JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 1, ISSUE 2, JUNE 2010 28

An Approach For Minutiae-based Fingerprint Feature Extraction Zhi Hao Lo, Peng Leong Teh, Siak Wang Khor Faculty of Information and Communication Technology Universiti Tunku Abdul Rahman Petaling Jaya, Malaysia

Abstract— In this paper, we present an enhanced minutiae-based fingerprint feature extraction approach for use in Fingerprint Identification System (FIS), to increase the accuracy of the extracted fingerprint features by filtering false minutiae. The approach consists of two main modules namely image preprocessing and feature extraction. The first module performs several image pre-processing tasks such as image binarization, thinning and trimming, to produce a clearer fingerprint image as the input to the second module which is the feature extraction module, where the resultant image will be divided into 3 by 3 pixels per block. Each block will be filtered to obtain the termination point and bifurcation point which will then be filtered again to remove the spurious points using Euclidean distance. We will determine the region of interest of the fingerprint image to retrieve only the minutiae points in the specified region so that the false minutiae points at the edges of the ridges can be reduced. Experiments involving a wide range of dataset from FVS2004 have been carried out. All of the fingerprint images with various backgrounds were successfully segmented, and the features were properly extracted, indicating the robustness and effectiveness of this approach in extracting fingerprint features with minimized false minutiae points. Index Terms- Fingerprint feature extraction, minutiae, fingerprint segmentation

I.

INTRODUCTION

Fingerprint recognition system has been widely researched and developed in the early 19th century and today [4], the fingerprint identification system plays a major role in advance security system and has grown up to be one of the major biometric technologies in the world [3]. In order to increase the accuracy of fingerprint recognition, fingerprint image pre-processing and feature extraction play a crucial part in increasing the accuracy of the system. Fingerprint image pre-processing should be able to refine the input image to a suitable image for feature extraction. The feature extraction approach used in our proposed system is minutiae-based where minutiae are the termination and bifurcation points of the ridge lines on the finger. Fingerprint recognition system can be implemented in various applications, such as ATM system, personnel identification system at workplaces and on personal computers. In this paper, we focus on the image preprocessing and feature extraction process only. Enhancement

to the image pre-processing helps to refine the image input to a more suitable input through multiple filtering stages. For instance, a distorted grayscale image can affect the result of feature extraction. Hence in our approach, pre-processing techniques are applied to eliminate the noise to the minimum to provide a better source for the feature extraction process. After extracting the fingerprint minutiae which include termination and bifurcation points, Euclidean distance is used to remove the spurious points. Besides, a trimming method is included in the approach to properly locate the region of interest in the fingerprint image. This paper is organized as follows. Section 2 is about related works. In section 3, we introduce the methodology of the approach. Section 4 is about the experiment and result. II.

RELATED WORKS

Many approaches have been presented to make the fingerprint recognition a reality. Extensive research efforts have been done to overcome the obstacles found during the development of the system, as in [2]-[8]. A fuzzy approach has been proposed in [2] to combine three minutiae extraction algorithms - sequential method, the reactive agent and the neural classification system. The sequential method works by following the ridge lines that are present on the grayscale image until it meets the ending point of the ridge or an intersection point with another ridge line. The reactive agent consists of two modules, which are the Self-Organizing Map (SOM) networks of Kohonen and Multilayer Perception (MLP) based on the ErrorBackpropagation rule. Neural classification system elaborates the fingerprint subdividing the image into blocks with opportune dimension. These three methods are joined using the fuzzy logic. Minutiae are identified not only by the Cartesian (x and y) coordinates and orientation, but also by the level of belonging to the OR Fuzzy set produced by the three methods. This approach provides a high recognition rate. However, it only works well for good quality images but not on low quality images. In addition, result generated from the three methods is time consuming and complicated. In [6], the authors proposed an algorithm to compute the fingerprint image quality score, extract fingerprint features and perform identification using an indexing scheme. Their proposed algorithm, Redundant Discrete Wavelet Transform (RDWT), is the extended version of the previously proposed

