1 Fingerprint Recognition Wuzhili (99050056) Supervisor: Dr Tang, Yuan Yan Co-supervisor: Dr Leung, Yiu Wing 13/April/2002.

Slides:



Advertisements
Similar presentations
Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
Advertisements

Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Finger print classification. What is a fingerprint? Finger skin is made of friction ridges, with pores (sweat glands). Friction ridges are created during.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Biometrics: Myths and Reality ბიომეტრია : მითები და რეალობა Author: doctoral student Maguli Bedineishvili Research director: doctor.
Fingerprint recognition using MATLAB (using minutiae matching) Graduation project Prepared by: Zain S. Barham Supervised by: Dr. Allam Mousa.
Facial feature localization Presented by: Harvest Jang Spring 2002.
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
January 21, Fingerprint Identification BIOM 426 Instructor: Natalia A. Schmid.
Fingerprint Image Enhancement Joshua Xavier Munoz- Ramos.
Wavelets seminar with Dr ’ Hagit Hal-or. Outline : Fingerprint Compression fingerprint Identification fingerprint. Fingerprint Technology. Conciusion.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Biometrics & Security Tutorial 5. 1 (a) Understand two stages (Enrollment and Authentication) in a fingerprint system. (P6: 12)
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Fingerprint Analysis.
Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan.
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
Good quality Fingerprint Image Minutiae Feature Extraction
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Implementation of An Automatic Fingerprint Identification System Peihao Huang, Chia-Yung Chang, Chaur-Chin Chen Department of Computer Science National.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
A Framework for Feature Extraction Algorithms for Automatic Fingerprint Recognition Systems Chaohong Wu Center for Unified.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Biometrics: Ear Recognition
VEHICLE NUMBER PLATE RECOGNITION SYSTEM. Information and constraints Character recognition using moments. Character recognition using OCR. Signature.
Biometrics Viktor MINKIN OutlineOutline Outline Introduction Biometric systems Biometric characteristics Fingerprints Unimodal systems.
Karthiknathan Srinivasan Sanchit Aggarwal
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Introduction to Biometric Systems
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
1 Fingerprint Recognition CPSC 601 CPSC Lecture Plan Fingerprint features Fingerprint matching.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
1 Fingerprint Analysis and Representation Handbook of Fingerprint Recognition Chapter III Sections 1-6 Presentation by: Tamer Uz Adaptive Flow Orientation.
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
Fingerprint Image Enhancement 程广权. Introduction Problems – Image contrast – Adverse physical factors Minimize the undesired effects Some intermediate.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
COMP322/S2000/L171 Robot Vision System Major Phases in Robot Vision Systems: A. Data (image) acquisition –Illumination, i.e. lighting consideration –Lenses,
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
A Systematic Approach For Feature Extraction in Fingerprint Images Sharat Chikkerur, Chaohang Wu, Venu Govindaraju
Automated Fingertip Detection
1 Machine Vision. 2 VISION the most powerful sense.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Tommy Truong. Objective : To enhance noisy fingerprint images in order to be processed by an automatic fingerprint recognition system, which extracts.
Chapter 6 Skeleton & Morphological Operation. Image Processing for Pattern Recognition Feature Extraction Acquisition Preprocessing Classification Post.
A. Three basic patterns—loops, whorls, and arches Loop Whorl Arch.
February 22, Biometrics: Fingerprints Basic fingerprints, scanners, simple program by Michael Liggett.
Biometrics Dr. Nermin Hamza
Content Based Coding of Face Images
Implementation of An Automatic Fingerprint Identification System
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Fingerprint Identification
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
Multimodal Biometric Security
FACE RECOGNITION TECHNOLOGY
About OMICS Group OMICS Group International is an amalgamation of Open Access publications and worldwide international science conferences and events.
Coarse Classification
Fingerprint Recognition
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
Hybrid Finger print recognition
Presentation transcript:

1 Fingerprint Recognition Wuzhili ( ) Supervisor: Dr Tang, Yuan Yan Co-supervisor: Dr Leung, Yiu Wing 13/April/2002

2 Fingerprint Recognition zOutline:  Introduction òMy Project Scope òFingerprint Research Background  Algorithm òOverview of My Approach òDetailed Design òConclusion

3 Fingerprint Recognition Introduction zObjective: Study History, Methodology Compare reported algorithms Implement a FR system Give experimental results Some papers used: Direct Gray-Scale Minutiae Detection In Fingerprint Intelligent biometric techniques in fingerprint face recognition Adaptive flow orientation based feature extraction in fingerprint images Fingerprint Image Enhancement:Algorithm and Performance Evaluation Online Fingerprint Verification

4 Introduction- Giving thumbprints thumbs-down “A judge has ruled that fingerprint evidence is scientifically unreliable “ Economist, 19/Jan/2002

5 Introduction Giving thumbprints thumbs-up Thumb marks as a personal seal, Ancient China Galton,F.(1892) Finger Prints Henry,E.R(1900), Classification and Uses of Finger Prints FBI (US) (1924) 810,000 fingerprints Now more than 70 million fingerprints, 1300 experts FBI Home Office(UK) (1960) Automatic fingerprint Identification System

6 Introduction Giving thumbprints thumbs-up Research Paper Statistics

7 Introduction Giving thumbprints thumbs-up Intensive researches show Fingerprints are scientifically Unique Permanent Universal The judge just proved: fingerprint recognition is scientifically difficult

