Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Multi-matcher Based Fingerprint Identification System  [PDF]
Nasir Rehan,Khalid Rashid
Journal of Applied Sciences , 2004,
Abstract: Fingerprint identification system being the most developed and emphasized among the various practically employed biometric systems, has yet to make a long journey to prove its effectiveness in terms of speed and accuracy. Of various options for increasing systems efficiency, one may be the combination or fusion of various contemporary fingerprint identification systems. This study reveals the possibility for introducing a fingerprint identification system based on different fingerprint matching systems, working in close collaboration. Two different fingerprint representation schemes are evaluated and a merger point for the two is suggested.
Standard Fingerprint Databases: Manual Minutiae Labeling and Matcher Performance Analyses  [PDF]
Mehmet Kayaoglu,Berkay Topcu,Umut Uludag
Computer Science , 2013,
Abstract: Fingerprint verification and identification algorithms based on minutiae features are used in many biometric systems today (e.g., governmental e-ID programs, border control, AFIS, personal authentication for portable devices). Researchers in industry/academia are now able to utilize many publicly available fingerprint databases (e.g., Fingerprint Verification Competition (FVC) & NIST databases) to compare/evaluate their feature extraction and/or matching algorithm performances against those of others. The results from these evaluations are typically utilized by decision makers responsible for implementing the cited biometric systems, in selecting/tuning specific sensors, feature extractors and matchers. In this study, for a subset of the cited public fingerprint databases, we report fingerprint minutiae matching results, which are based on (i) minutiae extracted automatically from fingerprint images, and (ii) minutiae extracted manually by human subjects. By doing so, we are able to (i) quantitatively judge the performance differences between these two cases, (ii) elaborate on performance upper bounds of minutiae matching, utilizing what can be termed as "ground truth" minutiae features, (iii) analyze minutiae matching performance, without coupling it with the minutiae extraction performance beforehand. Further, as we will freely distribute the minutiae templates, originating from this manual labeling study, in a standard minutiae template exchange format (ISO 19794-2), we believe that other researchers in the biometrics community will be able to utilize the associated results & templates to create their own evaluations pertaining to their fingerprint minutiae extractors/matchers.
Fusion Approach for Fingerprint Matching for Improved System Accuracy
Zia Saquib,Santosh Kumar Soni,Varunkrishnan T K,Anamika Singh
International Journal of Computer Science Issues , 2011,
Abstract: In automated fingerprint identification systems, an efficient and accurate alignment algorithm in the preprocessing stage plays a crucial role in the performance of the whole system, affecting greatly the speed and accuracy otherwise. This paper proposes a fusion scheme (weighted sum) for aligning the enrolled and query images using modified ring model and cross correlation approaches. Both the methods align the pair of fingerprint images based on the single singular point (as a reference point). Matching is then performed using Euclidean distance based matcher. This model is tested on both publicly available (Cross Match Verifier 300 sensor) as well as proprietary (Lumidigm Venus V100 OEM Module sensor) fingerprint databases scanned at 500 dpi. The experiments show that this fusion approach improves the overall system accuracy: FNMR and FMR significantly dropped to 3.23% and 2.67% respectively for Cross Match Dataset and 0% and 1.33% respectively for Lumidigm Dataset. Hence, the combination of these two alignment methods effectively strengthens the performance of the matcher.
Repeatability and Reproducibility of Decisions by Latent Fingerprint Examiners  [PDF]
Bradford T. Ulery, R. Austin Hicklin, JoAnn Buscaglia, Maria Antonia Roberts
PLOS ONE , 2012, DOI: 10.1371/journal.pone.0032800
Abstract: The interpretation of forensic fingerprint evidence relies on the expertise of latent print examiners. We tested latent print examiners on the extent to which they reached consistent decisions. This study assessed intra-examiner repeatability by retesting 72 examiners on comparisons of latent and exemplar fingerprints, after an interval of approximately seven months; each examiner was reassigned 25 image pairs for comparison, out of total pool of 744 image pairs. We compare these repeatability results with reproducibility (inter-examiner) results derived from our previous study. Examiners repeated 89.1% of their individualization decisions, and 90.1% of their exclusion decisions; most of the changed decisions resulted in inconclusive decisions. Repeatability of comparison decisions (individualization, exclusion, inconclusive) was 90.0% for mated pairs, and 85.9% for nonmated pairs. Repeatability and reproducibility were notably lower for comparisons assessed by the examiners as “difficult” than for “easy” or “moderate” comparisons, indicating that examiners' assessments of difficulty may be useful for quality assurance. No false positive errors were repeated (n = 4); 30% of false negative errors were repeated. One percent of latent value decisions were completely reversed (no value even for exclusion vs. of value for individualization). Most of the inter- and intra-examiner variability concerned whether the examiners considered the information available to be sufficient to reach a conclusion; this variability was concentrated on specific image pairs such that repeatability and reproducibility were very high on some comparisons and very low on others. Much of the variability appears to be due to making categorical decisions in borderline cases.

Ni Lin,Zhang Changshui,Rong Gang,Bian Zhaoqi,

软件学报 , 1996,
Abstract: It is usually required that fingerprint images in the database of an AFIS(automated fingerprint identification system) should be compressed to improve its practical performance and also that the restored images should have high fidelity to avoid loss of minutiea while the time consumed in the restoration is required short enough. This paper proposes a high-performance compression method for the latent fingerprint images based on the FSWT(fast symmetric wavelet transform) which meet the requirement of high speed and high fidelity by simultaneously using the FSWT, the proper decomposition style, the adaptive scalar quantization and the improved entropy coding method. Meanwhile a bit rate control strategy is designed to control the compression ratio effectively. The experimental results show that the proposed compression method has high performance.
