Various Biometrics  

Various Biometrics  

Source publication
Article
Full-text available
we are here proposing a new algorithm to make a simpler approach to Fingerprint Recognition, to reduce False Rejection due to accident and to reduce the problem due to shrinking of finger due to winter season or water, namely Revolutionary Extended Spatial Point Extraction using Circular Technique for fingerprint recognition (R.E.S.P.E.C.T).

Similar publications

Thesis
Full-text available
𝐅𝐢𝐧𝐠𝐞𝐫𝐩𝐫𝐢𝐧𝐭 𝐑𝐞𝐜𝐨𝐠𝐧𝐢𝐭𝐢𝐨𝐧 𝐮𝐬𝐢𝐧𝐠 𝐃𝐞𝐞𝐩 𝐋𝐞𝐚𝐫𝐧𝐢𝐧𝐠
Article
Full-text available
Identification technology based on biometrics is a branch of research that employs the unique individual traits of humans to authenticate identity, which is the most secure method of identification based on its exceptional high dependability and stability of human biometrics. Common biometric identifiers include fingerprints, irises, and facial sou...
Conference Paper
Full-text available
Dentre as diversas características biométricas que possibilitam a identificação de pessoas, a impressão digital é a mais utilizada. Os sistemas atuais de identificação automática de impressões digitais são baseados nos padrões das cristas e nas minúcias, classificadas como características de primeiro e segundo nível, respectivamente. No entanto, co...
Chapter
Full-text available
Current research on fingerprint recognition is discussed in the following article. Focuses on earlier investigations of fingerprint recognition systems and a brief review of fingerprint recognition’s conceptual and structural frameworks are presented in this paper The fundamentals of fingerprint recognition have been explained. A pre-processing pha...

Citations

... Pattern based method algorithm compares some features of the fingerprint like the arch, whorl, and loop between a previously stored template which is present in its dataset and a candidate fingerprint. Image based approach may be the best choice to match fingerprints, which have a very low image quality to allow a reliable and efficient Minutiae extraction [5]. ...
Article
Full-text available
No traditional election procedure present today is ideal. All of the current procedures have some major flaws to them. These flaws can lead to undemocratic election procedure, where people can manipulate the system using loopholes present in them. This tends to increase the risk of monopoly (i.e. a dominant leader keeps taking control of the post by manipulating the elections). Current traditional systems include technologies like ballot paper and EVM's. When people think about election based on ballot papers, they imagine that they are thinking of ancient technology, and in a way, this is true. Manipulations are possible by discarding many votes with even minute discrepancies and adding votes to the favored party. Although EVM's have taken great steps in improving the election procedure by making it safe, fast, efficient it still has its flaws and can be manipulated. Proposed System uses fingerprint identification to verify a voter, only then he/she will be allowed to cast a vote. There are two major algorithms for fingerprint identification, the pattern based and the minutiae based algorithm. In the pattern based algorithm, the image of the scanned fingerprint is directly compared with the stored samples of the fingerprint. This method is useful when the scanned image is not very clear and minutiae details cannot be extracted. The disadvantages of this method are that it consumes a lot of memory as the entire fingerprint is stored. The minutiae-based algorithm is the fastest and most reliable method for fingerprint identification. In the minutiae based algorithm, the minutiae details of the finger are stored and not the original image. This is useful since it requires much less memory, and is required only when there are multiple fingerprints to be stored. The minutiae-based method is precise and much more efficient than the pattern based algorithm.
Chapter
With the rapid enhancements in the technology era, high-end security systems are necessary to authenticate the correct user. Biometric-based automatic authentication facilities are in demand to solve the security issues. Among all biometrics, fingerprint authentication is the most and widely accepted approach. Though several applications with a fingerprint are supporting the authentication but yet are not attaining confidence even though combined with some personal identification number. The single fingerprint image used for authentication can be obtained with modern techniques to break the security. In this paper, a novel method is presented by considering the fusion of five fingerprint images. Each fingerprint image is preprocessed individually and to improve the security performance, all the five fingerprint minutiae points are hashed and it is applied to decide the user authentication. The hashed-based vector is stored in the database. The approach preprocessing the images separately involves feature extraction. The last fingerprint image is only obtained for the security break but with our approach, it is not possible to break the security as it needs five fingerprints. The method certainly improves the level of security.KeywordsFinger print imageAuthenticationSHA-3Security