Fingerprint Matching Approach Based On Bifurcation Minutiae
Fingerprint Matching Approach Based On Bifurcation Minutiae
Fingerprint Matching Approach Based On Bifurcation Minutiae
Abstract Fingerprints are the most widely used biometric feature for user identification and verification in the field of biometric identification and security. Minutiae based approach involves extraction of minutiae points from the sample fingerprint images and performing fingerprint matching based on the number of minutiae pairings among two fingerprints in question and generates a matching percentage. Matching techniques still suffer from distortion problems due to poor quality impressions which lead to difficulties in forming a match among multiple impressions acquired from same fingertip. The minutiae from the ridge ending are mostly unreliable due to the poor quality impressions. In this paper we use only the bifurcation minutiae points in the alignment matching stage instead of using it with ending minutiae points. Also we use the bifurcation minutiae points with the ending minutiae points in the match stage. We test the effect of increasing the number of training sets on the performance of our matching technique where it highly reduces FRR when using two templates. The experiment results ensure performance improvements of the enhanced minutiae based approach by taking only the bifurcation minutiae points in the alignment stage sets. The research is coded using MATLAB. Index TermsFingerprints, biometric, Minutiae based approach, image enhancement, Image binarization, Image segmentation, Image thinning, Minutiae marking, False Minutiae Removal.
u fingerprint matching based on the number of minutiae pairings among two fingerprints in question and generates a matching percentage for the two fingerprints similarity. An alignment-based match algorithm partially includes two successive stages, one is for alignment stage and the second is the match stage. Because the minutiae from the ridge ending are mostly unreliable due the poor quality impressions so we discard them from the sets in the alignment stage and calculate the similarity of the two ridges associated with two referenced bifurcation minutiae points and if the similarity is larger than certain predefined threshold value, the algorithm transforms each set of minutiae to a new coordination system whose origin is at the referenced point and whose x-axis is coincident with the direction of the referenced point. Match stage use the elastic match algorithm to count the matched minutiae pairs by assuming two minutiae having almost the same position and direction are identical.
1. INTRODUCTION
ore than a century has passed since Alphonse Bertillon first conceived and then industriously practiced the idea of using body measurements for solving crimes. Just as his idea was gaining popularity, it faded into relative obscurity by a far more significant and practical discovery of the distinctiveness of the human fingerprints. In 1893, the Home Ministry Office, UK, accepted that no two individuals have the same fingerprints. Soon after that, many major law enforcement departments saw potential of fingerprints in identifying repeat offenders who used an alias. They successfully applied the art of fingerprint recognition. The manual method of fingerprint indexing (based on the Henry system of classification) resulted in a highly skewed distribution of fingerprints into bins (types): most fingerprints fell into a few bins and this did not improve the search efficiency. Fingerprint training procedures were time-intensive and slow. Furthermore, demands imposed by the painstaking attention needed to visually compare two fingerprints of varied qualities, tedium of the monotonous nature of the work, and increasing workloads due to a higher demand on fingerprint recognition services. The efforts led to the development of Automatic Fingerprint Identification Systems (AFIS). More recently, however, increasing concerns about security and identity fraud have created a growing need for fingerprint and other biometric technologies for person recognition in a large number of non-forensic applications [1]. In this paper we use minutiae based fingerprint recognition. It involves extraction of minutiae points from the sample fingerprint images and then performing
2. FINGERPRINT RECOGNITION
An important issue in designing a practical biometric system is to determine how an individual is going to be recognized. Depending on the application context, a biometric system may be called either a verification system or an identification system [1]: A verification system authenticates a persons identity by comparing the captured biometric characteristic with his/her previously captured (enrolled) biometric reference template pre-stored in the system. It conducts one-to-one comparison. An identification system recognizes an individual by searching the entire enrolment template database for a match. It conducts one-to-many comparisons.
The block diagrams of fingerprint verification and identification systems are depicted in Figure 1 [1].
invariant and discriminating features are extracted from fingerprint image. Fingerprint classification can be viewed as coarse level matching. Since each match takes some amount of time, the maximum size of database is limited. A solution to this problem is to classify fingerprint, and first matching the fingerprints that use small features. Based on the observations of how human fingerprint experts perform fingerprint recognition, three major problems in designing AFISs were identified and investigated: digital fingerprint acquisition, local ridge characteristic extraction, and ridge characteristic pattern matching [1]. There are three specific classes for all fingerprints based upon their general visual pattern. These are: loops, whorls, and arches. Approximately 60% of the total population have loops, 35% have whorls, and 5% have arches. The three major groups are also subcategorized based upon smaller differences existing between the patterns within the specific group. These subcategories are summarized in table 1 [2]: TABLE 1: FINGERPRINT PATTERN TYPES
I. ARCH a) Plain arch Tented arch II. LOOP a) Radial loop b) Ulnar loop III. WHORL a) Plain whorl b) Central pocket whorl c) Double loop d) Accidental whorl
b)
The enrolment, verification, and identification processes involved the following system modules [1]: Capture: a digital representation of biometric characteristic needs to be sensed and captured by a biometric sensor, such as a fingerprint scanner. Feature extraction: the digital representation (sample) is usually further processed by a feature extractor to generate a feature set to facilitate matching or comparison. Template creation: the template creation module organizes one or more feature sets into an enrolment template that will be saved in some persistent storage. Pre-selection and matching: the pre-selection (or filtering) stage is used in an identification system when the number of enrolled templates is large. Its role is to reduce the effective size of the template database. The matching (or comparison) stage takes a feature set and an enrolment template as inputs and computes the similarity between them in terms of a matching score. The matching score is compared to a system threshold to make the final decision. Data storage: is devoted to storing templates and other demographic information about the user.
Based on the mode of acquisition, a fingerprint image may be classified as off-line or live scan. An off-line image is typically obtained by smearing ink on the fingertip and creating an inked impression of the fingertip on paper. The inked impression is then digitized by scanning the paper using an optical scanner or a high-quality video camera. A live-scan image, on the other hand, is acquired by sensing the tip of the finger directly, using a sensor that is capable of digitizing the fingerprint on contact. Particular kind of off-line images, extremely important in forensic applications, are the so-called latent fingerprints found at crime scenes. The oily nature of the skin results in the impression of a fingerprint being deposited on a surface that is touched by a finger. [1].
2.2 Fingerprint Classification Fingerprint classification involving 6 classes with critical points in a fingerprint called core and delta marked as circles and triangles given in a figure 2. Many classifications are given to patterns that can arise in the ridges of a fingerprint (shown in figure3). These points are called the minutiae of the fingerprint. The most commonly used minutiae in current fingerprint recognition technologies are ridge endings and bifurcations, because they can be easily detected by only looking at points that surround them (Bifurcation is the location where a ridge divides into two separate ridges). A good quality fingerprint contains 30 80 minutiae points [3].
collecting fingerprint samples, there are only few benchmark databases available. Moreover, various types of fingerprints are required to measure how robust the system is in various environments. Some of fingerprint databases are listed in table2 [5]. We use the database provided by FVC2002 DB2 (Fingerprint Verification Competition 2002) the fingerprint were captured using optical sensor and the image size is296*560pixel and its resolution is 569 dpi, we choose seven persons and 3 images for each one. TABLE 2: FINGERPRINT DATABASES
Figure 2 Fingerprint classifications.
A fingerprint is an impression of the epidermal ridges of a human fingertip. A hierarchy of three levels of features, namely, Level 1 (pattern), Level 2 (minutiae points) and Level 3 (pores and ridge shape) are used for recognition purposes. Level 1 feature refer to the overall pattern shape of the unknown fingerprint. Level 2 features refers to specific friction ridge paths like ridge endings, lakes, islands, bifurcations, scars, incipient ridges, and flexion creases. Level 3 details refer to the intrinsic detail present in a developed fingerprint pores, ridge units, edge detail, scars, etc. The three levels are depicted in figure 3 [3].
NIST database
Minutiae features refer to micro-node characters which are also categorized five kinds: ending, bifurcation, liprounding, double bifurcations and bridge, shown in Figure 4[4].
2.3 Fingerprint Databases: Fingerprint identification requires that the fingerprint match a pre-recorded fingerprint template stored in the fingerprint database. Constructing a fingerprint database is important to evaluate the performance of automatic fingerprint recognition systems. Because of the difficulty in
2012 JICT www.jict.co.uk
Features It contains 20,000 fingerprint images of 4,000 fingers from 500 subjects. The volunteers include graduate students, workers, waiters, etc. Each volunteer contributed 40 fingerprint images of his eight fingers (left and right thumb/second/third/fourth finger), i.e. 5 images per finger. All fingerprint images are 8 bit gray-level BMP files and the image resolution is 328*356 It is publicly available and contains 8 bit grayscale fingerprint image pairs each print is 512 X 512 pixels with 32 rows of white space at the bottom of the print. The database is being distributed for use in the development and testing of automated fingerprint classification systems on a common set of images. FVC2006 [8]: There are four distinct databases, DB1, DB2, DB3 and DB4. Each database is 150 fingers wide and 12 samples per finger in depth (i.e., it consists of 1800 fingerprint images). The image format is BMP, 256 gray-levels, uncompressed. FVC2004 [9]: There are Four different databases (DB1, DB2, DB3 and DB4) and for each database a total of 120 fingers and 12 impressions per finger (1440 impressions) were gathered. The size of each database to be used in the test was established as 110 fingers wide (w) and 8 impressions per finger deep (d) (880 fingerprints in all). FVC2002 [10]: There are Four different databases (DB1, DB2, DB3 and DB4) and each database is 110 fingers wide (w) and 8 impressions per finger deep (d) (880 fingerprints in all).
FVC2000 [11]: There are Four different databases (DB1, DB2, DB3 and DB4) and each database is 110 fingers wide (w) and 8 impressions per finger deep (d) (880 fingerprints in all).
interest are obtained, a new modified thinning method using slide neighbourhood processing is applied to clarify the endpoints and the bifurcations in each specific pixel. The proposed methods here going through these stages are Normalization, Binarization, Quality markup and Thinning.
A. Fingerprint Image Enhancement : Fingerprint Image enhancement is to make the image clearer for easy further operations. Since the fingerprint images acquired from sensors or other media are not assured with perfect quality, those enhancement methods, for increasing the contrast between ridges and valleys and for connecting the false broken points of ridges due to insufficient amount of ink, are very useful for keep a higher accuracy to fingerprint recognition. We use Histogram Equalization (HE) method to enhance the contrast of images by transforming its intensity values for reducing the influence of the noise in fingerprint images [12]. B. Fingerprint Image Binarization : Fingerprint Image Binarization is to transform the 8-bit gray fingerprint image to a 1-bit image with 0-value for ridges and 1-value for valleys. A locally adaptive binarization method is performed to binarize the fingerprint image [12]. Such a named method comes from the mechanism of transforming a pixel value to 1 if the value is larger than the mean intensity value of the current block (16x16) to which the pixel belongs. C. Fingerprint Image Segmentation: Region of Interest (ROI) is useful to be recognized for each fingerprint image. The image area without effective ridges and valleys is first discarded since it only holds background information. Then the bound of the remaining effective area is sketched out since the minutiae in the bound region are confusing with those spurious minutiae that are generated when the ridges are out of the sensor. Figure 5 shows the interest fingerprint image area and it's bound.
D. Fingerprint Ridge Thinning: Ridge thinning is to eliminate the redundant pixels of ridges till the ridges are just one pixel widethis process is shown in figure 6[15].
E. Minutiae Marking:
After the fingerprint ridge thinning, marking minutiae points is relatively easy. By two steps: 1.Divide object into block. 2.Compute number of ones of 3x3 windows. Crossing number (Cn) is used to identify the minutiae points. It is defined as half of the sum of differences between intensity values of two adjacent pixels. If crossing number is 1, 2, 3 or greater, then the minutiae points are considered as ending, normal ridge, bifurcation respectively as shown in figure 7:
a) If central 1and has 1 one value neighbor, central pixel is termination (ending),Cn=1; b) If central 1 and has 3 one value neighbor, central pixel is bifurcation, Cn=2; c) If central is 1 and has 2 one value neighbor, central pixel is usual pixel, Cn=3.
Also the average inter-ridge width D is estimated at this stage. The average inter-ridge width refers to the average distance between two neighbouring ridges. Figure 8 shows the bifurcation and ending minutiae marking.
(1)
Where (xi...xn) and (XiXn) are the set of x-coordinates for each of the 2 minutiae chosen, and m is minimal one of the n and N value. We test all the similarity values from 0.1 to 0.9 and if the similarity score is larger than the similarity test value, then go to step 2, otherwise continue to match the next pair of ridges. Let F (x, y,) be reference minutiae found from step 1(say from B1). For each fingerprint, translate and rotate all other minutiae (xi, yi, i) with respect to the F according with the equation 2 formulas:
(2)
The new coordinate system is originated at reference minutiae F and the new x-axis is coincident with the direction of minutiae F. No scaling effect is taken into account by assuming two fingerprints from the same finger have nearly the same size. So we transformed sets of minutiae as B1 & B2. Match stage: The elastic match algorithm is used to count the matched minutiae pairs by assuming two minutiae having nearly the same position and direction. The matching algorithm for the aligned minutiae patterns needs to be elastic since the strict match is impossible due to the slight deformations and inexact quantization of minutiae. The final match scores given by 3: 2.
5. EXPERIMENT RESULTS:
Based on database provided by FVC2002 DB2 (Fingerprint Verification Competition 2002), we conduct an experiment to decide the optimum number of templates, where the threshold percentage of matching is 80 %.
(3)
The score is 100*ratio and ranges from 0 to 100. We use the threshold value as 80%, where this value is proven to be the most appropriate threshold value by many researches. Figure 10 shows the diagram of Minutiae based fingerprint recognition.
normalization techniques are considered in our experiments. [19] Min-max normalization is best suited for the case where the bounds (maximum and minimum values) of the scores are known. In this case, we can easily shift the minimum and maximum scores to 0 and 1, respectively. Given a set of matching scores {sk}, k = 1, 2...n, the normalized scores are given by 4:
(4)
Min-max normalization retains the original distribution of scores except for a scaling factor. Distance scores can be transformed into similarity scores by subtracting the minmax normalized score from 1 [20]. The match score distribution curves for figures 14 and 15 is estimated by using genuine and impostor match results then all individual matching results are combined to form one single final score by using the min-max normalization.
Figure 11. FAR and FRR curves for the original algorithm .
From the previous normalization results, when we increase the similarity values, the genuine and impostor results are decrease. We notice that at similarity value of 0.7, there is no FAR and more than half of the tested fingerprint images are accepted.
trade-off
(DET)
after
Biometric performance is often represented by a Detection Error Trade-off (DET) curve. It plots FAR versus FRR for a variable threshold and measures the overall performance of a biometric system over all possible thresholds. In figure 16, DET curves for our experiment are shown.
6.
CONCLUSIONS
In this paper we used minutiae based fingerprint recognition and rely on the bifurcation minutiae points not only in the alignment matching stage sets but we used it also at the ending minutiae points in the match stage. We conducted our experiments using the database provided by FVC2002 DB2 and chose seven persons with 3 images each. Our algorithm is coded using MATLAB. To increase the system performance, we used more than one template where it is proven that using two templates in the training set fulfil zero FAR with acceptable less FRR. We conclude that, using two templates images, our bifurcation minutiae based algorithm ensures better performance matching results over the minutiae algorithm. We have more accurate results with zero FAR at less similarity value.
