Open Access   Article Go Back

Fingerprint Matching Algorithms and BOVW: A Survey

Y. Suresh1 , S.V. N. Srinivasu2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-8 , Page no. 124-127, Aug-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i8.124127

Online published on Aug 31, 2018

Copyright © Y. Suresh, S.V. N. Srinivasu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Y. Suresh, S.V. N. Srinivasu, “Fingerprint Matching Algorithms and BOVW: A Survey,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.8, pp.124-127, 2018.

MLA Style Citation: Y. Suresh, S.V. N. Srinivasu "Fingerprint Matching Algorithms and BOVW: A Survey." International Journal of Computer Sciences and Engineering 6.8 (2018): 124-127.

APA Style Citation: Y. Suresh, S.V. N. Srinivasu, (2018). Fingerprint Matching Algorithms and BOVW: A Survey. International Journal of Computer Sciences and Engineering, 6(8), 124-127.

BibTex Style Citation:
@article{Suresh_2018,
author = {Y. Suresh, S.V. N. Srinivasu},
title = {Fingerprint Matching Algorithms and BOVW: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2018},
volume = {6},
Issue = {8},
month = {8},
year = {2018},
issn = {2347-2693},
pages = {124-127},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2666},
doi = {https://doi.org/10.26438/ijcse/v6i8.124127}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i8.124127}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2666
TI - Fingerprint Matching Algorithms and BOVW: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Y. Suresh, S.V. N. Srinivasu
PY - 2018
DA - 2018/08/31
PB - IJCSE, Indore, INDIA
SP - 124-127
IS - 8
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
474 340 downloads 308 downloads
  
  
           

Abstract

In recent years, the use of biometrics has increased exponentially in the areas where security is a playing vital role. The factors that increasing the use of biometric in many applications include: the cost of the devices which are used for capturing and storing the images are greatly reducing, the ease-of-use of available devices, availability of fast hardware devices which are used for computing, the increasing use of networking and internet technology, different algorithms are available for storing the images in compressed format, etc. The role of biometric application is to authenticate the person by their voice, face or fingerprint. In biometric system, finger print is an extensively accepted one because of its advantage like no two person’s finger prints are same in the universe. In this paper we are presenting the detailed survey on fingerprint matching algorithms.

Key-Words / Index Term

Fingerprint matching, Fingerprint verification, Fingerprint identification, Fingerprint classification, Bag-of-Visual-Words