8 Minutiae-Based Approach z  Minutiae terminations bifurcations Ridge Valley

9 Verification (AFAS) vs. Identification (AFIS) Sensor Minutia Extractor Minutiae Matcher System Database System Level Design System Database User’s Magnetic Card…. User 1:m Match Identification 1:1 Match Verification User ID

10 Algorithm Level Design Thinning Minutiae Marking Remove False Minutiae Minutia extraction Preprocessing Image Segmentation Image Enhancement Image Binarization Post-processing Minutia Extractor:

11 Algorithm Level Design Find Reference Minutia Pair Affined Transform Return Match Score Minutia Matcher:

12 Minutia Extractor- Segmentation Block directional estimation Foreground : have a dominant direction Background : No global direction

13 Fingerprint Image Segmentation  Ridge Flow Orientation Estimate ò Edge detector: get gradient x (g x ),gradient y (g y ) Estimate the ß according to: tg2ß = 2 sigma(g x *g y )/sigma(g x 2 -g y 2 )  Region of Interest ò Morphological Method Close + Open

14 Fingerprint Image Segmentation

15 Fingerprint Image Segmentation Area CloseOpen ROI + Bound

16 Fingerprint Image Enhancement  Histogram Equalization

17 Fingerprint Image Enhancement Fourier Transform

18 Preprocessing - Enhancement

19 Fingerprint Image Binarization

20  Common Approaches: ò Local Adaptation gray value of each pixel g if g > Mean(block gray value), set g = 1; Otherwise g = 0 ò Directly ridge Retrieval from Gray Image get Ridge Maximums Implying binarization Fingerprint Image Binarization

21 Fingerprint Image Binarization z Directly ridge Retrieval ò1.Estimate ridge direction D 2.Advance by a step length 3.Along the direction orthogonal to D Return to ridge Center 4.go to 1 ò1.Block ridge flow orientation O 2.Get direction P orthogonal to O 3.Project block image to the lines along P

22 Minutia extraction stage - Thinning

23 Minutia extraction stage - Thinning  Morphological Approaches: ò bwmorph(binaryImage,''thin'',Inf)  Parallel thinning algorithm: ò 1) 2=< N(p1) <= 6 T(p1) = 1 p2 * p4 * p6 = 0 p4 * p6 * p8 = 0 ò 2) 2=< N(p1) <= 6 T(p1) = 1 p2 * p4 * p8 = 0 p2 * p6 * p8 = 0 N(p) sum of Neighbors T(p) Transition sum from 0 to 1 and 1 to 0 P9P2P3 P8P1P4 P7P6P5

24 zPreprocessing Steps: Bifurcation Termination Minutia extraction

25 Minutia extraction

26 Post-processing stage zFalse Minutia Remove: Two disconnected terminations short distance Same/opposite direction flow Two terminations at a ridge are too close

27 Post-processing stage zFalse Minutia Remove:

28 Minutia Match  Minutia Representation:  M n (Position, Direction ß, Associate Ridge) tg ß = (yp-y0)/(xp-x0); Xp = sigma(xi)/Lpath; Yp = sigma(yi)/Lpath; ridge Minutia x0 x1 x2 x3 x4 x5 x6 x y Lpath Generally, ridge endings and bifurcations are consolidated

29 zSimple Relax Match Algorithm : Minutia Match 1.For each pair of Minutia 2.Construct the Transform Matrix x y (x,y, ) (xi,yi, i)

30 zSimple Relax Match Algorithm : Minutia Match For any two minutia from different image, If They are in a box with small length And their direction has large consistence They are Matched Minutia Match Score = Num(Matched Minutia) Max(Num Of Minutia (image1,image2));

31 zAlignment – based Algorithm : Minutia Match ridge Minutia x0 x1 x2 x3 x4 x5 x6 x y Ridge information is used to determine the goodness of a reference Minutia pair Ridge_direction If two ridge are matched well Continue use the Relax Box Match Or Use String Match

32 Fingerprint Verification zPerformance Evaluation Index FRR: False Rejection Rate FRR = 2/total1 FAR: False Acceptance Rate FAR = 3/total2 Total1 = m*(n+1)*n/2 Total2 = m*(m-1)/2 Same Finger Program result (Yes/No) Different Finger 1 Yes 2 No 3 Yes 4 No F10 F11 F12 F13 …F1n F20 F21 F22 F23 …F2n F30 F31 F32 F33 …F3n Fm0 Fm1 Fm2 Fm3 …Fmn

33 Fingerprint Verification Thanks Question and Answer

34 Fingerprint Classification Left Loop Right Loop WhorlArchTented Arch Delta Pore

35 Introduction Biometric Research  Fingerprint òUnique,Portable,Large storage per finger template òLargest Market Sharing òFeature: Minutiae & Classification  Face & Hand òNon-unique,Large operation device,Fast òFeature: Shape,Area…  Iris & Retina òUnique,Large Device,Less User Safety Consideration òFeature: Shape,Vein…

36 Introduction Fingerprint Research Topics  Fingerprint Verification & Identification òMinutiae-Based-Approach òSimilar System & Algorithm Designs  Fingerprint Classification òFive Categories By Core & Delta Types  Fingerprint image Compression òWSQ Standard

37 Fingerprint Image Compression  FBI Standard ò64-sub band structure WSQ  Correlation-Based Approach For Fingerprint Verification ò Also called Image-based approach ò Relatively little work has been conducted ò Gabor filter; Wavelet Domain Feature Extraction