SlideShare a Scribd company logo
1 of 52
FINGER PRINTS
RECOGNITION SYSTEM
S.ANITHALAKSHMI
50409621003
AbstrAct
 The minutiae are ridge endings or bifurcations on the
fingerprints. They, including their coordinates and
direction, are most distinctive features to represent the
fingerprint.
 Most fingerprint recognition systems store only the
minutiae template in the database for further usage.
 The conventional methods to utilize minutiae
information are treating it as a point set and finding the
matched points from different minutiae sets.
 This kind of minutiae-based fingerprint recognition
systems consists of two steps, i.e., minutiae
extraction and minutiae matching.
 In the minutiae matching process, the minutiae
feature of a given fingerprint is compared with the
minutiae template, and the matched minutiae will be
found out.
 The template used for fingerprint recognition is
further utilized in the matching stage to enhance the
system’s performance.
 These templates are been stored in the database for further
processing.
 Specific unique id is generated for each template stored.
 The id is stored in the database along with the template locations.
 Next is the verification process where you need to provide the id
for comparison.
 The given id is being compared with the id’s in the database and
matched with the corresponding template of that id.
 A message is being displayed on successful matching along
with the score.
 Otherwise an failure message is displayed indicating match not
found.
 In the identification stage we need not specify an id. Click on
the Identify button which searches for any match and provides
the corresponding result.
 The database records can also be deleted through the
application.
 Auto extract and Auto identify check boxes can be selected if
need which automatically extracts and identifies the matching
image
 It is also possible to load an image and compare it with the
database images.
 The colors of the template extraction can also be changed.
OrGANIZAtIONAL PrOFILE
OrAtOr sOLUtIONs
 The name “Orator”– A Good Speaker, One who speaks
well in public. A good speaker has lot of followers.
Like that, We people are good speaker by our work.
We satisfy our clients by our services. And we are here
to provide Intelligent
SKILLS
 Banking & Real Estate
 Finance & Insurance
o Hospital and health care industry
o Web Applications
o Office Automation
o Manufacturing Retailing
HArDWArE rEQUIrEMENts
 Processor PENTIUM IV
 RAM 128 MB
 Hard Disk 40 GB
sOFtWArE rEQUIrEMENts
 Browser Internet Explorer
 Server side scripting Java
 Database Ms-Access
 Client side scripting HTML
ExIstING systEM
 The conventional methods to utilize minutiae
information are treating it as a point set and finding the
matched points from different minutiae sets.
 In existing system, the Sparse areas are not considered.
So the result may not obtain correctly. And the
matching will be difficult to get an absolute result.
FingerPrint View
Red Spots Minutiae
PrOPOsED systEM
 In Proposed system, we considered the sparse area
and the fingerprint’s orientation field is reconstructed
from minutiae and further utilized in the matching
stage to enhance the system’s performance.
DESIGN OF THE PROJECT
DaTa FlOw DIaGRam
Show the matching Score
Thump Impression
Extract
Particular Identify
Entire Verification
Database
If Matches Show the Particular ID No
Does Not Exist
False
True
If Matches
Does not match
False
True
Enroll
mODulE lIST
 Minutiae Template
 Minutiae Matching
 Effective Region Estimation
 Orientation Field Matching
 Fusing Matching
mINuTIaE TEmPlaTE
 Minutiae templates are a fraction of the size of
fingerprint images, require less storage memory
and can be transmitted electronically faster than
images.
mINuTIaE maTCHING
 In this module we matches the fingerprint minutiae
by using both the local and global structures of
minutiae.
 The local structure of a minutia describes a rotation
and translation invariant feature of the minutia in its
neighborhood.
 It is used to find the correspondence of two minutiae
sets and increase the reliability of the global matching.
 The global structure of minutiae reliably determines
the uniqueness of fingerprint. Therefore, the local and
global structures of minutiae together provide a solid
basis for reliable and robust minutiae matching.
(a) X Person’s Fingerprint (b) X Person’s Fingerprint for
verification
Matching Stage
EFFECTIvE REGION
ESTImaTION
 we can extract the effective region by finding the
smallest envelope that contains all the minutiae
points. For an When only having minutiae feature, we
can extract the effective region by only using
minutiae illustration. Here, we put the original image
together for the convenience to give a visual sense.
Estimation of Effective Region
ORIENTaTION FIElD
maTCHING
 To compare two fingerprints’ orientation field, the
first step is alignment of these two fingerprints. The
alignment is mainly based on minutiae information .
Here we choose the Hough transform based approach
to finish the alignment due to its simplicity.
 Hough Transform (HT) is one of the most common
methods for detecting shapes (lines, circles, etc.) in
binary or edge images. Its advantage is its ability to
detect discontinuous patterns in noisy images, but it
requires a large amount of computing power.
FuSING maTCHING
 A variety of combination rules have been proposed. It
has shown that matching accuracy can be improved
by combining independent matchers using Neyman–
Pearson rule. Here, we will also use Neyman–Pearson
rule for the task.
 Matching of test fingerprint with template is done in
Neyman-Pearson rule. Two sets of minutiae are
compared. If matching score is found, then the
fingerprint is matched with template. Otherwise does
not matched with the template.
INPuT aND OuTPuT SCREENS
Main Page
Authentication
Load BMP Image
Extract Template
Enroll
Reports
Verify
Verify
Identify
ClearDatabase
ClearLog
Benefits of the project
 The project can be used for security purposes.
 E.g. : Attendance ,
voter registration,
Crime Investigation,
forensic fingerprint searching.
CONCLUSION
Orientation field is important for fingerprint
representation. In order to utilize the orientation
information in automatic fingerprint recognition
systems which only stores minutiae feature. So we can
reduce the usage of memory and enhancing the
performance of system.
We also utilize the reconstructed orientation field
information into the matching stage. We can reduce
the effect of wrongly detected minutiae. A fingerprint
matching based on orientation field is used to combine
with conventional minutiae matching for real
applications.
THANK YOU