References

[1] M. Sadeghi, K. Maghooli, and M. Moein, “Using Artificial Immunity Network for Face Verification,” The International Arab Journal of information Technology, vol. 11, no. 4, pp. 354- 361, 2014.
[2] W. Yang, J. Hu and S. Wnag, “A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication,” in Proceeding of IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, pp. 66-70, 2012.
[3] M. Khalil, D. Mohamad, M. Khan, and Q. AlNuzaili, “Fingerprint Verification using Statistical Descriptors”, Journal of Digital Signal Processing, vol. 20, no. 4, pp. 1264-1273, 2009.
[4] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, “Handbook of Fingerprint Recognition”, Springer-Velag, 2009.
[5] H. Deng, and Q. Huo, “Minutiae Matching Based Fingerprint Verification Using Delaunay Triangulation and Aligned-Edge-Guided Triangle Matching,” in Proceeding of Audio and Video Based Biometric Person Authentication, New York, pp. 270-278, 2005.
[6] N.Liu., Y.Yin., and H. Zhang, “A Fingerprint Matching Algorithm Based on Delaunay Triangulation Net,” in Proceedings of the 5th International Conference on Computer and Information Technology, Shanghai, pp. 591-595, 2005.
[7] Parziale G. and Niel A., A Fingerprint Matching Using Minutiae Triangulation, Springer-Verlag, 2004.
[8] Y. Imamverdiyev, A. Teoh, and J. Kim, “Biometric Cryptosystem based on Discretized Fingerprint Texture Descriptors,” Journal of Expert Systems with Applications, vol. 40, no. 5, pp. 1888-1901, 2013.
[9] A. Jin, D. Ling,, and O. Song, “An Efficient Fingerprint Verification System using Integrated Wavelet and Fourier-Melling Invariant Transform,” Journal of Image and Vision Computing, vol. 22, no. 6, pp. 503-513, 2004.
[10] Abraham J., Kwan P., and Gao J., State of the Art in Biometrics, InTech, 2011.
[11] Ross A., Jain A., and Reisman J., “A Hybrid Fingerprint Matcher,” Journal of Pattern Recognition, vol. 36, no. 7, pp. 1661-1673, 2003.
[12] Gago-Alonso A., Hernández-Palancar J., Rodríguez-Reina E., and Muñoz-Briseño A., “Indexing and Retrieving in Fingerprint Databases Under Structural Distortions,” Expert Systems with Applications, vol. 40, no. 8, pp. 2858-2871, 2013.
[13] Girgis M., Sewisy A., and Mansour R., “Robust Method for Partial Deformed Fingerprints Verification Using Genetic Algorithm,” Expert Systems with Applications, vol. 36, no. 2, pp. 2008-2016, 2009.
[14] Nanni L. and Lumini A., “Descriptors for ImageBased Fingerprint Matchers,” Expert Systems with Applications, vol. 36, no. 10, pp. 12414 - 12422, 2009.
[15]Manual F, Gualberto T and Miguel L, “Fingerprint Verification Methods Using Delaunay Triangulations”, The International Journal of Information Technology, Vol. 14, No. 3, May 2017.
[16] Maltoni D., Miao D., Jain A., and Prabhakar S., “Handbook of Fingerprint Recognition”, NewYork: Springer, 2003.
[17] Ahmad F. and Mohamad D., “A Review on Fingerprint Classification Techniques,” International Conference on Computer Technology and Development, Kota Kinabalu, pp. 411-415, 2009.
[18] K Karu and A.K. JAint, “Pergamon FINGERPRINT CLASSIFICATION”, 1996.
[19] L.C. Ern and G. Sulong, “Fingerprint classificationapproach.”, pp.347-350, 2001.
[20] D. M. Z, D. Maltoni, C LAurea, and U Bologna, “ A structural Approach to Fingerprint Classification”, pp. 578-585, 1996.
[21] Ding G., Wang J., and Qin K., “A Visual Word Weighting Scheme Based on Emerging Itemsets for Video Annotation,” Information Processing Letters, vol. 110, no. 16, pp. 692-696, 2010.
[22] Li Z. and Feng X., “Near Duplicate Image Detecting Algorithm Based on Bag of Visual Word Model,” Journal of Multimedia, vol. 8, no.5, pp. 557-564, 2013.
[23] Yang J., Jiang Y., Hauptmann A., and Ngo C., “EvaluatingBag-of-Visual-Words Representations in Scene Classification,” in Proceedings of the International Workshop on Workshop on Multimedia Information Retrieval, Texas, pp. 197-206, 2007.
[24] Zhang J., Sui L., Zhuo L., Li Z., and Yang, Y., “An Approach of Bag-of-Words Based on Visual Attention Model for Pornographic Images Recognition in Compressed Domain,” Neurocomputing, vol. 110, pp. 145-152, 2013.
[25] Pulung A, and Catur S, “Bag-of-Visual-Words for Fingerprint Classification”, International Arab Journal of Information Technology, 2015.
[26] Reza A., “Realization of the Contrast Limited Adaptive Histogram Equalization (CLAHE) for Real-Time Image Enhancement,” Journal of VLSI Signal Processing Systems for Signal, Image and Video Technology, vol. 38, no. 1, pp. 35-44, 2004.
[27] H. V. Neto, “Fingerprint Classification with Neural Networks” Hugo Vieira Neto Díbio Leandro Borges Universidade Federal de Goiânia,”,1997.