In: Computers and Technology

Submitted By praphulla
Words 9735
Pages 39

Learning Fingerprint Reconstruction:
From Minutiae to Image
Kai Cao and Anil K. Jain, Fellow, IEEE

Abstract—The set of minutia points is considered to be the most distinctive feature for fingerprint representation and is widely used in fingerprint matching. It was believed that the minutiae set does not contain sufficient information to reconstruct the original fingerprint image from which minutiae were extracted. However, recent studies have shown that it is indeed possible to reconstruct fingerprint images from their minutiae representations. Reconstruction techniques demonstrate the need for securing fingerprint templates, improve the template interoperability and improve fingerprint synthesis. But, there is still a large gap between the matching performance obtained from original fingerprint images and their corresponding reconstructed fingerprint images. In this paper, the prior knowledge about fingerprint ridge structures is encoded in terms of orientation patch and continuous phase patch dictionaries to improve the fingerprint reconstruction. The orientation patch dictionary is used to reconstruct the orientation field from minutiae, while the continuous phase patch dictionary is used to reconstruct the ridge pattern. Experimental results on three public domain databases
(FVC2002 DB1 A, FVC2002 DB2 A and NIST SD4) demonstrate that the proposed reconstruction algorithm outperforms the stateof-the-art reconstruction algorithms in terms of both i) spurious and missing minutiae and ii) matching performance with respect to type-I attack (matching the reconstructed fingerprint against the same impression from which minutiae set was extracted) and type-II attack (matching the reconstructed fingerprint against a different impression of the same finger).
Index Terms—fingerprint reconstruction, orientation patch dictionary, continuous phase patch…...

Similar Documents

Fingerprint Attendance System

...Investigation into Biometric Technologies and the Development of a Fingerprint Recognition Application . . . . . . . . . . Note: Incomplete, this document is currently in draft Abstract This preliminary document covers the presentation phase of a final year BSc (Hons) computing science project aiming to investigate biometric technologies and develop a fingerprint recognition application to allow logging of student attendance at lectures. The introduction offers some background to the project and establishes the aims and objectives of the project overall. Following on from the introduction, the literature review presents a critique of research material that provides the basis for the project. This material includes a number of texts, journals and research papers as well as additional information sourced from the Web. As drawn from the literature, the subject areas covered include; history and background to modern biometrics; technological, social, organisational and environmental influences; key technologies in the market today; design issues, including security, performance and testing. In chapter 3, attention turns to requirements analysis for the development of a fingerprint recognition system. The process follows a requirements engineering approach to development by formally establishing user requirements and allowing continuous requirements assessment throughout the project life-cycle. The design approach and methodology used to model the...

Words: 11664 - Pages: 47


...Sherman Alexie ENG 150 – Critical Analysis Assignment Fingerprints Recently, I was introduced to a man named Sherman Alexie. See, what I liked about Sherman from the beginning was the dissimilarity we shared. Too often, as a society we get so caught up in the bait of commonality that we forget it’s the differences that make us individuals. His family was not like mine. The significant values that shape a young man’s life, like Sherman’s and mine, were founded on different life experiences and were respected on unfamiliar levels. I came to see he loved differently and for different reasons. He esteemed for different reasons and his perception on life was remarkable yet understated. Sherman had a way of seeing things… the realness he bestowed was astonishing, but more importantly, he was able to help me see differently too. You’re asking, “Where did you meet this Sherman Alexie?” The answer to that question is difficult to state because I feel like I’ve known him my whole life, but I doubt he’d say the same of me. The Absolutely True Story of a Part Time Indian is a novel by Sherman Alexie written for anyone willing to read it. It displays his inner deepest thoughts through the story of a young man named Junior. The great thing about being introduced to a man through his work is that he reveals himself to you through nothing but the deepest and best thoughts; and Sherman had many. Sherman Alexie was a Native American who grew up on a reservation in......

