Fingerprint Recognition
|
|
- Phillip Moody
- 7 years ago
- Views:
Transcription
1 IIT Kanpur Fingerprint Recognition CS676: Image Processing and Computer Vision Written By- Vinay Gupta Y6534, & Rohit Singh Y6400
2 Fingerprint recognition Introduction Fingerprint recognition or fingerprint authentication refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. Because of their uniqueness and consistency over time, fingerprints have been used for over a century, more recently becoming automated (i.e. a biometric) due to advancement in computing capabilities. Fingerprint identification is popular because of the inherent ease in acquisition, the numerous sources (ten fingers) available for collection, and their established use and collections by law enforcement and immigration. Background What is fingerprint? A fingerprint is an impression of the friction ridges on all parts of the finger. A friction ridge is a raised portion of the epidermis on the palmar (palm) or digits (fingers and toes) or plantar (sole) skin, consisting of one or more connected ridge units of friction ridge skin. These are sometimes known as "epidermal ridges" which are caused by the underlying interface between the dermal papillae of the dermis and the interpapillary (rete) pegs of the epidermis. These epidermal ridges serve to amplify vibrations triggered when fingertips brush across an uneven surface, better transmitting the signals to sensory nerves involved in fine texture perception. The ridges do not assist in gripping objects, sometimes in fact reducing grip to as much as 30% compared to completely smooth finger pads. Fingerprints may be deposited in natural secretions from the eccrine glands present in friction ridge skin (secretions consisting primarily of water) or they may be made by ink or other contaminants transferred from the peaks of friction skin ridges to a relatively smooth surface such as a fingerprint card. The term fingerprint normally refers to impressions transferred from the pad on the last joint of fingers and thumbs, though fingerprint cards also typically record portions of lower joint areas of the fingers (which are also used to make identifications)
3 Fingerprint Recognition Fingerprint recognition (sometimes referred to as dactyloscopy) or palm print identification is the process of comparing questioned and known friction skin ridge impressions from fingers or palms or even toes to determine if the impressions are from the same finger or palm. The flexibility of friction ridge skin means that no two finger or palm prints are ever exactly alike (never identical in every detail), even two impressions recorded immediately after each other. Fingerprint identification (also referred to as individualization) occurs when an expert (or an expert computer system operating under threshold scoring rules) determines that two friction ridge impressions originated from the same finger or palm (or toe, sole) to the exclusion of all others. A known print is the intentional recording of the friction ridges, usually with black printers ink rolled across a contrasting white background, typically a white card. Friction ridges can also be recorded digitally using a technique called Live-Scan. A latent print is the chance reproduction of the friction ridges deposited on the surface of an item. Latent prints are often fragmentary and may require chemical methods, powder, or alternative light sources in order to be visualized. When friction ridges come in contact with a surface that is receptive to a print, material on the ridges, such as perspiration, oil, grease, ink, etc. can be transferred to the item. The factors which affect friction ridge impressions are numerous, thereby requiring examiners to undergo extensive and objective study in order to be trained to competency. Pliability of the skin, deposition pressure, slippage, the matrix, the surface, and the development medium are just some of the various factors which can cause a latent print to appear differently from the known recording of the same friction ridges. Indeed, the conditions of friction ridge deposition are unique and never duplicated. This is another reason why extensive and objective study is necessary for examiners to achieve competency. Fingerprint Patterns The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies.
