Combined Fingerprint Verification Method
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 2
Abstract
Our work explores the possibility of mixing two different fingerprints at the image level in order to generate a new fingerprint. To mix two fingerprints, each fingerprint is decomposed into two different components, viz., the continuous and spiral components. We go for combining two finger prints to increase security levels. During Registration dual fingerprint input is taken. We extract the minutiae positions from one fingerprint, the orientation from the other fingerprint, and the reference points from both fingerprints. We then combine the fingerprints to increase the level of security. Based on this extracted information and our proposed coding strategies, a combined minutiae template is generated and stored in a database. While testing the efficiency of the system it requires two query fingerprints from the same two fingers which are used in the enrollment. A dual fingerprint matching process is proposed for matching the two query fingerprints against a combined minutiae template.
Authors and Affiliations
Sri. Ganesh. D, Kaanchana. M, Vishnudharan. B
Effect of Augmented Reality in Automobile
An automobile Augmented Reality Information Scheme is presented for Augmented Reality (AR) information such as collision warning using Accelerative Condition Awareness Service(ACAS) and path guide using Lane level Guide...
slugComparative Study of Various Neural Network Models for Software Quality Estimation
Quality measurement is a challenging job now a day to measure accurate quality. There are number of models available to measure the software quality. This paper presents the application of neural network in software qua...
Study and Comparison of Face Recognition based on PCA and 2DPCA
Face recognition is an integral part of biometrics and has been an active research field of application. The face is a major focus of attention in social life playing an important role in conveying a person’s identity a...
Biometric ATM Using Constraint Based Finger-Vein Access
In the current world of technology, we humans are provided with a sophisticated lifestyle in several cases. Similarly, there exist several ways to duplicate or malfunction someone’s belonging. It is our responsibility t...
An Improved Data Transmission Protocol for VANETS Using Link State Information
Efficient data delivery in vehicular ad hoc networks (VANETs) with high mobility is a challenging issue due to dynamic topology changes and unstable wireless links. The opportunistic routing protocols can improve the re...