Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 431))

Abstract

In this paper authors focus on fingerprint recognition biometric systems used by mobile devices to unlock or to confirm user actions. Authors compare the existing fingerprint recognition algorithms and test their own algorithm on fingerprints database, which include changes in the structure as a result of physical damage. They also propose new selective attention algorithms, which help to detect the most sensitive to damage areas, and add it as step of fingerprint analyses for the fingerprint recognition procedures. They also propose a new algorithm, which does not require complex hardware systems, so it can be applied in mobile devices, which restrict unauthorized access to sensitive data or other user’s resources. The main goal of this work is to demonstrate the applicability of the developed algorithm for mobile devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ross, A., Nandakumar, K., Jain, A.K.: Handbook of multibiometrics (International Series on Biometrics). Springer, Berlin (2011)

    Google Scholar 

  2. Jain, A.K., Ross, A., Nandakumar, K.: Introducing to biometrics. Springer, Berlin (2011)

    Book  Google Scholar 

  3. Wayman, J.L., Jain, A.K., Maltoni, D., Maio, D.: Biometric systems. Technology, design and performance evaluation, 1st edn. Springer, Berlin (2005)

    Google Scholar 

  4. Hicklin, A., Watson, C., Ulery, B.: How many people have fingerprints that are hard to match, NIST interagency report 7271 (2005)

    Google Scholar 

  5. Ratha, N.K., Govindaraju, V.: Advances in biometrics: Sensors, algorithms and systems. Springer, Berlin (2007)

    Google Scholar 

  6. Chikkerur, S., Govindaraju, V., Cartwright, E.: K-plet and coupled BFS: A graph based fingerprint representation and matching algorithm. LNCS, pp. 309–315 (2006)

    Google Scholar 

  7. Grzeszyk, C.: Forensic fingerprint examination marks. Wydawnictwo Centrum Szkolenia Policji, Legionowo (1992). (in Polish)

    Google Scholar 

  8. He, Y., Ou, Z.: Fingerprint matching algorithm based on local minutiae adjacency graph. J. Harbin Inst. Technol. 10(05), 95–103 (2005)

    Google Scholar 

  9. Ross, A., Dass, S.C., Jain, A.K.: A deformable model for fingerprint matching. Pattern Recogn. 38(1), 95–103 (2005)

    Article  Google Scholar 

  10. Pankanti, S., Prabhakar, S., Jain, A.K.: On the individuality of fingerprints. In: Proceedings of Computer Vision and Pattern Recognition (CVPR) (2001)

    Google Scholar 

  11. Bazen, A.M., Gerez, S.H.: Fingerprint matching by thinplate spline modelling of elastic defromations. Pattern Recogn. 35, 1859–1867 (2003)

    Article  Google Scholar 

  12. Bebis, G., Deaconu, T., Georgiopoulos, M.: Fingerprint identification using delaunay triangulation. In: IEEE ICIIS, pp. 452–459 (1999)

    Google Scholar 

  13. Parziale, G., Niel, A.: A fingerprint matching using minutiae triangulation. In: Proceedings of ICBA (2004)

    Google Scholar 

  14. Cappelli, R., Lumini, A., Maio, D., Maltoni, D.: Fingerprint classification by directional image partitioning. IEEE Trans. Pattern Anal. Mach. Intell. 21(5), 402–421 (1999)

    Article  Google Scholar 

  15. Szczepanik, M., Szewczyk, R.: Fingerprint identification algorithm (in Polish). KNS 1, 131–136 (2008)

    Google Scholar 

  16. Indovina, M., Uludag, U., Snelick, R., Mink, A., Jain, A.: Multimodal biometric authentication methods: A COTS approach. In: Proceedongs of MMUA (2003)

    Google Scholar 

  17. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of fingerprint recognition, 2nd edn. Springer, Berlin (2009)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michał Szczepanik .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Szczepanik, M., Jóźwiak, I.J., Jamka, T., Stasiński, K. (2016). Security Lock System for Mobile Devices Based on Fingerprint Recognition Algorithm. In: Świątek, J., Borzemski, L., Grzech, A., Wilimowska, Z. (eds) Information Systems Architecture and Technology: Proceedings of 36th International Conference on Information Systems Architecture and Technology – ISAT 2015 – Part III. Advances in Intelligent Systems and Computing, vol 431. Springer, Cham. https://doi.org/10.1007/978-3-319-28564-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-28564-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-28562-7

  • Online ISBN: 978-3-319-28564-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics