We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

H.M.C.R Fingerprint Matching

by Hossein Javidnia, Mohammad Amiri, Seyed Iman Meshkat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 6
Year of Publication: 2013
Authors: Hossein Javidnia, Mohammad Amiri, Seyed Iman Meshkat
10.5120/10928-5871

Hossein Javidnia, Mohammad Amiri, Seyed Iman Meshkat . H.M.C.R Fingerprint Matching. International Journal of Computer Applications. 65, 6 ( March 2013), 16-24. DOI=10.5120/10928-5871

@article{ 10.5120/10928-5871,
author = { Hossein Javidnia, Mohammad Amiri, Seyed Iman Meshkat },
title = { H.M.C.R Fingerprint Matching },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 6 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 16-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number6/10928-5871/ },
doi = { 10.5120/10928-5871 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:18:01.611311+05:30
%A Hossein Javidnia
%A Mohammad Amiri
%A Seyed Iman Meshkat
%T H.M.C.R Fingerprint Matching
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 6
%P 16-24
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper explores the algorithm to match fingerprints. With regard to the development of ever-increasing crime and the complexity of doing it, in parallel the importance of technology and scientific knowledge in order to prevent the crimes and find offenders will be obvious. Fingerprint is one of the secure methods for identification individuals and used in the field of crime detection, event control systems, national borders control and etc. Main reason for choosing this method for identification people is uniqueness of each person's fingerprint; also some of its property has no change till the end of life. These features are used in fingerprint matching. There are different standard methods for manual fingerprint matching but doing it manually is difficult and also time consuming, also is not very efficient; of course since databases have millions of fingerprint templates, manually matching is practically impossible. In order to make matching process automatic it requires a method for imaging or coding the fingerprint. This image should have conditions such as Ability of differentiation of any fingerprints in different levels of screen resolution, the ability of the utilization in auto matching algorithms, Simple calculations and etc. In this paper we try to provide the above conditions or even more efficient algorithm.

References
  1. "Cyber Meltdown: Bible Prophecy and the Imminent Threat of Cyber terrorism", Ron Rhodes, 2011, ISBN 978-0-7369-4417-5 (pbk), ISBN 987-0-7369-4423-6 (eBook), Published By Harvest House Publishers, Part2: Who are you? Where are you? Page 119.
  2. "Handbook of Fingerprint Recognition", Second Edition, Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar, 2009, ISBN 978-1-84882-253-5.
  3. "Overview of fingerprint verification technologies", Elsevier Information Security Technical Report, Vol. 3, No. 1, 1998.
  4. "FINGERPRINT MATCHING", Anil K. Jain, Jianjiang Feng, Karthik Nandakumar, Published by the IEEE Computer Society, 0018-9162/10/$26. 00 © 2010 IEEE.
  5. "Fingerprint Identification and Verification System using Minutiae Matching", F. A. Afsar, M. Arif and M. Hussain, National Conference on Emerging Technologies 2004.
  6. "Online Fingerprint Verification Algorithm and Distributed System", Ping Zhang, Xi Guo, Jyotirmay Gadedadikar, Journal of Signal and Information Processing, 2011, 2, 79-87.
  7. "FINGERPRINT RECOGNITION USING MINUTIA SCORE MATCHING", RAVI. J, K. B. RAJA, VENUGOPAL. K. R, Ravi. J. et al /International Journal of Engineering Science and Technology Vol. 1(2), 2009, 35-42.
  8. "FINGERPRINT IDENTIFICATION USING MINUTIAE CONSTELLATION MATCHING", Nizar Rokbani , Adel Alimi, IADIS Virtual Multi Conference on Computer Science and Information Systems 2005.
  9. H. Moravec (1980). "Obstacle Avoidance and Navigation in the Real World by a Seeing Robot Rover" (http:/ / www. ri. cmu. edu/ pubs/pub_22. html). Tech Report CMU-RI-TR-3 Carnegie-Mellon University, Robotics Institute.
  10. C. Harris and M. Stephens (1988). "A combined corner and edge detector" (http:/ / www. bmva. org/ bmvc/ 1988/ avc-88-023. pdf). Proceedings of the 4th Alvey Vision Conference. pp. 147–151.
  11. L. Bretzner and T. Lindeberg (1998. ). "Feature tracking with automatic selection of spatial scales" (http:/ / www. csc. kth. se/ cvap/abstracts/ cvap201. html). Computer Vision and Image Understanding 71,: pp. 385—392.
  12. http://en. wikipedia. org/w/index. php?oldid=483632469
  13. "Homography Estimation", Elan Dubrofsky, THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver), March 2009.
  14. C. R. Souza, "The Accord. NET Framework," Apr 2012; http://accord. googlecode. com
  15. http://en. wikipedia. org/wiki/Corner_detection
  16. http://crsouza. blogspot. jp/2010/05/harris-corners-detector-in-c. html
Index Terms

Computer Science
Information Sciences

Keywords

Fingerprint Matching Harris RANSAC Fingerprint Feature Extraction