* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Ms.-Vishakha-R.-Bhadane-el-al
M-Theory (learning framework) wikipedia , lookup
Visual Turing Test wikipedia , lookup
Edge detection wikipedia , lookup
Computer vision wikipedia , lookup
Convolutional neural network wikipedia , lookup
Histogram of oriented gradients wikipedia , lookup
Pattern recognition wikipedia , lookup
Image segmentation wikipedia , lookup
International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 2D Fingerprint Matching using Multi- dimensional Artificial Neural Networks Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra Department of Computer Engineering,MPSTME, SVKM’s NMIMS, Shirpur, Maharashtra, India Abstract- Biometrics is a technology which identifies a person based on physiological or behavioral characteristics. Fingerprint identification and recognition is one of the biometric methods available that has been widely used in variousapplications due to its reliability and accuracy in the process of identification and authentication of a person. The main objective of this work is to develop fingerprint identification and recognition system. The system consists of three main parts; are image acquisition, image processing and "identification". The fingerprint images captured sensor format and stored in the database in the process of image acquisition. This image is the commitment to share 500 DPI. These images are then amplified in stage image processing by performing gray level enhancement, Gabor filtering, image sharpening, edge detection, segmentation and thinning processes, then the minutia extraction method using the cross number and alignment images. We present a hybrid algorithm that uses both minutiae matching (point) information and texture (region), adjustment information of fingerprints. Once the image processing could then be inserted into the back propagation neural network as input to train the network. After training, the neural network is ready to perform the identification and recognition function (matchingprocess). A neural network has been successfully developed to detect and recognize the essential part of fingerprint images. Keywords-Fingerprint Recognition, back propagation,multi-dimensional ANN I. INTRODUCTION Fingerprints are the most used technique biometrics for personal identification. There are two main applications include fingerprints: verification of fingerprints and fingerprint identification [1]. While the purpose of the verification of fingerprints to verify a person's identity, the purpose of fingerprint identification is to identify an individual. In the last three decades, automatic verification of fingerprints is becoming more widely than other techniques of biometrics, such as face recognition and signature recognition. Biometrics is the emerging field in technology with unique and measurable "physical and behavioral” characteristics that can be processed electronically by creating recognition , run control and automatic face recognition . These physical properties include the appearance of the face, fingerprints, hand geometry , handwriting , iris , retina , voice and veins . Fingerprints have been used for over a century and is the most widely used form of biometric identification . Fingerprint identification is mainly used in the field of artificial intelligence. It is popular because of its easy access , low price of fingerprint sensors , non -intrusive scanning, and relatively good performance. In recent years , there have been significant improvements in performance were achieved in commercial automatic fingerprint identification . The footprint 81 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 of an individual is unique and remains unchanged over a lifetime. No two people have the same set of fingerprints. This property makes an excellent fingerprint biometric identifier. So it is one of the popular and effective means to identify an individual and used as forensic evidence . A fingerprint is formed from an impression of the pattern of ridges on a finger. A ridge is defined as a single curved portion and a valley is the region between two adjacent ridges .Usually , there are two prominent types of minutiae (ridge ending and ridge bifurcation ) , forming a fingerprint . The minutiae are local discontinuities in the flow pattern ridge provides the features used for the recognition . The details such as the type , orientation and location of the minutiae taken into account when performing minutiae extraction [1 ] . Here , we propose a fingerprint matching system based on artificial neural network (ANN ) . The rest of the paper is organized as follows : Section II provides a brief description of a general fingerprint recognition system . Section III provides the background principles associated with the operation of the proposed model . All the experimental results and related discussion is provided in Section IV - V. This paper concluded by summing up the work in Chapter VI.Some of the relevant literatures cited from [21] [18]. II. ARCHITECTURE OF FINGERPRINT MATCHING SYSETM Fingerprint Identification System based can operate