Effectiveness of Extended Invariant Moments in Fingerprint Analysis
Keywords:Biometrics, Pattern Recognition, invariant moments, Fingerprint, Authentication, Identification, K_NN
Automatic fingerprint identification system includes person identification process based on fingerprint which is in digital form. Fingerprint identification system consists of acquiring fingerprint module, classification module, and the matching module, which it performs a comparison between the unknown input fingerprint and the others stored in the fingerprint database and related to the class labeled by the classification module. In this paper, extended are used in fingerprint analyzing process for extracting local features. In extraction local features, extended moments gave best results than when using centralized invariant moments with order 3. for decision making in identification, K_NN classifier used in this work.
Acharya T., and Ray A. K., "Image Processing: Principles And Applications", Wiley-Interscience, USA, 2005.
Afsar F. A., Arif M., and Hussain M., "Fingerprint Identification and Verification System Using
Minutiae Matching", National Conference or Emerging Technologies, 2004.
Al-Kharaz A. A. M., "Fingerprints Recognition Using Gabor Filters", MSC. Thesis, Baghdad University, 2005.
Bhuyan M. H., and Bhattacharyya D. K., "An Effective Fingerprint Classification And Search
Method", International Journal Of Computer Science And Network Security, Vol.9, No.11, November 2009.
Bow S., "Pattern Recognition And Image Processing", Marcel Dekker, New York, USA, 2002.
Cappelli R., Maltoni D., and Turroni F., "Benchmarking Local Orientation Extraction in
Fingerprint Recognition", IEEE International Conference on Pattern Recognition, 2010.
Dass S. C., Zhu Y., and Jain A. K., "Validating a Biometric Authentication System: Sample Size
Requirements", IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol.28, No.12, Dec. 2006.
Espinosa V., "Minutiae Detection Algorithm For Fingerprint Recognition", IEEE, 2002.
He M., and Zhao H., "An Identity Authentication Based on Fingerprint Identification", Proceeding
of the 2009 International Symposium on Web Information Systems And Applications, pp.261-263, May 2009.
Jain A. K., Flynn P., and Ross A. A., "Handbook of Biometrics", Springer, 2008.
Konar A., "Artificial Intelligence And Soft Computing", USA, 2000.
Lee H. C., and Gaensslen R. E., "Advances In Fingerprint Technology", Second Edition, CRC,
Li Y., "Reforming The Theory Of Invariant Moments For Pattern Recognition", Pattern Recognition
Lett., Vol.25, pp.723-730, July 1992.
Mostafa M., "A Novel Line Pattern Algorithm for Embedded Fingerprint Authentication
System", GVIP Special issue on Fingerprint Recognition, 2007.
Nixon M. S., and Aguado A. S., "Feature Extraction And Image Processing", Newnes, Great
Pankanti S., Bolle R. M., and Jain A., "Biometrics: The Future Of Identification", Computer,
Vol.33, No.2, pp.46-49, Feb.9, 2000.
Ratha N., and Bolle R., "Automatic Fingerprint Recognition Systems", Springer, New York,
Ratha N., and Govindaraju V., "Advances In Biometrics", Springer, 2008.
Ravi J., Raja K. B., and Venugopal K. R., "Fingerprint Recognition Using Minutiae Score
Matching", International Journal Of Engineering Science And Technology, Vol.1(2), pp.35-42, 2009.
Reid P., "Biometrics For Network Security", Prentice Hall, Dec.30, 2003.
Ritter G. X., and Wilson J. N., "Handbook Of Computer Vision Algorithms In Image Algebra",IT Knowledge, 1996.
Simon D., Ortega J., Cruz S., and Etal, "Minutiae Extraction Scheme for Fingerprint
Recognition System", IEEE, pp.254-257, 2001.
Thai L. H., and Tam H. N., "Fingerprint Recognition Using Standardized Fingerprint Model",
International Journal Of Computer Science Issues, Vol.7, Issue 3, No.7, May 2010.
Uludag U., and Jain A., "Securing Fingerprint Template: Fuzzy Vault with Helper Data",
Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop, IEEE, 2006.
Wahab A., Chin S. H., and Tan E. C., "Novel Approach To Automated Fingerprint
Recognition", IEE Proceeding-Vis. Image Signal Process, Vol.145, No.3, June 1998.
How to Cite
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.