Open Access   Article Go Back

Image Processing Based on Verification for Secure Fingerprint

Jaishree Jain1 , Heena Arora2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 169-174, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.169174

Online published on May 31, 2019

Copyright © Jaishree Jain, Heena Arora . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Jaishree Jain, Heena Arora, “Image Processing Based on Verification for Secure Fingerprint,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.169-174, 2019.

MLA Style Citation: Jaishree Jain, Heena Arora "Image Processing Based on Verification for Secure Fingerprint." International Journal of Computer Sciences and Engineering 7.5 (2019): 169-174.

APA Style Citation: Jaishree Jain, Heena Arora, (2019). Image Processing Based on Verification for Secure Fingerprint. International Journal of Computer Sciences and Engineering, 7(5), 169-174.

BibTex Style Citation:
@article{Jain_2019,
author = {Jaishree Jain, Heena Arora},
title = {Image Processing Based on Verification for Secure Fingerprint},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {169-174},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4217},
doi = {https://doi.org/10.26438/ijcse/v7i5.169174}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.169174}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4217
TI - Image Processing Based on Verification for Secure Fingerprint
T2 - International Journal of Computer Sciences and Engineering
AU - Jaishree Jain, Heena Arora
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 169-174
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
350 320 downloads 184 downloads
  
  
           

Abstract

In this paper, we have worked on digital fingerprint for secure and true verification of any human. The fingerprint fractionalization presents the extracted feature in characteristic polygon. It is accurate and secure method with the onion algorithms of computational geometry to detect the verification which are based on fingerprint over the cloud. This method is an alternative method, which used to minutiae extraction algorithm. We can compare proposed algorithm (Onion Algorithm of computational geometry) to commercial verification algorithm which works simultaneously with Ratha`s algorithm. During the execution, the experiment result comes in positive verification of the digital Fingerprint in our proposed work. Low cost and super automated technique is the best advantage of the Biometric fingerprint recognition to verify the best match among multiple human fingerprints. We have also used texture feature in this paper.

Key-Words / Index Term

Computational Geometry, Encryption, Fingerprint, Onion layers, Verification of fingerprints

References

[1] T. K. Thivakaran, S. V. V. N. C. Padira, A. S. Kumar, S. S. Reddy, “Fusion Based Multimodel Biometric Authentication System using Ear and Fingerprint”, International Journal of Intelligent Engineering and Systems, Vol.12, No.1, pp. 62-73,2019.
[2] D. Maio & Maltoni, “Direct gray-scale minutiae detection in fingerprints”, IEEE Transactions on PAMI, Vol. 19, No. 1, pp. 27-40, 1997.
[3] A. K. Bhatia and H.Kaur,”Security and Privacy in Biometrics: A Review”, International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue 2, pp. 33-35, 2013
[4] T. Poon & P. Banerjee, “Contemporary Optical Image Processing With Matlab”, Hardcover: Elsevier Science Ltd, 2001.
[5] R. Gonzales, R. Woods, “Digital Image Processing”, Horton M., NJ: Prentice – Hall, Upper Sandle River, 2002.
[6] S. Bhatnagar, N. Jain, R. Vyas, “Minutia based Verification Technique for Fingerprint – A Evaluation Text”, Vol. 4, No. 3, pp. 191-194, 2013.
[7] F. Dhib, M. Machhout and A. Taoufik, “Pre-
Processing Image Algorithm For Fingerprint Recognition And Its Implementation on Dsp Tms320c6416”, International Journal of Software Engineering & Applications (IJSEA), Vol.9, pp. 65-79, 2018.
[8] I. Rahman, A. H. Razzaq and U. Ali, “A Review on
Fingerprints Recognition System”, Journal of Computer Science Systems Biology, Vol. 11, Issue 5, pp. 286-289, 2018.
[9] K. M. Sagayam, D. N. Ponraj, J. Winston, Y. J C,
E. Jeba D, A. Clara, “Authentication of Biometric System using Fingerprint Recognition with Euclidean Distance and Neural Network Classifier”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 8, Issue-4, pp.766-771, 2019.
[10] Dr. S. P. Angayarkanni, “Fingerprint Reconstruction And Pattern Recognition Matching Using Deep Convolution Neural Network”, International Journal of Computer Engineering and Applications, Vol. 12, Issue 7, pp. 1-15, 2018.
[11] W. Yang., S. Wang, J. Hu, G. Zheng and C. Valli, “Security and Accuracy of Fingerprint-Based Biometrics: A Review”, Symmetry, Vol. 11, pp. 1-19, 2019.
[12] A. H. H. Alasadi, R. H. Jaffar, “Fingerprint Verification System based on Active Forgery Techniques”, International Journal of Computer Applications, Vol. 180, pp. 1-6, 2018.
[13] T. N. T. and H. LEE, “High-Secure Fingerprint Authentication System Using Ring-LWE Cryptography”, IEEE Access, Vol. 7, pp. 23379-23387, 2019.
[14] S. Khan, A. Waqas, M. A. Khan and A. W. Ahmad, “A Camera-Based Fingerprint Registration and Verification Method”, IJCSNS International Journal of Computer Science and Network Security, Vol.18 No.11, 2018.
[15] S. KANCHANA, “Fingerprint Based Biometric Authentication In Iot For Resolving Security Challenges”, International Journal of Research and Analytical Reviews, Vol. 5, Issue 4, pp. 1000-1003, 2018.
[16] I. McAteer, A. Ibrahim, G. Zheng, W. Yang and C. Valli, “Integration of Biometrics and Steganography: A Comprehensive Review”, Technologies MPDI, Vol. 7, No. 34, pp. 1-22, 2019.
[17] P. Devi, “Attacks on Cloud Data: A Big Security Issue”, Int. J. Sci. Res. in Network Security and Communication, Vol.6 Issue 2, pp. 15-18, 2018.