By Topic

Re-TOF: Reconstructing Torn Offline Fingerprint

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Gupta, A. ; Dept. of Inf. Technol., NSIT, New Delhi, India ; Jain, V. ; Goyal, V.

Offline fingerprints find immense application in the fields of user authentication and criminal identification. But if an insider or a criminal gets unauthorized access to the printed database of fingerprints at a criminology department, then he might tamper or tear them. This may lead to loss of evidence, which could have been useful at the time of post-detection. We feel that no work has been carried out in stitching those torn off images without loss of any fingerprint features. To advocate this need, we introduce Re-TOF (reconstructing torn offline fingerprint), a novel technique of stitching such images which are cut portions of a fingerprint and do not have any overlap. Re-TOF exploits the similar features of the ridges that get cut while tearing off a fingerprint. Experimental evaluation on FVC 2002 database using FAR and FRR verifies the proposed Re-TOF technique.

Published in:

Methods and Models in Computer Science, 2009. ICM2CS 2009. Proceeding of International Conference on

Date of Conference:

14-15 Dec. 2009