LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Jahankhani, Hossein (2010)
Languages: English
Types: Unknown
Subjects:

Classified by OpenAIRE into

ACM Ref: Data_MISCELLANEOUS
Identification and authentication technologies are increasing day by day to protect people and goods from crime and terrorism. This paper is aimed to discuss fingerprint technology in depth and analysis of fingerprint image. Verify a person with a highlight on fingerprint matching. Some fingerprint matching algorithms are analysed and compared. The outcomes of the analysis has identified some major issues or factors of fingerprinting, which are location, rotation, clipping, noise, non-linear distortion sensitiveness/ insensitiveness properties, computational cost and accuracy level of fingerprint matching algorithms. Also a new fingerprint matching algorithm proposed in this research work. The proposed algorithm has used Euclidean distance, angle difference, type as matching parameters instead of specific location parameter (like, x or y coordinates), which makes the algorithm location and rotation insensitive. The matching of local neighbourhoods at each stage makes the algorithm non-linear distortion insensitive.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Hong, L., Wan, Y., Jain, A., Fingerprint image enhancement: algorithm and performance evaluation. [Internet]. 20(8), pp. 777-789. Available from: http://www.cs.ru.ac.za/courses/Honours/mmcourse/security/biometrics/MSU-CPS-97-35.pdf [Accessed 4 July 2009] ,(1998)
    • [2] Greenberg, S., Aladjem, M., Kogan, D., (2002) Fingerprint image enhancement using filtering techniques, 8(3), pp. 227-236. [Internet]. Available from: http://www.cs.kent.edu/~wcheng/Presentation%201%20(Image%20Enhancement)/Fingerprint% 20Image%20Enhancement%20using%20FilterTechniques.pdf [ 5 July 2009]
    • [3] Chikkerur, S., Cartwright, A.N., Govindaraju, V., (2006).K-plet and CBFS: A Graph Based Fingerprint Representation and Matching Algorithm. [Internet]. Available from: [ 21 July 2009]
    • [4] Kaur, M., Singh, M., Girdhar, A., Sandhu, P.S. (2008). Fingerprint Verification System using Minutiae Extraction Technique. [Internet]., Available from: http://www.waset.org/journals/waset/v46/v46-85.pdf [Accessed 23 July 2009]
    • [5] O'Gorman, L. Fingerprint Verification. (1999). [Internet]. (479), pp. 43-64. Available from: http://www.cse.msu.edu/~cse891/Sect601/textbook/2.pdf [Accessed 25 July 2009]
    • [6] Isenor, D.K., Zaky, S.G., (1986). Fingerprint Identification using Graph Matching*, 19(2), pp. 113 122.
    • [7] Khazaei, H., Mohades, A., (2007). Fingerprint Matching and Classification using an Onion Layer algorithm of Computational Geometry, [Internet]. 1(1). Available from: http://www.naun.org/journals/mcs/mcs-5.pdf [Accessed 26 July 2009]
    • [8] Chikkerur, S., Wu, C., Govindaraju, V.A (2004). Systematic Approach for Feature Extraction in Fingerprint Images. [Internet]. 3072, pp. 344-350. Available from: [15 September 2009]
    • [9] Corman, T. H., Leiserson, C. E., Rivest, R. L., (1990), Introduction to Algorithms, Cambridge, MA, U.S.A, MIT Press.
    • [10] DDS (Digital development System). (2006). Fingerprint Verification Algorithm. [Internet]. Available from: http://www.dds.co.jp/en/fv/algorithm.html [Accessed 21 July 2009]
    • [11] Federal Bureau of Investigation. Taking legible fingerprints. [Internet] Available from: http://www.fbi.gov/hq/cjisd/takingfps.html [Accessed 20 June 2009].
    • [12] Grannblog. Problems with fingerprints for authentication. [Internet] Available from: http://blog.granneman.com/2006/05/13/problems-with-fingerprints-for-authentication/ [Accessed 20 June 2009].
    • [13] Crimtrac. (2008). Fingerprint analysis - the basics. [Internet] Available from: [Accessed 20 June 2009].
    • [14] IT University Copenhagen. Morphology. [Internet]. Available from: http://www.itu.dk/courses/MBSB/E2005/Download/morphology.pdf [5 July 2009]
    • [15] Atalasoft DotImage 8.0, (2009). Morphology. [Internet]. Available from: [ 5 July 2009]
    • [16] University of Wales Aberystwyth. (2007). Aberystwyth Users site. Available from: http://users.aber.ac.uk/sac4/cs180/index.html [Accessed 20 June 2009]
    • [17] Wikipedia. (2009). Biometrics. [Internet] Available from: [Accessed 20 June 2009].
    • [18] Wikipedia, (2009). Transformation matrix. [Internet]. Available from: http://en.wikipedia.org/wiki/Transformation_matrix [Accessed 22 July 2009]
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article