a comprehensive survey of finger print recognition techniques

IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN
ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-4, ISSUE-1, APRIL-2015
(Proceedings of “6th National Conference on Make in India PMs Vision : Role of Engineering and Management
Innovations to Achieve this Vision” Organised by Apex Group of Institutions, Karnal, Haryana, India, April-2015)
A COMPREHENSIVE SURVEY OF FINGER PRINT
RECOGNITION TECHNIQUES
1
Medhavi Sarwal, 2Shikha Khanna
ECE Department, DVIET, Karnal, Haryana, India
Email: medhavi.sarwal@yahoo.com
2
ECE Department, DVIET, Karnal, Haryana, India
Email: shikhakhanna1408@gmail.com
1
Abstract— Fingerprints have long been utilized as a reliable biometric feature for confidential identification.
Fingerprint association mentions to the setback of allocating fingerprints to one of countless pre-specified classes.
Automatic association can be utilized as a pre-processing phase for fingerprint matching, cutting matching period and
intricacy by restricting the find space to a subset of a normally huge database. Fingerprint matching methods can be
mainly categorized as minutiae established and correlation based. Minutiae based method early locates the minutiae
points in a given fingerprint picture and matches their comparative placements in a stored template fingerprint. This
Paper surveys Feature based and wavelet based fingerprint marching of the methods happening in the research
community. We in our work introduce convolution transforms in order to enhance features so as to improve recognition
rate.
Keywords- —Finger Print Recognition, Automated fingerprint recognition systems (AFRSs), Pattern recognition.
1. INTRODUCTION
Fingerprints are the ridge and furrow outlines on the tip of the finger and have been utilized extensively for
confidential identification of people. Figure 1 displays an example of a fingerprint. The biological properties of
fingerprint formation are well understood and fingerprints have been utilized for identification intentions for
centuries. As the commencing of the 20th century, fingerprints have been extensively utilized for identification of
convicts by the assorted forensic departments concerning the world. Due to its convict connotations, a little
people sense uncomfortable in bestowing their fingerprints for identification in civilian applications. Though, as
fingerprint-based biometric arrangements proposal affirmative identification alongside an extremely elevated
degree of assurance, and compact solid state fingerprint sensors can be embedded in assorted arrangements (e.g.,
cellular phones), fingerprint-based authentication is becoming extra and extra accepted in a number of civilian
and business requests such as, welfare disbursement, cellular phone admission, and laptop computer log-in.
Figure 1: Fingerprint Feature selection and extraction
The potential of inexpensive and compact solid state scanners as well as robust fingerprint matchers are two vital
factors in the popularity of fingerprint-based identification systems. Fingerprints additionally have a number of
disadvantages as contrasted to supplementary biometrics. For example, concerning 4% of the populace does not
have good quality fingerprints, manual operatives become usual scratches on their fingers that poses a difficulty
to the matching arrangement, finger skin peels off due to meteorological conditions, fingers develop usual
perpetual creases, provisional creases are industrialized after the labor are immersed in water for a long period,
180 | P a g e | © IJRREST | h t t p : / / i j r r e s t . o r g / i s s u e s / ? p a g e _ i d = 1 2
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN
ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-4, ISSUE-1, APRIL-2015
(Proceedings of “6th National Conference on Make in India PMs Vision : Role of Engineering and Management
Innovations to Achieve this Vision” Organised by Apex Group of Institutions, Karnal, Haryana, India, April-2015)
and grimy fingers cannot be properly imaged alongside the continuing fingerprint sensors. Further, as fingerprints
cannot be seized lacking the user’s vision, they are not suited for precise requests such as surveillance.
2. FINGERPRINT MATCHING
Fingerprint matching methods [1] can be mainly categorized as minutiae established and correlation based.
Minutiae based method early locates the minutiae points in a given fingerprint picture and matches their
comparative placements in a stored template fingerprint. A good quality fingerprint encompasses amid 60 and 80
minutiae, but disparate fingerprints have disparate number of minutiae. The presentation of minutiae-based
methods rely on the precise detection of minutiae points and the use of urbane matching methods to difference
two minutiae fields that experience non-rigid transformations. Correlation based methods [2] difference the globe
outline of ridges and valleys to discern if the ridges in the two fingerprints align. The globe way to fingerprint
representation is normally utilized for indexing and does not proposal reliable fingerprint discrimination. The
ridge construction in a fingerprint can be believed as an oriented sense outlines possessing a dominant spatial
frequency and orientation in a innate neighborhood. The frequency is due to inter ridge-spacing present in a
fingerprint and the orientation is due to the flow outline exhibited by ridges. Most textured pictures encompass a
slim scope of spatial frequencies. For a normal fingerprint pictures scanned at 500 dpi, there is a slight variation
in the spatial frequencies amid disparate fingerprints. This implies that there is an optimal scale (spatial
frequency) for analyzing the fingerprint texture. By seizing the frequency and orientation of ridges in innate spans
in the fingerprint, a different representation of the fingerprint is possible. The counseled scheme early detects the
core point in a fingerprint picture employing two disparate techniques. Core point is described as the north most
point of inner-most ridge line. In habits, the core point corresponds to center of north most loop kind singularity.
