Hybrid Fingerprint Image compression andDecompression Technique
**Yaswanth Kumar.Avulapti ,M.C.A, M.Tech, (PhD)***Dr.M.Usha Rani M.C.A,PhD*Director, S.V.U.Computer Center S.V.University, Tirupati**Research Scholar, Dept of Computer Science, S.V.University, Tirupati
***Associate Professor, Dept. of Computer Science,, SPMVV, Tirupati
In this paper a biometric authenticationsystem based on Fingerprint. A fingerprint isthe representation of the epidermis of a finger.It consists of a pattern of interleaved ridgesand valleys.Like every thing in the body fingerprintridges form through a combination of geneticand environmental factors. Finger prints arefully formed at about seven months of fetusdevelopment. Fingerprint ridges don’t changethroughout the life of an individual exceptincase of accidents such as cuts on thefingertip (or) burns on the fingertip. In thispaper we proposed a hybrid model tocompress the fingerprints.
:Biometrics,EnrollmentAuthentication, compression, Decompression.
The term Biometrics is derived fromthe Greek word bio (life) and metrics (tomeasure). Basically it is a method of identifying a person based on his/herphysiological or behavioral characteristicssuch as Fingerprints, Iris, Face, Handgeometry, Retinal scan,,DNA,Signature,KeyStroke, Voice,Gait,Ear,Palm print, Dentalradiographs. Among all the biometrictechniques, fingerprint recognition is the mostpopular method and is successfully used inmany applicationsBiometrics is a rapidly evolvingwonderful technology which has been widelyused in forensics applications such as criminalidentification and prison security.Biometrics(Fingerprints) can be used toprevent unauthorized access to a computer.The main objective of the fingerprintimage compression is to reduce the number of bits as much as possible by keeping theresolution and quality of the fingerprint whiledecompressed as same as to the originalfingerprint image.
Fingerprint Identification System
A finger print system works in twodifferent modes they are Enrollment mode
and Authentication mode as shown in figure.1
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 6, September 2010134http://sites.google.com/site/ijcsis/ISSN 1947-5500