Fingerprint Recognition by Minutiae Matching Method for Evaluating Accuracy
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 5
Abstract
Today, Fingerprint recognitions are used for person identification and verification. In fingerprint recognition, matching methods and algorithms are most important for research area. Matching methods based on the different types of patterns are important for matching and algorithms based on the minutiae points are important for finding and calculating the matching points into the fingerprint of any person. But there are some drawbacks that affect the accuracy of fingerprint matching like, insensitivity to change the direction of fingerprint, size, difference between the two fingerprints, features of fingerprints and poor quality fingerprint image. To remove these drawbacks, we use a method that describes the different patterns of fingerprint (Arch, Whorl, and Loop) using different orientation and algorithm that improves the extraction of minutiae points based on ridges, dots and splitting ridges. It matches and compares the whole fingerprint and verifies the original fingerprint, and after that it identifies the person. This method give the result in form of FMR and FNMR and shows the 0.00 for FNMR and 0.023 for FMR which is better than theFingerprint Recognition using Minutia Score Matching system
Authors and Affiliations
Hemlata Patel#1 , Mr. Vishal Sharma
Real-Time Traffic Analysis and Routing System (RTARS) Using Wireless Computer Networks
The continuously increasing traffic and congestion on the roadways, have become one of the major concerns of today. Being stuck in traffic or start-stop driving associated with traffic congestion, is one of the maj...
Concept of Green Concrete Using Construction Demolished Waste As Recycled Coarse Aggregate
The use of Recycle product is increasing with innovation in present scenario. The utilization of waste product in the manufacturing of new product is a challenging job. The Natural Resource decreases in a...
A Review on Classical and Modern Encryption Techniques
Over the centuries, an elaborate set of protocols and mechanisms has been created to deal with information security issues when the information is conveyed by physical documents. Often the objectives of information secur...
Constant Power Control Of 15 DFIG Wind Turbines With Superconducting Magnetic Energy Storage System
With the increasing penetration of wind power into electric power grids, energy storage devices will be required to dynamically match the intermittency of wind energy. This paper proposes a novel two-layer consta...
A Survey on Mobile Data Gathering in Wireless Sensor Networks - Bounded Relay
Most of the wireless sensor networks consist of static sensors, which can be deployed in a wide environment for monitoring applications. While transmitting the data from source to static sink, the amount of energy consum...