A little fingerprint do not encompass loop or whorl singularities, consequently it is tough to delineate core. In that
kind of pictures, core is normally associated alongside the maximum ridge line curvature. Noticing a core point is
not a trivial task; consequently two disparate methods have been utilized to notice optimal core point location. A
circular span concerning the core point is placed and tessellated into 128 sectors.
Figure 2: Optional core point location
The pixel intensities in every single sector are normalized to a steady mean and variance. The circular span is
filtered employing a bank of sixteen Gabor filters [3][4] to produce a set of sixteen filtered images. Gabor filterbanks are a well-recognized method to arrest functional data in specific group bypass channels. Two such
methods have been debated in and. The average definite deviation alongside in a sector quantifies the underlying
ridge construction and is utilized as a feature. The feature vector (2048 benefits in length) is the collection of all
the features, computed from all the 128 sectors, in every single filtered image. The feature vector arrests the
innate data and the arranged enumeration of the tessellation arrests the invariant globe connections amid the
innate patterns. The matching period computes the Euclidean distance amid the two corresponding feature
vectors. It is desirable to attain representations for fingerprints that are translation and rotation invariant. In the
counseled scheme, translation is seized care of by a reference point that is core point across the feature extraction
period and the picture rotation is grasped by a cyclic rotation of the feature benefits in the feature vector. The
181 | P a g e | © IJRREST | h t t p : / / i j r r e s t . o r g / i s s u e s / ? p a g e _ i d = 1 2
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN
ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-4, ISSUE-1, APRIL-2015
(Proceedings of “6th National Conference on Make in India PMs Vision : Role of Engineering and Management
Innovations to Achieve this Vision” Organised by Apex Group of Institutions, Karnal, Haryana, India, April-2015)
features are cyclically rotated to produce feature vectors corresponding to disparate orientations to present the
matching.
3. RELATED WORK
Yi Wang et al., 2011 [5] Recognizing incomplete or partial fingerprints from a colossal fingerprint database
stays a tough trial today. Continuing studies on partial fingerprints focus on one-to-one matching employing
innate ridge details. In this paper, we examine the setback of reclaiming candidate catalogs for matching partial
fingerprints by exploiting globe topological features. Specifically, we counsel an analytical way for
reconstructing the globe topology representation from a partial fingerprint. Firstly, we present an inverse
orientation ideal for delineating the reconstruction problem. Then, we furnish a finished expression for all valid
resolutions to the inverse model.
Rakesh Verma et al., 2011[6] In this research paper rather than little fingerprint identification algorithm (such
as employing Fast Fourier Change (FFT), Minutiae Extraction) that could need so far computation as to be
impractical, Wavelet established algorithm making a low price fingerprint identification system has been
proposed. Wavelet research and its requests to fingerprint verification is one of the fast producing spans for
research in present year. Wavelet theory has been retained in countless fields and requests, such as gesture and
picture processing, contact arrangements, biomedical imaging, radar, air acoustics, hypothetical mathematics,
manipulation arrangement, and endless supplementary areas. Though, the research on requesting the wavelets to
outline credit is yet too weak. As the ridge construction in a fingerprint can be believed as an oriented sense
pattern. The paper proposes a fingerprint credit method established on wavelet established sense outline credit
method. In think to older fingerprint credit method; established on Fast Fourier Change (FFT) and Minutiae
Extraction, the counseled wavelet established method aftermath in elevated credit rates.
Emanuela Marasco et al., 2012 [7] Researchers have demon-started that a little business fingerprint credit
arrangements can be misled after the manmade fingers are allocated on the sensor, i.e., the arrangement
prosperously procedures the following fingerprint pictures thereby al- lowing an antagonist to spoof the
fingerprints of one more individual. Though, at the alike period, countless countermeasures that discriminate
amid live fingerprints and spoof artifacts have been proposed. As a little of these anti-spoofing schemes are
hardware-based, countless software-based ways have been counseled as well. In this paper, we study the works
and present the state-of-the-art in fingerprint anti-spoofing.
