SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

An Efficient Method for Recognizing the Low
Quality Fingerprint Verification by Means of Cross
Correlation
V.Karthikeyan1 and V.J.Vijayalakshmi2
1
2

Department of ECE, SVSCE, Coimbatore, India
Department of EEE, SKCET, Coimbatore, India

ABSTRACT
In this paper, we propose an efficient method to provide personal identification using fingerprint to get
better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding
minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality
fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint
verification system is capable of dealing with low quality images from which no minutiae can be extracted
reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and
partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it
converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the
image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and
the highest correlated image is taken as the output. The result gives a good recognition rate, as the
proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint
identification.

Keywords
Fingerprints, matching, verification, orientation field, cross-correlation

1. INTRODUCTION
Conventional security systems used either knowledge based methods (passwords or PIN), and
token-based methods (passport, driver license, ID card) and were prone to fraud because PIN
numbers could be forgotten or hacked and the tokens could be lost, duplicated or stolen [7].
Accurate and automatic identification and authentication of users is a fundamental problem in
today’s computing world [8]. In the last few years, biometric authentication has become an
increasingly important issue in modern society. The biometrics are enhancing our ability to
identify people. There are two types of biometric techniques: 1. Physiological (face recognition,
iris recognition, finger print recognition, retina recognition). 2. Behavioral (signature recognition,
keystroke recognition and voice recognition). There are various biometric identification
techniques such as palm print [9], fingerprint [10], face [11], vein [12] or their combinations [13].
Among all the biometric techniques, today fingerprints are the most widely used biometric
features for personal identification because of their high acceptability, immutability and
individuality [14]. Fingerprint verification is one of the most reliable and personal identification
methods [1]. Fingerprint images are widely used in many systems such as personal identification,
access control, internet authentication, forensics, e-banking, etc. Due to its permanence,
uniqueness and distinctiveness [2] In the Table I various biometric technologies have been
compared based on various characteristics.
DOI: 10.5121/ijci.2013.2501

1
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013
TABLE I
Comparison of Various Biometric Technologies
Biometric
Identifier

Um

Face

H

Di

Pm

Co

Pf

Ac

Ci

L

M

H

L

H

H

Fingerprint

M

H

H

M

H

M

M

Hand
Geometry

M

M

M

H

M

M

M

Iris

H

H

H

M

H

L

L

Keystroke

L

L

L

M

L

M

M

Signature

L

L

L

M

L

H

H

Voice

M

L

L

M

L

H

H

Un- Universality
Ci– Circumvention
Co – Collectability

Pf – Performance
Pm– Permanence
M – Medium

Di– Distinct
L – Low
H- High

Usually, fingerprint verification is performed manually by professional forensic experts.
However, manual fingerprint verification is very tedious. Hence, Automatic Fingerprint
Identification Systems (AFIS) are in great demand. There are a number of design factors like lack
of reliable minutiae extraction algorithms, difficulty in quantitatively defining a reliable match
between fingerprint images, fingerprint classification, etc. creates bottlenecks in achieving the
desired performance [3]. Fingerprint has been widely used for personal identification for several
centuries [4]. Minutiae extraction - based fingerprint identification is a popular method. But the
cross correlation based technique is a promising approach to fingerprint authentication for the
new generation of high resolution and touch less fingerprint sensors. This paper proposes a novel
scheme, namely, Cross Correlation of Field Orientation (CCFO) that cascades Cross Correlation
technique with Field Orientation technique to do fingerprint authentication. This paper is
organized as follows: Section II describes about the proposed system including the preprocessing, field orientation estimation and matching modules. In Section III some experimental
results are presented. Finally, the conclusions are discussed in Section IV.

