT

IJRIT International Journal of Research in Information Technology, Volume 1, ... it a personal identification and ,thus have a number of disadvantages like tokens.

744KB Sizes 1 Downloads 52 Views

Recommend Documents

A Review: Study of Iris Recognition Using Feature Extraction ... - IJRIT
INTRODUCTION. Biometric ... iris template in database. There is .... The experiments have been implemented using human eye image from CASAI database.

A Novel approach for Fingerprint Minutiae Extraction by ...
analysis digital security and many other applications. Fingerprints are fully formed at about seven months of fetus development and finger ridge configurations do not ... point or island, spur and crossover. A good quality fingerprint typically conta

Video Conference System Using Raspberry Pi - IJRIT
the early 1970s as part of AT&T's development of Picture phone technology. With the ... (such as phone and Internet), by reducing the need to travel, which is often carried out by aero plane, to .... There is no arrangement for audio input in Raspber

A Novel approach for Fingerprint Minutiae Extraction by ...
analysis digital security and many other applications. .... missing information and removes spurious minutiae. .... Find indices (r, c) of nonzero elements. d.

An Approach For Minutiae-based Fingerprint Feature ...
incorporating the weight factor and encoding the degree of irregularity ... System architecture ..... [Online]. Available: http://bias.csr.unibo.it/fvc2004/databases.asp.

A Protected Interruption Recognition system aligned with ... - IJRIT
Keywords: Wireless mobile ad-hoc network, security goal, security attacks, ... need an interruption recognition system, which can be categorized into two ..... in this process is reasonable with a good network performance in terms of security as.

Implementation of Portable ECG Data Acquisition System using ... - IJRIT
can receive the updates through media like mobile phones and cautioned whenever an emergency service is required. Keywords: ARM7TDMI, LPC2148, SPI ... dumped into the LPC2148 through the serial UART port using Flash Magic software. During this proces