SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1694
www.ijarcet.org
Modified Dactylogram Sifting
Geethu V S1
, V.Selvakumar2
1
Dept.of ECE, Sri Lakshmi Aammal Engineering College, Chennai.
2
Asst Prof Dept.of ECE, Lakshmi Aammal Engineering College, Chennai.
Abstract— Fingerprint recognition has been with success
utilized by enforcement agencies to spot suspects and
victims for nearly a hundred years. Recent advances in
automated fingerprint identification technology, in
addition the growing would like for reliable person
identification, have resulted in an increased use of
fingerprints in both government and civilian applications
such as border control, employment background checks,
and secure facility access. Fingerprint obfuscation refers
to the deliberate alteration of the fingerprint pattern by an
individual for the purpose of masking his identity.
Classify altered fingerprints into three classes based on
the changes in ridge pattern due to alteration as
obliterated, distorted and imitated. The projected
algorithmic rule supported the trivialities based on the
minutiae extracted satisfies the essential requirements and
determine the alteration type automatically to reconstruct
altered fingerprints. In order to conquer the drawbacks of
existing techniques, we proposed an efficient and robust
fingerprint matching technique via fuzzy based method.
For some types of altered fingerprints where the ridge
patterns are damaged locally or the ridge structure is still
present on the finger but possibly at a different location,
reconstruction is indeed possible by the proposed method.
Further it is shown that authentication is retained even
though fingerprint identity has altered.
Keywords:Fingerprints,Alteration,Obfuscation,Minutiae
extraction,Fuzzy based method
I. INTRODUCTION
Fingerprint matching has been successfully used by law
enforcement for more than a century. The technology is
now finding many other applications such as identity
management and access control. The automated fingerprint
recognition system and identify key challenges and research
opportunities in the field. Fingerprint alteration refers to
changes made in a person‟s finger ridge structure by means
of abrading, cutting, or performing plastic surgery on the
fingertips. Finger-print alteration is a serious attack on
Automated Finger-print Identification Systems (AFIS)
since it can reduce the similarity between fingerprint
impressions from the same finger due to the loss of genuine
minutiae, increase in spu-rious minutiae and distortion in
spatial distribution of the minutiae. The widespread
deployment of AFIS gives incentive to some individuals,
e.g., criminals and illegal aliens, to evade fingerprint
identification by altering their fingerprints. The objective of
fingerprint alteration, also called fingerprint obfuscation, is
to conceal one‟s identity by abrading, cutting, burning
fingers or performing plastic surgery on fingertips [1]. If a
person has a prior criminal record, he hopes that his altered
fingerprints will not be successfully matched to his
reference fingerprints stored in the law enforcement
databases.
We classify altered fingerprints into three
categories based on the changes in ridge pattern due to
alteration. This categorization will assist us in following
manner: 1) Getting a better understanding of the nature of
alterations that can be encountered, 2) detecting altered
fingerprints by modeling well-defined subcategories, and 3)
developing methods for altered fingerprint restoration. The
US Department of Homeland Security‟s US-VISIT
program (www.dhs.gov/usvisit) provides visa-issuing posts
and ports of entry with fingerprint recognition technology
that enables the federal government to establish and verify
the identity of those visiting the US. This large-scale
automated fingerprint recognition system has processed
more than 100 million visitors to the US since 2004.
In order to extract precise minutiae information,
an input fingerprint image generally needs to be enhanced
by convolving with certain types of orientation-selective
filters, such as Gabor or steerable filters, along the ridge
flow orientation at each pixel/block location [2, 3].The
minutiae considered involve ridge ending and bifurcation.
Figure-1a: Ridge ending Figure-1b:
Bifurcation
Altered fingerprint matching is a challenging
problem due to the following reasons: (i) friction ridge
structure can be severely damaged by abrading, cutting,
burning, or applying strong chemicals on fingertips,
resulting in a number of unreliable minutiae (ii) even if the
ridge
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1695
www.ijarcet.org
Figure-2: Photograph of altered fingerprint a) Transplanted friction ridge from skin sole b)Fingers that have been
bitten c)Fingers burnt by acid d)Stitched fingers
structure is well-defined in local regions, minutiae
distribution can be highly unusual during the procedure of
switching skin patches in cases of „Z‟-cut prints (Fig. 3a);
and (iii) minutiae in well-defined ridge area may not belong
to the fingerprint of interest if a portion of skin on the
fingertip was transplanted from other parts of the body
.Figure-2 shows the different types of alteration in
fingerprint. Matching phase can be divided into two parts:
(i) altered fingerprint restoration and (ii) altered fingerprint
matching. The matching of altered fingerprint with the
unaltered fingerprint stored in the database is the current
work. Matching done using fuzzy logic by replacing the
lost minutiae with the existing minutiae. Further it is shown
that authentication is retained
II. RELATED WORK
Algorithms that provide better detection
compared to NFIQ algorithm that can detect only up to 20
percent of altered fingerprint are defined. Here only two
types of altered fingerprint is detected, because the image
quality of obliterated fingerprint is either so good that they
can be successfully matched to the mated fingerprint by
automatic matchers or so poor that they can be easily
detected by fingerprint quality control software and
imitated fingerprints may look very natural and they are no
images of this type currently available in the public domain
to undertake such a study. Orientation field estimation and
singular point detection is done to detect alteration. Due to
