Fingerprint Authenication Using Graph Theory
Fingerprint Authenication Using Graph Theory
ISSN:2277-1581
01 May 2016
CSE,VIT University,Vellore,India
[email protected],[email protected],[email protected]
II. RELATED WORK
IJSET@2016
doi : 10.17950/ijset/v5s5/501
Page 225
ISSN:2277-1581
01 May 2016
doi : 10.17950/ijset/v5s5/501
Page 226
ISSN:2277-1581
01 May 2016
IV. CONCLUSION
This study described a new fingerprint matching technique based
on identifying the core of a fingerprint. To find out the core of the
fingerprint we are finding the curvature of the ridges. Since the
finger print matching technique is based on core of a fingerprint
so it can efficiently recognize the fingerprint even if the
IJSET@2016
i. http://www.biometrics.gov/documents/fingerprintrec.pdf
ii. Isenor, D. K. &Zaky, S. G.Fingerprint
identification
using
graph
matching
Pattern Recogn., Elsevier Science Inc., 1986, 19, 113-122
iii. Honglei Wei, ZongyingOu and Jianxin Zhang. Fingerprint
Identification based on Ridge Lines and Graph Matching.
iv. Weiwei Zhang, Yangsheng Wang. Core-Based Structure
Matching Algorithm of Fingerprint Verification.
v. Xudong Jiang and Wei-Yun Yau. Fingerprint Minutiae
Matching Based on the Local And Global Structures.
vi. Werner lz and Walter G. Kropatsch. Graph Representation
of Fingerprint Topology. In DanijelSkocaj, editor, Computer Vision CVWW'04, pages pp. 5158, Ljubljana, Slovenija, February 2004.
Slovenien Pattern Recognition Society.
vii. West, Douglas B. Introduction to Graph Theory; 2ndedition.
Prentice Hall: Upper Saddle River, NJ. 2001. pgs 89-94
viii. Xudong Jiang and Wei-Yun Yau. Fingerprint Minutiae
Matching Based on the Local And Global Structures.
ix. M. Gromov, Hyperbolic groups, in Essays in Group Theory, S.
M. Gersten (Ed.), M.S.R.I. Publications, Springer Verlag, New York,
1987, pp. 75-263.
x. Raymond, J. W. & Willett, P. Maximum
common
subgraph isomorphism algorithms for the matching of chemical
structures Journal of Computer-Aided Molecular Design, 2002, 16,
2002.
doi : 10.17950/ijset/v5s5/501
Page 227