either identification or verification operation. Fingerprint identification refers to one-to - many matches where fingerprint input image of a person associated with any standards that exist in the database. Confirms the identity of a person. Fingerprint Identification System follows four basic steps is Image Acquisition /Registration, image enhancement preprocessing, feature extraction and Matching. Fig. 1. General block diagram of Fingerprint recognitionSystem Figure understands the automated fingerprint authentication comprising the following phases [5]: a) Fingerprint Acquisition / Register b) Fingerprint Image Enhancement c) Extraction of Minutiae d) Minutiae Matching e) fingerprint classification / Authentication A. Image Acquisitions At this stage, the image of the fingerprint was arrested for the first time with the help of sensors. Acquired images can be blurred or may contain noise, which lowers image quality directly affects the rate of return of fingerprint recognition system. The fingerprint image acquired can vary the position, direction and stretching degree [5]. B. Pre-processing 82 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 After capturing an image from the image or image enhancement preprocessing applied to the image. Sometimes it can contain image noise while recording process; noise can be removed using filters in treatment / improvement phase. Images must be normalized; this can also be done in the pretreatment step. You must have completed this phase. C. FeatureExtraction After the process of feature extraction, preprocessing is performed. The phase characteristics of image export function exported as Ridges, valleys and minutiae, singular points (loops, core, coils and delta), etc. These features are useful for identification or verification of individuals. The features extracted from the captured images stored in the database for further process of matching. D.Matching Next step is the connection process after feature extraction. Phase matching identifies similarities between the mainpattern recognition and pattern. Different approaches pairing. The input images provided in the system associated with the primary standards that exist in the database . Matching is completely dependent on whether the systemperforms identification or verification. While recognizing that performs one - used to-many matching approach ,where the fingerprints of a person fits all the available templates under various one-to - one fight is to control where the input image of a person associated only with a template person who claims to be. III FINGERPRINT CLASSIFICATION Fingerprint classification defines the global standard representations of fingerprints. Worldwide representations include positions of the points (e.g. , the nucleus , and d) a fingerprint. A standardclassification of fingerprints are categorized in the following six categories: whorl, right loop, left loop,arch , twin loop, arch and scenes . Also contains one or more regions where the lines consume different ridge shapes (curvature, termination, etc.). These areas (called singular anomalies or areas) can be classified into three typologies: loop, delta, and whorl[7] Fig. 2. Structure of fingerprint. (a) Ridges and valleys on afingerprint image; b) singular regions (white boxes) and corepoints (small circles) in fingerprint images [4] I. SURVEY OF FINGERPRINT MATCHING TECHNIQUES USING ARTIFICIAL NEURAL NETWORKS Different classification techniques have been proposed by various authors in the field of Artificial Neural Networks.ANN used to give greater accuracy and learning pace. It is basically used for classification purposes in image processing. Fingerprints are traditionally classified into categories based on the information in global standards ridges. The classification of fingerprint into groups reduces the need to match an input fingerprint with the entire fingerprint database during the process of detection and recognition, and therefore to reduce computational requirements. Two classifiers,ie , the mean and 3 K - nearest neighbor , used to extract the classifier has four different types of fingerprints, ie Arch, Left Loop, Loop right, or spiral . The 83 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 method achievehigh classification accuracy and quick to produce results . Tan, X. ,Bhanu, B. , Lin, Y, used a typical algorithm - learning using genetic programming (GP) to learn and capabilities have evolved image processing operators to classify fingerprints. The primitive operators used were simple and easy to calculate . These bodies were divided into vectors and calculating feature vectors generation. This classification method may be found to be effective with the quality of fingerprint images [10] . Maheswari and Chandra [22], shows the classification scheme of fingerprints operation Fuzzy artificial neural network. The characteristics of the fingerprint, such as singular points, the positions and orientations of the core and delta points from a binary fingerprint image captured by the sensors. The method used to produce the good results of classification using fuzzy