the variation of singular points in terms of their number and
location, the orientation field of natural fingerprints varies
across individuals. Another approach for altered fingerprint
detection is: minutiae–based and correlation-based. The
former has several advantages over the latter such as lower
time complexity, better space complexity, less requirement
of hardware etc. The uniqueness of a fingerprint is due to
unique pattern shown by the locations of the minutiae
points – irregularities of a fingerprint – ridge endings, and
bifurcations.
Altered fingerprint types, „Z‟-cut cases are of
special interest since the original ridge structure of the
finger is still retained in the finger, but in different
positions. Once the „Z‟-cut prints are detected[4], the ridge
structure in the triangular patches can be restored by
reversing the transposing procedure. The restored „Z‟-cut
fingerprint and all other altered fingerprints are submitted
to a special matcher which is robust to a large amount of
skin distortion and utilizes local minutiae information.
III. PROPOSED SOLUTION
Motivated by the existing system‟s problem we
present a new matching technique for altered fingerprint
using fuzzy logic which is capable of matching all possible
altered fingerprint patterns. Performance is higher
compared to the existing systems.
Database
A large database of altered fingerprints is
obtainable to us from a law enforcement agency. It contains
4,433 altered fingerprints from 535 tenprint cards of 270
subjects. Among these altered images, if multiple pre-
altered impressions of a finger exist, the simplest quality
fingerprint image assessed by NIST Fingerprint Image
Quality (NFIQ) software [5] is selected as a reference
fingerprint.
Spurious Minutiae in Altered Region
Minutiae in the altered region are most likely
unreliable since, for instance, scars generate abrupt ridge
endings and mutilation forms unusual ridge pattern. In
transplanted cases, the ridge structure in the altered region
does not belong to the finger of interest. Valid fingerprint
region in the altered fingerprint is defined as the unaltered
region where genuine friction ridge structure of the finger
appears. To establish the valid fingerprint region, region of
interest (ROI) of a fingerprint is obtained by measuring
dynamic range in local regions, and altered regions also are
manually marked. ROI is defined as the local image blocks
with dynamic range in gray-scale intensity over 20 after the
highest and the lowest 10% gray values in a block are
discarded. This is followed by morphological operators to
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1696
www.ijarcet.org
fill holes and remove isolated small regions. With the
altered region that is currently marked manually, spurious
minutiae in invalid fingerprint region (i.e., either in the
altered region or outside ROI) are discarded. The number of
valid minutiae can vary a lot according to the area of valid
fingerprint region.
Restoration and Matching of Altered Fingerprint
Figure 4: Flow Chart for Matching of Altered Fingerprint
Analysis of Orientation Field
Orientation field describes the ridge flow of
fingerprints. Good quality fingerprints have a smooth
orientation field except near the singular points (e.g., core
and delta).Based on this fact, many orientation field models
have been developed by combining the global orientation
field model for the continuous flow field of the fingerprint
with the local orientation field model around the singular
points. The global orientation field model represents either
arch-type fingerprints, which do not have any singularity,
or the overall ridge orientation field except singularity in
fingerprints. If the global orientation field model alone is
used for orientation field approximation, the difference
between the observed orientation field and the model will
ideally be nonzero only around the singular points. On the
other hand, for obfuscated fingerprints, the model fitting
error is observed in the altered region as well. Thus, we use
the difference between the observed orientation field
extracted from the fingerprint image and the orientation
field approximated by the model as a feature vector for
classifying a fingerprint as natural fingerprint or altered
one.
Analysis of Minutiae Distribution
Based on the minutiae extracted from the
Altered-fingerprint by the minutiae extractor in, minutiae
density map is constructed by using the Parzen window
method with uniform kernel function. Kernel density
estimation is a non parametric way to estimate the
probability density function. Let Sm be the set of minutiae
of the fingerprint,
Sm = {x|x=(x,y) is the position of minutiae}
Then, the minutiae density map from Sm is computed as
follows:
The initial minutiae density map, Md(x), is
obtained by
Md(x) = ∑ Kr(x-x0)
Kr(x-x0) uniform kernel function centered at x0 with
radius r.
Low-pass filtering Md(x,y) is smoothed by a
Gaussian filter of size 30 X 30 pixels with a standard
deviation of 10 pixels. Normalization. Md(x,y) is
transformed to lie in the interval [0 1] by
Md(x,y) = { Md(x,y)/T, if Md(x,y) ≤ T
1 , otherwise
Where T is a predetermined threshold.
The minutiae density maps of altered fingerprints
are detected. In the natural fingerprint, minutiae are well
spread and distributed almost uniformly. In the altered
fingerprints, on the other hand, the distributions of minutiae
are quite different: 1) Many spurious minutiae are extracted
along scars and in the obliterated region due to ridge
discontinuity, and 2) an excessive number of minutiae
appear when a new ridge-like pattern is formed after
alteration. The examples demonstrate that minutiae
distribution can be useful for detecting altered fingerprints.
Restoration and Matching
Finger Print Matching Algorithm
1. Divide an input image into non overlapping
blocks with size x*y
2. Compute the gradients ∂x(i, j) and ∂y(i, j) at each
pixel (i, j) which is the centre of the block. The
gradient operator can be chosen according to the
computational complexity.
3. For each unidentified region apply fuzzy
filtering(i.e. copying neighbouring pixels)
a. Identify ridges, bifurcated area and
minutia by applying local orientation
b. Local Orientation algorithm calculates
the threshold value of the pixel region.
Here, the θ (i, j) is the least square estimate of the
