The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a novel, efficient way to identify things to which it is difficult to attach identifiers such as markers, barcodes and RFID tags. With our proposed method, a dot of metallic or glitter ink is attached onto an object and is identified as unique by matching a microscopic image of the dot with a database. The ink is an inexpensive consumer product. It is a mixture of a basic ink with micro...
The online fingerprints by biometric system is not widely used now a days and there is less scope as user is friendly with the system. This paper represents a framework and applying the latent fingerprints obtained from the crime scene. These prints would be matched with our database and we identify the criminal. For this process we have to get the fingerprints of all the citizens. This technique...
There are various types of applications for fingerprint recognition which is used for different purposes. Fingerprint is one of the challenging pattern Recognition problem. The Fingerprint Recognition system is divided into four stages. First is Acquisition stage to capture the fingerprint image, The second is Pre-processing stage to enhancement, binarization, thinning fingerprint image. The Third...
Biometrics are used for authentication. It is used to recognize a person based on their unique characteristics. Among several biometrics, Fingerprint is the most widely used and acceptable biometrics. Biometric system has several advantages over traditional methods. But It can be affected by several attacks. In this paper the type 1 attack is discussed which is performed at the sensor level. Differentiating...
In this paper, the Quaternion Zernike Moments (QZMs) are addressed for digital fingerprints matching. First, we realize a triplets' representation which will be input to the M3gl algorithm in order to obtain the matched triplets' pairs. Then, the neighborhood of each of these triplets is characterized by QZMs descriptor. Finally, we perform a global matching step and compute the similarity score for...
Vehicle ego-localization is a critical task not only for in-car navigation systems, but also for emerging intelligent and autonomous vehicle technologies. Visual localization methods that determine current location by performing image matching against a pre-constructed database have an accuracy limited by the spatial distance between database images. In this paper we propose a method that uses the...
Fingerprint scanners usually suffer from spoofing attack of fake fingerprints. To address this issue, a pore based liveness detection method has been proposed in this paper. The method first extracts the sweat pores from the grayscale fingerprint image. This is achieved by processing the fingerprint image using the Gaussian filters, whose parameters are adaptively adjusted according to the local ridge...
Personnel identification has become a mandatory requirement in a large number of applications extending from security to commercial nature in recent years. Identification mechanism using Biometric-based solutions has shown to overcome several drawbacks of traditional security measures. Among different biometric traits, fingerprint is one of the most universal, permanent and easy to acquire trait for...
It is not uncommon to lose everyday objects outside your home. Currently, there are very few technological resources to help locate lost objects. This paper discusses a multi-platform mobile application that provides a solution to this issue. Lost and found mobile application helps people report lost and found objects through their mobile phones rather than going through the procedure of filling up...
Multiple enrollment based fingerprint recognition systems have for long been known for good recognition accuracies. They however suffer poor matching speeds, a lot of memory consumption and the recognition accuracies are still very low; making implementation in real-world applications difficult. This paper presents a novel approach that performs prior selection of good fingerprint image samples of...
Identity verification is very important in the world today and it is used in our everyday life. Systems like smart card identity verification has its weakness and it can be easily abused. The integration between fingerprint verification and National Registration Identity Card (MyKad) verification elevates the security in identification to the highest level as fingerprints are unique from one another...
In this project, we are presenting a new concept for preserving fingerprint confidential. Identification of fingerprint is an active area of search. In most portions we are manipulating recognition of fingerprint for enhancing the isolation and safety. The matching methods can be of two types-enrolment of fingerprint and authentication of fingerprint. The union of fingerprint for protecting isolation...
In this paper, fingerprint images compressed with WSQ, CAWDR and JPEG2000 are evaluated for fingerprint recognition performance. With high compression ratio between 40:1 to 160:1, fingerprint images which lost a lot of their details are used to find fingercodes, or core point. Euclidean Distance is the method used to find the matched fingerprint. We also proposed the subband-reduced CAWDR method which...
In recent decades, the classification of fake fingerprints and real fingerprint images has become an attractive research topic because of the most advanced threats. A number of research works have been carried out to classify fake and real fingerprints. But, most of the existing techniques did not utilize swarm intelligence techniques in their fingerprint classification system. Swarm intelligence...
Fingerprint evidence is undoubtedly the most reliable and acceptable evidence till date in the court of law. Fingerprints are obtained at the site of crime and in many old monuments and in excavated things. Estimating the gender of fingerprints is an emerging field and many methods using the fingerprint physical features like the ridge count and the ridge thickness have been used so far. Due to the...
Person identification and recognition using fingerprints as a biometric authentication is one of the unique, prominent and reliable method of verification processes. The paper presents fingerprint authentication system using filter bank based matching algorithm. The algorithm uses Gabor filter bank to extract features of fingerprints. These features are then compared for identification and recognition...
This paper discusses about the effects of bit plane extraction in fingerprint recognition. An alternative approach to recognise a fingerprint from extracted bit plane is analysed in attempt to find the best bit plane used for recognition. An 8-bit greyscale fingerprint image is extracted into 8 different bit planes. Each bit plane of the images is then used as the input image for recognition. A fingerprint...
Fingerprints are unique, permanent and universal. The minutiae of fingerprints of a human have sufficient details. We can use these non-trivial details as identification marks to verify the fingerprints. The purpose of this paper is to investigate and implement the working of minutiae based fingerprint matching system. Minutiae based fingerprint matching is widely used for fingerprint verification...
Our objective of this project is to apply the theory of linear algebra called “singular value decomposition (SVD)” to digital image processing, specifically for fingerprint images verification. For optimal recognition, we proceed in two steps. In the first step, we begin by identifying the fingerprint features with SVD approach. In the second step, the classification accuracy of the proposed approach...
This paper proposes ANN based method for fingerprint ROI (Region of Interest) segmentation. Proposed ANNs where trained with 10000 samples extracted from 20 fingerprint images (in grey-scale and binary modes). The experimental results, including three statistical performance indicators, shows very good performance of the proposed method on a test database of 200 fingerprint images.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.