Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
3Activity
0 of .
Results for:
No results containing your search query
P. 1
A Method for Fingerprint Authentication for ATM Based Banking Application

A Method for Fingerprint Authentication for ATM Based Banking Application

Ratings: (0)|Views: 530 |Likes:
Published by ijcsis
Fingerprint authentication is widely used in various authentication applications. It is because that fingerprints can achieve the best balance among authentication performance, cost, size of device and ease of use. With identity fraud in our society reaching unprecedented proportions and with an increasing emphasis on the emerging automatic personal identification applications such as biometrics-based verification, especially fingerprint-based identification is preferable as it is used for banking applications. In this paper we are providing authentication using fingerprints of the persons. Here there is two cases train and test. In train case we register the finger print of persons to whom we wish to give authorization .So after register the persons into the data base of the fingerprints .These are changed into templates of predefined .After making Templates the database will be compared with the testing In testing we just make verification after adding the fingerprint of persons. It compares with that template, which are available in database. If it is already in database, it shows matched result else it gives not matched .Finally, we show that the matching performance can be improved by combining the decisions of the matchers based on complementary (minutiae-based and filter based) fingerprint information. The localization of core point represents the most critical step of the whole process. A good matching requires an accurate positioning, so the small errors must also be avoided by usage of complex filtering techniques.
Fingerprint authentication is widely used in various authentication applications. It is because that fingerprints can achieve the best balance among authentication performance, cost, size of device and ease of use. With identity fraud in our society reaching unprecedented proportions and with an increasing emphasis on the emerging automatic personal identification applications such as biometrics-based verification, especially fingerprint-based identification is preferable as it is used for banking applications. In this paper we are providing authentication using fingerprints of the persons. Here there is two cases train and test. In train case we register the finger print of persons to whom we wish to give authorization .So after register the persons into the data base of the fingerprints .These are changed into templates of predefined .After making Templates the database will be compared with the testing In testing we just make verification after adding the fingerprint of persons. It compares with that template, which are available in database. If it is already in database, it shows matched result else it gives not matched .Finally, we show that the matching performance can be improved by combining the decisions of the matchers based on complementary (minutiae-based and filter based) fingerprint information. The localization of core point represents the most critical step of the whole process. A good matching requires an accurate positioning, so the small errors must also be avoided by usage of complex filtering techniques.

More info:

Published by: ijcsis on Oct 12, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/25/2012

pdf

text

original

 
eexxtteemmeellyyeeeeccttiivveeiinnaaeeaasswwhheeeetthheep poovviissiioonn ooaahhiigghhddeeggeeeeoosseeccuuiittyyiissaanniissssuuee.. The analysis of fingerprints for matching purposes generally requires thecomparison of several features of the print pattern. These include patterns, which areaggregate characteristics of ridges, and minutia points, which are unique features found withinthe patterns. It is also necessary to know thestructure and properties of human skin in order to successfully employ some of the imagingtechnologies.
1.1Patterns:
The three basic patterns of fingerprint ridges arethe arch, loop, and whorl. An arch is a patternwhere the ridges enter from one side of thefinger, rise in the center forming an arc, and thenexit the other side of the finger. The loop is a pattern where the ridges enter from one side of afinger, form a curve, and tend to exit from thesame side they enter. In the whorl pattern, ridgesform circularly around a central point on thefinger. Scientists have found that familymembers often share the same generalfingerprint patterns, leading to the belief thatthese patterns are inherited.Fig1.1: The arch patternFig1.2: The loop patternFig1.3: The whorl pattern
 
1.2 Minutia features:
The major features of fingerprint ridges are:ridge ending, bifurcation, and short ridge (or dot). The ridge ending is the point at which aridge terminates. Bifurcations are points at whicha single ridge splits into two ridges. Short ridges(or dots) are ridges which are significantlyshorter than the average ridge length on thefingerprint. Minutiae and patterns are veryimportant in the analysis of fingerprints since notwo fingers have been shown to be identical.FFiigg11..44::iiddggeeeennddiinngg.. FFiigg11..55::BBiiuuccaattiioonn
.. 
Fig 1.6: Short RidgeAAssmmooootthhllyylloowwiinnggp paatttteennoommeeddb byy aalltteennaattiinnggcceessttss((iiddggeess))aannddttoouugghhss((vvaalllleeyyss)) oonntthheep paallmmaaaass p peeccttoohhaannddiissccaalllleeddaa  p paallmm p piinntt..FFoommaattiioonnooaap paallmm p piinnttddee p peennddssoonn tthheeiinniittiiaallccoonnddiittiioonnssootthheeeemm b byyoonniiccmmeessooddeemm oommwwhhiicchhtthheeyyddeevveelloo p p..TThheep paatttteennoonnp puull p poo eeaacchhtteemmiinnaallp phhaallaannxxiissccoonnssiiddeeeeddaassaann iinnddiivviidduuaallp paatttteennaannddiissccoommmmoonnllyyeeeeeeddttooaass aa 
 f  f iinnggee p piinn
..AAiinnggee p piinnttiissb beelliieevveeddttoob bee uunniiqquueettooeeaacchhp peessoonn((aannddeeaacchhiinnggee))22.. FFiinnggee p piinnttssooeevveenniiddeennttiiccaallttwwiinnssaaeeddiieeeenntt.. FFiinnggee p piinnttssaaeeoonneeootthheemmoossttmmaattuuee  b biioommeettiicctteecchhnnoollooggiieessaannddaaeeccoonnssiiddeeeedd lleeggiittiimmaatteep poooossooeevviiddeenncceeiinnccoouuttssoollaawwaallll oovveetthheewwoolldd..FFiinnggee p piinnttssaaee,,tthheeeeooee,,uusseedd 
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 9, No. 9, September 201152http://sites.google.com/site/ijcsis/ISSN 1947-5500

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Safa Khan added this note
plz add ppt also

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->