local ridge orientation of the block centered at
pixel (i,j).
c. Apply Fine turning Operation as shown
below
MINUTIAE
EXTRACTION
MINUTIAE
DENSITY MAP
FEATURE LEVEL
FUSION
MATCH STAGE (FCM)
PRE ALTERED
FINGERPRINT
ALTERED
FINGERPRINT
ORIENTATION
FIELD
ESTIMATION
ORIENTATION
FIELD
DISCONTINUITY
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1697
www.ijarcet.org
d. Apply fuzzy on following clusters
4. Check the image with existing database image
IV. IMPLEMENTATION AND EXPERIMENTAL
RESULTS
Matching performance of altered fingerprints is
evaluated by the Cumulative Match Characteristic (CMC)
curves. We view altered fingerprint matching in the same
spirit as latent fingerprint matching in the sense that these
are high profile cases where a forensic examiner needs to
examine top N retrieved candidates from the background
database.
As a fingerprint matcher, Neurotechnology
VeriFinger SDK 6.3 is used to extract minutiae and match
the minutiae templates. The altered fingerprint database
consists of 1,332 pre/post-altered fingerprint pairs. Three
minutiae sets are evaluated: (i) all the minutiae extracted
from the altered fingerprints, (ii) a subset of minutiae from
the altered fingerprints by removing spurious minutiae in
invalid fingerprint region, and (iii) a subset of minutiae
from the restored fingerprint image by removing spurious
minutiae in invalid fingerprint region. Note that all the
minutiae in altered fingerprints are automatically extracted
by the matcher, and then spurious minutiae in invalid
region are masked out.
Fingerprint alteration is not always successful in lowering
the genuine match scores. Furthermore, the severity of the
alteration does not predict degradation in matching
performance. The fingerprint alteration appears to be severe
due to the skin transplantation over a large area. However,
it can be successfully matched to its pre-altered mate; the
match score with its true mate is sufficiently high to be
correctly identified at the top rank. Removal of spurious
minutiae in the altered region can improve the matching
performance. In most of altered fingerprint matching, it is
observed that minutiae pairing results are globally
inconsistent due to a number of spurious minutiae from
scars, mutilated region or background. By removing
spurious minutiae, the matcher is able to find more
consistent mates in minutiae pairings, which results in
higher genuine match score.
Figure 5: Match Score of pre /post alteration fingerprint
pairs according to type and genuine and impostor pairs
V.CONCLUSIONS AND FURTHER RESEARCH
Reconstruction of altered fingerprints is done. For
some types of altered fingerprints where the ridge patterns
are damaged locally or the ridge structure is still present on
the finger but possibly at a different location, reconstruction
is indeed possible. Match altered fingerprints to their
unaltered mates. A matcher specialized for altered
fingerprints can be developed to link them to unaltered
mates in the database utilizing whatever information is
available in the altered fingerprints. Previous work on this
topic [10,1] addressed the automatic detection of altered
fingerprints based on the abnormality in orientation field
and minutiae distribution.
Ongoing research on matching altered fingerprints is
addressing the following topics:
• Localize the altered region automatically to improve the
matching performance by removing spurious minutiae in
the altered region as well as classify„Z‟-cut cases which are
of special interest due to the possibility of restoration;
• Develop a new fingerprint matching algorithm specialized
to altered fingerprint matching which is robust to skin
distortion and that maximally uses local ridge structure in
valid fingerprint region
• Use multibiometrics [6] to combat the growing threat of
individuals evading AFIS. Federal agencies in the United
States have adopted or are planning to adopt
multibiometrics in their identity management systems (the
FBI‟s NGI [7] and DoD‟s ABIS [8]). However, other
biometric traits can also be altered successfully. It has been
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1698
www.ijarcet.org
reported that plastic surgery can significantly degrade the
performance of face recognition systems [9] and that
cataract surgery can reduce the accuracy of iris recognition
systems [10]. To effectively deal with the problem of
evading identification by altering biometric traits, a
systematic study of possible alteration approaches for each
major biometric trait is needed.
ACKNOWLEDGEMENT
We wish to express our sincere thanks to all the staff
member of E.C.E Department, Sri Lakshmi Aammal
Engineering College for their help and cooperation.
VI . REFERENCES
[1] S. Yoon, J. Feng , and A. K. Jain. Altered fingerprints:
Analysis and detection. IEEE Trans. Pattern Analysis and
Machine Intelligence , 2012.
[2] L. Hong, Y. Wan, and A. Jain, “Fingerprint image
enhancement: Algorithm and performance evalution,” IEEE
Trans. Pattern Analysis and Machine Intelligence, vol. 20,
no. 8, pp. 777–789, 1998.
[3] R. Bolle S. Chikkerur, S. Pankanti and V. Govindaraju,
“Minutiae verification in fingerprint images using steerable
wedge filters,” in Indian Conf. on Computer Vision,
Graphics & Image Processing,2004.
[4] On Matching Altered Fingerprints Soweon Yoon, Qijun
Zhao, and Anil K. Jain Department of Computer Science
and Engineering Michigan State University East Lansing,
MI, U.S.A. {yoonsowo,qjzhao,jain}@cse.msu.edu
[5] E. Tabassi, C. Wilson, and C. Watson. Fingerprint
Imagequality.NISTIR7151,August2004.http://fingerprint.ni
st.gov/NFIS/ir_7151.pdf.
[6] The FBI‟s Next Generation Identification (NGI),
http://www.fbi. gov/hq/cjisd/ngi.htm, 2011.
[7]DoD Biometrics Task Force,
http://www.biometrics.dod.mil/, 2011.
[8] R. Singh, M. Vatsa, H.S. Bhatt, S. Bharadwaj, A.
Noore, and S.S. Nooreyezdan, “Plastic Surgery: A New
Dimension to Face Recognition,” IEEE Trans. Information
Forensics and Security, vol. 5, no. 3, pp. 441-448, Sept.
2010.
[9] R. Roizenblatt, P. Schor, F. Dante, J. Roizenblatt, and
R. Belfort, “Iris Recognition as a Biometric Method After
Cataract Surgery,” Am. J. Ophthalmology, vol. 140, no. 5,
pp. 969-969, 2005.
[10] J. Feng, A. K. Jain, and A. Ross. Detecting Altered
Fingerprints. In Proc. 20th International Conference on
Pattern Recognition, pages 1622–1625, August 2010.

