THE STUDY AND OPTIMIZATION OF FINGERPRINT VERIFICATION USING SIFT APPROACH ON PORES AND RIDGES OF FINGERPRINTS
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 9
Abstract
Today’s modernization and advancement in the area of information and telecommunications technologies that comprises for a fully automated computerized process through which human efforts were decreases and working of information exchange takes place, however, systems where the authenticity is require related to the access an account of user can improve identification process by utilizing biometric recognition which provides more security. Fingerprint based personal identification is becoming more and more popular in day uses of life. An accurate real time automatic fingerprint identification system designing is of great importance in many circumstances, and because this circumstances many scholars put their interest on this. The aim is to propose a approach using pores and ridges feature to extract and match it conveniently to increase or optimize the verification quality in term genuine acceptance rate. Image normalization is done using Gaussian blurring and sliding window contrast adjustment. Pores are extracted and estimated. Using these estimated pores, matching is done from template database to stored database using SIFT algorithm
Authors and Affiliations
N Kumar, A Singh
An effective Golden Section Search Approach based Distribution Load Flow
Abstract—This paper presents an effective Golden Section Search approach based Distribution Load Flow (DLF) for planning of distributed generators as PQ and/or PV node. The practical distribution system may have diffe...
Device Driver Fault Simulation Using KEDR
t- The failure resilience of a system is very important for availability and reliability. The systems like servers or systems where reliability and availability is highly demanding data loss is unacceptable during...
A Customized Ontological-Based Web Information Collection Model
It is known that Ontologies can be used to describe and formalize knowledge to represent user profiles in personalized web information collection. Though, there are many models adopted to represent user profiles ei...
Distributional canonical sine transform by Using Gelfand-shilov technique
In this paper discussed the results on the topological structure of some of the S-type spaces of distributional canonical sine transform
A Novel Watermarking Technique Based on Visual Cryptography
Digital Watermark processing technology has developed very rapidly during the recent years and widely applied to protect the copyright of digital image. In today’s scenario protection of digital data is utmost ne...