CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Automatic Detection of Enrolled Distorted Fingerprints

by G. Nagalakshmi, M. Babu Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 147 - Number 3
Year of Publication: 2016
Authors: G. Nagalakshmi, M. Babu Rao
10.5120/ijca2016911053

G. Nagalakshmi, M. Babu Rao . Automatic Detection of Enrolled Distorted Fingerprints. International Journal of Computer Applications. 147, 3 ( Aug 2016), 19-24. DOI=10.5120/ijca2016911053

@article{ 10.5120/ijca2016911053,
author = { G. Nagalakshmi, M. Babu Rao },
title = { Automatic Detection of Enrolled Distorted Fingerprints },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2016 },
volume = { 147 },
number = { 3 },
month = { Aug },
year = { 2016 },
issn = { 0975-8887 },
pages = { 19-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume147/number3/25634-2016911053/ },
doi = { 10.5120/ijca2016911053 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:50:55.626781+05:30
%A G. Nagalakshmi
%A M. Babu Rao
%T Automatic Detection of Enrolled Distorted Fingerprints
%J International Journal of Computer Applications
%@ 0975-8887
%V 147
%N 3
%P 19-24
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The main objective of this paper achieves advanced rolled fingerprints detection in real time application based on data given and is compared with the training data which is stored. Most of the currently available attack recognition techniques do not provide any verification efficiency to get customers who access a pc. In particular, associates are able to neglect their rights without being recognized. The primary goal of this paper is to introduce and apply a novel strategy that uses the rolled fingerprints print technique to enhance a host-based attack recognition program in-order to improve its level of verification. Among all the presently employed rolled fingerprints techniques, rolled fingerprints print identification systems have obtained the most attention due to the long history of rolled fingerprints prints and their comprehensive use in 'forensics'. In this paper we propose to develop Multiple Fusion Approach (MFA) to recognize rolled fingerprints. This paper handles the issue of selection of an maximum algorithm for rolled fingerprints print related in to design a program that matches required requirements in efficiency and precision. Our experimental results show efficient and effective rolled fingerprints detection results in real time biometric application development. These results helps in comparison of both existing and our proposed advanced rolled fingerprints detection processes..

References
  1. “Biometric Authentication for Intrusion Detection Systems”by Khalil Challita, Hikmat Farhat, Khaldoun Khaldi, proceedings in 2010 First International Conference on Integrated Intelligent Computing. .
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. S.V. Sheela and P.A Vijaya, “Iris Recognition Methods - Survey” International Journal of Computer Applications, Vol. 3, No.5. pp. 19 - 25,June 2010.
  5. M. Subra and S. Vanithaasri, “A Study on Authenticated Admittance of ATM Clients using Biometric based Cryptosystem”, International Journal of Advances in Engineering & Technology, Vol.4 Issue 2, Sep 2012.
  6. Aru, OkerekeEze, IhekweabaGozie, “Facial Verification Technology for Use In ATM Transactions”, American Journal of Engineering Research (AJER), Volume-02, Issue-05, pp-188-193, 2013.
  7. Moses OkechukwuOnyesolu, Ignatus Majesty Ezeani “ATM Security using Fingerprint Biometric Identifier: An Investigative Study”,International Journal of Advanced Computer Science and Applications,Vol. 3, No. 4, 2012.
  8. M. Lawan, “Use of Biometrics to Tackle ATM Fraud”, International Conference on Business and Economics Research vol.1, IACSIT Press, Kuala Lumpur, Malaysia, 2011.
  9. M. Prithika, P.Rajalakshmi “Credit Card Duplication and Crime Prevention Using Biometrics”, IOSR Journal of Computer Engineering (IOSR-JCE), Volume 10, Issue 1, 2013
  10. T Rajyalakshmi, K.Koteswararao, K.Anuradha “The Design and Implementation of ID Authentication System Based on Fingerprint and Iris Identification”, International Journal of Professional Engineering Studies, Volume I-Issue 2, 2013.
  11. Vijay Srinivasan, John Stankovic, Kamin Whitehouse, ”Using Height Sensors for Biometric Identification in Multi-resident Homes”, Pervasive Computing, 8th International Conference, Pervasive 2010, pp. 337-354, Helsinki, Finland, 2010.
  12. A.P.N Fahmi, “Hey Home, Open Your Door, I'm Back! Authentication System using Ear Biometrics for Smart Home, “International Journal of Smart Home, Vol. 7, No. 1, 2013.
  13. D. Polemi. Biometric techniques: Rev. and evaluation of biometric techniques for identification and authentication. ftp://ftp.cordis.lu/pub/infosec/docs/biomet.doc, 2006.
  14. W. resource. http://www.ossec.net.
  15. R. Yampolskiy. Indirect human computer interaction-based biometrics for intrusion detection systems. 41st Annual IEEE International Carnahan Conference on Security Technology, pages 138–145, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Fingerprint Distortion Host-based Intrusion Detection System (HIDS) Fingerprint Matching Biometric System Design.