Más contenido relacionado

La actualidad más candente

Multimodel Biometric System: A Review
Multimodel Biometric System: A ReviewMultimodel Biometric System: A Review
Multimodel Biometric System: A ReviewIJSRED
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORcsitconf
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition SystemCSCJournals
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technologyshams tabrez
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABijtsrd
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
 
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11vishakhmarari
 
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and ValidationAdaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and ValidationCSCJournals
 
FINGER PRINTINGS
FINGER PRINTINGSFINGER PRINTINGS
FINGER PRINTINGSshiv dhori
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewOlivia Moran
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueSunil Kumar Chawla
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
 

La actualidad más candente (19)

Multimodel Biometric System: A Review
Multimodel Biometric System: A ReviewMultimodel Biometric System: A Review
Multimodel Biometric System: A Review
 
L_3011_62.+1908
L_3011_62.+1908L_3011_62.+1908
L_3011_62.+1908
 
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATORIRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
IRIS BIOMETRIC RECOGNITION SYSTEM EMPLOYING CANNY OPERATOR
 
J1076975
J1076975J1076975
J1076975
 
IRIS Based Human Recognition System
IRIS Based Human Recognition SystemIRIS Based Human Recognition System
IRIS Based Human Recognition System
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATIONA SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
 
Iris scanner technology
Iris scanner technologyIris scanner technology
Iris scanner technology
 
Software Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLABSoftware Implementation of Iris Recognition System using MATLAB
Software Implementation of Iris Recognition System using MATLAB
 
Iris Scan
Iris ScanIris Scan
Iris Scan
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
Paulino fengjain latentfp_matching_descriptorbasedhoughtransform_ijcb11
 
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and ValidationAdaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation
Adaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation
 
Iris biometrics
Iris     biometricsIris     biometrics
Iris biometrics
 
FINGER PRINTINGS
FINGER PRINTINGSFINGER PRINTINGS
FINGER PRINTINGS
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Biometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature ReviewBiometrics Iris Scanning: A Literature Review
Biometrics Iris Scanning: A Literature Review
 
Study and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization TechniqueStudy and development of Iris Segmentation and Normalization Technique
Study and development of Iris Segmentation and Normalization Technique
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...
 

