An Efficient Algorithm for Fingercode-Based Biometric Identification

Size: px
Start display at page:

Download "An Efficient Algorithm for Fingercode-Based Biometric Identification"

Transcription

1 An Efficient Algorithm for Fingercode-Based Biometric Identification Hong-Wei Sun, Kwok-Yan Lam, Ming Gu, and Jia-Guang Sun School of Software, Tsinghua University, Beijing , PR China {lamky, guming, Abstract. With the emerging trend of incorporating biometrics information in e-financial and e-government systems arisen from international efforts in anti-money laundering and counter-terrorism, biometric identification is gaining increasing importance as a component in information security applications. Recently, fingercode has been demonstrated to be an effective fingerprint biometric scheme, which can capture both local and global details in a fingerprint. In this paper, we formulate fingercode identification as a vector quantization (VQ) problem, and propose an efficient algorithm for fingercode-based biometric identification. Given a fingercode of the user, the algorithm aims to efficiently find, among all fingercodes in the database of registered users, the one with minimum Euclidean distance from the user s fingercode. Our algorithm is based on a new VQ technique which is designed to address the special needs of fingercode identification. Experimental results on DB1 of FVC 2004 demonstrate that our algorithm can outperform the full search algorithm, the partial distance search algorithm and the 2-pixel-merging sum pyramid based search algorithm for fingercode-based identification in terms of computation efficiency without sacrificing accuracy and storage. Keywords: Biometric security, fingercode; fingerprint matching; vector quantization. 1 Introduction In the face of strong needs arisen from counter-terrorism and anti-money laundering requirements, new theories and technologies are being developed recently to address key issues related to the identification needs of financial and government systems. With the emerging trend of incorporating biometrics information in e-financial and e-government systems arisen from international efforts against terrorist financing and for effective border control, biometric identification is gaining increasing importance as a component in security applications. Recently, fingercode has been demonstrated to be an effective fingerprint biometric scheme [1]. Unlike minutiae-based matching algorithms, fingercode captures both local and global details in a fingerprint; thus overcoming some of the major problems of minutiae-based matching. Fingercode-based matching is based on the squared Euclidean distance between two corresponding fingercodes. A fingerprint matching system may operate in one of the two modes: verification mode (1:1 matching) and identification mode (1:n matching). When R. Meersman, Z. Tari, P. Herrero et al. (Eds.): OTM Workshops 2006, LNCS 4277, pp , c Springer-Verlag Berlin Heidelberg 2006

2 470 H.-W. Sun et al. operating in the verification mode, it either accepts or rejects a user s claimed identity. Whereas, a fingerprint matching system operating in the identification mode establishes the identity of the user without a claimed identity information. This research focus on the identification mode of fingercode-based matching. The fingerprint matching system firstly computes the fingercodes of all registered users and stores them as fingerprint templates in the user database. The identification process then finds the minimum of the squared Euclidean distance between the user s fingercode and all the templates in the database. By comparing this minimum distance with a predefined threshold, the system determines whether the user s fingercode belongs to some registered user in the database. If so, it establishes the identity of the user based on the nearest template. However, fingercode-based identification is a computation-intensive process as it needs to compute and compare the squared Euclidean distance between the user s fingercode and all stored templates. To enhance the performance of fingercode-based identification, we formulate the identification process as a vector quantization (VQ) problem, and devise an efficient VQ algorithm to find the template with minimum Euclidean distance from the user s fingercode. We observed that the fingercode matching process is very similar to the encoding process in VQ [2,3], which is an efficient technique for low-bit-rate image compression. Many efficient algorithms have been developed to enhance the VQ encoding process [4,5,6]. These methods typically use the statistical features of a vector to estimate the Euclidean distance and reject most of the unlikely codewords without computing the actual Euclidean distances. Our algorithm also adopted this principle to accelerate the matching process for the fingercode-based identification system. Nevertheless, not all VQ techniques can be applied directly to fingercodebased matching. VQ techniques designed for image compression use a small codebook, 512 codewords typically. Besides, the dimension of vectors representing image blocks is also small, typically 16 dimensions. Whereas, the dimension of fingercode is of several hundred and the codebook size is determined by the number of registered users in the template database. Thus it is important to have a VQ technique which does not require storage space or pre-computed data set proportional to the dimension of the vectors or the codebook size. This paper presents a new fingercode identification algorithm based on VQ. The fingercode biometric scheme is introduced in Section 2. In Section 3, we explain the fingercode-based biometric identification and formulate the problem as a VQ encoding process. The new fingercode identification algorithm will bedescribedindetailinsection4which is followed by a presentation of the experimental results in Section 5. The paper is concluded in Section 6. 2 Fingercode Biometric Scheme Fingercode has been demonstrated to be an effective fingerprint biometric scheme, which can capture both local and global details in a fingerprint [1]. The fingercode-based matching algorithm uses a bank of Gabor filters to capture both

3 An Efficient Algorithm for Fingercode-Based Biometric Identification 471 local and global details in a fingerprint as a fingercode, which is represented by a fixed-length vector. The fingercode scheme divides the fingerprint image of a user into a number of sectors, applies Gabor filters to transform the image in each sector; then obtains a real value from each sector by computing the average absolute deviation from the mean for each sector. This results in a k-dimensional real vector where k is the number of sectors on the fingerprint. The fingercode generation process [1] can be summarized by the following: Step 1: Locate a reference point and determine the region of interest for the fingerprint image. The reference point of a fingerprint is defined as the point of maximum curvature of the concave ridges in the fingerprint image [7]. For fingercode encoding, [1] located the reference point based on multi-resolution analysis of the orientation fields of the fingerprint image. The use of reference point helps address the translation invariance of fingercodes. Step 2: Tessellate the region of interest around the reference point. The region of interest is divided into a series of B concentric bands and each band is subdivided into k sectors. In our experiments, we use four bands (B =4) and each band is segmented into sixteen sectors (k = 16), thus resulting in a total of 16 4 = 64 sectors; Step 3: Normalize the region of interest in each sector to a constant mean and variance. Let I(x, y) denotes the gray value at pixel (x, y), M i and V i, the mean and variance of the gray values in sector S i,andn i (x, y), the normalized gray value at pixel (x, y). For all the pixels in sector S i,the normalized image is defined as: M 0 + V0 (I(x,y) M i) 2 V N i (x, y) = i if I(x, y) >M i M 0 V0 (I(x,y) M i) 2 otherwise where M 0 and V 0 are the desired mean and variance values, respectively. The normalization process removes the effects of sensor noise and gray level deformation due to the finger pressure differences; Step 4: Filter the region of interest in eight different directions using a bank of Gabor filters to produce a set of eight filtered images. Properly tuned Gabor filters can remove noise, preserve the true ridge and valley structures, and provide information contained in a particular orientation in the image. The typically used even symmetric Gabor filter [1] has the following general form in the spatial domain: G(x, y; f,θ) =exp{ 1 2 [x 2 δx 2 + y 2 δy 2 ]} cos(2πfx ) x = x sin θ + y cos θ y = x cos θ y sin θ where f is the frequency of the sinusoidal plane wave along the direction θ from x-axis, and δ x and δ y are the space constants of the Gaussian envelope along x and y axes, respectively. V i

