56
ABSTRACT This project aims at introducing biometric capable technology for use in automating the entire examination registration system for the students pursuing courses at an educational institute. The goal can be disintegrated into finer sub-targets; fingerprint capture & transfer, fingerprint image processing and transfer of data in a server-client system. For each sub-task, various methods from literature are analyzed. From the study of the entire process, an integrated approach is proposed. Biometrics based technologies are supposed to be very efficient personal identifiers as they can keep track of characteristics believed to be unique to each person. Among these technologies, Fingerprint recognition is universally applied. It extracts minutia- based features from scanned images of 1

Biometric Exam Reg

Embed Size (px)

DESCRIPTION

report on Biometric Exam register

Citation preview

Page 1: Biometric Exam Reg

ABSTRACT

This project aims at introducing biometric capable technology for use in

automating the entire examination registration system for the students

pursuing courses at an educational institute. The goal can be disintegrated

into finer sub-targets; fingerprint capture & transfer, fingerprint image

processing and transfer of data in a server-client system. For each sub-task,

various methods from literature are analyzed. From the study of the entire

process, an integrated approach is proposed.

Biometrics based technologies are supposed to be very efficient personal

identifiers as they can keep track of characteristics believed to be unique to

each person. Among these technologies, Fingerprint recognition is

universally applied. It extracts minutia- based features from scanned images

of fingerprints made by the different ridges on the fingertips. The student’s

biometric exam registration system is very relevant in an institute like ours

since it aims at eliminating all the hassles of roll calling and malpractice and

promises a full-proof as well as reliable technique of keeping records of

student.

1

Page 2: Biometric Exam Reg

CHAPTER ONE

1.1 Introduction

1.1 Background of Study

The human body has the privilege of having features that are unique and

exclusive to each individual. This exclusivity and unique characteristic has

led to the field of biometrics and its application in ensuring security in

various fields. Biometrics has gained popularity and has proved itself to be a

reliable mode of ensuring privacy, maintaining security and identifying

individuals. It has wide acceptance throughout the globe and now is being

used at places like airports, hospitals, schools, corporate offices etc.

Biometrics is the very study of identifying a person by his/her physical traits

that are inherent and unique to only the person concerned. Biometric

measurement and assessment include fingerprint verification, iris

recognition, palm geometry, face recognition etc. The above mentioned

techniques work with different levels of functionality and accuracy.

Accuracy and reliability are the two most important parameters when it

comes to biometric applications. Fingerprint verification is one of the oldest

known biometric techniques known but still is the most widely used because

of its simplicity and good levels of accuracy.2

Page 3: Biometric Exam Reg

1.2 Objective of the Project

It’s a well known fact that every human being is born with a different pattern

on the fingers and this feature is exploited to identify and differentiate

between two different persons. The main objective this work is to build a

biometric exam registration and verification system based on the finger print

technology. The system will be capable of taking samples of the fingerprint of

students – a process called scanning; it will also process and store it in the

database alongside with the student’s passport photograph. During

examination every student is required to verify his/her identity before

granted access to the exam hall.

1.3 Justification for Study

The application in an educational institute is worth noting because of the

benefits it brings along with it. The fingerprint recognition and verification

technique can easily replace manual registration and save time wasted on

calling out roll numbers in the class during exams. A fingerprint detecting

device needs to be placed in the exam hall and students would be made to

swipe their finger over the sensor so as to verify their identity. The database

would contain all the fingerprints beforehand. So, the moment a finger would

be swiped, a check would be carried out with the existing database and the

3

Page 4: Biometric Exam Reg

corresponding student would get a present mark on his attendance record

maintained in a server.

The transfer of the fingerprint from the device to the server can be carried

out wirelessly using certain wireless adapters which can together form a

wireless network in a short range and carry out the verification process. The

communication channel needs to be secured and should be kept free from

interference as far as possible. For further security of the entire system and

to detect illegal activities, a security camera can be installed to keep track of

the enrollments made in the classroom.

4

Page 5: Biometric Exam Reg

CHAPTER TWO

2.0 History of Fingerprinting

There are records of fingerprints being taken many centuries ago, although

they weren't nearly as sophisticated as they are today. The ancient

Babylonians pressed the tips of their fingertips into clay to record business

transactions. The Chinese used ink-on-paper finger impressions for business

and to help identify their children.

