Fingerprint Detection
Fingerprint Detection
VESCOMM-2016
4th NATIONAL CONFERENCE ON “RECENT TRENDES IN VLSI, EMBEDED SYSTEM, SIGNAL PROCESSING AND COMMUNICATION
In Association with “The Institution of Engineers (India)” and IJRPET
February 12th, 2016
1
Proceedings of
VESCOMM-2016
4th NATIONAL CONFERENCE ON “RECENT TRENDES IN VLSI, EMBEDED SYSTEM, SIGNAL PROCESSING AND COMMUNICATION
In Association with “The Institution of Engineers (India)” and IJRPET
February 12th, 2016
II. METHODOLOGY
From the above system design till now
we have carried out only a few steps of the
A. System Design: whole algorithm. They are the reading of the
The fig 1 below shows the enrollment fingerprints and the preprocessing step.
Reading of the fingerprints means we are
phase of our system.
going to take two fingerprints database images
stored in our system using the MATLAB
commands as we are going to perform our
project in MATLAB and the preprocessing step
means we are going to enhance the images of
the fingerprints.
B. Pre-processing:
Fingerprint image quality is an important
factor in performance of minutiae extraction and
matching algorithms. A good quality fingerprint
image has high contrast between ridges and valleys.
Fig 1: Enrollment phase
A poor quality fingerprint image is low in
divergence, noisy, exhausted, or smudgy, causing
In the enrollment phase, the system spurious and missing minutiae. Poor quality can be
captures two fingerprints from two different due to cuts, crinkles, or bruises on surface of
fingers, say fingerprints A and B from fingers A fingertip, excessively wet or dry skin condition,
and B respectively. We extract the minutiae uncooperative attitude of subjects, broken and
positions from fingerprint A and the orientation impure scanner devices, little quality fingers
from fingerprint B using some existing (elderly people, manual worker), and other factors.
techniques. Then, by using our proposed Image enhancement techniques are employed to
coding strategies, a combined minutiae decrease noise and enhance the definition of ridges
template is generated based on the minutiae against valleys. In order to ensure good
positions, the orientation and the reference performance of ridge and minutiae extraction
points detected from both fingerprints. Finally, algorithms in poor quality fingerprint images, an
the combined minutiae template is stored in a enhancement algorithm to improve clarity of ridge
database. structure is necessary.
The fig 2 below shows the Pre-processing is an important step for
authentication phase of our system. In the fingerprint recognition system. It enhances the
authentication phase, two query fingerprints quality and produces an image in which minutiae
are required from the same two fingers, say can be detected correctly. The pre-processing step
fingerprints A/ and B/ from fingers A and B. we are going to apply separately for both the
fingerprints. First we are going to carry out pre-
processing of fingerprint A and then we are going
to carry out the pre-processing of fingerprint B.
A fingerprint image contains regions of different
excellence. They are:
1) Well-defined region
2) Recoverable region
3) Unrecoverable region.
Well-defined regions, recoverable regions
Fig 2: Authentication phase
and unrecoverable regions may be identified
according to image contrast, alignment consistency,
As what we have done in the ridge frequency, and other local features. The
enrollment, we extract the minutiae positions principal aim of enhancement is to improve the
from fingerprint A/ and the orientation from clarity of ridge in the recoverable area in the image
fingerprint B/. Reference points are detected and to assign the unrecoverable ridges as a noisy
from both query fingerprints. This extracted area. Recoverable region is considered when ridges
information will be matched against the and valleys are corrupted by a small amount of dirt,
corresponding template stored in the database ceases, or other kind of noise. Unrecoverable
by using a two-stage fingerprint matching. The region are the regions which are impossible to
authentication will be successful if the recover them from a very corrupted and noisy
matching score is over a predefined threshold. image. The output of the pre-processing is a grey-
2
Proceedings of
VESCOMM-2016
4th NATIONAL CONFERENCE ON “RECENT TRENDES IN VLSI, EMBEDED SYSTEM, SIGNAL PROCESSING AND COMMUNICATION
In Association with “The Institution of Engineers (India)” and IJRPET
February 12th, 2016
REFERENCES
[1] Sheng Li, Student Member, IEEE, and Alex C. Kot, Fellow,
IEEE, “Fingerprint Combination for Privacy Protection,” IEEE
transactions on information forensics and security, vol. 8, no. 2,
February 2013.