Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Simple and Efficient Roadmap to Process Fingerprint Images in Frequency Domain

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 112 - Number 4
Year of Publication: 2015
Authors:
Avenash Kumar
Tahseen A. Jilani
10.5120/19655-1292

Avenash Kumar and Tahseen A Jilani. Article: A Simple and Efficient Roadmap to Process Fingerprint Images in Frequency Domain. International Journal of Computer Applications 112(4):19-25, February 2015. Full text available. BibTeX

@article{key:article,
	author = {Avenash Kumar and Tahseen A. Jilani},
	title = {Article: A Simple and Efficient Roadmap to Process Fingerprint Images in Frequency Domain},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {112},
	number = {4},
	pages = {19-25},
	month = {February},
	note = {Full text available}
}

Abstract

In the field of computer vision, image enhancement is one of the most important and critical stage, which eventually or indirectly decides the final results in the boolean form, as far as image recognition or comparison is concern, fingerprint recognition system is also the part of computer vision and considered as one of the most matured and accepted biometric system, which implies the matching of fingerprint impression with template data. The normal issue which arise in the making such systems is the noise in input fingerprint image which actually depends upon the devices i. e. used to capture fingerprint image. In this paper we demonstrate the techniques for fingerprint image enhancement in frequency domain, after getting back in spatial (time) domain, we exact the ROI from the output image of frequency domain using least square approximation method and finally we extract minutiae from fingerprint image using cross number (CN) [5] and compare with template data in post-processing stage. The demonstration has been made under the MATLAB's background and the experiments conducted on FVC 2002 fingerprint dataset of University of Bologna [1]

References

  • Fingerprint Images Dataset: FVC2002. http://bias. csr. unibo. it/fvc2002/
  • A. K. Jain, L. Hong, R. M. Bolle, "On-line fingerprint verification", IEEE Trans. on PatternAnalysis and Machine Intelligence, Vol. 19, No 4, pp. 302–313, 1997.
  • L. C. Jain, U. Halici, I. Hayashi, S. B. Lee and S. Tsutsui. Intelligent biometric techniques in fingerprint and face recognition. 1999, the CRC Press.
  • D. Maio and D. Maltoni. Direct gray-scale minutiae detection in fingerprints. IEEE Trans. Pattern Anal. And Machine Intell. , 19(1):27-40, 1997
  • Feng Zhao?, Xiaoou Tang, "Preprocessing and post-processing for skeleton-based fingerprint minutiae extraction" Department of information Engineering, The Chinese University of Hong Kong, Shatin, NT, Hong Kong.
  • D. Rutovitz, Pattern recognition, J. Roy. Stat. Soc. 129 (1966)504–530
  • S. Lin, An Introduction to Error-Correcting Codes, Prentice-Hall, 1970.
  • H. C. Lee and R. Gaenssleh. Advances in Fingerprint Technology. Elsevier, New-York, 1991.
  • D. Peralta, I. Triguero, R. Sanchez-Reillo, F. Herrera, and J. M. Benítez, Fast Fingerprint Identification for Large Databases.
  • A. Juels and M. Sudan, "A Fuzzy Vault Scheme," in Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, pp. 408, 2002.
  • ENISA Briefing: Behavioural Biometrics by Giles Hogben.
  • Davit Kocharyan, Hakob Sarukhanyan, "Feature Extraction Techniques and Minutiae Based Fingerprint Recognition Process", Institute for Informatics and Automation Problems of NAS RA Yerevan, Armenia
  • Method of least square approximation: http://nichecreator. com/Method_of_least_squares
  • K. V. Kale, Ramesh Raybhan Manza, Advance in Computer vision and information technology, EBook.