Destacado

Ijarcet vol-2-issue-2-319-322
Ijarcet vol-2-issue-2-319-322Ijarcet vol-2-issue-2-319-322
Ijarcet vol-2-issue-2-319-322Editor IJARCET
 
Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388Editor IJARCET
 
Ijarcet vol-2-issue-3-1036-1040
Ijarcet vol-2-issue-3-1036-1040Ijarcet vol-2-issue-3-1036-1040
Ijarcet vol-2-issue-3-1036-1040Editor IJARCET
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Editor IJARCET
 
Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329Editor IJARCET
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Editor IJARCET
 

Destacado (9)

Ijarcet vol-2-issue-2-319-322
Ijarcet vol-2-issue-2-319-322Ijarcet vol-2-issue-2-319-322
Ijarcet vol-2-issue-2-319-322
 
Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388
 
1694 1698
1694 16981694 1698
1694 1698
 
1709 1715
1709 17151709 1715
1709 1715
 
Ijarcet vol-2-issue-3-1036-1040
Ijarcet vol-2-issue-3-1036-1040Ijarcet vol-2-issue-3-1036-1040
Ijarcet vol-2-issue-3-1036-1040
 
Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880Ijarcet vol-2-issue-3-875-880
Ijarcet vol-2-issue-3-875-880
 
Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329Ijarcet vol-2-issue-2-323-329
Ijarcet vol-2-issue-2-323-329
 
Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397Ijarcet vol-2-issue-7-2389-2397
Ijarcet vol-2-issue-7-2389-2397
 
1801 1805
1801 18051801 1805
1801 1805
 

Similar a Detecting altered fingerprints using fuzzy logic

Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsShakas Technologies
 
Proposal to enhance fingerprint recognition system
Proposal to enhance fingerprint recognition systemProposal to enhance fingerprint recognition system
Proposal to enhance fingerprint recognition systemIAEME Publication
 
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...IRJET Journal
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsCloudTechnologies
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsPvrtechnologies Nellore
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd Iaetsd
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEditor IJMTER
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint RecognitionEECJOURNAL
 
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...IDES Editor
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
A Novel Approach to Fingerprint Identification Using Gabor Filter-BankA Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
A Novel Approach to Fingerprint Identification Using Gabor Filter-BankIDES Editor
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification systemeSAT Journals
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET Journal
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintJayakrishnan U
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint AnalaysisANIKLAL2
 
Si fengzhou wifs12_distortion
Si fengzhou wifs12_distortionSi fengzhou wifs12_distortion
Si fengzhou wifs12_distortionSamir le King
 

Similar a Detecting altered fingerprints using fuzzy logic (20)

Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
Proposal to enhance fingerprint recognition system
Proposal to enhance fingerprint recognition systemProposal to enhance fingerprint recognition system
Proposal to enhance fingerprint recognition system
 
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
Accurate Analysis on Hybrid DWT and SVD Based Digital Watermarking for Finger...
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
Iaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matchingIaetsd latent fingerprint recognition and matching
Iaetsd latent fingerprint recognition and matching
 
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based ApproachEnhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
 
Review on Fingerprint Recognition
Review on Fingerprint RecognitionReview on Fingerprint Recognition
Review on Fingerprint Recognition
 
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
A Novel Approach to Fingerprint Identification Using Gabor Filter-BankA Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 
Fingerprint Analaysis
Fingerprint AnalaysisFingerprint Analaysis
Fingerprint Analaysis
 
07515971
0751597107515971
07515971
 
Seminar
SeminarSeminar
Seminar
 
Si fengzhou wifs12_distortion
Si fengzhou wifs12_distortionSi fengzhou wifs12_distortion
Si fengzhou wifs12_distortion
 

Más de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Más de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Detecting altered fingerprints using fuzzy logic

