SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

An Efficient Method for Recognizing the Low
Quality Fingerprint Verification by Means of Cross
Correlation
V.Karthikeyan1 and V.J.Vijayalakshmi2
1
2

Department of ECE, SVSCE, Coimbatore, India
Department of EEE, SKCET, Coimbatore, India

ABSTRACT
In this paper, we propose an efficient method to provide personal identification using fingerprint to get
better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding
minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality
fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint
verification system is capable of dealing with low quality images from which no minutiae can be extracted
reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and
partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it
converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the
image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and
the highest correlated image is taken as the output. The result gives a good recognition rate, as the
proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint
identification.

Keywords
Fingerprints, matching, verification, orientation field, cross-correlation

1. INTRODUCTION
Conventional security systems used either knowledge based methods (passwords or PIN), and
token-based methods (passport, driver license, ID card) and were prone to fraud because PIN
numbers could be forgotten or hacked and the tokens could be lost, duplicated or stolen [7].
Accurate and automatic identification and authentication of users is a fundamental problem in
today’s computing world [8]. In the last few years, biometric authentication has become an
increasingly important issue in modern society. The biometrics are enhancing our ability to
identify people. There are two types of biometric techniques: 1. Physiological (face recognition,
iris recognition, finger print recognition, retina recognition). 2. Behavioral (signature recognition,
keystroke recognition and voice recognition). There are various biometric identification
techniques such as palm print [9], fingerprint [10], face [11], vein [12] or their combinations [13].
Among all the biometric techniques, today fingerprints are the most widely used biometric
features for personal identification because of their high acceptability, immutability and
individuality [14]. Fingerprint verification is one of the most reliable and personal identification
methods [1]. Fingerprint images are widely used in many systems such as personal identification,
access control, internet authentication, forensics, e-banking, etc. Due to its permanence,
uniqueness and distinctiveness [2] In the Table I various biometric technologies have been
compared based on various characteristics.
DOI: 10.5121/ijci.2013.2501

1
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013
TABLE I
Comparison of Various Biometric Technologies
Biometric
Identifier

Um

Face

H

Di

Pm

Co

Pf

Ac

Ci

L

M

H

L

H

H

Fingerprint

M

H

H

M

H

M

M

Hand
Geometry

M

M

M

H

M

M

M

Iris

H

H

H

M

H

L

L

Keystroke

L

L

L

M

L

M

M

Signature

L

L

L

M

L

H

H

Voice

M

L

L

M

L

H

H

Un- Universality
Ci– Circumvention
Co – Collectability

Pf – Performance
Pm– Permanence
M – Medium

Di– Distinct
L – Low
H- High

Usually, fingerprint verification is performed manually by professional forensic experts.
However, manual fingerprint verification is very tedious. Hence, Automatic Fingerprint
Identification Systems (AFIS) are in great demand. There are a number of design factors like lack
of reliable minutiae extraction algorithms, difficulty in quantitatively defining a reliable match
between fingerprint images, fingerprint classification, etc. creates bottlenecks in achieving the
desired performance [3]. Fingerprint has been widely used for personal identification for several
centuries [4]. Minutiae extraction - based fingerprint identification is a popular method. But the
cross correlation based technique is a promising approach to fingerprint authentication for the
new generation of high resolution and touch less fingerprint sensors. This paper proposes a novel
scheme, namely, Cross Correlation of Field Orientation (CCFO) that cascades Cross Correlation
technique with Field Orientation technique to do fingerprint authentication. This paper is
organized as follows: Section II describes about the proposed system including the preprocessing, field orientation estimation and matching modules. In Section III some experimental
results are presented. Finally, the conclusions are discussed in Section IV.