More Related Content

What's hot

Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric systemAalaa Khattab
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsUsman Sheikh
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system pptRavi Kumar
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition Usman Siddique
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein AuthenticationANEESH SASIDHARAN
 

What's hot (20)

Iris scanning
Iris scanningIris scanning
Iris scanning
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Multi modal biometric system
Multi modal biometric systemMulti modal biometric system
Multi modal biometric system
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
Face recognigion system ppt
Face recognigion system pptFace recognigion system ppt
Face recognigion system ppt
 
Biometric Security Systems ppt
Biometric Security Systems pptBiometric Security Systems ppt
Biometric Security Systems ppt
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Bio-metric Gait Recognition
Bio-metric Gait Recognition Bio-metric Gait Recognition
Bio-metric Gait Recognition
 
Presentation Fingervein Authentication
Presentation Fingervein AuthenticationPresentation Fingervein Authentication
Presentation Fingervein Authentication
 

Viewers also liked

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Sandeep Kumar Panda
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Lakshmi Sarvani Videla
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentationhimanshubhatti
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMManish Negi
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013JJ Wu
 
Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013JJ Wu
 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTSNexgen Technology
 
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...IOSR Journals
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintJayakrishnan U
 
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULESINNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULESEditor IJMTER
 

Viewers also liked (20)

Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013
 
Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013
 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 
Ullas_CV
Ullas_CVUllas_CV
Ullas_CV
 
3 Content/Body
3 Content/Body3 Content/Body
3 Content/Body
 
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULESINNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
 

Similar to Fingerprint Recognition System Using Minutiae & Orientation Field Matching

ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhhppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhhshaikfahim2127
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET Journal
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningIRJET Journal
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System iosrjce
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Sagar Deogirkar
 
Modex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex
 
Data Science in business World
Data Science in business World Data Science in business World
Data Science in business World DeepikaGauriBaijal
 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET Journal
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image ProcessingIRJET Journal
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET Journal
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsVijay Karan
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsVijay Karan
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...IJCSEIT Journal
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
 

Similar to Fingerprint Recognition System Using Minutiae & Orientation Field Matching (20)

ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhhppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
 
finger prints
finger printsfinger prints
finger prints
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 
Modex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual Overview
 
AI NOTES.docx
AI NOTES.docxAI NOTES.docx
AI NOTES.docx
 
Data Science in business World
Data Science in business World Data Science in business World
Data Science in business World
 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image Processing
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Fingerprint Recognition System Using Minutiae & Orientation Field Matching

