IJRIT International Journal of Research in Information Technology, Volume 1, Issue 5, May 2013, Pg. 59-64

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Fingerprint Recognition Using Minutiae Score Matching 1

1

Punita Arora

Student, Mtech, Department Of Information Technolog, Guru Gobind Singh Indraprastha University, Delhi 1

[email protected]

Abstract The purpose of this paper is to study about the use of distinctive anatomical (e.g., fingerprints, face, iris) and behavioural (e.g., speech, gait, signature) characteristics, called biometric identifiers or traits or characteristics for automatically recognizing individuals. Biometrics is becoming an essential component of effective person identification solutions because biometric identifiers cannot be shared or misplaced, and they intrinsically represent the individual’s bodily identity [1]. No single biometric is expected to effectively meet the requirements of all the applications. Fingerprint recognition has a very good balance of all the properties. A number of biometric characteristics are being used in various applications as Universality, Uniqueness, Permanence, Measurability, Performance, Acceptability, and Circumvention [2].00

Keywords: Fingerprint, Verification, Recognition, Minutiae Score, Biometric Recognition, Security.

1. Introduction Fingerprint identification system has been widely used in many kinds of fields such as public security, enterprise, bank and so on. And the correctness of the feature extraction directly affects the reliability of the system. After introducing fingerprint minutiae, this paper discuss for minutiae extraction based on tracing the thin ridge line, expressing the type of current point and the states of its 8-neighborhood pixels by 8-neighbour coding, which can effectively extract ridge endings and ridge bifurcations in thinned fingerprint image. This cannot only improve the speed of feature extraction, but also accurately eliminate pseudo minutiae, so time of the image processing is shortened, and it can satisfy the need in the practical application. The process of fingerprint identification system mainly includes the following steps: the first step is the fingerprint acquisition, collecting fingerprints using the acquisition device and converting them to images; The second step is the fingerprint image pre-processing, retreating the original fingerprint image, which can reduce noise, and make the fingerprint image become a clear point-line chart, in order to lay the foundation for the fingerprint feature extraction followed. The third step is the extraction of feature points, which is mainly based on fingerprint form and minutiae feature. The final step is the feature points matching, comparing the input fingerprint with the template fingerprint, and judging whether they are the same [1]. The accuracy of feature point extraction, that plays an important role in the fingerprint identification system, directly affects the precision of the result of fingerprint matching. Punita Arora, IJRIT

59

Fingerprints are the most widely used biometric feature for identification and verification in the field of biometrics. In this research we will discuss a minutiae based matching technique. This approach has been intensively studied; this technique is the backbone of the current available fingerprint recognition products.

2 What is Fingerprint? Skin on human fingertips contains ridges and valleys which together forms distinctive patterns. These patterns are fully developed under pregnancy and are permanent throughout whole lifetime. Prints of those patterns are called fingerprints. Injuries like cuts, burns and bruises can temporarily damage quality of fingerprints but when fully healed, patterns will be restored. Through various studies it has been observed that no two persons have the same fingerprints, hence they are unique for every individual Due to the above mentioned properties, and fingerprints are very popular as biometrics measurements. Especially in law enforcement where they have been used over a hundred years to help solve crime. Unfortunately fingerprint matching is complex pattern recognition problem the observations showed that the fingerprints offer more secure and reliable person identification than keys, passwords or id-cards can provide. Examples such as mobile phones and computers equipped with fingerprint sensing devices for fingerprint based password protection are being produced to replace ordinary password protection methods. Those are only a fraction of civilian applications where fingerprints can be used. Fingerprints are the ridge and furrow patterns on the tip of the finger and have been used extensively for personal identification of people. The biological properties of fingerprint formation are well understood and fingerprints have been used for identification purpose for centuries. Since the beginning of the 20th century, fingerprints have been extensively used for identification of criminal by the various forensic departments around the world. Due to its criminal connotations, some people feel uncomfortable in providing their fingerprints for identification in civilian applications. Fingerprints also have a number of disadvantages as compared to other biometrics. For example approximately 4% of the population does not have good quality fingerprint, manual workers get regular scratches on their fingers which poses a difficulty to the matching system, finger skin peels off due weather [3], finger develop natural permanent creases, temporary creases are formed when the hands are immersed in water for a long time and dirty finger cannot be properly imaged with the existing fingerprint sensors [2]. Further, since fingerprints cannot be captured without the user's knowledge, they are not suited for certain applications such as surveillance. . 2.1 Fingerprint Features A fingerprint is a pattern of curving line structures called ridges, where the skin has a higher profile than its surroundings, which are called the valleys. In most fingerprint images, the ridges are black and the valleys are white. Due to all kinds of noise and distortions, fingerprints cannot be matched simply by taking the cross-correlation or the Euclidean distance of the gray scale images. This is solved to some extent by extracting features from the fingerprints that are more robust to the distortions. Commonly used features are: 2.1.1 The directional field (DF) is defined as the local orientation of the ridge-valley structures. It describes the coarse structure, or basic shape, of a fingerprint and is calculated on a regular grid in the fingerprint. An example of a DF is given in Figure 2.1(a).

