Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison
|
|
- Christopher Holmes
- 6 years ago
- Views:
Transcription
1 Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison Biagio Freni, Gian Luca Marcialis, and Fabio Roli University of Cagliari Department of Electrical and Electronic Engineering Piazza d Armi - I Cagliari (Italy) {biagio.freni,marcialis,roli}@diee.unica.it Abstract. Although the template fingerprint collected during the registration phase of personal verification systems can be considered in principle as representative of the subject identity, some recent works pointed out that it is not completely able to follow the intra-class variations of the fingerprint shape. Accordingly, making these systems adaptive to these variations is one of the most interesting problems, and is often called as the template updating problem. In this paper, two different approaches for fingerprint template updating are compared by experiments. The first one, already proposed in other works, relies on the concept of online template updating, that is, the fingerprint template is updated when the system is operating. As alternative, we propose the offline template update, which requires the collection of a representative batch of samples when the system is operating. They concur to the template updating when the system is offline, that is, it is not operating. Preliminary experiments carried out on the FVC data sets allow to point out some differences among the investigated approaches. 1 Introduction Fingerprints [1] are the most used and popular among the biometric traits, for personal identification and verification. Several approaches have been proposed to fingerprint matching. The best ones are based on the so-called minutiae, that is, the terminations and bifurcations of the ridge lines [1]. The core of these verification systems, which allow to obtain good verification results as shown in several works [1], is the collection of one or more samples of each user s fingerprint, in order to extract a representative template, that is, a representative set of minutiae of the given subject. This is often performed during the so-called registration phase, in which the user, under the supervision of a human expert, put his finger on the electronic scanner surface for his fingerprint acquisition. It is easy to notice that this phase is expensive, especially when more samples must be collected. Further, the will of cooperating of the subject is crucial. On the other hand, when the system is operating, a lot of fingerprint samples is captured, but, being out of a human expert supervision, they exhibit several differences. Moreover, intra-class variations of the fingerprint shape arise (due to F.J. Perales and R.B. Fisher (Eds.): AMDO 2008, LNCS 5098, pp , c Springer-Verlag Berlin Heidelberg 2008
2 442 B. Freni, G.L. Marcialis, and F. Roli scratches, increase of moisture or dryness, aging etc.), and the captured fingerprints can exhibit, over the time, minutiae sets different from that captured in the registration phase. Accordingly, recent works pointed out the need of making the current fingerprint verification systems adaptive to the above variations. This requirement can be realized by updating the template over the time [2,3,4]. We can currently subdivide the template update approaches in supervised and semi-supervised. The former [2] require, after a fixed period of time, a novel (supervised) registration phase in which fingerprint samples are collected. If necessary, the most representative samples among the collected ones can be selected. In [2], some clustering algorithms are proposed to this goal, as alternative to the manual selection. The latter introduce the concept of semi-supervised template updating. In other words, the additional fingerprint samples are collected and pseudo-labelled during the verification phase and are exploited to update the template. The concept of sample pseudo-labeling relies on the decision of the verification system, and not on the explicit intervention of the human expert, thus justifying the term semi-supervised template updating. Hence, the labeling, that is, the association of the identity to the sample, is performed automatically, without the human contribute, making the template update process cheaper and feasible over frequent periods of time. With regard to fingerprint template updating, methods in Refs. [3,4] try to update templates during the system operations. The claim is that these system can increase the reliability of templates without loss of time in additional registration phases. This can be realized by adopting algorithms aimed to the fusion of the input minutiae-set and the template minutiae-set. The output is a novel template, called supertemplate, which should be more representative than the original template. On the other hand, it is reasonable to hypothesise that, if a batch of unlabelled samples can be collected before updating, so increasing the centralization degree of the system, these samples could be exploited when the system is not operating. This approach can be called offline template update. In this paper, we compare online and offline approaches to fingerprint template updating by experiments on FVC2000 benchmark data sets [5]. Update is performed by adopting the fusion of minutiae-set proposed in [3] in order to generate a supertemplate, but also the use of multiple templates per client is investigated. Reported results allow to point out some interesting differences among the proposed methods. The paper is organized as follows. Section 2 describes the online and offline systems to fingerprint template updating. Section 3 reports some experimental results. Section 4 draw some preliminary conclusions. 2 Offline and Online Fingerprint Template Updating Let us consider a fingerprint verification system, with C enrolled users, also called clients. For each client c, only one template is initially stored. Thus, the related