neural networks. An algorithm used for two machine learning algorithms presented by [15]. They used Support Vector Machine (SVM) and Recursive Neural Networks (RNNs) during classification. The RNNs are trained on a structured representation of the fingerprint images and also used to extract a set of distributed features incorporated in SVMs. SVMs are combined with error correction coding scheme , which exploits the information contained in ambiguous fingerprint images . Kant and Nath presented an approach that improves the speed, efficiency of fingerprint matching algorithm during the same record. For this reason , the hard points of fingerprints, as delta and core classifiers used and grouped into any of the other six categories. [20] According to the Wei L, anomaly detection can be used to increase the accuracy of the classification algorithms and proposed a method for searching mannerisms use index delta field Poincare. Used these abnormalities , a quick rule -based classification algorithm was proposed to classify fingerprints into five categories, arch, tents , left loop, right loop , whorl and double loop . The detection algorithm searches the direction field which has the larger direction changes to get the defects [16]. Wei, Yonghui and Fang [18] proposed an approach based structure based on characteristics curve ridgelines, used for classification of fingerprint with other fingerprint images available in the database. The algorithm mainly uses the direction for the classification of fingerprint ridgelines. In this method, the classifier is first calculated the total change of direction ridgelines is grouped according to their shape. Grouped ridgelines along with the extracted singular points used for classification of fingerprint arch, tents, left loop, right loop , whorl and double loop courses . Combining singular points and orientation image information for fingerprint classification proposed by [19]. Algorithm says those singular points and limit non -linear orientation and the final feature vector consisting of the coefficients of the model orientation and uniqueness information. This led to a compact feature vector used as input to a Support Vector Machine (SVM) to perform image classification.Chandra Maheswari and has used low dimensional features obtained from the feedback -based line detector to classify fingerprints into five classes ( arch , left loop , right loop , whorl , arch and scenes ) . The detector line was a cooperative dynamic system that gives oriented lines and maintain multiple directions at points where different oriented lines meet . The feature extraction based on characterizing the distribution of orientations around the fingerprint. Three types of classifiers used namely , support vector machines , nearest neighbor , and neural network [14]. An algorithm used for two machine learning algorithms presented by [5]. They used Support Vector Machine (SVM) and Recursive Neural Networks (RNNs) during classification . The RNNs are trained on a structured representation of the fingerprint images and also used to extract a set of distributed features incorporated in SVMs. SVMs are combined with error correction coding scheme , which exploits the information contained in ambiguous fingerprint images . 84 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 II. PROPOSED WORK The above discussed methods have some limitations which have solved by many researchers, but there are still some other issues in fingerprint recognition and matching systems like computational time and efficiency of recognizing the faces from large databases. Figure 3: Overall system description diagram Figure understands the automated fingerprint authentication comprising the following Modules: 1] Data Capturing Module 2] Image Enhancement Module 3] Minutia Extraction 4] Recognition and Matching Using MDANN 5] Decision Making Module 1. Data Capturing: Data logging is offenly, as it is called, also, obtaining fingerprints. Altitude fingerprints can be either offline (inked) or Online (Live scan). In a method inked fingerprint of a finger taken initially impregnated in a paper, which is then scanned. This method usually produces images of very poor quality due to the non- uniform dispersion of ink and therefore not practiced online touch [11]. In this online fingerprinting system sensor is a capacitive or optical fingerprint scanner which is more expensive, patented fingerprint sensor with USB Optical resolution 500DPI. The image size is captured form the fingerprint reader is 260x300 pixels. The most important part of the system is the living image of the fingerprint capture section which is also called as smart capture that capture high quality fingerprints from dry , wet , scarred and age is difficult to detect fingers more accurately and reliably. After taking Pictures of the fingerprint reader will be given to that section image enhancement. 2. Fingerprint Image Enhancement / Preprocessing A critical step in automatic fingerprint matching is automatically and reliably extracts minutiae from the input fingerprint images. However, the performance of a minutiae extraction relies heavily on the quality of input fingerprint images. To ensure that the performance of an automatic fingerprint matching system is strong in relation to the quality of the fingerprint images, it is essential to incorporate a fingerprint enhancement A. Segmentation 85 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 Segmentation is the process of telling the background area of the foreground regions. It is observed that the background areas are low gray scale variation compared to the foreground region. Thus, a method based on the threshold variation is used for the partition [24]. V(k) = where V(k) isthevarianceand isthepixelvalueatthepixel(i,j). M(k) (1) isthemeangray-levelvalue of theblock k. I(i,j) B. Normalization Normalization is done in order to standardize the dynamic variation in the gray-level values. N(I,j) = if I(I,j)>M (2) Otherwise (3) where ‘N(i,j)’ is the normalized gray-level value and I(i,j) is the gray-level value at pixel(i,j). ‘M’ and ‘V ‘are the estimated mean and variance of I(i,j) respectively and ‘ ’ and ‘ ’ are the desired mean and variance values respectively.Basically the best normalization technique now a day's is mostly used is histogram equalization. Histogram Normalization is one of the most commonly used methods for preprocessing. In image processing, the idea of equalizing a histogram is to stretch and redistribute the original histogram using the entire range of discrete levels of the image, in a way that an enhancement of image contrast is achieved. The most commonly used histogram normalization technique is histogram equalization where one attempts to change the image histogram into a histogram that is constant for all brightness values. This would correspond to a brightness distribution where all values are equally probable. For image I (x, y) with discrete k gray values histogram is defined by ie the probability of occurrence of the gray level i is given by: P (i) = (4) Where i∈ 0, 1…k −1 grey level and N is total number of pixels in the image. Transformation to a new intensity value is defined by: = = (5) Output values are from domain of [0, 1].To obtain pixel values in to original domain, it must be rescaled by the K−1 value. C. Filtration Along with the field orientation, the ridge frequency is also required for the construction of the filter Gabor. This represents the frequency of the local ridge of the fingerprint. Gabor filters optimally capture both local orientation and frequency information from the image of the fingerprint. By tuning a Gabor filter with a certain frequency and direction, can be obtained by the local frequency information and orientation [7] [8]. It is suitable for extracting information from images texture [9]. 86 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 Another symmetric Gabor filter has the following general form in the spatial domain [10]: G(x, y; θ, f) = exp (6) x’ = x sinθ+ y cosθ (7) y’ = x cosθ- y sin θ (8) wheref is the frequency of the sinusoidal plane wave along the direction θ from the x-axis, and x δ and y δ are the space constants of the Gaussian envelope along x and y axes, respectively. D. Binarization Binarization is to convert the grayscale image to a binary image that is either zero or oneasthepixelintensity value using a certain threshold. E. Thinning This is the final stage of image enhancement. This is a process which erodes morphological image successively until a skeletal image of the fingerprint which is one pixel wide isobtained. This image is in turn used for the extraction process of the minutiae [24]. 3 Minutia Extractions The enhanced image is used to extract the minutiae points of the fingerprint. There are a number of features that could be used for identification of fingerprints, but mostly minutiae points is limited to two types namely the ending ridge and the ridge bifurcation. Ridge endings is the point where the curve ends ridge and ridge bifurcations are the points where the curve ridge splits from a single path to two in a Y - junction. The minutia points extracted from the enhanced fingerprint image by using the concept of Crossing Number (CN). The value CN for a ridge pixel P is given by the equation [24]. CN = (9) The value of the number of codes used to distinguish between types of minutiae. The minutiae points determined by scanning the neighborhood of each pixel in the ridge thinned image using a 3 × 3 window (Figure 4) [14]. Fig. 4. a) Ridge ending and b) bifurcation in c) 3×3 window [14]. A. Image Alignment: Minutiae points of both the input and template images are extracted using the algorithm described in [6]. The algorithm provides the following two outputs: (a) A set of minutiae points, each characterized by spatial position and orientation of the image of the fingerprint. (b) Local Information ridge in the vicinity of each point in detail. The two sets of minutiae points then 87 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 combined using an algorithm to match point. The algorithm first selects a reference minutiae pair (one from each image), and then determines minutiae pairs using points. [4]. Fig. 5. Masking out background regions: (a) Template image, (b) Input image, (c) Input image after translation and rotation, (d) Masked input image[4]. An exhaustive evaluation of all point correspondences avoided because of the availability of local ridge information at each point in detail. Once the minutiae points are aligned with this method, the rotation and translation parameters calculated. Estimated rotation parameter is the average of individual rotation values of all corresponding pairs of minutiae. The parameters of translation are calculated using the spatial coordinates of the reference minutiae pair resulted in better alignment [4]. 