SlideShare a Scribd company logo
Detection and Rectification of Distorted Fingerprints
ABSTRACT:
Elastic distortion of fingerprints is one of the major causes for false non-match.
While this problem affects all fingerprint recognition applications, it is especially
dangerous in negative recognition applications, such as watchlist and deduplication
applications. In such applications, malicious users may purposely distort their
fingerprints to evade identification. In this paper, we proposed novel algorithms to
detect and rectify skin distortion based on a single fingerprint image. Distortion
detection is viewed as a two-class classification problem, for which the registered
ridge orientation map and period map of a fingerprint are used as the feature vector
and a SVM classifier is trained to perform the classification task. Distortion
rectification (or equivalently distortion field estimation) is viewed as a regression
problem, where the input is a distorted fingerprint and the output is the distortion
field. To solve this problem, a database (called reference database) of various
distorted reference fingerprints and corresponding distortion fields is built in the
offline stage, and then in the online stage, the nearest neighbor of the input
fingerprint is found in the reference database and the corresponding distortion field
is used to transform the input fingerprint into a normal one. Promising results have
been obtained on three databases containing many distorted fingerprints, namely
FVC2004 DB1, Tsinghua Distorted Fingerprint database, and the NIST SD27
latent fingerprint database.
EXISTING SYSTEM:
 Fingerprint matcher is very sensitive to image quality as observed where the
matching accuracy of the same algorithm varies significantly among
different datasets due to variation in image quality. A fingerprint recognition
system can be classified as either a positive or negative system. In a positive
recognition system, such as physical access control systems, the user is
supposed to be cooperative and wishes to be identified. In a negative
recognition system, such as identifying persons in watch lists and detecting
multiple enrollment under different names, the user of interest (e.g.,
criminals) is supposed to be uncooperative and does not wish to be
identified.
 In Existing System, since existing fingerprint quality assessment algorithms
are designed to examine if an image contains sufficient information (say,
minutiae) for matching, they have limited capability in determining if an
image is a natural fingerprint or an altered fingerprint. Obliterated
fingerprints can evade fingerprint quality control software, depending on the
area of the damage. If the affected finger area is small, the existing
fingerprint quality assessment software may fail to detect it as an altered
fingerprint.
DISADVANTAGES OF EXISTING SYSTEM:
 Distortion rectification (or equivalently distortion field estimation) is viewed
as a regression problem, where the input is a distorted fingerprint and the
output is the distortion field.
 They require special force sensors or fingerprint sensors with video
capturing capability
 They cannot detect distorted fingerprint images in existing fingerprint
databases.
 They cannot detect fingerprints distorted before pressing on the sensor.
 However, allowing larger distortion in matching will inevitably result in
higher false match rate. For example, if we increased the bounding zone
around a minutia, many non-mated minutiae will have a chance to get
paired.
 In addition, allowing larger distortion in matching will also slow down the
matching speed.
PROPOSED SYSTEM:
 In Proposed System was evaluated at two levels: finger level and subject
level. At the finger level, we evaluate the performance of distinguishing
between natural and altered fingerprints. At the subject level, we evaluate
the performance of distinguishing between subjects with natural fingerprints
and those with altered fingerprints
 This paper described a novel distorted fingerprint detection and rectification
algorithm. For distortion detection, the registered ridge orientation map and
period map of a fingerprint are used as the feature vector and a SVM
classifier is trained to classify the input fingerprint as distorted or normal.
 A nearest neighbor regression approach is used to predict the distortion field
from the input distorted fingerprint and then the inverse of the distortion
field is used to transform the distorted fingerprint into a normal one.
ADVANTAGES OF PROPOSED SYSTEM:
 Fingerprint rectification algorithm consists of an offline stage and an
online stage. In the offline stage, a database of distorted reference
fingerprints is generated by transforming several normal reference
fingerprints with various distortion fields sampled from the statistical
model of distortion fields.
 The proposed distortion rectification algorithm by performs well by
performing matching experiments on various databases.
 The proposed algorithm can improve recognition rate of distorted
fingerprints evidently.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : C#.net
 Tool : Visual Studio 2010
 Database : SQL SERVER 2008
REFERENCE:
Xuanbin Si, Student Member, IEEE, Jianjiang Feng, Member, IEEE, Jie Zhou,
Senior Member, IEEE, and Yuxuan Luo, “Detection and Rectification of Distorted
Fingerprints”, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND
MACHINE INTELLIGENCE, VOL. 37, NO. 3, MARCH 2015.

More Related Content

DOCX
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DOCX
Detection and rectification of distorted fingerprints
PDF
Detection and rectification of distorted fingerprints
DOCX
Detection and rectification of distorted fingerprints
DOCX
Detection and rectification of distorted fingerprints
DOCX
Detection and rectification of distorted fingerprints
PDF
Detection and rectification of distorted fingerprints
PDF
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...

Viewers also liked (11)

PDF
A Cartography of Nectus Services
DOCX
Teoria de fallas
PDF
Muhammed ali(1)
PDF
Microondas BOSCH BFR634GS1
PPTX
Mapa conceptual cesar
PDF
DOCX
Improved privacy preserving p2 p multimedia
DOCX
Cooperative load balancing and dynamic
PPT
Flow basics2.ppt2
PDF
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
A Cartography of Nectus Services
Teoria de fallas
Muhammed ali(1)
Microondas BOSCH BFR634GS1
Mapa conceptual cesar
Improved privacy preserving p2 p multimedia
Cooperative load balancing and dynamic
Flow basics2.ppt2
Spatial Laser Induced Fluorescence Imaging (SLIFIMG) Analysis to Assess Tissu...
Ad

Similar to Detection and rectification (20)

PDF
Detection and Rectification of Distorted Fingerprints
PPTX
Detecting and Improving Distorted Fingerprints using rectification techniques.
PPTX
Detection and rectification of distorted fingerprint
DOCX
Detection and rectification
DOCX
Detection and Rectification of Distorted Fingerprints
PDF
Si fengzhou wifs12_distortion
PDF
A Challenge to Analyze and Detect Altered Human Fingerprints
PDF
novel method of identifying fingerprint using minutiae matching in biometric ...
PDF
Enhanced Thinning Based Finger Print Recognition
PDF
Enhanced Thinning Based Finger Print Recognition
DOC
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
PDF
Iaetsd latent fingerprint recognition and matching
PDF
1694 1698
PDF
1694 1698
PDF
System for Fingerprint Image Analysis
PDF
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
PDF
A new technique to fingerprint recognition based on partial window
PDF
Various Mathematical and Geometrical Models for Fingerprints: A Survey
PPTX
Presentation-1.pptx
PDF
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
Detection and Rectification of Distorted Fingerprints
Detecting and Improving Distorted Fingerprints using rectification techniques.
Detection and rectification of distorted fingerprint
Detection and rectification
Detection and Rectification of Distorted Fingerprints
Si fengzhou wifs12_distortion
A Challenge to Analyze and Detect Altered Human Fingerprints
novel method of identifying fingerprint using minutiae matching in biometric ...
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
Iaetsd latent fingerprint recognition and matching
1694 1698
1694 1698
System for Fingerprint Image Analysis
Authentication of Degraded Fingerprints Using Robust Enhancement and Matching...
A new technique to fingerprint recognition based on partial window
Various Mathematical and Geometrical Models for Fingerprints: A Survey
Presentation-1.pptx
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
Ad

More from jpstudcorner (20)

DOCX
Variable length signature for near-duplicate
DOCX
Robust representation and recognition of facial
DOCX
Revealing the trace of high quality jpeg
DOCX
Revealing the trace of high quality jpeg
DOCX
Pareto depth for multiple-query image retrieval
DOCX
Multifocus image fusion based on nsct
DOCX
Image super resolution based on
DOCX
Fractal analysis for reduced reference
DOCX
Face sketch synthesis via sparse representation based greedy search
DOCX
Face recognition across non uniform motion
DOCX
Combining left and right palmprint images for
DOCX
A probabilistic approach for color correction
DOCX
A no reference texture regularity metric
DOCX
A feature enriched completely blind image
DOCX
Sel csp a framework to facilitate
DOCX
Query aware determinization of uncertain
DOCX
Psmpa patient self controllable
DOCX
Privacy preserving and truthful detection
DOCX
Privacy policy inference of user uploaded
DOCX
Page a partition aware engine
Variable length signature for near-duplicate
Robust representation and recognition of facial
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
Pareto depth for multiple-query image retrieval
Multifocus image fusion based on nsct
Image super resolution based on
Fractal analysis for reduced reference
Face sketch synthesis via sparse representation based greedy search
Face recognition across non uniform motion
Combining left and right palmprint images for
A probabilistic approach for color correction
A no reference texture regularity metric
A feature enriched completely blind image
Sel csp a framework to facilitate
Query aware determinization of uncertain
Psmpa patient self controllable
Privacy preserving and truthful detection
Privacy policy inference of user uploaded
Page a partition aware engine

