A Challenge to Analyze and Detect Altered Human Fingerprints
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 5
Abstract
The deployment of Automated Fingerprint Identification Systems (AFIS) in law enforcement and border control applications has escalated the need for ensuring that these systems are not compromised. Several problems related to fingerprint system security have been investigated carefully;, the problem of fingerprint alteration has received very scarce attention [1]. Fingerprint alteration refers to the deliberate alteration of the fingerprint pattern by a person for masking his/her identity. Several cases of fingerprint alteration have been reported previously. The main contributions of this paper is: 1) Analysis of the altered fingerprints 2) classifying the alterations into three major categories: Obliteration, distortion and imitation and suggesting possible countermeasures 3) Demonstrating by using an example of database, where based on matching score the person of interest is branded as guilty or not and then based on decrease in value of matching score[4][1] if below threshold value we can declare that the fingerprint is altered or not then combine fingerprint Image with person’s UID(Unique Identity) comparing with that fingerprint with existing fingerprints showing if there is any match in the form of percentage and display his/her details with criminal record, 4) developing the above system by a technique to automatically detect altered fingerprints based on segmentation using Morphological operations, minutia marking with special considering the triple branch counting[11], minutia unification by decomposing a branch into three terminations[11][12], and matching i
Authors and Affiliations
Chandrakanth Biradar
Evaluating Air Pollution Parameters Using Zigbee (IEEE 802.15.4)
Air pollution receives one of the prime concerns in India, primarily due to rapid economic growth, industrialization and urbanization with associated increase in energy demands. Lacks of implementation of e...
A Non-restoring Division Algorithm
Abstract: Non-restoring division method originally defined by Robertson in 1958. Restoring and non-restoring division processes are the algorithms conventionally used to program division method on microprocessors t...
An Enhanced Round Robin CPU Scheduling Algorithm
Abstract: CPU scheduling is a process which allows one process to use the CPU while the another process is in waiting state due to unavailability of any resource like I/O etc, thereby making full use of CPU. The aim of C...
Visual Representations in High School Edublogs
Abstract: Visuals speak a language of their own. In fact, they can have more impact than words. Whenprepared intuitively, they have the power to overcome regional barriers, in terms of comprehensibility of verballa...
Hybrid Algorithm combining Genetic algorithms and CSP approach to plane an Optimized path for a Mobile Robot moving under Time Window
Abstract: The problems of optimization are considered as a type of a constraint satisfaction problem: COP (Constraint Optimization problem). In this frame goes our first works which are interested in the optimi...