This is the published version:

Similar documents
Fingerprint Matching using Gabor Filters

FILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239)

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

Local Correlation-based Fingerprint Matching

Image Enhancement Techniques for Fingerprint Identification

Fingerprint Image Enhancement Algorithm and Performance Evaluation

Verifying Fingerprint Match by Local Correlation Methods

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Development of an Automated Fingerprint Verification System

Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Fingerprint Recognition System for Low Quality Images

Fingerprint matching using ridges

Fingerprint Verification applying Invariant Moments

Implementation of Fingerprint Matching Algorithm

Fingerprint Verification System using Minutiae Extraction Technique

A new approach to reference point location in fingerprint recognition

FINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio

An Approach to Demonstrate the Fallacies of Current Fingerprint Technology

AN EFFICIENT METHOD FOR FINGERPRINT RECOGNITION FOR NOISY IMAGES

Minutiae Based Fingerprint Authentication System

Final Project Report: Filterbank-Based Fingerprint Matching

Keywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav

Combined Fingerprint Minutiae Template Generation

Genetic Algorithm For Fingerprint Matching

Finger Print Enhancement Using Minutiae Based Algorithm

Fingerprint Deformation Models Using Minutiae Locations and Orientations

Fast and Robust Projective Matching for Fingerprints using Geometric Hashing

Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept

Distorted Fingerprint Verification System

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING

An introduction on several biometric modalities. Yuning Xu

Fingerprint Recognition

An Efficient Algorithm for Fingercode-Based Biometric Identification

Biometrics- Fingerprint Recognition

Encryption of Text Using Fingerprints

FINGERPRINT VERIFICATION BASED ON IMAGE PROCESSING SEGMENTATION USING AN ONION ALGORITHM OF COMPUTATIONAL GEOMETRY

Fingerprint matching using ridges

Fingerprint Recognition System

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

Secure Fingerprint Matching with External Registration

On-Line Fingerprint Verification

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved All Descriptor-Pair Matching

Verifying Fingerprint Match by Local Correlation Methods

Implementation of the USB Token System for Fingerprint Verification

Fingerprint Mosaicking by Rolling with Sliding

Image Stitching Using Partial Latent Fingerprints

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

FINGERPRINT RECOGNITION BASED ON SPECTRAL FEATURE EXTRACTION

Feature-level Fusion for Effective Palmprint Authentication

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Final Report Fingerprint Based User Authentication

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

Keywords: Fingerprint, Minutia, Thinning, Edge Detection, Ridge, Bifurcation. Classification: GJCST Classification: I.5.4, I.4.6

Indexing Fingerprints using Minutiae Quadruplets

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

Fingerprint minutiae extraction and matching for identification procedure

Touchless Fingerprint recognition using MATLAB

A hybrid ngerprint matcher

Fusion of Hand Geometry and Palmprint Biometrics

Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control

Minutia Cylinder-Code:

Texture Feature based Fingerprint Recognition for Low Quality Images

Fingerprint Mosaicking &

A New Pairing Method for Latent and Rolled Finger Prints Matching

Interim Report Fingerprint Authentication in an Embedded System

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Biometric Security Technique: A Review

CORE POINT DETECTION USING FINE ORIENTATION FIELD ESTIMATION

Fingerprint Recognition using Texture Features

Incorporating Image Quality in Multi-Algorithm Fingerprint Verification

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

Logical Templates for Feature Extraction in Fingerprint Images

Fingerprint Recognition Using Gabor Filter And Frequency Domain Filtering

Minutia Cylindrical Code Based Approach for Fingerprint Matching

Filterbank-Based Fingerprint Matching

Integrating Palmprint and Fingerprint for Identity Verification

Fingerprint Minutiae Matching Using Adjacent Feature Vector

Fingerprint Indexing using Minutiae and Pore Features

Peg-Free Hand Geometry Verification System

Fingerprint Enhancement and Identification by Adaptive Directional Filtering

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification

Available online at ScienceDirect. Procedia Computer Science 58 (2015 )

Fingerprint Classification Using Orientation Field Flow Curves

Multimodal Biometric Authentication using Face and Fingerprint

Biometric Fingerprint

PERFORMANCE IMPACT OF THE USER ATTEMPTS ON FINGERPRINT RECOGNITION SYSTEM (FRS)

Gender Specification Using Touch less Fingerprint Recognition

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Palmprint Recognition Using Transform Domain and Spatial Domain Techniques

An Efficient on-line Signature Verification System Using Histogram Features

Image Quality Measures for Fingerprint Image Enhancement

A Robust Fingerprint Matching System Using Orientation Features

Reference Point Detection for Arch Type Fingerprints

Smart Card and Biometrics Used for Secured Personal Identification System Development

Fingerprint Ridge Orientation Estimation Using A Modified Canny Edge Detection Mask

Transcription:

This is the published version: Youssif, A.A.A., Chowdhury, Morshed, Ray, Sid and Nafaa, H.Y. 2007, Fingerprint recognition system using hybrid matching techniques, in 6th IEEE/ACIS International Conference on Computer and Information Science : (ICIS 2007) in conjunction with 1st IEEE/ACIS International Workshop on e-activity (IWEA 2007) : proceedings : 11-13 July, 2007, Melbourne, Australia, IEEE Xplore, Piscataway, N.J., pp. 234-240. Available from Deakin Research Online: http://hdl.handle.net/10536/dro/du:30008045 2007 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. Copyright : 2007, IEEE

Fingerprint Recognition System Using Hybrid Matching Techniques Aliaa A.A. Youssif, Morshed U. Chowdhury, Sid Ray ± and Howida Youssry Nafaa Helwan University, Cairo, Egypt aliaay@helwan.edu.eg, howida_y@yahoo.com Deakin University, Melbourne, Australia muc@deakin.edu.au ± Monash University, Melbourne, Australia Sid.Ray@infotech.monash.edu.au Abstract With an increasing emphasis on the emerging automatic person identification application, biometrics based, especially fingerprint-based identification, is receiving a lot of attention. This research developed an Automatic Fingerprint Recognition System (AFRS) based on a hybrid between minutiae and correlation based techniques to represent and to match fingerprint; it improved each technique individually. It was noticed that, in the hybrid approach, as a result of an improvement of minutiae extraction algorithm in post-process phase that combines the two algorithms, the performance of the minutia algorithm improved. An improvement in the ridge algorithm that used centre point in fingerprint instead of reference point was also observed. Experiments indicate that the hybrid technique performs much better than each algorithm individually. Keywords: Biometrics, fingerprint matching, fingerprint identification, fingerprint verification, Feature Extraction. 1. Introduction There are two types of systems that help to automatically establish the identity of a person: (a) authentication (verification) systems, and (b) identification systems. In a verification (authentication) system [1, 2,3], a person desired to be identified submits a claim to an identity to the system, usually via a magnetic stripe card, login name, smart card etc., and the system either rejects or accepts the submitted claim of identity (am I who I claim to be?). In an identification system, the system establishes a subject s identity (or fails if the subject is not enrolled in the system database) without the subject having to claim an identity (who am I?) [4]. Any human physiological or behavioural characteristic can be used as a biometric characteristic for person identification as long as it satisfies the following requirements: (a) universality, which means that each person should have the characteristic, (b) uniqueness, which indicates that no two persons should be the same in terms of the characteristic, (c) permanence, which means that the characteristic should not be changeable, and (d) collectability, which indicates that the characteristic can be measured quantitatively [4,5]. Fingerprint matching techniques can be broadly divided in two categories, minutiae-based and correlation-based. Minutiae-based techniques attempt to align two sets of minutiae points from two fingerprints and count the total number of matched minutia. In the correlation-based approach, global patterns of ridges and furrows are compared to determine if the two fingerprints align. The performance of minutiae-based techniques relies on the accurate detection of minutiae points and the use of sophisticated matching techniques to compare two minutiae fields that undergo non-rigid transformations. The performance of correlation-based techniques is affected by non-linear distortions and noise present in the image. In general, it has been observed that minutiae-based techniques perform better than correlation-based ones [6, 7]. Jain et al. [3] have proposed a fingerprint representation scheme that makes use of both global and local features of a fingerprint in a compact fixed length feature vector termed FingerCode. This makes use of the texture features available in a fingerprint to compute the feature vector. Their scheme for generic representation of oriented texture relies on extracting a core point in the fingerprint. A circular region around the core point is located and tessellated into sectors. The pixel intensities in each sector are normalized to a constant mean and variance and filtered using a bank of 8 Gabor filters to produce a set of 8 filtered images. The FingerCode captures the local information, and the ordered enumeration of the tessellation captures the invariant global relationships among the local patterns. The matching stage simply computes the Euclidean distance between the two corresponding FingerCode values. The present paper proposed a hybrid Automatic Fingerprint Recognition System (Hybrid APRS) based on a combination of the minutae-based and correlation-based techniques.

The next section includes the structure of the proposed system. Experimental results are presented in Section 3. In Section 4 conclusions are drawn and in Section 5 a comment is made on future study. 2. The Structure of the Proposed Hybrid System The proposed system is represented briefly in the block diagram shown in Figure 1. It is based on a combination of ridge strengths at various orientations by a central point identification algorithm and a set of minutiae points by a proposed verification algorithm. The system is based mainly on two techniques. The first one adopts the minutia algorithm and the second adopts the ridge algorithm. Fingerprint Image Finger print Template Minutiae Input Minutiae Minutia Finger Code Template Finger Code Input Finger Feature Extraction Hybrid Matching Matching Result Figure1. Block diagram of the proposed Hybrid System 2.1. Feature Extraction with Minutiae Minutiae extraction may be affected by various kinds of noise. Generally the steps required in fingerprint extraction and matching are: pre-processing, minutiae extraction, post-processing, and matching. The algorithm in proposed system does not need the pre-processing step. The other steps are describe below. Minutiae Extraction: the algorithm used here is Rutovitz Crossing Number (CN) [8,10 ]. It applies: a. A thinning algorithm to convert grey images to skeleton images. b. The Rutovitz s definition of a crossing number for a pixel P given in Table 1, where P i, i=1,..8 are the pixel values in the neighbourhood. The neighbouring pixels are scanned in an anti-clockwise direction. c. The skeleton image of a fingerprint is scanned and all the minutiae are detected using the following definition of CN: 8 CN = 0.5 Pi Pi + 1, P9 = P (1) 1 i= 1 After the CN for a ridge pixel has been computed, the pixel can then be classified according to the property of its CN value. A ridge pixel with a CN of one corresponds to a ridge ending, and a CN of three corresponds to a bifurcation. For each extracted minutiae point, its crossing number (CN) is recorded as shown in Table 2. Table1. 3x3 Neighbourhood Table 2. The Crossing Number of P. P4 P3 P2 P5 P P1 P6 P7 P8 CN Property 0 Isolated point 1 Ending point 2 Connective point 3 Bifurcation point 4 Crossing point Post-processing: At this stage, a combination of two algorithms [9, 10], for minutiae validation, is used to enable detection of all false minutiae points and makes the final identification process more accurate. -1: This algorithm tests the validity of each minutiae point by scanning the skeleton image and examining the local neighbourhood around the point. The first step in the algorithm is to create an image M of size W W, where M corresponds to the W W neighbourhood centred on the candidate minutiae point in the skeleton image. The central pixel of M corresponds to the minutiae point in the skeleton image and so this pixel is labelled with a value of -1. The rest of the pixels in M are initialised to values of zero. The subsequent steps of the algorithm depend on whether the candidate minutiae point is a ridge ending or a bifurcation. 1. For a candidate ridge ending point: (i) Label with a value of 1 all the pixels in M, which are eight-connected with the ridge ending point. (ii) The next step is to count in a clockwise direction, the number of 0 to 1 transitions (T 01 ) along the border of image M. If T 01 = 1, then the candidate minutiae point is validated as a true ridge ending. 2. For a candidate bifurcation point: (a) Examine the eight neighbouring pixels surrounding the bifurcation point in a clockwise direction. For the three pixels that are connected with the bifurcation point, label them with the values of 1, 2, and 3, respectively. (b) The next step is to label the rest of the ridge pixels that are connected to these three connected pixels. This labelling is similar to the ridge ending approach; however, instead of labelling a single ridge branch, three ridge branches are now labelled. Let l = 1, 2 and 3 represent the label for each ridge branch. For each l, label with l all the ridge pixels that have a label of 0, and are connected to an l labelled pixel.

