FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1 S.A.Imam 2

Similar documents
FINGERPRINT BASED LICENSE CHECKING FOR AUTO-MOBILES J.Angeline Rubella, M.Suganya 1, K.Senathipathi, 2 B.Santhosh Kumar, K.R.Gowdham, M.

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

A New Pairing Method for Latent and Rolled Finger Prints Matching

BIOMET: A Multimodal Biometric Authentication System for Person Identification and Verification using Fingerprint and Face Recognition

Development of an Automated Fingerprint Verification System

Finger Print Enhancement Using Minutiae Based Algorithm

Minutiae Based Fingerprint Authentication System

Implementation of Fingerprint Matching Algorithm

PCA AND CENSUS TRANSFORM BASED FINGERPRINT RECOGNITION WITH HIGH ACCEPTANCE RATIO

User Identification by Hierarchical Fingerprint and Palmprint Matching

Biometric Security Roles & Resources

CHAPTER 2 LITERATURE REVIEW

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

Fingerprint Recognition using Fuzzy based image Enhancement

Latent Fingerprint Matching: Fusion of Rolled and Plain Fingerprints

Extract from: D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar Handbook of Fingerprint Recognition Springer, New York, Index

An approach for Fingerprint Recognition based on Minutia Points

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

An introduction on several biometric modalities. Yuning Xu

Fingerprint Recognition

Outline. Incorporating Biometric Quality In Multi-Biometrics FUSION. Results. Motivation. Image Quality: The FVC Experience

Implementation of Enhanced Feedback in Automated Latent Fingerprint Matcher

Online and Offline Fingerprint Template Update Using Minutiae: An Experimental Comparison

Multimodal Biometric Authentication using Face and Fingerprint

FINGERPRINT MATCHING BASED ON STATISTICAL TEXTURE FEATURES

Mobile ID, the Size Compromise

NIST Tests Supporting Biometric Identification Applications

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

Comparison of fingerprint enhancement techniques through Mean Square Error and Peak-Signal to Noise Ratio

FVC2004: Third Fingerprint Verification Competition

Touchless Fingerprint recognition using MATLAB

Reducing FMR of Fingerprint Verification by Using the Partial Band of Similarity

Latent Fingerprint Matching using Descriptor-based Hough Transform

Fingerprint Matching using Gabor Filters

Fingerprint Matching Using Minutiae Feature Hardikkumar V. Patel, Kalpesh Jadav

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Peg-Free Hand Geometry Verification System

Biometrics- Fingerprint Recognition

An Approach to Demonstrate the Fallacies of Current Fingerprint Technology

Latent Fingerprint Matching A Survey

Incorporating Image Quality in Multi-Algorithm Fingerprint Verification

Fig. 1 Verification vs. Identification

Call for participation. FVC2004: Fingerprint Verification Competition 2004

Fingerprint Retrieval Based on Database Clustering

Available online at ScienceDirect. Procedia Computer Science 58 (2015 )

Latent Fingerprint Matching Using Descriptor-Based Hough Transform

Local Correlation-based Fingerprint Matching

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

AWARD TOP PERFORMER. Minex III FpVTE PFT II FRVT PRODUCT SHEET. Match on Card. Secure fingerprint verification directly on the card

FC-QIA: Fingerprint-Classification based Quick Identification Algorithm

Implementation of Minutiae Based Fingerprint Identification System using Crossing Number Concept

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Authentication: Beyond Passwords

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

Fingerprint Verification System using Minutiae Extraction Technique

POLYBIO Multibiometrics Database: Contents, description and interfacing platform

Fingerprint Recognition System

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Encryption of Text Using Fingerprints

On Latent Fingerprint Enhancement

Polar Harmonic Transform for Fingerprint Recognition

Leading Innovation in Biometrics & Security SUPREMA. Biometric Solutions for Mobile. a Whe. Contact: Suprema.

FINGER PRINT RECOGNITION SYSTEM USING RIDGE THINNING METHOD

Finger Print Analysis and Matching Daniel Novák

Combined Fingerprint Minutiae Template Generation

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

Computer Security. 10. Biometric authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Fingerprint Identification System: Non-zero Effort Attacks for Immigration Control

Computer Security 4/15/18

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

International Journal of Emerging Technology & Research

Smart Card and Biometrics Used for Secured Personal Identification System Development

Keywords Fingerprint enhancement, Gabor filter, Minutia extraction, Minutia matching, Fingerprint recognition. Bifurcation. Independent Ridge Lake

ROBUST LATENT FINGERPRINT MATCHING USING SUPPORT VECTOR MACHINE

Verifying Fingerprint Match by Local Correlation Methods

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

Detecting Fingerprint Distortion from a Single Image

Biometric Security Technique: A Review

Genetic Algorithm For Fingerprint Matching

Large-scale AFIS and multi-biometric identification. MegaMatcher SDK

ISSN Vol.04,Issue.15, October-2016, Pages:

Keywords: Fingerprint, Minutia, Thinning, Edge Detection, Ridge, Bifurcation. Classification: GJCST Classification: I.5.4, I.4.6

Fingerprint Identification Using SIFT-Based Minutia Descriptors and Improved All Descriptor-Pair Matching

A Challenge to Analyze and Detect Altered Human Fingerprints

Biometrics Hybrid System Based Verification

Biometric Identification Using Artificial Neural Network

Forensics: The Next Frontier for Biometrics. Anil K. Jain Michigan State University October 27, 2015

ISSN Vol.04,Issue.08, July-2016, Pages:

Fast and Robust Projective Matching for Fingerprints using Geometric Hashing

Biometric quality for error suppression

Role of Biometrics in Cybersecurity. Sam Youness

FAST FINGERPRINT IMAGE SYNTHESIS

FINGERPRINT BIOMETRICS

TOPIC : FINGERPRINT RECOGNITION

PERFORMANCE IMPACT OF THE USER ATTEMPTS ON FINGERPRINT RECOGNITION SYSTEM (FRS)

PERFORMANCE MEASURE OF LOCAL OPERATORS IN FINGERPRINT DETECTION ABSTRACT

Keywords Palmprint recognition, patterns, features

Understanding Fingerprint Biometrics

Transcription:

Review Article FINGERPRINT MATHING IN INDIA: AN OVERVIEW Rahul Vivek Purohit 1.A.Imam 2 Address for Correspondence 1 Asst. Prof, ECE Deptt, Ajay Kumar Garg Engineering College, Ghaziabad 2 Asst. Prof, ECE Deptt, Jamia Millia Islamia University, New Delhi, INDIA E mail rahul_yagya@yahoo.com ABTACT Pattern recognition s purpose is to categories data based on statistical information obtained from the patterns. In fingerprint recognition system, the individuality of a subject is established on the basis of locations where ridges of palm end abruptly or where a ridge branches into two or more ridges. These locations are called minutiae points and the ridges form a fingerprint pattern. This paper presents an overview of fingerprint matching and provides a detail study of various methods in Indian perspective. INTRODUCTION Although fingerprint matching is subjected Law enforcement, forensic labs, ATM transactions, boarder security and other consumer services have been using biometric recognition system based on a fingerprint, iris or face. Fingerprints are considered to be the most popular and reliable source of identification for reasons like: Immunity with time i.e. fingerprints do not change over a period of time Individuality i.e. no two persons can have same fingerprints not even twins The availability of large fingerprint database The availability of compact and inexpensive devices that can identify the prints, and The criminals are more likely to leave fingerprints at the crime site to various problems like low quality images, nonlinear distortion, altered prints etc. but due to their high acceptability, immutability and individuality they are extremely effective wherever security is an issue. Henry Faulds, Francis Galton, and Edward Henry, among others, established the scientific basis for using fingerprints as a method for person identification in the late 19th century. ince than various methods of feature extraction have been proposed base on image detection domain. The simplest form of detection is directly from the gray level image as shown by L. jinxiang et al [2000] and D.Maio, D.maltoni [1997]. However the accuracy in this method is subjected to quality of image, background noise and available resolution of the sensor. B.Bir et al [2003] and. prabhakar, A.K.Jain [2003] has shown the use of

machine learning methods to improve the performance. Another method of extraction is based on binary image profile patterns, B.Bir, T. xuejun [2003], J.xudong et al [2000]. A more accurate method uses binary skeleton of image by tracing the ridge lines,.a.m. Bazen et al [2003] and A.K.Jain et al [2001]. Most feature extraction algorithms uses thinning for minutiae extraction from a fingerprint image, Adrian lim hooi Jin et al [2002]. As shown in fig.1, the fingerprint matching process can be divided into two sections, Enrollment process and identification process. The major steps in both the processes are: Enrollment Process: - Data acquisition - Digital image conversion - Extraction of minutiae points - Template storage Identification Process: - Query print generation - Feature extraction - Minutiae point matching - Matching score classification Fig. 1: Finger Print Matching Process

In the enrollment process, data (fingerprints) are collected using sensors and converted to digital image. The images are processed by minutiae extractor to obtain minutiae points. 20-70 minutiae points are considered to be good for quality matching. These minutiae points along with subjects information called as templates is then stored in enrollment data base. In the identification process, the same sensor is again used to collect another fingerprint image called query print. Again minutiae extractor extracts minutiae points for query image. In order to achieve a high quality image and minutiae points, extraction algorithms needs to tackle with background noise, low quality image, cuts and broken ridges etc. The matcher module than compares the query minutiae set with the stored templates to find the number of same minutiae points i.e. two minutiae points with same location and direction. The match score is compared with a threshold value depending on the specific application. FINGERPRINT AQUIITION There are various methods by which fingerprints can be sensed. Ink and paper method is still used in various parts of the world for law enforcements. Optical and solid state sensors are also widely used. The commonly used optical sensor is based on FTIR (frustrated total internal reflection) technique. The silicon based solid state sensors works on the differences in physical properties like voltage, capacitance or conductance and are useful for commercial applications. The quality of sensor is characterized by the capture areas and resolution. For forensic and criminal applications a sensor with high resolution (500 ppi or 1000ppi) have to be used so that it can provide a large picture and can scan all ten fingers simultaneously. uch sensors are known as 10 print scanners. For commercial application low resolution sensors are preferred. olid state devices are being used in mobile phones and laptops because of compact size and inexpensiveness. However they provide small overlap area and low quality image. MINUTIAE POINT EXTRACTION The minutiae point extraction process is shown in fig.2. The first image (raw fingerprint) can be classified in to three levels (shown in fig.3). Level 1 provides macro details like ridge flow, pattern type or singular points and can be used to classify pattern type like arch, loop or whorl. Level 2 provides details of ridge bifurcations and ending while level 3 provides details like broken ridge, path contour, width and shape of ridge etc. Level 2 and 3 can be used to establish a person s individuality. A sensor which can provide high resolution images have to be used for level 3 extraction.

Fig.2: Minutiae Point Extraction Process Grayscale image Orientation field Binary image Minutiae Fig.3: Raw fingerprint similarities between images of different FINGERPRINT MATCHING A fingerprint matching system compares and determines a match score between two fingerprints, which should be high for fingerprints from the same finger and low for those from different fingers. There may be changes in the images of same finger due fingers. This makes fingerprint matching a difficult pattern recognition problem. Most fingerprint-matching algorithms adopt one of four approaches: image correlation, phase matching, skeleton matching, and minutiae matching. Minutiae-based representation is commonly used, primarily because to pressure, placement, rotation of finger with respect to sensor and conditions like dryness and cuts. Also there may be

Forensic examiners have successfully Fingerprint Vendor Technology Evaluation relied on minutiae to match fingerprints (FpVTE), the Minutiae Interoperability for more than a century, Exchange Test (MINEX), Proprietary Minutiae-based representation is storage Fingerprint Template (PFT) testing, and the efficient, and Evaluation of Latent Fingerprint Expert testimony about suspect identity based on mated minutiae is admissible in courts of law. Technologies (ELFT), which use operational data collected in forensic and government applications. The University of Bologna conducts FVC-ongoing, which is an PERFORMANCE The performance of a matching system is evolution of the international Fingerprint Verification Competitions (FVCs) organized mainly characterized by its false acceptance between 2000 and 2008 rate (FAR) and false rejection rate (FRR). FAR and FRR are the errors made by the matching system in which the matcher declares a match between images from two (https://biolab.csr.unibo.it/fvcongoing/ui/fo rm/home.aspx). Table 1 summarizes FpVTE 2003 Medium- cale Test (MT), FVC2006, and ELFT different fingers or it does not identify 2008 (Phase II) results. Clearly, system images from the same finger as a match. There is a trade off between FAR and FRR performance varies widely depending on fingerprint data characteristics used in the and it is impossible to reduce both these evaluation. However, while these errors simultaneously as they depend on the operating threshold; a large threshold score evaluations are useful, the performance of different biometric systems cannot always leads to a small FAR at the expense of a be directly compared. In addition, high FRR. The National Institute of tandards and technology evaluations do not always reflect operational performance due to differences Technology (NIT) has conducted several in data characteristics, operating fingerprint technology evaluations environments, and user interactions with the (http://fingerprint.nist.gov), such as the fingerprint reader. Table 1: FpVTE 2003 Medium-cale Test (MT) Biometric identifier Reference FRR FAR Fingerprint NIT 0.10% 1% FpVTE Face NIT FRVT 10% 1% Voice NIT 2004 5-10% 2-5% Iris ITIRT 0.99% 0.94%

