Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Identification of Unaided Person Using Finger Print Impression or Facial Recognition

Author : Pushkar Salve 1 Pranav Mankar 2 Rohan Kothawade 3 Hardik Parakh 4 Swati Khokale 5

Date of Publication :28th March 2018

Abstract: There have been various incidents of bombings or accidents resulting in the death of people or causing severe casualties. This makes recognizing people difficult. It becomes very hard to identify / recognize the individual and inform their respective family members. With the emerging technologies, there are various ways of identifying / recognizing a person. Image processing on smartphones has been trending since last few years. Besides it has been a new and exciting field with immense challenges because of limited hardware and connectivity problem. But new technologies has helped in overcoming these limitations. Also, the technologies have made Android-based smartphones the core of many applications. Various approaches like feature extraction for face recognition using DCT algorithm with RBF neural network or novel fingerprint impression matching approach that uses global minor matching and the Support Vector Machine (SVM) have been used for identification of any individual. The identification process will be done using this two techniques namely Facial Recognition and Fingerprint Impression which help in recognizing people. FingerPrint Impression technique lets us identify an individual by scanning their finger and recognize the person. Facial Recognition technique identifies any person by scanning his / her face. Identification of Unaided Person Using FingerPrint Impression or Facial Recognition is an Android system that will identify and recognize an unaided person and inform the family if needed. (DCT – Discrete Cosine Transform).

Reference :

    1. Rabia Jafri and Hamid R. Arabnia. A Survey of Face Recognition Techniques. DOI: 10.3745/JIPS.2009.5.2.041.
    2.  Anil K. Jain, Fellow, IEEE, Salil Prabhakar, Lin Hong, and Sharath Pankanti. Filterbank-Based Fingerprint Matching. May 2009.
    3. Lin Hong, Student Member, IEEE, Yifei Wan, and Anil Jain, Fellow, IEEE. Fingerprint Image Enhancement:Algorithm and Performance Evaluation. August 1998.
    4. Peter N. Belhumeur, João P. Hespanha, David J. Kriegman. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection. July 1997.
    5. Farah Fayaz Quraishi, Summera Ahsraf, Dr. Manzoor Ahmad Chachoo. Fingerprint FeatureExtraction, Identificationand Authentication: A Review. Month: October 2015 – March 2016.
    6. Anil Jain, Lin Hong, Ruud Bolle. An IdentityAuthentication System Using Fingerprints. September 1997.
    7. P. Jonathan Phillips, Patrick J. Flynn, Todd Scruggs, Kevin W. Bowyer, William Worek. Preliminary Face Recognition Grand Challenge Results. 2006.
    8. R. Brunelli and T. Poggio, “Face Recognition: Features versus Templates”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15, no. 10, (1993), pp. 1042-1052.
    9. W. Chen, T. Sun, X. Yang and L. Wang, “Face detection based on half face template”, Proceeding of the IEEE Conference on Electronic Measurement and Instrumentation, (2009), pp. 54-58.
    10. E. V. Fernandez, H. G. Pardo, D. G. Jimenez, L. P. Freire, “Built-in Face Recognition for Smart Photo Sharing in Mobile Devices,” IEEE International Conference on Multimedia July 2011.
    11. S. H. Lee, D. J. Kim, J. H. Cho, “Illumination-Robust Face Recognition System Based onz Differential Components,” IEEE Transactions on Consumer Electronics, Vol. 58 (3), 2012.
    12.  Wagner, A. Ganesh, “Toward a Practical Face Recognition System: Robust Alignment and Illumination by Sparse Representation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 34 (2), 2012.

Recent Article