SlideShare a Scribd company logo
Detection and Rectification of Distorted Fingerprints
ABSTRACT:
Elastic distortion of fingerprints is one of the major causes for false non-match.
While this problem affects all fingerprint recognition applications, it is especially
dangerous in negative recognition applications, such as watchlist and deduplication
applications. In such applications, malicious users may purposely distort their
fingerprints to evade identification. In this paper, we proposed novel algorithms to
detect and rectify skin distortion based on a single fingerprint image. Distortion
detection is viewed as a two-class classification problem, for which the registered
ridge orientation map and period map of a fingerprint are used as the feature vector
and a SVM classifier is trained to perform the classification task. Distortion
rectification (or equivalently distortion field estimation) is viewed as a regression
problem, where the input is a distorted fingerprint and the output is the distortion
field. To solve this problem, a database (called reference database) of various
distorted reference fingerprints and corresponding distortion fields is built in the
offline stage, and then in the online stage, the nearest neighbor of the input
fingerprint is found in the reference database and the corresponding distortion field
is used to transform the input fingerprint into a normal one. Promising results have
been obtained on three databases containing many distorted fingerprints, namely
FVC2004 DB1, Tsinghua Distorted Fingerprint database, and the NIST SD27
latent fingerprint database.
EXISTING SYSTEM:
 Fingerprint matcher is very sensitive to image quality as observed where the
matching accuracy of the same algorithm varies significantly among
different datasets due to variation in image quality. A fingerprint recognition
system can be classified as either a positive or negative system. In a positive
recognition system, such as physical access control systems, the user is
supposed to be cooperative and wishes to be identified. In a negative
recognition system, such as identifying persons in watch lists and detecting
multiple enrollment under different names, the user of interest (e.g.,
criminals) is supposed to be uncooperative and does not wish to be
identified.
 In Existing System, since existing fingerprint quality assessment algorithms
are designed to examine if an image contains sufficient information (say,
minutiae) for matching, they have limited capability in determining if an
image is a natural fingerprint or an altered fingerprint. Obliterated
fingerprints can evade fingerprint quality control software, depending on the
area of the damage. If the affected finger area is small, the existing
fingerprint quality assessment software may fail to detect it as an altered
fingerprint.
DISADVANTAGES OF EXISTING SYSTEM:
 Distortion rectification (or equivalently distortion field estimation) is viewed
as a regression problem, where the input is a distorted fingerprint and the
output is the distortion field.
 They require special force sensors or fingerprint sensors with video
capturing capability
 They cannot detect distorted fingerprint images in existing fingerprint
databases.
 They cannot detect fingerprints distorted before pressing on the sensor.
 However, allowing larger distortion in matching will inevitably result in
higher false match rate. For example, if we increased the bounding zone
around a minutia, many non-mated minutiae will have a chance to get
paired.
 In addition, allowing larger distortion in matching will also slow down the
matching speed.
PROPOSED SYSTEM:
 In Proposed System was evaluated at two levels: finger level and subject
level. At the finger level, we evaluate the performance of distinguishing
between natural and altered fingerprints. At the subject level, we evaluate
the performance of distinguishing between subjects with natural fingerprints
and those with altered fingerprints
 This paper described a novel distorted fingerprint detection and rectification
algorithm. For distortion detection, the registered ridge orientation map and
period map of a fingerprint are used as the feature vector and a SVM
classifier is trained to classify the input fingerprint as distorted or normal.
 A nearest neighbor regression approach is used to predict the distortion field
from the input distorted fingerprint and then the inverse of the distortion
field is used to transform the distorted fingerprint into a normal one.
ADVANTAGES OF PROPOSED SYSTEM:
 Fingerprint rectification algorithm consists of an offline stage and an
online stage. In the offline stage, a database of distorted reference
fingerprints is generated by transforming several normal reference
fingerprints with various distortion fields sampled from the statistical
model of distortion fields.
 The proposed distortion rectification algorithm by performs well by
performing matching experiments on various databases.
 The proposed algorithm can improve recognition rate of distorted
fingerprints evidently.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : C#.net
 Tool : Visual Studio 2010
 Database : SQL SERVER 2008
REFERENCE:
Xuanbin Si, Student Member, IEEE, Jianjiang Feng, Member, IEEE, Jie Zhou,
Senior Member, IEEE, and Yuxuan Luo, “Detection and Rectification of Distorted
Fingerprints”, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND
MACHINE INTELLIGENCE, VOL. 37, NO. 3, MARCH 2015.