4 Patterns The three basic patterns of fingerprint ridges are the arch, loop, and whorl. An arch is a pattern where the ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. The loop is a pattern where the ridges enter from one side of a finger, form a curve, and tend to exit from the same side they enter. In the whorl pattern, ridges form circularly around a central point on the finger. Scientists have found that family members often share the same general fingerprint patterns, leading to the belief that these patterns are inherited Arch Loop (Right Loop) Whorl Minutia features Minutiae are major features of a fingerprint, using which comparisons of one print with another can be made. Minutiae include: Ridge ending - the abrupt end of a ridge Ridge bifurcation - a single ridge that divides into two ridges Short ridge, or independent ridge - a ridge that commences, travels a short distance and then ends Island - a single small ridge inside a short ridge or ridge ending that is not connected to all other ridges Ridge enclosure - a single ridge that bifurcates and reunites shortly afterward to continue as a single ridge Spur - a bifurcation with a short ridge branching off a longer ridge Crossover or bridge - a short ridge that runs between two parallel ridges Delta - a Y-shaped ridge meeting Core - a U-turn in the ridge pattern
5 Techniques for Fingerprint matching The large number of approaches to fingerprint matching can be coarsely classified into three families. Correlation-based matching: Two fingerprint images are superimposed and the correlation between corresponding pixels is computed for different alignments (e.g., various displacements and rotations). Minutiae-based matching: This is the most popular and widely used technique, being the basis of the fingerprint comparison made by fingerprint examiners. Minutiae are extracted from the two fingerprints and stored as sets of points in the two- dimensional plane. Minutiae-based matching essentially consists of finding the alignment between the template and the input minutiae sets that results in the maximum number of minutiae pairings Ridge feature-based matching: Minutiae extraction is difficult in very low-quality fingerprint images. However, whereas other features of the fingerprint ridge pattern (e.g., local orientation and frequency, ridge shape, texture information) may be extracted more reliably than minutiae, their distinctiveness is generally lower. The approaches belonging to this family compare fingerprints in term of features extracted from the ridge pattern. In principle, correlation- and minutiae-based matching could be conceived of as subfamilies of ridge feature-based matching, in as much as the pixel intensity and the minutiae positions are themselves features of the finger ridge pattern.
6 1. Correlation-based Techniques : Let T and I be the two fingerprint images corresponding to the template and the input finger- Fingerprint, respectively. Then an intuitive measure of their diversity is the sum of squared differences (SSD) between the intensities of the corresponding pixels: where the superscript "T" denotes the transpose of a vector. If the terms T 2 and l 2 are constant, the diversity between the two images is minimized when the cross-correlation (CC) between T and I is maximized: Note that the quantity 2, CC(T,I) appears as the third term in Equation 1. The cross- correlation (or simply correlation) is then a measure of image similarity. Due to the displacement and rotation that unavoidably characterize two impressions of a given finger, their similarity cannot be simply computed by superimposing T and I and applying Equation 2. Let I ( x, y,ѳ) represent a rotation of the input image I by an angle Ѳ around the origin (usually the image center) and shifted by x, y pixels in directions x and y, respectively; then the similarity between the two fingerprint images T and I can be measured as However equation 3 rarely leads to acceptable results because of the following problems. 1. Non-linear distortion makes impressions of the same finger significantly different in terms of global structure; in particular, the elastic distortion does not significantly alter the fingerprint pattern locally, but since the effects of distortion get integrated in image space, two global fingerprint patterns cannot be reliably correlated. 2. Skin condition and finger pressure cause image brightness, contrast, and ridge thickness to vary significantly across different impressions. 3. A direct application of Equation 3 is computationally very expensive. For example, consider two 400 x 400 pixel images; then the computation of the cross-correlation (Equation 2) for a single value of the ( x, y, Ѳ) triplet would require 16,000 multiplications and 16,000 summations. 2. Minutiae-based Methods: Minutiae matching is certainly the most authentic and widely used method for fingerprint matching.
7 Let T and I be the representation of the template and input fingerprint, respectively. Most common minutiae matching algorithms consider each minutia as a triplet m = {x, y, Ѳ} that indicates the x, y minutia location coordinates and the minutia angle Ѳ: where m and n denote the number of minutiae in T and I, respectively. A minutia m j in I and a minutia m i in T are considered "matching," if the spatial distance (sd) between them is smaller than a given tolerance r 0 and the direction difference (dd) between them is smaller than an angular tolerance Ѳ 0. R 0 and Ѳ 0 are necessary to compensate for errors in feature extraction process and to account for small plastic deformations. Aligning the two fingerprints is a mandatory step in order to maximize the number of matching minutiae. Correctly aligning two fingerprints certainly requires displacement (in x and y) and rotation (Ѳ) to be recovered and likely involves other geometrical transformations like scale resolution and other kinds of distortion. Let map(.) be the function that maps a minutia m' j (from I) into m" j according to a given geometrical transformation; for example, by considering a displacement of [ x, y] and a counterclockwise rotation Ѳ around the origin. Let mm(.) be an indicator function that returns 1 in the case where the minutiae m" j and m i, match according to Equations 5 and 6. Then, the matching problem can be formulated as
8 where P(i) is an unknown function that determines the pairing between I and T minutiae; in particular, each minutia has either exactly one mate in the other fingerprint or has no mate at all: 1. P(i) = j indicates that the mate of the m i in T is the minutia m' j in I; 2. P(i) = null indicates that minutia m i in T has no mate in I; 3. a minutia m' j in I, such that for all i = 1..m, P(i) j has no mate in T; 4. for all i = 1..m, k = l..m, i k => P(i) P(k) or P(i) = P(k) = null (this requires that each minutia in I is associated with a maximum of one minutia in T). Expression 7 requires that the number of minutiae mates be maximized, independently of how strict these mates are; in other words, if two minutiae comply with Equations 5 and 6, then their contribution to expression 7 is made independently of their spatial distance and of their direction difference. Also, to comply with constraint 4 above, each minutia m" j already mated has to be marked, to avoid mating it twice or more. To achieve the optimum pairing (according to Equation 7), a slightly more complicated scheme should be adopted i.e. in the case when a minutia of I falls within the tolerance hyper-sphere of more than one minutia of T, the optimum assignment is that which maximizes the number of mates. Solving the minutiae matching problem (expression7) is trivial when the correct alignment ( x, y, Ѳ) is known; in fact, the pairing (i.e., the function P) can be determined by setting for each i = 1..m:
9 Also, the maximization in 7 can be easily solved if the function P (minutiae correspondence) is known; in this case, the unknown alignment ( x, y, Ѳ) can be determined in the least square sense. However in practice both the function P and correct alignment ( x, y, Ѳ) is not known which makes the matching problem hard because of its exponential nature. Hence the minutiae matching problem has been generally addressed as a point pattern matching problem which can be solved using numerous approaches like relaxation methods, algebraic and operational research solutions, tree-pruning approaches, energy-minimization methods, Hough transform, and so on. An approach to point pattern matching, as proposed by Chang et al. (1997) consists of the main steps: 1. Detect the minutiae pair (called the principal pair) that receives the maximum Matching Pair Support (MPS) and the alignment parameters (Ѳ, s) that can match most minutiae between T and I. The principal pair that has maximum MPS is determined through a Hough transform-based voting process; 2. The remaining minutiae mates (i.e., the function P) are then determined once the two fingerprints have been registered to superimpose the minutiae constituting the principal pair; 3. The exact alignment is computed in the least square sense once the correspondence function is known. To accomplish Step 1, which is at the core of this approach, the algorithm considers segments defined by pairs of minutiae m i2 m i1 in T and m j2m j1 in I and derives, from each pair of segments, the parameters Ѳ and s simply as A transformation ( x, y, Ѳ, s), which aligns the two segments, must necessarily involve a scale change by an amount given by the ratio of the two segment lengths, and a rotation by an angle equal to the difference between the two segment angles
10 Using the above algorithm we get the principal pair and the corresponding parameters (Ѳ*, s*). Thereafter we perform step 2 and 3 to find the rest matching pairs and their alignments. Thus at the end of step 3 we get the max number of matching pairs of minutiae which helps in matching the 2 fingerprints. This is basically the crux of fingerprint matching algorithm. Various other techniques are additionally used to efficiently solve and improve results of the matching problem like Minutiae matching with pre-alignment, Global and local Minutiae matching, distortion corrections etc.
11 3. Ridge Feature-based Matching Techniques: Techniques followed under this category resulted from the disadvantages Minutiae-based methods suffered with. Some of them are: Reliably extracting minutiae from poor quality fingerprints is very difficult. Although minutiae may carry most of the fingerprint discriminatory information, they do not always constitute the best tradeoff between accuracy and robustness; Minutiae extraction is computationally expensive and time consuming. Need for additional features to be used in conjunction with minutiae (and not as an alternative) to increase system accuracy and robustness. The commonly used alternative features under this category are: spatial relationship and geometrical attributes of the ridge lines: In 1986 Moayer and Fu and Isenor and Zaky introduced tree grammars to classify ridge line patterns and graph
12 structures to perform incremental graph matching which was carried out to compare a set of ridges. global and local texture information: Textures are defined by spatial repetition of basic elements, and are characterized by properties such as scale, orientation, frequency, symmetry, isotropy, and so on. Fingerprint ridge lines are mainly described by smooth ridge orientation and frequency, except at singular regions. These singular regions are discontinuities in a basically regular pattern and include the loop(s) and the delta(s) at a coarse resolution and the minutiae points at a high resolution. Various techniques using filters are applied to extract both global and local textures. shape features : Ceguerra and Koprinska in 2002 proposed shape-based features, where a compact one- dimensional shape signature that encodes the general shape of the fingerprint is generated from the two-dimensional fingerprint image using a reference axis. Summary This was a brief discussion about the different techniques use for fingerprint matching and recognition. We included only a brief description of the techniques being used and did not include the procedure of finger print sensing, feature extraction, fingerprint classification and indexing etc. since it is beyond the scope of the report. References Handbook of Fingerprint Recognition by Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar Fingerprint Classification and Matching by Anil Jain (Dept. of Computer Science & Engg, Michigan State University) & Sharath Pankanti (Exploratory Computer Vision Grp. IBM T. J. Watson Research Centre) Wikipedia (Document By : National Science and Technology Council (NSTC), Committee on Technology, Committee on Homeland and National Security Subcommittee on Biometrics )
Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability
Classification of Fingerprints Sarat C. Dass Department of Statistics & Probability Fingerprint Classification Fingerprint classification is a coarse level partitioning of a fingerprint database into smaller
More informationFingerprinting Information Sheet
Fingerprinting Information Sheet HISTORY Fingerprints weren t always used as a means to identify criminals. One of the first methods used to compare physical characteristics was developed in 1883 by Alphonse
More informationFingerprint s Core Point Detection using Gradient Field Mask
Fingerprint s Core Point Detection using Gradient Field Mask Ashish Mishra Assistant Professor Dept. of Computer Science, GGCT, Jabalpur, [M.P.], Dr.Madhu Shandilya Associate Professor Dept. of Electronics.MANIT,Bhopal[M.P.]
More informationForensic Science Lesson 3: Trace Evidence Analysis
Forensic Science Lesson 3: Trace Evidence Analysis History Alphonse Bertillon 1883 Created the first systematic system of individual classification & identification Detailed description of subject, full-length
More informationDocument #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent)
Document #8 Standard for the Documentation of Analysis, Comparison, Evaluation, and Verification (ACE-V) (Latent) 1. Preamble 1.1. When friction ridge detail is examined using the ACE-V methodology, examiners
More informationPalmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap
Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic
More informationHigh Resolution Fingerprint Matching Using Level 3 Features
High Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain and Yi Chen Michigan State University Fingerprint Features Latent print examiners use Level 3 all the time We do not just count
More informationSWGFAST. Defining Level Three Detail
SWGFAST Defining Level Three Detail ANSI / NIST Workshop Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information April 26-28,2005 28,2005 Defining Level Three Detail
More informationObject Recognition and Template Matching
Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of
More informationPart-Based Recognition
Part-Based Recognition Benedict Brown CS597D, Fall 2003 Princeton University CS 597D, Part-Based Recognition p. 1/32 Introduction Many objects are made up of parts It s presumably easier to identify simple
More informationA responsive Fingerprint Matching system for a scalable functional agent
A responsive Fingerprint Matching system for a scalable functional agent N. Nagaraju Research Scholar, PACE Institute of Technology & Sciences Ongole. ABSTRACT The Fingerprint Matching is that the most
More informationOn the Operational Quality of Fingerprint Scanners
BioLab - Biometric System Lab University of Bologna - ITALY http://biolab.csr.unibo.it On the Operational Quality of Fingerprint Scanners Davide Maltoni and Matteo Ferrara November 7, 2007 Outline The
More informationPersonal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES
Personal Identity Verification (PIV) IMAGE QUALITY SPECIFICATIONS FOR SINGLE FINGER CAPTURE DEVICES 1.0 SCOPE AND PURPOSE These specifications apply to fingerprint capture devices which scan and capture
More informationFINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH
FINGERPRINTING IS A SCIENCE - TAKE A SCIENTIFIC APPROACH FINGERPRINT CLEAN HANDS ONLY DRY HANDS THOROUGHLY ROLL FINGERS FROM NAIL-TO-NAIL NOTE THE CORES AND DELTAS TAKE IMPRESSIONS IN CORRECT ORDER PRODUCE
More informationPattern Recognition 43 (2010) 1050 -- 1061. Contents lists available at ScienceDirect. Pattern Recognition
Pattern Recognition 43 (2010) 1050 -- 1061 Contents lists available at ScienceDirect Pattern Recognition journal homepage: www.elsevier.com/locate/pr High resolution partial fingerprint alignment using
More informationPARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition
More informationAutomatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationEfficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
More informationThe Basics of FEA Procedure
CHAPTER 2 The Basics of FEA Procedure 2.1 Introduction This chapter discusses the spring element, especially for the purpose of introducing various concepts involved in use of the FEA technique. A spring
More informationGlencoe. correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 3-3, 5-8 8-4, 8-7 1-6, 4-9
Glencoe correlated to SOUTH CAROLINA MATH CURRICULUM STANDARDS GRADE 6 STANDARDS 6-8 Number and Operations (NO) Standard I. Understand numbers, ways of representing numbers, relationships among numbers,
More informationHierarchically linked extended features for fingerprint processing
Hierarchically linked extended features for fingerprint processing Dissertation zur Erlangung des Doktorgrades der Mathematisch-Naturwissenschaftlichen Fakultäten der Georg-August-Universität zu Göttingen
More informationUnified Lecture # 4 Vectors
Fall 2005 Unified Lecture # 4 Vectors These notes were written by J. Peraire as a review of vectors for Dynamics 16.07. They have been adapted for Unified Engineering by R. Radovitzky. References [1] Feynmann,
More information2. Spin Chemistry and the Vector Model
2. Spin Chemistry and the Vector Model The story of magnetic resonance spectroscopy and intersystem crossing is essentially a choreography of the twisting motion which causes reorientation or rephasing
More informationCategorical Data Visualization and Clustering Using Subjective Factors
Categorical Data Visualization and Clustering Using Subjective Factors Chia-Hui Chang and Zhi-Kai Ding Department of Computer Science and Information Engineering, National Central University, Chung-Li,
More informationATM Transaction Security Using Fingerprint/OTP
ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering
More informationColour Image Segmentation Technique for Screen Printing
60 R.U. Hewage and D.U.J. Sonnadara Department of Physics, University of Colombo, Sri Lanka ABSTRACT Screen-printing is an industry with a large number of applications ranging from printing mobile phone
More informationIntroduction. Chapter 1
1 Chapter 1 Introduction Robotics and automation have undergone an outstanding development in the manufacturing industry over the last decades owing to the increasing demand for higher levels of productivity
More informationState of Stress at Point
State of Stress at Point Einstein Notation The basic idea of Einstein notation is that a covector and a vector can form a scalar: This is typically written as an explicit sum: According to this convention,
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationVECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION
VECTORAL IMAGING THE NEW DIRECTION IN AUTOMATED OPTICAL INSPECTION Mark J. Norris Vision Inspection Technology, LLC Haverhill, MA mnorris@vitechnology.com ABSTRACT Traditional methods of identifying and
More informationLeast-Squares Intersection of Lines
Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a
More informationSecured Employee Attendance Management System Using Fingerprint
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. III (Jan. 2014), PP 32-37 Secured Employee Attendance Management System Using Fingerprint Chiwa,
More informationA PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir
More informationCurrent Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary
Shape, Space, and Measurement- Primary A student shall apply concepts of shape, space, and measurement to solve problems involving two- and three-dimensional shapes by demonstrating an understanding of:
More informationDefining AFIS Latent Print Lights-Out
