Fingerprint Matching Report
Fingerprint Matching Report
A PROJECT REPORT
on
“FINGERPRINT MATCHING”
Submitted by
Ms.Vaishnavi Rao
Assistant Professor, Department of CSE(AI&ML)
at
SAHYADRI
COLLEGE OF ENGINEERING & MANAGEMENT
An Autonomous Institution
Adyar, Mangaluru - 575 007
2022 - 23
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
(ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING)
CERTIFICATE
This is to certify that the Digital Image Processing Mini project work entitled “Finger-
print Matching ” has been carried out by Nitesh kamat(4SF20CI042), and Pavan
(4SF20CI043), the bonafide students of Sahyadri College of Engineering & Manage-
ment in partial fulfillment for the award of Bachelor of Engineering in Computer Science
& Engineering (Artificial Intelligence & Machine Learning) of Visvesvaraya Technological
University, Belagavi during the year 2022-23. It is certified that all corrections/suggestions
indicated for Internal Assessment have been incorporated in the Report deposited in the
departmental library. The Digital Image Processing project report has been approved as
it satisfies the academic requirements in respect of project work prescribed for the said
degree.
External Viva:
Examiner’s Name Signature with Date
1. . . . . . . . . . . . . . . . . . . . . . .....................
2. . . . . . . . . . . . . . . . . . . . . . .....................
SAHYADRI
COLLEGE OF ENGINEERING & MANAGEMENT
An Autonomous Institution
DECLARATION
We hereby declare that the entire work embodied in this Digital Image Processing Project
Report titled “Fingerprint Matching” has been carried out by us at Sahyadri College of
Engineering and Management, Mangaluru under the supervision of Ms.Vaishnavi Rao
for the award of Bachelor of Engineering in Computer Science & Engineering.
This report has not been submitted to this or any other University for the award of any
other degree.
Nitesh kamat(4SF20CI042)
Pavan (4SF20CI043)
method due to its uniqueness and stability. In this mini-project, we propose a fingerprint
matching system that leverages a Siamese network to achieve accurate and efficient finger-
print identification. The system consists of three main stages: image preprocessing, feature
extraction, and matching. During the preprocessing stage, the captured fingerprint image
undergoes various enhancement and noise reduction operations to ensure optimal quality
for subsequent analysis. In the feature extraction stage, the Siamese network is trained to
encode and extract discriminative features from pairs of fingerprint images. These features
capture the unique patterns and characteristics of individual fingerprints. In the matching
stage, the trained Siamese network computes a similarity score between two fingerprint
matching. This system offers a promising solution for biometric authentication, providing
i
Acknowledgement
It is with great satisfaction and euphoria that we are submitting the Project Report on
“Fingerprint Matching ”. We have completed it as a part of the curriculum of Visves-
varaya Technological University, Belagavi for the award of Bachelor of Engineering in
Computer Science & Engineering.
We sincerely thank Dr. Rajesha S, Principal, Sahyadri College of Engineering & Man-
agement, who have always been a great source of inspiration.
We extend our sincere regards and respect to Dr. Manjunath Bhandary, Chairman,
SCEM, having provided all the facilitites that helped us in the timely completion of this
project report.
Finally, yet importantly, We express our heartfelt thanks to our family & friends for their
wishes and encouragement throughout the work.
Nitesh kamat(4SF20CI042)
Pavan (4SF20CI043)
ii
Table of Contents
Abstract i
Acknowledgement ii
Table of Contents iv
List of Figures 1
1 Introduction 2
1.1 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2 Literature Survey 4
3 Problem Definition 8
4 Methodology 9
4.1 Fingerprint Image Processing . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.2 Standardization of images: . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.3 Architecture for Fingerprint Matching . . . . . . . . . . . . . . . . . . . . 12
4.4 Training Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5 Datasets 15
5.1 Sokoto Coventry Fingerprint Dataset (SOCOFing) . . . . . . . . . . . . . 15
iii
6.3 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
6.4 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
6.5 Potential Areas for Further Improvement . . . . . . . . . . . . . . . . . . . 18
6.6 Future Research Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
References 21
iv
List of Figures
1
Chapter 1
Introduction
Fingerprint recognition is a widely used biometric technology that has gained significant
attention and adoption in various fields. With the unique and distinct patterns present
on each individual’s fingertips, fingerprint recognition has proven to be a reliable and
efficient method for personal identification and authentication. This technology utilizes
advanced algorithms and pattern matching techniques to capture, process, and analyze
the distinctive features of fingerprints, enabling accurate identification and verification.
