Flawless Fingerprint Matching Approach based on SVM Classifier
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
Elastic distortion of fingerprints is such of the major causes for false non-match. While this problem affects all fingerprint recognition applications, it is especially dangerous in negative recognition applications, such as watchlist and deduplication applications. In a well-known application, malicious users make out purposely distort their fingerprints to evade identification. In this paper, we proposed latter algorithms to regard and rectify skin distortion based on a single fingerprint image. Distortion detection is viewed as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is used to perform the classification task. Distortion rectification is viewed as a regression problem, to what place the input is a improper fingerprint and the product is the distortion field. To resolve this problem, a database of distinct distorted reference fingerprints and corresponding distortion fields is built in the offline stage, and earlier in the online turn, the nearest neighbor of the input fingerprint is found in the recommendation database and the corresponding distortion work is used to resolve the input fingerprint into a balanced one.
Authors and Affiliations
K. Amulya, V. Priyanka, Ch. Sudheer Kumar
slugMINIMIZING TRAFFIC CONGESTION COST IN INTER - DOMAIN TRAFFIC ENGINEERING
The propagation in the routing table sizes resulted in the optimum flows across the Internet which leads to the significant divergences in the Internet scalability and resiliency. The Internet traffic engi...
A Study on Job Involvement in the Mitsubishi Heavy Industries India Precision Tools LTD
This project title “A STUDY ON JOB INVOLVEMENT IN THE MITSUBISHI HEAVY INDUSTRIES INDIA PRECISION TOOLS LTD” is conducted to focus on how they are satisfied towards the job based on motivation. The main objective of th...
Performance Analysis of TCP Variants with Pause Time and Node Speed Variation over AODV and DSR Protocols in NS2
TCP is most widely used transport layer protocol. Most of the applications such as e-mails, file transfers use TCP due to its reliable communication. There are various mechanisms to control the congestion in the network...
slugEffective Software Testing Approach for Priority Based Testing
Testing is an important process that is performed to support quality assurance. Testing activities support quality assurance by gathering information about the nature of the software being studied. Software test cases p...
A Privacy-Preserving Personlized AdDissemination Based On Interest Aggregation and Piggybacking
Advertising on mobile devices has large potential due to the very personal and intimate nature of the devices and high targeting possibilities. we introduce a piggybacking for reduce the communication cost in privacy pr...