Fingerprint Enhancement using Gabor Filter Algorithm
Journal Title: Engineering and Scientific International Journal - Year 2018, Vol 5, Issue 2
Abstract
The most important thing in finger print enhancement method is the segmentation of region and the interest. Many automatic systems for finger print enhancement techniques are based on minutiae matching concepts. Minutiae matching concept pointed to the core point, ridge ending and bifurcations of the ridges that identifies the fingerprint image pattern. The proposed enhancement method is an essential pre-processing of the fingerprint enhancement applications. Enhanced finger printis a common and complex in fingerprint identification method as it gives the base for the performance of computing system. The ridge structure in a fingerprint can be viewed as an orientation patterns, having a spatial frequency and orientation. The important step in finger print image recognition is the segmentation of the region of interest. Results define the robustness of the proposed system.
Authors and Affiliations
Selvi M
Voice Based Product Label Detection for Assisting Blind People
This work presents a camera-based label reader to assist blind persons to read a product name. Camera serves as main vision in detecting the label image of the product or board then image is processed internally and sepa...
Predicting the Risk Factors of Endometrial Cancer using Data Mining
Data mining act as an imperative part for uncovering new idea in healthcare organization which is supportive for all the parties related with medical field. This paper analyses the effectiveness of Data mining technique...
Simplifying and Managing the Process of Structural Audit
With the study of current process of Structural Audit there is need to find the lacunas in the current process and modify the process for efficient implementation of Structural Audit. This research aims at finding out th...
SE-AODV-Secured and Energy Efficient Routing in Mobile Ad-hoc Network
Mobile ad hoc network (MANET) is a standalone network capable of autonomous operation where nodes communicate with each other without the need of any existing infrastructure. Mobile ad hoc networks consist of nodes that...
An Effective Implementation of HTML Injection
HTML injection is an attack that is closely related to Cross- site Scripting (XSS). The difference is not in the vulnerability, but in the type of attack that leverages the vulnerability. Hypertext Markup Langua...