Zheng Yang, et al., 2012 [8] Indoor localization is of outstanding significance for a scope of pervasive requests,
appealing countless research efforts in the past decades. Most radio-based resolutions need a procedure of locale
survey, in that wireless signatures of an interested span are annotated alongside their real recorded locations.
Locale survey involves intensive prices on manpower and period, manipulating the applicable constructions of
wireless localization worldwide. In this discover, we examine novel sensors consolidated in present mobile
phones and impact user gestures to craft the wireless chart of a floor design, that is beforehand obtained merely
by locale survey. On this basis, the researchers design LiFS, an indoor localization arrangement established on
off-the-shelf WiFi groundwork and mobile phones. LiFS is used in a workplace constructing obscuring above
1600m2, and its placement is facile and quick as slight human interference is needed. In LiFS, the calibration of
fingerprints is crowd sourced and automatic. Examination aftermath display that LiFS achieves comparable
locale accuracy to preceding ways even lacking locale survey.
Alessandra A Paulino, et al., 2013 [9] An analogy amid the alignment presentation of the counseled algorithm
and the well-known Generalized Hough Change displays the superior presentation of the counseled method.
Researchers have additionally described matching aftermath for two disparate latent fingerprint databases
alongside a colossal background database of concerning 32K rolled prints. We contrasted the presentation of the
counseled matcher alongside three disparate state-of-the-art fingerprint matchers. Experimental aftermath
display that the counseled algorithm performs larger than the three fingerprint matchers utilized in the discover
across all picture qualities. A score-level mixture of the counseled matcher and one of the business matchers
(COTS2) displays a more boost in the matching performance.
Ajita Rattani, et al., 2014 [10] A fingerprint liveness detector is a outline classifier that is utilized to
discriminate a live finger from a fake (spoof) one in the context of an automated fingerprint credit system. Most
liveness detectors are learning-based and rely on a set of training images. Consequently, the presentation of a
liveness detector considerably degrades on encountering spoofs fabricated employing new materials not utilized
across the training stage. To mitigate the protection chance acted by new spoofs, it is vital to automatically
change the liveness detector to new spoofing materials. The target of this work is to design a scheme for
182 | P a g e | © IJRREST | h t t p : / / i j r r e s t . o r g / i s s u e s / ? p a g e _ i d = 1 2
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN
ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-4, ISSUE-1, APRIL-2015
(Proceedings of “6th National Conference on Make in India PMs Vision : Role of Engineering and Management
Innovations to Achieve this Vision” Organised by Apex Group of Institutions, Karnal, Haryana, India, April-2015)
automatic adaptation of a liveness detector to novel spoof materials encountered across the operational phase.
To enable this, a novel-material detector is utilized to ensign input pictures that are deemed to be made of a new
spoofing material. Such flagged pictures are next utilized to retrain the liveness detector. Examinations led on
the LivDet 2011 database counsel (i) a 62% rise in the error rate of continuing liveness detectors after tested
employing new spoof materials, and (ii) upto 46% enhancement in liveness detection presentation across spoof
materials after the counseled adaptive way is used.
Carsten Gottschlich, et al., 2014 [11] Aftermath display that counseled method achieves a comparable average
accuracy alongside the best algorithms on LivDet 2013 employing the alike evaluation protocol; though, this
evaluation procedure limits the evaluation of the algorithm alongside respect to the robustness to mechanism
diversity. We will spread examinations by assessing alongside disparate materials to embody the spoof class and
to clarify interoperability of the counseled liveness detector.
Daxin Tian et al., 2014 [12], in this research paper they counsel a bio-inspired ideal for making handover
decision in heterogeneous wireless networks. It is established on an spread attractor selection ideal, that is
biologically inspired by the self-adaptability and robustness of cellular reply to the adjustments in vibrant
environments. The aim of the counseled ideal is to promise several terminals’ satisfaction by encounter the QoS
necessities of those terminals’ requests, and this ideal additionally endeavors to safeguard the fairness of web
resources allocation, in the temporarily, to enable the QoS-oriented handover decision adaptive to vibrant
wireless environments.
4. CONCLUSION AND FUTURE SCOPE
Fingerprints have long been utilized as a reliable biometric feature for confidential identification. Fingerprint
association mentions to the setback of allocating fingerprints to one of countless pre-specified classes. Automatic
association can be utilized as a pre-processing pace for fingerprint matching, cutting matching period and
intricacy by restricting the find space to a subset of a normally huge database. Automatic fingerprint identification
is one of the most vital biometric technologies. In order to effectually match fingerprints in a colossal database, an
indexing scheme is necessary. Fingerprint association, that mentions to allocating a fingerprint picture into a
number of pre-specified classes, provides a feasible indexing mechanism. In exercise, though colossal intra-class
and tiny interclass variations in globe outline configuration and poor quality of fingerprint pictures make the
association setback extremely difficult. A fingerprint association algorithm needs a robust feature extractor that
ought to be able to reliable remove salient features from input images. A lot work is needed to apply wavelet
based pattern recognition technique for finger print recognition so as to evolve generalized methods independent
of specific requirements and to increase the fingerprint recognition rate. In future, we will work on the same
utilizing convolution transforms.
5. REFERENCES
[1]
Jain, Anil K., Yi Chen, and Meltem Demirkus. "Pores and ridges: High-resolution fingerprint matching using level 3
features." Pattern Analysis and Machine Intelligence, IEEE Transactions on 29, no. 1 (2007): 15-27.
[2] Bazen, Asker M., Gerben TB Verwaaijen, Sabih H. Gerez, Leo PJ Veelenturf, and Berend Jan van der Zwaag. "A
correlation-based fingerprint verification system." (2000).
[3] Jain, Anil K., Salil Prabhakar, Lin Hong, and Sharath Pankanti. "Filterbank-based fingerprint matching." Image
Processing, IEEE Transactions on 9, no. 5 (2000): 846-859.
[4] 4Grigorescu, Simona E., Nicolai Petkov, and Peter Kruizinga. "Comparison of texture features based on Gabor
filters." Image Processing, IEEE Transactions on 11, no. 10 (2002): 1160-1167.
[5] Yi Wang, and Jiankun Hu. "Global ridge orientation modeling for partial fingerprint identification." Pattern Analysis
and Machine Intelligence, IEEE Transactions on 33, no. 1 (2011): 72-87.
[6] Rakesh Verma, and Anuj Goel. "Wavelet application in fingerprint recognition." International Journal of Soft
Computing and Engineering (IJSCE) ISSN (2011): 2231-2307.
[7] Emanuela Marasco, and Carlo Sansone. "Combining perspiration-and morphology-based static features for
fingerprint liveness detection." Pattern Recognition Letters 33, no. 9 (2012): 1148-1156.
[8] Zheng Yang, Chenshu Wu, and Yunhao Liu. "Locating in fingerprint space: wireless indoor localization with little
human intervention." In Proceedings of the 18th annual international conference on Mobile computing and
networking, pp. 269-280. ACM, 2012.
[9] Alessandra A. Paulino, Jianjiang Feng, and Anil K. Jain. "Latent fingerprint matching using descriptor-based Hough
transform." Information Forensics and Security, IEEE Transactions on 8, no. 1 (2013): 31-45.
[10] Ajita Rattani, and Arun Ross. "Automatic adaptation of fingerprint liveness detector to new spoof materials." In
Proceedings of the IEEE International Conference on Biometrics (IJCB'14). 2014.
183 | P a g e | © IJRREST | h t t p : / / i j r r e s t . o r g / i s s u e s / ? p a g e _ i d = 1 2
IJRREST
INTERNATIONAL JOURNAL OF RESEARCH REVIEW IN
ENGINEERING SCIENCE & TECHNOLOGY
(ISSN 2278–6643)
VOLUME-4, ISSUE-1, APRIL-2015
(Proceedings of “6th National Conference on Make in India PMs Vision : Role of Engineering and Management
Innovations to Achieve this Vision” Organised by Apex Group of Institutions, Karnal, Haryana, India, April-2015)
[11] Carsten Gottschlich, Emanuela Marasco, Allen Y. Yang, and Bojan Cukic. "Fingerprint liveness detection based on
histograms of invariant gradients." Proc. IJCB. Clearwater, FL, USA (2014).
[12] Daxin Tian, Jianshan Zhou, Honggang Qi, Yingrong Lu, Yunpeng Wang, Jian Wang, and Anping He. "A Bio-Inspired
QoS-Oriented Handover Model in Heterogeneous Wireless Networks." Journal of Applied Mathematics 2014 (2014).
184 | P a g e | © IJRREST | h t t p : / / i j r r e s t . o r g / i s s u e s / ? p a g e _ i d = 1 2