2. PROPOSED SYSTEM ARCHITECTURE
The overall architecture of the proposed biometric identification system is illustrated in Figure 1.
Each of the constituent modules are described in this section, When compared to the feature
extraction method the Cross Correlation of Field Orientation method has several features that
accounts for its improved performance of fingerprint authentication. Using the OFM the images
are converted into field orientation images that which increase the immunity to noise. Cross
correlation of images used for matching is a very simple and accurate method for measuring
image similarities [6]. Rao’s algorithm is used for measuring the field orientation [5]. The
following steps are involved in the Rao’s algorithm. The image is passed through a low pass filter
which smoothes the image. The low pass filter used is median filter. The Gradient of the
smoothened image is calculated for x and y axis. The second order gradients are calculated. The
resultant field orientation is then divided into N × N pixel and the orientation is represented by
arrows for each block. Then the template is cross correlated with the input image for matching.
Theme based on the cross correlation value the decision is made. Some of the pre-processing
2
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

steps have to be done before getting the Field Orientation image. These steps are done for getting
better and accurate results. There are two steps involved in pre-processing. They are smooth and
edge detection. Smoothing is a technique used to reduce the noise within an image. It is an
important step in image processing. It would be difficult to process the high frequency images
which are due to the drastic variation in the pixel intensity. Thus smoothing is done before field
orientation to reduce the variations in the pixel intensity. The median filter is used for smoothing
in this proposed method. The median filter which is a nonlinear filter is an effective method that
can suppress isolated noise without blurring sharp edges. It helps to remove the impulse noise
from the image, while preserving the rapid intensity changes. Specifically, the median filter
replaces a pixel value at the center of the median of all pixel value in the neighborhood. Median
filter is a more robust method than the traditional linear filtering, because it preserves the sharp
edges while removing the noise.

Figure 1. System Architecture

The median filter in 1-d works as, it just sorts the value and considers the middle value as median.
The 2-d median filter is illustrated as below
G (x, y) =median {a (I, j), (I, j) Єw}

(1)

Where w represents a neighborhood centered around location (x, y) in the image and x and y are
the random variables representing the variations along two directions. Edge detection is one of the
most commonly used operations in image analysis. It is a fundamental tool used in most image
processing applications to obtain information from the frames as a precursor step to feature
extraction and feature detection. It refers to the process of identifying and locating sharp
discontinuities in an image. The edges form the outline of an object. An edge is the boundary
between an object and the background. This process detects outlines of an object and boundaries
between objects and the background in the image. Thus the result of applying an edge detector to
an image may lead to a set of connected curves that indicate the boundaries of surface markings
as well as curves that correspond to discontinuities in surface orientation. Thus, applying an edge
3
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

detection algorithm to an image may significantly reduce the amount of data to be processed and
may therefore filter out information that may be regarded as less relevant, while preserving the
important structural properties of an image. Canny filter is extensively used for edge detection.
The Canny edge detection algorithm is one of the best optimal edge detectors. The advantage is
that it has a low error rate. The canny edge detector finds the image gradient to highlight regions
with high spatial derivatives. The gradient of the smoothened image is calculated for x, y axis. Let
it be Gx in x direction and Gy in Y direction. The second order gradients are calculated using the
following equations
Gxx = Gx * GxT
Gxy = Gx * GyT
Gyy = Gy * GyT

(2)
(3)
(4)

Where Gxx, Gxy, Gyy are the second order gradients of Gx and Gy. GxT, GyT are the transpose
matrices of Gx and Gy respectively.

3. FIELD ORIENTATION ESTIMATION
Field orientation of a fingerprint image is an efficient technique used to extract the directional
properties of the image and not the actual image. However, the gradients are orientations at pixel
scale, while the orientation field describes the orientation of the ridge valley structures. Therefore,
the field orientation can be derived from the gradients by performing some operation on the
gradients.The field orientation is calculated using the following equations.

Θ=

+

+

The resultant field orientation is then divided into N×N pixel and the orientation is represented by
arrows for each block. The Cross Correlation is a technique that which used to determine the
degree of similarity between two similar images. The Cross Correlation computation of Template
(T) and Input (I) image is determined by the following equation.
CC (T, I) =
Here both T and I represent the field orientation images. In the frequency domain the cross
correlation can be calculated by using the following formula.
CC (T, I) = IFT (F’ (T) * F (I))

(9)

Here IFT represents the Inverse Fourier Transform. When compared to the Time domain
computation, the Fourier domain is more efficient. Here, F’ (T) -Complex conjugate of the
Fourier Transform of the Template image. F (I) - the Fourier Transform of Input image The cross
correlation value is normalized by dividing the value obtained by total number of pixels.
4
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

