Abstract

Fingerprint recognition is one of the interesting and mature biometric technique for personal identification or authentication application. The objective of the work is to retrieve personal data by using the fingerprint. In this paper, the fingerprint of a person is captured via Digital Persona U.are.U 4500 fingerprint scanner. The input fingerprint is firstly enhanced using contrast stretching and two morphological operations (dilation and erosion). Next, 160x160 size of the center region of the fingerprint is cropped and extracted minutiae such as ridges and bifurcations. These minutiae are used as the features of a particular fingerprint. These features are put into the Neural Network for person recognition. Various experiments will confirm and prove the accuracy and performance of the proposed fingerprint recognition system

Highlights

  • Recognition of persons by means of biometric characteristics is an emerging phenomenon in modern society

  • It is experienced from the research that all have their different finger prints and these finger prints are permanent for whole life

  • Fingerprint biometric is used in numerous applications that include civilian and commercial applications like military, law enforcement, medicine, education, civil service, forensics, driver license registration, cellular phone access, computer log-in and so on

Read more

Summary

Introduction

Recognition of persons by means of biometric characteristics is an emerging phenomenon in modern society. It has received more and more attention during the last period due to the need for security in a wide range of applications. Among the many biometric features, the fingerprint is considered one of the most practical ones. A fingerprint is the feature pattern of one finger. Each person has his own fingerprints with the permanent uniqueness. Fingerprint (FP) has the impressions of the minute ridge (called as dermal) of the finger. FP ridges and valleys are unique and unalterable. Fingerprint biometric is used in numerous applications that include civilian and commercial applications like military, law enforcement, medicine, education, civil service, forensics, driver license registration, cellular phone access, computer log-in and so on

Objectives
Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call