Punita Arora, IJRIT

60

2.1.2 The singular points (SPs) are the discontinuities in the directional field. Two types of SP exist. According to Henry [Hen00], a core is the uppermost point of the innermost curving ridge, and a delta is a point where three ridge flows meet. In some fingerprints, the SPs fall outside the image area. The SPs are indicated in the DF of Figure (a). 2.1.3 The minutiae provide the details of the ridge-valley structures. Automatic fingerprint recognition systems use the two elementary types of minutiae that exist, being ridge endings and bifurcations. Sometimes composite types of minutiae such as lakes or short ridges are also used. In Figure (b), the minutiae are indicated with small circles.

Figure-1

.

2.2. Why Fingerprints On the increasingly urgent need for reliable security, biometrics emphasized that the authentication method for the next generation. Among the various biometric technologies, fingerprint authentication has been in use longer and has more advantages than other biometric technologies do. Fingerprint authentication is arguably the most sophisticated method for all biometric technologies and has been thoroughly verified through various applications. Fingerprint Authentication has proven particularly high efficiency and further improved technology in criminal investigation for over a century [1]. Even features such as the motion of a person, the face or the firm may change over time and can be fabricated or imitated. However, a fingerprint is completely unique to an individual and remained unchanged throughout life. This uniqueness shows that fingerprint authentication is much more accurate and effective than any other method of authentication. Also, a fingerprint can be taken and digitized by the devices compact and relatively inexpensive and has only a small capacity for storing a database of information. With these strengths, fingerprint authentication has been an important part of the security market and remains more competitive than others in the world today [3].

Punita Arora, IJRIT

61

3. Fingerprint Recognition The method that is selected for fingerprint matching was first discovered by Sir Francis Galton. In 1888 he observed that fingerprints are rich in details also called minutiae in the form of discontinuities in ridges. He also noticed that position of those minutiae doesn’t change over the time. Therefore minutiae matching are a good way to establish if two fingerprints are from the same person or not.

Figure2 Minutia. (Valley is also referred as Furrow, Termination is also called Ending,and Bifurcation is also called Branch) The two most important minutiae are termination and bifurcation, termination, which is the immediate ending of a ridge; the other is called bifurcation, which is the point on the ridge from which two branches derive. The fingerprint recognition problem can be grouped into two sub-domains: one is fingerprint verification and the other is fingerprint identification.

Figure 3: fingerprint verification

Figure 4: fingerprint identification. Punita Arora, IJRIT

62

4. Minutiae Based Matching This is the most popular and widely used in commercial applications, because of its good performance and low computation time, especially for good quality images. This method tries to align the minutiae of the input image (query template) and stored templates (reference template) and find the number of matched minutiae. After alignment, two minutiae are considered in matching if the special distance and direction difference between them are smaller than a given tolerance [8]. A correct aligning of fingerprint is very important in order to maximize the number of matched minutiae; this requires the computing of the translation and rotation information, as well as other geometrical transformations such as scale and distortion. In order to compute efficiently aligning information there has been proposed many approaches. In this section we present a method that uses segments (formed by minutiae) instead of isolated minutiae [14]. A segment is formed by two pair of minutiae of the same fingerprint, the way how the set of segments are constructed may vary (e.g., nearest neighbor, delaunay, etc). The figure below shows the segments constructed from the set of minutiae. Minutiae matching can be seen as a 2D point pattern problem. A matching algorithm is needed to determine the number of matching points between the two point patterns. The algorithm should be able to find optimal translation in x and y coordinates rotation and possible scale difference between the two point patterns. Through those parameters the maximum matching points can be found which is essential to assure good accuracy and performance for fingerprint verification Block-diagram of the automatic fingerprint verification system and its diverse parts can be seen in Figure. The template is a pre-stored point pattern of extracted minutiae from authentic fingerprint. It is produced in the same way as the point pattern of the fingerprint in the Figure on the left.