  • 2. AbstrAct  The minutiae are ridge endings or bifurcations on the fingerprints. They, including their coordinates and direction, are most distinctive features to represent the fingerprint.  Most fingerprint recognition systems store only the minutiae template in the database for further usage.  The conventional methods to utilize minutiae information are treating it as a point set and finding the matched points from different minutiae sets.
  • 3.  This kind of minutiae-based fingerprint recognition systems consists of two steps, i.e., minutiae extraction and minutiae matching.  In the minutiae matching process, the minutiae feature of a given fingerprint is compared with the minutiae template, and the matched minutiae will be found out.  The template used for fingerprint recognition is further utilized in the matching stage to enhance the system’s performance.
  • 4.  These templates are been stored in the database for further processing.  Specific unique id is generated for each template stored.  The id is stored in the database along with the template locations.  Next is the verification process where you need to provide the id for comparison.  The given id is being compared with the id’s in the database and matched with the corresponding template of that id.
  • 5.  A message is being displayed on successful matching along with the score.  Otherwise an failure message is displayed indicating match not found.  In the identification stage we need not specify an id. Click on the Identify button which searches for any match and provides the corresponding result.
  • 6.  The database records can also be deleted through the application.  Auto extract and Auto identify check boxes can be selected if need which automatically extracts and identifies the matching image  It is also possible to load an image and compare it with the database images.  The colors of the template extraction can also be changed.
  • 7. OrGANIZAtIONAL PrOFILE OrAtOr sOLUtIONs  The name “Orator”– A Good Speaker, One who speaks well in public. A good speaker has lot of followers. Like that, We people are good speaker by our work. We satisfy our clients by our services. And we are here to provide Intelligent SKILLS  Banking & Real Estate  Finance & Insurance
  • 8. o Hospital and health care industry o Web Applications o Office Automation o Manufacturing Retailing
  • 9. HArDWArE rEQUIrEMENts  Processor PENTIUM IV  RAM 128 MB  Hard Disk 40 GB
  • 10. sOFtWArE rEQUIrEMENts  Browser Internet Explorer  Server side scripting Java  Database Ms-Access  Client side scripting HTML
  • 11. ExIstING systEM  The conventional methods to utilize minutiae information are treating it as a point set and finding the matched points from different minutiae sets.  In existing system, the Sparse areas are not considered. So the result may not obtain correctly. And the matching will be difficult to get an absolute result.
  • 13. PrOPOsED systEM  In Proposed system, we considered the sparse area and the fingerprint’s orientation field is reconstructed from minutiae and further utilized in the matching stage to enhance the system’s performance.
  • 14. DESIGN OF THE PROJECT
  • 15. DaTa FlOw DIaGRam Show the matching Score Thump Impression Extract Particular Identify Entire Verification Database If Matches Show the Particular ID No Does Not Exist False True If Matches Does not match False True Enroll
  • 16. mODulE lIST  Minutiae Template  Minutiae Matching  Effective Region Estimation  Orientation Field Matching  Fusing Matching
  • 17. mINuTIaE TEmPlaTE  Minutiae templates are a fraction of the size of fingerprint images, require less storage memory and can be transmitted electronically faster than images.
  • 18. mINuTIaE maTCHING  In this module we matches the fingerprint minutiae by using both the local and global structures of minutiae.  The local structure of a minutia describes a rotation and translation invariant feature of the minutia in its neighborhood.  It is used to find the correspondence of two minutiae sets and increase the reliability of the global matching.  The global structure of minutiae reliably determines the uniqueness of fingerprint. Therefore, the local and global structures of minutiae together provide a solid basis for reliable and robust minutiae matching.
  • 19. (a) X Person’s Fingerprint (b) X Person’s Fingerprint for verification Matching Stage
  • 20. EFFECTIvE REGION ESTImaTION  we can extract the effective region by finding the smallest envelope that contains all the minutiae points. For an When only having minutiae feature, we can extract the effective region by only using minutiae illustration. Here, we put the original image together for the convenience to give a visual sense.
  • 22. ORIENTaTION FIElD maTCHING  To compare two fingerprints’ orientation field, the first step is alignment of these two fingerprints. The alignment is mainly based on minutiae information . Here we choose the Hough transform based approach to finish the alignment due to its simplicity.  Hough Transform (HT) is one of the most common methods for detecting shapes (lines, circles, etc.) in binary or edge images. Its advantage is its ability to detect discontinuous patterns in noisy images, but it requires a large amount of computing power.
  • 23. FuSING maTCHING  A variety of combination rules have been proposed. It has shown that matching accuracy can be improved by combining independent matchers using Neyman– Pearson rule. Here, we will also use Neyman–Pearson rule for the task.  Matching of test fingerprint with template is done in Neyman-Pearson rule. Two sets of minutiae are compared. If matching score is found, then the fingerprint is matched with template. Otherwise does not matched with the template.
  • 24. INPuT aND OuTPuT SCREENS
  • 28.
  • 29.
  • 30.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 42.
  • 44.
  • 46.
  • 50. Benefits of the project  The project can be used for security purposes.  E.g. : Attendance , voter registration, Crime Investigation, forensic fingerprint searching.
  • 51. CONCLUSION Orientation field is important for fingerprint representation. In order to utilize the orientation information in automatic fingerprint recognition systems which only stores minutiae feature. So we can reduce the usage of memory and enhancing the performance of system. We also utilize the reconstructed orientation field information into the matching stage. We can reduce the effect of wrongly detected minutiae. A fingerprint matching based on orientation field is used to combine with conventional minutiae matching for real applications.