A fingerprint recognition system s Indian conditions are different from that of operational performance is based on several factors, including sensor characteristics, the number and demographic distribution of the population enrolled in the system, and western countries. The reasons being: I. Larger percentage of population is employed in manual labor, which normally results in poorer biometric various environmental factors indoor samples. versus outdoor, temperature, humidity, and so on. Moreover, the required FMR and II. Biometric collection process in rural and mobile environment is less controllable FNMR depend on the specific application compared to the environmental for example, Disney World s fingerprintbased entry system operates at a low FNMR, so as not to upset paying customers, at the expense of a higher FMR. On the other hand, an ATM fingerprint verification system may require low FMR at the expense of higher FNMR. In some cases, a fingerprint recognition system may not conditions in which Western data is collected. With the use of several reports by NIT we can conclude that: I. False Acceptance Rate is linearly proportional to gallery size at constant TAR as shown in Figure 4. II. False Rejection Rate does not vary over even successfully capture the user s gallery size as shown in Figure 5. fingerprint. Failure to enroll (FTE) and III. Based on these figures, one can failure to acquire (FTA) refer to the fraction of users who cannot be enrolled or processed by a particular system due to the poor quality of their fingerprints for example, people such as manual laborers or the elderly with worn-out fingers. In practice, FTE can be rather high (a few percentage points) depending on the target population and the occupation of users in the population. INDIAN PERPECTIVE: conclude that on a database size that is 200 times larger (1.2 billion versus 6 million), the same system will have an FAR of approximately 0.07*200 = 14%. The FRR can be expected to be about 4% based on matching of 2 finger plain fingerprints. Based on the data and with all other things being equal, we can achieve a 1000 times improvement in FAR. Thus the estimated FAR of 14% will be 1000 times less i.e. 0.14 % Table 2: Effect on FAR by increasing the number of fingers NUMBER OF FINGER FRR % FAR % 2 10.3 29.2 10 10.9 0.0

Fig.4: False Acceptance Rate is linearly proportional to gallery size at constant TAR Fig.5: False Rejection Rate does not vary over gallery size Based on the above findings, one can conclude that even with abnormal conditions and a large population, it is possible, to achieve a recognition accuracy of 99% in India with the help of best practices as shown in table3.

Enrolment Authentication Key Decisions Image capture Device characteristics Table 3 Decision Type ummary of Decisions Plain or rolled R Plain, live scan Number of fingers R Ten etting level 31 or above, EFT/F certified Quality check R Yes Operational Assistance R Yes torage and transmission image capture Device characteristics Transmission format Compression Minutiae format Corrective measure Compression torage format Minutiae format Multi finger fusion algorithm R R Yes Uncompressed image is recommended Per IO section 8.3 Per IO 19794-2 Recommended Number of fingers R No minimum, no maximum. Application dependent Any finger option M Yes Retry R Maximum 5 etting level 28 or above - tandards based, R- Recommendation based, M- Management judgment Per IO Compression ratio to be less than 15:1 Per IO 19794-2

REFFERENCE 1. National cience and Technology Council ubcommittee on Biometrics and Identity Management, Biometrics in Government Post-9/11: Advancing cience, Enhancing Operations, Aug. 2008; www.ostp.gov/galleries/ntc%20 Reports/Biometrics%20in%20Governm ent%20post%20 9-11.pdf. 2. A.K. Jain, P. Flynn, and A.A. Ross, eds., Handbook of Biometrics, pringer, 2007. 3. H.C. Lee and R.E. Gaensslen, eds., Advances in Fingerprint Technology, 2nd ed., CRC Press, 2001. 4. J. Feng, Combining Minutiae Descriptors for Fingerprint Matching, Pattern Recognition, Jan. 2008, pp. 342-352. 5. A.A. Ross, K. Nandakumar, and A.K. Jain, Handbook of Multibiometrics, pringer, 2006. 6.. Pankanti,. Prabhakar, and A.K. Jain, On the Individuality of Fingerprints, IEEE Trans. Pattern Analysis and Machine Intelligence, Aug. 2002, pp. 1010-1025. 7. Unique identification authority of India.