SlideShare a Scribd company logo
1 of 52
FINGER PRINTS
RECOGNITION SYSTEM
S.ANITHALAKSHMI
50409621003
AbstrAct
 The minutiae are ridge endings or bifurcations on the
fingerprints. They, including their coordinates and
direction, are most distinctive features to represent the
fingerprint.
 Most fingerprint recognition systems store only the
minutiae template in the database for further usage.
 The conventional methods to utilize minutiae
information are treating it as a point set and finding the
matched points from different minutiae sets.
 This kind of minutiae-based fingerprint recognition
systems consists of two steps, i.e., minutiae
extraction and minutiae matching.
 In the minutiae matching process, the minutiae
feature of a given fingerprint is compared with the
minutiae template, and the matched minutiae will be
found out.
 The template used for fingerprint recognition is
further utilized in the matching stage to enhance the
system’s performance.
 These templates are been stored in the database for further
processing.
 Specific unique id is generated for each template stored.
 The id is stored in the database along with the template locations.
 Next is the verification process where you need to provide the id
for comparison.
 The given id is being compared with the id’s in the database and
matched with the corresponding template of that id.
 A message is being displayed on successful matching along
with the score.
 Otherwise an failure message is displayed indicating match not
found.
 In the identification stage we need not specify an id. Click on
the Identify button which searches for any match and provides
the corresponding result.
 The database records can also be deleted through the
application.
 Auto extract and Auto identify check boxes can be selected if
need which automatically extracts and identifies the matching
image
 It is also possible to load an image and compare it with the
database images.
 The colors of the template extraction can also be changed.
OrGANIZAtIONAL PrOFILE
OrAtOr sOLUtIONs
 The name “Orator”– A Good Speaker, One who speaks
well in public. A good speaker has lot of followers.
Like that, We people are good speaker by our work.
We satisfy our clients by our services. And we are here
to provide Intelligent
SKILLS
 Banking & Real Estate
 Finance & Insurance
o Hospital and health care industry
o Web Applications
o Office Automation
o Manufacturing Retailing
HArDWArE rEQUIrEMENts
 Processor PENTIUM IV
 RAM 128 MB
 Hard Disk 40 GB
sOFtWArE rEQUIrEMENts
 Browser Internet Explorer
 Server side scripting Java
 Database Ms-Access
 Client side scripting HTML
ExIstING systEM
 The conventional methods to utilize minutiae
information are treating it as a point set and finding the
matched points from different minutiae sets.
 In existing system, the Sparse areas are not considered.
So the result may not obtain correctly. And the
matching will be difficult to get an absolute result.
FingerPrint View
Red Spots Minutiae
PrOPOsED systEM
 In Proposed system, we considered the sparse area
and the fingerprint’s orientation field is reconstructed
from minutiae and further utilized in the matching
stage to enhance the system’s performance.
DESIGN OF THE PROJECT
DaTa FlOw DIaGRam
Show the matching Score
Thump Impression
Extract
Particular Identify
Entire Verification
Database
If Matches Show the Particular ID No
Does Not Exist
False
True
If Matches
Does not match
False
True
Enroll
mODulE lIST
 Minutiae Template
 Minutiae Matching
 Effective Region Estimation
 Orientation Field Matching
 Fusing Matching
mINuTIaE TEmPlaTE
 Minutiae templates are a fraction of the size of
fingerprint images, require less storage memory
and can be transmitted electronically faster than
images.
mINuTIaE maTCHING
 In this module we matches the fingerprint minutiae
by using both the local and global structures of
minutiae.
 The local structure of a minutia describes a rotation
and translation invariant feature of the minutia in its
neighborhood.
 It is used to find the correspondence of two minutiae
sets and increase the reliability of the global matching.
 The global structure of minutiae reliably determines
the uniqueness of fingerprint. Therefore, the local and
global structures of minutiae together provide a solid
basis for reliable and robust minutiae matching.
(a) X Person’s Fingerprint (b) X Person’s Fingerprint for
verification
Matching Stage
EFFECTIvE REGION
ESTImaTION
 we can extract the effective region by finding the
smallest envelope that contains all the minutiae
points. For an When only having minutiae feature, we
can extract the effective region by only using
minutiae illustration. Here, we put the original image
together for the convenience to give a visual sense.
Estimation of Effective Region
ORIENTaTION FIElD
maTCHING
 To compare two fingerprints’ orientation field, the
first step is alignment of these two fingerprints. The
alignment is mainly based on minutiae information .
Here we choose the Hough transform based approach
to finish the alignment due to its simplicity.
 Hough Transform (HT) is one of the most common
methods for detecting shapes (lines, circles, etc.) in
binary or edge images. Its advantage is its ability to
detect discontinuous patterns in noisy images, but it
requires a large amount of computing power.
FuSING maTCHING
 A variety of combination rules have been proposed. It
has shown that matching accuracy can be improved
by combining independent matchers using Neyman–
Pearson rule. Here, we will also use Neyman–Pearson
rule for the task.
 Matching of test fingerprint with template is done in
Neyman-Pearson rule. Two sets of minutiae are
compared. If matching score is found, then the
fingerprint is matched with template. Otherwise does
not matched with the template.
INPuT aND OuTPuT SCREENS
Main Page
Authentication
Load BMP Image
Extract Template
Enroll
Reports
Verify
Verify
Identify
ClearDatabase
ClearLog
Benefits of the project
 The project can be used for security purposes.
 E.g. : Attendance ,
voter registration,
Crime Investigation,
forensic fingerprint searching.
CONCLUSION
Orientation field is important for fingerprint
representation. In order to utilize the orientation
information in automatic fingerprint recognition
systems which only stores minutiae feature. So we can
reduce the usage of memory and enhancing the
performance of system.
We also utilize the reconstructed orientation field
information into the matching stage. We can reduce
the effect of wrongly detected minutiae. A fingerprint
matching based on orientation field is used to combine
with conventional minutiae matching for real
applications.
THANK YOU

