FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.

Slides:



Advertisements
Similar presentations
QR Code Recognition Based On Image Processing
Advertisements

Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
1 Fingerprint Recognition Wuzhili ( ) Supervisor: Dr Tang, Yuan Yan Co-supervisor: Dr Leung, Yiu Wing 13/April/2002.
July 27, 2002 Image Processing for K.R. Precision1 Image Processing Training Lecture 1 by Suthep Madarasmi, Ph.D. Assistant Professor Department of Computer.
Course Website: Digital Image Processing Image Enhancement (Histogram Processing)
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Fingerprint recognition using MATLAB (using minutiae matching) Graduation project Prepared by: Zain S. Barham Supervised by: Dr. Allam Mousa.
Adviser:Ming-Yuan Shieh Student:shun-te chuang SN:M
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
January 21, Fingerprint Identification BIOM 426 Instructor: Natalia A. Schmid.
A Review of “Adaptive fingerprint image enhancement with fingerprint image quality analysis”, by Yun & Cho Malcolm McMillan.
Fingerprint Image Enhancement Joshua Xavier Munoz- Ramos.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Fingerprint Recognition Professor Ostrovsky Andrew Ackerman.
Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan.
Automatic Face Recognition Using Color Based Segmentation and Intelligent Energy Detection Michael Padilla and Zihong Fan Group 16 EE368, Spring
Good quality Fingerprint Image Minutiae Feature Extraction
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Fingerprint Recognition Professor Ostrovsky Andrew Ackerman.
Implementation of An Automatic Fingerprint Identification System Peihao Huang, Chia-Yung Chang, Chaur-Chin Chen Department of Computer Science National.
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
VEHICLE NUMBER PLATE RECOGNITION SYSTEM. Information and constraints Character recognition using moments. Character recognition using OCR. Signature.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
1 Fingerprint Classification sections Fingerprint matching using transformation parameter clustering R. Germain et al, IEEE And Fingerprint Identification.
Introduction to Biometric Systems
FEATURE EXTRACTION FOR JAVA CHARACTER RECOGNITION Rudy Adipranata, Liliana, Meiliana Indrawijaya, Gregorius Satia Budhi Informatics Department, Petra Christian.
CS 376b Introduction to Computer Vision 04 / 29 / 2008 Instructor: Michael Eckmann.
Chapter 9.  Mathematical morphology: ◦ A useful tool for extracting image components in the representation of region shape.  Boundaries, skeletons,
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
Digital Image Processing Chapter 9: Morphological Image Processing 5 September 2007 Digital Image Processing Chapter 9: Morphological Image Processing.
Morphological Image Processing
Automatic Minirhizotron Root Image Analysis Using Two-Dimensional Matched Filtering and Local Entropy Thresholding Presented by Guang Zeng.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
A Systematic Approach For Feature Extraction in Fingerprint Images Sharat Chikkerur, Chaohang Wu, Venu Govindaraju
Automated Fingertip Detection
1 Machine Vision. 2 VISION the most powerful sense.
Type of Vehicle Recognition Using Template Matching Method Electrical Engineering Department Petra Christian University Surabaya - Indonesia Thiang, Andre.
Tommy Truong. Objective : To enhance noisy fingerprint images in order to be processed by an automatic fingerprint recognition system, which extracts.
Chapter 6 Skeleton & Morphological Operation. Image Processing for Pattern Recognition Feature Extraction Acquisition Preprocessing Classification Post.
Portable Camera-Based Assistive Text and Product Label Reading From Hand-Held Objects for Blind Persons.
A Seminar on Fingerprint Recognition in Biometrics
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Content Based Coding of Face Images
Implementation of An Automatic Fingerprint Identification System
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Hand Geometry Recognition
Fingerprint Identification
Improving the Performance of Fingerprint Classification
FACE RECOGNITION TECHNOLOGY
IMAGE PROCESSING INTENSITY TRANSFORMATION AND SPATIAL FILTERING
About OMICS Group OMICS Group International is an amalgamation of Open Access publications and worldwide international science conferences and events.
Digital Image Processing
Machine Vision Acquisition of image data, followed by the processing and interpretation of these data by computer for some useful application like inspection,
Histogram Histogram is a graph that shows frequency of anything. Histograms usually have bars that represent frequency of occuring of data. Histogram has.
Coarse Classification
Digital Image Processing
Fingerprint Recognition
Histogram Probability distribution of the different grays in an image.
Digital Image Processing
Hybrid Finger print recognition
Digital Image Processing
Small-Area Fingerprint Verification
Lab 2: Fingerprints CSE 402.
Presentation transcript:

FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM

ABSTRACT To reach the growing need to identify a person for security , Our paper develops an accurate, fast and very efficient bank locker system using fingerprint verification technique. We propose a system in which finger print verification is done by using extraction of minutiae technique which comprises of Image Preprocessing, Feature Extraction and Feature Matching.

