SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Poster Paper
Proc. of Int. Conf. on Advances in Signal Processing and Communication 2013

Various Mathematical and Geometrical Models for
Fingerprints: A Survey
Manish Kumar Saini, J. S. Saini, and Shachi Sharma
Electrical Engineering Department
Deenbandhu Chhotu Ram University of Science & Technology, Murthal, Sonepat, Haryana, India
Email: shachisharmas28@gmail.com
Abstract - Fingerprints are the most universal, unique and
persistent biometrics. The growing interest and eventually
the need for advanced security, privacy and user convenience
has put an access to fingerprint recognition, beyond the other
biometrics recognition systems. Despite the ingenious
methods improvised to increase the efficiency of detection in
growing identity frauds, the growing demands for fingerprint
as a biometric recognition system has quickly become
overwhelming. Major challenges coming in the way of a robust
fingerprint recognition system are the presence of noise, cuts,
wet or dry images, different pressure and skin conditions, etc.
The main objective of this paper is to review the extensive
research on fingerprint recognition over the last decades and
to address the present challenges. A comprehensive analysis
can be made from the tabular form of the presented summary
table using various techniques and features. Finally, the future
directions of fingerprint recognition are explored.

extraction, comparison and matching. Image enhancement
belongs to preprocessing. Image enhancement is done to
improve the image quality by a fingerprint recognition system
[6]. Next block is feature extraction, where different features
are extracted for comparison and matching [7], [8]. Next block
is for comparing the extracted feature with the previous data
stored in the database [9]. The last and the final stage is
matching or indexing, which is done either by classification
or matching [10]. Fingerprint classification and indexing
techniques speed up the search in fingerprint based
identification systems.. The current state of the art algorithms
for fingerprint matching are too expensive [11].

Keywords – Biometric, Local and Global features, Minutiae.

I. INTRODUCTION
Biometric recognition refers to the use of distinctive
physiological and behavioural characterstics called biometric
identifiers for automatically recognizing individuals [1]. An
important issue in designing a practical biometric system is
to determine, how an individual is recognized? Based upon
application context, a biometric system may be classified as a
verification system or identification system [2]. In comparison
to traditional keywords or passwords or token based systems,
the biometric identifiers are considered more reliable for
recognition for they cannot be forged easily [3].
Fingerprint recognition is among one of the most ultimate
and desirable research areas in the field of pattern recognition.
Owning to its persistency, distinctiveness and immutability,
fingerprints are used as the most attractive biometric identifier
worldwide. For achieving high efficiency, better security and
public convenience, provokes the need and importance of a
robust fingerprint recognition system [4]. Further due to its
security and law enforcement applications, and being a
valuable answer to various private and government
organizations in growing identity frauds, fingerprints are the
current subject of interest and the emerging priority [5]. The
important issues in fingerprint recognition are the affected
performance due to the major challenge to various skin
conditions, noise or scars present in an image and what
features to be used to categorize fingerprint classes.
The typical process of fingerprint recognition is illustrated
in Fig 1. There are mainly 4 steps: preprocessing, feature
59
© 2013 ACEEE
DOI: 03.LSCS.2013.3.25

Figure 1: Generalized Block Diagram of Fingerprint
System

Recognition

Section II elaborates the various approaches of fingerprint
recognition. In particular, it discusses the fingerprint features
used for distinguishing fingerprint classes and reviews the
methods of enhancement, extraction and classification that
motivates better recognition of an image. Further, a
comprehensive analysis is made in a tabular form at the end
of section II. Section III & IV sums up with the conclusion
and future aspects.
II. RELATED WORKS
This section glints through various fingerprint recognition
algorithms and methods through various approaches like
mathematical, neural and geometric, using different features
for enhancement, extraction and classification.
A. Mathematical Approaches
F. Turroni et al. propose a method to estimate the ridge
orientation deploying STFT and gradient method to reduce
an error [12] and other in [33].
Poster Paper
Proc. of Int. Conf. on Advances in Signal Processing and Communication 2013
TABLE I. : SUMMARY OF VARIOUS TECHNIQUES

1.
2.
3.
4.
5.

Author
M.Liu
et al.[19]
H. Tairi
al.[20]
A. K. Jain
al.[10]
D. Maltoni
al.[21]
A. K. Jain
al. [11]

MATHEMATICAL APPROACHES
Technique Used
Database
Features Used
Polar complex Moments NIST
& Singular regions.
FVC
STFT & Hu Moments
FVC
Singular regions.

et
et

Wavelet transform &
Gabor filters.
Parzen window method
with Gaussian kernel.
Gradient
based
reconstruction algorithm.

et
et

FVC

Minutiae
Pores

Extraction & Location.

Distinguishable location
& size.

Singular Points.

Singular
verification.

More robust & accurate.

FVC

7.

J. Zhou et al.
[22]

NIST
FVC02

8.

H A Qader et
al. [23]
D. Singh et
al.[24]

DORIC, gradient &
polynomial methods &
SVM.
Zernike Moments.

2.

1.
2.

1.

2.

Pseudo
Zernike
moments & wavelets.

Author
Z.M. Kovacs
et al .[25]

Technique Used
Harmonic
coefficients
estimation & geometric
approach.
Global alignment.