NIST ELFT Workshop March 19-20, 2009 Defining AFIS Latent Print Lights-Out Stephen B. Meagher Dactyl ID, LLC AFIS 10-Print Lights-Out Arrest Booking Process Booking Officer performs 10-Print fingerprint
More informationSolving Simultaneous Equations and Matrices
Solving Simultaneous Equations and Matrices The following represents a systematic investigation for the steps used to solve two simultaneous linear equations in two unknowns. The motivation for considering
More informationIMDA Systems: Digital Signature Verification
IMDA Systems: Digital Signature Verification ECE-492/3 Senior Design Project Spring 2011 Electrical and Computer Engineering Department Volgenau School of Engineering George Mason University Fairfax, VA
More informationPublished International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
More informationTemplate and Database Security in Biometrics Systems: A Challenging Task
Template and Database Security in Biometrics Systems: A Challenging Task Manvjeet Kaur Lecturer CSE Deptt. Dr. Sanjeev Sofat Prof. and Head CSE Deptt. Deepak Saraswat ME (CSE) Student ABSTRACT Security
More informationLecture L3 - Vectors, Matrices and Coordinate Transformations
S. Widnall 16.07 Dynamics Fall 2009 Lecture notes based on J. Peraire Version 2.0 Lecture L3 - Vectors, Matrices and Coordinate Transformations By using vectors and defining appropriate operations between
More informationDevelopment of a Networked Thumb Print-Based Staff Attendance Management System
American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-03, Issue-03, pp-121-126 www.ajer.org Research Paper Open Access Development of a Networked Thumb Print-Based
More informationEncoders for Linear Motors in the Electronics Industry
Technical Information Encoders for Linear Motors in the Electronics Industry The semiconductor industry and automation technology increasingly require more precise and faster machines in order to satisfy
More informationDecember 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation
More informationBiometrics in Physical Access Control Issues, Status and Trends White Paper
Biometrics in Physical Access Control Issues, Status and Trends White Paper Authored and Presented by: Bill Spence, Recognition Systems, Inc. SIA Biometrics Industry Group Vice-Chair & SIA Biometrics Industry
More informationSWGFAST Glossary - Classification
SWGFAST Glossary - Classification APPENDAGE An attachment or connection within friction ridges. ARCH - PLAIN A fingerprint pattern in which the ridges enter on one side of the impression, and flow, or
More informationDigital Imaging and Multimedia. Filters. Ahmed Elgammal Dept. of Computer Science Rutgers University
Digital Imaging and Multimedia Filters Ahmed Elgammal Dept. of Computer Science Rutgers University Outlines What are Filters Linear Filters Convolution operation Properties of Linear Filters Application
More informationRealScan-S. Fingerprint Scanner RealScan-S
Fingerprint Scanner RealScan-S Outline A fingerprint scanner used by the police or prosecution for collecting a suspect s rolled fingerprints or acquiring a person s flat fingerprints for identification.
More informationSimultaneous Gamma Correction and Registration in the Frequency Domain
Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University
More informationAn Iterative Image Registration Technique with an Application to Stereo Vision
An Iterative Image Registration Technique with an Application to Stereo Vision Bruce D. Lucas Takeo Kanade Computer Science Department Carnegie-Mellon University Pittsburgh, Pennsylvania 15213 Abstract
More informationAn Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique
An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique Josphineleela.R Research scholar Department of Computer Science and Engineering Sathyabamauniversity Chennai,India ilanleela@yahoo.com
More informationReflection and Refraction
Equipment Reflection and Refraction Acrylic block set, plane-concave-convex universal mirror, cork board, cork board stand, pins, flashlight, protractor, ruler, mirror worksheet, rectangular block worksheet,
More informationFace detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
More informationFingerprint Characteristic Extraction by Ridge Orientation: An Approach for a Supervised Contactless Biometric System
Fingerprint Characteristic Extraction by Ridge Orientation: An Approach for a Supervised Contactless Biometric System M. Kokou Assogba LETIA, Ecole Polytech. Ab-Calavi (EPAC) 01 BP 2009 COTONOU BENIN Amine
More informationInternational Year of Light 2015 Tech-Talks BREGENZ: Mehmet Arik Well-Being in Office Applications Light Measurement & Quality Parameters
www.led-professional.com ISSN 1993-890X Trends & Technologies for Future Lighting Solutions ReviewJan/Feb 2015 Issue LpR 47 International Year of Light 2015 Tech-Talks BREGENZ: Mehmet Arik Well-Being in
More informationEpipolar Geometry. Readings: See Sections 10.1 and 15.6 of Forsyth and Ponce. Right Image. Left Image. e(p ) Epipolar Lines. e(q ) q R.
Epipolar Geometry We consider two perspective images of a scene as taken from a stereo pair of cameras (or equivalently, assume the scene is rigid and imaged with a single camera from two different locations).
