Detection and Rectification of Distorted Fingerprints
Main Article Content
Abstract
Elastic distortion of fingerprints is the chief causes for fake mismatch. As this reason disturbs all fingerprint detection applications, it is particularly risk in negative identification applications, such as watch list and deduplication applications. In such applications, cruel persons may deliberately distort their fingerprints to hide recognition. In this paper, we recommended novel algorithms to identify and correct skin distortion based on a single fingerprint image. Distortion detection is demonstrated as a two-class classification problem, for which the registered ridge orientation map and period map of a fingerprint are helpful as the feature vector and a SVM classifier is educated to act the classification task. Distortion rectification (or equivalently distortion field estimation) is analyzed as a regression difficulty, where the input is a distorted fingerprint and the output is the distortion field. To simplify this problem, a database (called reference database) of various distorted reference fingerprints and matching distortion fields is built in the offline stage, and then in the online stage, the closest neighbor of the input fingerprint is planned in the reference database and the equivalent distortion field is used to change (Convert) the input fingerprint into a normal fingerprints. Capable results have been achieved on three databases having many distorted fingerprints, namely NIST SD27 latent fingerprint database, Tsinghua Distorted Fingerprint database, FVC2004 DB1,
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
Prof. Bere S.S. and Mr. Ganesh V. Kakade, “Identify and Rectify the Distorted Fingerprints”, International Journal on Recent and Innovation Trends in Computing and Communication” Volume: 3 Issue: 12.
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed. Berlin, Germany: Springer-Verlag, 2009.
A. Juels and B. S. K. Jr., “Pors: proofs of retrievability forlarge files,” in ACMConference on Computer and Communications Security, P. Ning, S. D. C. di Vimercati, and P. F. Syverson, Eds. ACM, 2007, pp. 584–597.
G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm, 2008, pp. 1–10.
C. C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in ACM Conference on Computer and Communications Security, E. Al-Shaer, S. Jha, and A. D. Keromytis, Eds. ACM, 2009, pp. 213–222.
H. Shacham and B. Waters, “Compact proofs of retrievability,” in ASIACRYPT, ser. Lecture Notes in Computer Science,J. Pieprzyk, Ed., vol. 5350. Springer, 2008, pp. 90–107.
Q. Wang, C.Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in ESORICS, ser. Lecture Notes in Computer Science, M. Backes and P. Ning, Eds., vol. 5789. Springer, 2009, pp. 355–370.
N. K. Ratha, K. Karu, S. Chen, and A. K. Jain, “A Real- Time Matching System for Large Fingerprint Databases,” IEEE TPAMI, vol. 18, no. 8, pp. 799–813, 1996.
A. M. Bazen and S. H. Gerez, “Fingerprint Matching by Thin-Plate Spline Modelling of Elastic Deformations,” Pattern Recognition, vol. 36, no. 8, pp. 1859–1867, 2003.
Z. M. Kovacs-Vajna, “A Fingerprint Verification System Based on Triangular Matching and Dynamic Time Warping,” IEEE TPAMI, vol. 22, no. 11, pp. 1266– 1276, 2000.
A. Senior and R. Bolle, “Improved Fingerprint Matching by Distortion Removal,” IEICE Trans. Information and System, vol. 84, no. 7, pp. 825–831, July 2001.
D. Wan and J. Zhou, “Fingerprint Recognition Using Model-based Density Map,” IEEE TIP, vol. 15, no. 6, pp. 1690–1696, 2006.
J. Feng, “Combining Minutiae Descriptors for Fingerprint Matching,” Pattern Recognition, vol. 41, no. 1, pp. 342–352, 2008.
A. Ross, S. C. Dass, and A. Jain, “Fingerprint Warping Using Ridge Curve Correspondences,” IEEE TPAMI, vol. 28, no. 1, pp. 19– 30, 2006.