4 472 H.-W. Sun et al. Step 5: For each filtered output, compute the average absolute deviation from the mean (AAD) of gray values in individual sectors in filtered images to form the fingercode. In our experiments, sixty-four features of each of the eight filtered images provide a total of 512 (64 8) features. Hence the fingercode of the user is represented by a collection of eight (8 filters) 64-dimensional real vectors. The translation invariance of the fingercode is established by the reference point. To achieve approximate rotational invariance, the features in the fingercode are cyclically rotated. The fingercode is firstly rotated cyclically to generate five templates corresponding to five rotations (0, ±22.5, ±45 ) of the original fingerprint image. The original fingerprint image is then rotated by an angle of and its fingercodes are generated by computing another five templates corresponding to five rotations. Thus, the database contains ten templates for each fingerprint. To perform fingercode biometric verification, a user s fingercode is generated from his fingerprint image which is then matched against the stored fingercodes of the claimed identity. In this mode, fingercode matching is based on the Euclidean distance between the two corresponding fingercodes. The final matching distance score is taken as the minimum of the ten scores, i.e. matching of the input fingercode with each of the ten templates. This minimum score corresponds to the best alignment of the two fingerprints being matched. 3 Fingercode-Based Biometric Identification When performing fingercode identification, a user supplies his fingerprint (query fingerprint) to the system without a claimed identity. The identification system then compares the supplied fingerprint with all the stored templates in order to determine the identity of the user. The fingerprint identification system thus firstly computes the fingercodes of all registered users and stores them as fingerprint templates in the database. The fingercode identification process finds the minimum squared Euclidean distance between the fingercode of the query fingerprint and all the templates in the database. By comparing this distance with a predefined threshold, the system determines whether the query fingerprint matches some fingercode template in the database, and establishes the identity of the user. Since the database stores ten templates for each fingerprint, if the full search (FS) algorithm is used, the matching process needs to compute the squared Euclidean distance between the fingercode of the query fingerprint and each of the templates in the database, thus it is computation-intensive. To enhance the efficiency of fingercode-based biometric identification, we formulate the identification process as a VQ problem. In essence, the identification system needs to search through the fingercode database for the fingercode which is nearest (in terms of Euclidean distance) to the query fingerprint. This search problem is similar to the encoding process in VQ.

5 An Efficient Algorithm for Fingercode-Based Biometric Identification 473 VQ is a mapping Q of a k-dimensional Euclidean space R k into certain finite subset C of R k,wherec is the codebook with size N and each codeword c i = {c i1,c i1,,c ik } in C is k-dimensional. The codeword searching problem in VQ is to assign one codeword to the input test vector such that the distance between this codeword and the test vector is the smallest among all codewords. Given one codeword c i = {c i1,c i2,,c ik } and the test vector x = {x 1,x 2,,x k }, the squared Euclidean distance can be expressed as d 2 (x, c i )= k j=1 (x j c ij ) 2. In the fingercode identification system, since a fingercode typically has several hundred dimensions, and there are 10 templates for each fingerprint, the searching process is computation-intensive if the FS algorithm is used. From the above equation, each distance calculation needs k multiplication and 2k 1 additions. To encode the input vector, the FS method [2] computes the squared Euclidean distances between the input vector and each codeword and determines the best-matched one c w by d 2 (x, c w )=min ci C d 2 (c i,x). To encode each input vector, the FS method needs N distance computations and N 1 comparisons. In other words, it must perform kn multiplications, (2k 1)N additions and N 1 comparisons, which is time-consuming. In order to accelerate the VQ encoding process, many fast methods [4,5,6] have been proposed. These methods use an estimate of the Euclidean distance to quickly determine whether a codeword can be eliminated thus the actual Euclidean distance need not be computed. Suppose the running minimum for the input vector x is d min, if the estimation for the Euclidean distance between x and current codeword c i is larger than d min and the corresponding real Euclidean distance is larger than the estimation, then we can safely reject c i and avoid computing the actual Euclidean distance. For example, the partial distance search (PDS) algorithm [4] uses the following rejection test t j=1 (x j c ij ) 2 d 2 min, for any t<k. If the partially calculated squared Euclidean distance from dimensions 1 to t is greater than the running minimum d min, this codeword can be rejected without calculating the actual one in k dimensions. As another example, the subvector (SV) method divides x and c i into the first and second subvectors as x f = {x 1,x 2,,x k/2 }, x s = {x k/2+1,x k/2+2,,x k }, c i,f = {c i1,c i1,,c ik/2 }, c i,s = {c i(k/2+1),c i(k/2+2),,c ik }, respectively [5]. The sums, means and the variances of x and c i are defined as S x = k j=1 x j, S ci = k j=1 c k ij, M x = S x /k, M ci = S ci /k, V x = j=1 (x j M x ) 2, V ci = k j=1 (c ij M ci ) 2. Similarly, the partial sums of each subvector are defined as S x,f = k/2 j=1 x j, S x,s = k j=k/2+1 x j, S ci,f = k/2 j=1 c ij, S ci,s = k j=k/2+1 c ij. The SV method uses the following 3-step rejection test flow. If any inequality holds, it rejects c i as the nearest codeword. Step 1. (S x S ci ) 2 kd 2 min. Step 2. (S x S ci ) 2 + k(v x V ci ) 2 kd 2 min. Step 3. (S x S ci ) 2 2(S x,f S ci,f) [(S x S ci ) (S x,f S ci,f)] (k/2)d 2 min.

6 474 H.-W. Sun et al. In order to realize recursive computation in a memory efficient way, 2PM SPasshowninFigure1wasproposedin[6]forcodewordsearchinVQ.A hierarchical rejection rule is set up as d 2 (x, c i )=d 2 u(x, c i ) 2 (u v) d 2 v(x, c i ) 2 (u 1) d 2 1 (x, c i) 2 u d 2 0 (x, c i). The squared Euclidean distance (i.e. the test function) at the v th level of the hierarchy for v [0,u]isd 2 v (x, c i)= 2 v m=1 (S x,v,m S ci,v,m) 2 where S x,v,m is the m th pixel at the v th level for x and S ci,v,m similarly defined for c i.fora k-dimensional vector, u =log 2 k. L0 (top level) L1 L2 Summing L3 L4 m n Lu (bottom level) Fig. 1. A 2-pixel-merging sum pyramid Thus, at any v th level for v [0,u], if the inequality 2 (u v) d 2 v (x, c i) d 2 min holds, then c i can safely be rejected at the v th level. 4 Efficient Fingercode Identification Based on VQ Due to the fundamental distinction between the fingercode identification system and the image compression system, not all VQ techniques can be applied directly to fingercode searching. The major differences include: (1) Codebook size in image compression is fixed, typically 512; whereas, fingercode stored in database is very large and depends on the number of registered users in the system. (2) Image vector dimension is small, typically 16; whereas fingercode vector dimension is much larger, e.g in our examples. Thus a good fingercode identification system should adopt a VQ technique which does not require storage space or pre-computed data set proportional to the dimension of the vectors or size of the user population. Based on the above analysis, we firstly investigate some suitable fast VQ encoding methods and evaluate their performance for fingercode identification. In this study, we use benchmarking data set DB1 from FVC 2004 [8] for our experiments. There are a total of 100 fingers and 8 impressions per finger (800

7 An Efficient Algorithm for Fingercode-Based Biometric Identification 475 impressions) in this database. We use the first impression of each finger to test the performance of the PDS method [4], the SV method [5] and the 2PM SP method [6]. We then use the other 700 impressions as the registered fingerprints, compute 10 fingercodes for each impression and store them as the templates, which results in = 7000 templates. In the first experiment (Fig. 2), we used the first 1000 templates in the database to simulate a fingerprint identification system with a small population. In the second experiment (Fig. 3), we used all the 7000 templates in the database, which simulate a fingerprint recognition system with a larger population. FS PDS SV 2PM SP Execution time Number of users Fig. 2. Performance comparison for small number of users FS PDS SV 2PM SP Execution time Number of users Fig. 3. Performance comparison for large number of users From Figures 2 and 3, it is clear that the PDS and 2PM SP methods are more efficient and scalable for fingercode identification. Note that both the PDS and 2PM SP schemes do not require additional storage space proportional to the user population size or vector dimensionality. Our new scheme is based on and enhanced from these two methods. We propose an efficient search algorithm to find the minimum squared Euclidean distance, which combines the PDS algorithm [4] and the 2PM SP algorithm [6]. Since there will be more levels for fingercodes than the vectors in VQ and using the first several levels can hardly reject enough fingercodes, so we propose

8 476 H.-W. Sun et al. a new scheme, namely the truncated 2PM SP, for the fingercode identification system. To achieve the improvement, the truncated 2PM SP scheme begins the computation of the squared Euclidean distance at the s th level instead of the 0 th level, and at the s th level, we introduce PDS algorithm. The truncated 2PM SP algorithm consists of the following five steps: Step 1: Convert each template in the database to an m n matrix as shown in Figure 4 (m = 16, n = 32 in our experiment). 0º 157.5º 0º 22.5º 45º 67.5º 90º 112.5º 135º 157.5º Fig. 4. Convert each template in the database to an m n matrix Step 2: Construct the truncated 2PM SP by computing the pyramid from the bottom level to the s th level for each matrix computed in Step 1 (s =5in our experiment). If there are N users, and 10 templates for each user in the database, 10N truncated 2PM SP are constructed. That is, each template in the database is associated with one truncated 2PM SP. Step 3: For the query fingercode x, the truncated 2PM SM of x is constructed. Select the first template c 1 in the database to be the current template closest to the query fingercode x. Compute and temporarily store the running minimum d 2 min = d2 (x, c 1 )andd 2 v,min =2(u v) d 2 min for v [s, u]. Step 4: Foranyothertemplatec i in the database, execute the rejection tests from the s th level to the bottom level. At the s th level, if the partially calculated squared Euclidean distance is greater than the running minimum d 2 s,min, this template can be rejected. If c i goes through all the rejection tests and arrives the bottom level, then recompute and store the running minimum d 2 min = d2 (x, c i )andd 2 v,min =2(u v) d 2 min for v [s, u]. Step 5: If there is no more candidate template, the current so far bestmatched template is the real best-matched one, and if d 2 min is less than the predefined threshold, the index of this template is used to establish the identity of the user. 5 Experimental Results Our algorithm is compared with the PDS and 2PM SP algorithms through experiments. In our experiments, we use the same parameters as in Section 4. The improvement ratio in terms of execution time required in the proposed algorithm

9 An Efficient Algorithm for Fingercode-Based Biometric Identification 477 Table 1. Comparison of average online execution time per query fingercode Number of Number of T PDS T 2PM T T 2PM R 1 R 2 users templates (s) (s) (s) % % PDS 2PM SP T2PM SP Execution time Number of users Fig. 5. Performance comparison for large user population TPDS TT2PM over the PDS and 2PM SP algorithms are denoted by R 1 = T PDS 100 T2PM TT2PM and R 2 = T 2PM 100 respectively. Here T PDS, T 2PM and T T 2PM denote the average online execution time of the 100 tested fingercodes required in the PDS algorithm, the 2PM SP algorithm and the proposed algorithm, respectively. Table 1 illustrates the respective performance comparisons where the time unit is denoted by s. As can be seen from Table 1, our algorithm performs more efficiently than both the PDS algorithm and the 2PM SP algorithm. More importantly, experimental results also illustrate the scalability of our algorithm since our algorithm performs well even with large user population as shown in Figure 5. Furthermore, our algorithm outperforms the FS algorithm, the PDS algorithm and the 2PM SP based search algorithm for fingercode identification in terms of computation efficiency and yet without sacrificing accuracy and storage. (2PM SP requires k memories for a k-dimensional vector [6]). 6 Conclusions In this paper, we proposed an efficient fingercode identification technique based on an improved VQ encoding algorithm. The new algorithm finds the minimum squared Euclidean distance by combining the partial distance search and the

10 478 H.-W. Sun et al. 2-pixel-merging sum pyramid in VQ encoding. Because of the test structure of the truncated 2PM SP algorithm, our algorithm is more efficient than both the PDS and basic 2PM SP algorithms. Experimental results on DB1 of FVC 2004 [8] demonstrated that our algorithm can outperform the full search algorithm, the partial distance search algorithm and the 2-pixel-merging sum pyramid based search algorithm for fingercode-based fingerprint matching in terms of computation efficiency without sacrificing accuracy and storage. Acknowledgement. This research was partly funded by the Chinese National Science Foundation (Project Number: ), P. R. China and the Biometric Cryptography project of PrivyLink Pte Ltd (Singapore). References 1. A.K. Jain, S. Prabhakar, L. Hong, S. Pankanti. Filterbank-based fingerprint matching, IEEE Trans on Image Processing, 2000, 9(5): Y. Linde, A. Buzo, R. M. Gray. An algorithm for vector quantizer design, IEEE Trans on Comm, 1980, 28(1): N.M. Nasrabadi, R.A. King. Image coding using vector quantization: a review, IEEE Trans on Comm, 1988, 36(8): C. Bei, R.M. Gray. An Improvement of the Minimum Distortion Encoding Algorithm for Vector Quantization, IEEE Trans on Comm, 1985, 33(10): Z. Pan, K. Kotani, T. Ohmi. Improved fast encoding method for vector quantization based on subvector technique,2005 IEEE International Symposium on Circuits and Systems, 2005: Z. Pan, K. Kotani, T. Ohmi. A memory-efficient fast encoding method for vector quantization using 2-pixel-merging sum pyramid,2004 IEEE Int l Conf on Acoustics, Speech and Signal Processing, 2004, 3: X.D. Jiang, M.H. Liu, A.C.C. Kot. Reference Point Detection for Fingerprint Recognition, the 17 th Int l Conf on Pattern Recognition, 2004, 1: FVC The 3rd International Fingerprint Verification Competition,

FILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239)

FILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239) FILTERBANK-BASED FINGERPRINT MATCHING Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239) Papers Selected FINGERPRINT MATCHING USING MINUTIAE AND TEXTURE FEATURES By Anil

More information

Fingerprint Matching using Gabor Filters

Fingerprint Matching using Gabor Filters Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.

More information

Final Project Report: Filterbank-Based Fingerprint Matching

Final Project Report: Filterbank-Based Fingerprint Matching Sabanci University TE 407 Digital Image Processing Final Project Report: Filterbank-Based Fingerprint Matching June 28, 2004 Didem Gözüpek & Onur Sarkan 5265 5241 1 1. Introduction The need for security

More information

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah Filterbank-Based Fingerprint Matching Multimedia Systems Project Niveditha Amarnath Samir Shah Presentation overview Introduction Background Algorithm Limitations and Improvements Conclusions and future

More information

Image Enhancement Techniques for Fingerprint Identification

Image Enhancement Techniques for Fingerprint Identification March 2013 1 Image Enhancement Techniques for Fingerprint Identification Pankaj Deshmukh, Siraj Pathan, Riyaz Pathan Abstract The aim of this paper is to propose a new method in fingerprint enhancement

More information

Reference Point Detection for Arch Type Fingerprints

Reference Point Detection for Arch Type Fingerprints Reference Point Detection for Arch Type Fingerprints H.K. Lam 1, Z. Hou 1, W.Y. Yau 1, T.P. Chen 1, J. Li 2, and K.Y. Sim 2 1 Computer Vision and Image Understanding Department Institute for Infocomm Research,

More information

AN EFFICIENT METHOD FOR FINGERPRINT RECOGNITION FOR NOISY IMAGES

AN EFFICIENT METHOD FOR FINGERPRINT RECOGNITION FOR NOISY IMAGES International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 113-117 AN EFFICIENT METHOD FOR FINGERPRINT RECOGNITION FOR NOISY IMAGES Vijay V. Chaudhary 1 and S.R.

More information

Fingerprint Image Enhancement Algorithm and Performance Evaluation

Fingerprint Image Enhancement Algorithm and Performance Evaluation Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,

More information

A new approach to reference point location in fingerprint recognition

A new approach to reference point location in fingerprint recognition A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl

More information

Local Correlation-based Fingerprint Matching

Local Correlation-based Fingerprint Matching Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of

More information

Verifying Fingerprint Match by Local Correlation Methods

Verifying Fingerprint Match by Local Correlation Methods Verifying Fingerprint Match by Local Correlation Methods Jiang Li, Sergey Tulyakov and Venu Govindaraju Abstract Most fingerprint matching algorithms are based on finding correspondences between minutiae

More information

Development of an Automated Fingerprint Verification System

Development of an Automated Fingerprint Verification System Development of an Automated Development of an Automated Fingerprint Verification System Fingerprint Verification System Martin Saveski 18 May 2010 Introduction Biometrics the use of distinctive anatomical

More information

This is the published version:

This is the published version: This is the published version: Youssif, A.A.A., Chowdhury, Morshed, Ray, Sid and Nafaa, H.Y. 2007, Fingerprint recognition system using hybrid matching techniques, in 6th IEEE/ACIS International Conference

More information

Fingerprint Mosaicking by Rolling with Sliding

Fingerprint Mosaicking by Rolling with Sliding Fingerprint Mosaicking by Rolling with Sliding Kyoungtaek Choi, Hunjae Park, Hee-seung Choi and Jaihie Kim Department of Electrical and Electronic Engineering,Yonsei University Biometrics Engineering Research

More information

A new predictive image compression scheme using histogram analysis and pattern matching

A new predictive image compression scheme using histogram analysis and pattern matching University of Wollongong Research Online University of Wollongong in Dubai - Papers University of Wollongong in Dubai 00 A new predictive image compression scheme using histogram analysis and pattern matching

More information

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design

Feature-Guided K-Means Algorithm for Optimal Image Vector Quantizer Design Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 6, November 2017 Feature-Guided K-Means Algorithm for Optimal Image Vector

