Fingerprint based person identification & verification for commercial applications

This paper presents the development of a simple automated fingerprint identification & verification system. The technique conferred in this paper is based on the extraction of feature vectors from the 2D FFT of the binarized image of a fingerprint using a wedge-ring extraction process. The technique used can accommodate a small degree of shift and rotation (within 15") in the placement of a fingerprint. The mechanism detailed in this paper also possesses a good recognition speed and therefore it can be used in conjunction with a fingerprint scanner for on-line fingerprint recognition. Simulation results obtained indicate low false acceptance (1%) and false rejection (5.5%) ratios. The proposed method is found to be reliable for systems with a small to medium sized set of fingerprint data.

[1]  Shu-Hung Leung,et al.  Fingerprint recognition using neural network , 1991, Neural Networks for Signal Processing Proceedings of the 1991 IEEE Workshop.

[2]  Laurene V. Fausett,et al.  Fundamentals Of Neural Networks , 1994 .

[3]  Anil K. Jain,et al.  Automated Fingerprint Identification and Imaging Systems , 2001 .

[4]  Anil K. Jain,et al.  Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[5]  A. J. Willis,et al.  A cost-effective fingerprint recognition system for use with low-quality prints and damaged fingertips , 2001, Pattern Recognit..

[6]  Jukka Saarinen,et al.  Optimized singular point detection algorithm for fingerprint images , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[7]  Laurene V. Fausett,et al.  Fundamentals Of Neural Networks , 1993 .

[8]  Ashim K. Datta Automated Fingerprint Identification and Imaging Systems , 2001 .

[9]  D. M. Weber,et al.  A cost effective fingerprint verification algorithm for commercial applications , 1992, Proceedings of the 1992 South African Symposium on Communications and Signal Processing.

[10]  Norman Poh,et al.  Variance Reduction Techniques in Biometric Authentication , 2003 .