Design of Fingerprint-Based Gender Algorithm

被引:0
|
作者
Divate, Chandrakant P. [1 ]
Quadri, Sayed Abulhasan [1 ]
Mishra, Saket [2 ]
Kumar, Rahul [3 ]
Srivastava, Arun Pratap [4 ]
Khan, Akhilesh Kumar [5 ]
Bansal, Saloni [6 ]
Shrivastava, Anurag [7 ]
机构
[1] Visvesvaraya Technol Univ, Dept CSE, SECAB IET, Belgaum, Karnataka, India
[2] Chitkara Univ, Ctr Res Impact & Outcome, Rajpura 140417, Punjab, India
[3] Chitkara Univ, Chitkara Ctr Res & Dev, Kalujhanda 174103, Himachal Prades, India
[4] Lloyd Inst Engn & Technol, Greater Noida, India
[5] Lloyd Law Coll, Greater Noida, India
[6] GLA Univ, Dept Comp Engn & Applicat, Mathura, India
[7] Saveetha Inst Med & Tech Sci, Saveetha Sch Engn, Chennai, Tamilnadu, India
关键词
recognition; biometrics; demonstrating; cornerstone;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Biometric systems, with fingerprint recognition as a cornerstone, play a crucial role in identity verification and access control. This paper introduces an innovative approach to gender clustering based on fingerprint data, leveraging the Fuzzy C-Means (FCM) algorithm. The proposed design aims to enhance the precision of gender classification by incorporating the inherent uncertainty in fingerprint features. Through the integration of FCM, which allows soft assignment of fingerprints to gender clusters, the system achieves a nuanced and adaptable classification. The study meticulously explores the design considerations, including the selection of features, data preprocessing, and the configuration of FCM parameters. Additionally, the paper discusses the experimental results, demonstrating the effectiveness of the proposed method in accurately clustering fingerprint data according to gender. The research contributes to the evolving field of biometrics, offering a novel perspective on gender classification that embraces the complexity of fingerprint patterns. The outcomes provide valuable insights for the development of reliable and versatile biometric systems, with potential applications in security, forensics, and personalized identification.
引用
收藏
页码:1046 / 1062
页数:17
相关论文
共 50 条
  • [41] Security and Accuracy of Fingerprint-Based Biometrics: A Review
    Yang, Wencheng
    Wang, Song
    Hu, Jiankun
    Zheng, Guanglou
    Valli, Craig
    SYMMETRY-BASEL, 2019, 11 (02):
  • [42] A Fingerprint-based Bloom Filter with Deletion Capabilities
    Kwon, Minseok
    Shankar, Vijay
    Pontarelli, Salvatore
    Reviriego, Pedro
    2019 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), 2019, : 453 - 458
  • [43] Exploiting Fingerprint Correlation for Fingerprint-Based Indoor Localization: A Deep Learning Based Approach
    Zhou, Chengyi
    Liu, Junyu
    Sheng, Min
    Zheng, Yang
    Li, Jiandong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (06) : 5762 - 5774
  • [44] On the Fingerprint-based Position Algorithm Enhanced by Round Trip Time Measurement in Radio Access System
    Lv, Junwei
    Huang, He
    Dou, Jianwu
    Yuan, Xi
    2014 XXXITH URSI GENERAL ASSEMBLY AND SCIENTIFIC SYMPOSIUM (URSI GASS), 2014,
  • [45] Improvement of a fingerprint-based remote user authentication scheme
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 87 - 92
  • [47] Confidence interval estimation for fingerprint-based indoor localization
    Nabati, Mohammad
    Ghorashi, Seyed Ali
    Shahbazian, Reza
    AD HOC NETWORKS, 2022, 134
  • [48] Improvement of a Fingerprint-Based Remote User Authentication Scheme
    Xu, Jing
    Zhu, Wen-Tao
    Feng, Deng-Guo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (03): : 73 - 80
  • [49] A regularization framework for fingerprint-based reconstruction of mobile trajectories
    Tran, Duc A.
    Zhang, Ting
    Gong, Siyuan
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2016, 31 (03) : 268 - 279
  • [50] FINGERPRINT-BASED LOCATION POSITONING USING IMPROVED KNN
    Liang, Xiaomei
    Gou, Xuerong
    Liu, Yong
    PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), 2012, : 57 - 61