Skip to main content

Analysis of Fingerprint Image to Verify a Person

  • Conference paper
Global Security, Safety, and Sustainability (ICGS3 2010)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 92))

  • 1134 Accesses

Abstract

Identification and authentication technologies are increasing day by day to protect people and goods from crime and terrorism. This paper is aimed to discuss fingerprint technology in depth and analysis of fingerprint image. Verify a person with a highlight on fingerprint matching. Some fingerprint matching algorithms are analysed and compared. The outcomes of the analysis has identified some major issues or factors of fingerprinting, which are location, rotation, clipping, noise, non-linear distortion sensitiveness/ insensitiveness properties, computational cost and accuracy level of fingerprint matching algorithms. Also a new fingerprint matching algorithm proposed in this research work. The proposed algorithm has used Euclidean distance, angle difference, type as matching parameters instead of specific location parameter (like, x or y coordinates), which makes the algorithm location and rotation insensitive. The matching of local neighbourhoods at each stage makes the algorithm non-linear distortion insensitive.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hong, L., Wan, Y., Jain, A.: Fingerprint image enhancement: algorithm and performance evaluation 20(8), 777–789 (1998), http://www.cs.ru.ac.za/courses/Honours/mmcourse/security/biometrics/MSU-CPS-97-35.pdf (Accessed July 4, 2009)

  2. Greenberg, S., Aladjem, M., Kogan, D.: Fingerprint image enhancement using filtering techniques 8(3), 227–236 (2002), http://www.cs.kent.edu/~wcheng/Presentation%201%20Image%20Enhancement/Fingerprint%20Image%20Enhancement%20using%20FilterTechniques.pdf (July 5, 2009)

  3. Chikkerur, S., Cartwright, A.N., Govindaraju, V.: K-plet and CBFS: A Graph Based Fingerprint Representation and Matching Algorithm (2006), http://web.mit.edu/sharat/www/research/papers/kplet_long.pdf (July 21, 2009)

  4. Kaur, M., Singh, M., Girdhar, A., Sandhu, P.S.: Fingerprint Verification System using Minutiae Extraction Technique (2008), http://www.waset.org/journals/waset/v46/v46-85.pdf (Accessed July 23, 2009)

  5. O’Gorman, L.: Fingerprint Verification  (479), 43–64 (1999), http://www.cse.msu.edu/~cse891/Sect601/textbook/2.pdf (Accessed July 25, 2009)

  6. Isenor, D.K., Zaky, S.G.: Fingerprint Identification using Graph Matching*  19(2), 113–122 (1986)

    Google Scholar 

  7. Khazaei, H., Mohades, A.: Fingerprint Matching and Classification using an Onion Layer algorithm of Computational Geometry 1(1) (2007), http://www.naun.org/journals/mcs/mcs-5.pdf (Accessed July 26, 2009)

  8. Chikkerur, S., Wu, C., Govindaraju, V.A.: Systematic Approach for Feature Extraction in Fingerprint Images, vol. 3072, pp. 344–350 (2004), http://www.cubs.buffalo.edu/pdf/finger-systematic.pdf (September 15, 2009)

  9. Corman, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms. MIT Press, Cambridge (1990)

    Google Scholar 

  10. DDS (Digital development System): Fingerprint Verification Algorithm (2006), http://www.dds.co.jp/en/fv/algorithm.html (Accessed July 21, 2009)

  11. Federal Bureau of Investigation: Taking legible fingerprints, http://www.fbi.gov/hq/cjisd/takingfps.html (Accessed June 20, 2009)

  12. Grannblog: Problems with fingerprints for authentication, http://blog.granneman.com/2006/05/13/problems-with-fingerprints-for-authentication/ (Accessed June 20, 2009)

  13. Crimtrac: Fingerprint analysis – the basics (2008), http://www.crimtrac.gov.au/systems_projects/FingerprintAnalysis-TheBasics.html (Accessed June 20, 2009)

  14. IT University Copenhagen: Morphology, http://www.itu.dk/courses/MBSB/E2005/Download/morphology.pdf (July 5, 2009)

  15. Atalasoft DotImage 8.0: Morphology (2009), http://www.atalasoft.com/Products/dotimage/docs/Morphology.html (July 5, 2009)

  16. University of Wales Aberystwyth: Aberystwyth Users site (2007), http://users.aber.ac.uk/sac4/cs180/index.html (Accessed June 20, 2009)

  17. Wikipedia: Biometrics (2009), http://en.wikipedia.org/wiki/Biometrics (Accessed June 20, 2009)

  18. Wikipedia: Transformation matrix (2009), http://en.wikipedia.org/wiki/Transformation_matrix (Accessed July 22, 2009)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jahankhani, H., Mohid, M. (2010). Analysis of Fingerprint Image to Verify a Person. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15717-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15716-5

  • Online ISBN: 978-3-642-15717-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics