Fingerprint recognition using matlab
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 1
Joined: Sep 2010
16-09-2010, 01:21 PM

Hello members,
I am Ade & am in my final year B-tech(Electronics & Communication) and i decided to do my final-year project and implimentation on 'Fingerprint recognition Using Matlab' or 'Simulation of bluetooth data transfer using matlab'.

However,i do not have much of an idea about the various technologies required in these project and implimentations like though matlab is a very vast programming language but what are the areas i should focus more.

It would be a great help if anyone can give me any information about these project and implimentations and also any related content in the web,which can help me.

Eagerly waiting....
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
30-10-2010, 02:15 PM

Please visit the below given thread for more details

Thinking To Register

08-03-2012, 11:10 PM

hello sir/mam....
am doing my msc project and implimentations.I choosen the fingerprints recognition using matlab topic and i need full information and source code about this topic.. can u help me please........
seminar paper
Active In SP

Posts: 6,455
Joined: Feb 2012
09-03-2012, 09:48 AM

to get information about the topic Fingerprint recognition using matlab related topic refer the link bellow

seminar flower
Super Moderator

Posts: 10,120
Joined: Apr 2012
10-08-2012, 11:59 AM

Fingerprint Recognition using MATLAB

.pdf   fingerprintrecognition.pdf (Size: 1.74 MB / Downloads: 199)


Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. The goal of this project and implimentation is to develop a complete system for fingerprint verification through extracting and matching minutiae. To achieve good minutiae extraction in fingerprints with varying quality, preprocessing in form of image enhancement and binarization is first applied on fingerprints before they are evaluated. Many methods have been combined to build a minutia extractor and a minutia matcher. Minutia-marking with false minutiae removal methods are used in the work. An alignment-based elastic matching algorithm has been developed for minutia matching.


Personal identification is to associate a particular individual with an identity. It plays a critical role in our society, in which questions related to identity of an individual such as “Is this the person who he or she claims to be?”, “Has this applicant been here before?”, “Should this individual be given access to our system?” “Does this employee have authorization to perform this transaction?” etc are asked millions of times every day by hundreds of thousands of organizations in financial services, health care, electronic commerce, telecommunication, government, etc. With the rapid evolution of information technology, people are becoming even more and more electronically connected. As a result, the ability to achieve highly accurate automatic personal identification is becoming more critical.


In the world of computer security, biometrics refers to authentication techniques that rely on measurable physiological and individual characteristics that can be automatically verified. In other words, we all have unique personal attributes that can be used for distinctive identification purposes, including a fingerprint, the pattern of a retina, and voice characteristics. Strong or two-factor authentication—identifying oneself by two of the three methods of something you know (for example, a password), have (for example, a swipe card), or is (for example, a fingerprint)—is becoming more of a genuine standard in secure computing environments. Some personal computers today can include a fingerprint scanner where you place your index finger to provide authentication. The computer analyzes your fingerprint to determine who you are and, based on your identity followed by a pass code or pass phrase, allows you different levels of access. Access levels can include the ability to open sensitive files, to use credit card information to make electronic purchases, and so on.

How Biometric Technologies Work

The enrollment module is responsible for enrolling individuals into the biometric system. During the enrollment phase, the biometric characteristic of an individual is first scanned by a biometric reader to produce a raw digital representation of the characteristic. In order to
facilitate matching, the raw digital representation is usually further processed by feature extractor to generate a compact but expensive representation, called a template.
Depending on the application, the template may be stored in the central database. Depending on the application, biometrics can be used in one of two modes: verification or identification. Verification—also called authentication—is used to verify a person’s identity—that is, to authenticate that individuals are who they say they are. Identification is used to establish a person’s identity—that is, to determine who a person is. Although biometric technologies measure different characteristics in substantially different ways, all biometric systems start with an enrollment stage followed by a matching stage that can use either verification or identification.


In enrollment, a biometric system is trained to identify a specific person. The person first provides an identifier, such as an identity card. The biometric is linked to the identity specified on the identification document. He or she then presents the biometric (e.g., fingertips, hand, or iris) to an acquisition device. The distinctive features are located and one or more samples are extracted, encoded, and stored as a reference template for future comparisons. Depending on the technology, the biometric sample may be collected as an image, a recording, or a record of related dynamic measurements. How biometric systems extract features and encode and store information in the template is based on the system vendor’s proprietary algorithms. Template size varies depending on the vendor and the technology. Templates can be stored remotely in a central database or within a biometric reader device itself; their small size also allows for storage on smart cards or tokens.


In verification systems, the step after enrollment is to verify that a person is who he or she claims to be (i.e., the person who enrolled). After the individual provides an identifier, the biometric is presented, which the biometric system captures, generating a trial template that is based on the vendor’s algorithm. The system then compares the trial biometric template with this person’s reference template, which was stored in the system during enrollment, to determine whether the individual’s trial and stored templates match.
Verification is often referred to as 1:1 (one-to-one) matching. Verification systems can contain databases ranging from dozens to millions of enrolled templates but are always predicated on matching an individual’s presented biometric against his or her reference template. Nearly all verification systems can render a match–no-match decision in less than a second.

Matches Are Based on Threshold Settings

No match is ever perfect in either verification or identification system, because every time a biometric is captured, the template is likely to be unique. Therefore, biometric systems can be configured to make a match or no-match decision, based on a predefined number, referred to as a threshold, which establishes the acceptable degree of similarity between the trial template and the enrolled reference template. After the comparison, a score representing the degree of similarity is generated, and this score is compared to the threshold to make a match or no-match decision. Depending on the setting of the threshold in identification systems, sometimes several reference templates can be considered matches to the trial template, with the better scores corresponding to better matches.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  source code for home automation ac dc using tv remote using AT89S52 microcontroller Guest 5 2,302 29-08-2015, 03:40 PM
Last Post: mkaasees
  project and implimentation on fingerprint age determination using matlab Guest 4 1,497 18-09-2014, 03:30 PM
Last Post: Radhika.m
  implementation of video steganography using LSB technique in MATLAB d000304a 3 3,808 15-07-2014, 04:39 PM
Last Post: mkaasees
Exclamation car number plate recognition Guest 3 734 08-03-2014, 12:45 PM
Last Post: seminar project topic
Last Post: seminar project topic
  matlab code for face recognition raul_s 9 5,653 20-09-2013, 09:58 AM
Last Post: seminar projects maker
  face recognition using FPGA Guest 1 376 31-08-2013, 09:42 AM
Last Post: study tips
Wink echo cancellation using matlab Guest 1 376 26-08-2013, 10:00 AM
Last Post: study tips
  pattern recognition Guest 1 380 20-08-2013, 09:49 AM
Last Post: study tips
  Voice Recognition BasedWireless Home Automation System Guest 1 448 03-07-2013, 10:58 AM
Last Post: study tips