© 2010 JCSE http://sites.google.com/site/jcseuk/

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 1, ISSUE 2, JUNE 2010 29

local image quality assessment algorithm [reference for the previously proposed 1]. It performs error normalization by incorporating the weight factor and encoding the degree of irregularity in the local regions as well. There are multiple levels of feature extraction followed by the scale multiplication based edge detection algorithm together. The authors have also proposed a minutiae triplet based fingerprint identification algorithm that combines level-1, level-2, and level-3 features. The algorithm starts with computing a Delaunary triangle using the minutiae points. Each triangle in the Delaunary triangulation is used as a minutiae triplet. After the triangulation, fingerprint features are encoded as the indexing parameters which are used for identification. And finally, a quality-based likelihood ratio is used to attune the top M matches to further improve the identification performance. The result of the experiment in [6] showed the effectiveness of the proposed algorithm with respect to both accuracy and speed. Besides, the algorithm also shows a high accuracy for latent images by utilizing three levels of

fingerprint information. However, this approach may be computationally expensive and time consuming since it involves the integration of many algorithms. Besides, an image pre-processing method proposed in [8] is one of the few approaches that efficiently segment the foreground of fingerprint. The algorithm worked by eliminating the background region of the image through the projection of gradient to both horizontal and vertical axis. The projection is then compared with certain threshold to extract the fingerprint foreground. After that, the foreground of the fingerprint image can be finely estimated using the morphological operations like opening and closing [put a reference here for opening and closing]. This approach successfully reduced the computational time of extracting the fingerprint foreground. However, this method is heavily depending on the first derivatives. In this paper, we would like to present an enhanced fingerprint feature extraction method combining image preprocessing and minutiae extraction approach, with improved robustness to identify a fingerprint better.

© 2010 JCSE http://sites.google.com/site/jcseuk/

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 1, ISSUE 2, JUNE 2010 30

Figure 1. System architecture

Binarization

Thinning

Trimming

Figure 2. Image pre-processing stages

III.

METHODOLOGY

The proposed approach extracts the minutiae point from the fingerprint in a more simplified manner and uses various image preprocessing algorithms to enhance the feature extraction accuracy. As illustrated in Figure 1, there are two main modules in our system, namely image pre-processing and feature extraction. A.

Image Pre-processing The objectives of this module are to counter the distortion of input fingerprint image and compute a solution for the problem of inconsistencies of finger contact pressure. Firstly, binarization is performed on the grayscale fingerprint image to convert it into a black and white image with a threshold value of about 0.6. The threshold value is decided empirically to provide an image with minimum noise. Any pixel with value greater than the threshold will be converted to black pixel, and the rest will be white pixel. To reduce the thickness of all ridge lines, a thinning process is carried out with the block filtering method [ref for block filter] which attempts to preserve the outermost pixels along each ridge. The thinning process is done first by applying a morphological thinning operation to thin the ridge lines into single-pixel width. It removes pixels so that an object without holes shrinks to a minimally connected stroke, and an object with holes shrinks to a connected ring halfway between each hole and the outer boundary. Subsequently, image trimming is performed to reduce the extra white space of the fingerprint image. We determine the first black pixel that we get from the left border and top border of the image. Once we detect a black pixel, we record the position of the previous line of pixel. The image is rotated 180 degree to get the two positions.

The four positions that we have will be used as the new border of the trimmed image. Original image with extra white space will be cropped using the four borders resulting an image with lesser white space. Figure 2 shows an example of fingerprint image going through the image preprocessing steps. The resulted output will be fed to the next module to extract the minutiae features of the fingerprint. B. Feature Extraction In this module, we use a minutiae-based feature extraction method to determine the termination and bifurcation points in the fingerprint image. The preprocessed fingerprint image obtained from the previous module is divided into blocks with 3x3 pixels each. The blocks will be filtered to determine the termination and bifurcation points. The filter process works by determining the color of the center pixel of the block in the first place. If the center pixel is in white color, it will calculate the number of neighboring white pixels in the 8-connected neighborhood. Next, if the number of neighboring white pixels is 1, the center pixel will be determined as a termination point (Figure 3). On the other hand, if the number of neighboring white pixels is 3, then the center pixel will be determined as a bifurcation point (Figure 4). The positions of the termination and bifurcation points will be labeled and recorded. Subsequently, the spurious minutiae points (possible fake minutiae points) will be filtered for better system accuracy using Euclidean distance d as indicated in Equation 1, where p and q are the positions of the minutiae points.

