Modified Dactylogram Sifting

Abstract

Fingerprint recognition has been with success utilized by enforcement agencies to spot suspects and victims for nearly a hundred years. Recent advances in automated fingerprint identification technology, in addition the growing would like for reliable person identification, have resulted in an increased use of fingerprints in both government and civilian applications such as border control, employment background checks, and secure facility access. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his identity. Classify altered fingerprints into three classes based on the changes in ridge pattern due to alteration as obliterated, distorted and imitated. The projected algorithmic rule supported the trivialities based on the minutiae extracted satisfies the essential requirements and determine the alteration type automatically to reconstruct altered fingerprints. In order to conquer the drawbacks of existing techniques, we proposed an efficient and robust fingerprint matching technique via fuzzy based method. For some types of altered fingerprints where the ridge patterns are damaged locally or the ridge structure is still present on the finger but possibly at a different location, reconstruction is indeed possible by the proposed method. Further it is shown that authentication is retained even though fingerprint identity has altered.

Authors and Affiliations

Geethu V S , V. Selvakumar

Keywords

Related Articles

Multiple Target Tracking with the help of Mean Shift Algorithm 

The multi moving targets tracking are a typical job in the field of visual surveillance. The main difficulties in targets tracking are fast motion of the target, suddenly velocity variations, clutters, complex obje...

 A Review on Energy Efficient Modulation and Coding Techniques for Clustered Wireless Sensor Networks

A standard wireless sensor network comprises of a huge number of sensor nodes with data processing and communication capabilities. The sensor nodes pass the gathered data using radio transmitter, to a sink either...

A Survey – Performance based Routing Protocols in Wireless Ad-hoc Networks Environment 

A wireless ad hoc network is a decentralized type of network. The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastru...

Bandwidth and Energy Management in Wireless Sensor Networks  

The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous problems regarding the Quality of Service (QoS) parameter to researchers. These QoS parameters are...

Implementation of Pitch Control Of wind Turbine Using Simulink (Matlab)  

In this paper, it is shown that how the variable speed wind turbine can be used to generate a fixed value of voltage at the output with the help of a pi controller and it is done by varying the pitch angle of the b...

Download PDF file
  • EP ID EP136075
  • DOI -
  • Views 90
  • Downloads 0

How To Cite

Geethu V S, V. Selvakumar (2013). Modified Dactylogram Sifting. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1694-1698. https://europub.co.uk/articles/-A-136075