Recently uploaded (20)

PDF
Digital Logic Computer Design lecture notes
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Geodesy 1.pptx...............................................
DOCX
573137875-Attendance-Management-System-original
PPTX
additive manufacturing of ss316l using mig welding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
web development for engineering and engineering
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
OOP with Java - Java Introduction (Basics)
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Digital Logic Computer Design lecture notes
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Geodesy 1.pptx...............................................
573137875-Attendance-Management-System-original
additive manufacturing of ss316l using mig welding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
web development for engineering and engineering
CYBER-CRIMES AND SECURITY A guide to understanding
OOP with Java - Java Introduction (Basics)
R24 SURVEYING LAB MANUAL for civil enggi
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Internet of Things (IOT) - A guide to understanding
bas. eng. economics group 4 presentation 1.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx

Detection and rectification

  • 1. Detection and Rectification of Distorted Fingerprints ABSTRACT: Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition applications, it is especially dangerous in negative recognition applications, such as watchlist and deduplication applications. In such applications, malicious users may purposely distort their fingerprints to evade identification. In this paper, we proposed novel algorithms to detect and rectify skin distortion based on a single fingerprint image. Distortion detection is viewed as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to perform the classification task. Distortion rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field. To solve this problem, a database (called reference database) of various distorted reference fingerprints and corresponding distortion fields is built in the offline stage, and then in the online stage, the nearest neighbor of the input fingerprint is found in the reference database and the corresponding distortion field is used to transform the input fingerprint into a normal one. Promising results have been obtained on three databases containing many distorted fingerprints, namely
  • 2. FVC2004 DB1, Tsinghua Distorted Fingerprint database, and the NIST SD27 latent fingerprint database. EXISTING SYSTEM:  Fingerprint matcher is very sensitive to image quality as observed where the matching accuracy of the same algorithm varies significantly among different datasets due to variation in image quality. A fingerprint recognition system can be classified as either a positive or negative system. In a positive recognition system, such as physical access control systems, the user is supposed to be cooperative and wishes to be identified. In a negative recognition system, such as identifying persons in watch lists and detecting multiple enrollment under different names, the user of interest (e.g., criminals) is supposed to be uncooperative and does not wish to be identified.  In Existing System, since existing fingerprint quality assessment algorithms are designed to examine if an image contains sufficient information (say, minutiae) for matching, they have limited capability in determining if an image is a natural fingerprint or an altered fingerprint. Obliterated fingerprints can evade fingerprint quality control software, depending on the area of the damage. If the affected finger area is small, the existing
  • 3. fingerprint quality assessment software may fail to detect it as an altered fingerprint. DISADVANTAGES OF EXISTING SYSTEM:  Distortion rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field.  They require special force sensors or fingerprint sensors with video capturing capability  They cannot detect distorted fingerprint images in existing fingerprint databases.  They cannot detect fingerprints distorted before pressing on the sensor.  However, allowing larger distortion in matching will inevitably result in higher false match rate. For example, if we increased the bounding zone around a minutia, many non-mated minutiae will have a chance to get paired.  In addition, allowing larger distortion in matching will also slow down the matching speed.
  • 4. PROPOSED SYSTEM:  In Proposed System was evaluated at two levels: finger level and subject level. At the finger level, we evaluate the performance of distinguishing between natural and altered fingerprints. At the subject level, we evaluate the performance of distinguishing between subjects with natural fingerprints and those with altered fingerprints  This paper described a novel distorted fingerprint detection and rectification algorithm. For distortion detection, the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to classify the input fingerprint as distorted or normal.  A nearest neighbor regression approach is used to predict the distortion field from the input distorted fingerprint and then the inverse of the distortion field is used to transform the distorted fingerprint into a normal one. ADVANTAGES OF PROPOSED SYSTEM:  Fingerprint rectification algorithm consists of an offline stage and an online stage. In the offline stage, a database of distorted reference fingerprints is generated by transforming several normal reference
  • 5. fingerprints with various distortion fields sampled from the statistical model of distortion fields.  The proposed distortion rectification algorithm by performs well by performing matching experiments on various databases.  The proposed algorithm can improve recognition rate of distorted fingerprints evidently. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.
  • 6.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Xuanbin Si, Student Member, IEEE, Jianjiang Feng, Member, IEEE, Jie Zhou, Senior Member, IEEE, and Yuxuan Luo, “Detection and Rectification of Distorted Fingerprints”, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 37, NO. 3, MARCH 2015.