Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.

Slides:



Advertisements
Similar presentations
Applications of one-class classification
Advertisements

Real-Time Template Tracking
QR Code Recognition Based On Image Processing
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Automatic Fingerprint Acquisition System An example employing Hardware-Software Co- Design - Komal kasat Nalini Kumar Gaurav Chitroda.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Chapter 9 Creating and Maintaining Database Presented by Zhiming Liu Instructor: Dr. Bebis.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint recognition using MATLAB (using minutiae matching) Graduation project Prepared by: Zain S. Barham Supervised by: Dr. Allam Mousa.
Chapter 4: Image Enhancement
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
A Versatile Depalletizer of Boxes Based on Range Imagery Dimitrios Katsoulas*, Lothar Bergen*, Lambis Tassakos** *University of Freiburg **Inos Automation-software.
Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan.
1 Abstract This paper presents a novel modification to the classical Competitive Learning (CL) by adding a dynamic branching mechanism to neural networks.
Symmetric hash functions for fingerprint minutiae
CSE803 Fall Pattern Recognition Concepts Chapter 4: Shapiro and Stockman How should objects be represented? Algorithms for recognition/matching.
Distinguishing Photographic Images and Photorealistic Computer Graphics Using Visual Vocabulary on Local Image Edges Rong Zhang,Rand-Ding Wang, and Tian-Tsong.
3D Hand Pose Estimation by Finding Appearance-Based Matches in a Large Database of Training Views
A Parallel Algorithm for Hardware Implementation of Inverse Halftoning Umair F. Siddiqi 1, Sadiq M. Sait 1 & Aamir A. Farooqui 2 1 Department of Computer.
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
On Signal Reconstruction from Fourier Magnitude Gil Michael Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000,
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
Stockman CSE803 Fall Pattern Recognition Concepts Chapter 4: Shapiro and Stockman How should objects be represented? Algorithms for recognition/matching.
ENTROPY OF FINGERPRINT SENSORS. Do different fingerprint sensors affect the entropy of a fingerprint? RESEARCH QUESTION/HYPOTHESIS.
1J. M. Kizza - Ethical And Social Issues Module 16: Biometrics Introduction and Definitions Introduction and Definitions The Biometrics Authentication.
Module 14: Biometrics Introduction and Definitions The Biometrics Authentication Process Biometric System Components The Future of Biometrics J. M. Kizza.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
1 Fingerprint Classification sections Fingerprint matching using transformation parameter clustering R. Germain et al, IEEE And Fingerprint Identification.
ENDA MOLLOY, ELECTRONIC ENG. FINAL PRESENTATION, 31/03/09. Automated Image Analysis Techniques for Screening of Mammography Images.
Gwangju Institute of Science and Technology Intelligent Design and Graphics Laboratory Multi-scale tensor voting for feature extraction from unstructured.
Oriented Local Binary Patterns for Offline Writer Identification
MESA LAB Multi-view image stitching Guimei Zhang MESA LAB MESA (Mechatronics, Embedded Systems and Automation) LAB School of Engineering, University of.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
1 Pattern Recognition Concepts How should objects be represented? Algorithms for recognition/matching * nearest neighbors * decision tree * decision functions.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
A 3D Model Alignment and Retrieval System Ding-Yun Chen and Ming Ouhyoung.
Master Thesis Presentation, 14Dec07 Pair Wise Distance Histogram Based Fingerprint Minutiae Matching Algorithm Developed By: Neeraj Sharma M.S. student,
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Wenqi Zhu 3D Reconstruction From Multiple Views Based on Scale-Invariant Feature Transform.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
UNIT 5.  The related activities of sorting, searching and merging are central to many computer applications.  Sorting and merging provide us with a.
Non-Ideal Iris Segmentation Using Graph Cuts
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
CSE 185 Introduction to Computer Vision Feature Matching.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin, South Korea Copyright © solarlits.com.
MultiModality Registration Using Hilbert-Schmidt Estimators By: Srinivas Peddi Computer Integrated Surgery II April 6 th, 2001.
Robodog Frontal Facial Recognition AUTHORS GROUP 5: Jing Hu EE ’05 Jessica Pannequin EE ‘05 Chanatip Kitwiwattanachai EE’ 05 DEMO TIMES: Thursday, April.
Face Recognition Technology By Catherine jenni christy.M.sc.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Multimodal Biometric Security 1.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
Improving the Performance of Fingerprint Classification
Multimodal Biometric Security
PRESENTED BY Yang Jiao Timo Ahonen, Matti Pietikainen
Secure and Privacy-Preserving User Authentication Using Biometrics
Coarse Classification
BIOMETRICS By Lt Cdr V Pravin 05IT6019.
CSE 185 Introduction to Computer Vision
The American Statistician (1990) Vol. 44, pp
Lecture 16. Classification (II): Practical Considerations
Verification and Validation of Simulation Models
Presentation transcript:

Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South Korea

CGIV 19SEP07 Presented Abstract  Paper proposes a novel approach for matching of minutiae point in fingerprint images.  The key concept used in the approach is the fact that the neighborhood properties for each of the minutiae points remains same in fingerprint images.  One of those characteristics is pair wise distance histogram that we have used in this algorithm.

CGIV 19SEP07 Presented Introduction  Fingerprints are most useful biometric feature in our body.  Due to their durability, stability and uniqueness fingerprints are considered the best passwords.  In places of access security, higher degree authentication, and restricted entry places fingerprints suggests easy and cheap method.

CGIV 19SEP07 Presented Biometric Modalities

CGIV 19SEP07 Presented Market Capture by different Biometric modalities

CGIV 19SEP07 Presented Previous Work  Fingerprint Identification is quiet mature area of research. Its almost impossible to describe all the previous approaches in a short time here.  The previous methods closely related to this approach are by Park et al.[2005] and Wamelen et al.[2000].  Park et al. from used pair wise distances first ever to match fingerprints in their approach before two years.  Wamelen et al. gave the concept of matching in two steps, Local match and Global match.

CGIV 19SEP07 Presented Different Features in a Fingerprint Ridge Ending Enclosure Bifurcation Island Texture Singular points

CGIV 19SEP07 Presented High level description of algorithms in FVC 2004

CGIV 19SEP07 Presented Extraction of minutiae Image skeleton Gray scale image Minutia features Feature Extraction with CUBS-2005 algorithm Developed by SHARAT et al

CGIV 19SEP07 Presented Problem Simulation  The input fingerprint of the same finger seems to be different while taken on different times.  There may be some translational, rotational or scaling changes, depending upon situation.  Our aim is to calculate these changes as a composite transformation parameter “T”.  The verification is done after transforming the input with these parameters, new transformed pattern should satisfy desired degree closeness with template pattern. Template Input Pattern

CGIV 19SEP07 Presented Minutiae matching-Aligning two point sets Input Template

CGIV 19SEP07 Presented Process Steps  The algorithm runs in two main steps:- (i) Local matching (ii) Global matching In local matching three stepwise calculations are there: 1.Calculate “k” nearest neighbors for each and every point in both patterns. 2.Calculate histogram of pair wise distances in the neighborhood of every point. 3.Find out the average histogram difference between all the possible cases. 4.Set the threshold level of average histogram difference 5.Compare the average histogram differences with the threshold level.

CGIV 19SEP07 Presented Flow Chart No Point pattern “P” stored in database pattern “Q” is taken that is to be matched with “P” Select a local point and it’s “k” nearest neighbors in patterns P Select a local point and it’s “k” nearest neighbors in patterns Q Make pair wise distance Histogram Average histogram difference < Threshold level Calculate and store transformation parameter Iteration algorithm to calculate final Transformation Parameter Start All point’s in pattern p is examined End

CGIV 19SEP07 Presented Calculation of “k” Nearest neighbors (Local match)  For the given input fingerprint pattern and the template pattern, calculate “k” nearest neighbors in order to distances.  Here k is a constant can be calculated with the formula given by wamelen et al.(2000)

