Abstract

In this paper, a novel online fingerprint verification algorithm and distribution system is proposed. In the beginning, fingerprint acquisition, image preprocessing, and feature extraction are conducted on workstations. Then, the extracted feature is transmitted over the internet. Finally, fingerprint verification is processed on a server through web-based database query. For the fingerprint feature extraction, a template is imposed on the fingerprint image to calculate the type and direction of minutiae. A data structure of the feature set is designed in order to accurately match minutiae features between the testing fingerprint and the references in the database. An elastic structural feature matching algorithm is employed for feature verification. The proposed fingerprint matching algorithm is insensitive to fingerprint image distortion, scale, and rotation. Experimental results demonstrated that the matching algorithm is robust even on poor quality fingerprint images. Clients can remotely use ADO.NET on their workstations to verify the testing fingerprint and manipulate fingerprint feature database on the server through the internet. The proposed system performed well on benchmark fingerprint dataset.

Highlights

  • Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics

  • Fingerprint verification is processed on a server through web-based database query

  • Fingerprint verification over the internet is a new research topic as it will deal with web-based database query and fingerprint feature transmission over internet

Read more

Summary

Introduction

Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. Identification based on biometrics is preferred over traditional methods with the advantage that biometrics identification techniques obviate the need to remember a PIN/password which may be forgotten, or the need to carry the tokens like passports and driver’s licenses which may be forged, stolen, or lost. The common security method for online transaction consists of using one’s password or PIN. PIN is cumbersome and insecure as people are afraid of passwords being stolen and the transaction process being invaded by adept hackers. The biometric techniques can potentially prevent unauthorized access to or the fraudulent use of ATM, cellular phones, smart cards, desktop PCs, workstations, and computer networks. Online biometric identification is enjoying a renewed interest

Methods
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call