Author
B. Popovic
et al.[27]
A. K. Jain et
al. [28]

Technique Used
Log- Gabor filtering in
frequency domain.
Fast
enhancement
algorithm.

Author
C. Yu
et al.[17]

Technique Used
Shrinking & Expanding
algorithm
Fuzzy zones also used.
Artificial neural network.

1.

Author
R. Cappelli
et al.[30]

Technique Used
Exclusive classification
& indexing based on
scalar & vector features.

1.

Author
H. Xu et
al.[31]
Author
D. Weng
et al.[32]

2002

Core points.

Fingerprint matching.

2002

Orientation field

Fingerprint matching.

High
accuracy
matching.
Error rate decreases.

2000

Local &
features.

Fingerprint
verification.

Better rate is obtained
than the compared one.

global

GEOMETRIC APPROACHES
Database
Features used
NIST
Ridges
SDB4

Recognition
Identification
classification.

&

1.
2.

Author
L. Zhang
et al.[7]
A. K. Jain
et al. [9]

Identification

Database
FVC

Features Used
Minutiae

MSU DB

Ridges & valley.

Recognition
Fingerprint Enhancement to
remove spurious minutiae.
Fingerprint enhancement.

Efficiency
More efficient than
older one.
More accurate than
older one.

Recognition
Removal of noisy singular
points & detecting them.

Efficiency
Distinguishable
location & size.

Fingerprint matching.

More efficient &
robust than earlier
mentioned.

Recognition
Fingerprint Indexing.

Efficiency
More efficient & faster
than older one.

NEURAL APPROACHES
Database
Features Used
FVC
Singular points

FVC

Minutiae

SEARCHING APPROACHES
Database
Features Used
NIST DB14
Ridge orientation.

CLASSIFIER APPROACHES
Database
Features Used
Recognition
FVC
Singular points & Fingerprint
Minutiae.
Verification.
MODEL & RESOLUTION BASED APPROACHES
Technique Used
Database
Features Used
Recognition
Zero Pole Model & Least FVC
Ridges.
Singular
mean square estimation.
detection.
OTHER APPROACHES
Features Used
Pores

Technique Used
Pore Valley Descriptor.

Database
FVC

Classification algorithm.

NIST 14 DB

Feature vector code.

Better approach
previous one.

than

Efficiency
Better
than
the
technique compared.

points

Recognition
Pore
extraction
Matching.
Fingerprint
classification.

&

Efficiency
Multiple
resolution
obtained, hence more
robust & better.
Efficiency
Better than older one.
Better accuracy than
earlier compared.

[13].

B. Geometric Approaches
Further, a 3D technique is introduced by D. Maltoni et al.
using minutia angles and distances for fingerprint recognition
© 2013 ACEEE
DOI: 03.LSCS.2013.3.25

Efficiency
Less computation time
in identification.

NIST
& Minutiae
FVC
FILTERING APPROACHES

Technique Used
A novel algorithm.

1.

point

FVC
DB1

A. Pokhriyal
et al. [2]

J. K. Gupta et
al.[29]

4,

&

FVC
DB1
FVC
DB1

Hidden Markov Model.

G. Zhang et
al. [26]

Better than previous
mentioned.
Consistent reconstructed
image.

FVC

Highpass filtering &
Correlation filtering.

1.

Fingerprint
Classification.
Orientation field
matching.

Fingerprint Matching.

FVC

N. Manivan et
al. [8]

10.

Fingerprint Matching.

Efficiency
Better performance than
the earlier mentioned.
Better Approach than
the earlier mentioned.
Error rate decreased.

Level 3 features.
(pores)
Singular regions.

6.

9.

Recognition
Fingerprint Indexing.

C. Neural Approaches
L. Ji and Z. Yi propose a method to investigate the effect
60
Poster Paper
Proc. of Int. Conf. on Advances in Signal Processing and Communication 2013
of neurons, using neural network approach through a fast
and accurate orientation field estimation algorithm introduced
in [14].

