CFP last date
20 June 2024
Reseach Article

Altered Fingerprints: Identification and Analysis

Published on September 2015 by Reji R, Akhil Mathew Philip
International Conference on Emerging Trends in Technology and Applied Sciences
Foundation of Computer Science USA
ICETTAS2015 - Number 2
September 2015
Authors: Reji R, Akhil Mathew Philip
b3eadfcd-073c-42bc-a6c8-909eb0a916c0

Reji R, Akhil Mathew Philip . Altered Fingerprints: Identification and Analysis. International Conference on Emerging Trends in Technology and Applied Sciences. ICETTAS2015, 2 (September 2015), 10-13.

@article{
author = { Reji R, Akhil Mathew Philip },
title = { Altered Fingerprints: Identification and Analysis },
journal = { International Conference on Emerging Trends in Technology and Applied Sciences },
issue_date = { September 2015 },
volume = { ICETTAS2015 },
number = { 2 },
month = { September },
year = { 2015 },
issn = 0975-8887,
pages = { 10-13 },
numpages = 4,
url = { /proceedings/icettas2015/number2/22380-2575/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Emerging Trends in Technology and Applied Sciences
%A Reji R
%A Akhil Mathew Philip
%T Altered Fingerprints: Identification and Analysis
%J International Conference on Emerging Trends in Technology and Applied Sciences
%@ 0975-8887
%V ICETTAS2015
%N 2
%P 10-13
%D 2015
%I International Journal of Computer Applications
Abstract

Automated Fingerprint Identification Systems (AFIS) is deployed in law authorization and fringe control applications. This has elevated the requirement for guaranteeing that these frameworks are not traded off. A few issues identified with finger print analysis frameworks security have been explored. This includes the utilization of fake fingerprints for disguising personality. The issues of finger print alteration or jumbling has gotten almost no consideration. Fingerprint Obfuscation alludes to the planned change of the finger print pattern of a single person with the goal of veiling his personality. A few instances of unique finger print Obfuscation have been reported so far. Finger print image quality assessment software can't generally identify adjusted fingerprints. This paper highlights the significance of the issue by analyzing altered fingerprints and proposes an effective algorithm for them.

References
  1. Yoon, Feng, A. K. Jain, "Altered Fingerprints analysis and detection,"IEEE transaction on pattern analysis and machine intelligence 2012.
  2. J. Feng, A. K. Jain, and A. Ross, "Detecting Altered Fingerprints,"Proc. 20th Int'l Conf. Pattern Recognition, pp. 1622-1625, Aug. 2010.
  3. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, second ed. Springer-Verlag, 2009.
  4. The U. S. Department of Homeland Security, US-VISIT, http://www. dhs. gov/usvisit, 2011.
  5. The Fed. Bureau of Investigation (FBI), Integrated Automated Fingerprint Identification System(IAFIS), http://www. fbi. gov/hq/cjisd/iafis. htm, 2011.
  6. H. Cummins, "Attempts to Alter and Obliterate Finger-prints,"J. Am. Inst. Criminal Law and Criminology, vol. 25, pp. 982-991, 1935.
  7. [Surgically Altered Fingerprints, http://www. clpex. com/images/FeetMutilation/L4. JPG, 2011.
  8. K. Singh, Altered Fingerprints, http://www. interpol. int/Public/ Forensic/fingerprints/research/alteredfingerprints. pdf, 2008.
  9. M. Hall, "Criminals Go to Extremes to Hide Identities," USA Today, http://www. usatoday. com/news/nation/2007-11-06-criminal-extreme_N. htm, Nov. 2007.
  10. Criminals Cutting off Fingertips to Hide IDs,http://www. thebostonchannel. com/news/15478914/detail. html, 2008.
  11. A. Antonelli, R. Cappelli, D. Maio, and D. Maltoni, "Fake Finger Detection by Skin Distortion Analysis," IEEE Trans. Information Forensics and Security, vol. 1, no. 3, pp. 360-373, Sept. 2006
  12. K. A. Nixon and R. K. Rowe, "Multispectral Fingerprint Imaging for Spoof Detection," Proc. SPIE, Biometric Technology for Human Identification II, A. K. Jain and N. K. Ratha, eds. , pp. 214-225, 2005
  13. E. Tabassi, C. Wilson, and C. Watson, "Fingerprint Image Quality," NISTIR 7151, http://fingerprint. nist. gov/NFIS/ir_7151. pdf, Aug. 2004.
  14. C. Watson, M. Garris, E. Tabassi, C. Wilson, R. M. McCabe, S. Janet, and K. Ko, "NIST Biometric Image Software," http://www. nist. gov/itl/iad/ig/nbis. cfm, 2011.
  15. A. M. Bazen and S. H. Gerez, "Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints," IEEE Trans. Pattern Analysis and Machine Intelligence,vol. 24, no. 7, pp. 905-919, July 2002.
  16. F. Alonso-Fernandez, J. Fierrez, J. Ortega-Garcia, J. Gonzalez- Rodriguez, H. Fronthaler, K. Kollreider, and J. Bigun, "A Comparative Study of Fingerprint Image-Quality Estimation Methods," IEEE Trans. Information Forensics and Security, vol. 2,no. 4, pp. 734-743, Dec. 2007.
  17. J. Zhou and J. Gu, "A Model-Based Method for the Computation of Fingerprints' Orientation Field," IEEE Trans. Image Processing, vol. 13, no. 6, pp. 821-835, 2004.
  18. S. Huckemann, T. Hotz, and A. Munk, "Global Models for the Orientation Field of Fingerprints: An Approach Based on Quadratic Differentials," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 30, no. 9, pp. 1507-1519, Sept. 2008.
  19. Y. Wang and J. Hu, "Global Ridge Orientation Modeling for Partial Fingerprint Identification," IEEE Trans. Pattern Analysis andMachine Intelligence, vol. 33, no. 1, pp. 72-87, Jan. 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Fingerprints Obfuscation Alteration Minutia