The application of fingerprint recognition has seen tremendous growth in recent years,
encompassing a diverse range of sectors such as law enforcement, access control systems,
banking and finance, border security, and mobile device authentication. Its popularity can
be attributed to its non-invasive nature, high accuracy, and the fact that fingerprints are
difficult to forge, making it an ideal choice for ensuring security and identity verification.
In this report, we will explore the fundamental principles behind fingerprint recognition,
the various components involved in the process, and the challenges faced in implementing
this technology. Additionally, we will delve into the potential applications and benefits of
fingerprint recognition systems, as well as discussing some emerging trends and advance-
ments in the field. By understanding the intricacies of fingerprint recognition, we can gain
insights into its effectiveness, limitations, and its impact on enhancing security measures
in our increasingly digital and interconnected world.
1.1 Purpose
The purpose of fingerprint recognition is to accurately and reliably identify individuals
based on the unique patterns and characteristics present in their fingerprints. This bio-
metric authentication method serves several key objectives. Firstly, it aims to provide
2
Fingerprint Matching Chapter 1
1.2 Scope
The scope of fingerprint recognition is broad, encompassing a wide range of domains and
applications. It is a versatile technology that finds application in various fields, includ-
ing security systems, forensic investigations, identity verification, financial transactions,
employee management, mobile devices, healthcare, and more.
In the realm of security systems, fingerprint recognition is extensively used for access
control, ensuring that only authorized individuals can gain entry to secure areas or elec-
tronic devices. It provides a high level of security and convenience compared to traditional
methods like passwords or access cards.In forensic investigations, fingerprint recognition
plays a crucial role in linking suspects to crime scenes. It aids in the identification and
matching of fingerprints, helping law enforcement agencies solve crimes and provide evi-
dence in court.
1.3 Overview
Fingerprint recognition is a widely used biometric technology that aims to identify and
authenticate individuals based on their unique fingerprint patterns. It has gained signifi-
cant attention and adoption across various industries and applications due to its reliability,
security, and convenience.Fingerprint recognition has a broad scope and finds application
in numerous domains. It is extensively used in access control systems to secure physical
spaces, electronic devices, and confidential information. By relying on the uniqueness of
fingerprints, it provides a highly secure method for granting authorized access.In forensic
investigations, fingerprint recognition plays a crucial role in criminal identification. It en-
ables the comparison of fingerprints found at crime scenes with those in a database, aiding
law enforcement agencies in linking suspects to criminal activities and providing valuable
evidence in court.
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 3
Chapter 2
Literature Survey
4
Fingerprint Matching Chapter 2
fingerprints. In their approach the raw fingerprint image is cleaned by median filter, which
makes edge extraction from the fingerprint easier. After edge extraction line thinning is
performed. The image is processed by a new single pass noise removal and linethinning
algorithm, which is based on contour generation. This algorithm was faster and more
efficient than conventional contour tracing and parallel algorithms and was the bases for the
high-speed feature extraction. For better extraction of features fingerprint enhancement is
required. B. G. Sherlock; D. M. Monro and K. Millard [5] described a method of enhancing
fingerprint images, based upon directional Fourier domain filtering. Fingerprints are first
smoothed using a directional filter whose orientation is everywhere matched to the local
ridge orientation. The proposed technique took the advantage of Fourier domain filtering
which helped to convolve the fingerprint images with filters of full image size. A criminal
case may require a very high degree match but an access control system may use a more
relaxed matching system, simply because its database is much smaller. Sometimes it is
not possible to capture the whole of fingerprint image easily
In such circumstances, how to tolerate minor distortions becomes a critical subject.
M. B. Akhan, I. Emiroglu and E. G. Bahari [6] proposed a method to overcome some of
these difficulties by allowing the user to set the accuracy and the degree of match. Most
of the approaches to fingerprint recognition used to break down the process of ridge detec-
tion into smoothing or early pre-processing, edge detection, thresholding, binarization and
subsequently thinning. This whole procedure was computationally expensive and hence
required more expensive hardware to meet the response- time requirements. V. K. Sagar;
D. B. L. Ngo and K. C. K. Foo [7]presented an approach based on fuzzy logic technique.
This technique had the advantage of being simple and less expensive. Major advantage of
using fuzzy logic is that it requires less expensive hardware for similar performance. M. H.