4. EXPERIMENTAL RESULTS
The efficiency of the proposed approach is tested on well known MIT database. This database
contains the low resolution fingerprints. We used 1000 fingerprints of 200 classes for the
experiment. The query image is obtained from fingerprint reader and then it is converted into a
grayscale image as shown in Figure 2. From the query image the field orientation image is
calculated using Eq.2 to Eq.7. The median filter is used for smoothing and the canny filter is used
for edge detection and the results are shown in Figure 3. The Cross Correlation is used for the
matching which represents the degree of similarity between the images. Figure 4 shows the result
for the authenticated person where the right hand image is the retrieved image and the left hand
side image is the input image. The percentage of matching is 85%. When any new image is given
as input, it is identified as the intruder which is shown in Figure 5.

Figure 2. Query image and gray scale image

Figure 3. Edge detected image and Field Oriented Image

Figure.4. Final output for authenticated person

Figure.5. Final output for an Intruder
5
International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013

In the above figure the image which is to be authenticated is not presented in the database. Thus
the person is declared as an intruder when the percentage of matching is less than 85%. Figure 6
shows the performance evaluation of the algorithm which is implemented. As the size of the
database increases the percentage of the matching gradually decreases. The percentage of
matching remains at 85%, for a set of 700 fingerprint images.

5. CONCLUSION
In our proposed system we have implemented the Cross Correlation technique in the matching
stage. Correlation based techniques are a promising approach to fingerprint authentication. And
median filter is used for the image smoothing and the canny filter is used for the edge detection.
And median filter is a more robust method than traditional linear filtering. Traditional techniques,
like minutiae-based techniques, do not exploit all the information of the low resolution and
damaged images. But with the proposed system even with the damaged or partial fingerprint
image it is possible to check that a person is authenticated or an intruder.

Figure.6. Performance graph

REFERENCES
[1]
[2]
[3]

[4]

[5]
[6]

[7]
[8]

Henry C. Lee and R. E. Gaensslen, editors, Advances in Fingerprint Technology, Elsevier, New York,
1991.
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer,
2003.
Shlomo Greenberg, Mayer Aladjem, Daniel Kogan and Itshak Dimitrov, “Fingerprint Image
Enhancement using Filtering Techniques”, 15th International conference on Pattern recognition, 3-7
September 2000.
Almudena Lindoso, Luis Entrena, Judith Liu-Jimneez, Enrique San Milan, “Increasing security with
correlation based fingerprinting”, 41st annual IEEE International Carnahan Conference on security
technology, 8-11 October 2007.
Anil Jain , Lin Hong, and Ruud Bolle, “On-line fingerprint verification”, IEEE transactions on pattern
analysis and machine intelligence, Vol. 19, no. 4, April 1997.
Abhishek Nagar, Karthik Nandakumar, Anil K. Jain: Securing fingerprint template: Fuzzy vault with
minutiae descriptors. International Conference on Pattern Recognition 2008: pp.1-4 Award winning
papers from the 19th International Conference on Pattern Recognition (ICPR),
Megha Kulshrestha, Pooja, V. K. Banga, “Selection of an Optimal Algorithm for Fingerprint
Matching” World Academy of Science, Engineering and Technology 75 2011
Rajeswari Mukesh, Dr. A. Damodaram, Dr. V. Subbiah Bharathi, “A Robust Finger Print based TwoServer Authentication and Key Exchange System”.

6
[9]
[10]

[11]

[12]
[13]
[14]

International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013
Kong A., Zhang D. And Mohamed K., “Three measures for secure palmprint identification”, Pattern
Recognition, 2008, 41, pp.1329-1337.
M. Zsolt, K.V., “A Fingerprint Verification System Based on Triangular Matching and Dynamic
Time Warping”, IEEE transactions on Pattern Analysis and Machine Intelligence, 2000, 22(11),
pp.1266-1276.
Andrew B.J., Alwyn G. and David C.L., “Random Multispace Quantization as an Analytic
Mechanism for BioHashing of Biometric and Random Identity Inputs”, IEEE transactions on Pattern
Analysis and Machine Intelligence, 2006, 28 (12), pp. 1892-1901.
Lingyu Wang , Graham Leedham , David Siu-Yeung Cho, “Minutiae feature analysis for infrared
hand vein pattern biometrics”, Pattern Recognition, 2008, 41 (3), pp. 920-929.
Kumar A., Zhang D., “Combining fingerprint, palm print and hand-shape for user authentication”,
The 18th International Conference on Pattern Recognition (ICPR'06), 2006, 4, pp.549-552
Vaidehi. V , Naresh Babu N T, Ponsamuel Mervin.A, Praveen Kumar.S, Velmurugan.S, Balamurali,
Girish Chandra, “Fingerprint Identification Using Cross Correlation of Field Orientation”, ICoAC
2010 IEEE.