Words: 1658 - Pages: 7

Student Attendance with Fingerprint

...recording attendance, including: magnetic swipe cards, voice recognition, facial recognition, signature recognition, fingerprint recognition, and more. The most important features of the technologies were speed, reliability, security, durability, and cost. It was concluded that fingerprint recognition was the technology that best suited all of the requirements. After selecting fingerprint technology on which to base the attendance system, the design and implementation phase was ready to begin. During this phase, the group made a detailed design, and documented the design in the design report. After purchasing the equipment needed, the implementation of the design with the fingerprint scanner was started. Final Results The project will end with a prototype of a fingerprint based attendance system. The prototype will consist of the software needed to run the scanner, one fingerprint scanner, and an instruction manual. This system will be able to register students under a specific class. Also students will be able to record their attendance by giving a fingerprint at the beginning and end of the class period. A teacher will be able to port all of their attendance data into an Excel spreadsheet. The teacher will also be able to add or delete students from a class list. Recommendations for Follow-up Work Our main idea in continuing work is making the fingerprint scanner an embedded system. Having an embedded system allows easier because laptops are not needed but it......

Words: 9087 - Pages: 37


...Student Attendance System Based On Fingerprint Recognition and One-to-Many Matching A thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Technology in Computer Science and Engineering by Rishabh Mishra (Roll no. 107cs016) and Prashant Trivedi (Roll no. 107cs015) Under the guidance of : Prof. B. Majhi Department of Computer Science and Engineering National Institute of Technology Rourkela Rourkela-769 008, Orissa, India 2 . Dedicated to Our Parents and Indian Scientific Community . 3 National Institute of Technology Rourkela Certificate This is to certify that the project entitled, ‘Student Attendance System Based On Fingerprint Recognition and One-to-Many Matching’ submitted by Rishabh Mishra and Prashant Trivedi is an authentic work carried out by them under my supervision and guidance for the partial fulfillment of the requirements for the award of Bachelor of Technology Degree in Computer Science and Engineering at National Institute of Technology, Rourkela. To the best of my knowledge, the matter embodied in the project has not been submitted to any other University / Institute for the award of any Degree or Diploma. Date - 9/5/2011 Rourkela (Prof. B. Majhi) Dept. of Computer Science and Engineering 4 Abstract Our project aims at designing an student attendance system which could effectively manage attendance of students at institutes like NIT Rourkela. Attendance is marked after......

Words: 14646 - Pages: 59


...Operating System – CS 407 Spring 2014 (BE (CS)) Course contents Overview of Operating System Objectives and functions of operating system A brief overview of computer architecture Concept of process States of process; Process control block; Address space Threads and processes Concept of threads; context of a thread Symmetric Multiprocessing (SMP) Microkernel architecture of Operating system Concurrency, Mutual exclusion and Synchronization Principles of concurrency Hardware support for mutual exclusion Semaphores and monitors Synchronization through message passing Deadlock and Starvation Deadlock prevention, avoidance and detection Algorithms for deadlock prevention, avoidance and detection Memory management Requirements; Memory partitioning; paging and segmentation Virtual memory management and operating system support Processor Scheduling Types of scheduling and scheduling algorithms Multiprocessor scheduling and real-time scheduling I/O Management and Disk Scheduling Organization of I/O devices; Buffering Disk scheduling; Disk cache RAIDs File management File organization and file directories File sharing and record blocking Secondary storage management Protection and Security Computer security; Threats and attacks Viruses, Worms and Bots Authentication and access control Intrusion detection and malware defence Distributed processing and Networks Communication architecture; Client/server......