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1694 www.ijarcet.org Modified Dactylogram Sifting Geethu V S1 , V.Selvakumar2 1 Dept.of ECE, Sri Lakshmi Aammal Engineering College, Chennai. 2 Asst Prof Dept.of ECE, Lakshmi Aammal Engineering College, Chennai. Abstract— Fingerprint recognition has been with success utilized by enforcement agencies to spot suspects and victims for nearly a hundred years. Recent advances in automated fingerprint identification technology, in addition the growing would like for reliable person identification, have resulted in an increased use of fingerprints in both government and civilian applications such as border control, employment background checks, and secure facility access. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his identity. Classify altered fingerprints into three classes based on the changes in ridge pattern due to alteration as obliterated, distorted and imitated. The projected algorithmic rule supported the trivialities based on the minutiae extracted satisfies the essential requirements and determine the alteration type automatically to reconstruct altered fingerprints. In order to conquer the drawbacks of existing techniques, we proposed an efficient and robust fingerprint matching technique via fuzzy based method. For some types of altered fingerprints where the ridge patterns are damaged locally or the ridge structure is still present on the finger but possibly at a different location, reconstruction is indeed possible by the proposed method. Further it is shown that authentication is retained even though fingerprint identity has altered. Keywords:Fingerprints,Alteration,Obfuscation,Minutiae extraction,Fuzzy based method I. INTRODUCTION Fingerprint matching has been successfully used by law enforcement for more than a century. The technology is now finding many other applications such as identity management and access control. The automated fingerprint recognition system and identify key challenges and research opportunities in the field. Fingerprint alteration refers to changes made in a person‟s finger ridge structure by means of abrading, cutting, or performing plastic surgery on the fingertips. Finger-print alteration is a serious attack on Automated Finger-print Identification Systems (AFIS) since it can reduce the similarity between fingerprint impressions from the same finger due to the loss of genuine minutiae, increase in spu-rious minutiae and distortion in spatial distribution of the minutiae. The widespread deployment of AFIS gives incentive to some individuals, e.g., criminals and illegal aliens, to evade fingerprint identification by altering their fingerprints. The objective of fingerprint alteration, also called fingerprint obfuscation, is to conceal one‟s identity by abrading, cutting, burning fingers or performing plastic surgery on fingertips [1]. If a person has a prior criminal record, he hopes that his altered fingerprints will not be successfully matched to his reference fingerprints stored in the law enforcement databases. We classify altered fingerprints into three categories based on the changes in ridge pattern due to alteration. This categorization will assist us in following manner: 1) Getting a better understanding of the nature of alterations that can be encountered, 2) detecting altered fingerprints by modeling well-defined subcategories, and 3) developing methods for altered fingerprint restoration. The US Department of Homeland Security‟s US-VISIT program (www.dhs.gov/usvisit) provides visa-issuing posts and ports of entry with fingerprint recognition technology that enables the federal government to establish and verify the identity of those visiting the US. This large-scale automated fingerprint recognition system has processed more than 100 million visitors to the US since 2004. In order to extract precise minutiae information, an input fingerprint image generally needs to be enhanced by convolving with certain types of orientation-selective filters, such as Gabor or steerable filters, along the ridge flow orientation at each pixel/block location [2, 3].The minutiae considered involve ridge ending and bifurcation. Figure-1a: Ridge ending Figure-1b: Bifurcation Altered fingerprint matching is a challenging problem due to the following reasons: (i) friction ridge structure can be severely damaged by abrading, cutting, burning, or applying strong chemicals on fingertips, resulting in a number of unreliable minutiae (ii) even if the ridge
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1695 www.ijarcet.org Figure-2: Photograph of altered fingerprint a) Transplanted friction ridge from skin sole b)Fingers that have been bitten c)Fingers burnt by acid d)Stitched fingers structure is well-defined in local regions, minutiae distribution can be highly unusual during the procedure of switching skin patches in cases of „Z‟-cut prints (Fig. 3a); and (iii) minutiae in well-defined ridge area may not belong to the fingerprint of interest if a portion of skin on the fingertip was transplanted from other parts of the body .Figure-2 shows the different types of alteration in fingerprint. Matching phase can be divided into two parts: (i) altered fingerprint restoration and (ii) altered fingerprint matching. The matching of altered fingerprint with the unaltered fingerprint stored in the database is the current work. Matching done using fuzzy logic by replacing the lost minutiae with the existing minutiae. Further it is shown that authentication is retained II. RELATED WORK Algorithms that provide better detection compared to NFIQ algorithm that can detect only up to 20 percent of altered fingerprint are defined. Here only two types of altered fingerprint is detected, because the image quality of obliterated fingerprint is either so good that they can be successfully matched to the mated fingerprint by automatic matchers or so poor that they can be easily detected by fingerprint quality control software and imitated fingerprints may look very natural and they are no images of this type currently available in the public domain to undertake such a study. Orientation field estimation and singular point detection is done to detect alteration. Due to the variation of singular points in terms of their number