AN EFFECTIVE METHODOLOGY FOR MINUTIAE BASED FINGERPRINT MATCHING USING SINGULARITIES INDEXING
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 5
Abstract
Fingerprint is one of the most significant and traditional biometric trait and its uniqueness are exclusively determined by the local ridge characteristics and their relationships. However, in existing system, due to variations in impression condition, due to different stress level, ridge configuration, skin conditions, acquisition devices, noise etc, the accuracy of the system get affected. To overcome this problem, more number of different fingerprint classifiers are considered. This paper proposes a new effective methodology using minutiae matching technique along with singularities detection and indexing, based on the occurrences of singular points with reference to the core point. From the results, it shows this technique is effective and it is measured in terms of False Acceptance Rate (FAR) and False Rejection Rate (FRR).
Authors and Affiliations
M. Sivapriya, , S. Pushpa
A General Method to Solve All Two-Port Ladder Networks
Solving the two-port ladder networks to determine the parameters such as the driving point impedance, the transfer impedance and the voltage transfer ratio requires writing the given network in the form of KVI an...
Fault identification and diagnosis using greedy Back Tracking approach in large-scale network
In this paper, we discuss the problems in large scale networks failure information. For this We propose a fault identification system initiate by an application when the application identify the incidence of a failure...
Performance Evaluation of AODV under Blackhole attack in MANET using NS2 simulator
A wireless ad-hoc network is a temporary network set up by wireless mobile nodes moving arbitrary in the place that have no network infrastructure. Basically Wireless or mobile networks are evolved to replace the w...
SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY
Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providi...
A Study on Handwritten Signature Verification Approaches
People are comfortable with pen and papers for authentication and authorization in legal transactions. Due to increasing the amount of handwritten signatures it is very essential that a person offline hand written signat...