2. PROPOSED SYSTEM ARCHITECTURE
The overall architecture of the proposed biometric identification system is illustrated in Figure 1.
Each of the constituent modules are described in this section, When compared to the feature
extraction method the Cross Correlation of Field Orientation method has several features that
accounts for its improved performance of fingerprint authentication. Using the OFM the images
are converted into field orientation images that which increase the immunity to noise. Cross
correlation of images used for matching is a very simple and accurate method for measuring
image similarities [6]. Rao’s algorithm is used for measuring the field orientation [5]. The
following steps are involved in the Rao’s algorithm. The image is passed through a low pass filter
which smoothes the image. The low pass filter used is median filter. The Gradient of the
smoothened image is calculated for x and y axis. The second order gradients are calculated. The
resultant field orientation is then divided into N × N pixel and the orientation is represented by
arrows for each block. Then the template is cross correlated with the input image for matching.
Theme based on the cross correlation value the decision is made. Some of the pre-processing
2
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

steps have to be done before getting the Field Orientation image. These steps are done for getting
better and accurate results. There are two steps involved in pre-processing. They are smooth and
edge detection. Smoothing is a technique used to reduce the noise within an image. It is an
important step in image processing. It would be difficult to process the high frequency images
which are due to the drastic variation in the pixel intensity. Thus smoothing is done before field
orientation to reduce the variations in the pixel intensity. The median filter is used for smoothing
in this proposed method. The median filter which is a nonlinear filter is an effective method that
can suppress isolated noise without blurring sharp edges. It helps to remove the impulse noise
from the image, while preserving the rapid intensity changes. Specifically, the median filter
replaces a pixel value at the center of the median of all pixel value in the neighborhood. Median
filter is a more robust method than the traditional linear filtering, because it preserves the sharp
edges while removing the noise.

Figure 1. System Architecture

The median filter in 1-d works as, it just sorts the value and considers the middle value as median.
The 2-d median filter is illustrated as below
G (x, y) =median {a (I, j), (I, j) Єw}

(1)

Where w represents a neighborhood centered around location (x, y) in the image and x and y are
the random variables representing the variations along two directions. Edge detection is one of the
most commonly used operations in image analysis. It is a fundamental tool used in most image
processing applications to obtain information from the frames as a precursor step to feature
extraction and feature detection. It refers to the process of identifying and locating sharp
discontinuities in an image. The edges form the outline of an object. An edge is the boundary
between an object and the background. This process detects outlines of an object and boundaries
between objects and the background in the image. Thus the result of applying an edge detector to
an image may lead to a set of connected curves that indicate the boundaries of surface markings
as well as curves that correspond to discontinuities in surface orientation. Thus, applying an edge
3
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

detection algorithm to an image may significantly reduce the amount of data to be processed and
may therefore filter out information that may be regarded as less relevant, while preserving the
important structural properties of an image. Canny filter is extensively used for edge detection.
The Canny edge detection algorithm is one of the best optimal edge detectors. The advantage is
that it has a low error rate. The canny edge detector finds the image gradient to highlight regions
with high spatial derivatives. The gradient of the smoothened image is calculated for x, y axis. Let
it be Gx in x direction and Gy in Y direction. The second order gradients are calculated using the
following equations
Gxx = Gx * GxT
Gxy = Gx * GyT
Gyy = Gy * GyT

(2)
(3)
(4)

Where Gxx, Gxy, Gyy are the second order gradients of Gx and Gy. GxT, GyT are the transpose
matrices of Gx and Gy respectively.

3. FIELD ORIENTATION ESTIMATION
Field orientation of a fingerprint image is an efficient technique used to extract the directional
properties of the image and not the actual image. However, the gradients are orientations at pixel
scale, while the orientation field describes the orientation of the ridge valley structures. Therefore,
the field orientation can be derived from the gradients by performing some operation on the
gradients.The field orientation is calculated using the following equations.

Θ=

+

+

The resultant field orientation is then divided into N×N pixel and the orientation is represented by
arrows for each block. The Cross Correlation is a technique that which used to determine the
degree of similarity between two similar images. The Cross Correlation computation of Template
(T) and Input (I) image is determined by the following equation.
CC (T, I) =
Here both T and I represent the field orientation images. In the frequency domain the cross
correlation can be calculated by using the following formula.
CC (T, I) = IFT (F’ (T) * F (I))

(9)

Here IFT represents the Inverse Fourier Transform. When compared to the Time domain
computation, the Fourier domain is more efficient. Here, F’ (T) -Complex conjugate of the
Fourier Transform of the Template image. F (I) - the Fourier Transform of Input image The cross
correlation value is normalized by dividing the value obtained by total number of pixels.
4
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