5

Page 6: Biometric Exam Reg

Fig 2.0: Traditional fingerprinting required careful analysis to

match prints. George Skadding/Time Life Pictures/Getty Images

However, fingerprints weren't used as a method for identifying criminals

until the 19th century. In 1858, an Englishman named Sir William Herschel

was working as the Chief Magistrate of the Hooghly district in Jungipoor,

India. In order to reduce fraud, he had the residents record their fingerprints

when signing business documents.

A few years later, Scottish doctor Henry Faulds was working in Japan when

he discovered fingerprints left by artists on ancient pieces of clay. This

finding inspired him to begin investigating fingerprints. In 1880, Faulds

6

Page 7: Biometric Exam Reg

wrote to his cousin, the famed naturalist Charles Darwin, and asked for help

with developing a fingerprint classification system. Darwin declined, but

forwarded the letter to his cousin, Sir Francis Galton.

Galton was a eugenicist who collected measurements on people around the

world to determine how traits were inherited from one generation to the

next. He began collecting fingerprints and eventually gathered some 8,000

different samples to analyze. In 1892, he published a book called

"Fingerprints," in which he outlined a fingerprint classification system -- the

first in existence. The system was based on patterns of arches, loops and

whorls.

Meanwhile, a French law enforcement official named Alphonse Bertillon was

developing his own system for identifying criminals. Bertillonage (or

anthropometry) was a method of measuring heads, feet and other

distinguishing body parts. These "spoken portraits" enabled police in

different locations to apprehend suspects based on specific physical

characteristics. The British Indian police adopted this system in the 1890s.

Around the same time, Juan Vucetich, a police officer in Buenos Aires,

Argentina, was developing his own variation of a fingerprinting system. In

7

Page 8: Biometric Exam Reg

1892, Vucetich was called in to assist with the investigation of two boys

murdered in Necochea, a village near Buenos Aires. Suspicion had fallen

initially on a man named Velasquez, a love interest of the boys' mother,

Francisca Rojas. But when Vucetich compared fingerprints found at the

murder scene to those of both Velasquez and Rojas, they matched Rojas'

exactly. She confessed to the crime. This was the first time fingerprints had

been used in a criminal investigation. Vucetich called his system comparative

dactyloscopy. It's still used in many Spanish-speaking countries.

Sir Edward Henry, commissioner of the Metropolitan Police of London, soon

became interested in using fingerprints to nab criminals. In 1896, he added to

Galton's technique, creating his own classification system based on the

direction, flow, pattern and other characteristics of the friction ridges in

fingerprints. Examiners would turn these characteristics into equations and

classifications that could distinguish one person's print from another's. The

Henry Classification System replaced the Bertillonage system as the primary

method of fingerprint classification throughout most of the world.

In 1901, Scotland Yard established its first Fingerprint Bureau. The following

year, fingerprints were presented as evidence for the first time in English

8

Page 9: Biometric Exam Reg

courts. In 1903, the New York state prisons adopted the use of fingerprints,

followed later by the FBI.

2.1 Modern Fingerprinting Techniques

The Henry system finally enabled law enforcement officials to classify and

identify individual fingerprints. Unfortunately, the system was very

cumbersome. When fingerprints came in, detectives would have to compare

them manually with the fingerprints on file for a specific criminal (that's if

the person even had a record). The process would take hours or even days

and didn't always produce a match. By the 1970s, computers were in

existence, and the FBI knew it had to automate the process of classifying,

searching for and matching fingerprints. The Japanese National Police Agency

paved the way for this automation, establishing the first electronic

fingerprint matching system in the 1980s. Their Automated Fingerprint

Identification Systems (AFIS), eventually enabled law enforcement officials

around the world to cross-check a print with millions of fingerprint records

almost instantaneously.

9

Page 10: Biometric Exam Reg

Fig 2.2 A background and identity check fingerprint capture machine.

