Modified Dactylogram Sifting

Abstract

Fingerprint recognition has been with success utilized by enforcement agencies to spot suspects and victims for nearly a hundred years. Recent advances in automated fingerprint identification technology, in addition the growing would like for reliable person identification, have resulted in an increased use of fingerprints in both government and civilian applications such as border control, employment background checks, and secure facility access. Fingerprint obfuscation refers to the deliberate alteration of the fingerprint pattern by an individual for the purpose of masking his identity. Classify altered fingerprints into three classes based on the changes in ridge pattern due to alteration as obliterated, distorted and imitated. The projected algorithmic rule supported the trivialities based on the minutiae extracted satisfies the essential requirements and determine the alteration type automatically to reconstruct altered fingerprints. In order to conquer the drawbacks of existing techniques, we proposed an efficient and robust fingerprint matching technique via fuzzy based method. For some types of altered fingerprints where the ridge patterns are damaged locally or the ridge structure is still present on the finger but possibly at a different location, reconstruction is indeed possible by the proposed method. Further it is shown that authentication is retained even though fingerprint identity has altered.

Authors and Affiliations

Geethu V S , V. Selvakumar

Keywords

Related Articles

Improved Shortest Remaining Burst Round Robin (ISRBRR) Using RMS as its time quantum 

Round Robin (RR) performs optimally in timeshared systems because each process is given an equal amount of static time quantum. But the effectiveness of RR algorithm solely depends upon the choice of time quantum....

Advanced Technique of Digital Watermarking based on SVD-DWT-DCT and Arnold Transform 

With the growing popularity of internet and digital media, we propose a method of non-blind transform domain watermarking which is based on the Direction Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and...

Frequent Itemset Mining Technique in Data Mining  

In computer science and data mining, Apriori is a classic algorithm for learning association rules. Apriori is designed to operate on databases containing transactions (for example, collections of items bought by c...

IMPLEMENTATION OF MOBILE TARGET DETECTION IN WIRELESS SENSOR NETWORKS 

Through wireless sensor networks, the surveillance applications are considered where has to choose one path between a set of candidate sites where to place sensors in order to identify mobile targets traversing a p...

Download PDF file
  • EP ID EP136075
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Geethu V S, V. Selvakumar (2013). Modified Dactylogram Sifting. International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(5), 1694-1698. https://europub.co.uk/articles/-A-136075