LOCAL AND GLOBAL TREE GRAPH STRUCTURES FOR FINGERPRINT VERIFICATION S. Nalin Pradeep Vision Technologies Group, Sarnoff Innovative Technologies Private Ltd., Bangalore, INDIA [email protected] Mayur D. Jain, Microsoft (R&D) India Private Ltd. Hyderabad, INDIA [email protected] R Balasubramanian, Rama Bhargava, Department of Mathematics, Indian Institute of Technology, Roorkee, INDIA [email protected] , [email protected] ABSTRACT We introduce fingerprint verification, one of the most reliable personal identification methods in the biometric technology. In this paper, a new approach to the fingerprint verification based on tree graph construction is presented. Initially we find all possible minutiae points, followed by two levels of matching. At the first level match a local tree graph structure (LTGS) is constructed for each minutia considering its nearest points. Through matching of these tree graphs for each minutia, we get a reference point in the fingerprint. Using this reference point, in the second level match we construct a global tree graph structure (GTGS) spread in four quadrants to reliably determine the uniqueness of fingerprint. Therefore, tree graphs constructed using local and global features of minutiae together provide a solid basis for reliable and robust matching. With several fingerprint images, we tested our proposed verification system and the experimental results shows that the performance of our algorithm is good. KEY WORDS Tree Graph, minutiae, fingerprint verification, structure matching

1. Introduction Fingerprint, because of its uniqueness has been used as a positive human identifier from decades owning to their uniqueness and immutability. Today, fingerprints are most widely used biometric features in automatic verification and identification systems. There exists some graph-based [1,2] and image-based [3,4] fingerprint matching but most fingerprint verification systems require high degree of security and are so far based on minutiae matching. This is because it is widely believed that the minutiae of the fingerprint are most discriminating and reliable features [5,6]. In this paper, a new matching

technique is proposed for biometric fingerprint identification. The fingerprint is built from ridge-valley structures. These ridge-valley structures are pre-processed to obtain two prominent minutiae points: ridge ending and ridge bifurcation which are used by Federal Bureau of Investigation [7] for identification. These points can be very easily extracted by the computer using techniques as proposed in [8,9]. We pre-processed the gray level fingerprint image as shown in Figure 1 before performing two levels of matching. A.K Hrechak and J.A Mchugh [10], used just the local structure of the minutia to describe the characteristics of the minutiae. And in [11] some improvements for this approach were proposed. However both these methods use only the local structures which are less distinct feature due to their determination by a small subset of minutia. Templates prints from different fingerprint images may have quite a few similar local structures. Therefore, fingerprint matching based only on the local structure is less reliable. Z. Chen [12] proposed a topology-based matching algorithm for fingerprint authentication. Their algorithm is invariant to translation, rotation and does not depend on reference point. But it’s greatly affected by noise; more noise degrades the performance of their algorithm. A quite different method in [13] was proposed by A.K Jain et.al. An alignmentbased matching algorithm in which the ridges associated with the minutiae was used to align the input minutiae with the template minutiae. An elastic matching algorithm was proposed to match the aligned minutiae. The algorithm reported shows good performance but would result in storing large template size. In this paper, we propose a new fingerprint matching technique based on constructing a local and global tree graph structures. We systematically analyze the minutiae features in a fingerprint for constructing a tree graph. The tree graph structures are easy to be constructed and the two level matching algorithm used is not complex. In the first level matching, minutiae points

based on the position, orientation and location are used relative to the other minutiae, which enable the LTGS formation. This local structure thus established is invariant to rotation and translation. Moreover, they can tolerate reasonable deformation because it is formed from only a small area of fingerprint. The matched LTGS provides correspondence for the second level match. A reference point is established through the matched LTGS. In the second level matching a global tree graph is constructed spread across in four quadrants using the reference point as origin which enables GTGS formation. The second level match together with the result of first level match determines whether the two fingerprints are generated from the same finger. This fine matching strategy makes the algorithm robust to handle distortions in the fingerprint and also for fingerprints subjected to rotation and translation. The paper is organized as follows: section 2 explains about obtaining pre-processed fingerprint image. In section 3, local tree graph construction is explained followed by first level matching using these local structures in section 4. In section 5 global tree graph construction is detailed. Section 6 explains second level GTGS matching and final decision making. Section 7 concludes the work.

