Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

A Survey based Accomplishment Techniques for Biometric Finger Print Matching System

Published on May 2014 by Dipti M. Jawalkar, Milindkumar V. Sarode
National Level Technical Conference X-PLORE 2014
Foundation of Computer Science USA
XPLORE2014 - Number 1
May 2014
Authors: Dipti M. Jawalkar, Milindkumar V. Sarode
b4f6d120-5521-4339-8a6c-e333073bea97

Dipti M. Jawalkar, Milindkumar V. Sarode . A Survey based Accomplishment Techniques for Biometric Finger Print Matching System. National Level Technical Conference X-PLORE 2014. XPLORE2014, 1 (May 2014), 1-5.

@article{
author = { Dipti M. Jawalkar, Milindkumar V. Sarode },
title = { A Survey based Accomplishment Techniques for Biometric Finger Print Matching System },
journal = { National Level Technical Conference X-PLORE 2014 },
issue_date = { May 2014 },
volume = { XPLORE2014 },
number = { 1 },
month = { May },
year = { 2014 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/xplore2014/number1/16163-1404/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Level Technical Conference X-PLORE 2014
%A Dipti M. Jawalkar
%A Milindkumar V. Sarode
%T A Survey based Accomplishment Techniques for Biometric Finger Print Matching System
%J National Level Technical Conference X-PLORE 2014
%@ 0975-8887
%V XPLORE2014
%N 1
%P 1-5
%D 2014
%I International Journal of Computer Applications
Abstract

Fingerprints are the biometric features most used for detection. Dormant prints are routinely recovered commencing crime scenes and are comparing with existing databases of notorious fingerprints for identifying criminals. A lot of matching algorithms with different uniqueness have been introduced in recent years. For real time systems these algorithms are usually based on minutiae features. The detection of known systems tries to find which fingerprint in a database matches the fingerprint requires the matching of its minutiae against the input fingerprint. Since the detection intricacy is many minutiae of other fingerprints. Hence, fingerprint matching is a higher than verification, detection systems usually accept key process. This paper introduced study on a novel approach like Minutia Cylinder Code (MCC) algorithm, Graphic Processing Unit (GPU) and Biometric Encryption for security purpose also for feature extraction in which the extracted features are self-determining of shift and rotation of the fingerprint and at the meantime the matching operation is performed much more easily and with higher alacrity and accuracy.

References
  1. D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. New York, NY, USA: Springer-Verlag, 2009.
  2. Biometric Systems: Privacy and Secrecy Aspects, IEEE, 17 November 2009
  3. R. Cappelli, M. Ferrara, and D. Maltoni, "Minutia cylinder-code: A new representation and matching technique for fingerprint recognition," IEEE Trans. Pattern Anal. Mach. Intell. , vol. 32, no. 12, pp. 2128–2141, Dec. 2010
  4. Pablo David Gutiérrez, Miguel Lastra, Francisco Herrera, and José Manuel Benítez "A High Performance Fingerprint Matching System for Large Databases Based on GPU", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 1, JANUARY 2014
  5. M. Friedrichs, P. Eastman, V. Vaidyanathan, M. Houston, S. Legrand, A. Beberg, et al. , "Accelerating molecular dynamic simulation on graph-ics processing units," J. Comput. Chem. , vol. 30, no. 6, pp. 864–872, 2009.
  6. M. Schatz, C. Trapnell, A. Delcher, and A. Varshney, "High-throughput sequence alignment using graphics processing units," BMC Bioinformat. , vol. 8, p. 474, Dec. 2007
  7. M. Lastra, J. M. Mantas, C. Ureña, M. J. Castro, and J. A. García-Rodríguez, "Simulation of shallow-water systems using graphics processing units," Math. Comput. Simul. , vol. 80, no. 3, pp. 598–618, Nov. 2009.
  8. Dileep Kumar, Yeonseung ryua Brief Introduction of Biometrics and Fingerprint Payment Technology http://www. sersc. org/journals/IJAST/vol4/4. pdf
  9. Anil Jain, Umut Uludag and Arun Ross Biometric Template Selection: A Case Study in Fingerprints
  10. Ross Anderson's: "Chapter 13th Biometrics of Security Engineering".
  11. H. Xu, R. Veldhuis, A. Bazen, T. Kevenaar, T. Akkermans, and B. Gokberk, "Fingerprint verification using spectral minutiae represen-tations," IEEE Trans. Inf. Forensics Security, vol. 4, no. 3, pp. 397–409, Sep. 2009
  12. (2013, Jun. 28). NVIDIA Corporation, Santa Clara, CA, USA [Online]. Available: http://www. nvidia. com/
  13. (2013, Jun. 28). Cuda [Online]. Available: http://www. nvidia. com/ object/cuda_home_new. html
  14. On biometric encryption using fingerprint and its security evaluation, IEEE Conferences, February 2009.
  15. B. Schneir , Applied Cryptography, John Wiley and Sons,Inc,NewYork,1996
Index Terms

Computer Science
Information Sciences

Keywords

Minutiae Latent Prints Alacrity Minutia Cylinder Code (mcc)