Clonal Selection Algorithm for Low Quality Fingerprint Image Verification
Keywords:Biometrics, Clonal Selection Algorithm, CSA, Fingerprint Verification, Forensic Science
Fingerprint verification has drawn a lot of attention to its approach in biometric since it is one of the most important biometric technologies nowadays and is widely used in several different applications and areas. It is applied in the forensic science area in order to identify people who were involved in criminal scenes such as the victims and the suspects. A humanâ€™s fingerprint is unique and usually has its own patterns and ridges, which differs them from otherâ€™s fingerprints. However, there are some drawbacks that can cause low accuracy and low performance of the verification. This occurs when the fingerprint images used are of low-quality and the fingerprints may be slightly incomplete (partial). Clonal Selection Algorithm (CSA) is known to be good in pattern matching and optimization of problems. Hence, this paper discusses the finding of the implementation of CSA in fingerprint verification. There were two main processes involved, which are features extraction using minutiae-based method and also the implementation of the CSA algorithm. Study shows that the FNMR result is 33.33% and the FMR is 16.67%. Further studies can be carried out by using the same algorithm, but focusing more on the feature extraction methods to improve the extraction of fingerprints.
 Patel, H., and Sharma, V.: â€˜Fingerprint Recognition by Minutiae Matchingâ€™, International Journal of Engineering Trends and Technology (IJETT), 2013, 4, (2136-2140)
 Vatsa, M., Singh, R., Gupta, P., and Kaushik, A.K.: â€˜Biometric Technologiesâ€™ (2005. 2005).
 Ravi, J., Raja, K.B., and Venugopal, K.R.: â€˜Fingerprint Recognition Using Minutia Score Matchingâ€™, CoRR, 2010, abs/1001.4, (2), pp. 35-42.
 Prasad, D.R.S., Al-Ani, M.S., and Nejres, S.M.: â€˜An Efficient Approach for Fingerprintâ€™, 2016, (April 2015).
 Hong, L., Wan, Y., and Jain, A.: â€˜Fingerprint image enhancement: algorithm and performance evaluationâ€™, IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998, 20, pp. 777-789.
 Naja, M.I., and Rajesh, R.: â€˜Fingerprint image enhancement: algorithm and performance evaluationâ€™, International Journal of Innovative Research in Computer and Communication Engineering, 2015, 3, (1).
 Houck, M.M., Initiative, F.S., and Rood, E.: â€˜Biometrics and Forensic Science Whatâ€™s the Difference?â€™, n.d.
 Meuwly, D., and Veldhuis, R.: â€˜Forensic biometrics: From two communities to one disciplineâ€™, 2012, pp. 1-12.
 Isa, N., Sabri, N.M., Jazahanim, K.S., and Taylor, N.K.: â€˜Application of the Clonal Selection Algorithm in Artificial Immune Systems for Shape Recognitionâ€™, 2010, pp. 223-228.
 U. S. D. o. Justice. (3 May). U.S. Marshals Service. Available: https://www.usmarshals.gov/usmsforkids/fingerprint_history.htm.
 Zhong, Y., and Peng, X.: â€˜SIFT-Based Low-Quality Fingerprint LSH Retrieval and Recognition Methodâ€™, International Journal of Signal Processing, Image Processing and Pattern Recognition, 2015, 8, (8), pp. 263-272.
 Raja K. B., Auksorius E., Raghavendra R., Boccara A. C., and Busch. C.: â€˜Robust Verification With Subsurface Fingerprint Recognition Using Full Field Optical Coherence Tomographyâ€™, Computer Vision and Pattern Recognition Workshops (CVPRW), 2017 IEEE Conference on, 2017
 Wang, X., Deshpande, A.S., Dadi, G.B., and Salman, B.: â€˜Application of Clonal Selection Algorithm in Construction Site Utilization Planning Optimizationâ€™, Procedia Engineering, 2016, 145, pp. 267-273.
 Thai, L.H., and Tam, H.N.: â€˜Fingerprint recognition using standardized fingerprint modelâ€™, 2010, 7, (3).
 Alijla B. O., Saad M., and Issawi S. F.: â€˜Neural Network-based Minutiae Extraction for Fingerprint Verification Systemâ€™, Information Technology (ICIT), 2017 8th International Conference, 2017.
View Full Article:
How to Cite
LicenseAuthors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under aÂ Creative Commons Attribution Licensethat allows others to share the work with an acknowledgement of the work''s authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal''s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (SeeÂ The Effect of Open Access).