Ghassemian [8] addressed the problem of the extraction of relevant macroscopic properties
of the image, in particular the location of key features (core and delta). Author explored
the transformation of the image into a reconstructed skeletal form, followed by the conver-
sion of the image into a series of tracks. These tracks latter permits the straightforward
extraction of’ essential pattern characteristics. The track curvature can also be used to
identify locations in the image that are in some sense pivotal to the ridge flow and can be
used as substitutes for the more obvious cores. This is of significance in Arch-like patterns,
which have no discernible core.
Smudged furrows and cut ridges in the image of a fingerprint are the major problem in
the fingerprint identification or verification systems. M. H. Ghassemian,[9] presented a new
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 5
Fingerprint Matching Chapter 2
on-line unsupervised ridge detection method that reduced the complexity and costs associ-
ated with the fingerprint identification procedure. The author describes the algorithm for
restoration of the ridges of fingerprint. This algorithm was based on fuzzy classification
technique. D. P. Mital and Eam Khwang Teoh,[10] presented the structural matching ap-
proach which is able to perform effective rotational invariant fingerprint identification. In
this approach, each of the extracted feature is correlated with five of its nearest neighboring
features to form a local feature group for a first-stage matching. After that, the feature with
the highest match is used as a central feature whereby all the other features are correlated
to form a global feature group for a second-stage matching. Distance and relative angle is
used for finding the correlation between the features. Lin Hong and Jain A.[11] introduced
a new fingerprint enhancement algorithm, which decomposes the input fingerprint image
into a set of filtered images. From the filtered images, the orientation field is estimated and
a quality mask, which distinguishes the recoverable and unrecoverable corrupted regions
in the input image, is generated. The input fingerprint image is adaptively enhanced in
the recoverable regions. Hong Lin; A. Jian and R. Bolle [12] described the design and
implementation of an on-line fingerprint verification system, which operates in two stages:
minutia extraction and minutia matching. An improved version of the minutia extraction
algorithm proposed by Ratha et al., which was much faster and more reliable, was imple-
mented for extracting features. For minutia matching, an alignment-based elastic matching
algorithm was developed. This algorithm has the capability of finding the correspondences
between minutiae in the input image and the stored template without resorting to exhaus-
tive search and has the ability of adaptively compensating for the nonlinear deformations.
Lin Hong; Yifei Wan and Jain A [13] presented a fast fingerprint enhancement algorithm,
which can adaptively improve the clarity of ridge and valley structures of input fingerprint
images based on the estimated local ridge orientation and frequency.
There were two major shortcomings of the traditional approaches to fingerprint rep-
resentation. Firstly for a significant fraction of population, the representations based on
explicit detection of complete ridge structure in the fingerprints were difficult to extract
automatically. . A. K. Jain; S. Prabhakar; L. Hong and S. Pankanti[14] proposed filter-
based algorithm that uses a bank of even symmetric Gabor filters to capture both the local
and the global details in a fingerprint as a compact 640- byte fixed length Finger Code.
The fingerprint matching is done on the bases of Euclidean distance between the two cor-
responding Finger codes and hence is extremely fast. The accuracy of the method was
found comparable to best results of minutiae based algorithms. Lee Chih-Jen and Wang
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 6
Fingerprint Matching Chapter 2
Sheng-De [15] explained usefulness of Gabor filter based method for fingerprint recognition
on small database. The method made use of Gabor filtering technology and eliminated
computationally complex steps like smoothing, binarization, thinning and minutiae de-
tection. Gabor filter based features played a central role in the processes of fingerprint
recognition, including local ridge orientation detection, core point detection, and feature
extraction.