4.Recognition and Matching Using MDANN Next phase is matching process after feature extraction. Feature matching phase identifies similarities between recognition templates and master template. The new matching approach is used called as hybrid matching approach. A. The Hybrid Matching Approach The matching technique described herein is referred to as “hybrid" technique because it combines information available minutiae in a fingerprint with the underlying texture information in local areas to perform the match. Combining an input image with a stored template includes the calculation of the sum of squares of differences between the two features vectors after discarding missing values .This distance is normalized by the number of valid values feature used to calculate thedistance. The score matching combined with that obtained by the method based on minutiae, using the sum rule of combination. If the matching score is less than a predetermined threshold, the input image is said to have successfully combined with standard [4]. Everyone is known to have unique, immutable fingerprints. A fingerprint is made of a series of ridges and grooves on the surface of the finger. Minutiae points are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending. Fingerprint matching techniques can be placed into two categories: minutiae - based and correlation based. Technical details based first minutiae points and then map their relative placement on the finger. However, there are some difficulties in using this approach. It is difficult to extract the minutiae points accurately when the fingerprint is of low quality. The method is based correlation is able to overcome some of the difficulties of the minutiae based approach. However, this has some own shortcomings. Correlation based techniques require the precise location of a registration point and are affected by image translation and rotation [22]. 88 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 Fig. 6.1. Minutiae points in a Fingerprint image[22]. Fig. 6.2. Matching the finger print images [22]. Fingerprint matching minutiae has problems in matching different sized (unregistered) minutiae patterns . Local ridge structures can not be completely characterized by minutiae . Here an alternate representation of fingerprints tried , which will capture more information about the area and give a fixed length code for the fingerprint. The matching will then hopefully become a relatively simple procedure for calculating the Euclidean distance will between the two codes . A commercial fingerprint recognition system based requires a very low False Reject Rate (FAR) for a given False Accept Rate (FAR). This is very difficult to achieve with any one technique . Until the investigation is underway to find methods to gather data from various matching techniques to increase the overall accuracy of the system . In a real application , the sensor , the acquisition system and the change in system performance over time is very critical. A method of testing has been done on the system in a limited number of users to evaluate the performance of the system during a period [22]. 5. Recognition by MDANN In neural networks, learning is easy , because it depends only on locally available information , but since the information is mixed in data storage , clear recovery of stored information is not simple. Recognition requires knowing whether or not a new entry has been submitted before and stored in memory. The glide slope of a generalized non- linear, multi-layer feed network called front backpropogation. This is a supervised learning algorithm that learns by first calculating an error signal and then transmits the error backwards through the network assuming the weights of the network is the same in both backward and forward directions. Backpropogation is a very popular and widely used learning algorithm of the network[24]. In this paper, we explain our work to educate pictures details on the ANN using the algorithm backpropogation and then match the fingerprints for the identification of the database . The MDANN used herein consists of 20 neurons, and is designed to receive the inputs of the matrix. Figure shows the network structure of MDANN but the connections between the input and the hidden layer is not shown in full for the purpose of clarity and complete structure is obtained by extending connections to the entire image. The inherent advantage of using a multidimensional ANN in this system is that the entire matrix containing the minutiae points can be used to train the network which means that the relative orientation of minutiae points are automatically used in recognition [24]. Fig. 7. Structure ofMDANN [24]. 89 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 Algorithms for MDANN 1. Choose a pair of education from training set; apply the input vector to the network input. 2. Calculate the output of the network. 3. Calculate the error between the network output and the desired output (target vector of the pair training) 4. Configure the network weights in a way that minimizes the error. 5. Repeat steps 1-4 for each vector in the training set until the error for the entire set is acceptably low. During this stage of training the network with the fingerprint images , each fingerprint image is assigned a unique arbitrary value . Now, different images of the same fingerprint trained the network with the same arbitrary value as price target. The iteration continues until the value calculated in step 4 is the target value assigned to that image. This value is unique for each individual fingerprint image when a random fingerprint has been tested on the network , this value ends up as to whether the image is already present in the database or not and if there is the exact image that corresponds to . III. EXPERIMENTAL RESULT First, the fingerprint image was captured using the reader SecuGen Hamster Plus. This image was taken at a resolution of 500 DPI and the image size of 260x 300pixels. This image was 8 bit (256 levels )grayscale image . Then, the image was first enhanced in order to allow a proper export points of detail . The image captured by the fingerprint reader to be stored directly in the database. The actual image was first enhanced in order to allow a proper export points of detail . The loaded image is then sent to the process of improving the image. The first step for pretreatment comprises normalization technique wherein the histogram equalization is applied to the image. The normalized image where dynamic stresses standardized so that prices are in a certain range is shown in Fig. 8 (a). Fig. 8 (b) shows the binary image has a better clarity and continuity of ridge. This binary image has only two levels of intensity values namely zero and one which makes a clear distinction between the ridges and valleys. The abscissa image separating the background from the foreground area shown in Fig. 8 (c).Nextly in Fig. 8 (d ) the flow orientation is estimated that the direction of the flutes is the brand for the future extraction of minutiae . A region of interest (ROI) is a portion of an image that we want to filter or used for future operation of mining show in Fig. 8(e). The thin image obtained from the binary enhanced image shown in Fig. 8(f) an abandoned for calculating prices of code and then to extract the minutiae points. The minutiae points obtained after the certification of these points taken from the CN method is shown in Fig .8(g). This image is trained in multidimensional neural network using the training process gave the following yield curve shown in Fig. 9, where the yield is defined as the squared difference between the target price and the actual price obtained during the simulation. The yield curve is a function of the number of repetitions. It has been observed that the performance has improved steadily and leads to a value close to zero. The simulations were performed in MATLAB 7.10.0 (R2010a) version with 1GB RAM, processor Intel Core i3. The trained network was able to give the exact value every time a picture was one of those who had been trained previously given as input. The results were quick and were observed to have good identification captured fingerprint images. 90 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 (a) (b) (c) (d) (e) (f) (g) (a) Histogram Equalization, (b) Binary Image. (c) Segmentation, (d) Flow Direction, (e) ROI, (f) Thining, (f) Minutiae Extraction Fig. 9. Performance vs. number of iterations IV.CONCLUSION The technique of fingerprint matching using minutiae points for identifying fingerprints have been presented in this paper. Preprocessing techniques applied first to enhance the image and get a thinner binary fingerprint ridge structure that can be used for minutiae extraction. The minutiae are extracted fingerprint images from the database then trained in a multidisciplinary artificial neural network, which takes in two-dimensional array minutiae image as an input and output target. The trained network may then be used for the purpose of matching fingerprints in the database . The method is based on the representation of pattern in two dimensions and therefore maintains the details of the plan of detail in an image in the best possible way . This method was found to give results that are comparable in terms of efficiency of recognition by other pattern recognition techniques , and therefore , the results are promising to work to improve MDANN for better opportunities to match. This technique neural network was also to support fast matching fingerprints . In addition , further work in this