REFERENCES
[1] D. Maltoni, D. Maio and A.K. Jain, S. Prabhakar, “ Handbook
of Fingerprint Recognition”, Springer-Verlag. 2009.
[2] A. Pokhriyal and S. Lehri, “ A new method of fingerprint
authentication using 2D wavelets”, Journal Of Theoretical
And Applied Information Technology, Vol 13,No. 2, pp 131 –
138, 2010.
[3] D. Kumar, Dr.Y. Ryu and Dr.D. Kwon, “A Survey on Biometric
Fingerprints: The Cardless Payment System”, Proceedings in
IEEE Conference, pp1-5, 2008.
[4] S. Li and A.C. Kot, “ Privacy protection of fingerprint database”,
IEEE Signal Processing Letters, Vol 18 ,No 2, pp115-118,
2011.
[5] M. Vatsa, R. Singh, S. Bharadwaj, H. Bhatt and R. Mashruwala
, “ Analyzing Fingerprints of Indian Population Using Image
Quality:A UIDAI Case Study”, Proceed ings in IEEE
Conference, pp 1-5, 2010.
[6] S. Chikkerur, A.N. Cartwright and V. Govindaraju, “ Fingerprint
enhancement using STFT analysis”, Pattern Recognition
Society, pp 1-5, 2006.
[7] Q. Zhao, D. Zhang, L. Zhang and N. Luo, “ High resolution
partial fingerprint alignment using pore-valley descriptors”,
Pattern Recognition Letters, pp 1050-1061, 2010.
[8] N. Manivan, S. Memom and W. Balachandran, “ Automatic
detection of active sweat pores of fingerprint using Highpass
and Correlation filtering”, Electronics Letters, Vol 46, No. 8,
pp 1-2, 2010.
[9] A.K. Jain, S. Prabhakar and L. Hong, “A Multichannel Approach
to Fingerprint Classification. IEEE Transactions On Pattern
Analysis And Machine Intelligence”, Vol 21, pp 4-8, 1999.
[10] A.K. Jain, Y.Chen and M. Demirkus, “ Pores and Ridges: High
resolution fingerprint matching using Level 3 features”, IEEE
Transactions on Pattern Analysis and Machine Intelligenceo,
Vol 29, No. 1, pp 15-26, 2007.
[11] A.K. Jain and J. Feng, “ Fingerprint reconstruction: From
minutiae to phase. IEEE Transactions on Pattern Analysis
and Machine Intelligence”, Vol 33, No. 2, pp 209-223, 2011.
[12] F. Turroni, D. Maltoni and D. Maio, “ Improving fingerprint
orientation extraction. IEEE Transactions on Information
Forensics And Security”, Vol 6, No. 3, pp 1002-1013, 2011.
[13] R. Cappelli, “ Minutia cylinder-code : A new representation
and matching technique for fingerprint recognition”, IEEE
Transactions on Pattern Analysis and Machine Intelligence,
Vol 32,No. 12, pp 2128-2141,2010.
[14] L. Ji and Z. Yi, “ Fingerprint orientation field estimation using
ridge projection”, Journal Of Pattern Recognition Society,Vol
41, pp 1491-1503, 2008.
[15] D. Maio, R. Cappelli and M. Ferrara, “ Candidate list reduction
based on the analysis of fingerprint indexing scores”, IEEE
Transactions On Information Forensics And Security, Vol 6,
pp 1160-1164, 2011.
[16] D. Zhang, F. Liu, G. Lu and N. Luo, “ Selecting a reference high
resolution for fingerprint recognition using minutiae and pores.”,
IEEE Transactions On Instrumentation And Measurement, Vol
60, No.3, pp 863-871, 2011.
[17] C.Y. Huang, L.M. Liu and D.C. Hung, “ Fingerprint analysis
and singular point detection”, Journal Of Pattern Recognition
Society, Vol 28, pp 1937-1945, 2007.
[18] F. Turroni, D. Maltoni and D. Maio, “ Improving fingerprint
orientation extraction”, IEEE Transactions on Information
Forensics And Security, Vol 6, No. 3, pp 1002-1013, 2011.

D. Filtering And Classifier Approaches
H. Choi et al. discuss a matching algorithm, using a Breadth
first search for minutiae and ridge features detection. Further,
the searching approach combines two more methods for
minutiae extraction, using DRLC and SRLC as given by J.H.
Shin et al. and the Variable threshold method, based on score
difference and ratio for fingerprint indexing by D. Maio et al.
[15].
E. Model Based Approaches
D . Zhang et al. further identify the optimal resolution for
an automated fingerprint recognition system, introducing a
resolution method using acquisition device [16]. Similar
approach is also used by C. Yu et al. for fingerprint recognition
[17].
F. Other Approaches
A.K. Jain further employ Gabor filters and goodness index
for fast enhancement and verification of a fingerprint [18].
Latent fingerprints are matched using ridge features to
increase the identification rate by A.K. Jain [34]. Further, a
comprehensive analysis can be done with the following table
1 using different features through different approaches in
fingerprint recognition.
III. CONCLUDING REMARKS
From the above survey, we can conclude that fingerprint
continues to be one of the most important and attractive
biometric identifiers than other biometrics, and inspite of so
many techniques and proposed algorithms, fingerprint
recognition is still a challenging task in the present scenario.
Hence the problem can be formulated to go further for optimal
results. A comparative study can be found from Table1,
comparing different techniques using different features. It is
still difficult to have accurate algorithms capable of extracting
salient features and matching them in a sturdy way, both in
poor quality images and in small area regions. There is a
popular misconception that automatic fingerprint recognition
is a fully solved problem. On the contrary, fingerprint
recognition is still a challenging and important pattern
recognition problem.
IV. FUTURE WORK
The future study of fingerprint recognition might use
combination of features of level 1, level 2 and level 3. The
fairly exhaustive survey points to the fact that in future work,
one may stand benefitted by a further exploration of relative
advantages of combining not only the feature levels but also
by exploration of multiple approaches of tackling these
features information.

© 2013 ACEEE
DOI: 03.LSCS.2013.3.25

61
Poster Paper
Proc. of Int. Conf. on Advances in Signal Processing and Communication 2013
[19] M. Liu and P.T. Yap, “ Invariant representation of orientation
fields for fingerprint indexing”, Pattern Recognition Letters,
Vol 45, pp 2532- 2542, 2012.
[20] K. Abbad, A. Aarab and H. Tairi, “ Fingerprint verification
based on Minutiae and Moments”, IEEE Conference, pp 1-8,
2010.
[21] D. Maltoni and R. Cappelli, “ Spatial distribution of fingerprint
singularities”, IEEE Transactions on Pattern Analysis and
Machine Intelligence, Vol 31, No. 4, pp 742-748, 2009.
[22] J. Zhou, F. Chen and J. Gu, “ A novel algorithm for detecting
singular points from fingerprint images” IEEE Transactions
On PAMI, Vol 31, No. 7, pp 1239-1250, 2009.
[23] H.A. Qader, “ Fingerprint Recognition Using Zernike
Moments”, International Arab Journal of Information
Technology, Vol 4, pp 372-377, 2007.
[24] D. Singh, P.K. Singh and R.K. Shukla, “ Fingerprint Recognition
System Based on Mapping Approach”, International Journal
Of Computer Applications, Vol 5, No. 2, pp 1-5, 2010.
[25] Zs. M. Kovacs, Vajna, R. Rovatti and M. Frazzoni, “
Fingerprint ridge distance computation methodologies”,
Journal Of Pattern Recognition Society, Vol 33, pp 69-80,
2000.
[26] E. Zhu, J. Yin and G. Zhang, “ Fingerprint matching based on
global alignment of multiple reference minutiae.”, Journal Of
Pattern Recognition Society, pp 1685-16941 2005.

© 2013 ACEEE
DOI: 03.LSCS.2013.3.25

[27] B. Popovic, M. Bandjur and A. Raicevic, “ Robust enhancement
of fingerprint images obtained by ink method”, Electronics
Letters, Vol 46, pp 1-2, 2010.
[28] S. Yoon, J. Feng and A.K. Jain, “ Altered fingerprints: analysis
and detection”, IEEE Transactions on Pattern Analysis and
Machine Intelligence, Vol 34, No. 3, pp 451-464, 2012.
[29] J.K. Gupta and R. Kumar, “ An efficient ANN Based approach
for Latent Fingerprint” International Journal Of Computer
Applications, Vol 7, pp10-15, 2010.
[30] R. Cappelli, “ Fast and accurate fingerprint indexing based on
ridge orientation and frequency”, IEEE Transactions On
Systems, Man and Cybernetics-part B. Cybernetics, Vol 41,
No.6, pp 1511-1521, 2011.
[31] H. Xu, “ Fingerprint verification using spectral Minutiae
representations.”, IEEE Trans. on IFA, Vol 4, No. 3, pp 397409, 2009.
[32] D. Weng, D. Yang and Y. Yin, “ Singular points detection based
on multi resolution in fingerprint images”, Pattern Recognition
Society, Vol 33, pp 69-80, 2011.
[33] C.H. Park, J.J. Lee and M.J.T. Smith, “ Singular point detection
by shape analysis of directional fields in fingerprints”, Journal
Of Pattern Recognition Society, Vol 39, pp 839-855, 2006.
[34] A.K. Jain and J. Feng, “ Latent fingerprint matching”, IEEE
Transactions on Pattern Analysis and Machine Intelligence”,
Vol 33, No. 1, pp 88-100, 2011.

62

Contenu connexe

Tendances

Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
CSCJournals
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
Editor Jacotech
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496
IJRAT
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
TELKOMNIKA JOURNAL
 

Tendances (20)

A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Fog computing based on face identification in internet
Fog computing based on face identification in internetFog computing based on face identification in internet
Fog computing based on face identification in internet
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
 
11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...11.graphical password based hybrid authentication system for smart hand held ...
11.graphical password based hybrid authentication system for smart hand held ...
 
HMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD ParameterHMM-Based Face Recognition System with SVD Parameter
HMM-Based Face Recognition System with SVD Parameter
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemFeature Level Fusion of Multibiometric Cryptosystem in Distributed System
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
 
Dsip and aisc syllabus
Dsip and aisc syllabusDsip and aisc syllabus
Dsip and aisc syllabus
 
Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
 
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using CryptosystemPerformance Enhancement Of Multimodal Biometrics Using Cryptosystem
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
 
Paper id 25201496
Paper id 25201496Paper id 25201496
Paper id 25201496
 
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Mi...
 
Signature recognition
Signature recognitionSignature recognition
Signature recognition
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a survey
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 

Similaire à Various Mathematical and Geometrical Models for Fingerprints: A Survey

4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...
Hamed Raza
 
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdfFeature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
TIRUMALAVASU3
 
Feature Extraction and Gesture Recognition Book.pdf
Feature Extraction and Gesture Recognition Book.pdfFeature Extraction and Gesture Recognition Book.pdf
Feature Extraction and Gesture Recognition Book.pdf
SAMREENFIZA3
 

Similaire à Various Mathematical and Geometrical Models for Fingerprints: A Survey (20)

Measuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints datasetMeasuring memetic algorithm performance on image fingerprints dataset
Measuring memetic algorithm performance on image fingerprints dataset
 
Advanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric SchemeAdvanced Authentication Scheme using Multimodal Biometric Scheme
Advanced Authentication Scheme using Multimodal Biometric Scheme
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
Progression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face VerificationProgression in Large Age-Gap Face Verification
Progression in Large Age-Gap Face Verification
 
4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...4.face detection authentication on smartphones end users usability assessment...
4.face detection authentication on smartphones end users usability assessment...
 
novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...novel method of identifying fingerprint using minutiae matching in biometric ...
novel method of identifying fingerprint using minutiae matching in biometric ...
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
Machine Learning-Based Approaches for Fraud Detection in Credit Card Transact...
 
