Fingerprint Recognition and its Advanced Features

--- Fingerprint recognition is one of the most popular and successful methods used for person identification, which takes advantage of the fact that the fingerprint has some unique characteristics called minutiae; which are points where a curve track finishes, intersect with other track or branches off. using fingerprints patterns are called AFIS (Automatic Fingerprint Identification System). Fingerprint Recognition is one of the research hot spots in Biometric. It refers to the automated method of verifying a match between two human fingerprints. It is essentially a challenging pattern recognition problem where two competing error rates: the False Accept Rate (FAR) and the False Reject Rate (FRR) need to be minimized. Advancement of computing capabilities led to the development of Automated Fingerprint Authentication Systems (AFIS) and this led to extensive research especially in the last two decades. In this paper, we attempt to give a comprehensive scoping of the fingerprint recognition problem and address its major design and implementation issues as well as give an insight into its future prospects.

INTRODUCTION Along of various biometrics techniques, In the past few decades human-beings have been addicted to various technologies such as captured photos, scanned signatures, bar code systems, verification Id & so on. Also, Biometrics is one of the applications in Image processing which refers to technologies that used physiological or behavioral characteristics of human body for the user authentication. The biometric authentication system based on two modes: Enrolment and Recognition. In the enrolment mode, the biometric data is acquired from the sensor and stored in a database along with the person's identity for the recognition. In the recognition mode, the biometric data is re-acquired from the sensor and compared to the stored data to determine the user identity. Biometric recognition based on uniqueness and permanence. The uniqueness means that there is no similarity of feature between two different biometrics data. For example, there are no two humans having the same fingerprint feature even if they are twins. And when the features of biometrics do not change over the lifetime or aging, it is called permanence. Biometrics can have physiological or behavioral characteristics. The physiological characteristics are included in the physical part of body such as (fingerprint, palm print, iris, face, DNA, hand geometry, retina... etc).
The behavioral characteristics are based on an action taken by a person such as (Voice recognition, keystroke-scan, and signature-scan). Any biometrics system including two phases first phase is enrollment phase and second is recognition phase. The recognition phase divided to two things which is verification and identification. During the enrollment phase the biometrics data are captured and generate digital image then Pre-processingapply to digital image for removing unwanted data and apply the postprocessing than store this data in database.In the case of identification process the fingerprint acquired from one person is compared with all the fingerprints which store in database. Also it is known as (1:N) matching. it is used in the process of seeking the criminals.In the verification process the person's fingerprint is verified from the database by using matching algorithms. Also it is known as (1:1) Matching. It is the comparison of a claimant fingerprint against enroll fingerprint, initially the person enrolls his/her fingerprint into verification system, and the result show whether the fingerprint which take from the user is matching with the fingerprint store as a template in database or not match. The Enrollment, Identification and Verification process shown in the Fig.1.Process of Enrollment, identification and verification The fingertip surface is a combination of many of ridges and many of valleys. The fingertip surface is a combination of many of ridges and many of valleys. In case of the ridge which declare as black lines and the valleys declare as white lines are show in Fig.2. The minutiae points are the points where the ridge structure changes such as bifurcation and end point. Now a day old security methods password is not accurate and outstanding to protect individual belongings therefor for this purpose used biometrics recognition system.

II.
FINGERPRINT Fingerprints are graphical patterns of ridges and valleys on the surface of fingertips, the ridge ending and ridge bifurcation is called minutiae as shown in fig.3. There are many methods based on minutiae-based fingerprint representation were proposed in [1], [2]. Every person has a unique fingerprint from any other person. The fingerprint identification is based on two basic assumptions: -In variance and Singularity In variance: means the fingerprint characteristics do not change along the life. Singularity: means the fingerprint is unique and no two persons have the same pattern of fingerprint.  The location where a ridge comes to an end.

Bifurcation
The location where a ridge divides into two separate ridges. 3 Binarization a process to transform the image from 256 levels to two levels(0,1)refers to (black and white) respectively 4 Thinning The process of reducing the width of each ridge to one pixel .

Termination
Considered as angle between the direction of the Angle ridge and the horizontal . 6 Bifurcation Which Considered as the angle between the Angle direction of the valley ending between the bifurcations and the horizontal. 7 Matching Score It is the mesure of similarity between the input and template data 8 False Non The system fail to detect a match between input Matching Ratio and template in database .

III. FINGERPRINT RECOGNITION SYSTEM
Now a day old security methods password is not accurate and outstanding to protect individual belongings therefor for this purpose used biometrics recognition system. Fingerprints is a consolidation of many ridges and many valleys on the surface of fingerprints ridges are declare as black lines shown in Figure   1 and valley declare as white lines [27][28][29][30]. Biometrics of human is splatted into two categories 1 behavior of biometrics 2 physiological biometrics. Every human has its own biometrics characteristics and can be identifying through these characteristics. Fingerprints biometrics system has four basic process or internships that are: collection, extraction, comparison decision or validation or identification fingerprints recognition system (FRS) requires a comparison or match of his/her fingerprints with the fingerprints in the database to indicate individuals in the storage [30]. Another major purpose of the system is to be used as a security device [31]. In 1899 galton first time explored the feasibility of using fingerprints Recognition system for identifying newborn children it was also possible to use fingerprints to recognize children of 2.5 year age Automated fingerprints identification system (AFIS) are widely used method for authentication (1:1 match) or identification and duplication 1: N search of individuals 1 and now prevalent around the globe providing and accurate. In modern society fingerprints recognition system is the ability to reliably identify individuals'. A much important application like computer security, financial transaction international border crossing and forensics. A. WORKING ANDFEATURE Fingerprints recognition system is a widely used application and becomes popular and update by the time because manually checking the identity of a person. In the market many techniques are introduced for the recognition with the perspective of human behavior. Biometrics gives us high security that is the reason persistently used for many years and this technique is very simple and easy to use. Biometrics is considering a powerful approach because our ridge and valley surface of fingerprints cannot change and remain the same through a lifetime. Fingerprint recognition is being used for the identification at the several departments as the system security is considered as International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 http://www.ijert.org the most important factor at any department of information and technology. Initially the user gets register with the system in which the user will provide the basic and personal information which will be required by the system and also the user will provide the thumb impression to the hardware interface which will store the finger print image as well the other information about the user into the database. After the procedure of the registration, the user will only put the finger at the hardware interface; the system will allow the user to get logged in to the system (Figure 4).