area could be to optimize the trade-off between speed of recognition and the size of the database that can be supported by the network . ACKNOWLEDGEMENT This paper is part of the project initiatives for identification of problem definition. Author thanks to Dr. M. V. Deshpande, Associate Dean, Mukesh Patel School of Technology Management and Engineering, NMIMS, Shirpur and Mr.Prashant Mishra for their valuable guidance in performing literature survey. REFERENCES: 91 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra International Journal of Computer Engineering and Applications, Volume VI, Issue I April.14 www.ijcea.com ISSN 2321-3469 [1] Anil K. Jain, Lin Hong, SharatPankanti, and Ruud Bolle, “An identity authentication system using fingerprints,”Proceedings of the IEEE, vol. 85, no. 9, pp. 1365–1388, 1997. [2] Anil K. Jain, Lin Hong, SharatPankanti, and Ruud Bolle, “An identity authentication system usingfingerprints,” Proceedings of the IEEE, vol. 85, no. 9, pp. 1365–1388, 1997 [3] A. K. Jain, S. Prabhakar and L. Hong, "A Multichannel Approach to Fingerprint Classification", IEEE Transactions on PAMI, Vol.21, No.4, pp. 348-359, April 1999. [4] Jain, Anil, Arun Ross, and SalilPrabhakar. "Fingerprint matching using minutiae and texture features." In Image Processing, 2001. Proceedings. 2001 International Conference on, vol. 3, pp. 282285. IEEE, 2001. [5] Yao, Yuan, Gian Luca Marcialis, MassimilianoPontil, Paolo Frasconi, and Fabio Roli. "A new machine learning approach to fingerprint classification." InAI* IA 2001: Advances in Artificial Intelligence, pp. 57-63. Springer Berlin Heidelberg, 2001 [6] A. K. Jain, A. Ross, and S. Prabhakar, "Fingerprint Matching Using Minutiae and Texture Features", Proc International Conference on ImageProcessing (ICIP), pp. 282-285, Greece, October 7-10, 2001. [7]Wang, Sen, Wei Wei Zhang, and Yang Sheng Wang. "Fingerprint classification by directional fields." In Multimodal Interfaces, 2002. Proceedings. Fourth IEEE International Conference on, pp. 395-399. IEEE, 2002 [8] H. Li J., YauW.and Wang, “Combining singular points and orientation image information for fingerprint classification,” in Pattern Recognition, vol. 41, November 2002, pp. 353–366. [9] A. Ross, A. K. Jain, and J. Reisman, "A Hybrid Fingerprint Matcher", Pattern Recognition, Vol. 36, No. 7, pp. 1661-1673, 2003. [10]Tan, Xuejun, BirBhanu, and Yingqiang Lin. "Learning features for fingerprint classification." In Audio-and Video-Based Biometric Person Authentication, pp. 318-326. Springer Berlin Heidelberg, 2003. [11] Afsar, F. A., M. Arif, and M. Hussain. "Fingerprint identification and verification system using minutiae matching." In National Conference on Emerging Technologies, pp. 141-146. 2004. [12] Shah, Shesha, and P. Shanti Sastry. "Fingerprint classification using a feedback-based line detector." Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 34, no. 1 (2004): 85-94. [13]Jain, Anil K., Patrick Flynn, and Arun A. Ross. Handbook of biometrics.Springer, 2007. [14] Chen, Weiping, and YongshengGao. "A minutiae-based fingerprint matching algorithm using phase correlation." In Digital Image Computing Techniques and Applications, 9th Biennial Conference of the Australian Pattern Recognition Society on, pp. 233-238. IEEE, 2007. [15] Zhou, Jie, JinweiGu, and David Zhang. "Singular points analysis in fingerprints based on topological structure and orientation field." In Advances in Biometrics, pp. 261-270.Springer Berlin Heidelberg, 2007. [16]Wei, Liu. "Fingerprint Classification using Singularities Detection." international journal of mathematics and computers in simulation 2, no. 2 (2008): 158-162. [17] Y. C. F. W. Wei L., “Fingerprint classification by ridgeline and singular point analysis,” in IEEE ComputerSociety and Congress on Image and Signal Processing, vol. 1, 2008, pp. 594–598. [18]Shih, Frank Y., and Christopher C. Pu. "A skeletonization algorithm by maxima tracking on Euclidean distance transforms." Pattern Recognition 28, no. 3 (2008): 331-341. [19] Maltoni, Davide, Dario Maio, Anil K. Jain, and SalilPrabhakar. Handbook of fingerprint recognition.springer, 2009. [20] Kant, Chander, and RajenderNath. "Reducing process-time for fingerprint identification system." International Journals of Biometric and Bioinformatics 3, no. 1 (2009): 1-9. [21] Ahmed, Shohel Ali, SnigdhaDey, and Kandarpa Kumar Sarma. "Image texture classification using Artificial Neural Network (ANN)." In Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on, pp. 1-4. IEEE, 2011. [22] D. E. C. S.UmaMaheswari, “A review study on fingerprint classification algorithm used for fingerprintidentification and recognition,” in IJCST, vol. 3, 2012. [23] Honglong Chang, Xiaoli Zhao and Bin Li, “Application of BP Neural Network in the Fingerprint Identification”,International Conference on Computer Technology and Science (ICCTS 2012), IPCSIT vol. 47, 2012. [24] Kumar, Rajesh, and B. R. Deva Vikram. "Fingerprint matching using multi-dimensional ANN." Engineering Applications of Artificial Intelligence 23, no. 2 (2010): 222-228. 92 Ms. Vishakha R. Bhadane, Dr.M.V.Deshpande, Mr. Prashant Mishra