© 2010 JCSE http://sites.google.com/site/jcseuk/

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 1, ISSUE 2, JUNE 2010 31

setting the border at 20% (of the size of the pre-processed fingerprint image) from the outer pixel of the image, as (1) illustrated in Figure 5. With this, we can suppress the minutiae outside the ROI, which can possibly be the false minutiae points at the edges of the ridge lines. 20% 20% ROI Figure 3. A termination point is a white center pixel with one neighboring white pixel.

20% 20% Figure 5. Setting the region of interest

Subsequently, the system will find the angle orientation of the minutiae points, by comparing the position of the white pixel on the boundary of a 5x5 bounding box of the termination point and bifurcation point with the matrix shown in Table 1. The table variable represents the orientation of angle in radian. Figure 4. A bifurcation point is a white center pixel with three neighboring white pixels connected. TABLE I.

The calculated distance d will then be compared with D, an empirical determined threshold value (suggested value is 6 as value greater than 6 will increase the number of spurious point and value less than 6 will be the opposite.) to determine whether the minutiae point is valid or not. A minutia will be determined as invalid and removed based on the following conditions: • The distance between a termination and a bifurcation is smaller than D • The distance between two bifurcations is smaller than D • The distance between two terminations is smaller than D After the minutiae reduction process, we specify a region of interest (ROI) so that only the minutiae points that fall inside the region will be extracted. The ROI is obtained by

(a)

(b)

MATRIX USED FOR FINDING MINUTIAE ANGLE ORIENTATION

3*pi/4

2*pi/3

pi/2

pi/3

pi/4 pi/6

5*pi/6

0

0

0

pi

0

0

0

pi

-5*pi/6

0

0

0

-pi/6

-3*pi/4

-2*pi/3

-pi/2

-pi/3

-pi/4

3*pi/4

2*pi/3

pi/2

pi/3

pi/4

5*pi/6

0

0

0

pi/6

pi

0

0

0

pi

-5*pi/6

0

0

0

-pi/6

-3*pi/4

-2*pi/3

-pi/2

-pi/3

-pi/4

(c)

© 2010 JCSE http://sites.google.com/site/jcseuk/

(d)

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 1, ISSUE 2, JUNE 2010 32

Figure 6. Outputs obtained at the feature extraction module. (a)- (b) Minutiae points obtained before and after applying spurious minutiae point filter (termination point indicated by red circle and bifurcation point indicated by green circle). (c) Setting of the region of interest. (d) Minutiae points in the ROI.

IV.

EXPERIMENT AND RESULT

The fingerprint image pre-processing and fingerprint feature extraction modules are implemented in Matlab R2009a and executed on a 2.0GHz Core 2 Duo CPU (provided with affordable processing speed and memory). In this paper, we use the fingerprint images in FVC 2004 [9] to test our approach. We run the experiments on fingerprint images of various backgrounds and illuminations to verify the robustness of our approach. Table 2 shows several examples of fingerprint images obtained at different levels of the image preprocessing module. It can be seen that the images are well pre-processed which provide a good grounding for minutiaebased fingerprint feature extraction. Our method is robust since it can be used for various background of the fingerprint image. We found that there are many kinds of background in TABLE II. No

the FVC 2004 database, and our approach is applicable to all the fingerprint images, with accurate segmentation. Figure 6 shows the results obtained at the feature extraction module. In Figure 6(a), the red circles are the termination point while the green circles denote the bifurcation point. Next, Figure 6(b) shows the result obtained after filtering the spurious points which are candidates for false minutiae points. Figure 6(c) shows the region of interest where we try to focus on extracting minutiae points in the particular region only so that the outer minutiae points, which may also be false minutiae points, are eliminated. Lastly, Figure 6(d) shows the result obtained at the final stage after we suppress the minutiae point external to the region of interest. Several fingerprint feature sets obtained using our proposed approach, are listed in Table 3, where all the fingerprint features were successfully and accurately extracted.

IMAGES OBTAINED AT DIFFERENT STAGES OF THE IMAGE PRE-PROCESSING MODULE.

Original Image

Result of binarization

Result of Segmentation

1

2

3

4

© 2010 JCSE http://sites.google.com/site/jcseuk/

Result of Thinning

JOURNAL OF COMPUTER SCIENCE AND ENGINEERING, VOLUME 1, ISSUE 2, JUNE 2010 33

TABLE III. Xpoint 87 103 112 179 185 112 152 185 130 121

Ypoint 59 81 84 102 107 146 167 174 188 206

experiments and further investigation are needed in order to ascertain the effectiveness of the process.