Thomas
ThomasThomas
Thomas
 
Feature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A SurveyFeature Extraction Methods for IRIS Recognition System: A Survey
Feature Extraction Methods for IRIS Recognition System: A Survey
 
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
MACHINE LEARNING AND DEEP LEARNING TECHNIQUES FOR DETECTING ABUSIVE CONTENT O...
 
Role of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics systemRole of fuzzy in multimodal biometrics system
Role of fuzzy in multimodal biometrics system
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
 
D56021216
D56021216D56021216
D56021216
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
BIOMETRIC AND RFID TECHNOLOGY FUSSION: A SECURITY AND MONITORING MEASURES TO ...
 
Handwritten_Recognition_A_survey.pdf
Handwritten_Recognition_A_survey.pdfHandwritten_Recognition_A_survey.pdf
Handwritten_Recognition_A_survey.pdf
 
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdfFeature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
Feature Extraction and Gesture Recognition_978-81-962236-3-2.pdf
 
Feature Extraction and Gesture Recognition Book.pdf
Feature Extraction and Gesture Recognition Book.pdfFeature Extraction and Gesture Recognition Book.pdf
Feature Extraction and Gesture Recognition Book.pdf
 
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES LUIS: A L IGHT  W EIGHT  U SER  I DENTIFICATION  S CHEME FOR  S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
 

Plus de idescitation

65 113-121
65 113-12165 113-121
65 113-121
idescitation
 
74 136-143
74 136-14374 136-143
74 136-143
idescitation
 
84 11-21
84 11-2184 11-21
84 11-21
idescitation
 
29 88-96
29 88-9629 88-96
29 88-96
idescitation
 

Plus de idescitation (20)