AFIS collects digital fingerprints with sensors. Computer software then looks

for patterns and minutiae points (based on Sir Edward Henry's system) to

find the best match in its database. The first AFIS system in the U.S. was

speedier than previous manual systems. However, there was no coordination

between different agencies. Because many local, state and federal law

enforcement departments weren't connected to the same AFIS system, they

couldn't share information. That meant that if a man was arrested in Phoenix,

Ariz. and his prints were on file at a police station in Duluth, Minn., there

might have been no way for the Arizona police officers to find the fingerprint

record. That changed in 1999, with the introduction of Integrated AFIS

(IAFIS). This system is maintained by the FBI's Criminal Justice Information

Services Division. It can categorize, search and retrieve fingerprints from 10

Page 11: Biometric Exam Reg

virtually anywhere in the country in as little as 30 minutes. It also includes

mug shots and criminal histories on some 47 million people. IAFIS allows

local, state and federal law enforcement agencies to have access to the same

huge database of information. The IAFIS system operates 24 hours a day, 365

days a year. But IAFIS isn't just used for criminal checks. It also collects

fingerprints for employment, licenses and social services programs (such as

homeless shelters). When all of these uses are taken together, about one out

of every six people in this country has a fingerprint record on IAFIS.

11

Page 12: Biometric Exam Reg

CHAPTER THREE

3.0 RESEARCH METHODOLOGY

Basically, the research on this work was done both on the internet and on

various computer and electrical/electronic textbooks including also some

other electronic circuit designing book. The fingerprint module was sourced

from online market, and after its arrival, the programing commenced. A

computer system was assembled to use in storing the database. More detail

of the work, its principle of operation and implementation are described

below.

3.1 Fingerprint Recognition

Once the fingerprint is captured, the next step is the recognition procedure.

The recognition procedure can be broadly sub grouped into

Fingerprint Identification and

Fingerprint Verification

Fingerprint identification refers to specifying one’s identity based on his

fingerprints. The fingerprints are captured without any information about

12

Page 13: Biometric Exam Reg

the identity of the person. It is then matched across a database containing

numerous fingerprints. The identity is only retrieved when a match is found

with one existing in the database. So, this is a case of one-to-n matching

where one capture is compared to several others. This is widely used for

criminal cases.

Fingerprint verification is different from identification in a way that the

person’s identity is stored along with the fingerprint in a database. On

enrolling the fingerprint, the real time capture will retrieve back the identity

of the person. This is however a one-to-one matching. This is used in

offices like passport offices etc. where the identity of a person has to be

checked with the one provided at a previous stage.

Fig 3.1: Verification Vs Identification

Irrespective of the procedure carried out, the fingerprint recognition has to

be such that the fingerprint is well- represented and retains its uniqueness

13

Page 14: Biometric Exam Reg

during the process. In the following pages, an approach to fingerprint

recognition has been discussed that will deal with the representation of the

same.

14

Page 15: Biometric Exam Reg

3.2 Approach to fingerprint recognition

The approach that we have concentrated on in recognition of the fingerprints

is the minutia based approach. In this approach the ridge bifurcations and

terminations are taken into consideration for analyzing each fingerprint. The

representation is based on these local features. The scanner system uses

highly complex algorithms to recognize and analyze the minutia. The basic

idea is to measure the relative portion of minutia. Simply, it can be thought of

as considering the various shapes formed by the minutia when straight lines

are drawn between them or when the entire image is divided into matrix of

square sized cells. If two fingerprints have the same set of ridge endings and

bifurcations forming the same shape with the same dimension, there’ s a

huge likelihood that they are of the same fingerprint. So, to find a match the

scanner system has to find a sufficient number of minutia patterns that the

two prints have in common, the exact number being decided by the scanner

programming.

3.3 FINGERPRINT IMAGE PROCESSINGThe fingerprint image is processed through a three step procedure. The

image undergoes pre-processing, minutia extraction and post-processing.

The three stages involve different steps and procedures which need to be

discussed in detail.

Pre-processing The pre-processing stage makes use of image

Page 16: Biometric Exam Reg

enhancement, image binarization and image segmentation.

3.4 Image Enhancement

Image enhancement is necessary to make the image clearer for further

operations. The fingerprint images obtained from sensors are not likely

to be of perfect quality. Hence, enhancement methods are used for

making the contrast between ridges and furrows higher and for

maintaining continuity among the false broken points of ridges, which

prove to ensure a higher accuracy for recognition of fingerprint. Generally

two types of procedures are adopted for image enhancement:

1) Histogram Equalization;

2) Fourier Transform.

Histogram Equalization

Histogram equalization is responsible for expanding the pixel

distribution of an image in order to increase perceptional improvement.

The pictorial description is given below. The fingerprint initially has a

bimodal type histogram as shown in fig 3.2. After histogram equalization is

carried out, the image occupies the entire range from zero to 255,

enhancing the visualization effect in the process.