Authors
Prof.V.Karthikeyan has received his Bachelor’s Degree in Electronics and Communication
Engineering from PGP college of Engineering and Technology in 2003, Namakkal, India, He
received a Masters Degree in Applied Electronics from KSR college of Technology, Erode in
2006 He is currently working as Assistant Professor in SVS College of Engineering and
Technology, Coimbatore. He has about 8 years of Teaching Experience
Prof. V. J. Vijayalakshmi has completed her Bachelor’s Degree Electrical & Electronics
Engineering from Sri Ramakrishna Engineering College, Coimbatore, India. She finished her
Masters Degree in Power Systems Engineering from Anna University of Technology,
Coimbatore, She is currently working as Assistant Professor in Sri Krishna College of
Engineering and Technology, Coimbatore She has about 5 years of Teaching Experience.

7

Mais conteúdo relacionado

Mais procurados

Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationIOSR Journals
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityeSAT Publishing House
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forprjpublications
 
Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008IJARTES
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...IJCI JOURNAL
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiDr. Vinayak Bharadi
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNDETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNIJCSEIT Journal
 
Improvement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition ProcessImprovement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition Processijbbjournal
 
An evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a reviewAn evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a revieweSAT Journals
 
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsIJRES Journal
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...CSCJournals
 
Recent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systemsRecent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systemseSAT Journals
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsIRJET Journal
 

Mais procurados (17)

Ed34785790
Ed34785790Ed34785790
Ed34785790
 
Importance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing SegmentationImportance of Mean Shift in Remote Sensing Segmentation
Importance of Mean Shift in Remote Sensing Segmentation
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
 
A novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm forA novel embedded hybrid thinning algorithm for
A novel embedded hybrid thinning algorithm for
 
Ijartes v1-i2-008
Ijartes v1-i2-008Ijartes v1-i2-008
Ijartes v1-i2-008
 
F045033337
F045033337F045033337
F045033337
 
154 158
154 158154 158
154 158
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
 
Signature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertatiSignature recognition using clustering techniques dissertati
Signature recognition using clustering techniques dissertati
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNDETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
 
Improvement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition ProcessImprovement of the Fingerprint Recognition Process
Improvement of the Fingerprint Recognition Process
 
An evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a reviewAn evaluation approach for detection of contours with 4 d images a review
An evaluation approach for detection of contours with 4 d images a review
 
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition AlgorithmsGesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
Gesture Recognition Review: A Survey of Various Gesture Recognition Algorithms
 
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
 
Recent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systemsRecent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systems
 
Q0460398103
Q0460398103Q0460398103
Q0460398103
 
A Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching AlgorithmsA Comparative Study of Fingerprint Matching Algorithms
A Comparative Study of Fingerprint Matching Algorithms
 

Destaque

Presentación Aparato Reproductor Humano
Presentación Aparato Reproductor HumanoPresentación Aparato Reproductor Humano
Presentación Aparato Reproductor Humanoa arg
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingACMBangalore
 
Quantifying Outreach
Quantifying OutreachQuantifying Outreach
Quantifying OutreachMichael King
 
Optimize UI Implementation by Saeful
Optimize UI Implementation by SaefulOptimize UI Implementation by Saeful
Optimize UI Implementation by SaefulAgate Studio
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome EconomyHelge Tennø
 

Destaque (8)

Presentación Aparato Reproductor Humano
Presentación Aparato Reproductor HumanoPresentación Aparato Reproductor Humano
Presentación Aparato Reproductor Humano
 
Opportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputingOpportunites and Challenges in Cloud COmputing
Opportunites and Challenges in Cloud COmputing
 
Quantifying Outreach
Quantifying OutreachQuantifying Outreach
Quantifying Outreach
 