segmentation," in international journal of advanced engineering science and technology, vol No. 5, pp. 012 023, 2011. [13] K. Ito, A. Morita, T. Aoki, T. Higuchi , H. Nakajima and K. obayashi, "A Fingerprint Recognition Algorithm Using PhaseBased Image Matching for Low-Quality Fingerprints," in IEEE International Conference on Image Processing ,Sept.2005. [14] F.A. Afsar, M. Arifand M. Hussain, "Fingerprint Identification and Verification System using Minutiae Matching," National Conference on Emerging Technologies, 2004. [15] K. Abbad ,A. Aarab and H. Tairi, "Fingerprint Verification Based On Minutiae andMoments,", 5th International Symposium on I/V Communications and Mobile Network (ISVC),2010 [16] M. Sepasian, C. Mares, S. M. Azimi, and W. Balachandran, "Image Enhancement for Minutiae-Based Fingerprint Identification ,"37th IEEE Applied Imagery Pattern Recognition Workshop, Oct. 2008 [17] (2010) biometric-solution website [Online]. Available: http://www.biometricsolutions.com/index.php?story=performance_biometrics [18] H.Tilborg and S.Jajodia, Encyclopaedia of Cryptography and Security, Springe, 2011. [19] Q.Zhao, F.Liu , L.Zhang and D.Zhang, "Parallel versus Hierarchical Fusion of Extended Fingerprint Features," 20th International Conference on Pattern Recognition (ICPR),pp. 1132 1135, Aug. 2010 [20] A. Ross, K. Nandakumar and A. K. Jain, Handbook of Multibiometrics, Springer, 2006. Dr. Manal Abdullah is currently an Assistant Professor in Department of Computer Science (Faculty of Computing and Information Technology, King Abdulaziz University). She has published several researches in reputable international journals and conferences. She participated in numerous research projects in KAU. Mona Alkhozae completed BS in Computer Science from King Abdulaziz University KAU in 2006. She is currently a master student in Computer Science in King Abdulaziz University KAU and working as demonstrator in the deanship of information technology over five years. Mashaiel Alsowaiel completed BS in Computer Science from King Abdulaziz University KAU in 2006. She is currently a master student in Computer Science in King Abdulaziz University KAU and working as demonstrator in the deanship of information technology over five years.
REFERENCES
[1] D. Maltoni, D. Maio, A. K. Jain and S. Prabhakar, Handbook of Fingerprint Recognition, Springe, 2003. [2] (2004) The Forensic science project website. [Online]. Available : http://sites.bergen.org/forensic/fingerprint.htm [3] D.Kocharyan and H. Sarukhanyan,"Feature Extraction Techniques and Minutiae-Based Fingerprint Recognition Process,"International Journal of Multimedia Technology (IJMT), vol.1,pp.31-35, 2011. [4] Z. Shihai and L. Xiangjiang,"Fingerprint Identification and Its Applications in Information Security Fields ," in International Conference of Information Science and Management Engineering, 2010,p 97 99. [5] (2011) The Advanced Source Code website. [Online]. Available: http://www.advancedsourcecode.com/fingerprintdatabase.asp. [6] (2010)Biometrics Ideal Test website. [Online]. Available:http://biometrics.idealtest.org/findTotalDbByMode.d o?mode=Fingerprint. [7] C. Watson and C. Wilson,"NIST Special Database 4 Fingerprint Database," 1992. [8] (2006)The Fingerprint verification Competition website. [Online]. Available : http://bias.csr.unibo.it/fvc2006/databases.asp [9] (2003)The Fingerprint verification Competition website. [Online]. Available :http://bias.csr.unibo.it/fvc2004/databases.asp [10] (2001)The Fingerprint verification Competition website. [Online]. Available :http://bias.csr.unibo.it/fvc2002/databases.asp [11] (2000)The Fingerprint verification Competition website. [Online]. Available :http://bias.csr.unibo.it/fvc2000/databases.asp [12] S.Bana, Dr. D. Kaur, "Fingerprint recognition using image