2. Fingerprint Pre-processing The Feature extraction is the most important step for verification purpose. The input gray scale fingerprint image is subjected to quite a noise. At the gray level of the image, quality is improved by equalizing the histogram bins throughout the image [14]. The important features of the fingerprint (Ridge endings and bifurcation points) can be obtained only in thinned binarized image. So the gray scale image is converted into binary image by applying a mask considering 11*11 pixels in its neighborhood. After binarization, ridges become very prominent and the gaps within the ridges are smudged by applying median filter [14,15]. To identify the minutia points where ridges end or split, a thinned binary image is required such that ridges are single pixel wide. This thinning morphological operation is carried out considering eight structuring elements [14]. These extracted thinned lines contain protruding, which affect the matching result. The noise like protruding is removed by pruning the thinned extracted lines considering diagonal and vertical structures rotated by 90 degrees [14]. The resultant thinned and pruned binary fingerprint image is used to extract the minutiae points. The main steps during preprocessing of the fingerprint image are shown in Figure 1. A LTGS is constructed for each minutia point identified.

Figure 1: The main sub-steps of our approach. The figure shows intermediate results in our verification system

3. Local Tree Graph Structure

shown in the Figure 2. The two areas formed

Figure 2 illustrates the local tree graph structure construction (LTGS). To construct the LTGS, for each minutia point acting as root of tree, two of its neighboring minutia points are selected as its children. For each child of the root a corresponding neighboring point is selected as its descendant. As shown in the Figure 2, it demonstrates an example of local tree graph structure using five minutiae points. From the figure ‘a’ is the root of the tree, b and c are its descendants, d is descendant of b, and e is the descendant of c. In LTGS, we call the line that connects the minutia points as edge and minutiae points as vertices. We construct a vector from the LTGS for the first level matching. For constructing the vector, we extract the following features: 1.

The distance between the two minutiae points connected by an edge, as D shown in Figure 2.

(a)

1

2

3

4

)

It is apparent that the D, α , β and A together are invariant to translation, rotation because the features consider are relative to other minutiae points. If suppose P and Q are the corresponding minutiae points from two images of same finger then P and Q will have a similar Local Tree Graph Structure (LTGS). This LTGS is easier to be extracted, because of its simple structure; the matching between the fingerprints is faster. Using these four features extracted for a minutiae point, we perform a first level LTGS matching

Local Tree Graph Structure ( LTGS) (b) LTGS in thinned fingerprint Figure2: Example of LTGS

each edge are obtained as D , D , D , D

4. First level LTGS matching

1

2

3

4

).

The angle α between the two neighboring edges, as shown in the Figure 2.The angle difference between edges are obtained

(α1,α2 ,α3 ) .

The angle β between an edge and orientation of its minutiae, as shown in the Figure 2. The angle obtained for four edges are

4.

(

as D , D , D , D , α1 , α 2 , α 3 , β 1, β 2 , β3 , β 4 , A1 , A2

and determine a reference point (Rp).

as 3.

These four features are extracted for the root minutia with its descendants. The vector can be represented

The distance between the minutiae points for

(

2.

( 1 2) .

from the two leaves are A , A

( β1, β2 , β3, β4 ) .

The area A formed when an imaginary line connects the root from one of the leaves as

In this section, we introduce first level LTGS matching algorithm to find LTGS pairs of the two fingerprints. Let ( D11, D12 , D13, D14 ,α11,α12 ,α13, β11, β12 , β13, β14 , A11, A12 ) & ( D21, D22 , D23, D24 ,α21,α22 ,α23, β21, β22 , β23, β24 , A21, A22 )

be two vectors from two different fingerprints representing LTGS. In order to compare these two vectors, we compute: 1.

Relative distance Rd of the two edge

RD1 = D11 − D 21 / min( D11, D 21)

(1)

min() means to select the minimal of two values.

2.

The angle difference between the two edges connecting the minutiae points

∆α 1 = α 11 − α 21 3.