Optimize UI Implementation by Saeful
Optimize UI Implementation by SaefulOptimize UI Implementation by Saeful
Optimize UI Implementation by Saeful
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 

Semelhante a An efficient method for recognizing the low quality fingerprint verification by means of cross correlation

A Review on Edge Detection Algorithms in Digital Image Processing Applications
A Review on Edge Detection Algorithms in Digital Image Processing ApplicationsA Review on Edge Detection Algorithms in Digital Image Processing Applications
A Review on Edge Detection Algorithms in Digital Image Processing Applicationsrahulmonikasharma
 
Automatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureAutomatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureIRJET Journal
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesIAEME Publication
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSIMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSADEIJ Journal
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEIAEME Publication
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)IAESIJEECS
 
Paper id 312201522
Paper id 312201522Paper id 312201522
Paper id 312201522IJRAT
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesMade Artha
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionIJCI JOURNAL
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYDCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYIAEME Publication
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationIIRindia
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONijcsity
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paperCharlie716895
 
A Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different MethodsA Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different MethodsIJMER
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION ijcsity
 

Semelhante a An efficient method for recognizing the low quality fingerprint verification by means of cross correlation (20)

1834 1840
1834 18401834 1840
1834 1840
 
A Review on Edge Detection Algorithms in Digital Image Processing Applications
A Review on Edge Detection Algorithms in Digital Image Processing ApplicationsA Review on Edge Detection Algorithms in Digital Image Processing Applications
A Review on Edge Detection Algorithms in Digital Image Processing Applications
 
Automatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone FractureAutomatic Detection of Radius of Bone Fracture
Automatic Detection of Radius of Bone Fracture
 
Comparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniquesComparative performance analysis of segmentation techniques
Comparative performance analysis of segmentation techniques
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESSIMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
IMPROVEMENT OF THE FINGERPRINT RECOGNITION PROCESS
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
 
22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)22 29 dec16 8nov16 13272 28268-1-ed(edit)
22 29 dec16 8nov16 13272 28268-1-ed(edit)
 
Paper id 312201522
Paper id 312201522Paper id 312201522
Paper id 312201522
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Comparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print imagesComparative study of various enhancement techniques for finger print images
Comparative study of various enhancement techniques for finger print images
 
Enhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print RecognitionEnhanced Thinning Based Finger Print Recognition
Enhanced Thinning Based Finger Print Recognition
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYDCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITY
 
A Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image SegmentationA Review of Edge Detection Techniques for Image Segmentation
A Review of Edge Detection Techniques for Image Segmentation
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITIONPREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 
A review on digital image processing paper
A review on digital image processing paperA review on digital image processing paper
A review on digital image processing paper
 
A Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different MethodsA Review Paper on Fingerprint Image Enhancement with Different Methods
A Review Paper on Fingerprint Image Enhancement with Different Methods
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

An efficient method for recognizing the low quality fingerprint verification by means of cross correlation