Figure 5: Steps for Minutia Based Matching

There are different techniques for fingerprint matching such approaches are discussed below. Matching of fingerprint consists of comparing two fingerprints and finds out if they belong to the same finger. Mathematically, any matching algorithm computes the degree of similarity, using the feature information of each fingerprint and return some score (e.g., between 0 and 1) which represents the probability that the two finger are from the same finger. Therefore depending of the resulted score, a fingerprint recognition system decides if there is matching or non-matching. Automatically fingerprint image matching is a challenging problem due to many factors such as displacement, rotation, non-linear distortion, partial overlapping, noise, skin condition, etc [4]. Many algorithms have been proposed in the pattern recognition literature. The large number of approaches can be classified in the following three classes: correlation based matching, minutiae based matching and ridge feature based matching. Punita Arora, IJRIT

63

5. Conclusions In this paper, we have seen what does the term authentication means and the basic classification of authentication techniques. After the detail study of different authentication methods, it is crystal clear that why we prefer Fingerprints technique as a solution. While biometric authentication can offer a high degree of security, they are far from perfect solution. Sound principles of system engineering are still required to ensure a high level of security rather than the assurance of security coming simply from the inclusion of biometrics in some form. The influences of biometric technology on society and the risks to privacy and threat to identify will require mediation through legislation. For much of the short history of biometrics the technology developments have been in advance of ethical or legal ones. Fingerprint Recognition is used as a form of biometric to recognize identities of human beings. It includes all the stages from minutiae extraction from fingerprints to minutiae matching which generates a match score. Various standard techniques are used in the intermediate stages of processing. The relatively low percentage of verification rate as compared to other forms of biometrics indicates that the algorithm used is not very robust and is vulnerable to effects like scaling and elastic deformations. Various new techniques and algorithm have been studied and found out which give better results. Also a major challenge in Fingerprint recognition lies in the pre processing of the bad quality of fingerprint images which also add to the low verification rate.

6. Future Works The future scope of the work is to improve the quality of image either by improving the hardware to capture the image or by improving the image enhancement techniques, so that the input image to the thinning stage could be made better which can improve the future stages and the final outcome. While the implementation is successfully able to decide whether two fingerprint images belong to the same finger or not, it is by no means perfect. There are erroneous results produced sometimes. Also, the computation time of the algorithm is still somewhat high for a seamless real-time application. There is scope for improvement in the image enhancement step and minutiae matching algorithm. Image enhancement is generally the most crucial step as thinning and minutiae extraction simply cannot proceed to give any useful results as long as the quality of the image is very high. A further study into the statistical theory of fingerprint can be done. This can help us to better understand the statistical uniqueness of the fingerprint minutiae. The more refinement in the minutiae calculation can be done by improving the parameters in the algorithm which will help in the more accurate matching of the fingerprint images in the forensic applications.

7. References 1.

G.Sambasiva Rao, C. NagaRaju, L. S. S. Reddy and E. V. Prasad, “A Novel Fingerprints Identification System Based on the Edge Detection”, International Journal of Computer Science and Network Security, vol. 8, pp. 394-397, (2008). 2. Robert Hastings, “Ridge Enhancement in Fingerprint Images Using Oriented Diffusion”, IEEE Computer Society on Digital Image. 3. V. Vijaya Kumari and N. Suriyanarayanan, “Performance Measure of Local Operators in Fingerprint Detection”, Academic Open Internet Journal, vol. 23, pp. 1-7, (2008). 4. Gu Ming. Ancient Identity Card, the Information Age Displays its Talent-a Story of "Fingerprint Identification"[J]. Computer Knowledge and Technology: Experience and Skills: No. 2, 2007. 5. Yuan Weiqi,Bai Yun. Biological Characteristics Identification Technology[M]. Science Press, 2009. 6. Chirag Dadlani, Arun Kumar Passi ,Herman Sahota Mitin Krishan Kumar, “Fingerprint recognition using minutiae based feature” As part of EE851: Biometrics. 7. Fingerprint pattern types By http://www.crimesceneforensics.com/Crime_Scene_Forensics/Fingerprints.html 8. D. Maltoni, D. Maio, A.K. Jain and S. Prabhakar, Handbook of fingerprint Recognition, Springer, 2003, ISBN 0387-95431-7.