B. STEPS FOR RECOGNIZING A IMAGE
Capture image/Image acquisition: It's a very first step, in this stage capture the fingerprint through digital sensors look very blur and noisy because the quality of image is not upright [30].The Image Acquisition stage is the process to obtain images by different ways. There are two ways to capture fingerprint image; online and offline. In the online fingerprint identification the optical fingerprint reader is used to capture the image of fingerprint. The size of fingerprint image will be 260*300 pixels. The offline fingerprint identification is obtained by ink in the area of finger and then put a sheet of white paper on the fingerprint and finally scans the paper to get a digital image.
Pre-processing: In the second step make the quality of image better by applying the worth full algorithm, which remove all the damage area appear on the fingerprint such as noisy, missing minutiae, blur etc. and convert it into a high quality image. In high quality image ridge and valleys are properly recognize [30].The pre-processing stage is the process of removing unwanted data in the fingerprint image such as noise, reflection .etc. The fingerprint image pre-processing is used to increase the clarity of ridge structure.Yun and Cho [6] in this work they adaptive preprocessing method on fingerprint image and extracts five features from it. and they used clustering method for analyses image quality, and enhance it by their characteristics. This is what pre-processing is performed after distinguishing the fingerprint image quality related to its characteristics. Feature extraction:The feature extraction process of fingerprint image applied on the output of pre-processing stage. The process of feature extraction depends on set of algorithms. A fingerprint feature extraction program is to locate, measure and encode ridge endings and bifurcations in the fingerprint. There are various methods for extracting the features from the fingerprint image. The famous methods is minutiae extraction algorithm which is find the minutiae points and map their relative placement on the fingerprint .There are two types of minutiae points; Ridge ending and Ridge bifurcation [7]. In [8] they are used an advanced method for extract feature from fingerprint which done by extract minutiae directly from original gray-level images without use binarization and thinning and they use gabor filter methods to extract features from fingerprint. In this step identify the different features of fingerprint. Feature Extraction relies on three levels such as Level 1: Global Level (identify the delta, whorl, and loop), Level 2: Local Level (check the out of order ridges in most minutiae form. Level 2 worked on Bifurcation, ridge ending, Lake, and Crossover). Level 3: Very Fine Level (work on sweet and white pores detected) [30].

Pattern Recognition (PR):
In fourth step firstly divide PR into two categories (i) Decision Theoretic: In this step quantitative descriptor work with patterns such as texture, area, length. (ii) Structural: Relational descriptor describe by qualitative descriptor that also focus on patterns [30] ( Figure 6). Most of the enterprises are using the services of fingerprint recognition for the login purpose because the assigning of privileges was a bit difficult in previous technologies. The fingerprint recognition services enables the multiple enterprises where the entrepreneurs can integrate the proper privileges of the system. According to the latest researches, the voting systems should be implemented using the algorithms of finger prints which are less costly as there are a lot of issues about the riggings in the general elections of several countries, so the integration E-voting systems should be most optimized as well as the integrated system should also be based on the correct identification which should be considered as the future work in the field of internet of things and system security (Figure7).
Matching stage:-The matching stage is the process to compare the acquired feature with the template in the database. In other words the process of matching stage is to calculate the degree of similarity between the input test image (for user when he wants to prove his/her identity) and a training image from database (the template which created at the time of enrolment). Matching can be done in three methods: hierarchical approach, classification approach and Coding approaches. The hierarchical approach is increases matching speed at the cost of accuracy [14].Classification approaches assign a class to each biometric in a database. There are many classification methods including KNN classifier [15].  It is unique and can never be same for twopersons. c) It is the most economical technique. d) It is easy to use e) Use of small storage space V. APPLICATIONS OF FINGERPRINT IDENTIFICATION: a. To identify criminals in crime scenes. It was one of major reasons for development of this technology by FBI in USA. b. To identify members of an organization. It helps improves security such that only authenticated persons can enter the secured area and not any other members. c. In Grocery stores to automatically recognize and bill a registered user's credit card or debit card.

VI. CONCLUSION
This paper give us an overview of fingerprints recognition system Fingerprints is very accurate and reliable technique.
Fingerprints recognition system widely used in identification tool and biometrics applications. Biometrics give us high security that is the reason persistently used for many years. We briefly describe the method, approaches and algorithm (indexing algorithm used for efficient search of growing size of fingerprints of fingerprints recognition system. We also discussed the steps metropolitan police started the use of biometrics for identification In 1901 in the UK first stage is acquisition stage or capture, preprocessing (remove the noisy and unwanted data) feature extraction and matching stage for fingerprints recognition purpose with the help of some previous research in detail.
In addition we highlighted some security issue which occur in fingerprints approach like spoof attack for this purpose we used fingerprint domain knowledge by extracting local patches centered and aligned using minutiae approach. This approach is able to achieve the significant results. Some basics factors also affecting the fingerprints like age and gender. Finally, the above discussion and result indicate that Fingerprints Recognition System (FRS) is very good accurate efficient and easy to use technique some problem may occur but these problem can be overcome with the passage oftime.