skip to main content
10.1145/3459066.3459068acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmvaConference Proceedingsconference-collections
research-article

Touchless Fingerprint Recognition based on Hierarchical Clustering

Authors Info & Claims
Published:26 July 2021Publication History

ABSTRACT

Biometric verification and identification are being extensively used in real life applications as an access control mechanism. Among the various biometric verification techniques, fingerprint based recognition system is one the most commonly used practice. Since, the attacker may challenge the biometric security from touch based verification by illicit acquisition of user’s fingerprint from sensor. The proposed method uses agglomerative hierarchical clustering which utilizes the formation of clusters in the pre-processed fingerprint samples. Thereafter, cluster-based verification is performed with genuine and non-genuine samples by comparing the intra-cluster distances. Experiments which are carried out on the PolyU Contactless Fingerprint database confirm the efficacy of the proposed method. Though, the GAR of proposed approach is confirmed as 85.42% for the database. However, the proposed approach is comparable to the existing methods considering the security and privacy perspectives.

References

  1. P. Birajadar, M. Haria, P. Kulkarni, S. Gupta, P. Joshi, B. Singh, and V. Gadre. 2019. Towards smartphone-based touchless fingerprint recognition. Sādhanā 44(2019), 1–15.Google ScholarGoogle ScholarCross RefCross Ref
  2. R. Donida Labati, A. Genovese, V. Piuri, and F. Scotti. 2016. Toward Unconstrained Fingerprint Recognition: A Fully Touchless 3-D System Based on Two Views on the Move. IEEE Transactions on Systems, Man, and Cybernetics: Systems 46, 2(2016), 202–219.Google ScholarGoogle ScholarCross RefCross Ref
  3. B. Y. Hiew, A. B. J. Teoh, and Y. H. Pang. 2007. Touch-less Fingerprint Recognition System. In 2007 IEEE Workshop on Automatic Identification Advanced Technologies. 24–29.Google ScholarGoogle Scholar
  4. C. Jonietz, E. Monari, H. Widak, and C. Qu. 2015. Towards mobile and touchless fingerprint verification. In 2015 12th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS). 1–6.Google ScholarGoogle Scholar
  5. R. D. Labati, V. Piuri, and F. Scotti. 2011. A neural-based minutiae pair identification method for touch-less fingerprint images. In IEEE Workshop on Computational Intelligence in Biometrics and Identity Management. 96–102.Google ScholarGoogle Scholar
  6. C. Lin and A. Kumar. 2018. Matching Contactless and Contact-Based Conventional Fingerprint Images for Biometrics Identification. IEEE Transactions on Image Processing 27, 4 (2018), 2008–2021.Google ScholarGoogle ScholarCross RefCross Ref
  7. S. Prabhakar and A. K. Jain. 2002. Decision-level fusion in fingerprint verification. Pattern Recognition 35, 4 (2002), 861 – 874.Google ScholarGoogle ScholarCross RefCross Ref
  8. R. Tibshirani, G. Walther, and T. Hastie. 2001. Estimating the number of clusters in a data set via the gap statistic. Journal of the Royal Statistical Society: Series B 63, 2 (2001), 411–423.Google ScholarGoogle ScholarCross RefCross Ref
  9. K. Wang, J. Jiang, Y. Cao, X. Xing, and R. Zhang. 2016. Preprocessing Algorithm Research of Touchless Fingerprint Feature Extraction and Matching. In Pattern Recognition. Singapore, 436–450.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ICMVA '21: Proceedings of the 2021 International Conference on Machine Vision and Applications
    February 2021
    75 pages
    ISBN:9781450389556
    DOI:10.1145/3459066

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 26 July 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)16
    • Downloads (Last 6 weeks)4

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format