FINGERPRINT FEATURE EXTRACTION RESULTS Angle Orientati -on 1 0 -0.5236 3.1416 -0.7854 2.6180 2.6180 2.3562 -1.0472 3.1416 -2.6180

Angle Orientati -on 2 1.5708 1.5708

Angle Orientati -on 3 -0.5236 0

REFERENCES

Type of minutiae [1] Termination Termination Termination Termination Termination Termination Termination Termination Bifuration Bifurcation

[2]

[3]

[4]

[5]

V.

CONCLUSION

All the fingerprint features in our experiments were properly extracted from the fingerprint images from FVC 2004 database. The combination of the image pre-processing and minutiae-based feature extraction modules can segment the fingerprint image and retrieve the fingerprint features successfully. The features extracted provide a good platform for fingerprint verification process which uses minutiae point information. False minutiae points at the spurs and edges of the fingerprint image are reduced, whereas the problem of inconsistencies in finger contact pressure was also solved. However, the resultant image is rough if the input image is noisy. Additional smoothing may be required so that the Edges of the fingerprint can be segmented precisely. More

[6]

[7]

[8]

[9]

L.C.Jain, U.Halici, I.Hayashi, S.B.Lee and S.Tsutsui, “Intelligent Biometric Techniques in Fingerprint and Face Recognition,”. United Stated of America: The CRC Press. I Montesanto A., Baldassarri P., Vallese G. & Tascini G. “Fingerprints Recognition Using Minutiae Extraction: a Fuzzy Approach.” Journal of IEEE Xplore, ICIAP 2007. Munir. M. U. & Javed. M. Y, “Fingerprint Matching using Gabor Filters”, 2009 in National Conference on Emerging Technologies (2004), pp. 147-151. Muntenescu. F. (2009), “Fingerprint Matching On Small Images”, STUDIA UNIV. BABES_{BOLYAI, INFORMATICA, Volume LIV, Number 1, 2009, pp.103-108. Muslim, “Fingerprint Pattern Recognition Using Distance Method Algorithm.”, proceeding of the 2nd IMT-GT Regional Conference on Mathematics, Statistics and Application. Vatsa, M.; Singh, R.; Noore, A.; Singh, S.K.; , "Quality Induced Fingerprint Identification using Extended Feature Set," Biometrics: Theory, Applications and Systems, 2008. BTAS 2008. 2nd IEEE International Conference on , vol., no., pp.1-6, Sept. 29 2008-Oct. 1 2008. Chengpu Yu; Mei Xie; Jin Qi; , "An effective algorithm for low quality fingerprint segmentation," Intelligent System and Knowledge Engineering, 2008. ISKE 2008. 3rd International Conference on , vol.1, no., pp.1081-1085, 17-19 Nov. 2008 Article in a conference proceedings. Wu. C.H., Tulyakov. S. & Venu. G, “Robust Point-based Feature Fingerprint Segmentation Algorithm”, Advance in Biometrics, Lecture Notes in Computer Science, Volume 4642/2009, 2009, pp.1095-1103. 2003 Biometric System Lab –University of Bologna. “FVC2004 Fingerprint Verification Competition”. [Online]. Available: http://bias.csr.unibo.it/fvc2004/databases.asp.

© 2010 JCSE http://sites.google.com/site/jcseuk/

An Approach For Minutiae-based Fingerprint Feature ...

incorporating the weight factor and encoding the degree of irregularity ... System architecture ..... [Online]. Available: http://bias.csr.unibo.it/fvc2004/databases.asp.

1MB Sizes 7 Downloads 345 Views

Recommend Documents

A Novel approach for Fingerprint Minutiae Extraction by ...
analysis digital security and many other applications. Fingerprints are fully formed at about seven months of fetus development and finger ridge configurations do not ... point or island, spur and crossover. A good quality fingerprint typically conta

A Novel approach for Fingerprint Minutiae Extraction by ...
analysis digital security and many other applications. .... missing information and removes spurious minutiae. .... Find indices (r, c) of nonzero elements. d.

An Expected Utility Approach to Active Feature-value ...
be represented by the matrix F, where Fi,j corresponds to the value of the j-th ..... Learning Tools and Techniques with Java Implementations. Morgan Kaufmann ...