3 Online and Offline Fingerprint Template Update Using Minutiae 443 gallery, T c, is made up of only one template. No limit to the size of T c is given in this paper, but it is worth noting that in real verification systems this size depends on the memory available and constraints in terms of verification time. Proposed method is shown in pseudo-code form by Algorithm 1 for online template update and Algorithm 2 for offline template update. In both algorithms, the boolean variable buildsupert emplate is true if the system is constrained to work with only one template per class. Thus, a supertemplate, i.e. a sort of average minutiae set from those of samples inserted into the client s gallery, must be builded. Our supertemplate generation algorithm is the same proposed in Ref. [3]. Algorithm 1 works as follows. As a novel fingerprint is submitted to the system, features are extracted in order to generate an input feature set x. Thissetis compared with the template set of the claimed identity c. As well-known, the result of this comparison is a matching score, usually a real value into [0, 1], which represents the degree of similarity among compared fingerprints. Function which outputs such a value is called meanscore(x, T c ) in Algorithm 1. If this matching score exceeds a threshold value such that the probability of being impostor is low enough, the related input can be fused with existing template or added to the client s gallery. In the second case, as the size of T c increases, multiple templates are available. Algorithm 1 stops according to a fixed criterion. This criterion depends on the particular context. For example, update can stop after a certain period of time is passed, or a certain number of verification attempts has been submitted, in order to test the system performance and monitor updated templates into each gallery. Algorithm 2 works similarly to the previous one, with the difference that it is offline, i.e. works on a batch of unlabelled samples collected during system operations. This leads to the fact that it is possible to select, for each client, the sample exhibiting the highest matching score for update, among the ones with probability of being impostors low enough (line 6). In our implementation of these algorithms: 1. Feature set x, and all templates in the union of clients galleries, namely, T, are represented by minutiae [1], which are terminations and bifurcations of fingerprint ridge lines. String algorithm has been implemented to match minutiae sets each others [1]. Further details can be found in [6]; 2. threshold has been set to 1%FAR operational point, in order to have a low probability (1%) of introducing impostors into the gallery. A more conservative threshold was at zerofar, but in practical cases it allows to introduce a significantly smaller number of genuine users, thus slowing the performance increase of template update; 3. threshold can be evaluated only on T, which is the only labelled set available for this aim. In principle, threshold should be updated at each insertion of novel samples, but this increases computational time of updating, and it is not statistically significant. Therefore, we have chosen to update threshold after that at least one sample has been submitted for all clients (see Algorithm 1-2, lines 2-3).
4 444 B. Freni, G.L. Marcialis, and F. Roli Algorithm 1. OnlineTemplateUpdate Require: { Let C be the number of clients Let M be the maximum number of template per client Let T c the template gallery of class c Let s = meanscore (x, T c ) be a function such that s is the average score of the input sample x on the template set T c Let buildsupert emplate be a boolean variable which is true if a supertemplate must be builded Let supert c = fuse(t c ) be a supertemplate building function} 1: repeat 2: T = ct c 3: Estimate threshold on T 4: for each client c =1..C do 5: x i {where i is an input sample claiming c-th identity} 6: s = meanscore(x, T c ) 7: if s>thresholdthen 8: if buildsupert emplate then 9: supert c = fuse(t c ) 10: T c = {supert c } 11: else 12: T c = T c {x} 13: end if 14: end if 15: end for 16: until (stop criterion is not met) 3 Experimental Results 3.1 Data Sets The FVC2000 data sets consist of four fingerprint databases (Db1-Db4) adopted for the Fingerprint Verification Competition held in 2000 [5]. Each one is made up of eight samples per 100 different fingers. The images of fingerprint impressions were collected with different sensors. In particular, the Db1 was acquired with a low-cost optical sensor (300x300 pixels), the Db2 with a low-cost capacitive sensor (256x364 pixels), the Db3 with another optical sensor (448x478 pixels) and for the Db4 a synthetic generator (240x320 pixels). It is worth noting that, due to the small number of samples per client, FVC data sets are not fully appropriate for this task. In fact, template update algorithms should be tested on data sets with large number of samples per client, possibly captured at different periods of time [4]. On the other hand, FVC data sets exhibit large intra-class variations, thus can be useful for assessing a preliminary evaluation of template update algorithms, as done in Ref. [3].
5 Online and Offline Fingerprint Template Update Using Minutiae 445 Algorithm 2. OfflineTemplateUpdate Require: { Let C be the number of clients Let M be the maximum number of template per client Let X c be the batch of unlabelled samples which claim to be the c-th client Let T c the template gallery of client c Let s = meanscore (x, T c ) be a function such that s is the average score of the input sample x on the template set T c Let buildsupert emplate be a boolean variable which is true if a supertemplate must be builded Let supert c = fuse(t c ) be a supertemplate building function} 1: repeat 2: T = ct c 3: Estimate threshold on T 4: for each client c =1..C do 5: X ct = {x X c meanscore(x, T c ) > threshold} 6: y = argmax x Xct meanscore(x, T c ) 7: T c = T c {y} 8: X c = X c {y} 9: end for 10: X t = cx ct 11: until (X t φ) 12: if buildsupert emplate then 13: for each client c =1..C do 14: supert c = fuse(t c ) 15: T c = {supert c } 16: end for 17: end if 3.2 Experimental Protocol We subdivided each data set in three partitions. The original labeled set is made up of one finger sample per subject. The set of unlabeled data is made up of six samples per subject and the test set, which we used for comparing the template updating approaches, is made up of one sample. We carried out seven experiments for each data set and averaged the results. In each experiment, the labeled set was always made up of the first sample, the test set was made up from the second to the eighth sample, and the unlabeled set was made up of the remaining six samples. In online experiments, for each client a sample has been randomly chosen from the unlabelled set, with equal prior for genuine and impostors classes (on average, six genuine and seven impostors have been submitted for each client). In offline experiments, for each client, the same seven impostors used in the related online experiment have been considered with the six genuine samples, in order to make comparable reported results.
6 446 B. Freni, G.L. Marcialis, and F. Roli 3.3 Results First of all, we performed a study on the quality of images in FVC data sets. To this aim, we applied the NFIQ quality evaluation algorithm proposed by NIST [7]. NFIQ classifies fingerprint images in five cateogories: Excellent, Very good, Good, Fair, Poor. In all cases, the majority of images fell in the first and second classes. This allowed to avoid the problem of image quality which could affect template update effectiveness [4], and to better focus on the pros and cons of investigated algorithms. Figures 1(a-d) show the ROC curves obtained on the FVC2000 test sets. For each plot, five curves are shown: 1) unimproved, which refers to the ROC curve obtained without template updating, 2) online multiple templates, related to Algorithm 1 in which the variable buildsupert emplate FALSE, 3) online supertemplate, where buildsupert emplate TRUE in Algorithm 1, 4) offline multiple templates related to Algorithm 2 in which the variable buildsupert emplate FALSE, 5) offline supertemplate, where buildsupertemplate TRUE in Algorithm 2. It is easy to see that all template update approaches have been effective with respect to the unimproved system. By comparing offline curves each others, as well as online ones, it can be noticed that using multiple templates approach led to a better result than adopting a supertemplate, with the exception of FVC2000-Db4 data set. This can be explained as follows: (1) the minutiae sets fusion was dependent on the matching algorithm - String in this case. Finding a good alignment is an open issue, but it can be hypothesised that template update results can be improved; (2) performing fusion of templates smoothed the intra-class variations among them. In general, it is expected that using multiple templates is better than using only one (super)template. The exception of FVC2000-Db4 can be explained by hypothesising that intra-class variations were less evident in this data set, thus supertemplate avoided the redundancy of multiple templates. Some interesting findings can be noticed by comparing online and offline algorithms each others. In the case of offline vs. online using supertemplate, the performance was quite similar, with a small superiority of the online approach. This result is remarkable, and points out a clear advantage of these approaches with respect to offline ones. Things appear to change by considering online vs. offline using multiple templates. However, a clear superiority of the offline method appeared only for FVC2000-Db1 and Db2, whilst in the other ones online approach exhibited a better performance. This result and the previous one motivate further investigations on online and offline template update approaches. 3.4 Discussion on Results Comparison of online and offline approaches must be done by considering: Performance achieved (ROC curves) Centralization degree of the system
7 Online and Offline Fingerprint Template Update Using Minutiae 447 Memory available in smart cards or other supports embedding the personal information of each client Managing classification errors during update In our opinion, the first requirement helps in evaluating the second one, whilst the third one can be referred to the particular technology adopted. In fact, offline methods require that the centralized part of the system must capture, and store, over the time, a large number of queries. The template update process can be clearly separated from the verification phase. Using offline approaches derives from the hypothesis that the more samples are available, the more selective the template updating is (Algorithm 2). However, reported results showed that centralization is not always necessary. Online approaches, which decrease the centralization degree of the system (since the update is performed at once), have shown to be effective on the adopted data sets, and exhibit a verification accuracy in some cases superior than that of offline approaches. FVC2000Db1a UPDATE FVC2000Db2a UPDATE unimproved online super template online multiple templates offline super template offline multiple templates unimproved online super template online multiple templates offline super template offline multiple templates FRR FRR FAR (a) FVC2000Db FAR (b) FVC2000Db2 FVC2000Db3a UPDATE FVC2000Db4a UPDATE unimproved online super template online multiple templates offline super template offline multiple templates unimproved online super template online multiple templates offline super template offline multiple templates FRR FRR FAR (c) FVC2000Db3 FAR (d) FVC2000Db4 Fig. 1. ROC Curve of the offline and online algorithms on the four dataset FVC2000
8 448 B. Freni, G.L. Marcialis, and F. Roli A different problem is given by the choice of using multiple templates or a supertemplate. This is strongly dependent on the available technology (third item), and cannot be treated in this paper. Adopted algorithms do not take into account memory or verification time limitations, but this is a topic to be investigated. The fourth item brings to a still open issue. In particular, how do classification errors (i.e. impostors with score higher than threshold) impact on the obtained galleries of templates when performing update? How much large are the security breatches caused by classification errors? This is a clear problem for current template update algorithms, especially for online ones. No solutions have been proposed so far. The common guideline is to set threshold high enough to reduce this problem. At current state of our knowledge, the human intervention should be taken into account in order to monitor the obtained galleries over certain periods of time. 4 Conclusions In this paper, we started to investigate the differences of online and offline approaches to fingerprint template update in personal verification systems. This preliminary experimentation has been performed on FVC2000 data sets, which are not fully suitable for the task, but have been already adopted for template update algorithms evaluation. Their images exhibit a high quality on average, thus help in studying the template update effectiveness under the hypothesis of cooperative user population. It has been found that performance of offline and online approaches are comparable in some cases. In other cases, online approaches performed better than offline ones. This is a quite surprising result which is worthy to be better investigated in future works. References 1. Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of fingerprint recognition. Springer, Heidelberg (2003) 2. Uludag, U., Ross, A., Jain, A.K.: Biometric template selection and update: a case study in fingerprints. Pattern Recognition 37(7), (2004) 3. Jiang, X., Ser, W.: Online Fingerprint Template Improvement. IEEE Transactions on Pattern Analysis and Machine Intelligence 24(8), (2002) 4. Ryu, C., Kim, H., Jain, A.K.: Template Adaptation based Fingerprint Verification. In: 18th ICPR 2006, vol. 4, pp IEEE Computer Society, Los Alamitos (2006) Jain, A.K., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(4), (1997) 7. Tabassi, E., Wilson, C.L., Watson, C.I.: Fingerprint image quality, NIST Technical Report NISTIR 7151 (August 2004)
Fingerprint verification by decision-level fusion of optical and capacitive sensors
Fingerprint verification by decision-level fusion of optical and capacitive sensors Gian Luca Marcialis and Fabio Roli Department of Electrical and Electronic Engineering University of Cagliari Piazza
More informationAnalysis and Selection of Features for the Fingerprint Vitality Detection
Analysis and Selection of Features for the Fingerprint Vitality Detection Pietro Coli, Gian Luca Marcialis, and Fabio Roli Department of Electrical and Electronic Engineering University of Cagliari Piazza
More informationSemi-Supervised PCA-based Face Recognition Using Self-Training
Semi-Supervised PCA-based Face Recognition Using Self-Training Fabio Roli and Gian Luca Marcialis Dept. of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi, 09123 Cagliari, Italy
More informationOutline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience
Incorporating Biometric Quality In Multi-Biometrics FUSION QUALITY Julian Fierrez-Aguilar, Javier Ortega-Garcia Biometrics Research Lab. - ATVS Universidad Autónoma de Madrid, SPAIN Loris Nanni, Raffaele
More informationPoisoning Adaptive Biometric Systems
Poisoning Adaptive Biometric Systems Battista Biggio, Giorgio Fumera, Fabio Roli, and Luca Didaci Department of Electrical and Electronic Engineering, University of Cagliari Piazza d Armi 923, Cagliari,
More informationBIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition
BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition Hiren D. Joshi Phd, Dept. of Computer Science Rollwala Computer Centre
More informationIncorporating Image Quality in Multi-Algorithm Fingerprint Verification
Incorporating Image Quality in Multi-Algorithm Fingerprint Verification Julian Fierrez-Aguilar 1, Yi Chen 2, Javier Ortega-Garcia 1, and Anil K. Jain 2 1 ATVS, Escuela Politecnica Superior, Universidad
More informationFVC2004: Third Fingerprint Verification Competition
FVC2004: Third Fingerprint Verification Competition D. Maio 1, D. Maltoni 1, R. Cappelli 1, J.L. Wayman 2, A.K. Jain 3 1 Biometric System Lab - DEIS, University of Bologna, via Sacchi 3, 47023 Cesena -
More informationLatent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints
Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints Jianjiang Feng, Soweon Yoon, and Anil K. Jain Department of Computer Science and Engineering Michigan State University {jfeng,yoonsowo,jain}@cse.msu.edu
More informationReducing FMR of Fingerprint Verification by Using the Partial Band of Similarity
Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity Seung-Hoon Chae 1,Chang-Ho Seo 2, Yongwha Chung 3, and Sung Bum Pan 4,* 1 Dept. of Information and Communication Engineering,
More informationMultimodal Anti-Spoofing in Biometric Recognition Systems
Multimodal Anti-Spoofing in Biometric Recognition Systems Giorgio Fumera, Gian Luca Marcialis, Battista Biggio, Fabio Roli and Stephanie Caswell Schuckers Abstract While multimodal biometric systems were
More informationFingerprint Indexing using Minutiae and Pore Features
Fingerprint Indexing using Minutiae and Pore Features R. Singh 1, M. Vatsa 1, and A. Noore 2 1 IIIT Delhi, India, {rsingh, mayank}iiitd.ac.in 2 West Virginia University, Morgantown, USA, afzel.noore@mail.wvu.edu
More informationISSN Vol.04,Issue.08, July-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.08, July-2016, Pages:1504-1510 Detection and Rectification of Distorted Fingerprints S. SOFIA SULTANA 1, P. D. CHIDHAMBARA RAO 2 1 PG Scholar, Dept of CSE, Kottam
More informationImproving Hand-Based Verification Through Online Finger Template Update Based on Fused Confidences
Improving Hand-Based Verification Through Online Finger Template Update Based on Fused Confidences Gholamreza Amayeh, George Bebis and Mircea Nicolescu {amayeh, bebis, mircea}@cse.unr.edu Computer Vision
