0% found this document useful (0 votes)
77 views22 pages

Altered Fingerprints

The document proposes a system to detect altered fingerprints. The existing fingerprint quality assessment algorithms have limited ability to detect altered fingerprints. The proposed system evaluates fingerprints at the finger and subject level. It extracts features from the orientation field and minutiae to distinguish natural and altered fingerprints. The algorithm satisfies requirements of fast operation, high detection rates, and easy integration into fingerprint identification systems. It identifies corrupted areas and removes spurious minutiae to improve verification performance.

Uploaded by

VPLAN INFOTECH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views22 pages

Altered Fingerprints

The document proposes a system to detect altered fingerprints. The existing fingerprint quality assessment algorithms have limited ability to detect altered fingerprints. The proposed system evaluates fingerprints at the finger and subject level. It extracts features from the orientation field and minutiae to distinguish natural and altered fingerprints. The algorithm satisfies requirements of fast operation, high detection rates, and easy integration into fingerprint identification systems. It identifies corrupted areas and removes spurious minutiae to improve verification performance.

Uploaded by

VPLAN INFOTECH
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Altered Fingerprints: Analysis and

Detection

NAME:
ENROLL NO.:
INTRODUCTION
 Fingerprints have been in use for biometric recognition since long
because of their high acceptability, immutability and individuality.
Immutability refers to the persistence of the fingerprints over time
whereas individuality is related to the uniqueness of ridge details
across individuals.
 These features make the use of fingerprints extremely effective in
areas where the provision of a high degree of security is an issue.

 It should be insensitive to image contrast


 It should detect smudged or noisy regions
 Segmentation results should be independent of whether the input
image is an enhanced image or a raw image
Hardware Specification
 
• RAM : 4GB

• Hard Disk : 1TB HARD DISK


 
Software Specification
• Language : JAVA

• Technologies : Jsp

• Database : SQL SERVER 2008

• Operating System : Windows 7


EXISTING SYSTEM
 In Existing System, since existing fingerprint quality assessment
algorithms are designed to examine if an image contains sufficient
information (say, minutiae) for matching, they have limited
capability in determining if an image is a natural fingerprint or an
altered fingerprint.

 Obliterated fingerprints can evade fingerprint quality control


software, depending on the area of the damage.

 If the affected finger area is small, the existing fingerprint quality


assessment software may fail to detect it as an altered fingerprint.
PROPOSED SYSTEM
 In Proposed System was evaluated at two levels: finger level and
subject level.
 At the finger level, we evaluate the performance of distinguishing
between natural and altered fingerprints.
 The proposed algorithm based on the features extracted from the
orientation field and minutiae satisfy the three essential
requirements for alteration detection algorithm:

 1) Fast operational time,


 2) High true positive rate at low false positive rate, and
 3) Ease of integration into AFIS.
Modules

 Fingerprint database

 Fingerprint features database

 Enrollment Module

 Authentication module
SYSTEM ARCHITECTURE

Segmentation Enhancement

Fingerprint

Identification
Fingerprint Minutia
Matching Extraction
DATA FLOW DIAGRAM

Fingerprint Pre- Fingerprint Authentication


image processing extraction

Database
Level 0:
User id

Fingerprint Fingerprint Enrollment Authentication


images Features
database

Fingerprint
database
Level 1

Fingerprint Fingerprint
images database DB

Fingerprint
Features
Level 2
Level 2

User fingerprint

Level 1 User fingerprint


Fingerprint Segmentation
Fingerprint Extraction
feature DB

Finger print
Database
Level 3

User
fingerprint

Minutiae Matching
Enrollment Segmentation
Extraction

Fingerprint
database
Module Description
1. Fingerprint database:

 Fingerprint database stored the user fingerprint images in the


database system. In this fingerprint database system used to feature
database system.

2. Fingerprint features database:

 Feature database system retrieves the fingerprint images from the


database and to create the user id for Enrollment module.
3. Enrollment Module:
 
• The main objectives of Enrollment module is to admit the user
his/her ID and Fingerprints into the Fingerprint database after the
process of Feature extraction.
 
4. Authentication Module:
 
• Authentication module is used to determine or verify the identity
of the fingerprint image or subject, formulating the process of
authentication.
• The component of the AFIS (Automatic Fingerprint Identification
Systems) used for authentication is referred to as the
authentication module.
SAMPLE SCREEN
Admin Login

The above screen is the login page for admin; here you will give authorized input for username
and password after clicking login button
User registration
Registration
TABLE DESIGN

Registration
CONCLUSION AND FUTURE SCOPE

 The main benefit of this algorithm is its fast running speed.


 It improves the verification performance too.
 The algorithm identifies the unrecoverable corrupted areas in the
fingerprint and removes them from further processing.
 This is an important aspect of the algorithm as the presence of these
areas would prove to be extremely harmful for the extraction of
minutiae points.
 It helps in removing the spurious minutiae too which may also
prove to be harmful in matching fingerprints correctly.
REFERENCE
 [1] Lin Hong, Yifei Wan and Anil Jain. Fingerprint Image
Enhancement:Algorithm and Performance Evaluation. East Lansing,
Michigan.

 [2] Fingerprint Minutiae Extraction, Department of Computer


Science National Tsing Hua University Hsinchu, Taiwan 30043.

 [3] Handbook of Fingerprint Recognition by David Maltoni


(Editor), Dario Maio, Anil K. Jain, Salil Prabhakar.

 [4] L. Hong, A. Jain, S. Pankanti and R. Bolle, Fingerprint


Enhancement, Pattern Recognition, 202-207, 1996.
THANK YOU

You might also like