Fingerprint Recognition System

INTRODUCTION



It is the most known and used biometrics solution to authenticate people on biometric systems. The reasons for it being so popular are there are ten available sources of biometric and ease of acquisition.

Every person has a unique fingerprint which is composed of ridges, grooves, and direction of the lines. There are three basic patterns of ridges namely, arch, loop, and whorl. The uniqueness of fingerprint is determined by these features as well as minutiae features such as bifurcation and spots (ridge endings).

Fingerprint is one of oldest and most popular recognition technique. Fingerprint matching techniques are of three types −

Minutiae Based Techniques − In these minutiae points are found and then mapped to their relative position on finger. There are some difficulties such as if image is of low quality, then it is difficult to find minutiae points correctly. Another difficulty is, it considers local position of ridges and furrows; not global.

Correlation Based Method − It uses richer gray scale information. It overcomes problems of minutiae-based method, by being able to work with bad quality data. But it has some of its own problems like localization of points.

Pattern Based (Image Based) Matching − Pattern based algorithms compare the basic fingerprint patterns (arch, whorl, and loop) between a stored template and a candidate fingerprint.


Merits of Finger Recognition System
  1. It is the most contemporary method.
  2. It is most economical method.
  3. It is highly reliable and secure.
  4. It works on a small template size, which speeds up the verifying process.
  5. It consumes less memory space.


Demerits of Finger Recognition System
  1. Scars, cuts or absence of finger can hinder the recognition process.
  2. The systems can be fooled by using artificial finger made of wax.
  3. It involves physical contact with the system.
  4. They leave the pattern of finger behind at the time of entering sample.


Applications of Finger Recognition System
  1. Verification of driver-license authenticity.
  2. Checking validity of driving license.
  3. Border Control/Visa Issuance.
  4. Access control in organizations.

Comments

Popular posts from this blog

Cloud computing Service Models

DuckDuckGo Privacy Search Engine

What is Web Hosting And Types Of Webhosting