Page 17: Biometric Exam Reg

Figure 3.2: (a)Fingerprint with original histogram

(b)After histogram equalization

Figure 3.3 Effect of Histogram equalization

Original Image Enhanced Image

Page 18: Biometric Exam Reg

3.3 Using

Fourier

Tansform

In this process of enhancement the image is divided into small processing

blocks (32 x 32 pixels) and Fourier transform is performed.

The function is as

follows:

For u= 0,1,2, … ,31 v=0,1,2, ….,31

For enhancing a particular block by its dominant frequencies, the FFT os

the block is multiplied by its magnitude a few times. Where the magnitude

of the FFT is given by abs F(u,v) = |F(u,v)|.

The enhanced block can be obtained as per

(2) , where the inverse of (F(u,v)) is

found by:

(3)

Page 19: Biometric Exam Reg

for x = 0, 1, 2, ..., 31 & y = 0, 1, 2, ..., 31 .

The k is a constant whose value has been experimentally found. Here, k is

chosen as 0.45. When k is higher, the ridges appear improved, since the

holes in the ridges are filled up, but at the same time a very high value

results in false ridge joining. Figure 3.4 depicts FFT enhanced image.

Figure 3.4 FFT enhanced fingerprint image (Source: Davide Maltoni, Dario

Maio, Anil K. Jain, Salil Prabhakar, Handbook of Fingerprint recognition)

Page 20: Biometric Exam Reg

Before Enhancement After Enhancement

The image after enhancement connects falsely broken points on the ridges

and removes spurious connections in between the ridges.

3.4 Image binarization

The original image is a 8-bit grayscale image. This process transforms the

original image into a 1-bit image that assigns values 0 for ridges and 1 for

furrows. After binarization, the ridges appear black while the furrows

appear white. Binarization changes the pixel value to 1 if the value is

found to exceed the mean intensity of the current block to which it

belongs.The figure clearly depicts the effect of binarization on a normal

grayscale image that has been only enhanced.

Figure 3.5 Effect of binarization

Page 21: Biometric Exam Reg

Binarized Image Gray image

Page 22: Biometric Exam Reg

3.5 Image segmentation

For a fingerprint image, only a certain portion is important which can

provide the required information and can be useful for further

processing. This portion is called the ROI or the region of interest. In this

process, the area without important ridges and furrows is discarded as it

holds only background information. After discarding those parts, the

boundary of the remaining area is sketched out to get a clearer picture that

is free from spurious minutia.

This process of segmentation is carried out in two steps. The first step is

block direction estimation and the next ROI extraction by morphological

methods. The details of the two steps are as follows.

3.5.1 Block direction estimation

The block direction for every block of the image is

estimated. The algorithm is:

i. Calculation of gradient values for x-direction (px) and y-

direction (py) for each pixel of the block using two Sober

filters.

ii. Obtaining Least Square Approximation of block direction

for each block using the following formula.

tp2ß = 2 ∑ ∑ (px*py)/∑ ∑ (px2-py2)

Page 23: Biometric Exam Reg

Considering the gradient values px and py as cosine value and sine

value respectively, the tangent value of block direction can be

estimated as given by the following

formula:

tp2θ = 2sinθcosθ /(cos2θ -sin2θ )

The blocks with insignificant information are discarded as

mentioned above using the following formula.

E = {2 ∑ ∑ (px*py)+ ∑ ∑ (px2-py2)}/ W*W*∑ ∑ (px2+py2)

If certainty level E is found to be less than a threshold, then it is

considered as a background block. A direction map is depicted in the

figure below.

Page 24: Biometric Exam Reg

Figure 3.5.1 Effect of block direction estimation

Page 25: Biometric Exam Reg

CHAPTER FOUR

4. SYSTEM DESIGN

The design of fingerprint based biometrics for Exam registration and

verification system can be divided into the three different modules. They

are-

Processor Module

Fingerprint Capture

PC based Server-Client Software Management Module

The module-wise approach to the design of the system helps in better

understanding of the individual function levels. Also, a parallel

approach to the system helps in distributing the effort on a multi-level

range and helps in identifying the best features and available products in

the market that suit the design requirements.