Latent Fingerprint Enhancement Using Tripolyphosphate-Chitosan Microparticles  [PDF]
Issa M. A. Il Dueik,Gordon A. Morris
International Journal of Carbohydrate Chemistry , 2013, DOI: 10.1155/2013/615124
Abstract: Chitosan has been widely used in the preparation of microparticles for drug delivery; however, it has not been considered in forensic applications. Tripolyphosphate- (TPP-) chitosan microparticles were formed using ionotropic gelation in the presence of a coloured dye and deposited onto latent fingerprints enabling fingerprint identification. 1. Introduction Chitosan is the generic name for a family of strongly polycationic derivatives of poly-N-acetyl-D-glucosamine (chitin) extracted from the shells of crustaceans or from the mycelia of fungi [1]. In chitosan the N-acetyl group is replaced either fully or partially by NH2, and therefore the degree of acetylation can vary from DA = 0 (fully deacetylated) to DA = 1 (fully acetylated, i.e., chitin). The long carbon chains of chitosan molecules render them lipophilic. Furthermore, chitosan is the second most abundant polymer on earth (after cellulose) and it is the only known naturally occurring polycationic polysaccharide; therefore, chitosan and its derivatives, including microparticles, have received a great deal of attention from the food, cosmetic, and pharmaceutical industries [2–4]. Microparticles can be prepared by the electrostatic interaction and the resultant ionotropic gelation between chitosan and the tripolyphosphate (TPP) (Figure 1) polyanion [2–4]. Size can be controlled by varying the chitosan??: TPP ratio, pH, and the molar mass of the chitosan. Figure 1: Formation of the tripolyphosphate-chitosan complex by ionotropic gelation [ 4, 5]. Fingerprint detection is probably the oldest and most common method of identification used in forensic science. Fingerprints, therefore, present a perfect method for personal recognition; they are traces of an impression from the friction ridges on a person’s fingertips. Fingerprinting is used in the tracking and identification of criminals, and because they are unique (identical twins have different fingerprints), fingerprints can provide a clear and positive proof of identity. Recently, there has been great interest in the use of nanotechnology in the design of novel fingerprint detection systems. This is due to the fact that microparticles can provide improved latent fingerprint detection by using dye-functionalized microparticles (the dye or fluorophore may also be encapsulated within the microparticle) which can therefore provide an opportunity for improved visualisation. In this study, TPP-chitosan microparticles (loaded with red dye for visualisation purposes) have been used to attach to the lipid residues present in the latent fingerprint. In
Touch-less Fingerprint Analysis — A Review and Comparison  [cached]
Prabhjot Kaur,Ankit Jain,Sonia Mittal
International Journal of Intelligent Systems and Applications , 2012,
Abstract: Touch-less fingerprint recognition system is a reliable alternative to conventional touch-based fingerprint recognition system. Touch-less system is different from conventional system in the sense that they make use of digital camera to acquire the fingerprint image where as conventional system uses live-acquisition techniques. The conventional fingerprint systems are simple but they suffer from various problems such as hygienic, maintenance and latent fingerprints. In this paper we present a review of touch-less fingerprint recognition systems that use digital camera. We present some challenging problems that occur while developing the touch-less system. These problems are low contrast between the ridge and the valley pattern on fingerprint image, non-uniform lighting, motion blurriness and defocus, due to less depth of field of digital camera. The touch-less fingerprint recognition system can be divided into three main modules: preprocessing, feature extraction and matching. Preprocessing is an important step prior to fingerprint feature extraction and matching. In this paper we put our more emphasis on preprocessing so that the drawbacks stated earlier can be removed. Further preprocessing is divided into four parts: first is normalization, second is fingerprint Segmentation, third is fingerprint enhancement and last is the core point detection. Feature extraction can be done by Gabor filter or by minutia extraction and the matching can be done by Support Vector Machine or Principal Component Analysis and three distance method.
Distorted Fingerprint Verification System  [PDF]
Informatica Economica Journal , 2011,
Abstract: Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.
Fingerprint image segmentation using modified fuzzy c-means algorithm  [PDF]
Jia-Yin Kang, Cheng-Long Gong, Wen-Juan Zhang
Journal of Biomedical Science and Engineering (JBiSE) , 2009, DOI: 10.4236/jbise.2009.28096
Abstract: Fingerprint segmentation is a crucial step in fingerprint recognition system, and determines the results of fingerprint analysis and recognition. This paper proposes an efficient approach for fingerprint segmentation based on modified fuzzy c-means (FCM). The proposed method is realized by modifying the objective function in the Szilagyi’s algorithm via introducing histogram-based weight. Experimental results show that the proposed approach has an efficient performance while segmenting both original fingerprint image and fingerprint images corrupted by different type of noises.
Data Integrity in Fingerprint Images
A. Merry Ida,V. Kavitha,K.S. Easwarakumar
International Journal of Soft Computing , 2012,
Abstract: In e-commerce applications Authentication is provided with the combination of user id and password that results in fraud and misuse. Automated biometrics technology in general and fingerprints in particular, provide an accurate and reliable authentication method. However, fingerprint based authentication requires accessing fingerprint images scanned remotely at the user`s workstation, a potentially weak point in the security system. Even though the communication channel is encrypted, stored or synthetic fingerprint images might be fraudulently transmitted. To enhance security, embedding additional information directly in compressed fingerprint images can use data hiding technique. Integrity is incorporated while transmitting fingerprint for authentication. Data Integrity is achieved by hashing the features of fingerprint to that of Unique Person Identification (UPID).
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.