  • 1. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 An Efficient Method for Recognizing the Low Quality Fingerprint Verification by Means of Cross Correlation V.Karthikeyan1 and V.J.Vijayalakshmi2 1 2 Department of ECE, SVSCE, Coimbatore, India Department of EEE, SKCET, Coimbatore, India ABSTRACT In this paper, we propose an efficient method to provide personal identification using fingerprint to get better accuracy even in noisy condition. The fingerprint matching based on the number of corresponding minutia pairings, has been in use for a long time, which is not very efficient for recognizing the low quality fingerprints. To overcome this problem, correlation technique is used. The correlation-based fingerprint verification system is capable of dealing with low quality images from which no minutiae can be extracted reliably and with fingerprints that suffer from non-uniform shape distortions, also in case of damaged and partial images. Orientation Field Methodology (OFM) has been used as a preprocessing module, and it converts the images into a field pattern based on the direction of the ridges, loops and bifurcations in the image of a fingerprint. The input image is then Cross Correlated (CC) with all the images in the cluster and the highest correlated image is taken as the output. The result gives a good recognition rate, as the proposed scheme uses Cross Correlation of Field Orientation (CCFO = OFM + CC) for fingerprint identification. Keywords Fingerprints, matching, verification, orientation field, cross-correlation 1. INTRODUCTION Conventional security systems used either knowledge based methods (passwords or PIN), and token-based methods (passport, driver license, ID card) and were prone to fraud because PIN numbers could be forgotten or hacked and the tokens could be lost, duplicated or stolen [7]. Accurate and automatic identification and authentication of users is a fundamental problem in today’s computing world [8]. In the last few years, biometric authentication has become an increasingly important issue in modern society. The biometrics are enhancing our ability to identify people. There are two types of biometric techniques: 1. Physiological (face recognition, iris recognition, finger print recognition, retina recognition). 2. Behavioral (signature recognition, keystroke recognition and voice recognition). There are various biometric identification techniques such as palm print [9], fingerprint [10], face [11], vein [12] or their combinations [13]. Among all the biometric techniques, today fingerprints are the most widely used biometric features for personal identification because of their high acceptability, immutability and individuality [14]. Fingerprint verification is one of the most reliable and personal identification methods [1]. Fingerprint images are widely used in many systems such as personal identification, access control, internet authentication, forensics, e-banking, etc. Due to its permanence, uniqueness and distinctiveness [2] In the Table I various biometric technologies have been compared based on various characteristics. DOI: 10.5121/ijci.2013.2501 1
  • 2. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 TABLE I Comparison of Various Biometric Technologies Biometric Identifier Um Face H Di Pm Co Pf Ac Ci L M H L H H Fingerprint M H H M H M M Hand Geometry M M M H M M M Iris H H H M H L L Keystroke L L L M L M M Signature L L L M L H H Voice M L L M L H H Un- Universality Ci– Circumvention Co – Collectability Pf – Performance Pm– Permanence M – Medium Di– Distinct L – Low H- High Usually, fingerprint verification is performed manually by professional forensic experts. However, manual fingerprint verification is very tedious. Hence, Automatic Fingerprint Identification Systems (AFIS) are in great demand. There are a number of design factors like lack of reliable minutiae extraction algorithms, difficulty in quantitatively defining a reliable match between fingerprint images, fingerprint classification, etc. creates bottlenecks in achieving the desired performance [3]. Fingerprint has been widely used for personal identification for several centuries [4]. Minutiae extraction - based fingerprint identification is a popular method. But the cross correlation based technique is a promising approach to fingerprint authentication for the new generation of high resolution and touch less fingerprint sensors. This paper proposes a novel scheme, namely, Cross Correlation of Field Orientation (CCFO) that cascades Cross Correlation technique with Field Orientation technique to do fingerprint authentication. This paper is organized as follows: Section II describes about the proposed system including the preprocessing, field orientation estimation and matching modules. In Section III some experimental results are presented. Finally, the conclusions are discussed in Section IV. 2. PROPOSED SYSTEM ARCHITECTURE The overall architecture of the proposed biometric identification system is illustrated in Figure 1. Each of the constituent modules are described in this section, When compared to the feature extraction method the Cross Correlation of Field Orientation method has several features that accounts for its improved performance of fingerprint authentication. Using the OFM the images are converted into field orientation images that which increase the immunity to noise. Cross correlation of images used for matching is a very simple and accurate method for measuring image similarities [6]. Rao’s algorithm is used for measuring the field orientation [5]. The following steps are involved in the Rao’s algorithm. The image is passed through a low pass filter which smoothes the image. The low pass filter used is median filter. The Gradient of the smoothened image is calculated for x and y axis. The second order gradients are calculated. The resultant field orientation is then divided into N × N pixel and the orientation is represented by arrows for each block. Then the template is cross correlated with the input image for matching. Theme based on the cross correlation value the decision is made. Some of the pre-processing 2
