Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Biometrics: Fingerprint Technology Calvin Shueh Professor Stamp CS265.
QR Code Recognition Based On Image Processing
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Finger print classification. What is a fingerprint? Finger skin is made of friction ridges, with pores (sweat glands). Friction ridges are created during.
1 Fingerprint Recognition Wuzhili ( ) Supervisor: Dr Tang, Yuan Yan Co-supervisor: Dr Leung, Yiu Wing 13/April/2002.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Fingerprint recognition using MATLAB (using minutiae matching) Graduation project Prepared by: Zain S. Barham Supervised by: Dr. Allam Mousa.
E.G.M. PetrakisFiltering1 Linear Systems Many image processing (filtering) operations are modeled as a linear system Linear System δ(x,y) h(x,y)
Chapter 5 Raster –based algorithms in CAC. 5.1 area filling algorithm 5.2 distance transformation graph and skeleton graph generation algorithm 5.3 convolution.
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
January 21, Fingerprint Identification BIOM 426 Instructor: Natalia A. Schmid.
A Review of “Adaptive fingerprint image enhancement with fingerprint image quality analysis”, by Yun & Cho Malcolm McMillan.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Dendrochronology Sebastian Hegenbart Joachim Kerschbaumer
Fingerprint Identification -FBI carries 198 million fingerprints on record -Used for unique identification of a person -First gained credibility when.
Biometrics & Security Tutorial 5. 1 (a) Understand two stages (Enrollment and Authentication) in a fingerprint system. (P6: 12)
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
Fingerprint Recognition Professor Ostrovsky Andrew Ackerman.
MSU CSE 803 Stockman Linear Operations Using Masks Masks are patterns used to define the weights used in averaging the neighbors of a pixel to compute.
Multiple Human Objects Tracking in Crowded Scenes Yao-Te Tsai, Huang-Chia Shih, and Chung-Lin Huang Dept. of EE, NTHU International Conference on Pattern.
Good quality Fingerprint Image Minutiae Feature Extraction
Canny Edge Detector1 1)Smooth image with a Gaussian optimizes the trade-off between noise filtering and edge localization 2)Compute the Gradient magnitude.
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Multiple Biometrics for Personal Verification/Identification
Implementation of An Automatic Fingerprint Identification System Peihao Huang, Chia-Yung Chang, Chaur-Chin Chen Department of Computer Science National.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Following the work of John Daugman University of Cambridge
CPSC 601 Lecture Week 5 Hand Geometry. Outline: 1.Hand Geometry as Biometrics 2.Methods Used for Recognition 3.Illustrations and Examples 4.Some Useful.
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
1 Fingerprint Recognition CPSC 601 CPSC Lecture Plan Fingerprint features Fingerprint matching.
1 Fingerprint Analysis and Representation Handbook of Fingerprint Recognition Chapter III Sections 1-6 Presentation by: Tamer Uz Adaptive Flow Orientation.
COMPARISON OF IMAGE ANALYSIS FOR THAI HANDWRITTEN CHARACTER RECOGNITION Olarik Surinta, chatklaw Jareanpon Department of Management Information System.
Digital Image Processing CCS331 Relationships of Pixel 1.
November 13, 2014Computer Vision Lecture 17: Object Recognition I 1 Today we will move on to… Object Recognition.
Minutiae. Review: Fingerprint Principles According to criminal investigators, fingerprints follow 3 fundamental principles: A fingerprint is an individual.
Fingerprint Image Enhancement 程广权. Introduction Problems – Image contrast – Adverse physical factors Minimize the undesired effects Some intermediate.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
CSC508 Convolution Operators. CSC508 Convolution Arguably the most fundamental operation of computer vision It’s a neighborhood operator –Similar to the.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
A Systematic Approach For Feature Extraction in Fingerprint Images Sharat Chikkerur, Chaohang Wu, Venu Govindaraju
Intelligent Vision Systems ENT 496 Image Filtering and Enhancement Hema C.R. Lecture 4.
Automated Fingertip Detection
1 Machine Vision. 2 VISION the most powerful sense.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
October 1, 2013Computer Vision Lecture 9: From Edges to Contours 1 Canny Edge Detector However, usually there will still be noise in the array E[i, j],
Digital Image Processing Lecture 16: Segmentation: Detection of Discontinuities May 2, 2005 Prof. Charlene Tsai.
Course 5 Edge Detection. Image Features: local, meaningful, detectable parts of an image. edge corner texture … Edges: Edges points, or simply edges,
Lecture 04 Edge Detection Lecture 04 Edge Detection Mata kuliah: T Computer Vision Tahun: 2010.
Computer Vision Image Features Instructor: Dr. Sherif Sami Lecture 4.
Tommy Truong. Objective : To enhance noisy fingerprint images in order to be processed by an automatic fingerprint recognition system, which extracts.
Chapter 6 Skeleton & Morphological Operation. Image Processing for Pattern Recognition Feature Extraction Acquisition Preprocessing Classification Post.
September 26, 2013Computer Vision Lecture 8: Edge Detection II 1Gradient In the one-dimensional case, a step edge corresponds to a local peak in the first.
A Seminar on Fingerprint Recognition in Biometrics
Optical Character Recognition
April 21, 2016Introduction to Artificial Intelligence Lecture 22: Computer Vision II 1 Canny Edge Detector The Canny edge detector is a good approximation.
Implementation of An Automatic Fingerprint Identification System
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Fingerprint Identification
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
Improving the Performance of Fingerprint Classification
Chapter 14: FINGERPRINTS
Coarse Classification
Fingerprint Recognition
Object Recognition Today we will move on to… April 12, 2018
Hybrid Finger print recognition
Fourier Transform of Boundaries
Lab 2: Fingerprints CSE 402.
Presentation transcript:

Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan

Outline Introduction Fingerprint Classification Minutiae Extraction Fingerprint Matching Fingerprint Database Experimental Results Conclusion

Introduction Fingerprint has been used as an individual identification for more than a century. A perfect automatic fingerprint matching system has not been discovered yet. We attempt to develop a sequence of algorithms to achieve an AFMS.

Introduction Diagram of AFMS

Fingerprint Classification (1) Image Enhancement we adopt the following transformation to stretch the distribution of gray levels. μ is the mean of gray levels of input image. α=150, γ=100. σ is the standard deviation of gray level of input image

Fingerprint Classification (2) Original Image Enhanced Image

Fingerprint Classification (3) Computing Block Orientation We compute and at each pixel by Sobel operator. then,

Fingerprint Classification (4) Let be represented by The average gradient in each block R of w by w can be computed by The average gradient direction ψ is given by

Fingerprint Classification (5) Enhanced Image Block Orientation of Image

Fingerprint Classification (6) Region of Interest (RoI) Detection In order to avoid detecting false singular points or minutiae We can use the mean and standard deviation in each block to decide if the block is of interest or not We assign and. is the percentage of distance to the center of a fingerprint image. The mean μ and the standard deviation σ are normalized to be in [0,1] The block is of interest if v > 0.5.

Fingerprint Classification (7) Enhanced image Region of interest

Fingerprint Classification (8) Singular Point Detection Due to the unavoidable noisy directions, we smooth the direction before computing the Poincaré index We regard the direction as a vector, double the angles by using a 3 by 3 averaging box filter to smooth the direction. The average direction of the block is defined as B3B3 B2B2 B1B1 B4B4 BcBc B0B0 B5B5 B6B6 B7B

Fingerprint Classification (9) We compute the Poincaré index by summing up the changes along the direction surrounding the block P. For each block P j, we compute the angle difference from 8 neighboring blocks along counter-clockwise direction. P1P1 P8P8 P7P7 P2P2 PP6P6 P3P3 P4P4 P5P5 Core if the sum of difference is 180° Delta if the sum of difference is - 180° P 1 → P 2 → P 3 → P 4 → P 5 → P 6 → P 7 → P 8 → P 1

Fingerprint Classification (10) The Detected Singular Points on Fingerprint Images

Fingerprint Classification (11) type arch (tented arch) left loopright loop Whorl (twins loop) others # of cores0 or or >2 # of deltas 0 or 1 (middle) 1 (right)1 (left)0 ~ 20 or >2 Criteria for the types of fingerprints

Fingerprint Classification (12) Arch Left Loop Right Loop Whorl undecided

Minutiae Extraction (1) Binarization Assign a pixel as valley (furrow),255, or ridge 0, from its gray value G(i,j) according to the following rule:

Minutiae Extraction (2) Enhanced image Binarized image

Minutiae Extraction (3) Smoothing In order to make the result of thinning better, we might further smooth the fingerprint image by filtering. First a 5 by 5 filter is used. The pixel is assigned by: Then a 3 by 3 filter is further proceeded by:

Minutiae Extraction (4) Binarized image Smoothed image

Minutiae Extraction (5) Thinning The purpose of thinning is to gain the skeleton structure of fingerprint image. The ridge is thinned to unit width for minutiae extraction. We use a thinning algorithm based on Hilditch (Suen+Wang, Pavalidis) to preserve the connectedness and shape of the fingerprint image.