More Related Content

DOCX
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DOCX
Detection and rectification of distorted fingerprints
PDF
Detection and rectification of distorted fingerprints
DOCX
Detection and rectification of distorted fingerprints
DOCX
Detection and rectification of distorted fingerprints
DOCX
Detection and rectification of distorted fingerprints
PDF
Detection and rectification of distorted fingerprints
PDF
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
Palmprint Recognition using Multimodal Biometrics and Generation of One Time ...

Viewers also liked (9)

PDF
Middle income trap and roles of agriculture in avoiding MIT
PPTX
Modelo educativo univim
PDF
Apresentação Eagle Infinity
DOCX
Diana petro actividad n° 8
PPTX
Percepción del consumidor
PDF
Lloyd's List 18May09- GML's ABC job
PPTX
Infecciones crónicas en pacientes con Inmunocompromiso
PPTX
Tobago Expedition 2016
Middle income trap and roles of agriculture in avoiding MIT
Modelo educativo univim
Apresentação Eagle Infinity
Diana petro actividad n° 8
Percepción del consumidor
Lloyd's List 18May09- GML's ABC job
Infecciones crónicas en pacientes con Inmunocompromiso
Tobago Expedition 2016
Ad

Similar to IEEE Projects 2015 | Detection and rectification of distorted fingerprints (20)

DOCX
Detection and Rectification of Distorted Fingerprints
DOCX
Detection and rectification
PPTX
Detection and rectification of distorted fingerprint
PDF
Detection and Rectification of Distorted Fingerprints
PDF
Comparative study of various enhancement techniques for finger print images
PDF
Comparative study of various enhancement techniques for finger print images
PPT
finger prints
PDF
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
DOC
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
PDF
Iaetsd latent fingerprint recognition and matching
PDF
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
PDF
IRJET- Finger Vein Pattern Recognition Security
PDF
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
PDF
PDF
Latent fingerprint and vein matching using ridge feature identification
PDF
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
PPTX
Fingerprint
PPTX
Dip fingerprint
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Detection and Rectification of Distorted Fingerprints
Detection and rectification
Detection and rectification of distorted fingerprint
Detection and Rectification of Distorted Fingerprints
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
finger prints
Enhanced Latent Fingerprint Segmentation through Dictionary Based Approach
OPTIMIZED FINGERPRINT COMPRESSION WITHOUT LOSS OF DATAProposed workblessy up...
Iaetsd latent fingerprint recognition and matching
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
IRJET- Finger Vein Pattern Recognition Security
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Latent fingerprint and vein matching using ridge feature identification
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint
Dip fingerprint
International Journal of Engineering Research and Development (IJERD)
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Ad

Recently uploaded (20)

PPTX
Pharma ospi slides which help in ospi learning
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Institutional Correction lecture only . . .
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
master seminar digital applications in india
PDF
Classroom Observation Tools for Teachers
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Insiders guide to clinical Medicine.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Pharma ospi slides which help in ospi learning
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
human mycosis Human fungal infections are called human mycosis..pptx
01-Introduction-to-Information-Management.pdf
Institutional Correction lecture only . . .
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
master seminar digital applications in india
Classroom Observation Tools for Teachers
Abdominal Access Techniques with Prof. Dr. R K Mishra
Insiders guide to clinical Medicine.pdf
TR - Agricultural Crops Production NC III.pdf
Renaissance Architecture: A Journey from Faith to Humanism
102 student loan defaulters named and shamed – Is someone you know on the list?
Anesthesia in Laparoscopic Surgery in India
O5-L3 Freight Transport Ops (International) V1.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Structure & Organelles in detailed.
Microbial diseases, their pathogenesis and prophylaxis
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape

IEEE Projects 2015 | Detection and rectification of distorted fingerprints

  • 1. Detection and Rectification of Distorted Fingerprints
  • 2. ABSTRACT: Elastic distortion of fingerprints is one of the major causes for false non-match. While this problem affects all fingerprint recognition applications, it is especially dangerous in negative recognition applications, such as watchlist and deduplication applications. In such applications, malicious users may purposely distort their fingerprints to evade identification. In this paper, we proposed novel algorithms to detect and rectify skin distortion based on a single fingerprint image. Distortion detection is viewed as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to perform the classification task. Distortion rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field. To solve this problem, a database (called reference database) of various distorted reference fingerprints and corresponding distortion fields is built in the offline stage, and then in the online stage, the nearest neighbor of the input fingerprint is found in the reference database and the corresponding distortion field is used to transform the input fingerprint into a normal one. Promising results have been obtained on three databases containing many distorted fingerprints, namely FVC2004 DB1, Tsinghua Distorted Fingerprint database, and the NIST SD27 latent fingerprint database. EXISTING SYSTEM:
  • 3.  Fingerprint matcher is very sensitive to image quality as observed where the matching accuracy of the same algorithm varies significantly among different datasets due to variation in image quality. A fingerprint recognition system can be classified as either a positive or negative system. In a positive recognition system, such as physical access control systems, the user is supposed to be cooperative and wishes to be identified. In a negative recognition system, such as identifying persons in watch lists and detecting multiple enrollment under different names, the user of interest (e.g., criminals) is supposed to be uncooperative and does not wish to be identified.  In Existing System, since existing fingerprint quality assessment algorithms are designed to examine if an image contains sufficient information (say, minutiae) for matching, they have limited capability in determining if an image is a natural fingerprint or an altered fingerprint. Obliterated fingerprints can evade fingerprint quality control software, depending on the area of the damage. If the affected finger area is small, the existing fingerprint quality assessment software may fail to detect it as an altered fingerprint. DISADVANTAGES OF EXISTING SYSTEM:  Distortion rectification (or equivalently distortion field estimation) is viewed as a regression problem, where the input is a distorted fingerprint and the output is the distortion field.
  • 4.  They require special force sensors or fingerprint sensors with video capturing capability  They cannot detect distorted fingerprint images in existing fingerprint databases.  They cannot detect fingerprints distorted before pressing on the sensor.  However, allowing larger distortion in matching will inevitably result in higher false match rate. For example, if we increased the bounding zone around a minutia, many non-mated minutiae will have a chance to get paired.  In addition, allowing larger distortion in matching will also slow down the matching speed. PROPOSED SYSTEM:  In Proposed System was evaluated at two levels: finger level and subject level. At the finger level, we evaluate the performance of distinguishing between natural and altered fingerprints. At the subject level, we evaluate the performance of distinguishing between subjects with natural fingerprints and those with altered fingerprints  This paper described a novel distorted fingerprint detection and rectification algorithm. For distortion detection, the registered ridge orientation map and period map of a fingerprint are used as the feature vector and a SVM classifier is trained to classify the input fingerprint as distorted or normal.
  • 5.  A nearest neighbor regression approach is used to predict the distortion field from the input distorted fingerprint and then the inverse of the distortion field is used to transform the distorted fingerprint into a normal one. ADVANTAGES OF PROPOSED SYSTEM:  Fingerprint rectification algorithm consists of an offline stage and an online stage. In the offline stage, a database of distorted reference fingerprints is generated by transforming several normal reference fingerprints with various distortion fields sampled from the statistical model of distortion fields.  The proposed distortion rectification algorithm by performs well by performing matching experiments on various databases.  The proposed algorithm can improve recognition rate of distorted fingerprints evidently. SYSTEM ARCHITECTURE:
  • 6. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Xuanbin Si, Student Member, IEEE, Jianjiang Feng, Member, IEEE, Jie Zhou, Senior Member, IEEE, and Yuxuan Luo, “Detection and Rectification of Distorted Fingerprints”, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 37, NO. 3, MARCH 2015.