Fingerprint Core Location Algorithm Based on Sliding Window

  • Xiangshen Min
  • Xuefeng Zhang
  • Fang Ren
Computer Science


In order to improve the efficiency of the fingerprint core location algorithm, a fingerprint core location method using sliding window on the basis of core location algorithm with the complex filter was proposed. The local region of the fingerprint image was extracted by a fixed-size window sliding in the region of the fingerprint image, and the selected local region by window as the calculation object is used to detect the core. The experiment results show that the method cannot only effectively detect fingerprint core, but also improve the efficiency of the detection algorithm comparing with the global fingerprint core location detection algorithm.

Key words

fingerprint core sliding window complex filter 

CLC number

TP 391 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Chen Y. Realization of automatic fingerprint identification system [J]. Journal of Zhejiang University of Science and Technology, 2012, 24(4): 303–306 (Ch).Google Scholar
  2. [2]
    Murillo-Escobar M A, Cruz-Hernández C, Abundiz-Pérez F. A robust embedded biometric authentication system based on fingerprint and chaotic encryption [J]. Expert Systems with Applications, 2015, 42: 8198–8211.CrossRefGoogle Scholar
  3. [3]
    Bringer J, Morel C, Rathgeb C. Security analysis and improvement of some biometric protected templates based on bloom filters [J]. Image and Vision Computing, 2017, 58: 239–253.CrossRefGoogle Scholar
  4. [4]
    Gomez-Barrero M, Maiorana E, Galbally J. Multi-biometric template protection based on homomorphic encryption [J]. Pattern Recognition, 2017, 67: 149–163.CrossRefGoogle Scholar
  5. [5]
    Khan H S, AliAkbar M, Shahzad F. Secure biometric template generation for multi-factor authentication [J]. Pattern Recognition, 2015, 48: 458–472.CrossRefGoogle Scholar
  6. [6]
    Chin Y J, Ong T S, Teoh A B J. Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion [J]. Information Fusion, 2014, 18: 161–174.CrossRefGoogle Scholar
  7. [7]
    Chen D H, Han S F, Jiang T. Fingerprint classification method based on binary image and core [J]. Application Research of Computers, 2008, 25(7): 2190–2192.Google Scholar
  8. [8]
    Ye X J. Research on fingerprint matching algorithm based on location of the core [J]. Modern Electronics Technique, 2006, 11: 98–100.Google Scholar
  9. [9]
    Zhong Y C, Zhu S K, Lin Y, et al. Fingerprint matching algorithm based on core point and minutiae [J]. Microelectronics & Computer, 2011, 28(1): 34–37.Google Scholar
  10. [10]
    Sengupta A, Mukhopadhyay S. A robust algorithm for fingerprint core-point detection [J]. IEEE Student Technology Symposium, 2011, 16: 154–157.CrossRefGoogle Scholar
  11. [11]
    Li X L, Zhou M J, Zhang C X. Algorithm of core point based on the fingerprint directional image [J]. Information Technology, 2014, 10: 95–97.Google Scholar
  12. [12]
    Weng D W, Yi Y L, Yang G P. Singular point extraction from fingerprint based on Gaussian-Hermite moment and improved Poincare index [J]. Journal of Computer Research and Development, 2008, 45(11): 1974–1977(Ch).Google Scholar
  13. [13]
    Tan T Z, Ning B B, Yi Y L. A method for singularity detection in fingerprint images [J]. Journal of Software, 2003, 14(6): 1082–1087(Ch).Google Scholar
  14. [14]
    Wang Y S, Liu W, Wang Z R. Core point detection of fingerpoint based on tracing ridges [J]. Computer Systems & Applications, 2011, 20(6): 140–143(Ch).Google Scholar
  15. [15]
    Liang L W, Zhao H D, He P, et al. Algorithm of extracting core point in fingerprint [J]. Journal of Hebei University of Technology, 2007, 36(1): 45–47(Ch).Google Scholar
  16. [16]
    Yang K, Zeng L B, Wang D C. A fast arithmetic for the erosion and dilation operations of mathematical morphology [J]. Computer Engineering and Applications, 2005, (34): 54–56(Ch).Google Scholar

Copyright information

© Wuhan University and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Telecommunication and Information EngineeringXi’an University of Posts and TelecommunicationsXi’an, ShaanxiChina

Personalised recommendations