(2)

The angle difference between the minutiae orientation and its edge

∆β 1 = β11 − β 21 4.

(3)

The area difference formed between the root and its leaves.

∆A1 = A11 − A21

(4)

We say that both local graph structures from two different fingerprints have really matched by computing the LTGS score. This LTGS Score helps in identifying a similarity measure between two vectors. LTGS score is computed for the two vectors as:

If less than TPERCENT of minutiae points match from P and Q sets then second level matching is carried out considering global features of fingerprint using Rp as reference point .

5. Global Tree Graph Structure In section 4, we carried out the first level match using LTGS. However, just matching the fingerprints through LTGS is not enough for making verification decisions; because LTGS constructed might tend to be similar among different fingerprints. Therefore we match the global features of fingerprint by constructing a Global Tree Graph Structure (GTGS) as shown in Figure 4(a), 4(b). Figure 4(a) shows complete GTGS structure formed

LTGS Score = wD ( RD1 + RD2 + RD3 + RD4 ) + wα (∆α1 + ∆α2 + ∆α3 ) + wβ (∆β1 + ∆β2 + ∆β3 + ∆β4 ) +

(5)

wA (∆A1 + ∆A2 ) where, wD is a weighting factor for the relative distance,

w A is weighting factor for area, and wα , wβ are weighting factors for the respective orientations. These weighting factors are a linear combination of sum to calculate the LTGS score. Assuming, that there are two sets of minutiae points P and Q from two different fingerprint images, then by the algorithm shown in figure 3, first level LTGS match is performed. C reate L T G S ( P1, 2.... M )

Figure 4(a): GTGS structure in thinned fingerprint image

C reate L T G S ( Q1, 2..... N ) for all P i ∈ P { for all Q j ∈ Q { C alculate L T G S vector ( P i ) C alculate L T G S vector ( Q j ) C om pute L T G S Score = L T G S vector ( P i , Q j ) Store L T G S Score in list < i , j > } if (m in( list i , j1, 2 ... N M inutiae M atch

≤ , T L T G S ){ = M inutiae M atch + 1

} } if ( M inutiae M atch > T P E R C E N T ) F ingerprints M atched else{ Store R eference P oint ( R p ) = m in( list < P , Q > ) // M inim um L T G S Score taken as reference point D o Second L evel M atch }

Figure 4(b): GTGS structure in quadrant (Q1) with four minutiae points Figure 3: First level LTGS matching algorithm

based on the algorithm explained in Figure 5. In Figure 4(b), we demonstrate an example of GTGS in Q1 with four minutiae points. We call the line that connects two minutiae points an edge. And, for each edge we extract the following features: 1.

The length of an edge connecting two minutiae points in a quadrant, as L shown in Figure 4(b). The length of each edge is obtained

(1

as L , L .....L

2

n

) with ‘n’ being number of

edges in a quadrant. 2.

The slope of an edge connecting two minutiae points in a quadrant, as θ shown in Figure 4(b).The slope of each edge is obtained as being number of edges (θ1,θ2.....θn ) with ‘n’ being

in a quadrant. 3.

each quadrant. Second level matching is performed using this GTGS.

6. Second level GTGS matching Based on GTGS features extracted in section 5, we perform second level match. Let P and Q be two different fingerprints. Let the two vectors from P and Q for quadrant (Q1) be denoted as

{( L11,θ11, R11) ,( L12,θ12, R12) ,......( L1n,θ1n, R1n)} {( L21,θ21,R21) ,( L22,θ22,R22) ,......( L2m,θ2m,R2m)}

where n and m are number of edges in quadrant (Q1) of the fingerprint image P and Q respectively. In order to compare these two vectors, we compute: 1.

The number of ridges cut by an edge, as R shown in Figure 4(b). The ridges cut by each edge are obtained as

( R1, R2.....Rn ) with ‘n’

The Length difference of an edge from two fingerprint images

∆L1 = L11 − L21 2.

being number of edges in a quadrant.

quadrant is

∆θ1 = θ11 − θ 21

{( L1,θ1, R1 ) , ( L2 ,θ 2 , R2 ) ,...... ( Ln ,θ n , Rn )}

This vector is extracted for each quadrant. The algorithm shown below explains about adding this vector from each quadrant to form GTGS of the fingerprint image.

