Call for Paper - November 2019 Edition
IJCA solicits original research papers for the November 2019 Edition. Last date of manuscript submission is October 21, 2019. Read More

Biometric Fingerprint Authentication for Security using Minutiae Matching

IJCA Proceedings on National Conference on Advances in Computing
© 2015 by IJCA Journal
NCAC 2015 - Number 6
Year of Publication: 2015
Archana C. Lomte

Archana C.lomte. Article: Biometric Fingerprint Authentication for Security using Minutiae Matching. IJCA Proceedings on National Conference on Advances in Computing NCAC 2015(6):12-15, December 2015. Full text available. BibTeX

	author = {Archana C.lomte},
	title = {Article: Biometric Fingerprint Authentication for Security using Minutiae Matching},
	journal = {IJCA Proceedings on National Conference on Advances in Computing},
	year = {2015},
	volume = {NCAC 2015},
	number = {6},
	pages = {12-15},
	month = {December},
	note = {Full text available}


This paper introducing a fingerprint algorithm to increase the detection performance against nonlinear deformation in fingerprint. Here proposed method uses ridge feature which is composed of four standard elements these are ridge count , length ,curvature direction and type. Benefit of this ridge feature is that they can represent topology information in entire ridge patterns. These patterns are existing between two minutiae but not changed by nonlinear deformation. Here we are using both ridge feature and conventional minutiae (minutiae type, orientation and position). For ridge feature extraction; one ridge based coordinate system in skletonized image is used. So using both this approach ridge feature and minutiae we are getting additional information for fingerprint matching.


  • A. K. Jain and D. Maltoni. Handbook of Fingerprint Recognition. Springer-Verlag New York, Inc. , Secaucus, NJ, USA, 2003.
  • H. C. Lee and R. E. Gaensslen. Advances in fingerprint technology. CRC Press, Boca Raton, FL, 1994.
  • S. Pankanti, S. Prabhakar, and A. K. Jain. On the individuality of fingerprints. IEEE Conference on Computer Vision and Pattern Recognition, pages 805–812, 2001.
  • D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. New York: Springer- Verlag, 2003.
  • FBI. U. s. department of justice, washington, d. c. 20402. The Science of Fingerprints, Classification
  • R. Cappelli, D. Maio, and D. Maltoni, "Modeling plastic distortion in fingerprint images," in Proc. ICAPR, 2001, pp. 369–376
  • A. M. Bazen, G. T. B. Verwaaijen, S. H. Gerez, L. P. J. Veelenturf, and B. J. v. d. Zwaag, "A correlation-based ?ngerprint veri?cation system,"in ProRISC Workshop on Circuits, Systems and Signal Processing, Veldhoven, the Netherlands, 2000, pp. 205–213.
  • A. Ross, S. C. Dass, and A. K. Jain, "Fingerprint warping using ridge curve correspondences," Pattern Analysis and Machine Intelligence,IEEE Transactions on, vol. 28, no. 1, pp. 19–30, 2006, 0162-8828
  • Allah MMA. A fast and memory efficient approach for fingerprint authentication system. IEEE Conf on Advanced Video and Signal Based Surveillance AVSS 2005, September 15-16 2005; 259- 263.
  • A. Çavuso lu, S. Görgüno lu, A fast fingerprint image enhancement ? ? algorithm using a parabolic mask, Comput. Electr. Eng. (2008) 250–256.
  • Ang, R. et al. , 2005. Cancelable key-based fingerprint templates. In: Proc. Tenth Australian Conf. on Information Security and Privacy, pp. 242–252.
  • Ballan. M, "Directional Fingerprint Processing", International Conference on Signal Processing, vol. 2,pp.
  • Bhupesh Gour, T. K. Bandopadhyaya and Sudhir Sharma, "Fingerprint Feature Extraction using Midpoint 8, Ridge Contour Method and Neural