More information

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

A Framework for Efficient Fingerprint Identification using a Minutiae Tree A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a

More information

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING Author1: Author2: K.Raghu Ram K.Krishna Chaitanya 4 th E.C.E 4 th E.C.E raghuram.kolipaka@gmail.com chaitu_kolluri@yahoo.com Newton s Institute

More information

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Minutiae Points Extraction using Biometric Fingerprint- Enhancement Vishal Wagh 1, Shefali Sonavane 2 1 Computer Science and Engineering Department, Walchand College of Engineering, Sangli, Maharashtra-416415,

More information

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric

More information

Graph Matching Iris Image Blocks with Local Binary Pattern

Graph Matching Iris Image Blocks with Local Binary Pattern Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of

More information

Feature-level Fusion for Effective Palmprint Authentication

Feature-level Fusion for Effective Palmprint Authentication Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,

More information

FINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY

FINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY FINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY M. POULOS Dept. of Informatics University of Piraeus, P.O. BOX 96, 49100 Corfu, Greece

More information

CHAPTER 6 INFORMATION HIDING USING VECTOR QUANTIZATION

CHAPTER 6 INFORMATION HIDING USING VECTOR QUANTIZATION CHAPTER 6 INFORMATION HIDING USING VECTOR QUANTIZATION In the earlier part of the thesis different methods in the spatial domain and transform domain are studied This chapter deals with the techniques

More information

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,

More information

Polar Harmonic Transform for Fingerprint Recognition

Polar Harmonic Transform for Fingerprint Recognition International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint

More information

Integrating Palmprint and Fingerprint for Identity Verification

Integrating Palmprint and Fingerprint for Identity Verification 2009 Third nternational Conference on Network and System Security ntegrating Palmprint and Fingerprint for dentity Verification Yong Jian Chin, Thian Song Ong, Michael K.O. Goh and Bee Yan Hiew Faculty

More information

Fusion Method of Fingerprint Quality Evaluation: From the Local Gabor Feature to the Global Spatial-Frequency Structures

Fusion Method of Fingerprint Quality Evaluation: From the Local Gabor Feature to the Global Spatial-Frequency Structures Fusion Method of Fingerprint Quality Evaluation: From the Local abor Feature to the lobal Spatial-Frequency Structures Decong Yu, Lihong Ma,, Hanqing Lu, and Zhiqing Chen 3 D Key Lab. of Computer Networ,

More information

Fingerprint Ridge Distance Estimation: Algorithms and the Performance*

Fingerprint Ridge Distance Estimation: Algorithms and the Performance* Fingerprint Ridge Distance Estimation: Algorithms and the Performance* Xiaosi Zhan, Zhaocai Sun, Yilong Yin, and Yayun Chu Computer Department, Fuyan Normal College, 3603, Fuyang, China xiaoszhan@63.net,

More information

A GABOR FILTER-BASED APPROACH TO FINGERPRINT RECOGNITION

A GABOR FILTER-BASED APPROACH TO FINGERPRINT RECOGNITION A GABOR FILTER-BASED APPROACH TO FINGERPRINT RECOGNITION Chih-Jen Lee and Sheng-De Wang Dept. of Electrical Engineering EE Building, Rm. 441 National Taiwan University Taipei 106, TAIWAN sdwang@hpc.ee.ntu.edu.tw

More information

Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model

Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model Illumination-Robust Face Recognition based on Gabor Feature Face Intrinsic Identity PCA Model TAE IN SEOL*, SUN-TAE CHUNG*, SUNHO KI**, SEONGWON CHO**, YUN-KWANG HONG*** *School of Electronic Engineering

More information

Incorporating Image Quality in Multi-Algorithm Fingerprint Verification

Incorporating Image Quality in Multi-Algorithm Fingerprint Verification Incorporating Image Quality in Multi-Algorithm Fingerprint Verification Julian Fierrez-Aguilar 1, Yi Chen 2, Javier Ortega-Garcia 1, and Anil K. Jain 2 1 ATVS, Escuela Politecnica Superior, Universidad

More information

Fingerprint Recognition System for Low Quality Images

Fingerprint Recognition System for Low Quality Images Fingerprint Recognition System for Low Quality Images Zin Mar Win and Myint Myint Sein University of Computer Studies, Yangon, Myanmar zmwucsy@gmail.com Department of Research and Development University

More information

Embedded Palmprint Recognition System on Mobile Devices

Embedded Palmprint Recognition System on Mobile Devices Embedded Palmprint Recognition System on Mobile Devices Yufei Han, Tieniu Tan, Zhenan Sun, and Ying Hao Center for Biometrics and Security Research National Labrotory of Pattern Recognition,Institue of

More information

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ)

MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) 5 MRT based Adaptive Transform Coder with Classified Vector Quantization (MATC-CVQ) Contents 5.1 Introduction.128 5.2 Vector Quantization in MRT Domain Using Isometric Transformations and Scaling.130 5.2.1

More information

Rotation Invariant Finger Vein Recognition *

Rotation Invariant Finger Vein Recognition * Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,

More information

A LOSSLESS INDEX CODING ALGORITHM AND VLSI DESIGN FOR VECTOR QUANTIZATION

A LOSSLESS INDEX CODING ALGORITHM AND VLSI DESIGN FOR VECTOR QUANTIZATION A LOSSLESS INDEX CODING ALGORITHM AND VLSI DESIGN FOR VECTOR QUANTIZATION Ming-Hwa Sheu, Sh-Chi Tsai and Ming-Der Shieh Dept. of Electronic Eng., National Yunlin Univ. of Science and Technology, Yunlin,

More information

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic

More information

Fingerprint Enhancement and Identification by Adaptive Directional Filtering

Fingerprint Enhancement and Identification by Adaptive Directional Filtering Fingerprint Enhancement and Identification by Adaptive Directional Filtering EE5359 MULTIMEDIA PROCESSING SPRING 2015 Under the guidance of Dr. K. R. Rao Presented by Vishwak R Tadisina ID:1001051048 EE5359

More information

Indexing Fingerprints using Minutiae Quadruplets

Indexing Fingerprints using Minutiae Quadruplets Indexing Fingerprints using Minutiae Quadruplets Ogechukwu Iloanusi University of Nigeria, Nsukka oniloanusi@gmail.com Aglika Gyaourova and Arun Ross West Virginia University http://www.csee.wvu.edu/~ross

More information

Fingerprint Verification applying Invariant Moments

Fingerprint Verification applying Invariant Moments Fingerprint Verification applying Invariant Moments J. Leon, G Sanchez, G. Aguilar. L. Toscano. H. Perez, J. M. Ramirez National Polytechnic Institute SEPI ESIME CULHUACAN Mexico City, Mexico National

More information

Fast and Robust Projective Matching for Fingerprints using Geometric Hashing

Fast and Robust Projective Matching for Fingerprints using Geometric Hashing Fast and Robust Projective Matching for Fingerprints using Geometric Hashing Rintu Boro Sumantra Dutta Roy Department of Electrical Engineering, IIT Bombay, Powai, Mumbai - 400 076, INDIA {rintu, sumantra}@ee.iitb.ac.in

More information

Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved All Descriptor-Pair Matching

Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved All Descriptor-Pair Matching Sensors 2013, 13, 3142-3156; doi:10.3390/s130303142 Article OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journal/sensors Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved

More information

Fingerprint Enhancement and Identification by Adaptive Directional Filtering

Fingerprint Enhancement and Identification by Adaptive Directional Filtering Fingerprint Enhancement and Identification by Adaptive Directional Filtering EE5359 MULTIMEDIA PROCESSING SPRING 2015 Under the guidance of Dr. K. R. Rao Presented by Vishwak R Tadisina ID:1001051048 EE5359

More information

Robust biometric image watermarking for fingerprint and face template protection

Robust biometric image watermarking for fingerprint and face template protection Robust biometric image watermarking for fingerprint and face template protection Mayank Vatsa 1, Richa Singh 1, Afzel Noore 1a),MaxM.Houck 2, and Keith Morris 2 1 West Virginia University, Morgantown,

More information

CORE POINT DETECTION USING FINE ORIENTATION FIELD ESTIMATION

CORE POINT DETECTION USING FINE ORIENTATION FIELD ESTIMATION CORE POINT DETECTION USING FINE ORIENTATION FIELD ESTIMATION M. Usman Akram, Rabia Arshad, Rabia Anwar, Shoab A. Khan Department of Computer Engineering, EME College, NUST, Rawalpindi, Pakistan usmakram@gmail.com,rabiakundi2007@gmail.com,librabia2004@hotmail.com,

More information

Preprocessing of a Fingerprint Image Captured with a Mobile Camera

Preprocessing of a Fingerprint Image Captured with a Mobile Camera Preprocessing of a Fingerprint Image Captured with a Mobile Camera Chulhan Lee 1, Sanghoon Lee 1,JaihieKim 1, and Sung-Jae Kim 2 1 Biometrics Engineering Research Center, Department of Electrical and Electronic

More information

Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask

Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask Laurice Phillips PhD student laurice.phillips@utt.edu.tt Margaret Bernard Senior Lecturer and Head of Department Margaret.Bernard@sta.uwi.edu

More information

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision

Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Adaptive Zoom Distance Measuring System of Camera Based on the Ranging of Binocular Vision Zhiyan Zhang 1, Wei Qian 1, Lei Pan 1 & Yanjun Li 1 1 University of Shanghai for Science and Technology, China

More information

Fingerprint matching using ridges

Fingerprint matching using ridges Fingerprint matching using ridges Jianjiang Feng a, *, Zhengyu Ouyang a, and Anni Cai a a Beijing University of Posts and Telecommunications, Box 113, Beijing, 100876, P. R. China *Corresponding author.

More information

Spatial Topology of Equitemporal Points on Signatures for Retrieval

Spatial Topology of Equitemporal Points on Signatures for Retrieval Spatial Topology of Equitemporal Points on Signatures for Retrieval D.S. Guru, H.N. Prakash, and T.N. Vikram Dept of Studies in Computer Science,University of Mysore, Mysore - 570 006, India dsg@compsci.uni-mysore.ac.in,

More information

Adaptive Fingerprint Pore Model for Fingerprint Pore Extraction

Adaptive Fingerprint Pore Model for Fingerprint Pore Extraction RESEARCH ARTICLE OPEN ACCESS Adaptive Fingerprint Pore Model for Fingerprint Pore Extraction Ritesh B.Siriya, Milind M.Mushrif Dept. of E&T, YCCE, Dept. of E&T, YCCE ritesh.siriya@gmail.com, milindmushrif@yahoo.com

More information

A New Technique to Fingerprint Recognition Based on Partial Window

A New Technique to Fingerprint Recognition Based on Partial Window A New Technique to Fingerprint Recognition Based on Partial Window Romany F. Mansour 1* AbdulSamad A. Marghilani 2 1. Department of Science and Mathematics, Faculty of Education, New Valley, Assiut University,

More information

Image coding based on multiband wavelet and adaptive quad-tree partition

Image coding based on multiband wavelet and adaptive quad-tree partition Journal of Computational and Applied Mathematics 195 (2006) 2 7 www.elsevier.com/locate/cam Image coding based on multiband wavelet and adaptive quad-tree partition Bi Ning a,,1, Dai Qinyun a,b, Huang

More information

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele

More information

An Adaptive Threshold LBP Algorithm for Face Recognition

An Adaptive Threshold LBP Algorithm for Face Recognition An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent

More information

Similarity Image Retrieval System Using Hierarchical Classification

Similarity Image Retrieval System Using Hierarchical Classification Similarity Image Retrieval System Using Hierarchical Classification Experimental System on Mobile Internet with Cellular Phone Masahiro Tada 1, Toshikazu Kato 1, and Isao Shinohara 2 1 Department of Industrial

More information

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of

More information

Comparative Study on VQ with Simple GA and Ordain GA

Comparative Study on VQ with Simple GA and Ordain GA Proceedings of the 9th WSEAS International Conference on Automatic Control, Modeling & Simulation, Istanbul, Turkey, May 27-29, 2007 204 Comparative Study on VQ with Simple GA and Ordain GA SADAF SAJJAD

More information

Chapter 3 Image Registration. Chapter 3 Image Registration

Chapter 3 Image Registration. Chapter 3 Image Registration Chapter 3 Image Registration Distributed Algorithms for Introduction (1) Definition: Image Registration Input: 2 images of the same scene but taken from different perspectives Goal: Identify transformation

More information

Cluster Analysis. Jia Li Department of Statistics Penn State University. Summer School in Statistics for Astronomers IV June 9-14, 2008

Cluster Analysis. Jia Li Department of Statistics Penn State University. Summer School in Statistics for Astronomers IV June 9-14, 2008 Cluster Analysis Jia Li Department of Statistics Penn State University Summer School in Statistics for Astronomers IV June 9-1, 8 1 Clustering A basic tool in data mining/pattern recognition: Divide a

More information

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition RESEARCH ARTICLE OPEN ACCESS Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition Manisha Sharma *, Deepa Verma** * (Department Of Electronics and Communication

More information

FEATURES EXTRACTION USING A GABOR FILTER FAMILY

FEATURES EXTRACTION USING A GABOR FILTER FAMILY FEATURES EXTRACTION USING A GABOR FILTER FAMILY Danian Zheng, Yannan Zhao, Jiaxin Wang State Key Laboratory of Intelligent Technology and Systems Department of Computer Science and Technology Tsinghua

More information

Fingerprint Recognition using Texture Features

Fingerprint Recognition using Texture Features Fingerprint Recognition using Texture Features Manidipa Saha, Jyotismita Chaki, Ranjan Parekh,, School of Education Technology, Jadavpur University, Kolkata, India Abstract: This paper proposes an efficient

More information

Verifying Fingerprint Match by Local Correlation Methods

Verifying Fingerprint Match by Local Correlation Methods Verifying Fingerprint Match by Local Correlation Methods Jiang Li, Sergey Tulyakov and Venu Govindaraju Abstract- Most fingerprint matching algorithms are based on finding correspondences between minutiae

More information

AN AVERGE BASED ORIENTATION FIELD ESTIMATION METHOD FOR LATENT FINGER PRINT MATCHING.

AN AVERGE BASED ORIENTATION FIELD ESTIMATION METHOD FOR LATENT FINGER PRINT MATCHING. AN AVERGE BASED ORIENTATION FIELD ESTIMATION METHOD FOR LATENT FINGER PRINT MATCHING. B.RAJA RAO 1, Dr.E.V.KRISHNA RAO 2 1 Associate Professor in E.C.E Dept,KITS,DIVILI, Research Scholar in S.C.S.V.M.V

More information

Fingerprint Classification Using Orientation Field Flow Curves

Fingerprint Classification Using Orientation Field Flow Curves Fingerprint Classification Using Orientation Field Flow Curves Sarat C. Dass Michigan State University sdass@msu.edu Anil K. Jain Michigan State University ain@msu.edu Abstract Manual fingerprint classification

More information

An introduction on several biometric modalities. Yuning Xu

An introduction on several biometric modalities. Yuning Xu An introduction on several biometric modalities Yuning Xu The way human beings use to recognize each other: equip machines with that capability Passwords can be forgotten, tokens can be lost Post-9/11

More information

Fingerprint minutiae extraction and matching for identification procedure

Fingerprint minutiae extraction and matching for identification procedure Fingerprint minutiae extraction and matching for identification procedure Philippe Parra Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 9093-0443 pparra@ucsd.edu

More information

Fingerprint Indexing using Minutiae and Pore Features

Fingerprint Indexing using Minutiae and Pore Features Fingerprint Indexing using Minutiae and Pore Features R. Singh 1, M. Vatsa 1, and A. Noore 2 1 IIIT Delhi, India, {rsingh, mayank}iiitd.ac.in 2 West Virginia University, Morgantown, USA, afzel.noore@mail.wvu.edu

More information

Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation

Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation Designing of Fingerprint Enhancement Based on Curved Region Based Ridge Frequency Estimation Navjot Kaur #1, Mr. Gagandeep Singh #2 #1 M. Tech:Computer Science Engineering, Punjab Technical University

More information

Combining Gabor Features: Summing vs.voting in Human Face Recognition *

Combining Gabor Features: Summing vs.voting in Human Face Recognition * Combining Gabor Features: Summing vs.voting in Human Face Recognition * Xiaoyan Mu and Mohamad H. Hassoun Department of Electrical and Computer Engineering Wayne State University Detroit, MI 4822 muxiaoyan@wayne.edu

More information

Gender Specification Using Touch less Fingerprint Recognition

Gender Specification Using Touch less Fingerprint Recognition Gender Specification Using Touch less Fingerprint Recognition Merlyn Francis Fr.CRIT Vashi, India Oshin Koul Fr.CRIT Vashi, India Priyanka Rokade Fr.CRIT Vashi, India Abstract: Fingerprint recognition

More information

Image Compression with Competitive Networks and Pre-fixed Prototypes*

Image Compression with Competitive Networks and Pre-fixed Prototypes* Image Compression with Competitive Networks and Pre-fixed Prototypes* Enrique Merida-Casermeiro^, Domingo Lopez-Rodriguez^, and Juan M. Ortiz-de-Lazcano-Lobato^ ^ Department of Applied Mathematics, University

More information

Face Recognition by Combining Kernel Associative Memory and Gabor Transforms

Face Recognition by Combining Kernel Associative Memory and Gabor Transforms Face Recognition by Combining Kernel Associative Memory and Gabor Transforms Author Zhang, Bai-ling, Leung, Clement, Gao, Yongsheng Published 2006 Conference Title ICPR2006: 18th International Conference

More information

Fingerprint Deformation Models Using Minutiae Locations and Orientations

Fingerprint Deformation Models Using Minutiae Locations and Orientations Fingerprint Deformation Models Using Minutiae Locations and Orientations Yi Chen, Sarat Dass, Arun Ross, and Anil Jain Department of Computer Science and Engineering Michigan State University East Lansing,

More information

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav Abstract- Fingerprints have been used in identification of individuals for many years because of the famous fact that each

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and

More information

Region Segmentation for Facial Image Compression

Region Segmentation for Facial Image Compression Region Segmentation for Facial Image Compression Alexander Tropf and Douglas Chai Visual Information Processing Research Group School of Engineering and Mathematics, Edith Cowan University Perth, Australia

More information

Adaptive osculatory rational interpolation for image processing

Adaptive osculatory rational interpolation for image processing Journal of Computational and Applied Mathematics 195 (2006) 46 53 www.elsevier.com/locate/cam Adaptive osculatory rational interpolation for image processing Min Hu a, Jieqing Tan b, a College of Computer

More information

Exploring Similarity Measures for Biometric Databases

Exploring Similarity Measures for Biometric Databases Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently

More information

A Novel Adaptive Algorithm for Fingerprint Segmentation

A Novel Adaptive Algorithm for Fingerprint Segmentation A Novel Adaptive Algorithm for Fingerprint Segmentation Sen Wang Yang Sheng Wang National Lab of Pattern Recognition Institute of Automation Chinese Academ of Sciences 100080 P.O.Bo 78 Beijing P.R.China

More information

Implementation of Fingerprint Matching Algorithm

Implementation of Fingerprint Matching Algorithm RESEARCH ARTICLE International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar Apr 2016 Implementation of Fingerprint Matching Algorithm Atul Ganbawle 1, Prof J.A. Shaikh 2 Padmabhooshan

More information

Image Classification Using Wavelet Coefficients in Low-pass Bands

Image Classification Using Wavelet Coefficients in Low-pass Bands Proceedings of International Joint Conference on Neural Networks, Orlando, Florida, USA, August -7, 007 Image Classification Using Wavelet Coefficients in Low-pass Bands Weibao Zou, Member, IEEE, and Yan

More information

Robust color segmentation algorithms in illumination variation conditions

Robust color segmentation algorithms in illumination variation conditions 286 CHINESE OPTICS LETTERS / Vol. 8, No. / March 10, 2010 Robust color segmentation algorithms in illumination variation conditions Jinhui Lan ( ) and Kai Shen ( Department of Measurement and Control Technologies,

More information

Focal Point Detection Based on Half Concentric Lens Model for Singular Point Extraction in Fingerprint

Focal Point Detection Based on Half Concentric Lens Model for Singular Point Extraction in Fingerprint Focal Point Detection Based on Half Concentric Lens Model for Singular Point Extraction in Fingerprint Natthawat Boonchaiseree and Vutipong Areekul Kasetsart Signal & Image Processing Laboratory (KSIP

More information

Fingerprint Enhancement and Identification by Adaptive Directional Filtering

Fingerprint Enhancement and Identification by Adaptive Directional Filtering Fingerprint Enhancement and Identification by Adaptive Directional Filtering EE5359 MULTIMEDIA PROCESSING SPRING 2015 Under the guidance of Dr. K. R. Rao Presented by Vishwak R Tadisina ID:1001051048 EE5359

More information

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN

Face Recognition Using Vector Quantization Histogram and Support Vector Machine Classifier Rong-sheng LI, Fei-fei LEE *, Yan YAN and Qiu CHEN 2016 International Conference on Artificial Intelligence: Techniques and Applications (AITA 2016) ISBN: 978-1-60595-389-2 Face Recognition Using Vector Quantization Histogram and Support Vector Machine

More information

Implementation of the USB Token System for Fingerprint Verification

Implementation of the USB Token System for Fingerprint Verification Implementation of the USB Token System for Fingerprint Verification Daesung Moon, Youn Hee Gil, Sung Bum Pan, and Yongwha Chung Biometrics Technology Research Team, ETRI, Daejeon, Korea {daesung, yhgil,

More information

Logical Templates for Feature Extraction in Fingerprint Images

Logical Templates for Feature Extraction in Fingerprint Images Logical Templates for Feature Extraction in Fingerprint Images Bir Bhanu, Michael Boshra and Xuejun Tan Center for Research in Intelligent Systems University of Califomia, Riverside, CA 9252 1, USA Email:

More information

Color-Based Classification of Natural Rock Images Using Classifier Combinations

Color-Based Classification of Natural Rock Images Using Classifier Combinations Color-Based Classification of Natural Rock Images Using Classifier Combinations Leena Lepistö, Iivari Kunttu, and Ari Visa Tampere University of Technology, Institute of Signal Processing, P.O. Box 553,

More information

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization

A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Informatica 29 (2005) 335 341 335 A Very Low Bit Rate Image Compressor Using Transformed Classified Vector Quantization Hsien-Wen Tseng Department of Information Management Chaoyang University of Technology

More information

Fingerprint Recognition Using Gabor Filter And Frequency Domain Filtering

Fingerprint Recognition Using Gabor Filter And Frequency Domain Filtering IOSR Journal of Electronics and Communication Engineering (IOSRJECE) ISSN : 2278-2834 Volume 2, Issue 6 (Sep-Oct 2012), PP 17-21 Fingerprint Recognition Using Gabor Filter And Frequency Domain Filtering

More information

THREE DESCRIPTIONS OF SCALAR QUANTIZATION SYSTEM FOR EFFICIENT DATA TRANSMISSION

THREE DESCRIPTIONS OF SCALAR QUANTIZATION SYSTEM FOR EFFICIENT DATA TRANSMISSION THREE DESCRIPTIONS OF SCALAR QUANTIZATION SYSTEM FOR EFFICIENT DATA TRANSMISSION Hui Ting Teo and Mohd Fadzli bin Mohd Salleh School of Electrical and Electronic Engineering Universiti Sains Malaysia,

More information

Locating 1-D Bar Codes in DCT-Domain

Locating 1-D Bar Codes in DCT-Domain Edith Cowan University Research Online ECU Publications Pre. 2011 2006 Locating 1-D Bar Codes in DCT-Domain Alexander Tropf Edith Cowan University Douglas Chai Edith Cowan University 10.1109/ICASSP.2006.1660449

More information

A Study on the Effect of Codebook and CodeVector Size on Image Retrieval Using Vector Quantization

A Study on the Effect of Codebook and CodeVector Size on Image Retrieval Using Vector Quantization Computer Science and Engineering. 0; (): -7 DOI: 0. 593/j.computer.000.0 A Study on the Effect of Codebook and CodeVector Size on Image Retrieval Using Vector Quantization B. Janet *, A. V. Reddy Dept.

More information

Genetic Algorithm For Fingerprint Matching

Genetic Algorithm For Fingerprint Matching Genetic Algorithm For Fingerprint Matching B. POORNA Department Of Computer Applications, Dr.M.G.R.Educational And Research Institute, Maduravoyal, Chennai 600095,TamilNadu INDIA. Abstract:- An efficient

More information

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis 1 Xulin LONG, 1,* Qiang CHEN, 2 Xiaoya

More information