Advertisement

Analysis of Fingerprint Image to Verify a Person

  • Hossein Jahankhani
  • Maktuba Mohid
Part of the Communications in Computer and Information Science book series (CCIS, volume 92)

Abstract

Identification and authentication technologies are increasing day by day to protect people and goods from crime and terrorism. This paper is aimed to discuss fingerprint technology in depth and analysis of fingerprint image. Verify a person with a highlight on fingerprint matching. Some fingerprint matching algorithms are analysed and compared. The outcomes of the analysis has identified some major issues or factors of fingerprinting, which are location, rotation, clipping, noise, non-linear distortion sensitiveness/ insensitiveness properties, computational cost and accuracy level of fingerprint matching algorithms. Also a new fingerprint matching algorithm proposed in this research work. The proposed algorithm has used Euclidean distance, angle difference, type as matching parameters instead of specific location parameter (like, x or y coordinates), which makes the algorithm location and rotation insensitive. The matching of local neighbourhoods at each stage makes the algorithm non-linear distortion insensitive.

Keywords

Fingerprint Image False Acceptance Rate False Rejection Rate Fingerprint Pattern Biometric Measure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hong, L., Wan, Y., Jain, A.: Fingerprint image enhancement: algorithm and performance evaluation 20(8), 777–789 (1998), http://www.cs.ru.ac.za/courses/Honours/mmcourse/security/biometrics/MSU-CPS-97-35.pdf (Accessed July 4, 2009)
  2. 2.
    Greenberg, S., Aladjem, M., Kogan, D.: Fingerprint image enhancement using filtering techniques 8(3), 227–236 (2002), http://www.cs.kent.edu/~wcheng/Presentation%201%20Image%20Enhancement/Fingerprint%20Image%20Enhancement%20using%20FilterTechniques.pdf (July 5, 2009)
  3. 3.
    Chikkerur, S., Cartwright, A.N., Govindaraju, V.: K-plet and CBFS: A Graph Based Fingerprint Representation and Matching Algorithm (2006), http://web.mit.edu/sharat/www/research/papers/kplet_long.pdf (July 21, 2009)
  4. 4.
    Kaur, M., Singh, M., Girdhar, A., Sandhu, P.S.: Fingerprint Verification System using Minutiae Extraction Technique (2008), http://www.waset.org/journals/waset/v46/v46-85.pdf (Accessed July 23, 2009)
  5. 5.
    O’Gorman, L.: Fingerprint Verification  (479), 43–64 (1999), http://www.cse.msu.edu/~cse891/Sect601/textbook/2.pdf (Accessed July 25, 2009)
  6. 6.
    Isenor, D.K., Zaky, S.G.: Fingerprint Identification using Graph Matching*  19(2), 113–122 (1986)Google Scholar
  7. 7.
    Khazaei, H., Mohades, A.: Fingerprint Matching and Classification using an Onion Layer algorithm of Computational Geometry 1(1) (2007), http://www.naun.org/journals/mcs/mcs-5.pdf (Accessed July 26, 2009)
  8. 8.
    Chikkerur, S., Wu, C., Govindaraju, V.A.: Systematic Approach for Feature Extraction in Fingerprint Images, vol. 3072, pp. 344–350 (2004), http://www.cubs.buffalo.edu/pdf/finger-systematic.pdf (September 15, 2009)
  9. 9.
    Corman, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms. MIT Press, Cambridge (1990)Google Scholar
  10. 10.
    DDS (Digital development System): Fingerprint Verification Algorithm (2006), http://www.dds.co.jp/en/fv/algorithm.html (Accessed July 21, 2009)
  11. 11.
    Federal Bureau of Investigation: Taking legible fingerprints, http://www.fbi.gov/hq/cjisd/takingfps.html (Accessed June 20, 2009)
  12. 12.
    Grannblog: Problems with fingerprints for authentication, http://blog.granneman.com/2006/05/13/problems-with-fingerprints-for-authentication/ (Accessed June 20, 2009)
  13. 13.
    Crimtrac: Fingerprint analysis – the basics (2008), http://www.crimtrac.gov.au/systems_projects/FingerprintAnalysis-TheBasics.html (Accessed June 20, 2009)
  14. 14.
    IT University Copenhagen: Morphology, http://www.itu.dk/courses/MBSB/E2005/Download/morphology.pdf (July 5, 2009)
  15. 15.
    Atalasoft DotImage 8.0: Morphology (2009), http://www.atalasoft.com/Products/dotimage/docs/Morphology.html (July 5, 2009)
  16. 16.
    University of Wales Aberystwyth: Aberystwyth Users site (2007), http://users.aber.ac.uk/sac4/cs180/index.html (Accessed June 20, 2009)
  17. 17.
    Wikipedia: Biometrics (2009), http://en.wikipedia.org/wiki/Biometrics (Accessed June 20, 2009)
  18. 18.
    Wikipedia: Transformation matrix (2009), http://en.wikipedia.org/wiki/Transformation_matrix (Accessed July 22, 2009)

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Hossein Jahankhani
    • 1
  • Maktuba Mohid
    • 1
  1. 1.School of Computing, IT and EngineeringUniversity of East LondonUK

Personalised recommendations