and location, the orientation field of natural fingerprints varies across individuals. Another approach for altered fingerprint detection is: minutiae–based and correlation-based. The former has several advantages over the latter such as lower time complexity, better space complexity, less requirement of hardware etc. The uniqueness of a fingerprint is due to unique pattern shown by the locations of the minutiae points – irregularities of a fingerprint – ridge endings, and bifurcations. Altered fingerprint types, „Z‟-cut cases are of special interest since the original ridge structure of the finger is still retained in the finger, but in different positions. Once the „Z‟-cut prints are detected[4], the ridge structure in the triangular patches can be restored by reversing the transposing procedure. The restored „Z‟-cut fingerprint and all other altered fingerprints are submitted to a special matcher which is robust to a large amount of skin distortion and utilizes local minutiae information. III. PROPOSED SOLUTION Motivated by the existing system‟s problem we present a new matching technique for altered fingerprint using fuzzy logic which is capable of matching all possible altered fingerprint patterns. Performance is higher compared to the existing systems. Database A large database of altered fingerprints is obtainable to us from a law enforcement agency. It contains 4,433 altered fingerprints from 535 tenprint cards of 270 subjects. Among these altered images, if multiple pre- altered impressions of a finger exist, the simplest quality fingerprint image assessed by NIST Fingerprint Image Quality (NFIQ) software [5] is selected as a reference fingerprint. Spurious Minutiae in Altered Region Minutiae in the altered region are most likely unreliable since, for instance, scars generate abrupt ridge endings and mutilation forms unusual ridge pattern. In transplanted cases, the ridge structure in the altered region does not belong to the finger of interest. Valid fingerprint region in the altered fingerprint is defined as the unaltered region where genuine friction ridge structure of the finger appears. To establish the valid fingerprint region, region of interest (ROI) of a fingerprint is obtained by measuring dynamic range in local regions, and altered regions also are manually marked. ROI is defined as the local image blocks with dynamic range in gray-scale intensity over 20 after the highest and the lowest 10% gray values in a block are discarded. This is followed by morphological operators to
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1696 www.ijarcet.org fill holes and remove isolated small regions. With the altered region that is currently marked manually, spurious minutiae in invalid fingerprint region (i.e., either in the altered region or outside ROI) are discarded. The number of valid minutiae can vary a lot according to the area of valid fingerprint region. Restoration and Matching of Altered Fingerprint Figure 4: Flow Chart for Matching of Altered Fingerprint Analysis of Orientation Field Orientation field describes the ridge flow of fingerprints. Good quality fingerprints have a smooth orientation field except near the singular points (e.g., core and delta).Based on this fact, many orientation field models have been developed by combining the global orientation field model for the continuous flow field of the fingerprint with the local orientation field model around the singular points. The global orientation field model represents either arch-type fingerprints, which do not have any singularity, or the overall ridge orientation field except singularity in fingerprints. If the global orientation field model alone is used for orientation field approximation, the difference between the observed orientation field and the model will ideally be nonzero only around the singular points. On the other hand, for obfuscated fingerprints, the model fitting error is observed in the altered region as well. Thus, we use the difference between the observed orientation field extracted from the fingerprint image and the orientation field approximated by the model as a feature vector for classifying a fingerprint as natural fingerprint or altered one. Analysis of Minutiae Distribution Based on the minutiae extracted from the Altered-fingerprint by the minutiae extractor in, minutiae density map is constructed by using the Parzen window method with uniform kernel function. Kernel density estimation is a non parametric way to estimate the probability density function. Let Sm be the set of minutiae of the fingerprint, Sm = {x|x=(x,y) is the position of minutiae} Then, the minutiae density map from Sm is computed as follows: The initial minutiae density map, Md(x), is obtained by Md(x) = ∑ Kr(x-x0) Kr(x-x0) uniform kernel function centered at x0 with radius r. Low-pass filtering Md(x,y) is smoothed by a Gaussian filter of size 30 X 30 pixels with a standard deviation of 10 pixels. Normalization. Md(x,y) is transformed to lie in the interval [0 1] by Md(x,y) = { Md(x,y)/T, if Md(x,y) ≤ T 1 , otherwise Where T is a predetermined threshold. The minutiae density maps of altered fingerprints are detected. In the natural fingerprint, minutiae are well spread and distributed almost uniformly. In the altered fingerprints, on the other hand, the distributions of minutiae are quite different: 1) Many spurious minutiae are extracted along scars and in the obliterated region due to ridge discontinuity, and 2) an excessive number of minutiae appear when a new ridge-like pattern is formed after alteration. The examples demonstrate that minutiae distribution can be useful for detecting altered fingerprints. Restoration and Matching Finger Print Matching Algorithm 1. Divide an input image into non overlapping blocks with size x*y 2. Compute the gradients ∂x(i, j) and ∂y(i, j) at each pixel (i, j) which is the centre of the block. The gradient operator can be chosen according to the computational complexity. 3. For each unidentified region apply fuzzy filtering(i.e. copying neighbouring pixels) a. Identify ridges, bifurcated area and minutia by applying local orientation b. Local Orientation algorithm calculates the threshold value of the pixel region. Here, the θ (i, j) is the least square estimate of the local ridge orientation of the block centered at pixel (i,j). c. Apply Fine turning Operation as shown below MINUTIAE EXTRACTION MINUTIAE DENSITY MAP FEATURE LEVEL FUSION MATCH STAGE (FCM) PRE ALTERED FINGERPRINT ALTERED FINGERPRINT ORIENTATION FIELD ESTIMATION ORIENTATION FIELD DISCONTINUITY
