Review of Sequential Access Method for Fingerprint Identification

G. Indrawan G. Indrawan, B. Sitohang B. Sitohang, S. Akbar S. Akbar

Abstract


Real time fingerprint identification is usually equipped with specific computation machine architecture to optimize speed factor. Focusing on achieving better speed performance of fingerprint identification on common computation machine, a disquisition was conducted on sequential access method for fingerprint identification, with its underlying data structure designed to work with parallel processing. Hypothetically, parallel processing based on multi-cores processor technology, can give faster result without reducing accuracy. If multi core processor was detected, simultaneous processes would run on fingerprint matching-pairs to find its similarity score, respectively. Experiment confirms that speed performance of fingerprint identification using sequential access method with parallel processing outperforms the one without parallel processing. For both strategy, even though using parallel processing confirms faster result, experiment shows that searching time O(n) still linearly depends on number of fingerprints in database. Avoiding such searching time trend, hypothetically, need strategy of direct access method utilization.


Full Text:

PDF

References


Maltoni D, Maio D, Jain AK, Prabhakar S. Handbook of Fingerprint Recognition.Second Edition.London: Springer -Verlag. 2009.

Putra IKGD, Erdiawan. High Performance Palmprint Identification System Based On Two Dimensional Gabor. TELKOMNIKA: Indonesian Journal of Electrical Engineering. 2010; 8(3): 309-318.

IndrawanG, Sitohang B, and Akbar S.Parallel Processing for Fingerprint Feature Extraction. International Conference on Electrical Engineering and Informatics (ICEEI). Bandung. 2011.

Snell GP.Think FAST! Use Memory Tables (Hashing) for Faster Merging. SAS Users Group International (SUGI) 31 Proceedings. San Francisco. 2006.

Samet H. The Design and Analysis of Spatial Data Structures. New York: Addison-Wesley. 1990.

WatsonCI,Garris MD., Tabassi E, Wilson CL, McCabe RM, Janet S, Ko K. User's Guide to Export Controlled Distribution of NIST Biometric Image Software (NBIS-EC). National Institute of Standards and Technology. 2001.

Ratha NK, Pandit VD, Bolle RM,Vaish V. Robust Fingerprint Authentication Using Local Structural Similarity.Proc. Workshop on Applications of Computer Vision. 2000: 29–34.

R. Vazan. SourceAFIS- Open Source Automatic Fingerprint Identification System onSourceForge. http://sourceforge.net/projects/sourceafis/

Anderson HL. Metropolis, Monte Carlo and the MANIAC.Los Alamos Science. 1986: 14: 96–108.

Maio D, Maltoni D, CappelliR, Wayman JL, Jain AK. FVC2000: Fingerprint Verification Competition.IEEE Transactions on Pattern Analysis Machine Intelligence.2002; 24(3):402-412.

Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK. FVC2002: Second Fingerprint Verification Competition.Proc. 16th Int'l Conf. Pattern Recognition.2002;811-814.

Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK. FVC2004: Third Fingerprint Verification Competition.Proc. Int'l Conf. Biometric Authentication.2004; 1-7.

Montgomery DC, Runger GC. Applied Statistics and Probability for Engineers.Third Edition.New Jersey: Wiley and Sons. 2003.




DOI: http://doi.org/10.12928/telkomnika.v10i2.803

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

TELKOMNIKA Telecommunication, Computing, Electronics and Control
ISSN: 1693-6930, e-ISSN: 2302-9293
Universitas Ahmad Dahlan, 4th Campus
Jl. Ringroad Selatan, Kragilan, Tamanan, Banguntapan, Bantul, Yogyakarta, Indonesia 55191
Phone: +62 (274) 563515, 511830, 379418, 371120
Fax: +62 274 564604

View TELKOMNIKA Stats