Words: 2109 - Pages: 9


...Fingerprints Fingerprints have always been a form of identification. This is probably the reason why fingerprints have supplanted most methods of identifying criminals that deny ever being arrested or even committing the crime. Identifying fingerprints has become a science and it also stands out to many other forensic sciences ( The science of fingerprints, has helped many governments around the world, presenting them with correct discovery of criminals There are millions of people on this planet and never have 2 fingerprints been found that are alike within humans and automated computer comparisons ( No 2 humans have the same finger, palm or footprint. These parts of the human body have ridges that are constantly broken up by endings or forks; these are called characteristics ( Every person has unique distributions of the characteristics that build up in womb and throughout life in general, these characteristics stay the same for a time after death too so it makes identifying a body possible People have often tried to alter their fingerprints with different methods like cutting their fingerprints, burning the skin with acid but that doesn’t work because, superficial skin damage is repaired by the body so the same ridges come back with the new skin that forms Fingerprints are formed by our skin and our skin is made out of two layers, dermis and epidermis. The epidermis is a thin layer and it is a protective......

Words: 1139 - Pages: 5


...That, I approached Jimboy Dela Torre, tried to talk with him to calm down, but instead of heeding, he faced upon me, throws punches hitting on my face and head that caused me outbalance and hammered into the concrete pavement. Still not contended, he kicked me several times until I became unconscious. Afterwhich, suspect fled off to unknown direction; That, I was rushed unconscious by my brother, Gaudencio Ganeron, who witnessed the incident to Kapalong District Hospital for medical attention, and subsequently referred to Davao Regional Hospital in Tagum City for further medical examination; That, I was confined and undergone head surgery at Davao Regional Hospital from October 4 to 15, 2012 (12 days) with the following findings/diagnosis: EPIDURAL HEMATO, LEFT TEMPOROPAREITAL SECONDARY TO MAULING and undergone procedure of CRANIECTOMY, LEFT FRONTOTEMPOROPAREITAL, EVACUTION OF HEMATOMA; BLOOD TRANSFUSION. Attached is the MEDICO-LEGAL CERTIFICATE issued by DR JOHN RODEL A ACOSTA of Davao Regional Hospital dtd October 22, 2012; That, I am executing this Affidavit to attest the truth of the foregoing facts and circumstances, and to file criminal charges against JOVANIE DELA TORRE y MANUEL, alias JIMBOY; IN TRUTH WHEREOF, I have hereunto set my hand and affixed my signature this 11TH day of April 2013 at Hall of Justice, Mankilam, Tagum City, Davao del Norte, Philippines. _____________________________ FORTUNATO P GANERON JR Affiant SUBSCRIBED AND...

Words: 275 - Pages: 2

Student Attendance System Using Fingerprint

...Title: STUDENT’S ATTENDANCE SYSTEM USING FINGERPRINT TECHNOLOGY by FARAHANUM BT MASRUNI (2004219959) FACULTY OF INFORMATION TECNOLOGY AND QUANTITATIVE SCIENCES BACHELOR OF SCIENCE (Hons) IN DATA COMMUNICATION AND NETWORKING Approved by the examining committee: ……………………………….. ( En. Syamsul Ariffin b Yahaya ) Project Supervisor ……………………………….. ( En. Farok b Azmat ) Project Examiner MARA UNIVERSITY OF TECHNOLOGY SHAH ALAM MAY 2006 CERTIFICATION OF ORIGINALITY This is to certify that I responsible for the work submitted in this project that the original work is my own except as specified in the reference and acknowledgement and that the original work contain here in have not been taken or done by unspecified sources or persons. ……………………………………….. Farahanum bt Masruni 2004219959 ii COPYRIGHT © UiTM ACKNOWLEDGEMENT Alhamdulillah, praise to Allah s.w.t, the most gracious and merciful for giving me the strength and wisdom in finishing this research. At last after a period of time, I have completed my final year project. For this golden opportunity, first and foremost, I would like to express my hearties gratitude to my supervisor, Encik Syamsul Ariffin b Yahaya, my examiner, Encik Farok b Azmat and my coordinator, Encik Adzhar b Abd Kadir for their understanding, and professional way s in assisting and giving their encouragement, guidance, comment and ideas that are useful towards in the development of my project paper. Very special thanks......

