International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 102

Survey Paper | Information Technology | India | Volume 3 Issue 10, October 2014


A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M


Abstract: Fingerprints are the most common authentic biometrics for personal identification, especially for forensic security. A minutiae matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. For Fingerprint thinning, the block filter is used, which scans the image at the boundary to preserves the quality of the image and extract the minutiae from the thinned image. FPR provides reliable and better performance than the existing technique. The False Matching Rate (FMR) is better compared to the existing algorithm. Usually a technique called minutiae matching is used to be able to handle automatic fingerprint recognition with a computer system


Keywords: Fingerprint Recognition, Block Filter Method, Minutiae extraction, False Matching Ratio FMR, False Non Matching Ratio FNMR


Edition: Volume 3 Issue 10, October 2014,


Pages: 607 - 611


How to Cite this Article?

Annapoorani. D, Caroline Viola Stella Mery. M, "A Survey Based on Fingerprint Recognition - Minutiae", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=OCT14266, Volume 3 Issue 10, October 2014, 607 - 611

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Minutiae extraction'

Downloads: 112

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

Downloads: 133

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article

Similar Articles with Keyword 'Fingerprint'

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Downloads: 105

Survey Paper, Information Technology, India, Volume 4 Issue 2, February 2015

Pages: 1307 - 1311

A Survey on Authentication Techniques and User Recognition

Vyanktesh Dorlikar, Anjali Chandavale

Share this Article

Similar Articles with Keyword 'Recognition'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 2 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'Block'

Downloads: 50

Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020

Pages: 881 - 889

Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya

Kanuku Musyoku, Shitanda Douglas, Nganu Margaret

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1465 - 1469

PTP Method in Network Security for Misbehavior Detection Using Entropy

Neha Pathak, R. S. Apare

Share this Article

Similar Articles with Keyword 'Filter'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 102

Research Paper, Information Technology, India, Volume 5 Issue 7, July 2016

Pages: 1920 - 1924

Improving Stability, Smoothing and Diversifying of Recommender Systems

Sagar Sontakke, Pratibha Chavan

Share this Article

Similar Articles with Keyword 'Method'

Downloads: 180 | Monthly Hits: ⮙1

Research Paper, Information Technology, Afghanistan, Volume 8 Issue 9, September 2019

Pages: 235 - 240

IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan

Hazrat Mohammad Wahdaty

Share this Article

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Similar Articles with Keyword 'Minutiae'

Downloads: 112

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

Downloads: 133

Research Paper, Information Technology, India, Volume 3 Issue 2, February 2014

Pages: 397 - 401

Encryption of Text Using Fingerprints

Abhishek Sharma, Narendra Kumar

Share this Article

Similar Articles with Keyword 'extraction'

Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 955 - 961

Fake Text Identification using Feature Extraction

Peketi Yamini

Share this Article

Downloads: 98

Research Paper, Information Technology, China, Volume 3 Issue 6, June 2014

Pages: 1443 - 1445

Image Based Object Recognition from a Database

Deogratias Mzurikwao

Share this Article

Similar Articles with Keyword 'False'

Downloads: 3

Research Paper, Information Technology, Sierra Leone, Volume 10 Issue 9, September 2021

Pages: 105 - 109

The Unethical Use of the Social Media and its Effect on the People of Sierra Leone

Edmund Benedict Amara

Share this Article

Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 955 - 961

Fake Text Identification using Feature Extraction

Peketi Yamini

Share this Article

Similar Articles with Keyword 'Matching'

Downloads: 105

Survey Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2849 - 2851

A Survey on Secure Mechanism for Wireless Sensor Networks

Tabbasum Sajjan Magdum, Y.B.Gurav

Share this Article

Downloads: 112

Research Paper, Information Technology, India, Volume 3 Issue 4, April 2014

Pages: 418 - 421

Encryption of Text Using Fingerprints as Input to Various Algorithms

Abhishek Sharma, Narendra Kumar

Share this Article

Similar Articles with Keyword 'Ratio'

Downloads: 180 | Monthly Hits: ⮙1

Research Paper, Information Technology, Afghanistan, Volume 8 Issue 9, September 2019

Pages: 235 - 240

IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan

Hazrat Mohammad Wahdaty

Share this Article

Downloads: 0

Research Paper, Information Technology, India, Volume 10 Issue 10, October 2021

Pages: 1313 - 1318

Automation in Daily Life & It's Impact on Individuals & Society

Hemant Gautam Bodhare

Share this Article

Similar Articles with Keyword 'Non'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article
Top