More informationCopyright 2011 Casa Software Ltd. www.casaxps.com. Centre of Mass
Centre of Mass A central theme in mathematical modelling is that of reducing complex problems to simpler, and hopefully, equivalent problems for which mathematical analysis is possible. The concept of
More informationPARAMETRIC MODELING. David Rosen. December 1997. By carefully laying-out datums and geometry, then constraining them with dimensions and constraints,
1 of 5 11/18/2004 6:24 PM PARAMETRIC MODELING David Rosen December 1997 The term parametric modeling denotes the use of parameters to control the dimensions and shape of CAD models. Think of a rubber CAD
More informationTime Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication
Time Domain and Frequency Domain Techniques For Multi Shaker Time Waveform Replication Thomas Reilly Data Physics Corporation 1741 Technology Drive, Suite 260 San Jose, CA 95110 (408) 216-8440 This paper
More informationStructural Axial, Shear and Bending Moments
Structural Axial, Shear and Bending Moments Positive Internal Forces Acting Recall from mechanics of materials that the internal forces P (generic axial), V (shear) and M (moment) represent resultants
More informationAn Attendance Monitoring System Using Biometrics Authentication Anchal V Khetan
An Attendance Monitoring System Using Biometrics Authentication Anchal V Khetan Computer Science engg dept., Ballari Institute of Technology and Management Bellary-583103, India khetanaanchal15@gmail.com
More informationDigitalPersona White Paper Guide to Fingerprint Recognition
DigitalPersona White Paper Guide to Fingerprint Recognition A DigitalPersona, Inc. White Paper July 2007 DigitalPersona, Inc. 1+ 650.474.4000 www.digitalpersona.com Table of Contents DigitalPersona White
More informationSection 5.0 : Horn Physics. By Martin J. King, 6/29/08 Copyright 2008 by Martin J. King. All Rights Reserved.
Section 5. : Horn Physics Section 5. : Horn Physics By Martin J. King, 6/29/8 Copyright 28 by Martin J. King. All Rights Reserved. Before discussing the design of a horn loaded loudspeaker system, it is
More informationMetrics on SO(3) and Inverse Kinematics
Mathematical Foundations of Computer Graphics and Vision Metrics on SO(3) and Inverse Kinematics Luca Ballan Institute of Visual Computing Optimization on Manifolds Descent approach d is a ascent direction
More informationReview of Fundamental Mathematics
Review of Fundamental Mathematics As explained in the Preface and in Chapter 1 of your textbook, managerial economics applies microeconomic theory to business decision making. The decision-making tools
More informationModelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
More informationPATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION
PATTERN RECOGNITION AND MACHINE LEARNING CHAPTER 4: LINEAR MODELS FOR CLASSIFICATION Introduction In the previous chapter, we explored a class of regression models having particularly simple analytical
More informationThe purpose of major case prints is to record all friction ridge detail
Chapter 12 Major Case Prints The purpose of major case prints is to record all friction ridge detail so that complete and accurate finger and palm print comparisons can be completed. This includes the
More informationLecture 2. Marginal Functions, Average Functions, Elasticity, the Marginal Principle, and Constrained Optimization
Lecture 2. Marginal Functions, Average Functions, Elasticity, the Marginal Principle, and Constrained Optimization 2.1. Introduction Suppose that an economic relationship can be described by a real-valued
More informationBig Ideas in Mathematics
Big Ideas in Mathematics which are important to all mathematics learning. (Adapted from the NCTM Curriculum Focal Points, 2006) The Mathematics Big Ideas are organized using the PA Mathematics Standards
More informationNEW MEXICO Grade 6 MATHEMATICS STANDARDS
PROCESS STANDARDS To help New Mexico students achieve the Content Standards enumerated below, teachers are encouraged to base instruction on the following Process Standards: Problem Solving Build new mathematical
More informationTIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content
More informationThe Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
More informationAutomatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
More information2 FINGERPRINT VERIFICATION
2 FINGERPRINT VERIFICATION Lawrence O'Gorman Veridicom Inc. Chatham, NJ log@veridicom.com Abstract The use of fingerprints for identification has been employed in law enforcement for about a century. A
More informationAmpere's Law. Introduction. times the current enclosed in that loop: Ampere's Law states that the line integral of B and dl over a closed path is 0
1 Ampere's Law Purpose: To investigate Ampere's Law by measuring how magnetic field varies over a closed path; to examine how magnetic field depends upon current. Apparatus: Solenoid and path integral
More informationCOMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
