Fingerprint recognition proposal

Anonymous
timer Asked: Feb 10th, 2015

Question Description

I need support with this Computer Science question so I can learn better.

Hi,

The attached is the project proposal I submitted to my lecturer but rejected it and want me to rewrite it, can you help me to rewrite it properly and I will later start the project when it is approved.

Fingerprint recognition Proposal.doc


regards

Unformatted Attachment Preview

FINGERPRINT RECOGNITION AND MATCHING TECHNOLOGY Introduction As the disruptive technology is changing the landscape of our societies or environments, Biometric authentication is finding more and more parts of the human body to prove we really are who we say we are. 'Biometrics' refers to the identification of human physical and behavioral characteristics, such as fingers, hands, ears, teeth, veins, voice and eyes. This concept of biometric authentication means biometrics are used to authenticate the body parts themselves as it is difficult to steal them, lose them, or duplicate them. Biometric authentication is a vital element in security due to unauthorised immigration, visa fraud, and border intrusion; it is increasingly being implemented at security checkout points at airports. More recently, increasing identity fraud has created a growing need for biometric technology for positive person identification in a number of non-forensic applications. Is this person authorized to enter this facility? Is this individual entitled to access the privileged information? Is the given service being administered exclusively to the enrolled users? Answers to questions such as these are valuable to business and government organizations. Since biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for personal identification than traditional token or knowledge based methods. Human fingerprints are rich in a detail which is known as minutiae, which can be used as identification marks for fingerprint verification. The objective of this project is to explore the fingerprint recognition processes on minutia based matching which is quiet frequently used in various fingerprint algorithms and techniques .The approach of this project is find out how the minutia points are extracted from the fingerprint images and after that between two fingerprints we are performing the fingerprint matching. Image enhancement, image segmentation, minutia extraction and minutia matching these stages are the main themes of our project. This project is coded in MATLAB. Fingerprint Anatomy: A fingerprint is the composition of many ridges and furrows. Finger prints can‟t distinguished by their ridges and furrows. It can be distinguished by Minutia, which are some abnormal points on the ridges. Minutia is divided in to two parts such as: termination and bifurcation. Termination is also called ending and bifurcation is also called branch. Again minutia consists of ridges and furrows. Valley is also referred as furrow. In the course of this study we shall be looking at two fingerprint recognition problems which can be grouped into two sub-domains such as: i) fingerprint verification ii) fingerprint identification. Fingerprint verification is the method where we compare a claimant fingerprint with an enrolee fingerprint, where our aim is to match both the fingerprints. This method is mainly used to verify a person’s authenticity. For verification a person needs to his or her fingerprint in to the fingerprint verification system. Then it is representation is saved in some compress format with the person’s identity and his or her name. Then it is applied to the fingerprint verification system so that the person’s identity can be easily verified. Fingerprint verification is also called, one-toone matching. Fingerprint identification is mainly used to specify any person’s identity by his fingerprint. Identification has been used for criminal fingerprint matching. Here the system matches the fingerprint of unknown ownership against the other fingerprints present in the database to associate a crime with identity. This process is also called, one-to-many matching. Identification is traditionally used for solve crime and catch thieves. Additionally, one of the objectives of this project is to present a high level overview of fingerprint sensing and matching technology so as to know or gain insights into the strengths and limitations of the automation in matching fingerprints. In an attempt to analyzing fingerprint recognition system, we discovered system level design, which consists of a sensor, optical and semi-conductor, minutia extractor-made up of preprocessing, muntial extractor and post processing. Again pre processing stage is divided in to three sub stages such as:- i) image enhancement ii) image binarization iii) image segmentation. For image enhancement we shall use two methods such as:- histogram equalization and Fourier transform. After enhancing the image we shall binaries the image for that we used the locally adaptive threshold method. For image segmentation we preferred a three-step approach such as :i) block direction estimation ii) segmentation by direction intensity iii) Region of Interest (ROI) extraction by Morphological operations. Minutia extraction stage is divided in to two sub stages such as:- i) fingerprint ridge thinning and ii) minutia marking We used iterative parallel thinning algorithm for minutia extraction stage. Ridge thinning is used to eliminate the redundant pixels of the ridges 16 till the ridges are of one pixel wide. The minutia marking is quite simple task. Here crossing number (CN) concept is used. For the post processing stage, it has only one sub step that is:- removal of false minutia. Also a novel representation for bifurcations is proposed to unify terminations and bifurcation. After testing the set of minutia set of points of two finger print image we perform Minutiae Matching to check whether they belong to the same person or not. It includes two consecutive stages: i) alignment stage ii) match stage. In conclusion, experimental results will show the Performance evaluation index that will possibly display two types of performance evaluation indexes to determine the performance of a fingerprint recognition system such as:- False Rejection Rate (FRR): Sometimes the biometric security system may incorrectly reject an access attempt by an authorized user. To measure these types of incidents FAR is basically used. A system’s FRR basically states the ratio between the number of false rejections and the number of identification attempts. False Acceptance Rate (FAR): Sometimes the biometric security system may incorrectly accept an access attempt of an unauthorized user. To measure these types of incidents FAR is basically used. A system‟s FAR basically states the ratio between the number of false acceptances and the number of identification attempts. Above all, the effort of this project to understand how the Fingerprint Recognition is used in many applications like biometric measurements, solving crime investigation and also in security systems. From minutiae extraction to minutiae matching all stages are included in this implementation which generates a match score. Various standard techniques are used in the intermediate stages of processing. FINGERPRINT RECOGNITION AND MATCHING TECHNOLOGY Introduction As the disruptive technology is changing the landscape of our societies or environments, Biometric authentication is finding more and more parts of the human body to prove we really are who we say we are. 