CGIV 19SEP07 Presented Histogram Calculation (Local Match)  Histogram of pair wise distances in their neighborhood for each and every point is calculated here. It describe the variety of distances of particular point in its neighborhood.  Here for one point “P1”; P1n1,P1n2,P1n3,P1n4,P1n5 are five nearest neighbors.  Note: step size is 0.04unit, here. P1n2 P1 P1n1 P1n2 P1n3 P1n4 P1n5 P1n1 P1n3 P1n4 P1n5 P1n2 P1n3 P1n4 P1n5 P1n3 P1n4 P1n5 P1n4P1n5

CGIV 19SEP07 Presented Average Histogram Difference and Threshold Setting (Local Match)  To calculate average histogram differences for two points, first subtract the their histograms. It comes in a form of matrix. To calculate average, just normalize it on corresponding scale. H 1 =[ ] H 2 =[ ] H 1 - H 2 =[ ] Average histogram diff.(ΔH avg )=(1/10)*Σ(| H 1 - H 2 | i )  Setting of threshold depends on the size of point pattern. Larger the number of points, smaller the threshold count.

CGIV 19SEP07 Presented Transformation Parameter calculation  On the basis of histogram differences, we can make decision on their local matching. Then the transformation parameter is calculated in the following way. Here “r” represents the corresponding Transformation Parameter.

CGIV 19SEP07 Presented Axial Representation of all Transformation Parameters after Local match  Three axes represent the translational (in both x& y direction), rotaional and scale changes.  The most dense part in graph represents the correct transformation parameters only. We need to conclude our results to that part.

CGIV 19SEP07 Presented Iteration Algorithm  Iteration method is used to converge the results towards dense part of the graph.  For applying this method we need to calculate mean and standard deviation of the distribution.  In graph all the transformation parameters are present, calculated after local matching step.  The mean for this distribution is presented by the “triangle” in centre.

CGIV 19SEP07 Presented Result after first iteration  In the graph, black star is describing the mean for the distribution.  After one iteration step some of the false transformation due to false local match has removed.

CGIV 19SEP07 Presented Result after second iteration  After second iteration, graph converges more towards the dense area.  Black star is the mean point for this distribution shown here.

CGIV 19SEP07 Presented After third iteration  Performing iterations to converge the result, gives the distribution having least standard deviation.  Black star in this graph is the desired transformation parameter i.e. “r”

CGIV 19SEP07 Presented Verification by transforming the template with calculated parameters Template Pattern in Database Transformed version with Parameter ”r”Verification by Overlapping Transformed With “r”

CGIV 19SEP07 Presented Experimental Results (With random generated data) s. no.Total no of point taken No of missing points No. of matched points when no error added No. of matched points when 2% error added No. of matched points when 3% error added

CGIV 19SEP07 Presented Results contd… s. no.Total no of point taken No of missing points No. of matched points when no error added No. of matched points when 2% error added No. of matched points when 3% error added

CGIV 19SEP07 Presented Results with real and random fingerprints  The algorithm was tested on both randomly generated point pattern and real data base.  The results shows the correct identification in more than 98.87% cases with random data.  For real fingerprints we tested the method on some FVC 2004 samples. In most of cases performance was found satisfactory.

CGIV 19SEP07 Presented Limitations  This algorithm is very much dependent on accuracy of feature extraction method used for minutiae determination.  If feature extraction is not done correct then, results can have errors or false acceptances. Which effects performances and accuracy a lot.

CGIV 19SEP07 Presented Future work  This method is still dependent to some other algorithm for feature extraction.  First task is to develop a method for feature extraction from fingerprints.  Other thing to enhance is, its performance mainly on real fingerprint data.

CGIV 19SEP07 Presented Advantages of the Method over others Proposed earlier  This algorithm undergoes two steps, so accuracy is good and false acceptance rate is low.  Calculation is less complex with comparison to others, as histogram is a basis to select the local matching. While in other Random algorithms a lot of calculation is done for local match coz lacking in any basic attribute.  Algorithm doesn’t need very complex system to be implemented for practical/commercial purpose. So compatible to most of systems in use already.

CGIV 19SEP07 Presented Shortcomings  Dependency on an efficient feature extraction scheme.  Histogram differences should be calculated in a better way (Still to think over that…).

CGIV 19SEP07 Presented Thanks for your kind attention.