This Article 
 Bibliographic References 
 Add to: 
Fingerprint Matching
February 2010 (vol. 43 no. 2)
pp. 36-44
Anil K. Jain, Michigan State University
Jianjiang Feng, Tsinghua University
Karthik Nandakumar, Institute for Infocomm Research
Fingerprint matching has been successfully used by law enforcement for more than a century. The technology is now finding many other applications such as identity management and access control. The authors describe an automated fingerprint recognition system and identify key challenges and research opportunities in the field.

1. National Science and Technology Council Subcommittee on Biometrics and Identity Management, Biometrics in Government Post-9/11: Advancing Science, Enhancing Operations, Aug. 2008; .
2. A.K. Jain, P. Flynn, and A.A. Ross eds., , Handbook of Biometrics, Springer, 2007.
3. H.C. Lee and R.E. Gaensslen eds., Advances in Fingerprint Technology, 2nd ed., CRC Press, 2001.
4. J. Feng, "Combining Minutiae Descriptors for Fingerprint Matching," Pattern Recognition, Jan. 2008, pp. 342-352.
5. A.A. Ross, K., Nandakumar, and A.K. Jain, Handbook of Multibiometrics, Springer, 2006.
6. S. Pankanti, S. Prabhakar, and A.K. Jain, "On the Individuality of Fingerprints," IEEE Trans. Pattern Analysis and Machine Intelligence, Aug. 2002, pp. 1010-1025.
7. D.R. Ashbaugh, Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology, CRC Press, 1999.
8. D. Maltoni et al., Handbook of Fingerprint Recognition, 2nd ed., Springer, 2009.
9. R. Cappelli et al., "Fingerprint Image Reconstruction from Standard Templates," IEEE Trans. Pattern Analysis and Machine Intelligence, Sept. 2007, pp. 1489-1503.
10. National Research Council of the National Academies, Strengthening Forensic Science in the United States: A Path Forward, National Academies Press, 2009.

Index Terms:
Biometrics, Fingerprint identification, Pattern matching, Security and privacy, General interest and reference
Anil K. Jain, Jianjiang Feng, Karthik Nandakumar, "Fingerprint Matching," Computer, vol. 43, no. 2, pp. 36-44, Feb. 2010, doi:10.1109/MC.2010.38
Usage of this product signifies your acceptance of the Terms of Use.