Minutiae Extraction (6) Smoothed image Thinning image.

Minutiae Extraction (7) Minutiae Extraction We classify a ridge pixel P from a thinned image into one of the five types according to the number of its 8- connected neighbors. The types can be defined as follows: Ending and bifurcation points are called minutia points. # of neighbors01234 TypeIsolatedEndingEdgeBifurcationCrossing

Minutiae Extraction (8) Due to broken ridges, fur effects, and ridge endings near the margins of an image, we have to remove the spurious minutiae as described below. (1) Two endings are too close (within 8 pixels) (2) An ending and a bifurcation are too close (< 8 pixels) (3) Two bifurcations are too close (< 8 pixels) (4) Minutiae are near the margins (< 8 pixels)

Minutiae Extraction (9) Thinning image Minutiae points after removing spurious minutiae

Minutiae Extraction (10) Fingerprint Template Data The information format of fingerprint template data. The information format of singular points, core or delta. The information format of a minutia. Type#of coresCore*# of deltasDelta*# of minutiaeMinutiae* 4 bits2 bits24 bits2 bits24 bits7 bits26 bits X CoordinateY CoordinateDirection 10 bits 4 bits Kind of MinutiaeX CoordinateY CoordinateDirection 2 bits10 bits 4 bits

Fingerprint Matching (1) Registration Point The registration point is regarded as the origin when processing minutiae matching. –Left Loop and Right Loop: its core is employed –Whorl: the coordinate of the upper-row core is utilized –Arch: we apply the mask shown as follows _ /_\

Fingerprint Matching (2) Minutiae Matching There are four steps involved in our matching process: (1) Check the type of fingerprint (2) Overlay by registration point (3) Rotate and relocate (4) Compute the matching score (5) Comparison (the larger match score, the better match)

Fingerprint Matching (3) The matching score of these two fingerprints is calculated by where M is the number of potential type-matching minutiae within a disk of a certain user-specified radius, R (about 8~16 pixels). r measures the distance between a pair of potentially matched minutia points.

Fingerprint Database (1) Rindex28 Rindex28, is obtained from PRIP Lab at NTHU. It contains 112 images of size 300 by 300 contributed by 28 different individuals. Each contributed 4 times with the same right index finger scanned by a Veridicom FPS110 live scanner with 500 dpi

Fingerprint Database (2) Lindex101 Lindex101, is obtained from PRIP Lab at NTHU. It contains 404 images of size 300 by 300 contributed by 101 different individuals. Each contributed 4 times with the same left index finger scanned by a Veridicom FPS110 live scanner with 500 dpi

Fingerprint Database (3) FVC2000 Sensor TypeImage SizeResolution DB1 Low-cost Optical Sensor300x dpi DB2 Low-cost Capacitive Sensor 256x dpi DB3 Optical Sensor448x dpi DB4 Synthetic Generator240x320about500 dpi

Fingerprint Database (4) Examples of fingerprint images from each database of FVC2000

Experimental Results Rindex28Lindex101DB1DB2DB3DB4 Recognition rate 99.11% 111/ % 334/ % 74/ % 72/ % 70/ % 74/80 Enrolling time for each fingerprint image 0.25 sec 0.25 sec 0.25 sec 0.25 sec 0.45 sec 0.17 sec Matching time sec3.14 sec0.25 sec0.218 sec0.234 sec0.156 sec The experimental results of 6 databases

Conclusion € We reveal three problems, which affect the result of an AFMS which merit further studies. (1) Noise produces the poor binarization results (2) Broken ridges result in the error orientation, which causes the misclassification of a fingerprint type (3) The shifted fingerprint image is difficult to match the minutia pattern well, for example, the type misclassification due to the missing cores or deltas

References Automatic Fingerprint Matching System, Hsin-Hua Yu, M.S. Thesis, March Experiments of Implementing an AFMS on 6 Fingerprint Databases, in preparation, 2007