Abstract

Human fingerprint is unique to every person and can be used easily for identification purposes. People leave fingerprints almost everywhere and that's why using fingerprint databases for investigation is so common. Fingerprints can be used in many important and vital applications: providing vital security, and sometimes fingerprint may be distorted (deformed) because it was taken from somewhere where the place was wood plank, wall or door hand, so we need to enhance the image, in this paper we will introduce LBP enhancement for better minutiae detection and counting, and it will be showed how to construct a fingerprint identifier (features) to be used later as a key to retrieve or recognize the fingerprint.

Highlights

  • From the beginning of time to the current present day, data security systems have been a matter of interest and concern to everyone looking to protect vital and important data

  • We can see the following facts: - The process of minutiae detection was succeeded for all fingerprints. - Each row in table 5 (Isolated points, Ridge ending, Continuing point, Bifurcation, and Number of various minutiae) is a unique, so we can use each of them as a features to retrieve or recognize the fingerprint. - Local binary pattern (LBP) histogram equalized image method can be recommended as an input image for fingerprints minutiae counting and detection

  • Several fingerprints segments were selected, a matlab code was written and implemented, and table 8 shows the results of detecting the number of minutiae and the counts for the most appearing in the image minutiae: From table 8 we can see the following facts: - The process of minutiae detection was succeeded for all fingerprints. - Each row in table 5 (Isolated points, Ridge ending, Continuing point, Bifurcation, and Number of various minutiae) is a unique, so we can use each of them as a features to retrieve or recognize the fingerprint. - LBP histogram equalized image method can be recommended as an input image for fingerprints minutiae counting and detection

Read more

Summary

Introduction

From the beginning of time to the current present day, data security systems have been a matter of interest and concern to everyone looking to protect vital and important data. Gates, and watchtowers were some of the safety system used at that time and these days are still to secure our home, office, or workplace that required security from an unwanted hacker [1], [2]. These secure and safety systems have changed by the time, and they guarantee the latest technology to make this safety safer. Human fingerprint is unique to every person and can be used for identification purposes.

Open Science Journal
Fingerprint structure
Fingerprint enhancement using histogram equalization
Creating LBP histogram
Implementation and experimental results
Continuing point
Continuing Bifurcation point
Extractio n time
Ridge Continuin Bifurcatio ending g point n
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.