Segmentation and Separation of Overlapped Latent Fingerprints Algorithms, Techniques, and Datasets
Segmentation and Separation of Overlapped Latent Fingerprints Algorithms, Techniques, and Datasets
Segmentation and Separation of Overlapped Latent Fingerprints Algorithms, Techniques, and Datasets
Branka Stojanović
Oge Marques
Aleksandar Nešković
Segmentation
and Separation of
Overlapped Latent
Fingerprints
Algorithms,
Techniques, and
Datasets
123
SpringerBriefs in Computer Science
Series editors
Stan Zdonik, Brown University, Providence, RI, USA
Shashi Shekhar, University of Minnesota, Minneapolis, MN, USA
Xindong Wu, University of Vermont, Burlington, VT, USA
Lakhmi C. Jain, University of South Australia, Adelaide, SA, Australia
David Padua, University of Illinois Urbana-Champaign, Urbana, IL, USA
Xuemin Sherman Shen, University of Waterloo, Waterloo, ON, Canada
Borko Furht, Florida Atlantic University, Boca Raton, FL, USA
V. S. Subrahmanian, Department of Computer Science, University of Maryland,
College Park, MD, USA
Martial Hebert, Carnegie Mellon University, Pittsburgh, PA, USA
Katsushi Ikeuchi, Meguro-ku, University of Tokyo, Tokyo, Japan
Bruno Siciliano, Dipartimento di Ingegneria Elettrica e delle Tecnologie
dell’Informazione, Università di Napoli Federico II, Napoli, Italy
Sushil Jajodia, George Mason University, Fairfax, VA, USA
Newton Lee, Institute for Education, Research and Scholarships, Los Angeles,
CA, USA
SpringerBriefs present concise summaries of cutting-edge research and practical
applications across a wide spectrum of fields. Featuring compact volumes of 50 to
125 pages, the series covers a range of content from professional to academic.
Typical topics might include:
• A timely report of state-of-the art analytical techniques
• A bridge between new research results, as published in journal articles, and a
contextual literature review
• A snapshot of a hot or emerging topic
• An in-depth case study or clinical example
• A presentation of core concepts that students must understand in order to make
independent contributions
Briefs allow authors to present their ideas and readers to absorb them with
minimal time investment. Briefs will be published as part of Springer’s eBook
collection, with millions of users worldwide. In addition, Briefs will be available
for individual print and electronic purchase. Briefs are characterized by fast, global
electronic dissemination, standard publishing contracts, easy-to-use manuscript
preparation and formatting guidelines, and expedited production schedules. We
aim for publication 8–12 weeks after acceptance. Both solicited and unsolicited
manuscripts are considered for publication in this series.
123
Branka Stojanović Oge Marques
Vlatacom Research and College of Engineering
Development Institute Ltd Belgrade and Computer Science
Belgrade, Serbia Florida Atlantic University
Boca Raton, FL, USA
Aleksandar Nešković
School of Electrical Engineering
University of Belgrade
Belgrade, Serbia
This Springer imprint is published by the registered company Springer Nature Switzerland AG.
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
B.S.: To the memory of my father.
O.M.: For Ingrid, with love and appreciation.
A.N.: For George and Milan—my lovely kids.
Preface
The field of biometrics is well situated in the research community and has intrigued
researchers for many years. Although there are numerous biometric modalities in
use today, fingerprints remain the dominant one, because of its noninvasive nature
and ease of applicability. This is especially important when it comes to security
and forensic applications. A very challenging task in fingerprint recognition is over-
lapped latent fingerprint processing, which includes segmentation and separation
processes prior to (individual) fingerprints matching.
This book presents an overview of problems and technologies behind segmen-
tation and separation of overlapped latent fingerprints. Written from a technical
perspective, and yet using language and terminology accessible to non-experts,
it describes the technologies, introduces relevant datasets, highlights the most
important research results in each area, and outlines the most challenging open
research questions.
It is targeted at a scientific audience and enthusiasts interested in the field
of fingerprints matching, in particular, and biometrics, in general. By offering a
structured overview of the most important approaches currently available, putting
them in perspective, and suggesting numerous resources for further exploration, the
book gives its readers a clear path for learning new topics and engaging in related
research.
We expect that the book will fulfill its goal of serving as a preliminary reference
on the subject. Readers who want to deepen their understanding of specific topics
will find more than 100 references to additional sources of related information.
We want to express our gratitude to the Vlatacom Research and Development
Institute, Belgrade, Serbia—management, scientific council, and personnel—for
their encouragement and support during overlapped latent fingerprint research
process and writing this book.
This book represents a part of the doctoral dissertation of Dr. Branka Stojanović
at the School of Electrical Engineering, University of Belgrade. It is also one of the
results of a joint research project between Florida Atlantic University and Vlatacom
Research and Development Institute.
vii
viii Preface
ix
x Contents
1.1 Introduction
Fingerprints have been widely used for personal identification and criminal inves-
tigations for more than a century. The popularization of computer-based biometric
authentication in recent years has driven a significant body of research associated
with fingerprint processing and verification [16].
When used as a biometric modality, such as passport control at immigration
booths and official ID cards or badges, fingerprints can be captured using offline
(inked) or live-scan methods, following well-established protocols that ensure that
the resulting fingerprints are of good quality for future use in fingerprint verification
(matching) operations. In the context of crime scene investigation, however, the
lifted fingerprints (called latent fingerprints, or simply latents) are usually of
poor quality and contain large overlap between the foreground area (containing
the friction ridge pattern) and a noisy background. These aspects make latent
fingerprints segmentation and enhancement (for subsequent matching) a difficult
problem [17].
These challenges become even more significant when two or more fingerprints
overlap, which happens quite often in fingerprints lifted from crime scenes (the same
surface was touched by two or more fingers at different times), but might also occur
in live-scan fingerprint images when the surface of fingerprint sensors contains
residues of fingerprints of previous users [17]. Overlapped latent fingerprints
separation is an open research challenge for which there have been several recently
proposed solutions in the literature (see Chaps. 5 and 6).
Latent fingerprints (or simply latents) are partial fingerprints lifted from a crime
scene. They are usually produced by the transfer of sweat and/or grease accumulated
in the ridges of a person’s fingers when they come in contact with an object. In
forensic applications, they are collected using chemical development and enhance-
ment methods, such as powder dusting and iodine fuming. The resulting fingerprint
images are then matched against a database in order to arrest suspects and bring
them to justice [13].
The quality of the resulting latent fingerprint images can vary significantly among
different exemplars (Fig. 1.1).
Fig. 1.1 Examples of latent fingerprint images of varying quality from NIST Special Database 27
(SD-27A): (a) good, (b) bad, and (c) ugly [9]
1.4 Automated Latent Fingerprints Matching System 3
3. Evaluation: where the examiner derives a conclusion of: (1) Identification (or
Individualization)—when there is evidence to conclude that the latent and
the exemplar record have come from the same source; (2) Exclusion—when
the latent print cannot be assigned to any known exemplar labels; or (3)
Inconclusive—when the examiner is unable to make a decision regarding the
unknown latent prints. The conclusion is made based on the previously created
list of similarities and differences.
4. Verification: where a second examiner reviews all findings in order to verify the
original conclusions.
The scientific accuracy, reliability, and consistency of manual latent fingerprints
matching have been the subject of many studies and debates. The results of multiple
studies on the consequences and implications of human performance in matching
latent fingerprints [3–6, 8, 10, 12, 19] are rather inconsistent, and sometimes even
contradictory.