APPROACHES FOR FINGER PRINT RECOGNITION Minutiae Based Image Based Our paper is finger print recognition through Minutiae based approach. Finger print recognition through minutiae based approach is very convenient and reliable way to verify the person’s identity.

INTRODUCTION Finger print comprises mainly Ridges and Furrows. The ridges are the dark areas of the fingerprint and the furrows or valleys are the white areas that exist between the ridges. As these resemble with each other, Minutiae brings in concepts of Terminations and Bifurcations as they are easily detected by points that surround them.

INTRODUCTION CONT.

SYSTEM DESIGN

LOAD A gray level fingerprint image from any drive can be loaded

IMAGE ENHANCEMENT Make image clearer. Increase the contrast between ridges and furrows. Connect the false broken points of ridges. Keep a higher accuracy.

HISTOGRAM EQUALIZATION It is used to enhance the contrast of images by transforming its intensity values. To expand the pixel value distribution of an image. The histogram after the histogram equalization occupies all the range from 0 to 255. The visualization effect is enhanced or increased. Noise is prevented from being amplified

Fig: Image enhancement by histogram equalization

FOURIER TRANSFORM To connect some falsely broken points on ridges and to remove some spurious connections between ridges. We can enhance each block by g(x,y)= F-1 { F(u,v)×|F(u,v)|k } Higher "k“ value improves the appearance of the ridges Too high value of "k" can result in false joining of ridges.

Fig: Image Enhancement by Fourier transform

BINARIZATION To transform the 8-bit Gray finger print image to a 1-bit image. 0 value for ridge 1 value for furrow. Use locally adaptive method. Transform a pixel value to 1 if the value is larger than the mean intensity value of the current block.

Fig: Binarization

IMAGE SEGMENTATION Only a Region of Interest (ROI) is useful to be recognized for each fingerprint image. To extract ROI - 2 operations are adopted OPEN and CLOSE ‘OPEN’ operation can expand images and remove peaks. ‘CLOSE’ operation can shrink images and eliminate small cavities.

Fig: Direction Estimation

Fig: ROI Extraction

MINUTIA EXTRACTION Ridge Thinning: To eliminate the redundant pixels of ridges till the ridges are just one pixel wide. Thinning does not change the location or orientation of minutiae points.

Fig: Thinning

MINUTIA MARKING Normal ridge Bifurcation Termination pixel

Fig: Minutiae Extraction

FALSE MINUTIA REMOVAL False ridge breaks due to insufficient amount of ink and ridge cross connections due to over inking are not totally eliminated in the pre-processing stage.

D =( For each row sum up all pixels in the row whose value is 1)/row length where D is the inter ridge width. Procedure for removal of false minutiae: Distance(bifurcation , termination) < D and the two minutiae are in the same ridge then remove both of them.(m1) Distance(bifurcation , bifurcation) < D and the two are in the same ridge then remove both of them.(m2,m3) Distance(termination ,termination) ~ D and their directions are co-incident and no other termination is located in between the two then remove both of them.(m4,m5,m6) Two terminations are located on the same ridge with length less than D then remove the two terminations.(m7)

The removal of below shown false minutiae limits the maximum number of minutiae present in a thinned image to a pre-defined threshold. Spike Bridge Hole Break Spur ladder

Fig: False minutiae removal

MINUTIAE MATCH There are two consecutive stages: One is alignment stage and the second is match stage. 1. Alignment stage: Choose any one minutiae from each image, calculate the similarity of the two ridges. If the similarity is larger than a threshold, transform each set of minutia to a new coordination system.

2. Match Stage: After we get two set of transformed minutiae points, we use the elastic match algorithm to count the matched minutiae pairs. The final match ratio for two fingerprints is the number of total matched pair over the number of minutiae of the template fingerprint. The score is 100 % ratio and ranges from 0 to 100.

Fig: Minutia based matching

Fig: Match the minutia of two images and display the score

CONCLUSION This paper presents an overview of the different steps involved in the development of a Minutiae based Fingerprint identification and verification system for bank locker security. We have also proposed to design and development of a minutiae based AFIS. The system developed is still a prototype version and needs improvements for decreasing the time spent during fingerprint processing and the reduction in the number of false acceptances and rejections made by the algorithm.

REFERENCES “A Handbook Of Fingerprint Recognition”, Maltino, Maio, Jain And Prabhakar. Springer Press. Pradeep M. Patil, Shekar R. Suralkar and Faiyaz B. Sheikh, “Rotation Invariant Thinning Algorithm to Detect Ridge Bifurcations for Fingerprint Identification,” IEEE International Conference on Tools with Artificial Intelligence, 2005. “Digital Image Processing”, Gonzalez And Woods, Aw, Ma 1992. L. Hong, "Automatic Personal Identification Using Fingerprints", Ph.D. Thesis, 1998.

conclusion