FINGERPRINT ENHANCEMENT BY DIRECTIONAL FILTERING - Sreya Chakraborty MS-EE Student, UTA Sreya Chakraborty 7 th Nov 2011.

Slides:



Advertisements
Similar presentations
電腦視覺 Computer and Robot Vision I
Advertisements

November 12, 2013Computer Vision Lecture 12: Texture 1Signature Another popular method of representing shape is called the signature. In order to compute.
Image Processing Lecture 4
Chapter 3 Image Enhancement in the Spatial Domain.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Hongliang Li, Senior Member, IEEE, Linfeng Xu, Member, IEEE, and Guanghui Liu Face Hallucination via Similarity Constraints.
Face Image Recognition Face recognition technology works well with most of the shelf PC cameras, generally requiring 320*240 resolution at 3~5 frames per.
BIOMETRICS By Lt Cdr V Pravin 05IT6019. BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Adviser : Ming-Yuan Shieh Student ID : M Student : Chung-Chieh Lien VIDEO OBJECT SEGMENTATION AND ITS SALIENT MOTION DETECTION USING ADAPTIVE BACKGROUND.
January 21, Fingerprint Identification BIOM 426 Instructor: Natalia A. Schmid.
Fingerprint Synthesis An Hong Tran. Outline Introduction Haar Wavelet Transform Fingerprint Synthesis Application Results Conclusion.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Suggested Term Projects CSE 666, Fall Guidelines The described projects are suggestions; if you have desire, skills or idea to explore alternative.
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
6/9/2015Digital Image Processing1. 2 Example Histogram.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Digital Image Processing: Revision
Symmetric hash functions for fingerprint minutiae
Enhancing Biometric Security Using Watermarking By Shivankush Aras.
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
PalmPrint Identification System
Biometrics Austen Hayes and Cody Powell. Overview  What is Biometrics?  Types of Biometric Recognition  Applications of Biometric Systems  Types of.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Reconstructing Orientation Field From Fingerprint Minutiae to Improve Minutiae-Matching Accuracy 吳思穎.
September 25, 2014Computer Vision Lecture 6: Spatial Filtering 1 Computing Object Orientation We compute the orientation of an object as the orientation.
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
DIGITAL SIGNAL PROCESSING IN ANALYSIS OF BIOMEDICAL IMAGES Prof. Aleš Procházka Institute of Chemical Technology in Prague Department of Computing and.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Introduction --Classification Shape ContourRegion Structural Syntactic Graph Tree Model-driven Data-driven Perimeter Compactness Eccentricity.
Introduction to Biometric Systems
Chapter 3: Image Restoration Geometric Transforms.
New Segmentation Methods Advisor : 丁建均 Jian-Jiun Ding Presenter : 蔡佳豪 Chia-Hao Tsai Date: Digital Image and Signal Processing Lab Graduate Institute.
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
BIOMETRICS. BIOMETRICS BIOMETRICS  Forget passwords...  Forget pin numbers...  Forget all your security concerns...
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
1 Chapter 5 Image Transforms. 2 Image Processing for Pattern Recognition Feature Extraction Acquisition Preprocessing Classification Post Processing Scaling.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
Vehicle License Plate Detection Algorithm Based on Statistical Characteristics in HSI Color Model Instructor : Dr. K. R. Rao Presented by: Prasanna Venkatesh.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
1 Fingerprint Analysis and Representation Handbook of Fingerprint Recognition Chapter III Sections 1-6 Presentation by: Tamer Uz Adaptive Flow Orientation.
Digital Image Processing CCS331 Relationships of Pixel 1.
Master Thesis Presentation, 14Dec07 Pair Wise Distance Histogram Based Fingerprint Minutiae Matching Algorithm Developed By: Neeraj Sharma M.S. student,
Digital Image Processing Lecture 10: Image Restoration March 28, 2005 Prof. Charlene Tsai.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Digital Image Processing Lecture 10: Image Restoration
Ch5 Image Restoration CS446 Instructor: Nada ALZaben.
1 Research Question  Can a vision-based mobile robot  with limited computation and memory,  and rapidly varying camera positions,  operate autonomously.
COMP322/S2000/L171 Robot Vision System Major Phases in Robot Vision Systems: A. Data (image) acquisition –Illumination, i.e. lighting consideration –Lenses,
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
A Systematic Approach For Feature Extraction in Fingerprint Images Sharat Chikkerur, Chaohang Wu, Venu Govindaraju
PalmPrint Identification System
Autonomous Robots Vision © Manfred Huber 2014.
Automated Fingertip Detection
1 Machine Vision. 2 VISION the most powerful sense.
A Tutorial on using SIFT Presented by Jimmy Huff (Slightly modified by Josiah Yoder for Winter )
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
FieldTraining Seminar on Field Training Seminar on “Hand-Geometry Based Person Authentication System ” By By Ullesh Chavadi M Ullesh Chavadi M.
ANITHA L ROLL NO :4 M.TECH[CSE]. LITERATURE SURVEY PROPOSED SYSTEM PERFORMANCE STUDY INTRODUCTION OBJECTIVE.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Hand Geometry Recognition
Fingerprint Identification
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
Improving the Performance of Fingerprint Classification
Magnetic Resonance Imaging
Intensity Transformation
Presentation transcript:

FINGERPRINT ENHANCEMENT BY DIRECTIONAL FILTERING - Sreya Chakraborty MS-EE Student, UTA Sreya Chakraborty 7 th Nov 2011

Fingerprint

Introduction Why enhancement? Several stages of processing take place when an Automated Fingerprint Identification System (AFIS) is used to match an unknown fingerprint 1) Enhanced 2) Encoded 3) Matching 4) Verification

Flow of the presentation: Various Biometrics The need for Enhancement Various previous work The orientation used in the thesis The Gabor filter technique

Background Biometrics categories:  Physical biometrics 1.Face 2.Hand Geometry 3.Iris 4.Fingerprint

Background Facial recognition [24] Commercial three dimensional scanner [24]

Background  Behavioral biometrics 1.Gait 2.Handwriting 3.Signature 4.Speech  Multimodal systems

Background Handwriting sample Multimodal system

Need for fingerprint enhancement It is obvious that fingerprints are the most widely applied biometric identifiers. With the help of high performance computers, Automatic Fingerprint Identification Systems (AFIS) have gradually replaced human experts in fingerprint recognition as well as classification. However, fingerprint images contain noises caused by factors such as dirt, grease, moisture, and poor quality of input devices and are one of the noisiest image types, according to O’Gorman [6]. Therefore, fingerprint enhancement has become a necessary and common step after image acquisition in the AFIS.

Scanning Device Fingerprint scanner

Steps for fingerprint enhancement A flowchart of the proposed fingerprint enhancement algorithm [3]

Normalization Normalized image [7]

Minutiae Extraction The following steps (in no particular order) are the basic steps that may be utilized before a template can be created. 1.Image binarization 2.Ridge orientation estimation 3. Ridge smoothing 4. Image enhancement

Previous work In the method used by Hill [17] the orientation field is generated based on singular points according to the model in [19].

Previous work The proposed algorithm of Ross et al [18] utilizes a set of three minutiae points (minutiae triplet) to predict the orientation of a triangular fingerprint region defined by the triplet. In the formulation a minutia point is represented as (x; y; θ), with (x, y) being its spatial location and θ its orientation. The algorithm for generating the orientation map has three main stages: 1) triplet generation, 2) orientation estimation, and 3) averaging orientation map.

Previous work  Triplet generation: Consider a minutiae template, M, of a fingerprint containing N minutiae points given by, M = {m 1,m 2,…..m N } where m i = {x i,y i, θ i }. A set of 3 minutiae points {m i } i=1,2,3, characterized by a triangle with sides {L i } i=1,2,3 and interior angles {Φ i } i=1,2,3 L min ≤ L i ≤ L max, for all i=1,2,3. This ensures that the perimeter of the triangle traverses a compact region, thus, avoiding the large global variability observed in the fingerprints of most classes. θ dif ≤ θ min where θ dif = max i=1,2,3 (θ i - θ med ) and θ med is the median of { θ i } i=1,2,3. This ensures that the orientations of component minutiae points are within a small interval. θ i ≤ θ min, for all i=1,2,3. This ensures that “narrow" triangles subtending a very small area are avoided.

Previous work Deducing the orientation field from minutiae distribution. (a) A single minutiae triplet. (b) Forming triplets across the minutiae distribution. (c) Estimated orientation field using minutiae triplet information [18]

Previous work Consider a pixel P(x,y) located inside the triangular region defined by a triplet. Let be the Euclidean distances of this pixel from the entire ith vertex. The orientation of the pixel P, is then estimated as [18].