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1697 www.ijarcet.org d. Apply fuzzy on following clusters 4. Check the image with existing database image IV. IMPLEMENTATION AND EXPERIMENTAL RESULTS Matching performance of altered fingerprints is evaluated by the Cumulative Match Characteristic (CMC) curves. We view altered fingerprint matching in the same spirit as latent fingerprint matching in the sense that these are high profile cases where a forensic examiner needs to examine top N retrieved candidates from the background database. As a fingerprint matcher, Neurotechnology VeriFinger SDK 6.3 is used to extract minutiae and match the minutiae templates. The altered fingerprint database consists of 1,332 pre/post-altered fingerprint pairs. Three minutiae sets are evaluated: (i) all the minutiae extracted from the altered fingerprints, (ii) a subset of minutiae from the altered fingerprints by removing spurious minutiae in invalid fingerprint region, and (iii) a subset of minutiae from the restored fingerprint image by removing spurious minutiae in invalid fingerprint region. Note that all the minutiae in altered fingerprints are automatically extracted by the matcher, and then spurious minutiae in invalid region are masked out. Fingerprint alteration is not always successful in lowering the genuine match scores. Furthermore, the severity of the alteration does not predict degradation in matching performance. The fingerprint alteration appears to be severe due to the skin transplantation over a large area. However, it can be successfully matched to its pre-altered mate; the match score with its true mate is sufficiently high to be correctly identified at the top rank. Removal of spurious minutiae in the altered region can improve the matching performance. In most of altered fingerprint matching, it is observed that minutiae pairing results are globally inconsistent due to a number of spurious minutiae from scars, mutilated region or background. By removing spurious minutiae, the matcher is able to find more consistent mates in minutiae pairings, which results in higher genuine match score. Figure 5: Match Score of pre /post alteration fingerprint pairs according to type and genuine and impostor pairs V.CONCLUSIONS AND FURTHER RESEARCH Reconstruction of altered fingerprints is done. For some types of altered fingerprints where the ridge patterns are damaged locally or the ridge structure is still present on the finger but possibly at a different location, reconstruction is indeed possible. Match altered fingerprints to their unaltered mates. A matcher specialized for altered fingerprints can be developed to link them to unaltered mates in the database utilizing whatever information is available in the altered fingerprints. Previous work on this topic [10,1] addressed the automatic detection of altered fingerprints based on the abnormality in orientation field and minutiae distribution. Ongoing research on matching altered fingerprints is addressing the following topics: • Localize the altered region automatically to improve the matching performance by removing spurious minutiae in the altered region as well as classify„Z‟-cut cases which are of special interest due to the possibility of restoration; • Develop a new fingerprint matching algorithm specialized to altered fingerprint matching which is robust to skin distortion and that maximally uses local ridge structure in valid fingerprint region • Use multibiometrics [6] to combat the growing threat of individuals evading AFIS. Federal agencies in the United States have adopted or are planning to adopt multibiometrics in their identity management systems (the FBI‟s NGI [7] and DoD‟s ABIS [8]). However, other biometric traits can also be altered successfully. It has been
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1698 www.ijarcet.org reported that plastic surgery can significantly degrade the performance of face recognition systems [9] and that cataract surgery can reduce the accuracy of iris recognition systems [10]. To effectively deal with the problem of evading identification by altering biometric traits, a systematic study of possible alteration approaches for each major biometric trait is needed. ACKNOWLEDGEMENT We wish to express our sincere thanks to all the staff member of E.C.E Department, Sri Lakshmi Aammal Engineering College for their help and cooperation. VI . REFERENCES [1] S. Yoon, J. Feng , and A. K. Jain. Altered fingerprints: Analysis and detection. IEEE Trans. Pattern Analysis and Machine Intelligence , 2012. [2] L. Hong, Y. Wan, and A. Jain, “Fingerprint image enhancement: Algorithm and performance evalution,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 777–789, 1998. [3] R. Bolle S. Chikkerur, S. Pankanti and V. Govindaraju, “Minutiae verification in fingerprint images using steerable wedge filters,” in Indian Conf. on Computer Vision, Graphics & Image Processing,2004. [4] On Matching Altered Fingerprints Soweon Yoon, Qijun Zhao, and Anil K. Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI, U.S.A. {yoonsowo,qjzhao,jain}@cse.msu.edu [5] E. Tabassi, C. Wilson, and C. Watson. Fingerprint Imagequality.NISTIR7151,August2004.http://fingerprint.ni st.gov/NFIS/ir_7151.pdf. [6] The FBI‟s Next Generation Identification (NGI), http://www.fbi. gov/hq/cjisd/ngi.htm, 2011. [7]DoD Biometrics Task Force, http://www.biometrics.dod.mil/, 2011. [8] R. Singh, M. Vatsa, H.S. Bhatt, S. Bharadwaj, A. Noore, and S.S. Nooreyezdan, “Plastic Surgery: A New Dimension to Face Recognition,” IEEE Trans. Information Forensics and Security, vol. 5, no. 3, pp. 441-448, Sept. 2010. [9] R. Roizenblatt, P. Schor, F. Dante, J. Roizenblatt, and R. Belfort, “Iris Recognition as a Biometric Method After Cataract Surgery,” Am. J. Ophthalmology, vol. 140, no. 5, pp. 969-969, 2005. [10] J. Feng, A. K. Jain, and A. Ross. Detecting Altered Fingerprints. In Proc. 20th International Conference on Pattern Recognition, pages 1622–1625, August 2010.