Abstract
Identification and authentication technologies are increasing day by day to protect people and goods from crime and terrorism. This paper is aimed to discuss fingerprint technology in depth and analysis of fingerprint image. Verify a person with a highlight on fingerprint matching. Some fingerprint matching algorithms are analysed and compared. The outcomes of the analysis has identified some major issues or factors of fingerprinting, which are location, rotation, clipping, noise, non-linear distortion sensitiveness/ insensitiveness properties, computational cost and accuracy level of fingerprint matching algorithms. Also a new fingerprint matching algorithm proposed in this research work. The proposed algorithm has used Euclidean distance, angle difference, type as matching parameters instead of specific location parameter (like, x or y coordinates), which makes the algorithm location and rotation insensitive. The matching of local neighbourhoods at each stage makes the algorithm non-linear distortion insensitive.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hong, L., Wan, Y., Jain, A.: Fingerprint image enhancement: algorithm and performance evaluation 20(8), 777–789 (1998), http://www.cs.ru.ac.za/courses/Honours/mmcourse/security/biometrics/MSU-CPS-97-35.pdf (Accessed July 4, 2009)
Greenberg, S., Aladjem, M., Kogan, D.: Fingerprint image enhancement using filtering techniques 8(3), 227–236 (2002), http://www.cs.kent.edu/~wcheng/Presentation%201%20Image%20Enhancement/Fingerprint%20Image%20Enhancement%20using%20FilterTechniques.pdf (July 5, 2009)
Chikkerur, S., Cartwright, A.N., Govindaraju, V.: K-plet and CBFS: A Graph Based Fingerprint Representation and Matching Algorithm (2006), http://web.mit.edu/sharat/www/research/papers/kplet_long.pdf (July 21, 2009)
Kaur, M., Singh, M., Girdhar, A., Sandhu, P.S.: Fingerprint Verification System using Minutiae Extraction Technique (2008), http://www.waset.org/journals/waset/v46/v46-85.pdf (Accessed July 23, 2009)
O’Gorman, L.: Fingerprint Verification  (479), 43–64 (1999), http://www.cse.msu.edu/~cse891/Sect601/textbook/2.pdf (Accessed July 25, 2009)
Isenor, D.K., Zaky, S.G.: Fingerprint Identification using Graph Matching*  19(2), 113–122 (1986)
Khazaei, H., Mohades, A.: Fingerprint Matching and Classification using an Onion Layer algorithm of Computational Geometry 1(1) (2007), http://www.naun.org/journals/mcs/mcs-5.pdf (Accessed July 26, 2009)
Chikkerur, S., Wu, C., Govindaraju, V.A.: Systematic Approach for Feature Extraction in Fingerprint Images, vol. 3072, pp. 344–350 (2004), http://www.cubs.buffalo.edu/pdf/finger-systematic.pdf (September 15, 2009)
Corman, T.H., Leiserson, C.E., Rivest, R.L.: Introduction to Algorithms. MIT Press, Cambridge (1990)
DDS (Digital development System): Fingerprint Verification Algorithm (2006), http://www.dds.co.jp/en/fv/algorithm.html (Accessed July 21, 2009)
Federal Bureau of Investigation: Taking legible fingerprints, http://www.fbi.gov/hq/cjisd/takingfps.html (Accessed June 20, 2009)
Grannblog: Problems with fingerprints for authentication, http://blog.granneman.com/2006/05/13/problems-with-fingerprints-for-authentication/ (Accessed June 20, 2009)
Crimtrac: Fingerprint analysis – the basics (2008), http://www.crimtrac.gov.au/systems_projects/FingerprintAnalysis-TheBasics.html (Accessed June 20, 2009)
IT University Copenhagen: Morphology, http://www.itu.dk/courses/MBSB/E2005/Download/morphology.pdf (July 5, 2009)
Atalasoft DotImage 8.0: Morphology (2009), http://www.atalasoft.com/Products/dotimage/docs/Morphology.html (July 5, 2009)
University of Wales Aberystwyth: Aberystwyth Users site (2007), http://users.aber.ac.uk/sac4/cs180/index.html (Accessed June 20, 2009)
Wikipedia: Biometrics (2009), http://en.wikipedia.org/wiki/Biometrics (Accessed June 20, 2009)
Wikipedia: Transformation matrix (2009), http://en.wikipedia.org/wiki/Transformation_matrix (Accessed July 22, 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jahankhani, H., Mohid, M. (2010). Analysis of Fingerprint Image to Verify a Person. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-15717-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15716-5
Online ISBN: 978-3-642-15717-2
eBook Packages: Computer ScienceComputer Science (R0)