Previous work Cappelli et al [20] proposed a technique to directly reconstruct the grayscale image from minutiae. The orientation field is estimated by fitting a modified model initially proposed in [21] to the minutiae directions. Feng, and Jain [22] proposed a novel approach to fingerprint reconstruction from minutiae template which first reconstructs a phase image from the minutiae template and then converts the phase image into the grayscale image. The advantages of this approach over existing approaches to fingerprint reconstruction [17], [18], [20] are: 1.A complete fingerprint can be reconstructed and 2. The reconstructed fingerprint contains very few spurious minutiae

Algorithm for estimating LRO at a point x= 0, 1, 2… 31 where

Algorithm for estimating LRO at a point Projections of a window of fingerprint image data. The projections which exhibit the greatest variation correspond to the orientation of the ridges within the window. Eight projection are shown here [2].

Gabor Filter Car image Lossy image translation

Gabor filter Building image Rotated image

Gabor filter Equation 1: Equation 2: Equation 3:

Gabor filter substituting equation 1 and equation 2 in equation 3: Since exp[jθ] = cosθ + jsinθ

Gabor filter One dimensional Gabor filter [29]

Results Original image 1Gabor filtered image1

Results Histogram of the original image1 Histogram of the Gabor filtered image1

Results Histogram equalized of the Gabor filtered image1

Results Original image 2Gabor filtered image2

Results Histogram of the original image2 Histogram of the Gabor filtered image2

Results Histogram equalized of the Gabor filtered image2

Results Original image 3Gabor filtered image3

Results Histogram of the original image3 Histogram of the Gabor filtered image3

Results Histogram equalized of the Gabor filtered image3

Results Original image 4Gabor filtered image4

Results Histogram of the original image4 Histogram of the Gabor filtered image4

Results Histogram equalized of the Gabor filtered image4

Results Original image5Gabor filtered image5

Results Histogram of the original image5 Histogram of the Gabor filtered image5

Results Histogram equalized of the Gabor filtered image5

Results Original image 6Gabor filtered image6

Results Histogram of the original image6 Histogram of the Gabor filtered image6

Results Histogram equalized of the Gabor filtered image6

Results

Conclusions In this thesis Gabor filter is used for fingerprint enhancement technique. Because of its frequency selective and orientation selective properties it is very effective for fingerprint enhancement. A window of size 32 by 32 pixels is centered at the point where the LRO is to be found. This window is rotated to 16 different orientations. The projections which exhibit the greatest variation corresponds to the orientation of the ridges within the window. The primary advantage of the approach is improved translation and rotation invariance.

Appendix An even symmetric Gabor filter has the following general form in the spatial domain:

Appendix Fig A.1 The range of x and y goes from -15 to 15 to produce the Gabor kernel

Appendix

Fig A.3 Gabor filters of size 16 × 16 by 8 orientations and 5 Resolutions (real part).

We input different values of x and y from fig A.1 which varies from -15 to +15 and different orientation values and substitute them in equation A.2 and A.3. Then after that we input those values from equation A.2 and A.3 in equation A.1 to obtain Gabor kernels (32x32) (fig.A.2 (c)). Then we convolve the Fourier image and Fourier filter bank (fig A.3). Let I(x,y) be the image Let g(x,y,f,theta) be the Gabor filter Let F(.) be the Fourier transform and Finv(.) be the inverse Fourier transform. Let * be the convolution and. be pointwise multiplication. I(x,y)*g(x,y,f,theta)=Finv(F(I(i,x)).F(g(x,y,f,theta)))=Gabor filtered image.

Future Work Future work would involve making the fingerprint enhancement technique more efficient. The experimental results show that the reconstructed image is very consistent with the original fingerprint image. The reconstructed image still contains some spurious minutiae To make the reconstructed fingerprints appear visually more realistic, brightness, ridge thickness, pores, and noise should be modeled. Reconstructed fingerprints can be further improved by reducing the image quality around the spurious minutiae.

