Improving Fingerprint Recognition With CNN

Authors

  • Tasneem Rahath 1Assistant Professor, Department of Information Technology, Bhoj Reddy Engineering College for Women, India. Author
  • R Charitha Reddy, S Nainjeeth Kour 2,3B.Tech Students, Department of Information Technology, Bhoj Reddy Engineering College for Women, India. Author

DOI:

https://doi.org/10.62647/IJITCE2025V13I4PP31-40

Keywords:

Fingerprint Recognition, Deep learning, MobileNetV2, Contactless authentication, Feature Extraction, Biometric matching, Lightweight Model.

Abstract

A deep learning-based fingerprint recognition system is developed to match contactless fingerprint inputs with stored contact-based fingerprint records. Using a lightweight yet powerful MobileNetV2 architecture, the system efficiently extracts deep features from fingerprint images while maintaining high accuracy and fast performance. The model is trained with a distance-aware loss function and incorporates ridge-based features to improve matching reliability between the two modalities. When a user uploads a contactless fingerprint image, the system preprocesses it, generates a feature embedding, and compares it with a database of contact-based fingerprints to identify the best match.

The matched person ID is then displayed through an attractive and interactive user interface designed for ease of use. This solution avoids physical contact with sensors, making it suitable for touch-free, hygienic authentication in public or mobile environments. The integration of MobileNetV2 makes the system highly scalable and lightweight, suitable for deployment on both desktops and embedded platforms. Overall, this project demonstrates the practical application of deep learning in bridging modality gaps in fingerprint biometrics, offering a robust and future-ready identity verification system.

Downloads

Download data is not yet available.

Downloads

Published

23-10-2025

How to Cite

Improving Fingerprint Recognition With CNN. (2025). International Journal of Information Technology and Computer Engineering, 13(4), 31-40. https://doi.org/10.62647/IJITCE2025V13I4PP31-40