More informationISSN Vol.04,Issue.15, October-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.15, October-2016, Pages:2901-2907 Detection and Rectification of Distorted Fingerprints P.MOUNIKA 1, S. RAJESHWAR 2 1 PG Scholar, Dept of CSE(SE), Arjun College
More informationLocal Correlation-based Fingerprint Matching
Local Correlation-based Fingerprint Matching Karthik Nandakumar Department of Computer Science and Engineering Michigan State University, MI 48824, U.S.A. nandakum@cse.msu.edu Anil K. Jain Department of
More informationEfficient Rectification of Malformation Fingerprints
Efficient Rectification of Malformation Fingerprints Ms.Sarita Singh MCA 3 rd Year, II Sem, CMR College of Engineering & Technology, Hyderabad. ABSTRACT: Elastic distortion of fingerprints is one of the
More informationDEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION. Ani1 K. Jain and Nicolae Duta
DEFORMABLE MATCHING OF HAND SHAPES FOR USER VERIFICATION Ani1 K. Jain and Nicolae Duta Department of Computer Science and Engineering Michigan State University, East Lansing, MI 48824-1026, USA E-mail:
More informationIndexing Fingerprints using Minutiae Quadruplets
Indexing Fingerprints using Minutiae Quadruplets Ogechukwu Iloanusi University of Nigeria, Nsukka oniloanusi@gmail.com Aglika Gyaourova and Arun Ross West Virginia University http://www.csee.wvu.edu/~ross
More informationDevelopment of an Automated Fingerprint Verification System
Development of an Automated Development of an Automated Fingerprint Verification System Fingerprint Verification System Martin Saveski 18 May 2010 Introduction Biometrics the use of distinctive anatomical
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Fingerprint Recognition using Robust Local Features Madhuri and
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationCHAPTER 6 RESULTS AND DISCUSSIONS
151 CHAPTER 6 RESULTS AND DISCUSSIONS In this chapter the performance of the personal identification system on the PolyU database is presented. The database for both Palmprint and Finger Knuckle Print
More informationOn the relation between biometric quality and user-dependent score distributions in fingerprint verification
On the relation between biometric quality and user-dependent score distributions in fingerprint verification Fernando Alonso-Fernandez a, Raymond N. J. Veldhuis b, Asker M. Bazen b Julian Fierrez-Aguilar
More informationUsing Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification
Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification Abstract Praveer Mansukhani, Sergey Tulyakov, Venu Govindaraju Center for Unified Biometrics and Sensors
More informationUtilization of Matching Score Vector Similarity Measures in Biometric Systems
Utilization of Matching Se Vector Similarity Measures in Biometric Systems Xi Cheng, Sergey Tulyakov, and Venu Govindaraju Center for Unified Biometrics and Sensors University at Buffalo, NY, USA xicheng,tulyakov,govind@buffalo.edu
More informationFINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION
International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION
More informationComparison of ROC-based and likelihood methods for fingerprint verification
Comparison of ROC-based and likelihood methods for fingerprint verification Sargur Srihari, Harish Srinivasan, Matthew Beal, Prasad Phatak and Gang Fang Department of Computer Science and Engineering University
More informationFingerprint Deformation Models Using Minutiae Locations and Orientations
Fingerprint Deformation Models Using Minutiae Locations and Orientations Yi Chen, Sarat Dass, Arun Ross, and Anil Jain Department of Computer Science and Engineering Michigan State University East Lansing,
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Minutiae Points Extraction using Biometric Fingerprint- Enhancement Vishal Wagh 1, Shefali Sonavane 2 1 Computer Science and Engineering Department, Walchand College of Engineering, Sangli, Maharashtra-416415,
More informationDetecting Fingerprint Distortion from a Single Image
Detecting Fingerprint Distortion from a Single Image Xuanbin Si, Jianjiang Feng, Jie Zhou Department of Automation, Tsinghua University Beijing 100084, China sixb10@mails.tsinghua.edu.cn {jfeng, jzhou}@tsinghua.edu.cn
More informationA Framework for Efficient Fingerprint Identification using a Minutiae Tree
A Framework for Efficient Fingerprint Identification using a Minutiae Tree Praveer Mansukhani February 22, 2008 Problem Statement Developing a real-time scalable minutiae-based indexing system using a
More informationExploring Similarity Measures for Biometric Databases
Exploring Similarity Measures for Biometric Databases Praveer Mansukhani, Venu Govindaraju Center for Unified Biometrics and Sensors (CUBS) University at Buffalo {pdm5, govind}@buffalo.edu Abstract. Currently
More informationReference Point Detection for Arch Type Fingerprints
Reference Point Detection for Arch Type Fingerprints H.K. Lam 1, Z. Hou 1, W.Y. Yau 1, T.P. Chen 1, J. Li 2, and K.Y. Sim 2 1 Computer Vision and Image Understanding Department Institute for Infocomm Research,
More informationComputer Vision and Image Understanding
Computer Vision and Image Understanding 113 (2009) 979 992 Contents lists available at ScienceDirect Computer Vision and Image Understanding journal homepage: www.elsevier.com/locate/cviu Minutiae-based
More informationFingerprint Matching using Gabor Filters
Fingerprint Matching using Gabor Filters Muhammad Umer Munir and Dr. Muhammad Younas Javed College of Electrical and Mechanical Engineering, National University of Sciences and Technology Rawalpindi, Pakistan.