More informationPOISSON AND LAPLACE EQUATIONS. Charles R. O Neill. School of Mechanical and Aerospace Engineering. Oklahoma State University. Stillwater, OK 74078
21 ELLIPTICAL PARTIAL DIFFERENTIAL EQUATIONS: POISSON AND LAPLACE EQUATIONS Charles R. O Neill School of Mechanical and Aerospace Engineering Oklahoma State University Stillwater, OK 74078 2nd Computer
More informationIntroduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
More informationSelf-Calibrated Structured Light 3D Scanner Using Color Edge Pattern
Self-Calibrated Structured Light 3D Scanner Using Color Edge Pattern Samuel Kosolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 21982, Israel e-mail: ksamuel@braude.ac.il
More informationGeometric Camera Parameters
Geometric Camera Parameters What assumptions have we made so far? -All equations we have derived for far are written in the camera reference frames. -These equations are valid only when: () all distances
More informationAccurate Air Flow Measurement in Electronics Cooling
Accurate Air Flow Measurement in Electronics Cooling Joachim Preiss, Raouf Ismail Cambridge AccuSense, Inc. E-mail: info@degreec.com Air is the most commonly used medium to remove heat from electronics
More informationPalmprint as a Biometric Identifier
Palmprint as a Biometric Identifier 1 Kasturika B. Ray, 2 Rachita Misra 1 Orissa Engineering College, Nabojyoti Vihar, Bhubaneswar, Orissa, India 2 Dept. Of IT, CV Raman College of Engineering, Bhubaneswar,
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More information1 Review of Least Squares Solutions to Overdetermined Systems
cs4: introduction to numerical analysis /9/0 Lecture 7: Rectangular Systems and Numerical Integration Instructor: Professor Amos Ron Scribes: Mark Cowlishaw, Nathanael Fillmore Review of Least Squares
More informationComparison of different image compression formats. ECE 533 Project Report Paula Aguilera
Comparison of different image compression formats ECE 533 Project Report Paula Aguilera Introduction: Images are very important documents nowadays; to work with them in some applications they need to be
More informationVisual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
More informationA Robust Method for Solving Transcendental Equations
www.ijcsi.org 413 A Robust Method for Solving Transcendental Equations Md. Golam Moazzam, Amita Chakraborty and Md. Al-Amin Bhuiyan Department of Computer Science and Engineering, Jahangirnagar University,
More information1. Using scrap paper and a dark-colored ink pad, practice making a fingerprint with a clear pattern. Here s how to do it:
Handout 4-A Leave Only Fingerprints: Student Lab Investigation Name Date Your Job Make an ink copy of your fingerprints and identify patterns. In teams, make latent (invisible) and visible fingerprints
More informationSocial Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
More informationHANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
More informationHow To Analyze Ball Blur On A Ball Image
Single Image 3D Reconstruction of Ball Motion and Spin From Motion Blur An Experiment in Motion from Blur Giacomo Boracchi, Vincenzo Caglioti, Alessandro Giusti Objective From a single image, reconstruct:
More informationGraphical Representation of Multivariate Data
Graphical Representation of Multivariate Data One difficulty with multivariate data is their visualization, in particular when p > 3. At the very least, we can construct pairwise scatter plots of variables.
More informationAssessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall
Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin
More informationLOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
More informationThe elements used in commercial codes can be classified in two basic categories:
CHAPTER 3 Truss Element 3.1 Introduction The single most important concept in understanding FEA, is the basic understanding of various finite elements that we employ in an analysis. Elements are used for
More informationUnderstanding astigmatism Spring 2003
MAS450/854 Understanding astigmatism Spring 2003 March 9th 2003 Introduction Spherical lens with no astigmatism Crossed cylindrical lenses with astigmatism Horizontal focus Vertical focus Plane of sharpest
More informationGeometry of Vectors. 1 Cartesian Coordinates. Carlo Tomasi
Geometry of Vectors Carlo Tomasi This note explores the geometric meaning of norm, inner product, orthogonality, and projection for vectors. For vectors in three-dimensional space, we also examine the
More informationSupported by. A seven part series exploring the fantastic world of science.
Supported by A seven part series exploring the fantastic world of science. Find out what techniques are used by forensic scientists and why they are so useful. Forensic science is the term given to the
More informationBayesian probability theory
Bayesian probability theory Bruno A. Olshausen arch 1, 2004 Abstract Bayesian probability theory provides a mathematical framework for peforming inference, or reasoning, using probability. The foundations
More information