An Explanation of Cryptographic Key Fingerprint Visualization ...
The authenticity of host '[target.net]:23. ([69.141.191.69]:226)' can't be established. ECDSA key fingerprint is. 1f:0d:00:0c:bd:ba:cb:a0:39:75:ee:91:7d:16:d1:fe.

a feature selection approach for automatic music genre ...
format [14]. The ID3 tags are a section of the compressed MP3 audio file that con- ..... 30-second long, which is equivalent to 1,153 frames in the MP3 file format. We argue that ...... in machine learning, Artificial Intelligence 97 (1997) 245–271

Fingerprint Based Cryptography Technique for ...
The facial images of the sender and the receiver, which hide their respective fingerprints, are used for authentication purpose. The technique safeguards against ...

Fingerprint Instructions for Taxicab Drivers.pdf
Payment should be made payable to the Colorado Public Utilities Commission, or PUC. Personal checks are not accepted. Remit only business checks, money ...

Fingerprint Instructions for Taxicab Drivers.pdf
Fingerprint Instructions for Taxicab Drivers.pdf. Fingerprint Instructions for Taxicab Drivers.pdf. Open. Extract. Open with. Sign In. Main menu.

The Intervalgram: An Audio Feature for Large-scale Melody Recognition
Jun 19, 2012 - comparisons between a reference and the song database, ... identification, and breaks down the problem of creating a system for identifying.

Matlab FE_Toolbox - an universal utility for feature extraction of EEG ...
Matlab FE_Toolbox - an universal utility for feature extraction of EEG signals for BCI realization.pdf. Matlab FE_Toolbox - an universal utility for feature extraction ...

Matlab FE_Toolbox - an universal utility for feature extraction of EEG ...
Matlab FE_Toolbox - an universal utility for feature extraction of EEG signals for BCI realization.pdf. Matlab FE_Toolbox - an universal utility for feature extraction of EEG signals for BCI realization.pdf. Open. Extract. Open with. Sign In. Main me

Fingerprint Based Cryptography Technique for Improved Network ...
With the advancement in networking technology ... the network so that the sender could generate the ... fingerprint and the sender also generates private key.

A Secondary Fingerprint Enhancement for Identification ...
Competition(FVC) 2004 database [20] which contains hundreds of fingerprint images. This enhancement algorithm is executed in MATLAB 7.3.0. Table 1 shows the execution times on different fingerprint images in the database(DB). The first three column a

Filtering Large Fingerprint Database for Latent Matching
Filtering Large Fingerprint Database for Latent Matching. Jianjiang Feng and Anil K. Jain. Department of Computer Science and Engineering. Michigan State ...

Fingerprint Authentication in Action - GitHub
My name is Ben Oberkfell, I'm an Android developer at American Express on the US ... developer.android.com/resources/dashboard/screens.html ... Page 10 ...

FBI Fingerprint Waiver.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Feature Selection for SVMs
в AT&T Research Laboratories, Red Bank, USA. ttt. Royal Holloway .... results have been limited to linear kernels [3, 7] or linear probabilistic models [8]. Our.

Unsupervised Feature Selection for Biomarker ... - Semantic Scholar
Feature selection and weighting do both refer to the process of characterizing the relevance of components in fixed-dimensional ..... not assigned.no ontology.

Filtering Large Fingerprint Database for Latent Matching
Department of Computer Science and Engineering. Michigan State University ... gerprints are acquired from co-operative subjects, they are typically of good ...

An Interdisciplinary Approach
Human-Computer Interaction (HCI) design. His area of ... The Industrial Design Centre (IDC) in IIT Bombay has had an interdisciplinary approach towards design education for several years. .... Since the year 2000, IDC has been conducting an elective

An Applied Approach
as resume writing, interview survival, job description authoring, performance appraisal, ... Managing Organizational Change: A Multiple Perspectives Approach.

Unsupervised Feature Selection for Biomarker ...
factor analysis of unlabeled data, has got different limitations: the analytic focus is shifted away from the ..... for predicting high and low fat content, are smoothly shaped, as shown for 10 ..... Machine Learning Research, 5:845–889, 2004. 2.

Compacting Discriminative Feature Space Transforms for Embedded ...
tional 8% relative reduction in required memory with no loss in recognition accuracy. Index Terms: Discriminative training, Quantization, Viterbi. 1. Introduction.