Words: 3961 - Pages: 16


...menggunakan dua kunci, satu dibagikan dan satu lagi pribadi. Kedua kunci ini berhubungan secara matematis, sehingga data yang dienkripsi oleh satu kunci dapat didekripsi oleh kunci lainnya tersebut. Pengirim mengenskripsi pesan dengan kunci publik penerima. Pada saat menerima pesan, penerima menggunakan kunci privatnya untuk mendeskripsinya. 2.5 MESIN PENDETEKSI SIDIK JARI 2.5.1 Pengertian Fingerprint Fingerprinting adalah salah satu bentuk biometrik, sebuah ilmu yang menggunakan karakteristik fisik penduduk untuk mengidentifikasi sidik jari . Pemindai biometrik adalah alat yang menggunakan data biometrik untuk mengidentifikasi individu berdasarkan pengukuran karakteristik fisiologisnya. Karakteristik fisiologis ini memberikan kemampuan untuk mengontrol dan melindungi integritas data sensitif yang tersimpan dalam sistem informasi. Biometrik merupakan suatu metode komputerisasi yang menggunakan aspek-aspek biologi terutama karakteristik unik yang dimiliki oleh manusia. ( Ada tujuh jenis mengukuran biomatriks yang pada umumnya digunakan : a. Fingerprint Verification, adalah produk dari biomatriks yang paling dikenal. Produk scanning Sidik jari adalah jenis yang paling umum. Sebagai mana yang telah diterapkan, Sidik jari menawarkan potensial keakuratan yang tinggi. Namun ada beberapa permasahan potensial yang dapat muncul, misalnya ada luka atau kotoran pada jari dan hal ini menyebabkan tidak dapat dikenalinya Sidik jari......

Words: 4946 - Pages: 20


...Elliott CRJ 202 Mr. Scott March 11, 14 Fingerprints For over a century, law enforcement agencies, forensic laboratories, and penal courts worldwide have used fingerprint impressions as reliable and conclusive evidence to identify perpetrators of criminal activity. Although fingerprint identification has been repeatedly proven as one of the most robust and definite forensic techniques, a measure of the rate at which latent fingerprints degrade over time has not been established effectively. Ideally, criminal investigators should be able not only to place any given individual at a crime scene but also be able to date the moment any latent fingerprints were deposited at the location. The present report aims to determine particular visual patterns of degradation of latent fingerprints exposed to certain monitored laboratory conditions simulating those in the field. Factors considered include temperature, relative humidity, air currents, composition of fingerprint depositions (sebaceous and eccrine), various exposures to daylight (direct, penumbra, and darkness), and type of physical substrate (glass and plastic) over a period of 6 months. The study employs a titanium dioxide-based powder as developer. Our results indicate that, contrary to common belief, certain latent fingerprints exposed to direct sunlight indoors degrade similarly to those in the dark where environmental conditions are more constant. While all sebaceous latent fingerprints on glass are still useful for......

Words: 814 - Pages: 4

Fingerprint Biometric Authentication for Enhancing Staff Attendance System

...February 2013 – Fingerprint Biometric Authentication for Enhancing Staff Attendance System Oloyede Muhtahir O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. Adedoyin Adeyinka O. Dept. of Info. and Comm. Science University of Ilorin, Ilorin. ABSTRACT Biometric technology that involves the identification and verification of individuals by analyzing the human body characteristics has been widely used in various aspect of life for different purposes, most importantly as regards this study the issue of staff attendance. Despite the numerous advantages of the biometric system and its impact to various work sectors across the globe, most biometric technology users face the issue of defining the right and accurate biometric technology system that will be cost effective in solving particular problems in specific environment. In this paper, a study was conducted using a telecommunication company in the South West region of Nigeria, in order to determine the specific biometric identifier that can be used to enhance their traditional staff attendance system which presently affects the productivity of the organization. The study was conducted using a quantitative approach by designing a questionnaire as the data collection instrument based on different biometric technologies. The survey involved 37 employees based on stratified random sampling technique. The results however show that fingerprint biometric identifier......

