0% found this document useful (0 votes)
67 views4 pages

Fingerprint Recognition by Minutiae Points For Airport Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views4 pages

Fingerprint Recognition by Minutiae Points For Airport Security

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

© 2015 IJSRSET | Volume 1 | Issue 1 | Print ISSN : 2395-1990 | Online ISSN : 2394-4099

Themed Section: Engineering and Technology

Fingerprint Recognition by Minutiae Points for Airport Security


S. Karthik1, S. Herbert Chinnadurai2, S. Lingapuri Logeswaran3, M.Veluchamy4
Dhanalakshmi College of Engineering, Kancheepuram District, Chennai, Tamilnadu, India

ABSTRACT
For identifying the individual person and authorizing the person Fingerprint recognition are used. Many matching
algorithm are used for identifying Fingerprint of an individual. In which the minutiae points are founded and marked
as the Fingerprint template for easy and efficient marking of the minutiae points. Improving the quality of Minutiae
points image processing is done. So that we can mark the minutiae points from the scanned fingerprint to the stored
template and person is identify.
Keywords: fingerprint image processing, minutiae extraction, fingerprint matching, matching score

I. INTRODUCTION

Air travel plays a vital role in day-to-day life. In which


many business class people and passengers used to
travel around the world. In which many smuggling and
forgery are done by smugglers. To avoid this fingerprint
verification technology is being used in the proposed
system to identifying the individuals AFIS (Automatic
Fingerprint Identification System) is used to identifying Figure1: Histogram equalization done for the input fingerprint
image
the individual automatically in the Airport to provide
security.
2. ROI

II. METHODS AND MATERIAL Region of Interest is the method which is used to
specifically crop the template which is of good quality
A. Template Extraction: i.e. the remaining regions other than the fingerprint core
image is omitted.
In this process the individuals Fingerprint image is
scanned and marked with minutiae points and store in to
the Database along with the passenger personal details.

B. Image Processing :
The acquiring template from the passenger being done
for Image Processing for improving the quality and easy
mapping of minutiae points.

1. Histogram Equalization

Histogram Equalization is used for improving the Figure2: (a) Fingerprint image with distorted region, (b) fingerprint image
quality of image which is Blurred, Distorted. region is taken in black region. (c) Region of interest is mapped on the
fingerprint image

IJSRSET151167 | Received: 18 Feb 2015 | Accepted: 25 Feb 2015 | January-February 2015 [(1)1: 306-309] 306
Figure 3.Region of interest is mapped on the template image
Figure 5.mapping of the template image with the fingerprint input image for
minutiae points
3. Ridge Thinning

Ridge Thinning is the one which is used for


reducing the width of the ridges so that marking the
minutiae points will be made easy.

Figure 6. Mapping of the template image with the fingerprint input image

ROTATION AND DISPLACEMENT


Figure 4. (a)The original input image. (b) The ridge thinning processed image NORMALIZATION

C. Fingerprint Verification In this method the rotation and the displacement have to
be normalized in the fingerprint image template ad also
In the Fingerprint verification process the template
for the input fingerprint image, this is done to perform
which is being stored in the Database is matched with
high –efficient fingerprint matching. To normalize the
the user’s Scanned image. The matching is done based
rotation of the image, first the set of rotation for the
on minutiae points with the help of Threshold values and
template in the database with the angle range -50 to 50
the value range is with which matching process is done.
with angle spacing 1 deg .the rotational angle of the
The match precent is greater than the threshold value
input image to that of the template can be estimated by
than the fingerprint is accepted or else the person is
the similarity between the template image to that of the
marked as unauthorized.
input image using band-limit phase only-correlation
function. The displacement can be normalized by
MATCHING ALGOITHM
obtaining the peak location of the band-limit phase only-
In the matching algorithm the Fingerprint image of the
correlation between the template image and the input
input is matches for the Minutiae points in the template
image.
image
Common region extraction:
The matching process begins with the by Hough
transformation of the Fingerprint image. And the input
This process is to extract the overlapping region of the
image is transformed to improve the matching similarity
template and the input image. The overlapping is done
score of the matching process. The matching can be
as the non-overlapping regions will become as
done with the help of mapping the input image to that of
uncorrelated .so to effectively calculate the region the
template image.
projection of the x-axis and y-axis is done for the pixel
value. Only the images with the same size are extracted
for matching step.