More informationBiometric quality for error suppression
Biometric quality for error suppression Elham Tabassi NIST 22 July 2010 1 outline - Why measure quality? - What is meant by quality? - What are they good for? - What are the challenges in quality computation?
More informationMinutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationREINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM
REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM 1 S.Asha, 2 T.Sabhanayagam 1 Lecturer, Department of Computer science and Engineering, Aarupadai veedu institute of
More informationQuality of biometric data: definition and validation of metrics. Christophe Charrier GREYC - Caen, France
Quality of biometric data: definition and validation of metrics Christophe Charrier GREYC - Caen, France 1 GREYC Research Lab Le pôle TES et le sans-contact Caen 2 3 Introduction Introduction Quality of
More informationA new approach to reference point location in fingerprint recognition
A new approach to reference point location in fingerprint recognition Piotr Porwik a) and Lukasz Wieclaw b) Institute of Informatics, Silesian University 41 200 Sosnowiec ul. Bedzinska 39, Poland a) porwik@us.edu.pl
More informationGround truth and evaluation for latent fingerprint matching
Ground truth and evaluation for latent fingerprint matching Anna Mikaelyan and Josef Bigun Halmstad University SE-0118 Halmstad {anna.mikaelyan,josef.bigun}@hh.se Abstract In forensic fingerprint studies
More informationVerifying Fingerprint Match by Local Correlation Methods
Verifying Fingerprint Match by Local Correlation Methods Jiang Li, Sergey Tulyakov and Venu Govindaraju Abstract Most fingerprint matching algorithms are based on finding correspondences between minutiae
More informationQuality Based Rank-Level Fusion in Multibiometric Systems
Quality Based -Level Fusion in Multibiometric Systems Ayman Abaza and Arun Ross Abstract Multibiometric systems fuse evidences from multiple biometric sources typically resulting in better recognition
More informationAvailable online at ScienceDirect. Procedia Computer Science 58 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 58 (2015 ) 552 557 Second International Symposium on Computer Vision and the Internet (VisionNet 15) Fingerprint Recognition
More informationPalmprint Indexing Based on Ridge Features
Palmprint Indexing Based on Ridge Features Xiao Yang, Jianjiang Feng, Jie Zhou Department of Automation Tsinghua University, Beijing, China xiao-yang09@mails.tsinghua.edu.cn, jfeng@tsinghua.edu.cn, jzhou@tsinghua.edu.cn
More informationA New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features
A New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features R.Josphineleela a, M.Ramakrishnan b And Gunasekaran c a Department of information technology, Panimalar
More informationGraph Matching Iris Image Blocks with Local Binary Pattern
Graph Matching Iris Image Blocs with Local Binary Pattern Zhenan Sun, Tieniu Tan, and Xianchao Qiu Center for Biometrics and Security Research, National Laboratory of Pattern Recognition, Institute of
More informationFingerprint Image Enhancement Algorithm and Performance Evaluation
Fingerprint Image Enhancement Algorithm and Performance Evaluation Naja M I, Rajesh R M Tech Student, College of Engineering, Perumon, Perinad, Kerala, India Project Manager, NEST GROUP, Techno Park, TVM,
More informationAN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE
AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE sbsridevi89@gmail.com 287 ABSTRACT Fingerprint identification is the most prominent method of biometric
More informationFilterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah
Filterbank-Based Fingerprint Matching Multimedia Systems Project Niveditha Amarnath Samir Shah Presentation overview Introduction Background Algorithm Limitations and Improvements Conclusions and future
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationBiometrics- Fingerprint Recognition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 11 (2014), pp. 1097-1102 International Research Publications House http://www. irphouse.com Biometrics- Fingerprint
More informationSecure Fingerprint Matching with External Registration
Secure Fingerprint Matching with External Registration James Reisman 1, Umut Uludag 2, and Arun Ross 3 1 Siemens Corporate Research, 755 College Road East, Princeton, NJ, 08540 james.reisman@siemens.com
More informationImproving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications
Improving Personal Identification Accuracy Using Multisensor Fusion for Building Access Control Applications Lisa Osadciw, Pramod Varshney, and Kalyan Veeramachaneni laosadci,varshney,kveerama@syr.edu
More informationImplementation of the USB Token System for Fingerprint Verification
Implementation of the USB Token System for Fingerprint Verification Daesung Moon, Youn Hee Gil, Sung Bum Pan, and Yongwha Chung Biometrics Technology Research Team, ETRI, Daejeon, Korea {daesung, yhgil,
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationExploiting the Doddington Zoo Effect in Biometric Fusion
Exploiting the Doddington Zoo Effect in Biometric Fusion Arun Ross, Ajita Rattani, Massimo Tistarelli Abstract Recent research in biometrics has suggested the existence of the Biometric Menagerie in which
More informationA Full Analytical Review on Fingerprint Recognition using Neural Networks
e t International Journal on Emerging Technologies (Special Issue on RTIESTM-2016) 7(1): 45-49(2016) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 A Full Analytical Review on Fingerprint Recognition
More informationFingerprint matching using ridges
Fingerprint matching using ridges Jianjiang Feng a, *, Zhengyu Ouyang a, and Anni Cai a a Beijing University of Posts and Telecommunications, Box 113, Beijing, 100876, P. R. China *Corresponding author.
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationCall for participation. FVC2004: Fingerprint Verification Competition 2004
Call for participation FVC2004: Fingerprint Verification Competition 2004 WEB SITE: http://bias.csr.unibo.it/fvc2004/ The Biometric System Lab (University of Bologna), the Pattern Recognition and Image
More informationUser Identification by Hierarchical Fingerprint and Palmprint Matching
User Identification by Hierarchical Fingerprint and Palmprint Matching Annapoorani D #1, Caroline Viola Stella Mary M *2 # PG Scholar, Department of Information Technology, * Prof. and HOD, Department
More informationK-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion
K-Nearest Neighbor Classification Approach for Face and Fingerprint at Feature Level Fusion Dhriti PEC University of Technology Chandigarh India Manvjeet Kaur PEC University of Technology Chandigarh India
More informationAN EFFICIENT METHOD FOR FINGERPRINT RECOGNITION FOR NOISY IMAGES
International Journal of Computer Science and Communication Vol. 3, No. 1, January-June 2012, pp. 113-117 AN EFFICIENT METHOD FOR FINGERPRINT RECOGNITION FOR NOISY IMAGES Vijay V. Chaudhary 1 and S.R.
More informationFingerprint Authentication for SIS-based Healthcare Systems
Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it
More informationFAST FINGERPRINT IMAGE SYNTHESIS
FAST FINGERPRINT IMAGE SYNTHESIS Andrej Kisel Vilnius University, Faculty of Mathematics and Informatics, Department of Computer Science II, Naugarduko 24 Vilnius LT-03225 Lithuania, kisel.andrej@gmail.com
More informationFingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav
Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav Abstract- Fingerprints have been used in identification of individuals for many years because of the famous fact that each
More informationMultimodal Biometric Authentication using Face and Fingerprint
IJIRST National Conference on Networks, Intelligence and Computing Systems March 2017 Multimodal Biometric Authentication using Face and Fingerprint Gayathri. R 1 Viji. A 2 1 M.E Student 2 Teaching Fellow
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More informationParallel versus Serial Classifier Combination for Multibiometric Hand-Based Identification
A. Uhl and P. Wild. Parallel versus Serial Classifier Combination for Multibiometric Hand-Based Identification. In M. Tistarelli and M. Nixon, editors, Proceedings of the 3rd International Conference on
More informationFingerprint Mosaicking by Rolling with Sliding
Fingerprint Mosaicking by Rolling with Sliding Kyoungtaek Choi, Hunjae Park, Hee-seung Choi and Jaihie Kim Department of Electrical and Electronic Engineering,Yonsei University Biometrics Engineering Research
More informationCHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM
109 CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM Security is considered to be the most critical factor in many applications. The main issues of such
More informationUjma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved
Generate new identity from fingerprints for privacy protection Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India Abstract : We propose here a novel system
More informationAutomatic Fingerprints Image Generation Using Evolutionary Algorithm
Automatic Fingerprints Image Generation Using Evolutionary Algorithm Ung-Keun Cho, Jin-Hyuk Hong, and Sung-Bae Cho Dept. of Computer Science, Yonsei University Biometrics Engineering Research Center 134
More informationCHAPTER 2 LITERATURE REVIEW
9 CHAPTER 2 LITERATURE REVIEW 2.1 INTRODUCTION In this chapter the literature available within the purview of the objectives of the present study is reviewed and the need for the proposed work is discussed.