  • 3. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 steps have to be done before getting the Field Orientation image. These steps are done for getting better and accurate results. There are two steps involved in pre-processing. They are smooth and edge detection. Smoothing is a technique used to reduce the noise within an image. It is an important step in image processing. It would be difficult to process the high frequency images which are due to the drastic variation in the pixel intensity. Thus smoothing is done before field orientation to reduce the variations in the pixel intensity. The median filter is used for smoothing in this proposed method. The median filter which is a nonlinear filter is an effective method that can suppress isolated noise without blurring sharp edges. It helps to remove the impulse noise from the image, while preserving the rapid intensity changes. Specifically, the median filter replaces a pixel value at the center of the median of all pixel value in the neighborhood. Median filter is a more robust method than the traditional linear filtering, because it preserves the sharp edges while removing the noise. Figure 1. System Architecture The median filter in 1-d works as, it just sorts the value and considers the middle value as median. The 2-d median filter is illustrated as below G (x, y) =median {a (I, j), (I, j) Єw} (1) Where w represents a neighborhood centered around location (x, y) in the image and x and y are the random variables representing the variations along two directions. Edge detection is one of the most commonly used operations in image analysis. It is a fundamental tool used in most image processing applications to obtain information from the frames as a precursor step to feature extraction and feature detection. It refers to the process of identifying and locating sharp discontinuities in an image. The edges form the outline of an object. An edge is the boundary between an object and the background. This process detects outlines of an object and boundaries between objects and the background in the image. Thus the result of applying an edge detector to an image may lead to a set of connected curves that indicate the boundaries of surface markings as well as curves that correspond to discontinuities in surface orientation. Thus, applying an edge 3
  • 4. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 detection algorithm to an image may significantly reduce the amount of data to be processed and may therefore filter out information that may be regarded as less relevant, while preserving the important structural properties of an image. Canny filter is extensively used for edge detection. The Canny edge detection algorithm is one of the best optimal edge detectors. The advantage is that it has a low error rate. The canny edge detector finds the image gradient to highlight regions with high spatial derivatives. The gradient of the smoothened image is calculated for x, y axis. Let it be Gx in x direction and Gy in Y direction. The second order gradients are calculated using the following equations Gxx = Gx * GxT Gxy = Gx * GyT Gyy = Gy * GyT (2) (3) (4) Where Gxx, Gxy, Gyy are the second order gradients of Gx and Gy. GxT, GyT are the transpose matrices of Gx and Gy respectively. 3. FIELD ORIENTATION ESTIMATION Field orientation of a fingerprint image is an efficient technique used to extract the directional properties of the image and not the actual image. However, the gradients are orientations at pixel scale, while the orientation field describes the orientation of the ridge valley structures. Therefore, the field orientation can be derived from the gradients by performing some operation on the gradients.The field orientation is calculated using the following equations. Θ= + + The resultant field orientation is then divided into N×N pixel and the orientation is represented by arrows for each block. The Cross Correlation is a technique that which used to determine the degree of similarity between two similar images. The Cross Correlation computation of Template (T) and Input (I) image is determined by the following equation. CC (T, I) = Here both T and I represent the field orientation images. In the frequency domain the cross correlation can be calculated by using the following formula. CC (T, I) = IFT (F’ (T) * F (I)) (9) Here IFT represents the Inverse Fourier Transform. When compared to the Time domain computation, the Fourier domain is more efficient. Here, F’ (T) -Complex conjugate of the Fourier Transform of the Template image. F (I) - the Fourier Transform of Input image The cross correlation value is normalized by dividing the value obtained by total number of pixels. 4