Punita Arora, IJRIT

64

Fingerprint Recognition Using Minutiae Score Matching

speech, gait, signature) characteristics, called biometric identifiers or traits or .... lies in the pre processing of the bad quality of fingerprint images which also add to the low ... Images Using Oriented Diffusion”, IEEE Computer Society on Digital.

1MB Sizes 1 Downloads 258 Views

Recommend Documents

Review on Fingerprint Recognition System Using Minutiae ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, ... it a personal identification and ,thus have a number of disadvantages like tokens.

Combining minutiae descriptors for fingerprint matching
minutiae, such as blur, break, border, short ridge, bridge. To classify a genuine ..... between the line connecting two minutiae and one minutia, and the ..... verification, in: Proceedings of the International Conference on Pattern. Recognition ...

Fingerprint matching using ridges
(2) The solid-state sensors are increasingly used, which capture only a portion ... file is small. We have ... the ridge-based system will not degrade dramatically.

A Novel approach for Fingerprint Minutiae Extraction by ...
analysis digital security and many other applications. Fingerprints are fully formed at about seven months of fetus development and finger ridge configurations do not ... point or island, spur and crossover. A good quality fingerprint typically conta

A Novel approach for Fingerprint Minutiae Extraction by ...
analysis digital security and many other applications. .... missing information and removes spurious minutiae. .... Find indices (r, c) of nonzero elements. d.

FM Model Based Fingerprint Reconstruction from Minutiae Template
Michigan State University. {jfeng ... been evaluated with respect to the success rates of type-I attack (match the recon- structed fingerprint .... cal goal is to estimate the FM representation of the original fingerprint, cos(Ψ(x, y)). To obtain th

An Approach For Minutiae-based Fingerprint Feature ...
incorporating the weight factor and encoding the degree of irregularity ... System architecture ..... [Online]. Available: http://bias.csr.unibo.it/fvc2004/databases.asp.

application to fingerprint matching
that is used to find the correspondence of two minutiae sets and increase the reliability of the matching. A finger- print matching algorithm, based on the well-defined similar- ity between minutiac, is developed and tcsted with a series of experimen

Iris Recognition Using Possibilistic Fuzzy Matching ieee.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Iris Recognition ...

A Privacy-compliant Fingerprint Recognition ... - Semantic Scholar
Information Technologies, Universit`a degli Studi di Siena, Siena, SI, 53100,. Italy. [email protected], (pierluigi.failla, riccardo.lazzeretti)@gmail.com. 2T. Bianchi ...

Language Recognition Based on Score ... - Semantic Scholar
1School of Electrical and Computer Engineering. Georgia Institute of ... over all competing classes, and have been demonstrated to be effective in isolated word ...

Language Recognition Based on Score ... - Semantic Scholar
1School of Electrical and Computer Engineering. Georgia Institute ... NIST (National Institute of Standards and Technology) has ..... the best procedure to follow.

Latent Fingerprint Matching: Fusion of Rolled and Plain ...
appear to be a common practice in law enforcement. To our knowledge, only rank level fusion option is provided by the vendors. There has been no systematic ...

Filtering Large Fingerprint Database for Latent Matching
Filtering Large Fingerprint Database for Latent Matching. Jianjiang Feng and Anil K. Jain. Department of Computer Science and Engineering. Michigan State ...

Filtering Large Fingerprint Database for Latent Matching
Department of Computer Science and Engineering. Michigan State University ... gerprints are acquired from co-operative subjects, they are typically of good ...

Fingerprint Representation and Matching in Ridge ...
the orientation of O0 plus 90 degree. The whole region. 2 ... are the r coordinate of p in the associate r-axis. (denoted as r') .... robust, and ii) distortion is considered when computing matching ... and neural network fingerprint matching", Patte

Fingerprint Matching With Rotation-Descriptor Texture ...
[email protected]. 1 This work is ... is 3.8%; fusion with minutia matching gets a better result. 1. Introduction ... Actually in practice, because of poor quality ...

Fingerprint Indexing Using Ridge Invariants
Indexing large fingerprint databases is an ... fingerprint in the database with M fingerprints. When ..... Analysis and Machine Intelligence, 1999, 21 (4), pp.

Fingerprint Template Protection using Steganography
fingerprint authentication system the key element in ... fingerprint template database using steganography. In this scheme steganography is applied at two levels which increase security of the system and make .... Management(IJSPTM), Vol. 1.

PARTIAL SEQUENCE MATCHING USING AN ...
where the end point of the alignment maybe be unknown. How- ever, it needs to know where the two matching sequences start. Very recently [6] proposed an ...