More informationFig. 1 Verification vs. Identification
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Classification
More informationFingerprint Retrieval Based on Database Clustering
Fingerprint Retrieval Based on Database Clustering Liu Manhua School of Electrical & Electronic Engineering A thesis submitted to the Nanyang Technological University in fulfillment of the requirements
More informationFeature-level Fusion for Effective Palmprint Authentication
Feature-level Fusion for Effective Palmprint Authentication Adams Wai-Kin Kong 1, 2 and David Zhang 1 1 Biometric Research Center, Department of Computing The Hong Kong Polytechnic University, Kowloon,
More informationSIGNIFICANT improvements in fingerprint recognition
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 15, NO. 3, MARCH 2006 767 A New Algorithm for Distorted Fingerprints Matching Based on Normalized Fuzzy Similarity Measure Xinjian Chen, Jie Tian, Senior Member,
More informationImplementation of Fingerprint Matching Algorithm
RESEARCH ARTICLE International Journal of Engineering and Techniques - Volume 2 Issue 2, Mar Apr 2016 Implementation of Fingerprint Matching Algorithm Atul Ganbawle 1, Prof J.A. Shaikh 2 Padmabhooshan
More informationPolar Harmonic Transform for Fingerprint Recognition
International Journal Of Engineering Research And Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 11 (November 2017), PP.50-55 Polar Harmonic Transform for Fingerprint
More informationTemplate Ageing in non-minutiae Fingerprint Recognition
Template Ageing in non-minutiae Fingerprint Recognition Simon Kirchgasser and Andreas Uhl Department of Computer Sciences University of Salzburg Jakob-Haringer-Str. 2 5020 Salzburg, AUSTRIA e-mail: skirch,uhl@cosy.sbg.ac.at
More informationFast and Robust Projective Matching for Fingerprints using Geometric Hashing
Fast and Robust Projective Matching for Fingerprints using Geometric Hashing Rintu Boro Sumantra Dutta Roy Department of Electrical Engineering, IIT Bombay, Powai, Mumbai - 400 076, INDIA {rintu, sumantra}@ee.iitb.ac.in
More informationFirst International Fingerprint Liveness Detection Competition LivDet 2009 *
First International Fingerprint Liveness Detection Competition LivDet 2009 * Gian Luca Marcialis 1, Aaron Lewicke 2, Bozhao Tan 2, Pietro Coli 1, Dominic Grimberg 2, Alberto Congiu 1, Alessandra Tidu 1,
More informationLocal Feature Extraction in Fingerprints by Complex Filtering
Local Feature Extraction in Fingerprints by Complex Filtering H. Fronthaler, K. Kollreider, and J. Bigun Halmstad University, SE-30118, Sweden {hartwig.fronthaler, klaus.kollreider, josef.bigun}@ide.hh.se
More informationClassification of Fingerprint Images
Classification of Fingerprint Images Lin Hong and Anil Jain Department of Computer Science, Michigan State University, East Lansing, MI 48824 fhonglin,jaing@cps.msu.edu Abstract Automatic fingerprint identification
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationFocal Point Detection Based on Half Concentric Lens Model for Singular Point Extraction in Fingerprint
Focal Point Detection Based on Half Concentric Lens Model for Singular Point Extraction in Fingerprint Natthawat Boonchaiseree and Vutipong Areekul Kasetsart Signal & Image Processing Laboratory (KSIP
More informationKeywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A novel approach
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationRotation Invariant Finger Vein Recognition *
Rotation Invariant Finger Vein Recognition * Shaohua Pang, Yilong Yin **, Gongping Yang, and Yanan Li School of Computer Science and Technology, Shandong University, Jinan, China pangshaohua11271987@126.com,
More informationLogical Templates for Feature Extraction in Fingerprint Images
Logical Templates for Feature Extraction in Fingerprint Images Bir Bhanu, Michael Boshra and Xuejun Tan Center for Research in Intelligent Systems University of Califomia, Riverside, CA 9252 1, USA Email:
More informationFingerprint Identification System Based On Neural Network
Fingerprint Identification System Based On Neural Network Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI & Embedded Systems), Vishwabharati Academy s College of Engineering, Ahmednagar (MS), India
More informationComputationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms
Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms Andreas Uhl Department of Computer Sciences University of Salzburg, Austria uhl@cosy.sbg.ac.at
More informationAutomatic Fingerprints Image Generation Using Evolutionary Algorithm
Automatic Fingerprints Image Generation Using Evolutionary Algorithm Ung-Keun Cho, Jin-Hyuk Hong, and Sung-Bae Cho Dept. of Computer Science, Yonsei University Biometrics Engineering Research Center 134
More informationFingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask
Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask Laurice Phillips PhD student laurice.phillips@utt.edu.tt Margaret Bernard Senior Lecturer and Head of Department Margaret.Bernard@sta.uwi.edu
More informationFusion of Iris and Retina Using Rank-Level Fusion Approach
Fusion of and Using Rank-Level Fusion Approach A. Kavitha Research Scholar PSGR Krishnammal College for Women Bharathiar University Coimbatore Tamilnadu India kavivks@gmail.com N. Radha Assistant Professor
More informationFINGERPRINT RECOGNITION BASED ON SPECTRAL FEATURE EXTRACTION
FINGERPRINT RECOGNITION BASED ON SPECTRAL FEATURE EXTRACTION Nadder Hamdy, Magdy Saeb 2, Ramy Zewail, and Ahmed Seif Arab Academy for Science, Technology & Maritime Transport School of Engineering,. Electronics
More information