International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com)


307
1 Termination point
2 Bifurcation point

Figure 7. The bifurcation and the termination points on the template image

III. RESULTS AND DISCUSSION


Figure 8. Fingerprint processing for image enhancement.

MATCHING SCORE:

In a good quality Fingerprint image template there will


be around 75-85 minutiae points and when considered in
a blurred or latency Fingerprint image there will be
around 30-40 minutiae points. The matching takes place
between the stored template image and the scanned Figure 8. (a) The input image. (b) Histogram equalization done on the input
Fingerprint image for minutiae matching. The minutiae image. (c) Ridge thinning is done to the processed image. (d) Bifurcation and
termination points marked on the template.
points in template is considered as T= {m1, m2,…mn}
where m1,m2 are minutiae points on the template and in
the scanned Fingerprint image the points considered as
I={m1,mn} where m1,m2 are the minutiae points on the
input image. The matching is done for these and returns
as score S= (T, I).

MINUTIAE EXTRACTION PROCESS:

Fingerprint matching process, template image is pre-


processed so that the extraction of the minutiae points
can be done easily and efficiently. The extract extraction Figure 9. (A) The mapping of the fingerprint image is done upon the minutiae
points. (b) The template is stored as stream as binary data in the database.
of the point is done with the help of pixel values that is
“1” or “0”s. The minutiae point can be marked with the PROPOSED SYSTEM
pixel point p with the help of neighbour value PI
In the proposed system the fingerprint matching is doe
Algorithm uses cross number at point P,
with the help of the minutiae points. The minutiae
P4 P3 P2
extraction is done with the help of the skeletonizing the
fingerprint image and marking the minutiae points. The
P5 P P1 threshold value is set to check for the percentage of
matching between the two fingerprint image
P6 P7 P8
templates .the matching algorithm used in the proposed
system is to normalize the rotation and the displacement
Base on the CN value the Bifurcation and termination of and in next step the common region extraction is done
minutiae points are marked
which is used to find the image that matches with the
CN Properties

International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com)


308
input image by projecting the x and y pixel values.

Figure 12. The unauthorized user and the authorized

V. REFERENCES

[1]. Hemlata Patel#1, Mr. Vishal Sharma*2 International


Figure 10. The fingerprint process of extraction and verification done in the Journal of Engineering Trends and Technology (IJETT) -
proposed system Volume4Issue5- May 2013
[2]. Wen Wen, Zhi Qi, Zhi Li, Junhao Zhang, Yu Gong and
The proposed method uses the matching technique to Peng Cao2013 Second IAPR Asian Conference on Pattern
identify the individual during the time of verification Recognition
process. The process will be helpful in identifying the [3]. Sunny Arief SUDIRO, Michel PAINDAVOINE,Tb.
person when they board the flight the fingerprint Maulana KUSUMA,IEEE 2013
[4]. IEEE Transactions on Image Processing Volume issue
matching can be done
2013 Chen, Fanglin; Huang, Xiaolin; Zhou, Jie --
Hierarchical Minutiae Matching for Fingerprint and
Palmprint Identi
[5]. IEEE International Symposium on Wireless SystemsJan
Essbach1University of Applied Sciences Engineering and
Economics Berlin
[6]. Weiguo Sheng, Gareth Howells, Michael Fairhurst, and
Farzin Deravi IEEE TRANSACTIONS ON
INFORMATION FORENSICS AND SECURITY, VOL.
2, NO. 3, SEPTEMBER 2007
[7]. Xiping Luo, Jie Tian and Yan WuAILAB, Institute of
Automation, The Chinese Academy of Sciences IEEE
2000.
Figure 11. The false accepting rate and the false rejection rate

IV. CONCLUSION

The proposed system uses the fingerprint system to


provide the security during the verification process this
system will identify the individual at a very fast and
efficient manner .the accuracy of the system is more
when compared to other identifying process as the
minutiae points are marked using the ridge thinning
process , matching using the rotation and displacement
process

International Journal of Scientific Research in Science, Engineering and Technology (ijsrset.com)


309

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy