SlideShare a Scribd company logo
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Detection and Rectification of Distorted
Fingerprints
Abstract
Elastic distortion of fingerprints is one of the major causes for false non-
match. While this problem affects all fingerprint recognition applications, it is
especially dangerous in negative recognition applications, such as watch list and
de duplication applications. In such applications, malicious users may purposely
distort their fingerprints to evade identification. In this paper, we proposed novel
algorithms to detect and rectify skin distortion based on a single fingerprint
image. Distortion detection is viewed as a two-class classification problem, for
which the registered ridge orientation map and period map of a fingerprint are
used as the feature vector and a SVM classifier is trained to perform the
classification task. Distortion rectification (or equivalently distortion field
estimation) is viewed as a regression problem, where the input is a distorted
fingerprint and the output is the distortion field. To solve this problem, a database
(called reference database) of various distorted reference fingerprints and
corresponding distortion fields is built in the offline stage, and then in the online
stage, the nearest neighbor of the input fingerprint is found in the reference
database and the corresponding distortion field is used to transform the input
fingerprint into a normal one. Promising results have been obtained on three
databases containing many distorted fingerprints, namely FVC2004 DB1,
Tsinghua Distorted Fingerprint database, and the NIST SD27 latent fingerprint
database.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The main contributions of this paper are:
1) Compiling case studies of incidents where individuals were found to
have altered their fingerprints for circumventing AFIS,
2) Investigating the impact of fingerprint alteration on the accuracy of a
commercial fingerprint matcher,
3) Classifying the alterations into three major categories and suggesting
possible countermeasures,
4) Developing a technique to automatically detect altered fingerprints
based on analyzing orientation field and minutiae distribution, and
5) Evaluating the proposed technique and the NFIQ algorithm on a large
database of altered fingerprints provided by a law enforcement agency.
Experimental results show the feasibility of the proposed approach in detecting
altered fingerprints and highlight the need to further pursue this problem.
Existing System
In Existing System, since existing fingerprint quality assessment algorithms
are designed to examine if an image contains sufficient information (say,
minutiae) for matching, they have limited capability in determining if an image is a
natural fingerprint or an altered fingerprint. Obliterated fingerprints can evade
fingerprint quality control software, depending on the area of the damage. If the
affected finger area is small, the existing fingerprint quality assessment software
may fail to detect it as an altered fingerprint.
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
Proposed System
In Proposed System was evaluated at two levels: finger level and subject
level. At the finger level, we evaluate the performance of distinguishing between
natural and altered fingerprints. At the subject level, we evaluate the performance
of distinguishing between subjects with natural fingerprints and those with altered
fingerprints.
The proposed algorithm based on the features extracted from the
orientation field and minutiae satisfy the three essential requirements for
alteration detection algorithm:
1) Fast operational time,
2) High true positive rate at low false positive rate, and
3) Ease of integration into AFIS.
Modules
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
1. DETECTION OF ALTERED FINGERPRINTS
a. Normalization
b. Orientation field estimation
c. Orientation field approximation
d. Feature extraction
2. ANALYSIS OF MINUTIAE DISTRIBUTION
Modules Description
1. DETECTION OF ALTERED FINGERPRINTS
A. NORMALIZATION
An input fingerprint image is normalized by cropping a rectangular region
of the fingerprint, which is located at the center of the fingerprint and aligned
along the longitudinal direction of the finger, using the NIST Biometric Image
Software (NBIS). This step ensures that the features extracted in the subsequent
steps are invariant with respect to translation and rotation of finger.
B. ORIENTATION FIELD ESTIMATION
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
The orientation field of the fingerprint is computed using the gradient-
based method. The initial orientation field is smoothed averaging filter, followed
by averaging the orientations in pixel blocks. A foreground mask is obtained by
measuring the dynamic range of gray values of the fingerprint image in local
blocks and morphological process for filling holes and removing isolated blocks is
performed.
C. ORIENTATION FIELD APPROXIMATION
The orientation field is approximated by a polynomial model to obtain.
D. FEATURE EXTRACTION
The error map is computed as the absolute difference between and used
to construct the feature vector.
2. ANALYSIS OF MINUTIAE DISTRIBUTION
In this module, a minutia in the fingerprint indicates ridge characteristics
such as ridge ending or ridge bifurcation. Almost all fingerprint recognition
systems use minutiae for matching. In addition to the abnormality observed in
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
orientation field, we also noted that minutiae distribution of altered fingerprints
often differs from that of natural fingerprints.
Based on the minutiae extracted from a fingerprint by the open source
minutiae extractor in NBIS, a minutiae density map is constructed by using the
Parzen window method with uniform kernel function.
SYSTEM REQUIREMENT SPECIFICATION
HARDWARE REQUIREMENTS
System : Pentium IV 2.4 GHz.
Hard Disk : 80 GB.
Monitor : 15 VGA Color.
Mouse : Logitech.
Ram : 512 MB.
SOFTWARE REQUIREMENTS
Operating system : Windows 7 Ultimate
Front End : Visual Studio 2010
Coding Language : C#.NET
Database : SQL Server 2008
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
CONCLUSIONS
False non-match rates of fingerprint matchers are very high in the case of
severely distorted fingerprints. This generates a security hole in automatic
fingerprint recognition systems which can be utilized by criminals and terrorists.
For this reason, it is necessary to develop a fingerprint distortion detection and
rectification algorithms to fill the hole. This paper described a novel distorted
fingerprint detection and rectification algorithm. For distortion detection, the
registered ridge orientation map and period map of a fingerprint are used as the
feature vector and a SVM classifier is trained to classify the input fingerprint as
distorted or normal. For distortion rectification (or equivalently distortion field
estimation), a nearest neighbor regression approach is used to predict the
distortion field from the input distorted fingerprint and then the inverse of the
distortion field is used to transform the distorted fingerprint into a normal one.
The experimental results on FVC2004 DB1, Tsinghua DF database, and NIST
SD27 database showed that the proposed algorithm can improve recognition rate
of distorted fingerprints evidently. The proposed algorithm based on the features
extracted from the orientation field and minutiae satisfies the three essential
requirements for alteration detection algorithm:
A major limitation of the current approach is efficiency. Both detection and
rectification steps can be significantly speeded up if a robust and accurate
fingerprint registration algorithm can be developed. Another limitation is that the
current approach does not support rolled fingerprints. It is difficult to collect many
rolled fingerprints with various distortion types and meanwhile obtain accurate
Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore
www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457
distortion fields for learning statistical distortion model. It is our ongoing work to
address the above limitations.

More Related Content

DOCX
Detection and rectification of distorted fingerprints
DOCX
Detection and rectification of distorted fingerprints
PDF
Detection and rectification of distorted fingerprints
DOCX
Detection and rectification of distorted fingerprints
PPTX
Detecting and Improving Distorted Fingerprints using rectification techniques.
DOCX
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
PPTX
Detection and rectification of distorted fingerprint
PDF
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detecting and Improving Distorted Fingerprints using rectification techniques.
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprints

What's hot (16)

PPTX
Correlation based Fingerprint Recognition
PPT
finger prints
PDF
Face recogition from a single sample using rlog filter and manifold analysis
PDF
Iaetsd latent fingerprint recognition and matching
PPTX
Antispoofing techniques in Facial recognition
PDF
Experimental study of minutiae based algorithm for fingerprint matching
PDF
Hand and wrist localization approach: sign language recognition
PDF
Multiple features based fingerprint identification system
PDF
Automatic Isolated word sign language recognition
PDF
Review of three categories of fingerprint recognition 2
PDF
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
PDF
Gesture Acquisition and Recognition of Sign Language
PDF
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
DOCX
Face recognition across non uniform motion blur, illumination, and pose
DOCX
DOCX
Correlation based Fingerprint Recognition
finger prints
Face recogition from a single sample using rlog filter and manifold analysis
Iaetsd latent fingerprint recognition and matching
Antispoofing techniques in Facial recognition
Experimental study of minutiae based algorithm for fingerprint matching
Hand and wrist localization approach: sign language recognition
Multiple features based fingerprint identification system
Automatic Isolated word sign language recognition
Review of three categories of fingerprint recognition 2
A Deep Neural Framework for Continuous Sign Language Recognition by Iterative...
Gesture Acquisition and Recognition of Sign Language
IRJET- Class Attendance using Face Detection and Recognition with OPENCV
Face recognition across non uniform motion blur, illumination, and pose
Ad

Viewers also liked (6)

PPTX
Fingerprint base security system
PPTX
Fingerprint Authentication for ATM
PPTX
finger print based security system
PPTX
Atm using fingerprint
PPTX
High protection ATM system with fingerprint identification technology
PPTX
Finger print ATM
Fingerprint base security system
Fingerprint Authentication for ATM
finger print based security system
Atm using fingerprint
High protection ATM system with fingerprint identification technology
Finger print ATM
Ad

Similar to Detection and rectification of distorted fingerprints (20)