(c) Count in a clockwise direction, the number of transitions from 0 to 1 (T 01 ), 0 to 2 (T 02 ), and 0 to 3 (T 03 ) along the border of image M. If T 01 = 1 ^ T 02 = 1 ^ T 03 = 1, the candidate minutiae point is validated as a true bifurcation. -2: The initial minutiae set developed above is divided into two sets [9]. The first set is in S e that contains the initial endpoints. The second is S b that contains the initial bifurcation. (i) The First step: delete false endpoints resulting from broken ridge lines. Let P 1,P 2 S e,α ( P 1 ), α ( P 2 ) are directions of endpoints P 1, P 2 (ii) If the distance between P 1, P 2 is less than 2 D w and P 1, P 2 face each other, that is: Dist ( P1, P2 ) < 2 D (2) w Min ( α ( P1 ) α ( P2 ),2π α ( P1 ) α ( P2 ) ) < α (3) It can be said that P 1, P 2 are a pair of false endpoints resulting from a ridge break. P 1, P 2 must be deleted from S e. (iii) Then delete the false bifurcation, let P 1 S b. If there is an endpoint, P 1 S b, P 1 is connected with P 2, and the distance between P 1, P 2 is less than D w. It is said that the P 1 is false bifurcation and P 2 is false endpoint, delete P 1 from S b and P 2 from S e. (iv) Check if there are two bifurcations P 1, P 2 S b, while P 1 connects with P 2 and their distance less than D w. If it is true, then delete P 1 and P 2 from S b. The minutiae in set S e and S b are then combined leading to the final minutiae set. This set would be used for matching the template image and the input image. Minutiae Matching [9]: The matching of a fingerprint is based on the minutiae feature extracted in the post-processing described earlier. Each minutiae feature of a fingerprint image is described as: (TYPE, X, Y, DIREC) where TYPE represents the minutiae type with "1" for endpoint and "3" for bifurcation. X, Y indicates the position of the minutiae in the image. DIREC is the direction of this minutiae. 1. Two minutiae (S 1 from stored fingerprint and S 2 from test fingerprint) are said to be paired if their minutiae type are the same, their position and the direction are close since the fingerprints are taken in a fixed window and it is assumed that there are small translation and rotation. If f ' S 1, f '' S 2, and TYPE (f ') = TYPE (f ') DIST (f ', f '') D f ANGLE (f ', f '') A f (4) (5) (6) then (f ', f '') is a pair of matched minutiae feature. Here D f, A f are maximum tolerance for translation and rotation respectively. A f takes the value of π/6 and D f takes the value of 60. 2. Let S m be a set of matched pairs. Each elements in S m has the form, (f ' 1, f '' 1 ), where f ' 1 from S 1, f '' 1 from S 2. There are two constrains to S m.0 all f' 1 in S m, should be different, and all f '' 1 should be different too. This means that each minutiae in S 1 and in S 2 should not be matched more than once. 3. Also if (f' 1, f'' 1 ) and (f' 2, f'' 2 ) are the two element in S m. DIST ( f ' 1, f '' 1 ) - DIST ( f' 2, f '' 2 ) < ε (7) the value of ε is too small( it is assumed = 15). To match two fingerprints a set S max with the maximum number of paired minutiae features to be found. 4. Let N 1, N 2 be the number of elements in S 1 and S 2 respectively, N m the number of elements in S max. The similarity measure M between two fingerprint images is defined as: N m N m (8) N 1 N 2 2.2 Feature Extraction with Correlation The four main steps in our feature extraction algorithm are: (i) determine a centre point for the fingerprint image, (ii) tessellate the region around the centre point[3], (iii) filter the region of interest in eight different directions using a bank of Gabor filters (iv) compute the average absolute deviation from the mean (AAD)[3]. The first two steps are straightforward and the filtering process can be summarized as follows: Filtering: For all the pixels in sector S i, the normalized image is defined as: 2 VAR0 ( I ( i, M ) M 0 +, if I ( i, > M (9) (3) VAR g( i, = 2 VAR0 ( I ( i, M ) M 0, otherwise. (4) VAR where M 0 and V 0 are the desired mean and variance values, respectively. Normalization is a pixel wise operation which does not change the clarity of the ridge and valley structures. If normalization is performed on the entire image, then it cannot compensate for the intensity variations in different parts of the image due to the elastic nature of the finger. Separate normalization of each individual sector alleviates this problem. Feature Vector: 1- An even symmetric Gabor filter has the following general form in the spatial domain: h ( x, y ; f, θ ) = exp 2 2 1 x y cos( 2 ) 2 + f x 2 2 π δ x δ y (10) x = x sinθ + y cosθ, (11) y = x cosθ y sinθ (12) Let H indicate the enhanced image. Convolving H with the eight Gabor filters in the spatial domain would be a

computationally intensive operation. To speed-up this operation the convolution is performed in the frequency domain. Let F(H) denote the discrete Fourier transform of H, and let F( G θ ) indicate the discrete Fourier transform of the Gabor filter having the spatial orientation θ as described by equation(1). Then the Gabor filter image, V θ, may be obtained as, V θ = F 1 [ F( H ) F( G )] (13) θ where F -1 is the inverse Fourier transform. Eight filtered images are obtained in this way. Each V θ is used to construct a standard deviation image, Sθ, where Sθ (x, y) represents the standard deviation of the pixel intensities in a 16 16 neighbourhood of (x, y) in Vθ. The standard deviation map, S = {Sθ }, comprised of 8 images corresponding to the 8 filtered images. Thus, the standard deviation map, S, captures the variation in the ridge strength at various orientations. Each standard deviation image, Sθ, is then sampled at regular intervals (every 16th pixel) in both horizontal and vertical directions to obtain the ridge feature image, Rθ. The ridge feature map, R = {Rθ }, is composed of these 8 images. 2.2.1 Ridge Matching (i) Aligning Query and Template Images: For comparing the ridge feature maps of two images, it is necessary that the images themselves are aligned appropriately to ensure an overlap of common region in the two fingerprint images. This is done by determining the transformation parameters, (t x, t y, t φ ), that would align the query image with the template. Once the transformation parameters, (t x, t y, t φ ), are obtained, the query image can be aligned with the template. But rotating the query image will result in artifacts that may affect the subsequent filtering operation. To avoid this, appropriately rotated Gabor filters (which are also stored in the Gabor filter bank) are applied to the query image. The resulting filtered images are then rotated and feature values extracted. Let H represent the enhanced query image, and (t x, t y, t φ ) be the translation and rotation parameters obtained using the minutiae matching information. Then the filtered image, V θ ;t φ, is obtained as, V = 1 θ, t F F( H ) F( G ) φ θ tφ (14) The notation V θ, t φ is used to indicate that the filtered image corresponding to filter orientation θ - t φ was rotated through an angle t φ. The filtered image is then translated by (t x, t y ), to ensure that the tessellation of the query image would overlap with that of the template. (ii) Matching Scores: The ridge feature maps of the query and the template images are compared by computing the sum of the Euclidean distances of the 8-dimensional feature vectors in the corresponding tessellated cells. Cells that are marked as background are not used in the matching process. This results in a distance score measure; a higher distance score indicates a poor match. The distance score is normalized in the [0, 100] range, and converted to a similar score by simply subtracting it from 100. 2.3. Combining Matching Scores The matching scores generated by comparing the minutiae sets and the ridge feature maps are combined to generate a single matching score. There are three cases to generate a single matching score: 1. If the verification system detects a fingerprint image more than or equal to the threshold and the identification system detects the same fingerprint image we adopt the following sum rule. Let S M and S R indicate the similarity scores obtained using minutiae matching and ridge feature map matching, respectively. Then, the final matching score, S, is computed as[7], S = αs M + ( 1 α ) SR, where α [0, 1]. (15) 2. If the verification system detects a fingerprint image less than the threshold and the identification system detects the same fingerprint image we adopt the same sum rule equation [15]. 3. If the verification system detects fingerprint images more than or equal to the threshold and the identification system did not detect the same fingerprint image we use the following equation according to the result of verification. S = α S (16) M, 3. Experimental Results This research uses two databases to test a fingerprint matching system. The first one is an individual database and the second one is an identical twins database. Individual Database: This database is from the Biometric System Lab (University of Bologna - ITALY). It contains PC TIF files corresponding to 21 persons (8 impressions per person).the images are (256 256 256dpi) gray scale levels (21 8). The first part of the filename specifies the person and the second part specifies the item. Identical Twins Database The local database is collected from identical twins; a database of fingerprint impressions which is collected using ink for fingerprints and a scanner for scanning images. The

images are (240 240 256dpi) from 7 twins (2 7) each user provided 8 different impressions (7 8 2). There are some problems in collecting the second database: (i) The different age of the persons leads to a different size of the fingerprint (ii) some of the twins are children so there are scratches in the fingerprints (iii) some of them did not fully cooperate with the researchers, so most of the images of their fingerprints do not contain enough features to create an extraction. Identical Twins Database: This database uses different identical twins fingerprint impressions for the test system because they have the same class. So it is more difficult to identify the correct person. 1. Proposed Verification Matching. Table 4 shows the results for Xiao and Tico algorithms, and the proposed combined verification algorithm, for the identical twins algorithm. Experimental results are obtained for the following three algorithms: 1. Proposed verification matching which used two algorithms in the post-process phase, Xiao et al [9], and Tico[10] algorithms, 2. Central point identification matching, and 3. Hybrid matching which is a combination of previous two algorithms. Percent 105.00% 100.00% 95.00% 90.00% 85.00% Hybrid Fingerprint Matching All the above three algorithms are experimented using Individual Data base as well as Identical Twins Database. Individual Database: 1. Proposed Verification Matching : Table 3 shows the fingerprint verification matching using Xiao and Tico algorithms, separately in individual fingerprint database and after using the proposed combined verification fingerprint matching algorithm, corresponding to different threshold values. Table 3. Results of fingerprint verification system with hybrid minutiae point algorithm Threshold 0.15 0.2 0.25 0.3 Xiao 97.2 % 91.8 % 87.1 % 76.9 % Tico 97.2 % 93.1 % 86.3 % 77.5 % Proposed Verification 98.6 % 97.2 % 93.8 % 88.5 % 2. The Central Point Identification Matching : Acceptance rate 86.5 % (independent of threshold values). 3. Hybrid Matching : hybrid between two previous matching algorithms results in different thresholds. They are: 0.15, 0.2, 0.25 and 0.3. The corresponding matching rates are 99.3%, 99.3%, 97.9%, and 95.9% respectively. Figure 2 shows results obtained by 1. proposed verification algorithm, 2. central point algorithm and 3. proposed hybrid matching algorithm. 80.00% 0.15 0.2 0.25 0.3 cetral point alg. proposed Threshold alg. Hybrid matching algo. Figure 2.Result of proposed fingerprint matching system with verification and identification (note: identification has no effect with this threshold) Table 4. Result of fingerprint verification system with hybrid minutiae point algorithm for identical twins Xiao Tico Proposed Verification Threshold 0.25 0.3 0.35 0.4 98.9% 97.9% 89.8% 75.5% 98.9% 98.9 % 92.8% 82.6% 100 % 100 % 98.9% 96.9% 2. Central Point Identification Matching : Result of using central point identification matching algorithm. Acceptance rate: 87.7 % (independent of threshold values). 3. Hybrid Matching : The matching results were conducted by using hybrid matching in identical twins at different thresholds. Thresholds (0.25, 0.3, 0.35, and 0.4) it is matching results in Hybrid matching system are (100%, 100%, 98.5%, and 98.5%) respectively. Identical Twins Images The first twin, Ahmed and Amr, are in the twin loop class as shown in Figure 3. The second twin, Mustafa and

Mohamed, are in the twin loop class in a different subclass as shown in Figure 4. This technique recovers some disadvantage in previous work in which the edge of the image was a problem. 5. Future Work In future work, it is possible to find non-minutiae based alignment techniques that make use of orientation field and ridge feature map information to align image pairs. 6. References Figure3. Identical twins in twin loop class Figure4. Identical twin in twin loop class but in different sub class 4. Conclusion This research introduces an Automatic Fingerprint Recognition System (AFRS) based on hybrid techniques for matching. The results of this study indicated that the algorithm implemented in the AFRS is efficient and led to satisfactory results in using a hybrid fingerprint matching technique that combines minutiae information with the ridge feature map. Experiments indicated that the hybrid technique performs much better than each algorithm individually. [1] A.K. Jain, Y. Chen and M. Demirkus, "Pores and Ridges: High Resolution Fingerprint Matching Using Level 3 Features", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, No. 1, pp. 15-27, January 2007. [2] A. K. Jain, L. Hong, S. Pankanti, and Ruud Bolle, "An identity authentication system using fingerprints," Proceedings of the IEEE, Vol. 85, No. 9, pp. 1365-1388, 1997. [3] A. K. Jain, S. Prabhakar, L. Hong and S. Pankanti, "Filterbank-based Fingerprint Matching", IEEE Transactions on Image Processing, Vol. 9, No.5, pp. 846-859, May 2000. [4] S. Prabhakar, "Automatic Fingerprint Matching", PhD. Thesis, Department of Computer Science and Engineering, Michigan State University, East Lansing, 2001. [5] L. Hong, "Automatic Personal Identification Using Fingerprint ", PhD. Thesis, Department of Computer Science and Engineering, Michigan State University, East Lansing, 1998. [6] A. Ross, A. K. Jain, and J. Reisman, "A Hybrid Fingerprint Matcher", Pattern Recognition, Vol. 36, No. 7, pp. 1661-1673, 2003. [7] A. Ross, A. K. Jain. and J. Reisman, " A Hybrid Fingerprint Matcher", Proc. of International Conference on Pattern Recognition (ICPR), Vol.3, pp. 795-798, Quebec City, August 11-15, 2002. [8] Feng Zhao and Xiaoou Tang "Preprocessing For Skeleton-Based Fingerprint Minutiae Extraction", CISST 02 International Conference. [9] Xiao Sun and, Zhuming Ai "automatic feature extraction and recognition of fingerprint images" Proceedings of ICSP 1996, pp. 1086-1089. [10] Tico, M., and Kuosmanen, P. An algorithm for fingerprint image postprocessing.in Proceedings of the Thirty-Fourth Asilomar Conference onsignals, Systems and Computers (November 2000), vol. 2, pp. 1735 1739.