References 1.A.M.Raievi and B.M. Popovi, “An effective and robust enhancement by adaptive filtering domain”, SER.:ELEC.ENERG. vol.22, no. 1, pp , April B.G. Sherlock, D.M. Monro, and K. Millard, “Fingerprint enhancement by directional Fourier filtering”, IEE Proc. Vision Image Signal Process., vol.141, no. 2, pp , April L. Hong, Y.Wan, and A.K. Jain, “Fingerprint image enhancement: Algorithm and performance evolution”, IEEE Trans. PAMI, vol. 20, no. 8, pp , Aug Fingerprint database, “ nist.gov/itl/iad/ig/sd27a.cfm”. 5.K.R.Rao, D.N.Kim and J.J.Hwang, “Fast Fourier transform: Algorithms and applications”, Heidelberg, Germany: Springer A. K. Jain et al, “An identity authentication system using fingerprints”, Proc. IEEE, vol. 85, no. 9, pp. 1365–1388, Sep A. J. Willis and L. Myers, “A cost-effective fingerprint recognition system for use with low- quality prints and damaged fingertips”, Pattern Recognition, vol. 34, no. 2, pp.255–270, Feb S. S. Chikkerur, “Online fingerprint verification”, Master’s thesis, The State University of New York at Buffalo, C.-T. Hsieh, E. Lai, and Y.C. Wang, “An effective algorithm for fingerprint image enhancement based on wavelet transform”, Pattern Recognition, vol. 36, no. 2, pp.303–312, Feb S.Greenberg, et al, “Fingerprint image enhancement using filtering techniques”, International Conference on Pattern Recognition, vol. 3, pp. 326–329, Sep

References 11.A.M. Bazen, et al, “A correlation-based fingerprint verification system”, Proceedings 11th Annual Workshop Circuits Systems and Signal Processing, pp , Nov L.R. Thebaud, “Systems and methods with identity verification by comparison and interpretation of skin patterns such as fingerprints,” US Patent No , June J. Feng, Z. Ouyang, and A. Cai, “Fingerprint matching using ridges,” Pattern Recognition, vol. 39, no. 11, pp , Nov M. Hara and H. Toyama, “Method and apparatus for matching streaked pattern image,” US Patent No. 7,295,688, Nov N.K. Ratha, et al, “Robust fingerprint authentication using local structural similarity”, Fifth IEEE Workshop Applications on Applications of Computer Vision, pp , Dec A.M. Bazen and S.H. Gerez, “Fingerprint matching by thin-plate spline modelling of elastic deformations”, Pattern Recognition, vol. 36, no. 8, pp , Aug C. Hill, “Risk of masquerade arising from the storage of biometrics”, Master’s Thesis, Australian National University, A.Ross, J. Shah, and A.K.Jain, “From template to image: Reconstructing fingerprints from minutiae points”, IEEE Trans. PAMI, vol. 29,no. 4, pp , Apr B.G.Sherlock and D.M.Monro, “A model for interpreting fingerprint topology”, Pattern Recognition, vol.26, no.7, pp , July R. Cappelli, et al, “Fingerprint image reconstruction from standard templates”, IEEE Trans. PAMI, vol. 29, no. 9, pp , Sep

References 21.P.R. Vizcaya and L.A. Gerhardt, “A nonlinear orientation model for global description of fingerprints,” Pattern Recognition, vol. 29, no. 7, pp , Jul J. Feng, and A. K. Jain, “Fingerprint reconstruction: From minutiae to phase”, IEEE Transactions on PAMI, vol. 33, no. 2, pp. 209 – 223, Feb T-Y. Jea, “Minutiae-based partial fingerprint recognition”, Master’s Thesis, University at Buffalo, the State University of New York, Nov A. Ullah, R. Khan and M. Shakeel, “Fingerprint recognition and password security system”, Project, “ thesis”, July L. O’Gormann and J.V.Nickerson, “An approach to fingerprint filter design”, Pattern Recognition, vol. 22, no. 1, pp.29–38, Jan D. Maltoni et al, “Handbook of fingerprint recognition”, Springer, R. Cappelli, “Synthetic fingerprint generation”, in D. Maltoni, D. Maio, A.K. Jain and S. Prabhakar, “Handbook of fingerprint recognition” 2nd Edition, Springer, London, R.C. Gonzalez and R.E.Woods, “Digital image processing”, Prentice Hall, 3rd Edition, Aug K.G.Darpanis, “Gabor Filters”, York University, April 2007.

Thank You