'Biometrics' refers to the identification of human physical and behavioral characteristics, such as fingers, hands, ears, teeth, veins, voice and eyes. This concept of biometric authentication means biometrics are used to authenticate the body parts themselves as it is difficult to steal them, lose them, or duplicate them. Biometric authentication is a vital element in security due to unauthorised immigration, visa fraud, and border intrusion; it is increasingly being implemented at security checkout points at airports. More recently, increasing identity fraud has created a growing need for biometric technology for positive person identification in a number of non-forensic applications. Is this person authorized to enter this facility? Is this individual entitled to access the privileged information? Is the given service being administered exclusively to the enrolled users? Answers to questions such as these are valuable to business and government organizations. Since biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for personal identification than traditional token or knowledge based methods. Human fingerprints are rich in a detail which is known as minutiae, which can be used as identification marks for fingerprint verification. The objective of this project is to explore the fingerprint recognition processes on minutia based matching which is quiet frequently used in various fingerprint algorithms and techniques .The approach of this project is find out how the minutia points are extracted from the fingerprint images and after that between two fingerprints we are performing the fingerprint matching. Image enhancement, image segmentation, minutia extraction and minutia matching these stages are the main themes of our project. This project is coded in MATLAB. Fingerprint Anatomy: A fingerprint is the composition of many ridges and furrows. Finger prints can‟t distinguished by their ridges and furrows. It can be distinguished by Minutia, which are some abnormal points on the ridges. Minutia is divided in to two parts such as: termination and bifurcation. Termination is also called ending and bifurcation is also called branch. Again minutia consists of ridges and furrows. Valley is also referred as furrow. In the course of this study we shall be looking at two fingerprint recognition problems which can be grouped into two sub-domains such as: i) fingerprint verification ii) fingerprint identification. Fingerprint verification is the method where we compare a claimant fingerprint with an enrolee fingerprint, where our aim is to match both the fingerprints. This method is mainly used to verify a person’s authenticity. For verification a person needs to his or her fingerprint in to the fingerprint verification system. Then it is representation is saved in some compress format with the person’s identity and his or her name. Then it is applied to the fingerprint verification system so that the person’s identity can be easily verified. Fingerprint verification is also called, one-toone matching. Fingerprint identification is mainly used to specify any person’s identity by his fingerprint. Identification has been used for criminal fingerprint matching. Here the system matches the fingerprint of unknown ownership against the other fingerprints present in the database to associate a crime with identity. This process is also called, one-to-many matching. Identification is traditionally used for solve crime and catch thieves. Additionally, one of the objectives of this project is to present a high level overview of fingerprint sensing and matching technology so as to know or gain insights into the strengths and limitations of the automation in matching fingerprints. In an attempt to analyzing fingerprint recognition system, we discovered system level design, which consists of a sensor, optical and semi-conductor, minutia extractor-made up of preprocessing, muntial extractor and post processing. Again pre processing stage is divided in to three sub stages such as:- i) image enhancement ii) image binarization iii) image segmentation. For image enhancement we shall use two methods such as:- histogram equalization and Fourier transform. After enhancing the image we shall binaries the image for that we used the locally adaptive threshold method. For image segmentation we preferred a three-step approach such as :i) block direction estimation ii) segmentation by direction intensity iii) Region of Interest (ROI) extraction by Morphological operations. Minutia extraction stage is divided in to two sub stages such as:- i) fingerprint ridge thinning and ii) minutia marking We used iterative parallel thinning algorithm for minutia extraction stage. Ridge thinning is used to eliminate the redundant pixels of the ridges 16 till the ridges are of one pixel wide. The minutia marking is quite simple task. Here crossing number (CN) concept is used. For the post processing stage, it has only one sub step that is:- removal of false minutia. Also a novel representation for bifurcations is proposed to unify terminations and bifurcation. After testing the set of minutia set of points of two finger print image we perform Minutiae Matching to check whether they belong to the same person or not. It includes two consecutive stages: i) alignment stage ii) match stage. In conclusion, experimental results will show the Performance evaluation index that will possibly display two types of performance evaluation indexes to determine the performance of a fingerprint recognition system such as:- False Rejection Rate (FRR): Sometimes the biometric security system may incorrectly reject an access attempt by an authorized user. To measure these types of incidents FAR is basically used. A system’s FRR basically states the ratio between the number of false rejections and the number of identification attempts. False Acceptance Rate (FAR): Sometimes the biometric security system may incorrectly accept an access attempt of an unauthorized user. To measure these types of incidents FAR is basically used. A system‟s FAR basically states the ratio between the number of false acceptances and the number of identification attempts. Above all, the effort of this project to understand how the Fingerprint Recognition is used in many applications like biometric measurements, solving crime investigation and also in security systems. From minutiae extraction to minutiae matching all stages are included in this implementation which generates a match score. Various standard techniques are used in the intermediate stages of processing. ...
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

This question has not been answered.

Create a free account to get help with this and any other question!

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors