CPSC 695. Geometric Algorithms in Biometrics. Dr. Marina L. Gavrilova

Similar documents
Algorithms and Modern Computer Science

Development of an Automated Fingerprint Verification System

Biometric Security Roles & Resources

CPSC 695. Methods for interpolation and analysis of continuing surfaces in GIS Dr. M. Gavrilova

Journal of Industrial Engineering Research

Fingerprint Classification Using Orientation Field Flow Curves

Digital Image Processing Fundamentals

Minutiae Based Fingerprint Authentication System

Algorithms for Recognition of Low Quality Iris Images. Li Peng Xie University of Ottawa

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

A Framework for Efficient Fingerprint Identification using a Minutiae Tree

Implementation and Comparative Analysis of Rotation Invariance Techniques in Fingerprint Recognition

Finger Print Analysis and Matching Daniel Novák

Graph Matching Iris Image Blocks with Local Binary Pattern

A New Approach To Fingerprint Recognition

Finger Print Enhancement Using Minutiae Based Algorithm

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Feature-level Fusion for Effective Palmprint Authentication

Image Enhancement Techniques for Fingerprint Identification

Morphological Image Processing

An introduction on several biometric modalities. Yuning Xu

Tutorial 8. Jun Xu, Teaching Asistant March 30, COMP4134 Biometrics Authentication

REINFORCED FINGERPRINT MATCHING METHOD FOR AUTOMATED FINGERPRINT IDENTIFICATION SYSTEM

Lecture 10: Image Descriptors and Representation

Fingerprint Matching using Gabor Filters

International Journal of Advance Engineering and Research Development. Iris Recognition and Automated Eye Tracking

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

Outline of the presentation

CHAPTER 1 INTRODUCTION

Head Frontal-View Identification Using Extended LLE

Biometrics- Fingerprint Recognition

Overview of Computer Vision. CS308 Data Structures

6. Multimodal Biometrics

Fingerprint Mosaicking &

Use of Mean Square Error Measure in Biometric Analysis of Fingerprint Tests

Signature Recognition by Pixel Variance Analysis Using Multiple Morphological Dilations

Using Support Vector Machines to Eliminate False Minutiae Matches during Fingerprint Verification

Mathematical Morphology and Distance Transforms. Robin Strand

Logical Templates for Feature Extraction in Fingerprint Images

Data Mining Classification: Alternative Techniques. Lecture Notes for Chapter 4. Instance-Based Learning. Introduction to Data Mining, 2 nd Edition

Overview of ANSI INCITS Fingerprint Standards on Data Interchange Format. Robert Yen DoD Biometrics Management Office 4 October, 2005

Fingerprint Verification applying Invariant Moments

A Novel Automated Approach for Offline Signature Verification Based on Shape Matrix

Morphological Image Processing

Biometric Security System Using Palm print

FILTERBANK-BASED FINGERPRINT MATCHING. Dinesh Kapoor(2005EET2920) Sachin Gajjar(2005EET3194) Himanshu Bhatnagar(2005EET3239)

Fingerprint Image Enhancement Algorithm and Performance Evaluation

Ujma A. Mulla 1 1 PG Student of Electronics Department of, B.I.G.C.E., Solapur, Maharashtra, India. IJRASET: All Rights are Reserved

The need for secure biometric devices has been increasing over the past

International Journal of Advanced Research in Computer Science and Software Engineering

A New Enhancement Of Fingerprint Classification For The Damaged Fingerprint With Adaptive Features

Shape representation by skeletonization. Shape. Shape. modular machine vision system. Feature extraction shape representation. Shape representation

FINGERPRINT RECOGNITION SYSTEM USING SUPPORT VECTOR MACHINE AND NEURAL NETWORK

Skeletonization Algorithm for Numeral Patterns

1. INTRODUCTION. AMS Subject Classification. 68U10 Image Processing

Fingerprint Recognition using Texture Features

User Identification by Hierarchical Fingerprint and Palmprint Matching

Genetic Algorithm For Fingerprint Matching

Combined Fingerprint Minutiae Template Generation

Robust biometric image watermarking for fingerprint and face template protection

CS 532: 3D Computer Vision 14 th Set of Notes

Keywords: Biometrics, Fingerprint, Minutia, Fractal Dimension, Box Counting.

Skeletonization and its applications. Dept. Image Processing & Computer Graphics University of Szeged, Hungary

Fast and Robust Projective Matching for Fingerprints using Geometric Hashing

Improving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries

AN EFFICIENT BINARIZATION TECHNIQUE FOR FINGERPRINT IMAGES S. B. SRIDEVI M.Tech., Department of ECE

Tiling Three-Dimensional Space with Simplices. Shankar Krishnan AT&T Labs - Research

Fingerprint Identification System Based On Neural Network

Digital Image Processing

Carmen Alonso Montes 23rd-27th November 2015

Voronoi Diagrams in the Plane. Chapter 5 of O Rourke text Chapter 7 and 9 of course text

LASER ADDITIVE MANUFACTURING PROCESS PLANNING AND AUTOMATION

Hidden Loop Recovery for Handwriting Recognition

EE 584 MACHINE VISION

Filterbank-Based Fingerprint Matching. Multimedia Systems Project. Niveditha Amarnath Samir Shah

Mingle Face Detection using Adaptive Thresholding and Hybrid Median Filter

An Efficient on-line Signature Verification System Using Histogram Features

Morphological track 1

Local Correlation-based Fingerprint Matching

Critique: Efficient Iris Recognition by Characterizing Key Local Variations

Indexing Fingerprints using Minutiae Quadruplets

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP ( 1

IJESRT. Scientific Journal Impact Factor: (ISRA), Impact Factor: 1.852

wavelet packet transform

PS Computational Geometry Homework Assignment Sheet I (Due 16-March-2018)

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

Fingerprint Matching Incorporating Ridge Features Using Contourlet Transforms

Digital Vision Face recognition

Other Voronoi/Delaunay Structures

FINGERPRINT RECOGNITION BASED ON SPECTRAL FEATURE EXTRACTION

CS443: Digital Imaging and Multimedia Binary Image Analysis. Spring 2008 Ahmed Elgammal Dept. of Computer Science Rutgers University

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY PROGRAMMING

Touchless Fingerprint recognition using MATLAB

CIRCULAR MOIRÉ PATTERNS IN 3D COMPUTER VISION APPLICATIONS

Fingerprint Indexing using Minutiae and Pore Features

CHAPTER 6 EFFICIENT TECHNIQUE TOWARDS THE AVOIDANCE OF REPLAY ATTACK USING LOW DISTORTION TRANSFORM

Polar Harmonic Transform for Fingerprint Recognition

Segmentation and Modeling of the Spinal Cord for Reality-based Surgical Simulator

Möbius Transformations in Scientific Computing. David Eppstein

Transcription:

CPSC 695 Geometric Algorithms in Biometrics Dr. Marina L. Gavrilova

Biometric goals Verify users Identify users Synthesis - recently

Biometric identifiers Courtesy of Bromba GmbH

Classification of identifiers Physiological biometric identifiers: fingerprints, hand geometry, eye patterns (iris and retina), facial features and other physical characteristics. Behavioral identifiers: voice, Signature typing patterns other. Analyzers based on behavioral identifiers are often less conclusive because they are subject to limitations and can exhibit complex patterns.

Long-Term Goals Establish acceptable error rates Decrease possibility of error Improve methodology (new biometrics, combination) Make implementation more robust

Geometric proximity and topology Methods based on concepts of proximity of geometric sets and extracting and utilizing topological information on the data are: Techniques for computing the medial axis transform Distance distribution computation using weighted metric functions Use of Voronoi diagram and Delaunay triangulation for data processing and matching Topology-based approach for feature extractions along the boundary Computational geometry methods for pre-processing and pattern matching Topology-based approach for generation of biometric information

Outline Distance Distribution Computation Pattern matching Methods for identification and synthesis Feature extraction

Biometric System Data Collection Processing Decision Data source Pattern matching Identification Data /Verification source Sensors Feature extraction Reporting Sensors Transmission Compression module Storage Data Base

Computational Geometry in Biometrics Data Collection Data source Processing Feature extraction Decision Pattern Data matching source Sensors Data preprocessing Reporting Sensors CG methods Transmission Compression module Storage Data Bas e

Threshold distance A threshold distance: declare distances less than the threshold as a "match" and those greater to indicate "non-match". Genuine distribution Inter-template distribution Imposter distribution

Distance measures ( x P) d, x Distance metrics Power Additively weighted Euclidean Manhattan supremum d d(x, P) 2 2 p( x, P) = d( x, p) rp d ( x, P) = d( x, p) e r p d = ( x i=1 d d(x, P) = i=1 d(x, P) = max i= 1.. d x x i i i p p p i i i 2 ) r r p r p p P P P r p P r p x d(x,p) ( x P) d, ( x P) d, x x

Use of metrics Regularity of metric allows to measure the distances from some distinct features of the template more precisely, and ignore minor discrepancies originated from noise and imprecise measurement while obtaining the data. We presume that the behavioral identifiers, such as typing pattern, voice and handwriting styles will be less susceptible to improvement using the proposed weighted distance methodology than the physiological identifiers.

Pattern Matching Aside from a problem of measuring the distance, pattern matching between the template and the measured biometric characteristic is a very serious problem on its own. Some preliminary research, mainly in the area of image processing, should be utilized in order to approach the problem from the right angle.

Template comparison The most common methods are based on bitmap comparison techniques, scaling, rotating and modifying image to fit the template through the use of linear operators, and extracting template boundaries or skeleton (also called medial axis) for the comparison purposes. In addition, template comparison methods also differ, being based on either pixel to pixel, important features (such as minutae) positions, or boundary/skeleton comparison.

Template Matching approach to Symbol Recognition Compare an image with each template and see which one gives the best mach (courtesy of Prof. Jim Parker, U of C)

Good Match Most of the pixels overlap means a good match (courtesy of Prof. Jim Parker, U of C) Image Template

Distance transform Definition 1. Given an n x m binary image I of white and black pixels, the distance transform of I is a map that assigns to each pixel the distance to the nearest black pixel (a feature). The distance transform method introduced in [Gavrilova and Alsuwayel] is based on fast scans of image in the top-bottom and left-right directions using a fast polygonal chain maintenance algorithm. After the distance transform is build, it can be used to visualize proximity information in a form of temperature map. As the distance from the black pixels (features) increases, the color intensity changes.

Distance Transform Given an n x m binary image I of white and black pixels, the distance transform of I is a map that assigns to each pixel the distance to the nearest black pixel (a feature).

Thermogram vs. distance transform Thermogram of an ear (Brent Griffith, Infrared Thermography Laboratory, Lawrence Berkeley National Laboratory )

What is a Distance Transform? Given an n x m binary image I of white and black pixels, the distance transform of I is a map that assigns to each pixel the distance to the nearest black pixel (a feature).

What is a Feature Transform? The feature transform of I is a map that assigns to each pixel the feature that is nearest to it.

L 1 Distance Transform Algorithm

L Distance Transform Algorithm

A Fast Algorithm for Computing Euclidean Distance Transform Works in Euclidean Metric Optimal linear in the number of pixels Proceed in two passes over the image, top down and bottom up For each row Maintain a polygonal chain - a set of pixels in which the nearest feature may lies Updates the chain for next row by pruning - it becomes the minimal set of pixels Prune Endpoints and Internal Vertices

What is a Chain? One Chain for the row Contains at most one pixel per column Contains the lowest pixel in the column After pruning, it contains only those points that will be nearest features to some points in the row Dynamically updated from row to row

Example of a a Chain

Pruning Endpoints Identifying superfluous endpoints

Pruning Internal Points Point q is removed

Pruning Internal Points Point q remains

Algorithm Walkthrough

Experimental results Algm 1 pruning Algm 2 no pruning Graph shows running time in sec. (OY axis) vs. number of pixels in image (OX axis) Results: Significant improvement in running time Linear function grows slowly 4000 3500 3000 2500 2000 1500 1000 500 0 0 100000 200000 300000 Algm2 5% Algm1 5% Algm2 30% Algm1 30%

Experimental results Algm 1 with pruning was tested Saturation levels: 5%, 15%, 30% Results: Linear Running Time, Regardless of Saturation (% of black pixels in image) 400 350 300 250 200 150 100 50 0 0 200000 400000 600000 800000 1000000 5% 15% 30%

Experimental results

Generalized Voronoi diagram A generalized Voronoi diagram for a set of objects in the space is the set of generalized Voronoi regions according to some proximity rule. A generalized Delaunay triangulation is the dual of the generalized Voronoi diagram obtained by joining all pairs of sites whose Voronoi regions share a common Voronoi edge.

Example: VD and DT in power metric

Voronoi methods in biometrics The methodology is making its way to the core methods of biometrics, such as fingerprint identification, iris and retina matching, face analysis, ear geometry and others (see recent works by [Xiao, Zhang, Burge]. The methods are using Voronoi diagram to partition the area of a studies image and compute some important features (such as areas of Voronoi region, boundary simplification etc.) and compare with similarly obtained characteristics of other biometric data.

Medial axis transform Definition 2. The medial axis, or skeleton of the set D, denoted M(D), is defined as the locus of points inside D which lie at the centers of all closed discs (or spheres) which are maximal in D, together with the limit points of this locus.

Medial axis transform

Singular-point detection In mane biometric problems, such as detecting singular points in fingerprint images, the quality of the result and false detection rates depend directly on the quality of the data (image, print, recording etc). To improve the result, pre-processing can be used. In some cases, it is not enough to simply enhance the image properties. Many cases of false detection happen at the boundary of an image or at place where lines are of irregular shape. A method based on extending the lines of the image beyond the boundary in the projected direction so that the singular point can be computed more precisely. For the second case, topology-based method are traditionally used to smooth the irregularity (including the interpolation techniques) [Maltony, Jain, Zhan]

Singular point detection Singular point detection (top to bottom): singular point close to boundary (lower); regular pattern.

DT for minutiae point extraction (a) Thinned Image (b) Minutia Extracted

DT for minutiae point extraction (a) Purified minutia (b) DT constructed based (a)

DT for matching Delaunay Triangulation can be used for Matching For each Delaunay triangle, the length of three edges, the three angles and the ridge numbers between each edge are recorded to construct a 9 dimensional local vector to find the best-matched local structure in two fingerprints.

Triangle edge comparison in minutiae matching A θ 2 A θ 1 θ 2 θ' 1 B B

Topology-based solution to generating biometric information Finally, one of the most challenging areas is a recently emerged problem of generating biometric information, or socalled inverse problem in biometrics. In order to verify the validity of algorithms being developed, and to ensure that the methods work efficiently and with low error rates in real-life applications, a number of biometric data can be artificially created, resembling samples taken from live subjects. In order to perform this procedure, a variety of methods should be used, but the idea that we explore is based on the extraction of important topological information from the relatively small set of samples (such as boundary, skeleton, important features etc), applying variety of computational geometry methods, and then using these geometric samples to generate the adequate set of test data.

Conclusions Geometric data structures and methodology based on proximity and topology prove to be useful for emerging field of biometric technologies. The overview discussed existing computational geometry methods and their recently developed applications in biometrics We suggest a number of new approaches for investigation of specific biometric problems, including those of synthesis of biometric information.