In the improvement to their previous method,A. K. Jain; S. Prabhakar; L Hong and
S. Pankanti proposed filter-based algorithm that uses a bank of Gabor filters to capture
both local and global details in a fingerprint as a compact fixed length Finger Code. The
verification accuracy, which was only marginally inferior to the best results of minutiae-
based algorithms, was achieved. M. Horton; P. Meene; R. Adhami and P. Cox,[16] in
their work investigated the utility of complex, 2-D Gabor filter for a fingerprint matching
system. Previous approaches had used an even symmetric 2-D Gabor filter to perform
fingerprint feature extraction processing. Several processing methods using a complex
filter were explored and compared to the even-symmetric case. The use of the complex
filter provided only marginal improvement over the real filter though the computational
cost for using the complex filter was significant. L. Sha; F. Zhao and X. Tang,[17] proposed
a new rotation invariant reference point location method, and then combine the direction
features with the AAD features to form an oriented Finger Code. To approximate the
rotation invariance features, the image was rotated cyclically to generate ten templates.
Experimental results showed that the addition of direction features led to a substantial
improvement in the overall matching performance. A. Jain; A. Ross and S. Prabhakar,
[18] presented a hybrid matching algorithm that used both minutiae (point) information
and texture (region) information for matching the fingerprints. A bank of Gabor filters was
used to extract features from the tessellated cells of the template and input images. Sen
Wang and Yangsheng Wang,[19]presented a new method and designed a new frequency
domain filter to enhance fingerprint in the singular point area. First the singular point
was detected and then filter was designed for the enhancement in this area.
Classification of fingerprint is to group similar type of fingerprints together. This helps
reducing the matching time. F. You, Y.Q. Shi and P Engler[20] described a method to
automatically classify fingerprints into three groups: whorl, loop and arch. Their work
was motivated with the idea to help medical scientists to study the relationship between
fingerprint patterns and medical disorders. They used frequency domain approach in which
features of Fourier spectrum were used.
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 7
Chapter 3
Problem Definition
The problem of fingerprint matching refers to the task of accurately identifying and verify-
ing the identity of an individual based on their fingerprint patterns. Fingerprint matching
plays a crucial role in various applications, including law enforcement, access control sys-
tems, and personal authentication. The main challenge in fingerprint matching lies in the
uniqueness and complexity of fingerprint patterns. Each person’s fingerprint consists of
ridges, valleys, and minutiae points, such as ridge endings and bifurcations, which form a
distinct pattern. The goal is to compare a captured fingerprint image with a database of
known fingerprints to determine if a match exists.
The problem involves several subtasks, including image preprocessing, feature extrac-
tion, and matching algorithms. Image preprocessing aims to enhance the quality of the
captured fingerprint image by reducing noise, improving contrast, and removing artifacts.
Feature extraction involves identifying and extracting key characteristics, such as minutiae
points, from the preprocessed image. Matching algorithms then compare the extracted
features of the query fingerprint with those in the database to determine the degree of
similarity or dissimilarity.
8
Chapter 4
Methodology
in this study can compare fingerprint images in a direct way, so it was more flexible in
practical applications. The application method is shown in Figure 4.2, that is, to store the
9
Fingerprint Matching Chapter 4
enhanced image into the database and compare it with the input fingerprint, in order to
control the subsequent programs.
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 10
Fingerprint Matching Chapter 4
focuses solely on the intensity values of pixels, which contain important fingerprint ridge
information.
2. Histogram Equalization: Histogram equalization was performed to enhance the
contrast and normalize the grayscale values of the fingerprint images. This step addressed
the issue of inconsistent clarity and variations in grayscale due to different imaging condi-
tions or finger pressure during image acquisition.
To perform histogram equalization, the following steps were followed:
• Compute the histogram of the grayscale image, which represents the distribution of
pixel intensities.
• Normalize the CDF to the range of pixel intensities (usually 0 to 255) to obtain the
mapping function.
• Apply the mapping function to each pixel in the grayscale image to obtain the equal-
ized image.
3.Low-pass filtering smoothing: The image noise generated during fingerprint col-
lection was removed and the fingerprint images were smoothed. Fast Fourier transform
(FFT) was applied to the images. After the high-frequency part was eliminated, low-pass
filtered images were acquired through inverse Fourier transform.
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 11
Fingerprint Matching Chapter 4
include noise reduction, ridge thinning, ridge orientation estimation, and ridge frequency
estimation. Noise reduction techniques, such as Gaussian filtering or median filtering,
help remove unwanted noise while preserving important ridge information. Ridge thinning
algorithms aim to reduce the width of ridges to enhance their clarity and distinguishability.