4. EXPERIMENTAL RESULTS
The efficiency of the proposed approach is tested on well known MIT database. This database
contains the low resolution fingerprints. We used 1000 fingerprints of 200 classes for the
experiment. The query image is obtained from fingerprint reader and then it is converted into a
grayscale image as shown in Figure 2. From the query image the field orientation image is
calculated using Eq.2 to Eq.7. The median filter is used for smoothing and the canny filter is used
for edge detection and the results are shown in Figure 3. The Cross Correlation is used for the
matching which represents the degree of similarity between the images. Figure 4 shows the result
for the authenticated person where the right hand image is the retrieved image and the left hand
side image is the input image. The percentage of matching is 85%. When any new image is given
as input, it is identified as the intruder which is shown in Figure 5.

Figure 2. Query image and gray scale image

Figure 3. Edge detected image and Field Oriented Image

Figure.4. Final output for authenticated person

Figure.5. Final output for an Intruder
5
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

In the above figure the image which is to be authenticated is not presented in the database. Thus
the person is declared as an intruder when the percentage of matching is less than 85%. Figure 6
shows the performance evaluation of the algorithm which is implemented. As the size of the
database increases the percentage of the matching gradually decreases. The percentage of
matching remains at 85%, for a set of 700 fingerprint images.

5. CONCLUSION
In our proposed system we have implemented the Cross Correlation technique in the matching
stage. Correlation based techniques are a promising approach to fingerprint authentication. And
median filter is used for the image smoothing and the canny filter is used for the edge detection.
And median filter is a more robust method than traditional linear filtering. Traditional techniques,
like minutiae-based techniques, do not exploit all the information of the low resolution and
damaged images. But with the proposed system even with the damaged or partial fingerprint
image it is possible to check that a person is authenticated or an intruder.

Figure.6. Performance graph

REFERENCES
[1]
[2]
[3]

[4]

[5]
[6]

[7]
[8]

Henry C. Lee and R. E. Gaensslen, editors, Advances in Fingerprint Technology, Elsevier, New York,
1991.
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer,
2003.
Shlomo Greenberg, Mayer Aladjem, Daniel Kogan and Itshak Dimitrov, “Fingerprint Image
Enhancement using Filtering Techniques”, 15th International conference on Pattern recognition, 3-7
September 2000.
Almudena Lindoso, Luis Entrena, Judith Liu-Jimneez, Enrique San Milan, “Increasing security with
correlation based fingerprinting”, 41st annual IEEE International Carnahan Conference on security
technology, 8-11 October 2007.
Anil Jain , Lin Hong, and Ruud Bolle, “On-line fingerprint verification”, IEEE transactions on pattern
analysis and machine intelligence, Vol. 19, no. 4, April 1997.
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain: Securing fingerprint template: Fuzzy vault with
minutiae descriptors. International Conference on Pattern Recognition 2008: pp.1-4 Award winning
papers from the 19th International Conference on Pattern Recognition (ICPR),
Megha Kulshrestha, Pooja, V. K. Banga, “Selection of an Optimal Algorithm for Fingerprint
Matching” World Academy of Science, Engineering and Technology 75 2011
Rajeswari Mukesh, Dr. A. Damodaram, Dr. V. Subbiah Bharathi, “A Robust Finger Print based TwoServer Authentication and Key Exchange System”.

6
[9]
[10]

[11]

[12]
[13]
[14]

International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013
Kong A., Zhang D. And Mohamed K., “Three measures for secure palmprint identification”, Pattern
Recognition, 2008, 41, pp.1329-1337.
M. Zsolt, K.V., “A Fingerprint Verification System Based on Triangular Matching and Dynamic
Time Warping”, IEEE transactions on Pattern Analysis and Machine Intelligence, 2000, 22(11),
pp.1266-1276.
Andrew B.J., Alwyn G. and David C.L., “Random Multispace Quantization as an Analytic
Mechanism for BioHashing of Biometric and Random Identity Inputs”, IEEE transactions on Pattern
Analysis and Machine Intelligence, 2006, 28 (12), pp. 1892-1901.
Lingyu Wang , Graham Leedham , David Siu-Yeung Cho, “Minutiae feature analysis for infrared
hand vein pattern biometrics”, Pattern Recognition, 2008, 41 (3), pp. 920-929.
Kumar A., Zhang D., “Combining fingerprint, palm print and hand-shape for user authentication”,
The 18th International Conference on Pattern Recognition (ICPR'06), 2006, 4, pp.549-552
Vaidehi. V , Naresh Babu N T, Ponsamuel Mervin.A, Praveen Kumar.S, Velmurugan.S, Balamurali,
Girish Chandra, “Fingerprint Identification Using Cross Correlation of Field Orientation”, ICoAC
2010 IEEE.

Authors
Prof.V.Karthikeyan has received his Bachelor’s Degree in Electronics and Communication
Engineering from PGP college of Engineering and Technology in 2003, Namakkal, India, He
received a Masters Degree in Applied Electronics from KSR college of Technology, Erode in
2006 He is currently working as Assistant Professor in SVS College of Engineering and
Technology, Coimbatore. He has about 8 years of Teaching Experience
Prof. V. J. Vijayalakshmi has completed her Bachelor’s Degree Electrical & Electronics
Engineering from Sri Ramakrishna Engineering College, Coimbatore, India. She finished her
Masters Degree in Power Systems Engineering from Anna University of Technology,
Coimbatore, She is currently working as Assistant Professor in Sri Krishna College of
Engineering and Technology, Coimbatore She has about 5 years of Teaching Experience.

7

Mais conteúdo relacionado

Mais procurados

A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
prjpublications
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
Dr. Vinayak Bharadi
 

Mais procurados (17)

Ed34785790
Ed34785790Ed34785790
Ed34785790
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing Segmentation
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008
 
F045033337
F045033337F045033337
F045033337
 
154 158
154 158154 158
154 158
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNDETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
 
Improvement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition ProcessImprovement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition Process
 
An evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a reviewAn evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a review
 
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
Recent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systemsRecent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systems
 
Q0460398103
Q0460398103Q0460398103
Q0460398103
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 

Destaque

Presentación Aparato Reproductor Humano
Presentación Aparato Reproductor HumanoPresentación Aparato Reproductor Humano
Presentación Aparato Reproductor Humano
a arg
 
Optimize UI Implementation by Saeful
Optimize UI Implementation by SaefulOptimize UI Implementation by Saeful
Optimize UI Implementation by Saeful
Agate Studio
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
Alexander Decker
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Alexander Decker
 

Destaque (8)

Presentación Aparato Reproductor Humano
Presentación Aparato Reproductor HumanoPresentación Aparato Reproductor Humano
Presentación Aparato Reproductor Humano
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputing
 
Quantifying Outreach
Quantifying OutreachQuantifying Outreach
Quantifying Outreach
 
Optimize UI Implementation by Saeful
Optimize UI Implementation by SaefulOptimize UI Implementation by Saeful
Optimize UI Implementation by Saeful
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Semelhante a An efficient method for recognizing the low quality fingerprint verification by means of cross correlation

Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniques
IAEME Publication
 

Semelhante a An efficient method for recognizing the low quality fingerprint verification by means of cross correlation (20)

1834 1840
1834 18401834 1840
1834 1840
 
A Review on Edge Detection Algorithms in Digital Image Processing Applications
A Review on Edge Detection Algorithms in Digital Image Processing ApplicationsA Review on Edge Detection Algorithms in Digital Image Processing Applications
A Review on Edge Detection Algorithms in Digital Image Processing Applications
 
Automatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureAutomatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone Fracture
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniques
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSIMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)
 
Paper id 312201522
Paper id 312201522Paper id 312201522
Paper id 312201522
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYDCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image Segmentation
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paper
 
A Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different MethodsA Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different Methods
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

An efficient method for recognizing the low quality fingerprint verification by means of cross correlation

  • 1. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 An Efficient Method for Recognizing the Low Quality Fingerprint Verification by Means of Cross Correlation V.Karthikeyan1 and V.J.Vijayalakshmi2 1 2 Department of ECE, SVSCE, Coimbatore, India Department of EEE, SKCET, Coimbatore, India ABSTRACT In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification. Keywords Fingerprints, matching, verification, orientation field, cross-correlation 1. INTRODUCTION Conventional security systems used either knowledge based methods (passwords or PIN), and token-based methods (passport, driver license, ID card) and were prone to fraud because PIN numbers could be forgotten or hacked and the tokens could be lost, duplicated or stolen [7]. Accurate and automatic identification and authentication of users is a fundamental problem in today’s computing world [8]. In the last few years, biometric authentication has become an increasingly important issue in modern society. The biometrics are enhancing our ability to identify people. There are two types of biometric techniques: 1. Physiological (face recognition, iris recognition, finger print recognition, retina recognition). 2. Behavioral (signature recognition, keystroke recognition and voice recognition). There are various biometric identification techniques such as palm print [9], fingerprint [10], face [11], vein [12] or their combinations [13]. Among all the biometric techniques, today fingerprints are the most widely used biometric features for personal identification because of their high acceptability, immutability and individuality [14]. Fingerprint verification is one of the most reliable and personal identification methods [1]. Fingerprint images are widely used in many systems such as personal identification, access control, internet authentication, forensics, e-banking, etc. Due to its permanence, uniqueness and distinctiveness [2] In the Table I various biometric technologies have been compared based on various characteristics. DOI: 10.5121/ijci.2013.2501 1
  • 2. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 TABLE I Comparison of Various Biometric Technologies Biometric Identifier Um Face H Di Pm Co Pf Ac Ci L M H L H H Fingerprint M H H M H M M Hand Geometry M M M H M M M Iris H H H M H L L Keystroke L L L M L M M Signature L L L M L H H Voice M L L M L H H Un- Universality Ci– Circumvention Co – Collectability Pf – Performance Pm– Permanence M – Medium Di– Distinct L – Low H- High Usually, fingerprint verification is performed manually by professional forensic experts. However, manual fingerprint verification is very tedious. Hence, Automatic Fingerprint Identification Systems (AFIS) are in great demand. There are a number of design factors like lack of reliable minutiae extraction algorithms, difficulty in quantitatively defining a reliable match between fingerprint images, fingerprint classification, etc. creates bottlenecks in achieving the desired performance [3]. Fingerprint has been widely used for personal identification for several centuries [4]. Minutiae extraction - based fingerprint identification is a popular method. But the cross correlation based technique is a promising approach to fingerprint authentication for the new generation of high resolution and touch less fingerprint sensors. This paper proposes a novel scheme, namely, Cross Correlation of Field Orientation (CCFO) that cascades Cross Correlation technique with Field Orientation technique to do fingerprint authentication. This paper is organized as follows: Section II describes about the proposed system including the preprocessing, field orientation estimation and matching modules. In Section III some experimental results are presented. Finally, the conclusions are discussed in Section IV. 2. PROPOSED SYSTEM ARCHITECTURE The overall architecture of the proposed biometric identification system is illustrated in Figure 1. Each of the constituent modules are described in this section, When compared to the feature extraction method the Cross Correlation of Field Orientation method has several features that accounts for its improved performance of fingerprint authentication. Using the OFM the images are converted into field orientation images that which increase the immunity to noise. Cross correlation of images used for matching is a very simple and accurate method for measuring image similarities [6]. Rao’s algorithm is used for measuring the field orientation [5]. The following steps are involved in the Rao’s algorithm. The image is passed through a low pass filter which smoothes the image. The low pass filter used is median filter. The Gradient of the smoothened image is calculated for x and y axis. The second order gradients are calculated. The resultant field orientation is then divided into N × N pixel and the orientation is represented by arrows for each block. Then the template is cross correlated with the input image for matching. Theme based on the cross correlation value the decision is made. Some of the pre-processing 2