Consider reference point Rp as origin Divide image into four quadrants (Q1...4 ) w.r .t Rp for each Qi ∈ Q{ N i = Get No of Minutiae Points (Qi ) initialize K = Rp While( N i is not empty ) {

3.

(6)

The Slope difference of an edge from two fingerprint images

An edge in a quadrant is represented by vector

( L,θ , R ) . So, the vector representing all the edges in a

and

(7)

The Ridge count difference of an edge from two fingerprint images

∆R1 = R11 − R21

(8)

So, the difference vector for each edge in quadrant Q1 is obtained as

{( ∆L1,∆θ1,∆R1) ,( ∆L2,∆θ2, ∆R2) ,......( ∆Lr, ∆θr, ∆Rr )}

where r = min(m,n). We compute GTGS Score for the quadrant Q1 as in equation (9).

GTGS Score = wL (∆L1 + ∆L2 + .... + ∆Lr ) + wθ (∆θ1 + ∆θ2 + .... + ∆θr ) +

(9)

wR (∆R1 + ∆R2 + .... + ∆Rr )

L = GetNearestPoint ( K )

where, wL , wθ and wR are weighting factors.

AddVertex (Qi , L )

Similarly the GTGS Score is calculated in other quadrants. We say that the global tree graph structures from two different fingerprints P and Q have really matched if GTGS Score in each quadrant is less than

GetEdgeFeatures ( K , L ) store K = L

threshold (TGTGS ) .

} } Figure 5: GTGS construction algorithm

GTGS thus constructed would have Rp as root and its descendants being connected minutiae points formed in

7. Experimental results and Conclusion In order to evaluate our algorithm on fingerprint verification system, we tested our approach with 330 fingerprint images with 5 images per finger. In our experiment, 270*270 gray scale images were employed with 2 8 gray levels. Our fingerprint image database includes various quality fingerprint images; some are shown in Figure 6.

Figure 6: Different quality fingerprint images

The match percent for the images is represented in Figure 7 as False Refuse Rate (FRR) and False Accept Rate (FAR). For varying thresholds TGTGS the results are shown in the Figure 7, from which we infer that our algorithm has better performance in fingerprint verification when TGTGS lies between 0.15 and 0.2. For the biometric system to work effectively both FAR and FRR should be as low as possible, for the criteria when FAR = FRR.

16

Percent %

14 12

FAR FRR

10 8 6 4 2

0. 02 5 0. 07 5 0. 12 5 0. 17 5 0. 22 5 0. 27 5 0. 32 5

0

Figure 7: Experimental results FAR and FRR

Further analysis of the system is carried out through FAR and FRR. System Verification Rate calculated as follows evaluates the biometric system performance: FAR+ FRR SVR = (1 − ) * 100 (10) Number of Access Table 1 shows the SVR for different thresholds ( TGTGS ). At TGTGS = 0.176, where FAR and FRR curves intersect in Figure 7, the SVR is maximum at 98.47%.

Table1: System verification rate Threshold

TGTGS 0.025 0.075 0.125 0.15 0.175 0.2 0.225 0.275 0.325

SVR (%) 85 90 96.72 98.34 98.47 97.759 96.93 91.58 87.83

In this paper, we have proposed the new method of matching two fingerprints by local and global tree graph structures. In the verification stage of our algorithm, we constructed LTGS using five minutiae points. For each structure, four features were taken, which would not be subjected to changes due to the fingerprint orientation. The LTGS Score calculated turns to zero for minutiae points taken from the same fingerprint. The two level matching helped in getting improved match result for the fingerprints. At the first level matching, the construction of LTGS helped in attaining reference point (Rp). In second level GTGS match using Rp we matched the global features of fingerprint in each quadrant. Experimental results show that performance of our algorithm is good, reliable and accurate. The reason for failure in verification of our system is the poor quality of fingerprint image as shown in Figure 6. If we add some stricter image pre-processing, the performance can be greatly improved. Our future work would involve concentrating more on effective ways to obtain thinned lines from distorted or smudged image and as well on precise minutiae extraction.