More Related Content

What's hot

FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
Vaibhav P
 

What's hot (20)

Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Finger print recognition
Finger print recognition Finger print recognition
Finger print recognition
 
Applications of Biometrics in Technology
Applications of Biometrics in TechnologyApplications of Biometrics in Technology
Applications of Biometrics in Technology
 
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKHUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORK
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
biometric technology
biometric technologybiometric technology
biometric technology
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Biometrics final ppt
Biometrics final pptBiometrics final ppt
Biometrics final ppt
 
Biometrics Technology, Types & Applications
Biometrics Technology, Types & ApplicationsBiometrics Technology, Types & Applications
Biometrics Technology, Types & Applications
 
Face recognition
Face recognitionFace recognition
Face recognition
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Signature verification
Signature verificationSignature verification
Signature verification
 

Viewers also liked

fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
VishwasJangra
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
guest8cbcb02
 
Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013
JJ Wu
 
Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013
JJ Wu
 

Viewers also liked (20)

Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 
Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Fingerprint Pattern
Fingerprint PatternFingerprint Pattern
Fingerprint Pattern
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Speech recognition final presentation
Speech recognition final presentationSpeech recognition final presentation
Speech recognition final presentation
 
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEMLATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
LATENT FINGERPRINT MATCHING USING AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
 
Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013Apple - Compare iPhone Models Oct' 2013
Apple - Compare iPhone Models Oct' 2013
 
Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013Apple - Compare iPad Models Oct' 2013
Apple - Compare iPad Models Oct' 2013
 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 
Ullas_CV
Ullas_CVUllas_CV
Ullas_CV
 
3 Content/Body
3 Content/Body3 Content/Body
3 Content/Body
 
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
Authenticated Access Control for Vehicle Ignition System by Smart Card and Fi...
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 

Similar to 50409621003 fingerprint recognition system-ppt

ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
IJCSEIT Journal
 

Similar to 50409621003 fingerprint recognition system-ppt (20)

ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhhppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
ppt-20.06.24.pptx ghyyuuuygrfggtyghffhhhh
 
IRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCVIRJET- Face Detection and Recognition using OpenCV
IRJET- Face Detection and Recognition using OpenCV
 
finger prints
finger printsfinger prints
finger prints
 
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine LearningSentiment Analysis: A comparative study of Deep Learning and Machine Learning
Sentiment Analysis: A comparative study of Deep Learning and Machine Learning
 
A Simple Signature Recognition System
A Simple Signature Recognition System A Simple Signature Recognition System
A Simple Signature Recognition System
 
K012647982
K012647982K012647982
K012647982
 
K012647982
K012647982K012647982
K012647982
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSCOMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
 
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
Comparative Study of Machine Learning Algorithms for Sentiment Analysis with ...
 
Modex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual OverviewModex Talks - AI Conceptual Overview
Modex Talks - AI Conceptual Overview
 
AI NOTES.docx
AI NOTES.docxAI NOTES.docx
AI NOTES.docx
 
Data Science in business World
Data Science in business World Data Science in business World
Data Science in business World
 
IRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image ProcessingIRJET- Cheque Bounce Detection System using Image Processing
IRJET- Cheque Bounce Detection System using Image Processing
 
Currency Recognition System using Image Processing
Currency Recognition System using Image ProcessingCurrency Recognition System using Image Processing
Currency Recognition System using Image Processing
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
 