Fig. 1.2 Schematic view of a typical automated latent fingerprint recognition system
4 1 Latent Fingerprints Matching Systems
Overlapped fingerprints are typically found in latent fingerprints lifted from crime
scenes as well as in live-scan fingerprint images, when the surface of fingerprint
sensors contains residues of fingerprints of previous users [17]. Figure 1.3 shows
examples of overlapped latent fingerprint images from different datasets.
1.5 Overlapped Fingerprints 5
Fig. 1.3 Examples of overlapped latent fingerprint images from different databases: (a) NIST
Special Database 27 (SD-27A) [9], (b) Tsinghua SOF [7], and (c) Tsinghua OLF [7]
1 Manual segmentation is still the norm in the current state of the art. In Chap. 4 we present exper-
imental results for an algorithm capable of performing automatic ROI extraction of component
fingerprint regions—background (B), single fingerprint (S), and overlapped fingerprints (O)—
from the overlapped fingerprint image.
6 1 Latent Fingerprints Matching Systems
Fig. 1.4 Example of an automated overlapped fingerprint separation solution (Neural Network
(NN) based solution, adapted from [18])
In this chapter we discussed the process of latent fingerprints matching, its applica-
tions, and associated problems. We have shown that latent fingerprint recognition is
a very challenging problem from the point of view of image analysis and pattern
recognition, which becomes even more complex in cases where two or more
fingerprints overlap. Overlapped latent fingerprint recognition introduces another
step in the matching workflow, namely the separation of individual component
fingerprints, which is still an open research question.
References 7
References
Abstract This chapter presents an overview of existing image datasets that can be
used for evaluating approaches for overlapped fingerprint separation. It gives special
attention to the Vlatacom dataset, created by the authors and publicly available,
which consists of 120,000 synthetically overlapped test images (and the associated
masks), with and without noise, processed with three different rotation angles, and
in two variations of overall brightness.
2.1 Introduction
Every field of scientific research requires datasets that can be used to evaluate new
approaches to a problem, benchmark solutions, and ensure research reproducibility.
The fields of fingerprints segmentation, enhancement, verification (matching), and
overlapped fingerprint separation are no exception to this rule. The systematic
evaluation of fingerprint processing and analysis algorithms usually requires a
large number of sample images, which ideally should be made freely and publicly
available to the research community at large.
Collecting a sufficiently large number of fingerprints of suitable quality is, how-
ever, an expensive, tedious, and delicate process. To circumvent those limitations,
competitions for collecting large number of fingerprints, such as FVC 2000 [5] and
2002 [6], have been organized in the past. Collecting overlapped fingerprints is an
even more challenging task, since, in addition to the need to find volunteers willing
to participate in fingerprint acquisition, the process also involves using forensic
techniques which require experienced examiners [10].
Until recently, there were two main datasets of overlapped fingerprints in use:
Tsinghua OLF and Tsinghua SOF, which are described in more detail in Sect. 2.2.
More recently, a new dataset, called the Vlatacom dataset (VLD) was proposed
[12] to overcome several limitations of the Tsinghua SOF dataset. The Vlatacom
Research in the field of latent fingerprints requires large publicly available datasets,
preferably acquired in real environments. Producing such latent fingerprint datasets
is a very challenging process for several reasons, summarized in [9], including:
• The need for professional expertise in collecting and lifting latent fingerprints.
• The time required to lift and collect latent fingerprints.
• The appropriate equipment and scarcity of trained practitioners associated with
several latent fingerprint lifting techniques.
• Difficulty in agreeing on the meaning of “simulating real-time environments”,
since latent fingerprints collected from crime scenes may vary widely in terms of
quality and possible backgrounds.
• The challenge of creating datasets with large enough number of samples
and enough variability (e.g., multiple sensors, multiple backgrounds, multiple
sessions, and varying quality).
There are three publicly available latent fingerprint datasets: NIST SD-27A2 [3],
IIIT-D Latent Fingerprint3 [7], and IIIT-D Simultaneous Latent Fingerprint
(SLF)4 [8]. The fingerprints in these datasets have been acquired at different
times, in different environments, and have significantly different characteristics,
summarized in Table 2.1.
1 If you are interested in obtaining the Vlatacom dataset, please send your request by email to
[email protected]. The archive includes all the image files (organized into folders
as described in Sect. 2.3.3), the masks for all component images, the CSV files with x and y
coordinates (and type) of singular points within the overlapped region, and a README file that
explains how to use the dataset.
2 http://www.nist.gov/itl/iad/ig/sd27a.cfm.
3 http://www.iab-rubric.org/resources.html.
4 http://www.iab-rubric.org/resources.html.
2.2 Latent Fingerprint Datasets 11
For overlapped fingerprint verification, until recently, there were only two publicly
available datasets: the Tsinghua Overlapped Latent Fingerprint dataset (Tsinghua
OLF)5 [2] and Tsinghua Simulated Overlapped Fingerprint dataset (Tsinghua
SOF)6 [2]. Their main characteristics are summarized in Table 2.2.
The main differences between the Tsinghua OLF and Tsinghua SOF datasets
are [12]: (1) the overlapped fingerprints in OLF are obtained by forensic means,
while the fingerprints in SOF are artificially overlapped; (2) the samples in the
5 http://ivg.au.tsinghua.edu.cn/.
6 http://ivg.au.tsinghua.edu.cn/.
12 2 Latent Fingerprint Datasets
Fig. 2.1 Overlapping ratios histogram for the Tsinghua OLF (left) and Tsinghua SOF (right)
datasets (adapted from [12])
OLF dataset are of lower quality than their SOF counterpart, since the former
contains background noise; and (3) the size of the overlapped region (expressed as
overlapping ratios—defined as the ratio between the size of the overlapped region
and the size of the whole fingerprint region) varies significantly between the two, as
indicated by the corresponding histograms (Fig. 2.1).
This section describes in detail the processes followed by the authors for the creation
and organization of the Vlatacom dataset (VLD) [12].
2.3.1 Motivation
The decision to create the VLD stemmed in great part from the realization
that existing datasets for research on overlapped fingerprints have shown some
limitations, among them [12]:
• Both Tsinghua SOF and Tsinghua OLF datasets contain a small number of
samples: only 100 overlapped fingerprints each.
• The Tsinghua SOF dataset consists of synthetically overlapped images of good
quality whereas real latents contain noise caused by forensic dust.
• The Tsinghua SOF dataset does not include variations in component fingerprints’
rotation angles.
• Both datasets lack information about the samples’ complexity factors, such as the
number of singular points (and their location) and the image’s overall brightness.
2.3 The Vlatacom Dataset 13
The creation of the Vlatacom dataset was motivated by the overlapped fingerprint
separation research community’s need for large and comprehensive overlapped
fingerprint dataset, which has enough samples to be used for training, validation,
and testing purposes, and overcomes the aforementioned limitations.
2.3.2 Requirements
The Vlatacom dataset was created with the following requirements in mind [12]:
• Size: 10,000 or more images, to enable a broad range of combinations for
training, cross-validation, and test partitions.
• Variability: images should contain a diverse range of variation in parameters
such as amount of noise, angle of rotation of individual fingerprints, and overall
brightness.
• Access: the dataset should be made free and publicly available for academic
research.
• Additional features: besides the images themselves, the dataset should provide
supplemental information about the number and the position of the singular
points contained within the overlapped region, as a metric for distinguishing
between “easy” and “hard” samples—in general, the more singular points are
present in the overlapped area, the harder the separation problem.7
The process of building the Vlatacom dataset started from 200 fingerprint images
from a subset of the Db1 fingerprint dataset from FVC2002 [6]. Each image is
388 × 374 pixels (500 ppi8 ), grayscale, and contains single fingerprints. We chose
to use impressions no. 3 and no. 4 of the Db1_a dataset (200 images) because these
impressions contain differences in fingerprint rotation.
We implemented the following transformations on the images9 [12]:
• Rotation (3 variations): each individual fingerprint image is rotated by one of the
following angles: 0◦ , 45◦ , or 90◦ .
7 Singular points are points where fingerprint ridges show discontinuity. Since overlapped finger-
print separation approaches usually rely, at least partially, on the continuity of ridges, they are more
prone to errors when singular points appear in the overlapped area [11].
8 500 ppi is a standard resolution for all latent fingerprint datasets.
9 The MATLAB code for producing such variations is available upon request.
14 2 Latent Fingerprint Datasets
10 Note that average brightness and presence or absence of noise have no impact on the masks.
2.3 The Vlatacom Dataset 15
Fig. 2.3 Examples of mask images for the overlapped fingerprint images from Fig. 2.2
Fig. 2.4 Examples of templates for the overlapped fingerprint images from Fig. 2.2
The main motivation behind the naming convention adopted in the Vlatacom
dataset was to assign to each sample a name that uniquely identifies it and
encapsulates as much data about the included variations as possible. Hence, the
filename convention concatenates the title of the first and the second compo-
nent fingerprints, information about noise, amount of rotation, and brightness,
and—as a bonus, for the convenience of quick reference—the number of sin-
gular points within the overlapped region.11 For example, a file whose name is
image_3_image_4_nn_90_2_06 is a combination of image_3 and image_4
from the Db1 fingerprint dataset from FVC2002 [6], without noise, with a total of
90◦ rotation (i.e., image_3 was rotated by −45◦ and image_4 was rotated by 45◦ ).
It is the darker of the two variants, and it contains six singular points within the
overlapped area.
Singular points are points where fingerprint ridges show discontinuity. Fin-
gerprint separation approaches based on the continuity of ridges can show poor
11 Please refer to the README file for more details about the naming convention used in the
dataset, including the naming convention for the mask images.
16 2 Latent Fingerprint Datasets
Fig. 2.5 Examples of singular points locations on the overlapped fingerprint images from (left to
right) Vlatacom dataset, SOF dataset and OLF dataset
These are some additional aspects behind the creation of the Vlatacom dataset that
are worth mentioning [12]:
• The Vlatacom dataset was designed to provide a broad range of overlapping
ratios, thereby circumventing a limitation of both Tsinghua SOF and OLF
datasets, mentioned in Sect. 2.2. In contrast to the histograms shown in Fig. 2.1,
the proposed dataset shows a Gaussian-like distribution—see, for example, the
histogram of the size of the overlapped region (overlapping ratios) for the subset
with 90◦ rotation between component images, presented in Fig. 2.6.
• In response to a requirement listed in Sect. 2.3.2, the images in the Vlatacom
dataset contain information about the number of the singular points in the
overlapped region (encoded as the last two digits in the name of each sample).
The vast majority of the images in the dataset contain between 2 and 3 singular
points in the overlapped region.
• The Vlatacom dataset also includes three CSV files with information about
the position (x and y coordinates) and type of singular points (delta or core)
contained in the overlapped region: SP_00.csv, SP_45.csv, SP_90.csv, for the
subsets with 0◦ , 45◦ , and 90◦ rotation between component images, respectively.
2.3 The Vlatacom Dataset 17
Fig. 2.6 Overlapping ratios histogram for the Vlatacom dataset (adapted from [12])
Fig. 2.7 CMC curve comparing the approach described in [11] across four datasets (adapted
from [12])
The comparative CMC and ROC curves are shown in Figs. 2.7 and 2.8, respec-
tively. They demonstrate that the two variants of the proposed dataset offer “harder”
test cases for existing algorithms, which is a welcome change,12 especially in the
case of the CMC curves, whose values for the Tsinghua OLF and SOF datasets were
approaching the (illusory) perfect 100% identification rate. Moreover, as intuitively
expected, the case labeled as variant B (with noise) leads to lower performance than
variant A (without noise) [12].
In summary, the Vlatacom dataset has several distinctly unique and useful
properties, among them: larger number of images than its predecessors, meaningful
variants (with or without noise, different brightness levels, different rotation angles),
and a Gaussian-shaped distribution of overlapped ratios among its images. It offers
an easy way to use subsets of the proposed dataset for specific needs (such as
brightness/contrast correction or noise removal, for instance) and/or “levels of
difficulty” (e.g., based on the amount of overlap and/or the number of singular
points within the overlapped region). We expect that it will be widely used by the
fingerprint processing research community.
12 The transition from Tsinghua datasets to the proposed Vlatacom dataset mirrors, somehow, the
creation of the Caltech 256 object category dataset (to replace its predecessor, Caltech 101) in the
field of object recognition [4].
2.4 Concluding Remarks 19
Fig. 2.8 ROC curve comparing the approach described in [11] across four datasets (adapted
from [12])
• There are many challenges associated with the creation of a large latent
fingerprint dataset, among them: the need for professional expertise, large
amounts of time, proper equipment, trained personnel, and a standardized
procedure for data collection, annotation, and organization.
• A newly released, publicly available, and more comprehensive dataset
for overlapped fingerprint processing—the Vlatacom dataset (VLD)—is
described.
• It has been experimentally confirmed that the VLD dataset can be used
to develop and evaluate fingerprinting methods including segmentation,
separation, and other related processes.
References
1. B. DeCann, A. Ross, Relating ROC and CMC curves via the biometric menagerie, in 2013
IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS)
(2013), pp. 1–8
2. J. Feng, Y. Shi, J. Zhou, Robust and efficient algorithms for separating latent overlapped
fingerprints. IEEE Trans. Inf. Forensics Secur. 7(5), 1498–1510 (2012)
3. M.D. Garris, R.M. McCabe, Fingerprint minutiae from latent and matching tenprint images, in
Tenprint Images, (National Institute of Standards and Technology, 2000)
4. G. Griffin, A. Holub, P. Perona, Caltech-256 Object Category Dataset (2007)
5. D. Maio, D. Maltoni, R. Cappelli, J.L. Wayman, A.K. Jain, FVC2000: fingerprint verification
competition. IEEE Trans. Pattern Anal. Mach. Intell. 24(3), 402–412 (2002)
6. D. Maio, D. Maltoni, R. Cappelli, J.L. Wayman, A.K. Jain, FVC2002: Second fingerprint
verification competition, in Proceedings of the 16th International Conference on Pattern
Recognition, 2002, vol. 3 (IEEE, Piscataway, 2002), pp. 811–814
7. A. Sankaran, T.I. Dhamecha, M. Vatsa, R. Singh, On matching latent to latent fingerprints, in
International Joint Conference on Biometrics (IJCB), 2011 (IEEE, Piscataway, 2011), pp. 1–6
8. A. Sankaran, M. Vatsa, R. Singh, Hierarchical fusion for matching simultaneous latent
fingerprint, in IEEE Fifth International Conference on Biometrics: Theory, Applications and
Systems (BTAS), 2012 (IEEE, Piscataway, 2012), pp. 377–382
9. A. Sankaran, M. Vatsa, R. Singh, Latent fingerprint matching: a survey. IEEE Access 2, 982–
1004 (2014)
10. B. Stojanović, O. Marques, A. Nešković, Latent overlapped fingerprint separation: A review.
Multimed. Tools Appl. 76(15), 16263–16290 (2017)
11. B. Stojanović, A. Nešković, O. Marques, A novel neural network based approach to latent
overlapped fingerprints separation. Multimed. Tools Appl. 76(10), 1–25 (2016)
12. B. Stojanovic, O. Marques, A. Neskovic, A novel synthetic dataset for research in overlapped
fingerprint separation, in Proceedings of the IPTA, Seventh International Conference on Image
Processing Theory, Tools and Applications (IPTA2017) (2017)
13. N. Zhang, Y. Zang, X. Yang, X. Jia, J. Tian, Adaptive orientation model fitting for latent
overlapped fingerprints separation. IEEE Trans. Inf. Forensics Secur. 9(10), 1547–1556 (2014)
Chapter 3
Overlapped Latent Fingerprints
Segmentation: Problem Definition
3.1 Introduction
Overlapped fingerprints can be found in latent fingerprints lifted from crime scenes
as well as in live-scan fingerprint images, when the surface of fingerprint sensors
contains residues of fingerprints of previous users. Overlapped fingerprints must be
extracted out of the image (i.e., segmented from the background) and separated from
one another before they can be processed by contemporary commercial fingerprint
matchers (Fig. 3.1).
The overlapped fingerprints matching procedure typically consists of two
steps [14]:
1. Segmentation of component fingerprints regions, in order to distinguish the
region of the image that belongs to both component fingerprints (overlapped
region, i.e. the region of the image where component fingerprints are overlapped)
from the regions of the image belong to separate component fingerprints (single
regions, i.e. regions where only one fingerprint is present).
2. Separation of the resulting overlapped region into component fingerprint images,
a process by which individual pixels can be labeled as belonging to the ridges of
either overlapped fingerprint, which will be described in Chap. 5.
After these steps, each of the separated component fingerprints can be processed
by a typical automated fingerprints matching system.
Fig. 3.1 Typical overlapped latent fingerprints matching procedure. See text for explanation
Fig. 3.2 Overlapped latent fingerprints segmentation process: the input is an image containing
two overlapping fingerprints and the outputs are region masks corresponding to pixels that belong
to each individual fingerprint (M1S , M2S ) or the overlapped region between them (MO )
Fig. 3.3 Examples of latent fingerprint images of varying quality from NIST Special Database 27
(SD-27A) [7]. (a) good, (b) bad, (c) ugly
The examples in Fig. 3.3—classified as good, bad, and ugly by the creators of the
NIST Special Database 27 (SD-27A) [7]—provide compelling examples of some of
the challenges in individual latent fingerprints segmentation.
24 3 Overlapped Latent Fingerprints Segmentation: Problem Definition
Fig. 3.4 Examples of overlapped latent fingerprint images from different databases, with illustra-
tively marked component fingerprints. (a) NIST Special Database 27 (SD-27A) [7], (b) Tsinghua
SOF [6], (c) Tsinghua OLF [6]
Fig. 3.5 Overlapped fingerprints mask segmentation. See text for details
The segmentation problem is even more challenging when two or more latents
overlap (Fig. 3.4), since now the segmentation algorithm must—in addition to
separating ROI from the background—segment and distinguish the overlapped
region or individual component fingerprints as well.
Automatic segmentation of single latent fingerprints is a challenging problem, for
which several solutions have been proposed in recent years [1, 3, 4, 8–12, 15, 18–
21], some of which dealing with difficult databases, but none of them addressing
the segmentation of overlapped latent fingerprints, the special case where the
overlapping fingerprint area should distinct from single fingerprint area, in addition
to distinguishing between fingerprint area and background.
Segmentation of overlapped fingerprints involves the following tasks (Fig. 3.5):
(1) segmentation of fingerprint area (ROI) from the background, regardless of
which component fingerprint that area belongs to; (2a) segmentation of single (S)
3.3 Evaluation Methodology 25
TP
TPR = (3.1)
T P + FN
FP
FPR = (3.2)
FP + T N
TP +TN
ACC = (3.3)
T P + FP + FN + T N
TP
PPV = (3.4)
T P + FP
2T P
F1 = (3.5)
2T P + F P + F N
where: TP, TN, FP, and FN stand for true positives, true negatives, false positives,
and false negatives, respectively.
The ROC curve plots TPR against FPR and provides a graphical representation of
the relative tradeoffs between true positives and false positives [5]. The area under
the ROC curve (AUC) represents the probability that a randomly chosen positive
example is correctly ranked with greater suspicion than a randomly chosen negative
example [2].
The special case of overlapped fingerprints can be represented as a multi-class
classification problem. Image blocks/pixels should be classified in one of three
classes—background (B), single (S), and overlapped (O). The evaluation of such a
3.4 Concluding Remarks 27
Fig. 3.7 Evaluation cases. (a) Overlapped fingerprints sample, (b) Segmentation
system can be performed in two evaluation cases, which are essentially two separate
binary classification problems [14]:
• Region of Interest segmentation, in which we measure the algorithm’s ability
to segment both fingerprints (painted white and gray in Fig. 3.7b) from the
background (painted black in Fig. 3.7b);
• Overlapped region segmentation, in which the area of overlap (painted white in
Fig. 3.7b) is segmented from the remaining of the ROI (painted gray in Fig. 3.7b).
References
1. W. Bian, S. Ding, W. Jia, Collaborative filtering model for enhancing fingerprint image. IET
Image Process. 12(1), 149–157 (2017)
2. A.P. Bradley, The use of the area under the ROC curve in the evaluation of machine learning
algorithms. Pattern Recogn. 30(7), 1145–1159 (1997)
3. K. Cao, E. Liu, A. Jain, Segmentation and enhancement of latent fingerprints: a coarse to fine
ridgestructure dictionary. IEEE Trans. Pattern Anal. Mach. Intell. 36(9), 1847–1859 (2014)
4. H. Choi, M. Boaventura, I.A. Boaventura, A.K. Jain, Automatic segmentation of latent
fingerprints, in IEEE Fifth International Conference on Biometrics: Theory, Applications and
Systems (BTAS) 2012 (IEEE, Piscataway, 2012), pp. 303–310
5. T. Fawcett, An introduction to ROC analysis. Pattern Recogn. Lett. 27(8), 861–874 (2006)
6. J. Feng, Y. Shi, J. Zhou, Robust and efficient algorithms for separating latent overlapped
fingerprints. IEEE Trans. Inf. Forensics Secur. 7(5), 1498–1510 (2012)
7. M.D. Garris, R.M. McCabe, Fingerprint minutiae from latent and matching tenprint images, in
Tenprint Images, (National Institute of Standards and Technology, 2000)
8. M. Ghafoor, I.A. Taj, W. Ahmad, N.M. Jafri, Efficient 2-fold contextual filtering approach for
fingerprint enhancement. IET Image Process. 8(7), 417–425 (2014)
9. S. Karimi-Ashtiani, C.-C.J. Kuo, A robust technique for latent fingerprint image segmentation
and enhancement, in 15th IEEE International Conference on Image Processing, 2008. ICIP
2008 (IEEE, Piscataway, 2008), pp. 1492–1495
10. A. Sankaran, A. Jain, T. Vashisth, M. Vatsa, R. Singh, Adaptive latent fingerprint segmentation
using feature selection and random decision forest classification. Inf. Fusion 34, 1–15 (2017)
11. P. Schuch, S. Schulz, C. Busch, Survey on the impact of fingerprint image enhancement. IET
Biom. 7(2), 102–115 (2017)
12. N.J. Short, M.S. Hsiao, A.L. Abbott, E.A. Fox, Latent fingerprint segmentation using ridge
template correlation, in 4th International Conference on Imaging for Crime Detection and
Prevention 2011 (ICDP 2011) (IET, Stevenage, 2011), pp. 1–6
13. B. Stojanović, O. Marques, A. Nešković, Latent overlapped fingerprint separation: a review.
Multimed. Tools Appl. 76(15), 1–28 (2016)
14. B. Stojanović, O. Marques, A. Nešković, Deep learning-based approach to latent overlapped
fingerprints mask segmentation. IET Image Process. 12(11), 1934–1942 (2018)
15. D.H. Thai, C. Gottschlich, Global variational method for fingerprint segmentation by three-part
decomposition. IET Biom. 5(2), 120–130 (2016)
16. Q. Wang, J. Gao, Y. Yuan, Embedding structured contour and location prior in Siamesed fully
convolutional networks for road detection. IEEE Trans. Intell. Transp. Syst. 19(1), 230–241
(2017)
17. Q. Wang, J. Gao, Y. Yuan, A joint convolutional neural networks and context transfer for street
scenes labeling. IEEE Trans. Intell. Transp. Syst. 19(5), 1457–1470 (2017)
18. X. Yang, J. Feng, J. Zhou, S. Xia, Detection and segmentation of latent fingerprints, in
2015 IEEE International Workshop on Information Forensics and Security (WIFS) (IEEE,
Piscataway, 2015), pp. 1–6
19. J. Zhang, R. Lai, C.-C.J. Kuo, Latent fingerprint segmentation with adaptive total variation
model, in 2012 5th IAPR International Conference on Biometrics (ICB) (IEEE, Piscataway,
2012), pp. 189–195
20. J. Zhang, R. Lai, C.-J. Kuo, Latent fingerprint detection and segmentation with a directional
total variation model, in 2012 19th IEEE International Conference on Image Processing (ICIP)
(IEEE, Piscataway, 2012), pp. 1145–1148
21. J. Zhang, R. Lai, C.-C.J. Kuo, Adaptive directional total-variation model for latent fingerprint
segmentation. IEEE Trans. Inf. Forensics Secur. 8(8), 1261–1273 (2013)
Chapter 4
Machine Learning Based Segmentation
of Overlapped Latent Fingerprints
4.1 Introduction
This chapter presents a machine learning based approach for overlapped fingerprint
mask segmentation. As discussed in Chap. 3, the segmentation of overlapped
fingerprints (and creation of associated masks) is usually performed manually, with
only few recent attempts to develop fully automated segmentation of overlapped
fingerprints.
The method presented in this chapter (and described in greater detail in [7]) is
based on previously developed neural network-based methods for single fingerprint
image ROI segmentation [4, 5], which were trained and tested on fingerprint images
of good quality (i.e., not latents).
The proposed method is based on convolutional neural networks (CNNs) [2, 3],
which—in addition to an ever-growing number of applications in computer vision—
have also shown good performance in single fingerprints processing, for different
applications [1, 6, 8].
Fig. 4.1 Overlapped fingerprints mask segmentation based on convolutional neural networks
3. The CNN classifies each block in one of three classes—background (B), single
(S), or overlapped (O) region.
4. Results for each block are finally merged into a region mask.
The proposed method uses a simplified AlexNet (SAlNet) CNN architecture,
designed to determine the orientation field of latent fingerprints [1]. The optimal
block size (40 × 40 pixels) was determined experimentally (see [7] for details).
The VLD dataset (described in Chap. 2) was chosen for algorithm training
purposes. Additionally, the Tsinghua SOF and OLF datasets (also described in
Chap. 2) were used for algorithm verification purposes.
The SAlNet CNN architecture (Fig. 4.2) consists of three convolutional layers
(conv1–3) and one fully connected layer (fc4). The input of the CNN is a fingerprint
patch of size 40 × 40 pixels. The first layer (conv1) contains convolutional sub-
layer with 96 filters of size 11 × 11 and stride of 4. The output of the neurons are
modeled by the ramp activation function (ReLU), f (x) = max(0, x). This layer
also contains max-pooling sub-layer, which takes the maximum over 3 × 3 spatial
neighborhoods with a stride of 2. The third sub-layer of conv1 is a local response
normalization. Similar definitions are used for layers conv2 and conv3. The fully
connected layer (fc4) is applied after the last convolutional layer (conv3). A dropout
regularization (with probability of 0.5) is performed after fc4 layer, in order to avoid
overfitting [7].
4.2 Description of the Algorithm 31
256 256
128 4¥4
40x40 96 5¥5
11¥1
3
-- Background
-- Single
-- Overlapped
classes
conv1
conv2 fc4
conv3
Input Convolution Convolution Convolution
Max pooling Max pooling ReLU
Batch norm. Batch norm. Fully
ReLU ReLU connected
Two separate CNNs are involved: (1) CNN-SO: a network designed for segmen-
tation of synthetically overlapped fingerprints (Tsinghua SOF dataset) and (2)
CNN-OL: a network designed for segmentation of latent overlapped fingerprints
(Tsinghua OLF dataset).
For CNN-SO training purposes, 30,000 overlapped fingerprint images’ blocks
were randomly chosen from synthetically overlapped fingerprints (500 ppi) con-
tained in the VLD dataset. As described in Chap. 2, the VLD dataset contains
significantly larger amount of fingerprints and provides additional variations com-
pared to the Tsinghua SOF dataset in terms of overlapping parameters, as well
as the availability of samples containing Gaussian noise. Training blocks were
selected such that half of the samples contain Gaussian noise, and all three classes
(background, single, and overlapped region) were equally presented [7].
For CNN-OL training purposes, 30,000 overlapped fingerprint images’ blocks
were randomly chosen from the 60 latent overlapped fingerprints, created for this
purpose in a similar manner as the prints from Tsinghua OLF dataset, using forensic
methods and using different component fingerprints. Training blocks were also
selected in a manner that all three classes (background, single, and overlapped
region) are equally presented [7].
The 30,000 blocks from the training dataset were randomly divided into two
subsets according to the following percentages: (1) 60% of a dataset was used for
training and (2) 40% of the dataset was used for validation. In order to avoid any
correlation between training and testing datasets, testing of the CNN-SO and CNN-
OL was performed on the Tsinghua OLF and SOF datasets, created from different
component fingerprints comparing to VLD dataset, and without any correlation
between them [7].
32 4 Machine Learning Based Segmentation of Overlapped Latent Fingerprints
Fig. 4.3 CNN-OL segmentation results examples 1 (top) and 2 (bottom): input image (left),
generated mask (center), and masked image (right)
4.3 Experimental Evaluation 33
Fig. 4.4 CNN-SO segmentation results examples 1 (top) and 2 (bottom): input image (left),
generated mask (center), and masked image (right)
Fig. 4.5 Typical segmentation failure cases. CNN-OL exemplar (left), corresponding mask
(center), and masked fingerprints (right)
Fig. 4.6 Typical segmentation failure cases. CNN-SO exemplar (left), corresponding mask
(center), and masked fingerprints (right)
34 4 Machine Learning Based Segmentation of Overlapped Latent Fingerprints
References
1. K. Cao, A. Jain, Latent orientation field estimation via convolutional neural network, in 2015
International Conference on Biometrics (ICB) (2015), pp. 349–356. https://doi.org/10.1109/
ICB.2015.7139060
2. I. Goodfellow, Y. Bengio, A. Courville, Deep Learning (MIT Press, Cambridge, 2016)
3. Y. LeCun, Y. Bengio, G. Hinton, Deep learning. Nature 521(7553), 436–444 (2015)
4. B. Stojanovic, A. Neskovic, Z. Popovic, V. Lukic, ANN based fingerprint image ROI segmenta-
tion, in 2014 22nd Telecommunications Forum Telfor (TELFOR) (IEEE, Piscataway, 2014), pp.
505–508
5. B. Stojanović, A. Nešković, O. Marques, Fingerprint ROI segmentation using Fourier coeffi-
cients and neural networks, in 2015 23rd Telecommunications Forum Telfor (TELFOR) (IEEE,
Piscataway, 2015), pp. 484–487
6. B. Stojanović, O. Marques, A. Nešković, S. Puzović, Fingerprint ROI segmentation based on
deep learning, in 2016 24th Telecommunications Forum (TELFOR) (IEEE, Piscataway, 2016),
pp. 1–4
7. B. Stojanović, O. Marques, A. Nešković, Deep learning-based approach to latent overlapped
fingerprints mask segmentation. IET Image Process. 12(11), 1934–1942 (2018). https://doi.org/
10.1049/iet-ipr.2017.1227
8. R. Wang, C. Han, Y. Wu, T. Guo, Fingerprint Classification Based on Depth Neural Network
(2014). ArXiv:1409.5188
Chapter 5
Overlapped Latent Fingerprints
Separation: Problem Definition
Abstract Overlapped fingerprints are often found in latent fingerprints lifted from
crime scenes and in live-scan fingerprint images when the surface of fingerprint sen-
sors contains residues of fingerprints of previous users. Such overlapped fingerprints
must be separated before they can be processed by a fingerprint matcher, which has
led to the creation of several different methods designed to separate the overlapped
fingerprints. This chapter describes the problem of latent overlapped fingerprint
separation and presents a brief overview of selected contemporary techniques for
overlapped fingerprint separation in the context of latent overlapped fingerprints
matching.
5.1 Introduction
remaining errors. The output of this step are component fingerprints’ orientation
fields.
• Component fingerprint images extraction—Two component fingerprints are
extracted from the overlapped fingerprints image by filtering the overlapped
image with the appropriate filters—usually two different Gabor filters [6, 13],
tuned to the corresponding component fingerprints’ orientation fields.
In some approaches (for example, [36]), the second and third steps are combined,
i.e. there is no initial orientation field estimation and separation, but orientation
fields of separate component fingerprints are estimated in one step.
Orientation field estimation algorithms can be classified into three categories [9].
1. Local Estimation
Local estimation approaches compute a local ridge orientation at pixel x =
(x, y) using only the neighborhood around x, which is typically 32 × 32 pixels
for 500 ppi fingerprints.
Widely used local estimation approaches include:
• Gradient-based approaches [1, 2, 17, 25], which use classical gradient opera-
tors, such as Prewitt or Sobel, to compute the dominant orientation in the local
neighborhood.
• Slit-based approach [23], which explicitly exploits the fact that the variation
of intensity is the smallest along the ridge orientation and largest along
the orthogonal orientation. By testing such a hypothesis along a number of
different orientations, the best orientation is chosen [9].
• Fourier transform-based approach, which approximates the ridge pattern in
a local area of a fingerprint by a 2D sine wave, whose Fourier transform’s
magnitude spectrum will contain a pair of peaks whose location corresponds
to the parameters of the sine wave. The magnitude spectrum can then be
mapped to the polar coordinate system and normalized; the resulting nor-
malized magnitude spectrum can be viewed as a probability distribution [4].
The best orientation can then be estimated as the most probable orientation
according to the resulting distribution [9].
These approaches perform very well for fingerprint images of good quality,
but their performance is quite poor for latent images that contain structural
background noise [29].
2. Smoothing
Orientation fields obtained by local estimation approaches for poor quality
fingerprints are usually very noisy and need to be regularized, which can be
achieved using an image smoothing algorithm, such as the well-known low-pass
filtering [1]. Low-pass filtering results depend critically on the size of the filtering
38 5 Overlapped Latent Fingerprints Separation: Problem Definition
window: larger windows are better at reducing noise whereas smaller windows
are capable of preserving the true orientation in a high curvature region [9].
Many alternatives to the standard low-pass filter have been proposed in the
literature, such as the implementation of orientation field smoothing by using the
Markov random field (MRF) model [5, 16, 24] and the use of multiresolution
orientation fields [18, 19, 22, 23]. Fingerprints of very poor quality still offer a
significant challenge to any of these approaches [9].
3. Global Parametric Models
Global parametric model fitting methods constitute another category of
regularization algorithms that use mathematical models to represent the whole
fingerprint orientation field. The models can be general (e.g., polynomials [12]
and Fourier series [31], or specific to fingerprints [14, 26, 37]. General models
may be prone to overfitting or underfitting problems, especially when the initial
orientation field is very noisy [9].
There are models which explicitly consider singular points [14, 26, 37], which
cannot be easily extracted from latents. Consequently, certain orientation field
estimation approaches in the literature (e.g., [32] and [33]) require manually
marked singular points as input [9].
Orientation field estimation for the overlapped region is a very challenging problem
for traditional fingerprint orientation estimation methods [8]. In overlapped latent
fingerprint processing approaches most authors [3, 7, 27, 30] have adopted the local
Fourier analysis method proposed in [15] for initial orientation field estimation.
The process of orientation field estimation for the overlapped region consists of
the following steps (Fig. 5.2) [29]:
1. The fingerprint image is divided into non-overlapping image segments (blocks),
typically of size 16 × 16 pixels.
2. Fourier coefficients are calculated for these segments, as follows [15]:
(a) The local window of size 64 × 64 pixels, centered at each block, is multiplied
by a bivariate isotropic Gaussian function;
(b) For the resulting image, the discrete Fourier transform (DFT) is calculated;
(c) The amplitude of low-frequency components (points within three pixels from
the center in the frequency domain) is set to zero.
Local maxima points in the frequency domain correspond to 2D sine waves
(stripes) on the image block. For single region blocks (S blocks) one estimates
orientation as the orientation (direction) of the 2D sine wave that corresponds to
the brightest local maxima. For overlapped region blocks (O blocks) one estimates
two orientations as the orientations of the 2D sine waves that correspond to the two
brightest local maxima.
5.3 Overlapped Latent Fingerprint Separation: Representative Approaches 39
Fig. 5.2 Initial orientation estimation for one overlapped region block. (a) Overlapped (O) block;
(b) O block multiplied by Gaussian function; (c) two local maxima points in the frequency domain;
(d) two dominant orientations; (e, f) corresponding 2D sine waves (Adapted from [30])
Besides the local Fourier analysis method, there are other noteworthy approaches
in literature. Zhao and Jain in [36] proposed reconstruction of the orientation
fields of component fingerprints via modeling orientation fields and then predicting
unknown orientation fields based on a certain number of manually marked orien-
tation cues in fingerprints. Zhang et al. in [35] proposed block-based orientation
field estimation from the overlapped fingerprint image by Gabor filters approach.
In this approach K Gabor filters corresponding to K different orientations are
applied to filter the image, and the orientations are obtained according to the filters’
responses [29].
Table 5.1 presents a summary of some of the most significant latent overlapped
fingerprint separation approaches proposed during the past few years. The table
contains information on the separation method, the initial orientation field estima-
tion method, the level of manual work, and whether the approach was tested on real
overlapped latents (Tsinghua OLF database) or not.1
1 For additional information on each method listed in Table 5.1, please see [29] or refer to the
original publications.
40
Table 5.1 Overlapped latent fingerprint separation approaches (adapted from [30])
Zhao and Zhang Stojanović
Approach Singh et al. [28] Chen et al. [3] Shi et al. [27] Feng et al. [8] Jain [36] et al. [34, 35] et al. [30]
Separation method Independent Relaxation Constrained Constrained Model-based Adaptive Neural networks
Component labeling relaxation relaxation separation orientation
Analysis (ICA) labeling labeling model fitting
Initial orientation n/a Local Fourier Local Fourier Local Fourier Other Other Local Fourier
estimation method analysis analysis analysis analysis
Level of manual work n/a Region masks Region masks Region masks Region masks Region masks Region masks
and singular and orientation
points cues
Tested on real overlapped No No No Yes No Yes Yes
latents (OLF)
Impact First published Additional – State-of-art for The highest level – State-of-art for
approach manual work SOF dataset of manual work OLF database
required required
5 Overlapped Latent Fingerprints Separation: Problem Definition
5.4 Evaluation Methodology 41
References
1. A.M. Bazen, S.H. Gerez, Systematic methods for the computation of the directional fields and
singular points of fingerprints. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 905–919 (2002)
2. J. Bigun, Optimal orientation detection of linear symmetry, in Proceedings of the IEEE First
International Conference on Computer Vision, London, June 8–11 (1987), pp. 433–438
3. F. Chen, J. Feng, A. Jain, J. Zhou, J. Zhang, Separating overlapped fingerprints. IEEE Trans.
Inf. Forensics Secur. 6(2), 346–359 (2011). ISSN 1556-6013. https://doi.org/10.1109/TIFS.
2011.2114345
References 43
27. Y. Shi, J. Feng, J. Zhou, Separating overlapped fingerprints using constrained relaxation
labeling, in Proceedings of the International Joint Conference on Biometrics (2011)
28. M. Singh, D.K. Singh, P.K. Kalra, Fingerprint Separation: An Application of ICA, vol. 6982
(2008), pp. 69820L–69820L-11. https://doi.org/10.1117/12.777541
29. B. Stojanović, O. Marques, A. Nešković, Latent overlapped fingerprint separation: a review,
in Multimedia Tools and Applications (2016), pp. 1–28. https://doi.org/10.1007/s11042-016-
3908-y
30. B. Stojanović, A. Nešković, O. Marques, A novel neural network based approach to latent
overlapped fingerprints separation. Multimed. Tools Appl. 1–25 (2016). https://doi.org/10.
1007/s11042-016-3696-4
31. Y. Wang, J. Hu, D. Phillips, A fingerprint orientation model based on 2D Fourier expansion
(FOMFE) and its application to singular-point detection and fingerprint indexing. IEEE Trans.
Pattern Anal. Mach. Intell. 29(4), 573–585 (2007)
32. S. Yoon, J. Feng, A.K. Jain, On latent fingerprint enhancement, in SPIE Defense, Security, and
Sensing (International Society for Optics and Photonics, Bellingham, 2010), p. 766707
33. S. Yoon, J. Feng, A. Jain, Latent fingerprint enhancement via robust orientation field estima-
tion, in 2011 International Joint Conference on Biometrics (IJCB) (2011), pp. 1–8. https://doi.
org/10.1109/IJCB.2011.6117482.
34. N. Zhang, X. Yang, Y. Zang, X. Jia, J. Tian, Overlapped fingerprints separation based
on adaptive orientation model fitting, in 2014 22nd International Conference on Pattern
Recognition (ICPR) (2014), pp. 678–683. https://doi.org/10.1109/ICPR.2014.127
35. N. Zhang, Y. Zang, X. Yang, X. Jia, J. Tian, Adaptive orientation model fitting for latent
overlapped fingerprints separation. IEEE Trans. Inf. Forensics Secur. 9(10), 1547–1556 (2014).
ISSN 1556-6013. https://doi.org/10.1109/TIFS.2014.2340573
36. Q. Zhao, A. Jain, Model based separation of overlapping latent fingerprints. IEEE Trans. Inf.
Forensics Secur. 7(3), 904–918 (2012). ISSN 1556-6013. https://doi.org/10.1109/TIFS.2012.
2187281
37. J. Zhou, J. Gu, A model-based method for the computation of fingerprints’ orientation field.
IEEE Trans. Image Process. 13(6), 821–835 (2004)
Chapter 6
Machine Learning Based Separation of
Overlapped Latent Fingerprints
Abstract This chapter describes a machine learning based approach for overlapped
fingerprint separation. The algorithm works in a block-based fashion: after produc-
ing an initial estimation of the orientation fields present in the overlapped fingerprint
image, it uses a neural network to separate the mixed orientation fields, which
are then post-processed to correct remaining errors and enhanced using the global
orientation field enhancement model. The proposed separation method has been
successfully tested on two different datasets.
6.1 Introduction
This chapter presents a neural network based approach for overlapped fingerprint
mask separation. As discussed in Chap. 5, the problem of overlapped latent fin-
gerprint separation consists in separating and enhancing component fingerprints in
order to make them suitable candidates for later feature extraction and matching
procedures. This process usually includes four steps [1, 3, 9–11] (Fig. 6.1):
1. Segmentation—This step involves latent fingerprints segmentation (also known
as ROI extraction), whose output produces the component fingerprints’ region
masks. See Chaps. 3 and 4 for details.
2. Initial orientation field (OF) estimation and enhancement—The initial ori-
entation field (which consists of a matrix containing information about ridge
angle in every pixel/block on fingerprint image) for the overlapped fingerprint
image is usually estimated and enhanced using a block-based approach. This
step produces a labeled image containing three different regions: (1) background
region without orientation values, (2) single region with one orientation value
per block, and (3) overlapped region with two orientation values, randomly
distributed, per block.
3. Orientation separation—Mixed orientation fields of overlapped regions for
two component fingerprints are: (1) separated using a neural network-based
approach, (2) smoothed in order to correct remaining errors, and (3) additionally
enhanced using the global orientation field enhancement model. The output of
this step are component fingerprints’ orientation fields.
4. Component fingerprint images extraction—Two component fingerprints are
extracted from the overlapped fingerprints image by filtering the overlapped
image with the appropriate filters—usually two different Gabor filters [2, 6],
tuned to the corresponding component fingerprints’ orientation fields.
The approach described in this chapter (and described in greater detail in [10])
focuses on step 3—Orientation separation—where we propose a neural network
based method for separating overlapped orientations. A secondary contribution of
the proposed method relates to step 2—Initial orientation field (OF) estimation
and enhancement—due to the fact that our method was the first method to utilize
a global-based orientation field enhancement model of initially estimated single
region orientation field prior to separating overlapped region orientations. This was
done in order to minimize influence of local-based orientation estimation model and
to produce a more lifelike orientation field as an input for subsequent processing
steps [10].
6.2 Segmentation
In this stage, segmentation masks are manually created from pre-processed and size-
normalized input images (Fig. 6.2).