References [1]

[2]

[3]

[4]

S. Gold and A. Rangarajan, “A graduated assignment algorithm for graph matching”, IEEE Trans. Patfern Anal. Machine Intell., vol. 18, no. 4, pp. 377-388, 1996. D.K. Isenor and S. G. Zaky, “Fingerprint identification using graph matching”, Pattern Recognition, vol. 19, no.2, 1986. R. Bahuguna, “Fingerprint Verification Using Hologram Matched Filterings”, in Proc. Biometric Consortium Eighth Meeting, San Jose, CA, June 1996. Access Control Applications Using Optical Computing. (1997). [Online]. Available: http://www.mytec.com/.

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

H.C. Lee and R.E. Gaensslen, Eds., “Advances in Fingerprint Technology”, New York: Elsevier, 1991. J. H. Wegstein, “An Automated Fingerprint Identification System”, US Government Publication, Washington, 1982. Federal Bureau of Investigation, The Science of Fingerprints: Classification and Uses, Washington, D.C.: GPO, 1984. A. K. Jain, L. Hong, S. Pankanti, and R. Bolle, “An Identity-Authentication System Using Fingerprints”, Proc.IEEE, vol. 85, no. 9, pp. 1365-1388, Sept. 1997. X.D. Jiang, W.Y. Yau and W. Ser, “Minutiae extraction by adaptive tracing the gray level ridge of the fingerprint image”, IEEE Sixth International Conference on lmage Processing, Kobe, Japan, 1999. A. K. Hrechak and J. A. Mchugh, “Automated fingerprint recognition using structural matching”, Pattern Recognition, vol. 23, no. 8, pp. 893-904, 1990. A. Wahab, S.H. Chin and E.C. Tan, “Novel approach to automated fingerprint recognition”, IEE Proc. -Vis. Image Signal Process., Vol. 145, no. 3, pp. 160-166, June 1998. Z. Chen, CH. Kou, “A topology-based matching algorithm for fingerprint authentication”, Proceeding of IEEE International Carnahan Conference on Security Topology, October

[13]

[14] [15]

[16]

[17]

[18]

[19]

[20]

1,Taipei,Taiwan,ROC,IEEE press.,1991,pp .8285 A. K. Jain, L. Hong and R. Bolle, “On-Line Fingerprint Verification”, IEEE Trans. Pattern Anal. Machine Intell., vol. 19, no. 4, pp. 302314, 1997. Gonzalez and Woods, Digital Image Processing 2nd edition (Prentice Hall, 2002). L. Hong, A. Jain, S. Pankanti and R. Bolle, “Fingerprint Enhancement", Pattern Recognition, 202-207, 1996. A. K. Jain, L. Hong, S. Pantanki and R. Bolle, “An Identity Authentication System Using Fingerprints”, Proc of the IEEE, vol, 85, no.9,1365-1388, 1997. Maltoni, Maio, Jain, Prabhakar, “Handbook of fingerprint recognition”, Springer 2003, ISBN 0387954317. A.J.Willis, L.Myers, “A Cost-effective Fingerprint Recognition System for Use with Low-quality Prints and Damaged Fingerprint”, Pattern Recognition, Vol. 34, 2001, pp 255-270. V.S. Srinivasan, N.N. Murthy, “Detection of Singular Point in Fingerprint Images”, Pattern Recognition, Vol. 25, NO. 2, 1992, pp 139-153. N. K. Ratha and K. Karu, “A real time matching system for large fingerprint databases”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, no. 8, pp. 799-813, 1996.

Author Guidelines for 8

There exists some graph-based [1,2] and image-based [3,4] fingerprint matching but most fingerprint verification systems require high degree of security and are ...

599KB Sizes 1 Downloads 301 Views

Recommend Documents

Author Guidelines for 8
nature of surveillance system infrastructure, a number of groups in three ... developed as a Web-portal using the latest text mining .... Nguoi Lao Dong Online.

Author Guidelines for 8
The resulted Business model offers great ... that is more closely related to the business model of such an .... channels for the same physical (satellite, cable or terrestrial) ... currently under way is the integration of basic Internet access and .