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 

50409621003 fingerprint recognition system-ppt

  • 2. AbstrAct  The minutiae are ridge endings or bifurcations on the fingerprints. They, including their coordinates and direction, are most distinctive features to represent the fingerprint.  Most fingerprint recognition systems store only the minutiae template in the database for further usage.  The conventional methods to utilize minutiae information are treating it as a point set and finding the matched points from different minutiae sets.
  • 3.  This kind of minutiae-based fingerprint recognition systems consists of two steps, i.e., minutiae extraction and minutiae matching.  In the minutiae matching process, the minutiae feature of a given fingerprint is compared with the minutiae template, and the matched minutiae will be found out.  The template used for fingerprint recognition is further utilized in the matching stage to enhance the system’s performance.
  • 4.  These templates are been stored in the database for further processing.  Specific unique id is generated for each template stored.  The id is stored in the database along with the template locations.  Next is the verification process where you need to provide the id for comparison.  The given id is being compared with the id’s in the database and matched with the corresponding template of that id.
  • 5.  A message is being displayed on successful matching along with the score.  Otherwise an failure message is displayed indicating match not found.  In the identification stage we need not specify an id. Click on the Identify button which searches for any match and provides the corresponding result.
  • 6.  The database records can also be deleted through the application.  Auto extract and Auto identify check boxes can be selected if need which automatically extracts and identifies the matching image  It is also possible to load an image and compare it with the database images.  The colors of the template extraction can also be changed.
  • 7. OrGANIZAtIONAL PrOFILE OrAtOr sOLUtIONs  The name “Orator”– A Good Speaker, One who speaks well in public. A good speaker has lot of followers. Like that, We people are good speaker by our work. We satisfy our clients by our services. And we are here to provide Intelligent SKILLS  Banking & Real Estate  Finance & Insurance
  • 8. o Hospital and health care industry o Web Applications o Office Automation o Manufacturing Retailing
  • 9. HArDWArE rEQUIrEMENts  Processor PENTIUM IV  RAM 128 MB  Hard Disk 40 GB
  • 10. sOFtWArE rEQUIrEMENts  Browser Internet Explorer  Server side scripting Java  Database Ms-Access  Client side scripting HTML
  • 11. ExIstING systEM  The conventional methods to utilize minutiae information are treating it as a point set and finding the matched points from different minutiae sets.  In existing system, the Sparse areas are not considered. So the result may not obtain correctly. And the matching will be difficult to get an absolute result.
  • 13. PrOPOsED systEM  In Proposed system, we considered the sparse area and the fingerprint’s orientation field is reconstructed from minutiae and further utilized in the matching stage to enhance the system’s performance.
  • 14. DESIGN OF THE PROJECT
  • 15. DaTa FlOw DIaGRam Show the matching Score Thump Impression Extract Particular Identify Entire Verification Database If Matches Show the Particular ID No Does Not Exist False True If Matches Does not match False True Enroll
  • 16. mODulE lIST  Minutiae Template  Minutiae Matching  Effective Region Estimation  Orientation Field Matching  Fusing Matching
  • 17. mINuTIaE TEmPlaTE  Minutiae templates are a fraction of the size of fingerprint images, require less storage memory and can be transmitted electronically faster than images.
  • 18. mINuTIaE maTCHING  In this module we matches the fingerprint minutiae by using both the local and global structures of minutiae.  The local structure of a minutia describes a rotation and translation invariant feature of the minutia in its neighborhood.  It is used to find the correspondence of two minutiae sets and increase the reliability of the global matching.  The global structure of minutiae reliably determines the uniqueness of fingerprint. Therefore, the local and global structures of minutiae together provide a solid basis for reliable and robust minutiae matching.
  • 19. (a) X Person’s Fingerprint (b) X Person’s Fingerprint for verification Matching Stage
  • 20. EFFECTIvE REGION ESTImaTION  we can extract the effective region by finding the smallest envelope that contains all the minutiae points. For an When only having minutiae feature, we can extract the effective region by only using minutiae illustration. Here, we put the original image together for the convenience to give a visual sense.
  • 22. ORIENTaTION FIElD maTCHING  To compare two fingerprints’ orientation field, the first step is alignment of these two fingerprints. The alignment is mainly based on minutiae information . Here we choose the Hough transform based approach to finish the alignment due to its simplicity.  Hough Transform (HT) is one of the most common methods for detecting shapes (lines, circles, etc.) in binary or edge images. Its advantage is its ability to detect discontinuous patterns in noisy images, but it requires a large amount of computing power.
  • 23. FuSING maTCHING  A variety of combination rules have been proposed. It has shown that matching accuracy can be improved by combining independent matchers using Neyman– Pearson rule. Here, we will also use Neyman–Pearson rule for the task.  Matching of test fingerprint with template is done in Neyman-Pearson rule. Two sets of minutiae are compared. If matching score is found, then the fingerprint is matched with template. Otherwise does not matched with the template.
  • 24. INPuT aND OuTPuT SCREENS
  • 28.
  • 29.
  • 30.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 42.
  • 44.
  • 46.
  • 50. Benefits of the project  The project can be used for security purposes.  E.g. : Attendance , voter registration, Crime Investigation, forensic fingerprint searching.
  • 51. CONCLUSION Orientation field is important for fingerprint representation. In order to utilize the orientation information in automatic fingerprint recognition systems which only stores minutiae feature. So we can reduce the usage of memory and enhancing the performance of system. We also utilize the reconstructed orientation field information into the matching stage. We can reduce the effect of wrongly detected minutiae. A fingerprint matching based on orientation field is used to combine with conventional minutiae matching for real applications.