65 113-121
65 113-12165 113-121
65 113-121
 
69 122-128
69 122-12869 122-128
69 122-128
 
71 338-347
71 338-34771 338-347
71 338-347
 
72 129-135
72 129-13572 129-135
72 129-135
 
74 136-143
74 136-14374 136-143
74 136-143
 
80 152-157
80 152-15780 152-157
80 152-157
 
82 348-355
82 348-35582 348-355
82 348-355
 
84 11-21
84 11-2184 11-21
84 11-21
 
62 328-337
62 328-33762 328-337
62 328-337
 
46 102-112
46 102-11246 102-112
46 102-112
 
47 292-298
47 292-29847 292-298
47 292-298
 
49 299-305
49 299-30549 299-305
49 299-305
 
57 306-311
57 306-31157 306-311
57 306-311
 
60 312-318
60 312-31860 312-318
60 312-318
 
5 1-10
5 1-105 1-10
5 1-10
 
11 69-81
11 69-8111 69-81
11 69-81
 
14 284-291
14 284-29114 284-291
14 284-291
 
15 82-87
15 82-8715 82-87
15 82-87
 
29 88-96
29 88-9629 88-96
29 88-96
 
43 97-101
43 97-10143 97-101
43 97-101
 

Dernier

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

Various Mathematical and Geometrical Models for Fingerprints: A Survey

  • 1. Poster Paper Proc. of Int. Conf. on Advances in Signal Processing and Communication 2013 Various Mathematical and Geometrical Models for Fingerprints: A Survey Manish Kumar Saini, J. S. Saini, and Shachi Sharma Electrical Engineering Department Deenbandhu Chhotu Ram University of Science & Technology, Murthal, Sonepat, Haryana, India Email: shachisharmas28@gmail.com Abstract - Fingerprints are the most universal, unique and persistent biometrics. The growing interest and eventually the need for advanced security, privacy and user convenience has put an access to fingerprint recognition, beyond the other biometrics recognition systems. Despite the ingenious methods improvised to increase the efficiency of detection in growing identity frauds, the growing demands for fingerprint as a biometric recognition system has quickly become overwhelming. Major challenges coming in the way of a robust fingerprint recognition system are the presence of noise, cuts, wet or dry images, different pressure and skin conditions, etc. The main objective of this paper is to review the extensive research on fingerprint recognition over the last decades and to address the present challenges. A comprehensive analysis can be made from the tabular form of the presented summary table using various techniques and features. Finally, the future directions of fingerprint recognition are explored. extraction, comparison and matching. Image enhancement belongs to preprocessing. Image enhancement is done to improve the image quality by a fingerprint recognition system [6]. Next block is feature extraction, where different features are extracted for comparison and matching [7], [8]. Next block is for comparing the extracted feature with the previous data stored in the database [9]. The last and the final stage is matching or indexing, which is done either by classification or matching [10]. Fingerprint classification and indexing techniques speed up the search in fingerprint based identification systems.. The current state of the art algorithms for fingerprint matching are too expensive [11]. Keywords – Biometric, Local and Global features, Minutiae. I. INTRODUCTION Biometric recognition refers to the use of distinctive physiological and behavioural characterstics called biometric identifiers for automatically recognizing individuals [1]. An important issue in designing a practical biometric system is to determine, how an individual is recognized? Based upon application context, a biometric system may be classified as a verification system or identification system [2]. In comparison to traditional keywords or passwords or token based systems, the biometric identifiers are considered more reliable for recognition for they cannot be forged easily [3]. Fingerprint recognition is among one of the most ultimate and desirable research areas in the field of pattern recognition. Owning to its persistency, distinctiveness and immutability, fingerprints are used as the most attractive biometric identifier worldwide. For achieving high efficiency, better security and public convenience, provokes the need and importance of a robust fingerprint recognition system [4]. Further due to its security and law enforcement applications, and being a valuable answer to various private and government organizations in growing identity frauds, fingerprints are the current subject of interest and the emerging priority [5]. The important issues in fingerprint recognition are the affected performance due to the major challenge to various skin conditions, noise or scars present in an image and what features to be used to categorize fingerprint classes. The typical process of fingerprint recognition is illustrated in Fig 1. There are mainly 4 steps: preprocessing, feature 59 © 2013 ACEEE DOI: 03.LSCS.2013.3.25 Figure 1: Generalized Block Diagram of Fingerprint System Recognition Section II elaborates the various approaches of fingerprint recognition. In particular, it discusses the fingerprint features used for distinguishing fingerprint classes and reviews the methods of enhancement, extraction and classification that motivates better recognition of an image. Further, a comprehensive analysis is made in a tabular form at the end of section II. Section III & IV sums up with the conclusion and future aspects. II. RELATED WORKS This section glints through various fingerprint recognition algorithms and methods through various approaches like mathematical, neural and geometric, using different features for enhancement, extraction and classification. A. Mathematical Approaches F. Turroni et al. propose a method to estimate the ridge orientation deploying STFT and gradient method to reduce an error [12] and other in [33].
