elements from them, such as a line, area, compact element (letter), and so on. Nowadays, reliable data protection is one of the main criteria by which systems intended for storage and processing of important information should be selected. This is due to the existing risk of unauthorized access to such systems, since they have wide information interaction with related control systems via the INTRERNET. Therefore, information security should be an important part of their development.Security based on the biometric parameters of the human body, in particular fingerprint, has a number of undeniable merits: ease of use, convenience and reliability. The whole process of identification takes little time and requires no effort from those who use the access system.The aim of this work is to develop and implement such a transformation of the image, in which the data on the location of the unique features are stored most fully and with the lowest content of false information [1].The article is structured as follows. Section 1 states the purpose of the study the article justifies expediency of development of the system of identification by fingerprints. Section 2 provides an analytical overview. The method of identification by fingerprints, which has been known for a long time and with the advent of electronic computer technology began to appear software products for the analysis and comparison of images, is described [2].Section 3 sets out the basic system requirements. The creation of an identity recognition system will provide a new opportunity in the field of protection and organization of access to information, as well as the development of new, efficient algorithms for processing raster and converting them to a structural form, to develop a tool that improves the quality of graphical information by reducing distortion and noise. Section 4 describes the main technical solutions of the system project.Dactyloscopy (fingerprint recognition) is the most developed to the date biometric method of personal identification. The catalyst for the development of the method was its widespread use in criminology of the XX century. As each person has a unique papillary pattern of fingerprints, so identification is possible. Typically, algorithms use characteristic points on fingerprints: the end of the pattern line, branching lines, single points. In addition, information about the morphological structure of the fingerprint is attracted: the relative position of the closed lines of the papillary pattern, "arched" and spiral lines. Peculiarities of papillary patterns are converted to some unique codes, which preserves the information content of the fingerprint image. And it is "fingerprint codes" that are stored in the database used for searching and comparing. Currently, fingerprint recognition systems occupy more than half of the biometric market. A lot of companies are engaged in the production of access control systems based on the method of fingerprinting identification. Due to the fact that this direction is one of the oldest, i...