Words: 4926 - Pages: 20

Crj 311 Week 4 Dq 2 Fingerprint Evidence

...CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE To purchase this visit following link: Contact us at: SUPPORT@ACTIVITYMODE.COM CRJ 311 WEEK 4 DQ 2 FINGERPRINT EVIDENCE CRJ 311......

Words: 697 - Pages: 3

Introduction to Fingerprint Based Student Attendance

...becoming the foundation for highly secure identification and personal verification solutions./ Biometric applications have the potential to offer much more robust authentication/identification security than traditional systems (eg: passwords or pass codes ,PINs , tokens). The main goal of applying biometrics to user authentication is to provide security to users and detect imposters in terms of users physiological (e.g. fingerprint, face, iris, hand) or behavioural characteristics (e.g. speech, keystroke dynamics). Owing to the unique biometric characteristic that every person possesses, utilization of the same can be done in a form of identity access management. Ever since their inception, Fingerprint based biometric authentication and verification systems have gained immense popularity and acceptance. This is primarily because of the ease of operation, installation and easy acquisition of the biometric feature, which in this case is a fingerprint. Implementing fingerprint recognition system is secure to use since the uniqueness of one’s fingerprint does not change in user’s lifetime. The popularity of mobile devices is undeniable. According to the International Data Corporation (IDC), more smartphones were sold in 2012 than desktop and laptop computers combined. This rise may be due to increasing functionality and technological advances which in turn supports greater functionality. Thus, the frequency with which smartphone owners use their devices,......

Words: 281 - Pages: 2

Design and Implementation of a Bio-Metric (Fingerprint) Clocking System

...characteristics can be used for authenticating staff. This research will focus on developing a Fingerprint based Biometric Clocking System.  The fingerprint Biometrics is adopted in this research work due to the fact that it is one of the most successful applications of biometric technology. In the manual signing processes, where a sheet of paper is placed at the entrance of the office for staff to write their names and signature as a form of confirming their presence for a particular day in the office, falsification in staff attendance mostly occur. A situation whereby a staff can sign on behalf of his or her colleague as being present in the office when that is not true. This can be so difficult to prevent from happening especially for large offices where row count can take longer time. The trending concern in this modern age is regarding national security, identifying theft as well as on-line terrorism. Researcher refers to Biometric as a solution for detecting user’s identity and security challenges emanating in this modern day. Biometric identification is any automatically measurable, robust and distinctive physical characteristic or personal trait that can be used to identify an individual or verify the claimed identify of an individual. Biometric science utilizes the measurements of a person’s behavioral characteristics (keyboard strokes, mouse movement) or biological characteristics (fingerprint, iris, nose, eyes, jaw, voice pattern, etc). It is the features captured......

Words: 1919 - Pages: 8

Anatomy of Fingerprints

...Anatomy of Fingerprints The two fundamental principles of fingerprint identification are that fingerprints are permanent and unique in its nature. This states that fingerprints never change and no two fingerprints are the same (The Basics of Fingerprint Science, 2014). Fingerprints attain their unalterable shape before birth and remain the same for a lifetime unless a permanent scar appears. That is why fingerprints are accepted as a substantial proof of identity which is exclusive to their owner (Azimi, 2013). The practice of utilizing fingerprints as a mean of identification is referred as dactyloscopy, which is an indispensable aid to modern law enforcement (Hoover, 2016). The significance of fingerprint was discovered in late 19th century. Before then, people regarded fingerprints as ordinary curves without any specific importance or meaning. In Quran, Allah points to the fingertips which did not attract anyone’s attention at that time, and calls our attention to their importance in the fourth verse of surah Al-Qiyamah. The verse states “Yes, we are able to put together in perfect order the very tips of his fingers.” (Azimi, 2013) Formation of fingerprints Fingerprint is an impression made by the papillary ridges on the ends of the fingers. It afford an infallible means of personal identification, because the ridge arrangement on every finger of every human being is unique and does not alter with growth or age. It also serve to reveal an individual’s true identity......

Words: 1627 - Pages: 7