Advertisement

Criminal Background Check Program with Fingerprint

  • Narumol ChumuangEmail author
  • Mahasak Ketcham
  • Amnat Sawatnatee
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 807)

Abstract

Fingerprint recognition is one of the most widely used methods of biometrics. This method relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing by artificial dummies with embedded fingerprints. In this study, we applied the fingerprint recognition technique to check criminal background of person. Our system working with two parallel process that are fingerprint recognition and matching with personal profile in database. We also demonstrated that an evaluated the experimental with two types that are match and not match to any profile in database which can used in automatic recognition systems. The efficiency of our system is excellent.

Keywords

Fingerprint Check Background Criminal 

References

  1. 1.
    Fujun, F., Xinshe, L., Litao, W.: Design and implementation of identity authentication system based on fingerprint recognition and cryptography. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, pp. 254–257 (2016).  https://doi.org/10.1109/compcomm.2016.7924704
  2. 2.
    Soewito, B., Gaol, F.L., Simanjuntak, E., Gunawan, F.E.: Smart mobile attendance system using voice recognition and fingerprint on smartphone. In: 2016 International Seminar on Intelligent Technology and Its Applications (ISITIA), Lombok, pp. 175–180 (2016).  https://doi.org/10.1109/isitia.2016.7828654
  3. 3.
    Ali, M.M.H., Mahale, V.H., Yannawar, P., Gaikwad, A.T.: Overview of fingerprint recognition system. In: 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, pp. 1334–1338 (2016)Google Scholar
  4. 4.
    Hnoohom, N., Chumuang, N., Ketcham, M.: Thai handwritten verification system on documents for the investigation. In: 2015 11th International Conference on Signal-Image Technology and Internet-Based Systems (SITIS), Bangkok, pp. 617–622 (2015)Google Scholar
  5. 5.
    Chumuang, N., Ketcham, M.: Intelligent handwriting Thai Signature Recognition System based on artificial neuron network. In: TENCON 2014 – 2014 IEEE Region 10 Conference, Bangkok, pp. 1–6 (2014).  https://doi.org/10.1109/tencon.2014.7022415
  6. 6.
    Lin, C., Kumar, A.: Improving cross sensor interoperability for fingerprint identification. In: 2016 23rd International Conference on Pattern Recognition (ICPR), Cancun, pp. 943–948 (2016).  https://doi.org/10.1109/icpr.2016.7899757
  7. 7.
    Patil, A.P., Bhalke, D.G.: Fusion of fingerprint, palmprint and iris for person identification. In: 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), Pune, pp. 960–963 (2016).  https://doi.org/10.1109/icacdot.2016.7877730
  8. 8.
    Yani, W., Zhendong, W., Jianwu, Z., Hongli, C.: A robust damaged fingerprint identification algorithm based on deep learning. In: 2016 IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Xi’an, pp. 1048–1052 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Narumol Chumuang
    • 1
    Email author
  • Mahasak Ketcham
    • 2
  • Amnat Sawatnatee
    • 3
  1. 1.Department of Digital Media Technology, Faculty of Industrial Technology MubanChombueng Rajabhat UniversityChom BungThailand
  2. 2.Department of Information Technology Management, Faculty of Information TechnologyKing Mongkut’s University of Technology North BangkokBangkokThailand
  3. 3.Department of Multimedia Technology, Faculty of ScienceChandrakasem Rajabhat UniversityChom BungThailand

Personalised recommendations