  • 5. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 4. EXPERIMENTAL RESULTS The efficiency of the proposed approach is tested on well known MIT database. This database contains the low resolution fingerprints. We used 1000 fingerprints of 200 classes for the experiment. The query image is obtained from fingerprint reader and then it is converted into a grayscale image as shown in Figure 2. From the query image the field orientation image is calculated using Eq.2 to Eq.7. The median filter is used for smoothing and the canny filter is used for edge detection and the results are shown in Figure 3. The Cross Correlation is used for the matching which represents the degree of similarity between the images. Figure 4 shows the result for the authenticated person where the right hand image is the retrieved image and the left hand side image is the input image. The percentage of matching is 85%. When any new image is given as input, it is identified as the intruder which is shown in Figure 5. Figure 2. Query image and gray scale image Figure 3. Edge detected image and Field Oriented Image Figure.4. Final output for authenticated person Figure.5. Final output for an Intruder 5
  • 6. International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 In the above figure the image which is to be authenticated is not presented in the database. Thus the person is declared as an intruder when the percentage of matching is less than 85%. Figure 6 shows the performance evaluation of the algorithm which is implemented. As the size of the database increases the percentage of the matching gradually decreases. The percentage of matching remains at 85%, for a set of 700 fingerprint images. 5. CONCLUSION In our proposed system we have implemented the Cross Correlation technique in the matching stage. Correlation based techniques are a promising approach to fingerprint authentication. And median filter is used for the image smoothing and the canny filter is used for the edge detection. And median filter is a more robust method than traditional linear filtering. Traditional techniques, like minutiae-based techniques, do not exploit all the information of the low resolution and damaged images. But with the proposed system even with the damaged or partial fingerprint image it is possible to check that a person is authenticated or an intruder. Figure.6. Performance graph REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] Henry C. Lee and R. E. Gaensslen, editors, Advances in Fingerprint Technology, Elsevier, New York, 1991. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer, 2003. Shlomo Greenberg, Mayer Aladjem, Daniel Kogan and Itshak Dimitrov, “Fingerprint Image Enhancement using Filtering Techniques”, 15th International conference on Pattern recognition, 3-7 September 2000. Almudena Lindoso, Luis Entrena, Judith Liu-Jimneez, Enrique San Milan, “Increasing security with correlation based fingerprinting”, 41st annual IEEE International Carnahan Conference on security technology, 8-11 October 2007. Anil Jain , Lin Hong, and Ruud Bolle, “On-line fingerprint verification”, IEEE transactions on pattern analysis and machine intelligence, Vol. 19, no. 4, April 1997. Abhishek Nagar, Karthik Nandakumar, Anil K. Jain: Securing fingerprint template: Fuzzy vault with minutiae descriptors. International Conference on Pattern Recognition 2008: pp.1-4 Award winning papers from the 19th International Conference on Pattern Recognition (ICPR), Megha Kulshrestha, Pooja, V. K. Banga, “Selection of an Optimal Algorithm for Fingerprint Matching” World Academy of Science, Engineering and Technology 75 2011 Rajeswari Mukesh, Dr. A. Damodaram, Dr. V. Subbiah Bharathi, “A Robust Finger Print based TwoServer Authentication and Key Exchange System”. 6
  • 7. [9] [10] [11] [12] [13] [14] International Journal on Cybernetics & Informatics ( IJCI) Vol.2, No.5, October 2013 Kong A., Zhang D. And Mohamed K., “Three measures for secure palmprint identification”, Pattern Recognition, 2008, 41, pp.1329-1337. M. Zsolt, K.V., “A Fingerprint Verification System Based on Triangular Matching and Dynamic Time Warping”, IEEE transactions on Pattern Analysis and Machine Intelligence, 2000, 22(11), pp.1266-1276. Andrew B.J., Alwyn G. and David C.L., “Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs”, IEEE transactions on Pattern Analysis and Machine Intelligence, 2006, 28 (12), pp. 1892-1901. Lingyu Wang , Graham Leedham , David Siu-Yeung Cho, “Minutiae feature analysis for infrared hand vein pattern biometrics”, Pattern Recognition, 2008, 41 (3), pp. 920-929. Kumar A., Zhang D., “Combining fingerprint, palm print and hand-shape for user authentication”, The 18th International Conference on Pattern Recognition (ICPR'06), 2006, 4, pp.549-552 Vaidehi. V , Naresh Babu N T, Ponsamuel Mervin.A, Praveen Kumar.S, Velmurugan.S, Balamurali, Girish Chandra, “Fingerprint Identification Using Cross Correlation of Field Orientation”, ICoAC 2010 IEEE. Authors Prof.V.Karthikeyan has received his Bachelor’s Degree in Electronics and Communication Engineering from PGP college of Engineering and Technology in 2003, Namakkal, India, He received a Masters Degree in Applied Electronics from KSR college of Technology, Erode in 2006 He is currently working as Assistant Professor in SVS College of Engineering and Technology, Coimbatore. He has about 8 years of Teaching Experience Prof. V. J. Vijayalakshmi has completed her Bachelor’s Degree Electrical & Electronics Engineering from Sri Ramakrishna Engineering College, Coimbatore, India. She finished her Masters Degree in Power Systems Engineering from Anna University of Technology, Coimbatore, She is currently working as Assistant Professor in Sri Krishna College of Engineering and Technology, Coimbatore She has about 5 years of Teaching Experience. 7