  • 3. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 steps have to be done before getting the Field Orientation image. These steps are done for getting better and accurate results. There are two steps involved in pre-processing. They are smooth and edge detection. Smoothing is a technique used to reduce the noise within an image. It is an important step in image processing. It would be difficult to process the high frequency images which are due to the drastic variation in the pixel intensity. Thus smoothing is done before field orientation to reduce the variations in the pixel intensity. The median filter is used for smoothing in this proposed method. The median filter which is a nonlinear filter is an effective method that can suppress isolated noise without blurring sharp edges. It helps to remove the impulse noise from the image, while preserving the rapid intensity changes. Specifically, the median filter replaces a pixel value at the center of the median of all pixel value in the neighborhood. Median filter is a more robust method than the traditional linear filtering, because it preserves the sharp edges while removing the noise. Figure 1. System Architecture The median filter in 1-d works as, it just sorts the value and considers the middle value as median. The 2-d median filter is illustrated as below G (x, y) =median {a (I, j), (I, j) Єw} (1) Where w represents a neighborhood centered around location (x, y) in the image and x and y are the random variables representing the variations along two directions. Edge detection is one of the most commonly used operations in image analysis. It is a fundamental tool used in most image processing applications to obtain information from the frames as a precursor step to feature extraction and feature detection. It refers to the process of identifying and locating sharp discontinuities in an image. The edges form the outline of an object. An edge is the boundary between an object and the background. This process detects outlines of an object and boundaries between objects and the background in the image. Thus the result of applying an edge detector to an image may lead to a set of connected curves that indicate the boundaries of surface markings as well as curves that correspond to discontinuities in surface orientation. Thus, applying an edge 3
  • 4. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 detection algorithm to an image may significantly reduce the amount of data to be processed and may therefore filter out information that may be regarded as less relevant, while preserving the important structural properties of an image. Canny filter is extensively used for edge detection. The Canny edge detection algorithm is one of the best optimal edge detectors. The advantage is that it has a low error rate. The canny edge detector finds the image gradient to highlight regions with high spatial derivatives. The gradient of the smoothened image is calculated for x, y axis. Let it be Gx in x direction and Gy in Y direction. The second order gradients are calculated using the following equations Gxx = Gx * GxT Gxy = Gx * GyT Gyy = Gy * GyT (2) (3) (4) Where Gxx, Gxy, Gyy are the second order gradients of Gx and Gy. GxT, GyT are the transpose matrices of Gx and Gy respectively. 3. FIELD ORIENTATION ESTIMATION Field orientation of a fingerprint image is an efficient technique used to extract the directional properties of the image and not the actual image. However, the gradients are orientations at pixel scale, while the orientation field describes the orientation of the ridge valley structures. Therefore, the field orientation can be derived from the gradients by performing some operation on the gradients.The field orientation is calculated using the following equations. Θ= + + The resultant field orientation is then divided into N×N pixel and the orientation is represented by arrows for each block. The Cross Correlation is a technique that which used to determine the degree of similarity between two similar images. The Cross Correlation computation of Template (T) and Input (I) image is determined by the following equation. CC (T, I) = Here both T and I represent the field orientation images. In the frequency domain the cross correlation can be calculated by using the following formula. CC (T, I) = IFT (F’ (T) * F (I)) (9) Here IFT represents the Inverse Fourier Transform. When compared to the Time domain computation, the Fourier domain is more efficient. Here, F’ (T) -Complex conjugate of the Fourier Transform of the Template image. F (I) - the Fourier Transform of Input image The cross correlation value is normalized by dividing the value obtained by total number of pixels. 4
  • 5. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 4. EXPERIMENTAL RESULTS The efficiency of the proposed approach is tested on well known MIT database. This database contains the low resolution fingerprints. We used 1000 fingerprints of 200 classes for the experiment. The query image is obtained from fingerprint reader and then it is converted into a grayscale image as shown in Figure 2. From the query image the field orientation image is calculated using Eq.2 to Eq.7. The median filter is used for smoothing and the canny filter is used for edge detection and the results are shown in Figure 3. The Cross Correlation is used for the matching which represents the degree of similarity between the images. Figure 4 shows the result for the authenticated person where the right hand image is the retrieved image and the left hand side image is the input image. The percentage of matching is 85%. When any new image is given as input, it is identified as the intruder which is shown in Figure 5. Figure 2. Query image and gray scale image Figure 3. Edge detected image and Field Oriented Image Figure.4. Final output for authenticated person Figure.5. Final output for an Intruder 5