Ridge orientation estimation techniques help determine the local ridge direction, which
is essential for subsequent feature extraction and matching processes. Ridge frequency
estimation techniques estimate the frequency of ridges, allowing for adaptive filtering and
analysis.
performing these preprocessing steps, fingerprint images are standardized and prepared
for subsequent feature extraction and matching algorithms. These steps help to improve
the accuracy and reliability of fingerprint matching systems by enhancing the quality and
consistency of the input fingerprint images.
1. Input Layer: Two fingerprint images are fed into the Siamese network as inputs.
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 12
Fingerprint Matching Chapter 4
3. Pooling Layers: Pooling layers follow the convolutional layers to reduce the dimen-
sionality of the feature maps. Common pooling techniques include max pooling or
average pooling.
4. Fully Connected Layers: Flattened features from the pooling layers are passed
through fully connected layers. These layers learn high-level representations by com-
bining the local features.
5. Contrastive Loss Layer: The outputs of the fully connected layers from both sub-
networks are concatenated. This concatenated representation is passed through a
contrastive loss layer, which measures the similarity between the feature representa-
tions of the two input fingerprint images.
6. Output Layer: The output layer produces a similarity score or distance metric that
quantifies the similarity or dissimilarity between the input fingerprint images.
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 13
Fingerprint Matching Chapter 4
• Batch size = 32
• Epochs = 15
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 14
Chapter 5
Datasets
15
Chapter 6
A compatibility test was conducted to evaluate the proposed fingerprint database’s com-
patibility with conventional fingerprint recognition systems. The conventional Galton al-
gorithm was applied to the preprocessed image database proposed in this research.
The results of the compatibility test indicated that the proposed database was com-
patible with the conventional system. The targeted system, which featured the generated
database, demonstrated successful integration and compatibility.
This compatibility test confirms that the proposed fingerprint database can be effec-
tively utilized with existing fingerprint recognition systems, ensuring seamless integration
and interoperability.
A total of 3,826 fingerprint images of 66 different fingerprints were used to train the net-
work. The network was trained five times consecutively to ensure robustness and improve
the overall accuracy. However, it should be noted that the accuracy could potentially
befurther improved by including a larger amount of data in the training database.
The fingerprint images used in the detection program were distinct from those in the
training database. A total of 82 fingerprint images belonging to 10 different fingerprints
were used for fingerprint detection. These images had undergone the same preprocessing
and binarization steps described earlier to enhance testing efficiency and ensure compati-
bility with the detection program.
16
Fingerprint Matching Chapter 6
To facilitate organization and retrieval, fingerprint images of the same kind in the
database were placed in the same folder. This arrangement allows for easier management
and enables efficient access to specific fingerprint classes during the detection process.
6.2 Analysis
in this section, we present the analysis of the fingerprint matching system based on the
proposed methodology.
The performance of the fingerprint matching system was assessed using various met-
rics,including accuracy, precision, recall, and receiver operating characteristic (ROC) curves.
The accuracy metric measures the overall correctness of the system in identifying matching
and non-matching fingerprint pairs. Precision reflects the proportion of correctly identified
matches out of all positive predictions, while recall represents the proportion of true evalu-
ate accurately identify matching pairs while minimizing false positives and false negatives.
6.3 Advantages
Our fingerprint matching system offers several advantages over traditional methods. Firstly,
it eliminates the need for manual minutiae extraction, reducing the processing time and
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 17
Fingerprint Matching Chapter 6
improving efficiency. Secondly, the use of Siamese network architecture allows for improved
feature representation and robust matching, resulting in higher accuracy rates. Further-
more, the system can handle partial fingerprints and is less sensitive to variations in image
quality, making it more versatile in real-world scenarios.
6.4 Limitations
Despite its strengths, our fingerprint matching system has certain limitations. Firstly, the
performance may degrade when handling low-quality or distorted fingerprint images, as
it heavily relies on the quality of input data. Secondly, the system may struggle with
matching fingerprints from individuals with severe skin conditions or unique patterns that
deviate from the norm. Additionally, the system’s performance may vary across different
fingerprint databases, requiring database-specific fine-tuning.
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 18
Fingerprint Matching Chapter 6
Overall, our fingerprint matching system has shown promising results, but there are still
opportunities for further evaluation, enhancement, and future research to address existing
limitations and push the boundaries of fingerprint recognition technology.
