0% found this document useful (0 votes)
60 views3 pages

Literature Review: 2.1 by A.K. Jain, S. Pankanti, and S. Prabhakar in 2000 Ref.

This literature review summarizes several documents related to fingerprint identification and verification. It discusses the use of orientation fields and Gabor filters to enhance fingerprint images and extract minutiae features. It also evaluates the accuracy and reliability of automatic fingerprint matching algorithms compared to human experts. Methods to identify fingerprints and validate identity are explored, along with potential weaknesses and ways to strengthen security, such as challenge-response techniques.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views3 pages

Literature Review: 2.1 by A.K. Jain, S. Pankanti, and S. Prabhakar in 2000 Ref.

This literature review summarizes several documents related to fingerprint identification and verification. It discusses the use of orientation fields and Gabor filters to enhance fingerprint images and extract minutiae features. It also evaluates the accuracy and reliability of automatic fingerprint matching algorithms compared to human experts. Methods to identify fingerprints and validate identity are explored, along with potential weaknesses and ways to strengthen security, such as challenge-response techniques.
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

2.

Literature Review
2.1 By A.K. Jain, S. Pankanti, and S. Prabhakar in 2000 ref. [1] Fingerprint identification is based on two basic premises: (i) persistence: the basis characteristics of fingerprints do not change with time; and (ii) individually; the fingerprint is unique to an individual. The validity of the first premise has been established by the anatomy and morphogenesis of friction ridge skin. While the second premise has been generally accepted to be true based on empirical results, the underlying scientific basis of fingerprint individuality has not been formally tested. As a result, fingerprint evidence is now being challenged in several court cases. The problem of fingerprint individuality by quantifying the amount of information available in minutiae points to establish a correspondence between two fingerprint images. They derived an expression which estimates the probability of falsely associating minutiae-based representations from two arbitrary fingerprints. This model ignores most of the known (weak) dependencies among the features and does not directly include features such as ridge counts, fingerprint class, ridge frequencies, permanent scars, etc. for these reasons, the proposed model does not yet compete in predicting the performance of a human fingerprint expert matcher. The individuality estimates predicted by this model is significantly closer to the performance of available automatic fingerprint matchers on realistic data samples than any other model.

2.2 Jainwei Yang, Lifeng Liu, Tianzi Jiang, Yong Fan in 2003 ref. [10] Fingerprint image enhancement is n essential preprocessing step in fingerprint recognition applications. In this paper, Yang, Jiang proposed a novel filter design method for fingerprint image enhancement, primarily inspired from the traditional Gabor filter (TGF). The previous fingerprint image enhancement methods based on TGF banks have some drawbacks in their image-dependent parameter selection strategy, which leads to artifacts in some cases. To address this issue they develop an improved version of the TGF, called the modified Gabor filter (MGF). Its parameter selection scheme is image-independent. The remarkable advantages of our MGF over the TGF consists in preserving fingerprint image structure and achieving image enhancement consistency. Experimental results indicate that the proposed MGF enhancement algorithm can reduce the FRR of a fingerprint matcher by approximately 2% a FAR of 0.01%.

In this paper, a MGF has been proposed for fingerprint image enhancement. The modification of the TGF can make the MGF more accurate in preserving the fingerprint image topography. And a new scheme of adaptive parameter selection for the MGF is discussed. This scheme leads to the imageindependent advantage in the MGF. Although there are still some intermedial parameter determided by experience, a step of be solved in the future. A common problem of the MGF and TGF is that both fail when image region are contaminated with heavy noise. In that case, the orientation field can hardly be estimated and accurate computation of ridge width and valley width is prohibitively difficult. Therefore, a step of segmenting these unrecoverable regions from the original image is necessary, which has been explored in Hongs work to some extent.

2.3 Naini K. Ratha, Shaoyun Chen and Anil K. jain 1995 ref. [12] A reliable method for extracting structural features from fingerprint image is presented. Viewing fingerprint images as a textured image an orientation flow field is computed. Rest of the stages in the algorithm use the flow field to design adaptive filters for the input image. To accurately locate ridges, a waveform projection based ridge segmentation algorithm is used. The ridge skeleton image is obtained and smoothed using morphological operators to detect to detect the features. A large number of spurious features from the detected set of minutiae is deleted by a post processing stage. The performance of the proposed algorithm has been evaluated by computing a goodness index (GI), which compares the results of automatic extraction with manually extracted ground truth. The significance of the observed GI values is determined by comparing the index for a set of fingures are observed to be reliable and accurate.

2.4 Vincenzo Conti, Sorbellow ref. [16]

Giovanni

Pilato,

Salvatore

Vitabile,

Filippo

Fingerprint verification is one of the most personal identification methods. Generally, a based fingerprint verification automatic system, takes advantage of the matching between one on-line acquired fingerprint image and the related database fingerprint image. The proposed system is mainly characterized by noise immune algorithms and by a new operator based on an extension of the Tanimoto distance. The system is able to deal with stained ink-on-paper acquired images with translation and or rotation problems, too. To validate the effectiveness of the proposed approach, the

system was tested with the entire NIST 4 database fingerprint. The achieved verification rate on the entire NIST 4 database is above 92%. In this paper a verification system for identity verification has been proposed. The system is mainly characterized by an adaptive energy threshold determination and by a new intersection operator based on an extension of the Tanimoto, experimental results, conducted on the entire fingerprint NIST 4 databse, show a verification rate above 92%. Future works are aimed to design an identification system. A fingerprint identification system must establish the identity of a person, comparing the acquired fingerprint image with a database.

2.5 Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle ref.[17] In recent years there has been exponential growth in the use of biometrics for user authentication applications because biometrics-based authentication offers several advantages over knowledges and possessionbased methods such as password /PIN-based systems. However, it is important that biometrics-based authentication systems be designed to withstand different sources of attacks on the system when employed in security-critical applications. This is even more important for unattended remote applications such as e-commerce. In this paper outline the potential security holes in a biometrics-based authentication scheme, quantify the numerical strength of the one method of fingerprint matching, then discuss how to combat some of the remaining weaknesses. The weakest link in secure system design is user authentication. Biometrics can demonstrably improve this in terms of raw strength. And, for the same level of security, biometrics are preferable to passwords on the basis of user convenience alone. However, care must still be taken to prevent break-ins and special biometric-related issues must be understood. In particular, replay attacks must be guarded against. They proposed several methods, including an intelligent sensor challenge/response method and a data hidings technique for compressed signals, to bolster this aspect of such systems.

You might also like