  • 2. Poster Paper Proc. of Int. Conf. on Advances in Signal Processing and Communication 2013 TABLE I. : SUMMARY OF VARIOUS TECHNIQUES 1. 2. 3. 4. 5. Author M.Liu et al.[19] H. Tairi al.[20] A. K. Jain al.[10] D. Maltoni al.[21] A. K. Jain al. [11] MATHEMATICAL APPROACHES Technique Used Database Features Used Polar complex Moments NIST & Singular regions. FVC STFT & Hu Moments FVC Singular regions. et et Wavelet transform & Gabor filters. Parzen window method with Gaussian kernel. Gradient based reconstruction algorithm. et et FVC Minutiae Pores Extraction & Location. Distinguishable location & size. Singular Points. Singular verification. More robust & accurate. FVC 7. J. Zhou et al. [22] NIST FVC02 8. H A Qader et al. [23] D. Singh et al.[24] DORIC, gradient & polynomial methods & SVM. Zernike Moments. 2. 1. 2. 1. 2. Pseudo Zernike moments & wavelets. Author Z.M. Kovacs et al .[25] Technique Used Harmonic coefficients estimation & geometric approach. Global alignment. Author B. Popovic et al.[27] A. K. Jain et al. [28] Technique Used Log- Gabor filtering in frequency domain. Fast enhancement algorithm. Author C. Yu et al.[17] Technique Used Shrinking & Expanding algorithm Fuzzy zones also used. Artificial neural network. 1. Author R. Cappelli et al.[30] Technique Used Exclusive classification & indexing based on scalar & vector features. 1. Author H. Xu et al.[31] Author D. Weng et al.[32] 2002 Core points. Fingerprint matching. 2002 Orientation field Fingerprint matching. High accuracy matching. Error rate decreases. 2000 Local & features. Fingerprint verification. Better rate is obtained than the compared one. global GEOMETRIC APPROACHES Database Features used NIST Ridges SDB4 Recognition Identification classification. & 1. 2. Author L. Zhang et al.[7] A. K. Jain et al. [9] Identification Database FVC Features Used Minutiae MSU DB Ridges & valley. Recognition Fingerprint Enhancement to remove spurious minutiae. Fingerprint enhancement. Efficiency More efficient than older one. More accurate than older one. Recognition Removal of noisy singular points & detecting them. Efficiency Distinguishable location & size. Fingerprint matching. More efficient & robust than earlier mentioned. Recognition Fingerprint Indexing. Efficiency More efficient & faster than older one. NEURAL APPROACHES Database Features Used FVC Singular points FVC Minutiae SEARCHING APPROACHES Database Features Used NIST DB14 Ridge orientation. CLASSIFIER APPROACHES Database Features Used Recognition FVC Singular points & Fingerprint Minutiae. Verification. MODEL & RESOLUTION BASED APPROACHES Technique Used Database Features Used Recognition Zero Pole Model & Least FVC Ridges. Singular mean square estimation. detection. OTHER APPROACHES Features Used Pores Technique Used Pore Valley Descriptor. Database FVC Classification algorithm. NIST 14 DB Feature vector code. Better approach previous one. than Efficiency Better than the technique compared. points Recognition Pore extraction Matching. Fingerprint classification. & Efficiency Multiple resolution obtained, hence more robust & better. Efficiency Better than older one. Better accuracy than earlier compared. [13]. B. Geometric Approaches Further, a 3D technique is introduced by D. Maltoni et al. using minutia angles and distances for fingerprint recognition © 2013 ACEEE DOI: 03.LSCS.2013.3.25 Efficiency Less computation time in identification. NIST & Minutiae FVC FILTERING APPROACHES Technique Used A novel algorithm. 1. point FVC DB1 A. Pokhriyal et al. [2] J. K. Gupta et al.[29] 4, & FVC DB1 FVC DB1 Hidden Markov Model. G. Zhang et al. [26] Better than previous mentioned. Consistent reconstructed image. FVC Highpass filtering & Correlation filtering. 1. Fingerprint Classification. Orientation field matching. Fingerprint Matching. FVC N. Manivan et al. [8] 10. Fingerprint Matching. Efficiency Better performance than the earlier mentioned. Better Approach than the earlier mentioned. Error rate decreased. Level 3 features. (pores) Singular regions. 6. 9. Recognition Fingerprint Indexing. C. Neural Approaches L. Ji and Z. Yi propose a method to investigate the effect 60
  • 3. Poster Paper Proc. of Int. Conf. on Advances in Signal Processing and Communication 2013 of neurons, using neural network approach through a fast and accurate orientation field estimation algorithm introduced in [14]. REFERENCES [1] D. Maltoni, D. Maio and A.K. Jain, S. Prabhakar, “ Handbook of Fingerprint Recognition”, Springer-Verlag. 2009. [2] A. Pokhriyal and S. Lehri, “ A new method of fingerprint authentication using 2D wavelets”, Journal Of Theoretical And Applied Information Technology, Vol 13,No. 2, pp 131 – 138, 2010. [3] D. Kumar, Dr.Y. Ryu and Dr.D. Kwon, “A Survey on Biometric Fingerprints: The Cardless Payment System”, Proceedings in IEEE Conference, pp1-5, 2008. [4] S. Li and A.C. Kot, “ Privacy protection of fingerprint database”, IEEE Signal Processing Letters, Vol 18 ,No 2, pp115-118, 2011. [5] M. Vatsa, R. Singh, S. Bharadwaj, H. Bhatt and R. Mashruwala , “ Analyzing Fingerprints of Indian Population Using Image Quality:A UIDAI Case Study”, Proceed ings in IEEE Conference, pp 1-5, 2010. [6] S. Chikkerur, A.N. Cartwright and V. Govindaraju, “ Fingerprint enhancement using STFT analysis”, Pattern Recognition Society, pp 1-5, 2006. [7] Q. Zhao, D. Zhang, L. Zhang and N. Luo, “ High resolution partial fingerprint alignment using pore-valley descriptors”, Pattern Recognition Letters, pp 1050-1061, 2010. [8] N. Manivan, S. Memom and W. Balachandran, “ Automatic detection of active sweat pores of fingerprint using Highpass and Correlation filtering”, Electronics Letters, Vol 46, No. 8, pp 1-2, 2010. [9] A.K. Jain, S. Prabhakar and L. Hong, “A Multichannel Approach to Fingerprint Classification. IEEE Transactions On Pattern Analysis And Machine Intelligence”, Vol 21, pp 4-8, 1999. [10] A.K. Jain, Y.Chen and M. Demirkus, “ Pores and Ridges: High resolution fingerprint matching using Level 3 features”, IEEE Transactions on Pattern Analysis and Machine Intelligenceo, Vol 29, No. 1, pp 15-26, 2007. [11] A.K. Jain and J. Feng, “ Fingerprint reconstruction: From minutiae to phase. IEEE Transactions on Pattern Analysis and Machine Intelligence”, Vol 33, No. 2, pp 209-223, 2011. [12] F. Turroni, D. Maltoni and D. Maio, “ Improving fingerprint orientation extraction. IEEE Transactions on Information Forensics And Security”, Vol 6, No. 3, pp 1002-1013, 2011. [13] R. Cappelli, “ Minutia cylinder-code : A new representation and matching technique for fingerprint recognition”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 