Department of Computer Science and Engineering(AI & ML), SCEM, Mangaluru Page 19
Chapter 7
In this study, we developed a fingerprint matching system using a Siamese network and
evaluated its performance. The system achieved a high accuracy rate in identifying match-
ing fingerprint pairs and showed robust performance across various evaluation metrics,
including accuracy, precision, recall, and ROC curves. The utilization of a Siamese net-
work allowed for direct learning of discriminative features fromfingerprint images, resulting
in improved accuracy and robustness compared to traditionalfeature-based methods. Addi-
tionally, data augmentation techniques, such as image rotation, enhanced the adaptability
and generalization capability of the system, enablingaccurate matching across different
variations in fingerprint patterns. The proposed fingerprint database demonstrated com-
patibility with existing recognition systems, facilitating seamless integration into real-world
applications without significant modifications.
The fingerprint matching project provides several key benefits. Firstly, it enhances
security measures by enabling accurate identification and verification of individuals based
on their fingerprints. This enhances access control and authentication systems, ensuring
reliable and secure operations. Secondly, the system offers a fast and efficient solution for
biometric identification tasks, improving the speed and accuracy of matching individuals
against large databases. This efficiency is valuable in various domains, including law
enforcement, border control, and secure facility access. Lastly, the system contributes to
forensic investigations by aiding in the identification of suspects and providing critical
20
References
[7] V. Sagar, D. Ngo, and K. Foo, “Fuzzy feature selection for fingerprint identification,”
in Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995
International Carnahan Conference on Security Technology, pp. 85–90, IEEE, 1995.
21
[9] M.-H. Ghassemian, “A robust on-line restoration algorithm for fingerprint segmen-
tation,” in Proceedings of 3rd IEEE International Conference on Image Processing,
vol. 2, pp. 181–184, IEEE, 1996.
[10] D. P. Mital and E. K. Teoh, “An automated matching technique for fingerprint identi-
fication,” in Proceedings of 1st International Conference on Conventional and Knowl-
edge Based Intelligent Electronic Systems. KES’97, vol. 1, pp. 142–147, IEEE, 1997.
[12] A. Jain, L. Hong, and R. Bolle, “On-line fingerprint verification,” IEEE transactions
on pattern analysis and machine intelligence, vol. 19, no. 4, pp. 302–314, 1997.
[13] A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, “Fingercode: a filterbank for fin-
gerprint representation and matching,” in Proceedings. 1999 IEEE Computer Society
Conference on Computer Vision and Pattern Recognition (Cat. No PR00149), vol. 2,
pp. 187–193, IEEE, 1999.
[15] C.-J. Lee and S.-D. Wang, “A gabor filter-based approach to fingerprint recognition,”
in 1999 IEEE Workshop on Signal Processing Systems. SiPS 99. Design and Imple-
mentation (Cat. No. 99TH8461), pp. 371–378, IEEE, 1999.
[16] M. Horton, P. Meenen, R. Adhami, and P. Cox, “The costs and benefits of using
complex 2-d gabor filters in a filter-based fingerprint-matching system,” in Proceedings
of the Thirty-Fourth Southeastern Symposium on System Theory (Cat. No. 02EX540),
pp. 171–175, IEEE, 2002.
[17] L. Sha, F. Zhao, and X. Tang, “Improved fingercode for filterbank-based fingerprint
matching,” in Proceedings 2003 International Conference on Image Processing (Cat.
No. 03CH37429), vol. 2, pp. II–895, IEEE, 2003.
[18] A. Jain, A. Ross, and S. Prabhakar, “Fingerprint matching using minutiae and texture
features,” in Proceedings 2001 International Conference on Image Processing (Cat.
No. 01CH37205), vol. 3, pp. 282–285, IEEE, 2001.
22
[19] S. Wang and Y. Wang, “Fingerprint enhancement in the singular point area,” IEEE
signal processing letters, vol. 11, no. 1, pp. 16–19, 2004.
[20] F. You, Y. Shi, and P. Engler, “Fingerprint pattern recognition for medical uses-a
frequency domain approach,” in 1993 IEEE Annual Northeast Bioengineering Con-
ference, pp. 176–177, IEEE, 1993.
23