IRJET-Rectification of The Distorted Fingerprint

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 03 Issue: 08 | Aug-2016

p-ISSN: 2395-0072

www.irjet.net

RECTIFICATION OF THE DISTORTED FINGERPRINT K. VANNILA MCA, M.Phil[1] Dr. S. T. DEEPA, MCA., M.Phil., SET, Ph.D[2].

1 Research

Scholar, Mother Teresa Women’s University, Research and Extension Centre, Saidapet, Chennai, TamilNadu, India.

2

Head, Department of Computer Science, Shri Shankarlal Sundarbai Shasun Jain College for Women T.Nagar, Chennai-17, TamilNadu, India.

---------------------------------------------------------------------***--------------------------------------------------------------------Usually, a fingerprint[1] of a person can neither be lost Abstract - Biometric fingerprint recognition system has most reliable for robust recognition in the world. The

nor be stolen. The spoofing [2] is a method used to

fingerprint is one of the most important in the biometric

unlock the data which is locked by another person by

system. Distortion in the fingerprints can cause major

mimicking the biometric trait. By detecting the amount

problems which may affect the accuracy of the fingerprint and

of illumination of white light in the finger, the

can cause false match of the fingerprint. Distortion detection

fingerprint scanner determines the persons fingerprint

can be viewed as two class classification problem, for which

is genuine or fake. Minutiae [3] is most important

the ridge orientation map and period map of a fingerprint are

feature for their stable and robust feature. Ridge

used as the feature vector and Naive Bayes classifier is used to

endings and ridge bifurcations are essential because of

perform the classification task.

the Key Words: Fingerprint, Distortion, Feature Vector, Recognistion, Biometric, Classification.

discontinuity.

A

simple

threshold

based

classification method is applied to the ridge endings gives a good accuracy. In case of altered [4] fingerprints, the ridge patterns are examined in a large

1. INTRODUCTION

number of altered fingerprints database. A threshold is

Biometric authentication includes retina, fingerprint,

applied to match the genuine fingerprint. Fingerprint

face, ear, hand and DNA, etc. Biometric identifiers

privacy [5], using gradient based method the ridge

characterize both physical and behaviours of peoples.

endings and ridge bifurcations are extracted for a

The physical characteristic identifies the shape and

fingerprint.

composition of the body like fingerprints, face, retina, DNA and ear features, etc. The behavioural

2. RELATED WORK

characteristics identify the behaviours of a person like

Due to the vital importance of recognizing distorted

typing rhythm, gait, gestures and voice.

fingerprints, researchers have proposed a number of methods which can be coarsely classified into four

Š 2016, IRJET

|

Impact Factor value: 4.45

|

ISO 9001:2008 Certified Journal

|

Page 1483


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.