32,No. 12, pp 2128-2141,2010. [14] L. Ji and Z. Yi, “ Fingerprint orientation field estimation using ridge projection”, Journal Of Pattern Recognition Society,Vol 41, pp 1491-1503, 2008. [15] D. Maio, R. Cappelli and M. Ferrara, “ Candidate list reduction based on the analysis of fingerprint indexing scores”, IEEE Transactions On Information Forensics And Security, Vol 6, pp 1160-1164, 2011. [16] D. Zhang, F. Liu, G. Lu and N. Luo, “ Selecting a reference high resolution for fingerprint recognition using minutiae and pores.”, IEEE Transactions On Instrumentation And Measurement, Vol 60, No.3, pp 863-871, 2011. [17] C.Y. Huang, L.M. Liu and D.C. Hung, “ Fingerprint analysis and singular point detection”, Journal Of Pattern Recognition Society, Vol 28, pp 1937-1945, 2007. [18] F. Turroni, D. Maltoni and D. Maio, “ Improving fingerprint orientation extraction”, IEEE Transactions on Information Forensics And Security, Vol 6, No. 3, pp 1002-1013, 2011. D. Filtering And Classifier Approaches H. Choi et al. discuss a matching algorithm, using a Breadth first search for minutiae and ridge features detection. Further, the searching approach combines two more methods for minutiae extraction, using DRLC and SRLC as given by J.H. Shin et al. and the Variable threshold method, based on score difference and ratio for fingerprint indexing by D. Maio et al. [15]. E. Model Based Approaches D . Zhang et al. further identify the optimal resolution for an automated fingerprint recognition system, introducing a resolution method using acquisition device [16]. Similar approach is also used by C. Yu et al. for fingerprint recognition [17]. F. Other Approaches A.K. Jain further employ Gabor filters and goodness index for fast enhancement and verification of a fingerprint [18]. Latent fingerprints are matched using ridge features to increase the identification rate by A.K. Jain [34]. Further, a comprehensive analysis can be done with the following table 1 using different features through different approaches in fingerprint recognition. III. CONCLUDING REMARKS From the above survey, we can conclude that fingerprint continues to be one of the most important and attractive biometric identifiers than other biometrics, and inspite of so many techniques and proposed algorithms, fingerprint recognition is still a challenging task in the present scenario. Hence the problem can be formulated to go further for optimal results. A comparative study can be found from Table1, comparing different techniques using different features. It is still difficult to have accurate algorithms capable of extracting salient features and matching them in a sturdy way, both in poor quality images and in small area regions. There is a popular misconception that automatic fingerprint recognition is a fully solved problem. On the contrary, fingerprint recognition is still a challenging and important pattern recognition problem. IV. FUTURE WORK The future study of fingerprint recognition might use combination of features of level 1, level 2 and level 3. The fairly exhaustive survey points to the fact that in future work, one may stand benefitted by a further exploration of relative advantages of combining not only the feature levels but also by exploration of multiple approaches of tackling these features information. © 2013 ACEEE DOI: 03.LSCS.2013.3.25 61
  • 4. Poster Paper Proc. of Int. Conf. on Advances in Signal Processing and Communication 2013 [19] M. Liu and P.T. Yap, “ Invariant representation of orientation fields for fingerprint indexing”, Pattern Recognition Letters, Vol 45, pp 2532- 2542, 2012. [20] K. Abbad, A. Aarab and H. Tairi, “ Fingerprint verification based on Minutiae and Moments”, IEEE Conference, pp 1-8, 2010. [21] D. Maltoni and R. Cappelli, “ Spatial distribution of fingerprint singularities”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 31, No. 4, pp 742-748, 2009. [22] J. Zhou, F. Chen and J. Gu, “ A novel algorithm for detecting singular points from fingerprint images” IEEE Transactions On PAMI, Vol 31, No. 7, pp 1239-1250, 2009. [23] H.A. Qader, “ Fingerprint Recognition Using Zernike Moments”, International Arab Journal of Information Technology, Vol 4, pp 372-377, 2007. [24] D. Singh, P.K. Singh and R.K. Shukla, “ Fingerprint Recognition System Based on Mapping Approach”, International Journal Of Computer Applications, Vol 5, No. 2, pp 1-5, 2010. [25] Zs. M. Kovacs, Vajna, R. Rovatti and M. Frazzoni, “ Fingerprint ridge distance computation methodologies”, Journal Of Pattern Recognition Society, Vol 33, pp 69-80, 2000. [26] E. Zhu, J. Yin and G. Zhang, “ Fingerprint matching based on global alignment of multiple reference minutiae.”, Journal Of Pattern Recognition Society, pp 1685-16941 2005. © 2013 ACEEE DOI: 03.LSCS.2013.3.25 [27] B. Popovic, M. Bandjur and A. Raicevic, “ Robust enhancement of fingerprint images obtained by ink method”, Electronics Letters, Vol 46, pp 1-2, 2010. [28] S. Yoon, J. Feng and A.K. Jain, “ Altered fingerprints: analysis and detection”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol 34, No. 3, pp 451-464, 2012. [29] J.K. Gupta and R. Kumar, “ An efficient ANN Based approach for Latent Fingerprint” International Journal Of Computer Applications, Vol 7, pp10-15, 2010. [30] R. Cappelli, “ Fast and accurate fingerprint indexing based on ridge orientation and frequency”, IEEE Transactions On Systems, Man and Cybernetics-part B. Cybernetics, Vol 41, No.6, pp 1511-1521, 2011. [31] H. Xu, “ Fingerprint verification using spectral Minutiae representations.”, IEEE Trans. on IFA, Vol 4, No. 3, pp 397409, 2009. [32] D. Weng, D. Yang and Y. Yin, “ Singular points detection based on multi resolution in fingerprint images”, Pattern Recognition Society, Vol 33, pp 69-80, 2011. [33] C.H. Park, J.J. Lee and M.J.T. Smith, “ Singular point detection by shape analysis of directional fields in fingerprints”, Journal Of Pattern Recognition Society, Vol 39, pp 839-855, 2006. [34] A.K. Jain and J. Feng, “ Latent fingerprint matching”, IEEE Transactions on Pattern Analysis and Machine Intelligence”, Vol 33, No. 1, pp 88-100, 2011. 62