Page 26: Biometric Exam Reg

fig. 4.1 Block Diagram showing the various modules in the

System Design

4.1 Module Design

To view the system as an assemblage of sub-components helps in

simplifying the design problem. The three modules, i.e. Processor module,

Fingerprint Capture module form the Client Hardware Module. The

respective modules and their roles are explained below:

Processor Module: It forms the backbone of the system. It drives the

control logic behind every functionality, some of which are mentioned

below:

Page 27: Biometric Exam Reg

Power up and initialize itself and dependent modules. Check for interrupts,

faults while the modules get initialised. Command the fingerprint module to

function as requested by the software interface. Enable data transfer

through the wireless module.

Fig 4.1.1. A Digital Signal Processor (courtesy: www.rims.com.pk)

F ing er p r int C a ptu r e M o dul e(F C M ) : The fingerprint capture module is

essentially a fingerprint sensor. It is an electronic device that captures a

‘live scan’ of the fingerprint pattern. Then a number of processing

functions are applied to the scan and it is converted into a biometric

template. Generally optical sensors are used, even though ultrasonic and

capacitive sensors are also present.

Page 28: Biometric Exam Reg

Fig 4.1.2. A Fingerprint Sensor (courtesy: www.tradenote.net)

PC based Server-Client Software Management Module:

The entire system is run from control software. The software on the server

side consists of a database management and a GUI- based interactive Student

Attendance System. The client side software is loaded into each CHM and

governs the functioning of the CHM.

Page 29: Biometric Exam Reg

4.2 Algorithm Design

The software side of the design consists of implementing the

following functions:

• Fingerprint Capture

• Data Transfer

• Fingerprint Image Processing

• Updating the database and attendance sheets

• Maintenance of GUI to Student Registration/Verification System

DATA TRANSFER

After the fingerprint image has been processed, the data is to be transferred

to the central server through a channel. The data packet is to be coded into

an encrypted form due to the sensitive nature of the information it carries.

The data communicated to the server is broadly classified into two types:

• Enrol Data

• Daily Attendance Data

Enrol Data

This data is initially obtained when adding the new students to the

institute database. Along with Personal Identification Numbers (PIN),

student-specific data such as degree program, date of birth (DOB),

Page 30: Biometric Exam Reg

student picture & signature, the database is provided with a biometric

template consisting of a processed image of the fingerprint.

Once all the students are enrolled into the institute’s Student database

System, the semester work of each examiner is to verify the authenticity of

the candidates identity before allowed into the exam hall.

RESULT

Initial progress is mentioned below:

i. The DSP starter kit TMS320C6713 and the Daughter card

AFS8500/8600 were tested for proper functioning. The two were found

to work properly.

ii. A demo software was run on the fingerprint module and its

operation was analyzed. It was observed to be an Enroll-Once-Verify-

Once software. The threshold for content matching was very low and

flexibility for different orientations of the finger was not present.

iii. Established wireless network involving two terminals using

DWA-510.

Page 31: Biometric Exam Reg

The main objective of the project then was to enroll fingerprints of different

students and add them to the database which would be referred at the time

of verification. For this purpose, Fingerprint Recognition Toolbox provided

for use in MATLAB was used. For a particular trial run of the system,

fingerprints of eight students were captured using the hardware kit in

the lab and fingerprint image of seven were added to the database. The

templates stored were named from s1 to s7. To show the successful

functioning of the system three sample outputs are provided that show

i. Addition to database (result1)

ii. A fingerprint match for s1 (result2)

iii. A fingerprint match for s8 (result3)

Page 32: Biometric Exam Reg

Fig 4.1.3 Sample Matlab Output (Result1)

Page 33: Biometric Exam Reg

Fig 4.1.4 Sample Matlab Output (Result2)

Page 34: Biometric Exam Reg

Fig 4.1.5 Sample Matlab Output (Result3)

The various processes involved in the image processing of the captured

fingerprint image using the FRT are explained below.

Fingerprint image visualization

It provides us with a visual picture of the fingerprint captured and

transferred from the DSP TMS320C6713 to the server computer.

Page 35: Biometric Exam Reg

Fig 4.2 filter visualization

Gabor filter visualiz ation

A Gabor filter is a linear filter used in image processing for edge detection.

Frequency and orientation representations of Gabor filter are similar to

those of human visual system, and it has been found to be particularly

appropriate for texture representation and discrimination. In the spatial

domain, a 2D Gabor filter is a Gaussian kernel function modulated by a

sinusoidal plane wave. The Gabor filters are self-similar - all filters can be

generated from one mother wavelet by dilation and rotation.

