Survey on Fingerprint Recognition System using Image Preprocessing and De-noising

Biometric authentication plays a major role in security as these are by nature unique for every human. But the security is compromised when the pattern matching system is not accurate. Authentication system like fingerprint recognition is most commonly used biometric authentication system. In this paper survey is done on fingerprint recognition techniques. And different approaches are studied in terms of accuracy and performance. As fingerprint may also contain noise; so image de-noising techniques are also studied Cross ridge frequency analysis of fingerprint images is performed by means of statistical measures and weighted mean phase is calculated. These different features along with ridge reliability or ridge centre frequency are given as inputs to a fuzzy c-means classifier..

[1]  Anders Wiehe,et al.  Attacking Fingerprint Sensors , 2004 .

[2]  Satoshi Hoshino,et al.  Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.

[3]  Christophe Champod,et al.  Risk evaluation for spoofing against a sensor supplied with liveness detection. , 2011, Forensic science international.

[4]  Hakil Kim,et al.  A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis , 2004, ICISC.

[5]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[6]  Julian Fiérrez,et al.  Evaluation of direct attacks to fingerprint verification systems , 2011, Telecommun. Syst..

[7]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[8]  Jukka Saarinen,et al.  Optimized singular point detection algorithm for fingerprint images , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[9]  Sharath Pankanti,et al.  Learning fingerprint minutiae location and type , 2003, Pattern Recognit..

[10]  Ton van der Putte,et al.  Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned , 2001, CARDIS.

[11]  Christoph Busch,et al.  BioIS study. Comparative study of biometric identification systems , 2000, Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083).

[12]  Venu Govindaraju,et al.  Security and matching of partial fingerprint recognition systems , 2004, SPIE Defense + Commercial Sensing.

[13]  Sharath Pankanti,et al.  Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..

[14]  Hakil Kim,et al.  A Study on Performance Evaluation of the Liveness Detection for Various Fingerprint Sensor Modules , 2003, KES.

[15]  Christophe Champod,et al.  Vulnerabilities of fingerprint reader to fake fingerprints attacks. , 2011, Forensic science international.

[16]  Yukie Ikedaa,et al.  Knowledge Based and Intelligent Information and Engineering Systems An Evacuation Route Planning for Safety Route Guidance System after Natural Disaster Using Multi-Objective Genetic Algorithm , 2016 .

[17]  Josef Bigün,et al.  Localization of corresponding points in fingerprints by complex filtering , 2003, Pattern Recognit. Lett..

[18]  Jie Zhou,et al.  A novel model for orientation field of fingerprints , 2003, 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2003. Proceedings..