  • 6. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 In the above figure the image which is to be authenticated is not presented in the database. Thus the person is declared as an intruder when the percentage of matching is less than 85%. Figure 6 shows the performance evaluation of the algorithm which is implemented. As the size of the database increases the percentage of the matching gradually decreases. The percentage of matching remains at 85%, for a set of 700 fingerprint images. 5. CONCLUSION In our proposed system we have implemented the Cross Correlation technique in the matching stage. Correlation based techniques are a promising approach to fingerprint authentication. And median filter is used for the image smoothing and the canny filter is used for the edge detection. And median filter is a more robust method than traditional linear filtering. Traditional techniques, like minutiae-based techniques, do not exploit all the information of the low resolution and damaged images. But with the proposed system even with the damaged or partial fingerprint image it is possible to check that a person is authenticated or an intruder. Figure.6. Performance graph REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] Henry C. Lee and R. E. Gaensslen, editors, Advances in Fingerprint Technology, Elsevier, New York, 1991. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer, 2003. Shlomo Greenberg, Mayer Aladjem, Daniel Kogan and Itshak Dimitrov, “Fingerprint Image Enhancement using Filtering Techniques”, 15th International conference on Pattern recognition, 3-7 September 2000. Almudena Lindoso, Luis Entrena, Judith Liu-Jimneez, Enrique San Milan, “Increasing security with correlation based fingerprinting”, 41st annual IEEE International Carnahan Conference on security technology, 8-11 October 2007. Anil Jain , Lin Hong, and Ruud Bolle, “On-line fingerprint verification”, IEEE transactions on pattern analysis and machine intelligence, Vol. 19, no. 4, April 1997. Abhishek Nagar, Karthik Nandakumar, Anil K. Jain: Securing fingerprint template: Fuzzy vault with minutiae descriptors. International Conference on Pattern Recognition 2008: pp.1-4 Award winning papers from the 19th International Conference on Pattern Recognition (ICPR), Megha Kulshrestha, Pooja, V. K. Banga, “Selection of an Optimal Algorithm for Fingerprint Matching” World Academy of Science, Engineering and Technology 75 2011 Rajeswari Mukesh, Dr. A. Damodaram, Dr. V. Subbiah Bharathi, “A Robust Finger Print based TwoServer Authentication and Key Exchange System”. 6
  • 7. [9] [10] [11] [12] [13] [14] International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 Kong A., Zhang D. And Mohamed K., “Three measures for secure palmprint identification”, Pattern Recognition, 2008, 41, pp.1329-1337. M. Zsolt, K.V., “A Fingerprint Verification System Based on Triangular Matching and Dynamic Time Warping”, IEEE transactions on Pattern Analysis and Machine Intelligence, 2000, 22(11), pp.1266-1276. Andrew B.J., Alwyn G. and David C.L., “Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs”, IEEE transactions on Pattern Analysis and Machine Intelligence, 2006, 28 (12), pp. 1892-1901. Lingyu Wang , Graham Leedham , David Siu-Yeung Cho, “Minutiae feature analysis for infrared hand vein pattern biometrics”, Pattern Recognition, 2008, 41 (3), pp. 920-929. Kumar A., Zhang D., “Combining fingerprint, palm print and hand-shape for user authentication”, The 18th International Conference on Pattern Recognition (ICPR'06), 2006, 4, pp.549-552 Vaidehi. V , Naresh Babu N T, Ponsamuel Mervin.A, Praveen Kumar.S, Velmurugan.S, Balamurali, Girish Chandra, “Fingerprint Identification Using Cross Correlation of Field Orientation”, ICoAC 2010 IEEE. Authors Prof.V.Karthikeyan has received his Bachelor’s Degree in Electronics and Communication Engineering from PGP college of Engineering and Technology in 2003, Namakkal, India, He received a Masters Degree in Applied Electronics from KSR college of Technology, Erode in 2006 He is currently working as Assistant Professor in SVS College of Engineering and Technology, Coimbatore. He has about 8 years of Teaching Experience Prof. V. J. Vijayalakshmi has completed her Bachelor’s Degree Electrical & Electronics Engineering from Sri Ramakrishna Engineering College, Coimbatore, India. She finished her Masters Degree in Power Systems Engineering from Anna University of Technology, Coimbatore, She is currently working as Assistant Professor in Sri Krishna College of Engineering and Technology, Coimbatore She has about 5 years of Teaching Experience. 7