Page 36: Biometric Exam Reg

Fig 4.3 Image enhancement

I m a ge en h an c e m ent

Inorder to ensure that the performance of an

automatic fingerprint identification/verification system will be

robust with respect to the quality of input fingerprint images, it is

essential to incorporate a fingerprint enhancement algorithm in

the minutiae extraction module. It adaptively improves the clarity

of ridge and valley structures of input fingerprint images based

Page 37: Biometric Exam Reg

on the estimated local ridge orientation and frequency.

Fig 4.3 Result after Image enhancement

As shown in the above picture, the image to the right is an

enhanced version of the original input fingerprint which is on the

left. The input image is segmented into a matrix of cells which are

individually processed.

Orientation field estimation

A directional field describes the coarse structure of a fingerprint. It

describes the local orientations of the ridge and valley structures, and is

Page 38: Biometric Exam Reg

useful for extraction of singular points. In general, the directional field at

some location in the image is estimated byaveraging the directions in a

window around the desired location.

Page 39: Biometric Exam Reg

CHAPTER FIVE

CONCLUSION

A large number of applications are demanding effective and reliable

biometric solutions. Fingerprints proved to be one of the best biometric

modalities thanks to their distinctiveness, stability and accessibility (low cost

of acquisition devices). Although the first algorithms were developed more

than 50 years ago, sensing, feature extraction and matching techniques are

being continuously improved, making it possible nowadays to automatically

process also low quality impressions in a very short time.

In this work, the fingerprints of different students were successfully enrolled

and added to the database. The fingerprints were further verified and

several dry runs were made that confirmed matches and mismatches for

different samples. Apart from that, visual basic was used to demonstrate

the various functions and processing methods used in image processing of

the fingerprint. The outputs for all the trial runs and process demonstration

were recorded. The data transfer was made across a channel in the lab

connecting two terminals. This communication meant that the range was

limited to a short span but the data transfer process was efficient enough for

the successful functioning of the system.

Page 40: Biometric Exam Reg

RECOMMENDATION

There is a lot of scope in the field of biometrics application at the work place.

The exam registration/verification system using fingerprint recognition can

be of immense important if certain nuances are taken into consideration.

Wireless channel should be used, but should not be limited to a short range

and hence the system could only be tested in the lab. For a greater range

and more versatile application, a different channel could be considered

which would ensure faster data transfer and provide better flexibility. The

security aspect of transmission can be worked upon since data security in

case of sensitive data transfer is highly essential.

Finally, the proposed model for each PC server client software management

system can be materialized using cost effective products offered in the

market.

Page 41: Biometric Exam Reg

REFERENCES

[1] Zhang Yongqiang and Liu Ji ,The design of wireless fingerprint

attendance system, Proceedings of ICCT '06, International Conference on

Communication Technology, 2006.

[2] Younhee Gil, Access Control System with high level security using

fingerprints,IEEE the 32nd Applied Imagery Pattern Recognition Workshop

(AIPR ’03)

[3] Jain, A.K., Hong, L., and Bolle, R.(1997), “On-Line Fingerprint

Verification,” IEEE Trans. On Pattern Anal and Machine Intell, 19(4), pp.

302-314.

[4] D.Maio and D. Maltoni. Direct gray-scale minutiae detection in

fingerprints. IEEE Trans. Pattern Anal. And Machine Intell., 19(1):27-

40, 1997.

[5] Lee, C.J., and Wang, S.D.: Fingerprint feature extration using Gabor

filters, Electron. Lett., 1999, 35, (4), pp.288-290.

[6] L. Hong, Y. Wan and A.K. Jain, "Fingerprint Image Enhancement:

Algorithms and

Page 42: Biometric Exam Reg

Performance Evaluation", IEEE Transactions on PAMI ,Vol. 20, No. 8, pp.777-

789, August 1998.

[7] SPRA894A, Texas Instruments, DSP for Smart Biometric Solutions

[8] User Manual, DWA-510

[9] SPRAA23, Texas Instruments, FADT2 Quick Start Guide

[10] TMS320C6713 DSK Technical Reference, (506735-

0001 Rev. B) [11] FVC2002.

http://bias.csr.unibo.it/fvc2002/

[12] Fingerprint Recognition System by Luigi

Rosa,

(

http://www.mathworks.it/matlabcentral/fileexc

hange/4239)

[13] Shlomo Greenberg, Mayer Aladjem, Daniel Kogan and Itshak Dimitrov,

Fingerprint Image Enhancement using Filtering Techniques