750 research outputs found

    Personal Authentication Using Finger Images

    Get PDF
    As the need for personal authentication increases, biometrics systems have become the ideal answer to the security needs. This paper presents a novel personal authentication system which uses simultaneously acquired finger-vein and finger texture images of the same person. A virtual fingerprint is generated combining these two images. The result of the combination i.e. the virtual fingerprint is then subjected to pre-processing steps including binarization, normalization, enhancement and Region of Interest (ROI) segmentation. Gabor filter is used to extract features. The feature extracted image is matched with the database. This proposed system is designed such that to achieve better performance in terms of matching accuracy, execution time, memory required and security. DOI: 10.17762/ijritcc2321-8169.15017

    A new algorithm for minutiae extraction and matching in fingerprint

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.A novel algorithm for fingerprint template formation and matching in automatic fingerprint recognition has been developed. At present, fingerprint is being considered as the dominant biometric trait among all other biometrics due to its wide range of applications in security and access control. Most of the commercially established systems use singularity point (SP) or ‘core’ point for fingerprint indexing and template formation. The efficiency of these systems heavily relies on the detection of the core and the quality of the image itself. The number of multiple SPs or absence of ‘core’ on the image can cause some anomalies in the formation of the template and may result in high False Acceptance Rate (FAR) or False Rejection Rate (FRR). Also the loss of actual minutiae or appearance of new or spurious minutiae in the scanned image can contribute to the error in the matching process. A more sophisticated algorithm is therefore necessary in the formation and matching of templates in order to achieve low FAR and FRR and to make the identification more accurate. The novel algorithm presented here does not rely on any ‘core’ or SP thus makes the structure invariant with respect to global rotation and translation. Moreover, it does not need orientation of the minutiae points on which most of the established algorithm are based. The matching methodology is based on the local features of each minutiae point such as distances to its nearest neighbours and their internal angle. Using a publicly available fingerprint database, the algorithm has been evaluated and compared with other benchmark algorithms. It has been found that the algorithm has performed better compared to others and has been able to achieve an error equal rate of 3.5%

    Multimodal Biometrics Enhancement Recognition System based on Fusion of Fingerprint and PalmPrint: A Review

    Get PDF
    This article is an overview of a current multimodal biometrics research based on fingerprint and palm-print. It explains the pervious study for each modal separately and its fusion technique with another biometric modal. The basic biometric system consists of four stages: firstly, the sensor which is used for enrolmen

    Iris Recognition Approach for Preserving Privacy in Cloud Computing

    Get PDF
    Biometric identification systems involve securing biometric traits by encrypting them using an encryption algorithm and storing them in the cloud. In recent decades, iris recognition schemes have been considered one of the most effective biometric models for identifying humans based on iris texture, due to their relevance and distinctiveness. The proposed system focuses on encrypting biometric traits. The user’s iris feature vector is encrypted and stored in the cloud. During the matching process, the user’s iris feature vector is compared with the one stored in the cloud. If it meets the threshold conditions, the user is authenticated. Iris identification in cloud computing involves several steps. First, the iris image is pre-processed to remove noise using the Hough transform. Then, the pixel values are normalized, Gabor filters are applied to extract iris features. The features are then encrypted using the AES 128-bit algorithm. Finally, the features of the test image are matched with the stored features on the cloud to verify authenticity. The process ensures the privacy and security of the iris data in cloud storage by utilizing encryption and efficient image processing techniques. The matching is performed by setting an appropriate threshold for comparison. Overall, the approach offers a significant level of safety, effectiveness, and accuracy

    Fast and efficient palmprint identification of a small sample within a full image.

    Get PDF
    In some fields like forensic research, experts demand that a found sample of an individual can be matched with its full counterpart contained in a database. The found sample may present several characteristics that make this matching more difficult to perform, such as distortion and, most importantly, a very small size. Several solutions have been presented intending to solve this problem, however, big computational effort is required or low recognition rate is obtained. In this paper, we present a fast, simple, and efficient method to relate a small sample of a partial palmprint to a full one using elemental optimization processes and a voting mechanic. Experimentation shows that our method performs with a higher recognition rate than the state of the art method, when trying to identify palmprint samples with a radius as small as 2.64 cm

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications

    Fractal analysis of fingerprints

    Get PDF
    Current methods for comparing fingerprints have weaknesses that have opened them to criticism. Current methods concentrate on the comparison of minutia in the print either manually or with the assistance of a computer algorithm. This causes these methods to depend highly on the presence of minutia and their relationship to one another. Absence or rotations of minutia can prevent current methods form making accurate comparisons. The goal of this process is to develop a new method for analyzing fingerprints that addresses many of the concerns with current methods.;The developed process uses an iterated function sequence (IFS) to convert the image of a fingerprint into a fractal pattern. The input for the IFS is constructed by a random walk through the image. Once a fingerprint is converted into a fractal pattern, the fractals can be used to make comparisons. Fractals are well defined mathematical objects that make them far easier to compare than fingerprints themselves. This process addresses many of the issues with current methods. This method is global in nature and thus it is not dependent on a set number of minutiae. Moreover, the rules for the random walk are constructed so as to make the fractal produced invariant of orientation of the print.;This method offers a new fast way to compare images. This method can be used to increase confidence, both in court and public opinion, in the use of fingerprints as identification. It can offer both an independent and/or supplemental method to the current ones used

    3D minutiae extraction in 3D fingerprint scans.

    Get PDF
    Traditionally, fingerprint image acquisition was based on contact. However the conventional touch-based fingerprint acquisition introduces some problems such as distortions and deformations to the fingerprint image. The most recent technology for fingerprint acquisition is touchless or 3D live scans introducing higher quality fingerprint scans. However, there is a need to develop new algorithms to match 3D fingerprints. In this dissertation, a novel methodology is proposed to extract minutiae in the 3D fingerprint scans. The output can be used for 3D fingerprint matching. The proposed method is based on curvature analysis of the surface. The method used to extract minutiae includes the following steps: smoothing; computing the principal curvature; ridges and ravines detection and tracing; cleaning and connecting ridges and ravines; and minutiae detection. First, the ridges and ravines are detected using curvature tensors. Then, ridges and ravines are traced. Post-processing is performed to obtain clean and connected ridges and ravines based on fingerprint pattern. Finally, minutiae are detected using a graph theory concept. A quality map is also introduced for 3D fingerprint scans. Since a degraded area may occur during the scanning process, especially at the edge of the fingerprint, it is critical to be able to determine these areas. Spurious minutiae can be filtered out after applying the quality map. The algorithm is applied to the 3D fingerprint database and the result is very encouraging. To the best of our knowledge, this is the first minutiae extraction methodology proposed for 3D fingerprint scans
    corecore