Author Guidelines for 8
three structures came from the way the speaker and channel ... The results indicate that the pairwise structure is the best for .... the NIST SRE 2010 database.

Author Guidelines for 8
replace one trigger with another, for example, interchange between the, this, that is ..... Our own software for automatic text watermarking with the help of our ...

Author Guidelines for 8
these P2P protocols only work in wired networks. P2P networks ... on wired network. For example, IP .... advantages of IP anycast and DHT-based P2P protocol.

Author Guidelines for 8
Instant wireless sensor network (IWSN) is a type of. WSN deployed for a class ... WSNs can be densely deployed in battlefields, disaster areas and toxic regions ...

Author Guidelines for 8
Feb 14, 2005 - between assigned tasks and self-chosen “own” tasks finding that users behave ... fewer queries and different kinds of queries overall. This finding implies that .... The data was collected via remote upload to a server for later ..

Author Guidelines for 8
National Oceanic & Atmospheric Administration. Seattle, WA 98115, USA [email protected] .... space (CSS) representation [7] of the object contour is thus employed. A model set consisting of 3 fish that belong to ... two sets of descending-ordered l

Author Guidelines for 8
Digital circuits consume more power in test mode than in normal operation .... into a signature. Figure 1. A typical ..... The salient features and limitations of the ...

Author Guidelines for 8
idea of fuzzy window is firstly presented, where the similarity of scattering ... For years many approaches have been developed for speckle noise ... only a few typical non- square windows. Moreover, as the window size increases, the filtering perfor

Author Guidelines for 8
Ittiam Systems (Pvt.) Ltd., Bangalore, India. ABSTRACT. Noise in video influences the bit-rate and visual quality of video encoders and can significantly alter the ...

Author Guidelines for 8
to their uniqueness and immutability. Today, fingerprints are most widely used biometric features in automatic verification and identification systems. There exists some graph-based [1,2] and image-based [3,4] fingerprint matching but most fingerprin

Author Guidelines for 8
sequences resulting in a total or partial removal of image motion. ..... Add noise. Add targets. Performance Measurement System. Estimate. Residual offset.

Author Guidelines for 8
application requests without causing severe accuracy and performance degradation, as .... capacity), and (3) the node's location (host address). Each information ... service also sends a message to the meta-scheduler at the initialization stage ...

Author Guidelines for 8
camera's operation and to store the image data to a solid state hard disk drive. A full-featured software development kit (SDK) supports the core acquisition and.

Author Guidelines for 8 - Research at Google
Feb 14, 2005 - engines and information retrieval systems in general, there is a real need to test ... IR studies and Web use investigations is a task-based study, i.e., when a ... education, age groups (18 – 29, 21%; 30 – 39, 38%, 40. – 49, 25%

Author Guidelines for 8
Suffering from the inadequacy of reliable received data and ... utilized to sufficiently initialize and guide the recovery ... during the recovery process as follows.

Author Guidelines for 8
smart home's context-aware system based on ontology. We discuss the ... as collecting context information from heterogeneous sources, such as ... create pre-defined rules in a file for context decision ... In order to facilitate the sharing of.

Author Guidelines for 8
affordable tools. So what are ... visualization or presentation domains: Local Web,. Remote Web ... domain, which retrieves virtual museum artefacts from AXTE ...

Author Guidelines for 8
*Department of Computer Science, University of Essex, Colchester, United Kingdom ... with 20 subjects totaling 800 VEP signals, which are extracted while ...

Author Guidelines for 8
that through a data driven approach, useful knowledge can be extracted from this freely available data set. Many previous research works have discussed the.

Author Guidelines for 8
3D facial extraction from volume data is very helpful in ... volume graph model is proposed, in which the facial surface ..... Mathematics and Visualization, 2003.

Author Guidelines for 8
Feb 4, 2010 - adjusted by the best available estimate of the seasonal coefficient ... seeing that no application listens on the port, the host will reply with an ...

Author Guidelines for 8
based systems, the fixed length low-dimension i-vectors are extracted by estimating the latent variables from ... machines (SVM), which are popular in i-vector based SRE system. [4]. The remainder of this paper is .... accounting for 95% of the varia