PDF
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
DOCX
Detection and Rectification of Distorted Fingerprints
DOCX
Detection and rectification
PDF
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
DOCX
Detection and rectification
DOCX
IEEE Projects 2015 | Detection and rectification of distorted fingerprints
PDF
Review of three categories of fingerprint recognition 2
PDF
Review of three categories of fingerprint recognition
PDF
Transform Domain Based Iris Recognition using EMD and FFT
PDF
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
PDF
Study of Local Binary Pattern for Partial Fingerprint Identification
PDF
Detection and Rectification of Distorted Fingerprints
PDF
IRJET- Finger Vein Pattern Recognition Security
PDF
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
PDF
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
PDF
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
PDF
Latent fingerprint and vein matching using ridge feature identification
PDF
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
DOC
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
PDF
1834 1840
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
Detection and Rectification of Distorted Fingerprints
Detection and rectification
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
Detection and rectification
IEEE Projects 2015 | Detection and rectification of distorted fingerprints
Review of three categories of fingerprint recognition 2
Review of three categories of fingerprint recognition
Transform Domain Based Iris Recognition using EMD and FFT
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Study of Local Binary Pattern for Partial Fingerprint Identification
Detection and Rectification of Distorted Fingerprints
IRJET- Finger Vein Pattern Recognition Security
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
A REVIEW ON LATENT FINGERPRINT RECONSTRUCTION METHODS
Latent fingerprint and vein matching using ridge feature identification
ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION ALGORITHM BASED-ON CROSSING NUMBER ...
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
1834 1840

More from Pvrtechnologies Nellore (20)

DOCX
A High Throughput List Decoder Architecture for Polar Codes
DOCX
Performance/Power Space Exploration for Binary64 Division Units
DOCX
Hybrid LUT/Multiplexer FPGA Logic Architectures
DOCX
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
DOCX
2016 2017 ieee matlab project titles
DOCX
2016 2017 ieee vlsi project titles
DOCX
2016 2017 ieee ece embedded- project titles
DOCX
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
DOCX
6On Efficient Retiming of Fixed-Point Circuits
DOCX
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
DOCX
Quality of-protection-driven data forwarding for intermittently connected wir...
DOC
11.online library management system
DOC
06.e voting system
DOCX
New web based projects list
DOCX
Power controlled medium access control
DOCX
IEEE PROJECTS LIST
DOCX
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
DOCX
Control cloud data access privilege and anonymity with fully anonymous attrib...
DOCX
Cloud keybank privacy and owner authorization
DOCX
Circuit ciphertext policy attribute-based hybrid encryption with verifiable
A High Throughput List Decoder Architecture for Polar Codes
Performance/Power Space Exploration for Binary64 Division Units
Hybrid LUT/Multiplexer FPGA Logic Architectures
Input-Based Dynamic Reconfiguration of Approximate Arithmetic Units for Video...
2016 2017 ieee matlab project titles
2016 2017 ieee vlsi project titles
2016 2017 ieee ece embedded- project titles
A High-Speed FPGA Implementation of an RSD-Based ECC Processor
6On Efficient Retiming of Fixed-Point Circuits
Pre encoded multipliers based on non-redundant radix-4 signed-digit encoding
Quality of-protection-driven data forwarding for intermittently connected wir...
11.online library management system
06.e voting system
New web based projects list
Power controlled medium access control
IEEE PROJECTS LIST
Control cloud-data-access-privilege-and-anonymity-with-fully-anonymous-attrib...
Control cloud data access privilege and anonymity with fully anonymous attrib...
Cloud keybank privacy and owner authorization
Circuit ciphertext policy attribute-based hybrid encryption with verifiable

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
KodekX | Application Modernization Development
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KodekX | Application Modernization Development
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton

Detection and rectification of distorted fingerprints

  • 1. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Detection and Rectification of Distorted Fingerprints Abstract Elastic distortion of fingerprints is one of the major causes for false non- match. While this problem affects all fingerprint recognition applications, it is especially dangerous in negative recognition applications, such as watch list and de duplication applications. In such applications, malicious users may purposely distort their fingerprints to evade identification. In this paper, we proposed novel algorithms to detect and rectify skin distortion based on a single fingerprint image. Distortion detection is viewed as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to perform the classification task. Distortion rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field. To solve this problem, a database (called reference database) of various distorted reference fingerprints and corresponding distortion fields is built in the offline stage, and then in the online stage, the nearest neighbor of the input fingerprint is found in the reference database and the corresponding distortion field is used to transform the input fingerprint into a normal one. Promising results have been obtained on three databases containing many distorted fingerprints, namely FVC2004 DB1, Tsinghua Distorted Fingerprint database, and the NIST SD27 latent fingerprint database.
  • 2. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 The main contributions of this paper are: 1) Compiling case studies of incidents where individuals were found to have altered their fingerprints for circumventing AFIS, 2) Investigating the impact of fingerprint alteration on the accuracy of a commercial fingerprint matcher, 3) Classifying the alterations into three major categories and suggesting possible countermeasures, 4) Developing a technique to automatically detect altered fingerprints based on analyzing orientation field and minutiae distribution, and 5) Evaluating the proposed technique and the NFIQ algorithm on a large database of altered fingerprints provided by a law enforcement agency. Experimental results show the feasibility of the proposed approach in detecting altered fingerprints and highlight the need to further pursue this problem. Existing System In Existing System, since existing fingerprint quality assessment algorithms are designed to examine if an image contains sufficient information (say, minutiae) for matching, they have limited capability in determining if an image is a natural fingerprint or an altered fingerprint. Obliterated fingerprints can evade fingerprint quality control software, depending on the area of the damage. If the affected finger area is small, the existing fingerprint quality assessment software may fail to detect it as an altered fingerprint.
  • 3. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 Proposed System In Proposed System was evaluated at two levels: finger level and subject level. At the finger level, we evaluate the performance of distinguishing between natural and altered fingerprints. At the subject level, we evaluate the performance of distinguishing between subjects with natural fingerprints and those with altered fingerprints. The proposed algorithm based on the features extracted from the orientation field and minutiae satisfy the three essential requirements for alteration detection algorithm: 1) Fast operational time, 2) High true positive rate at low false positive rate, and 3) Ease of integration into AFIS. Modules
  • 4. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 1. DETECTION OF ALTERED FINGERPRINTS a. Normalization b. Orientation field estimation c. Orientation field approximation d. Feature extraction 2. ANALYSIS OF MINUTIAE DISTRIBUTION Modules Description 1. DETECTION OF ALTERED FINGERPRINTS A. NORMALIZATION An input fingerprint image is normalized by cropping a rectangular region of the fingerprint, which is located at the center of the fingerprint and aligned along the longitudinal direction of the finger, using the NIST Biometric Image Software (NBIS). This step ensures that the features extracted in the subsequent steps are invariant with respect to translation and rotation of finger. B. ORIENTATION FIELD ESTIMATION
  • 5. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 The orientation field of the fingerprint is computed using the gradient- based method. The initial orientation field is smoothed averaging filter, followed by averaging the orientations in pixel blocks. A foreground mask is obtained by measuring the dynamic range of gray values of the fingerprint image in local blocks and morphological process for filling holes and removing isolated blocks is performed. C. ORIENTATION FIELD APPROXIMATION The orientation field is approximated by a polynomial model to obtain. D. FEATURE EXTRACTION The error map is computed as the absolute difference between and used to construct the feature vector. 2. ANALYSIS OF MINUTIAE DISTRIBUTION In this module, a minutia in the fingerprint indicates ridge characteristics such as ridge ending or ridge bifurcation. Almost all fingerprint recognition systems use minutiae for matching. In addition to the abnormality observed in
  • 6. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 orientation field, we also noted that minutiae distribution of altered fingerprints often differs from that of natural fingerprints. Based on the minutiae extracted from a fingerprint by the open source minutiae extractor in NBIS, a minutiae density map is constructed by using the Parzen window method with uniform kernel function. SYSTEM REQUIREMENT SPECIFICATION HARDWARE REQUIREMENTS System : Pentium IV 2.4 GHz. Hard Disk : 80 GB. Monitor : 15 VGA Color. Mouse : Logitech. Ram : 512 MB. SOFTWARE REQUIREMENTS Operating system : Windows 7 Ultimate Front End : Visual Studio 2010 Coding Language : C#.NET Database : SQL Server 2008
  • 7. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 CONCLUSIONS False non-match rates of fingerprint matchers are very high in the case of severely distorted fingerprints. This generates a security hole in automatic fingerprint recognition systems which can be utilized by criminals and terrorists. For this reason, it is necessary to develop a fingerprint distortion detection and rectification algorithms to fill the hole. This paper described a novel distorted fingerprint detection and rectification algorithm. For distortion detection, the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to classify the input fingerprint as distorted or normal. For distortion rectification (or equivalently distortion field estimation), a nearest neighbor regression approach is used to predict the distortion field from the input distorted fingerprint and then the inverse of the distortion field is used to transform the distorted fingerprint into a normal one. The experimental results on FVC2004 DB1, Tsinghua DF database, and NIST SD27 database showed that the proposed algorithm can improve recognition rate of distorted fingerprints evidently. The proposed algorithm based on the features extracted from the orientation field and minutiae satisfies the three essential requirements for alteration detection algorithm: A major limitation of the current approach is efficiency. Both detection and rectification steps can be significantly speeded up if a robust and accurate fingerprint registration algorithm can be developed. Another limitation is that the current approach does not support rolled fingerprints. It is difficult to collect many rolled fingerprints with various distortion types and meanwhile obtain accurate
  • 8. Head office: 3nd floor, Krishna Reddy Buildings, OPP: ICICI ATM, Ramalingapuram, Nellore www.pvrtechnology.com, E-Mail: pvrieeeprojects@gmail.com, Ph: 81432 71457 distortion fields for learning statistical distortion model. It is our ongoing work to address the above limitations.