6.3 Initial Orientation Field Estimation and Enhancement 47
Fig. 6.2 Segmentation of an exemplar overlapped fingerprint image: (a) Overlapped fingerprint
image exemplar (I ); (b) component fingerprints’ region masks (M1 , M2 ); (c) single region masks
(M1S , M2S ); (d) overlapped region mask (MO )
The initial orientation field for the overlapped fingerprint image is estimated
and enhanced using a block-based approach, which consists of two steps: (1) a
Fourier analysis-based estimation of orientation field for the whole overlapped
fingerprint image and (2) enhancement of single region orientation field using a
global dictionary-based orientation field enhancement approach [4].
The initial orientation field consists of three different regions: (1) background region
without orientation values, (2) single region with one orientation value per block,
and (3) overlapped region with two orientation values, randomly distributed, per
block.
We adopted the local Fourier analysis method proposed in [7] and used by several
other authors in their work on similar problems [1, 3, 9]. See Sect. 5.2.2 for details.
The method used for initial orientation field estimation (Fourier analysis) is block-
based and does not take into account information from the rest of the fingerprint
image. In order to correct occasional orientation estimation errors caused by the
48 6 Machine Learning Based Separation of Overlapped Latent Fingerprints
local nature of the estimation process (and ensure more accurate input data for
the subsequent stages of our algorithm) we applied Feng et al.’s publicly available
global dictionary based orientation field enhancement method [4] to the single
region orientation field of component fingerprints. This enhancement step mini-
mizes the influence of the local-based orientation estimation model. Consequently,
the resulting single region orientation field becomes more realistic and accurate [10].
The orientation separation process consists of three stages (Fig. 6.3): (1) over-
lapped region orientation field estimation based on neural networks (Sect. 6.5);
(2) estimated overlapped region orientation field smoothing, which provides error
correction to results from the previous step; and (3) component fingerprints’
orientation field enhancement (see [10] for details).
The method described in this chapter uses two neural networks, one for each type
of segment (square or T segment), trained with single blocks’ orientation values in
order to calculate one overlapped block orientation value. For this type of problem,
multilayer feed-forward neural networks with error back-propagation as a learning
rule, sigmoid hidden neurons and linear output neurons, are an appropriate choice
[5]. The chosen neural network structure consists of the input layer, two hidden
layers, and the output layer. The number of perceptrons in the two hidden layers
was determined experimentally to be 50 and 20 perceptrons, respectively (see [10]
for details).
A subset of the Db1 fingerprint database from FVC2002 [8] was used for training
purposes. The Db1 database is divided into two parts, Db1_a and Db1_b: Db1_a
contains 800 samples (8 impressions of 100 different fingerprints), while Db1_b
contains 80 samples (8 impressions of 10 different fingerprints). Each image is
388 × 374 pixels (500 ppi), grayscale, and contains single fingerprints taken from
the subjects in organized sessions [8].
We used impressions no. 3 and no. 4 of the Db1_a database (200 fingerprint
images), from which 10,000 suitable image segments of outer size of 3×3 blocks
were randomly chosen. In order to be suitable for training, the selected image
segments must belong to the fingerprint area (Region of Interest-ROI) of that
fingerprint image. There are four possible variants for each type of image segment
patterns used in the proposed algorithm. We ensure that the 10,000 training samples
contain 2500 samples of each of the four variations [10].
The proposed method was implemented in MATLAB. To ensure reproducibility
of results, the critical parameters related to the orientation separation process—and
more specifically to neural network training—have also been published (see [10] for
details).
The performance of the algorithm was evaluated and compared against the equiv-
alent curves from the most prominent approaches from the literature as well as
two baseline cases: (1) experiments of direct matching of overlapped fingerprint
images with the template fingerprints and (2) experiments of matching of overlapped
fingerprint images segmented with component fingerprints masks with the template
fingerprints (see [10] for details).
Experimental results demonstrate that the proposed method shows better or
comparable performance to the most prominent approaches in the literature for both
(Tsinghua OLF and Tsinghua SOF) datasets and both figures of merit (ROC and
CMC curves) (see [10] for details).
Figure 6.4 presents some typical failure cases. The first failure case (Fig. 6.4a) is
mostly caused by poor manual mask segmentation—the segmented mask contains
only part of the fingerprint area, and the resulting fingerprint image contains too little
useful data to perform the matching procedure successfully. This problem is related
to any overlapped fingerprint separation approach and highlights the need for a fully
automated mask generation system. The second failure case (Fig. 6.4b) is caused by
singular points placed at the very edge of the overlapped area. Singular points are
points where fingerprint ridges show discontinuity. Since our approach separates
orientations partially based on the continuity of ridges, when singular points appear
at the very edge of the overlapped area it is very possible for some error to occur
50 6 Machine Learning Based Separation of Overlapped Latent Fingerprints
Fig. 6.4 Failure cases, caused by: (a) poor manual mask segmentation; (b) singular points (marked
with red dots) placed at the edge of overlapped area
in the first iterations of orientation separation process. The error propagates to the
whole overlapped area, causing unreliable separation results (see [10] for details).
References
1. F. Chen, J. Feng, A. Jain, J. Zhou, J. Zhang, Separating overlapped fingerprints. IEEE Trans.
Inf. Forensics Secur. 6(2), 346–359 (2011). ISSN 1556-6013. https://doi.org/10.1109/TIFS.
2011.2114345
2. J.G. Daugman, Uncertainty relation for resolution in space, spatial frequency, and orientation
optimized by two-dimensional visual cortical filters. J. Opt. Soc. Am. A 2(7), 1160–1169
(1985)
3. J. Feng, Y. Shi, J. Zhou, Robust and efficient algorithms for separating latent overlapped
fingerprints. IEEE Trans. Inf. Forensics Secur. 7(5), 1498–1510 (2012). ISSN 1556-6013.
https://doi.org/10.1109/TIFS.2012.2204254
4. J. Feng, J. Zhou, A. Jain, Orientation field estimation for latent fingerprint enhancement. IEEE
Trans. Pattern Anal. Mach. Intell. 35(4), 925–940 (2013). ISSN 0162-8828. https://doi.org/10.
1109/TPAMI.2012.155
5. M.H. Hassoun, Fundamentals of Artificial Neural Networks (MIT Press, Cambridge, 1995)
6. L. Hong, Y. Wan, A. Jain, Fingerprint image enhancement: algorithm and performance
evaluation. IEEE Trans. Pattern Anal. Mach. Intell. 20(8), 777–789 (1998)
7. A. Jain, J. Feng, Latent palmprint matching. IEEE Trans. Pattern Anal. Mach. Intell. 31(6),
1032–1047 (2009). ISSN 0162-8828. https://doi.org/10.1109/TPAMI.2008.242
8. D. Maio, D. Maltoni, R. Cappelli, J.L. Wayman, A.K. Jain, FVC2002: second fingerprint
verification competition, in Proceedings of the 16th International Conference on Pattern
Recognition, 2002, vol. 3 (IEEE, Piscataway, 2002), pp. 811–814
9. Y. Shi, J. Feng, J. Zhou, Separating overlapped fingerprints using constrained relaxation
labeling, in Proceedings of the International Joint Conference on Biometrics (2011)
10. B. Stojanović, A. Nešković, O. Marques, A novel neural network based approach to latent
overlapped fingerprints separation. Multimed. Tools Appl. 1–25 (2016). https://doi.org/10.
1007/s11042-016-3696-4
11. N. Zhang, Y. Zang, X. Yang, X. Jia, J. Tian, Adaptive orientation model fitting for latent
overlapped fingerprints separation. IEEE Trans. Inf. Forensics Secur. 9(10), 1547–1556 (2014).
ISSN 1556-6013. https://doi.org/10.1109/TIFS.2014.2340573