Beruflich Dokumente
Kultur Dokumente
1. INTRODUCTION
1.1. PREAMBLE
Recognition of persons on the basis of biometric features is an emerging phenomenon in our society. It has received increasing attention in recent years due to the need for security in a wide range of applications, such as replacement of the personal identification number (PIN) in banking and retail business, security of transactions across computer networks, high-security wireless access, televoting, and admission to restricted areas. For wide application and user-acceptance of fingerprint recognition, improvement of the recognition performance is still necessary. New
algorithms may reduce the error rates to levels that are acceptable for application of biometric authentication, and enable the use of low-cost sensors that can be integrated easily in wireless hardware or smart cards. Next, users will accept biometrics as a part of modern society if they have experienced the benefits of reliable and high-quality biometric systems.
Fingerprints are easily accessible, recognition requires minimal effort on the part of the user, it does not capture information other than strictly necessary for the recognition process (such as race, health, etc.), and provides relatively good performance. Several problems, with their associated algorithms and systems, can be defined in the context of fingerprint recognition, being verification, identification, and classification. The term recognition is used in a general sense and encompasses all three kinds of tasks.
Department of MCA
2012-2013
Verification (or authentication) systems use fingerprint technology to verify the claimed identity of a person. Such systems receive two inputs: the claimed identity of the person requesting authentication (usually a username or smart card) and the live-scanned fingerprint of that person. The claimed identity is used to retrieve a reference fingerprint stored in a database and is matched (compared) against the currently offered fingerprint (the test fingerprint). This results in a measure of similarity, on which the verification decision is based. Identification systems identify a person based on a fingerprint. Such systems receive only one input, namely the live-scanned query fingerprint. A database is searched for a matching fingerprint, which is also referred to as one-to-many matching. A person is identified if a matching fingerprint is found in the database. The system assigns the identity that corresponds to the matching fingerprint to the person that requests identification. On the other hand, if no matching fingerprint is found in the database, the person is rejected. For both verification and identification systems, enrollment is an important step. This is the process of taking reference fingerprints of all users and storing these in the database for comparison. The task of a Classification system is to determine which class (or group) the input fingerprint belongs to. These systems also receive only a single fingerprint as input. A well-known set of categories is formed by the Henry classes.
Department of MCA
2012-2013
The goal of manipulation can be divided into three categories: Image Processing (image in -> image out) Image Analysis (image in -> measurements out) Image Understanding (image in -> high-level description out)
The most requirements for image processing of images is that the images be available in digitized form, that is, arrays of finite length binary words. For digitization, the given Image is sampled on a discrete grid and each sample or pixel is quantized using a finite number of bits. The digitized image is processed by a computer. To display a digital image, it is first converted into analog signal, which is scanned onto a display. Image processing is the study of any algorithm that takes an image as input and returns an image as output. This includes some processing like:
Department of MCA
2012-2013
Fingerprint Identification Application Display image and printing, image editing and manipulation,
4 image
enhancement, feature detection, image compression. Image and Video Processing enables you to acquire, process, and analyze images and video for algorithm development and system design.
Fingerprint recognition is one of the most popular and successful methods used for person identification, which takes advantage of the fact that the fingerprint has some unique characteristics called minutiae; which are points where a curve track finishes, intersect with other track or branches off. A critical step in studying the statistics of fingerprint minutiae is to reliably extract minutiae from the fingerprint images. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in skin and impression conditions. Thus, image enhancement techniques are employed prior to minutiae extraction to obtain a more reliable estimation of minutiae locations. Then the extracted minutiae are compared with stored minutiae features of other images and verified to find match exist or not. This application is mainly developed for helping police department in the identification of criminals. The most commonly found evidence on crime scene is fingerprint, so this application will be helpful for police identifying criminal on spot instead of taking fingerprints to laboratory and identifying it.
Department of MCA
2012-2013
In the first step we acquire fingerprint image using camera. The captured image is the input in the application to find whether a matching fingerprint exist in the database or not. The database will be consisting of collected fingerprint images, its features and details of the person related to it. The capture image is preprocessed to enhance is its quality. After enhancing the image is converted to binary image. Next to extract the features binarized image is reduced to one pixel width. Then in the next step we extract the minutiae features from the image and a matching process is performed with other images in the database.
Department of MCA
2012-2013
Department of MCA
2012-2013
2. LITERATURE SURVEY
2.1. INTRODUCTION
Biometric identification is one of the most amazing technological innovation of the recent history and fingerprint identification being the most promising form of it and most widely used. Out of a number of possible ways to match fingerprints, minutiae based matching is perhaps the most widely studied and have yielded better results in the past as compared to the other methods. Fingerprint identification is based upon unique and invariant features of fingerprints. Fingerprints are graphical flow like ridges present in human fingers which are formed during embryonic development, caused by ridges underneath the skin. According to FBI, the odds of two people sharing the same fingerprints are one in 64,000,000,000. Fingerprints differ even for ten fingers of the same person.
Department of MCA
2012-2013
Fig 2.2
2.3. Advantages:
Some of the advantages high of fingerprint low identification for fraud are: and high high
distinctiveness,
permanence,
potential
performance with medium collectivity and acceptability. It also has certain drawbacks like need for training, finger and hand impairment, worn ridges etc acting as a barrier to universality.
Department of MCA
2012-2013
The method of identification is suitable for workstation access control , physical access control, Information system control etc.
2.4.1.
Orientation Computation
The orientation field of a fingerprint image represents the directionality of ridges. Fingerprint image typically divided into number of non-overlapping blocks and an orientation representative of the ridges in the block is assigned to the block based on grayscale gradients in the block. Theblock size depends on the inter-ridge distance, i.e. it should include at least one ridge and one valley in a block. The block orientation can be determined from the pixel gradients by averaging or voting (optimization).
2.4.2.
Image segmentations
of partitioning
a digital image into multiple segments. The goal of segmentation is to simplify and/or change the representation of an image into something that is more meaningful and easier to analyze. Image segmentation is typically used to locate objects and boundaries (lines, curves, etc.) in images. More precisely, image segmentation is the process of assigning a label to every pixel in an image such that pixels with the same label share certain visual characteristics.
Department of MCA
2012-2013
10
2.4.3.
Image Enhancement
Image enhancement is the improvement of digital image quality (wanted e.g. for visual inspection or for machine analysis), without knowledge about the source of degradation. If the source of degradation is known, one calls the process image restoration. Both are iconical processes, viz. input and output are images.
2.5.1.
Graph based fingerprint matching algorithm was presented by Isener et. Al [3] . This method however, is time consuming and complicated as complex algorithms like graph isomorphism has to be adopted in the system. An improvement was presented by Hrechak et.al[4]
Department of MCA
2012-2013
11
Department of MCA
2012-2013
12
3. METHODOLOGY
3.1. Image Acquisition
The fingerprint image can obtained by capturing fingerprint image on camera or phone.
fingerprint
recognition
techniques
fingerprint image quality. In an ideal fingerprint image, ridges and valleys alternate and flow in a locally constant direction. The goal of an enhancement algorithm is to improve the clarity of the ridge structures in the recoverable regions and mark the unrecoverable regions as too noisy for further processing. For image Enhancement we have used Linear Contrast Stretching and histogram equalization techniques
Department of MCA
2012-2013
13
Department of MCA
2012-2013
14
Department of MCA
2012-2013
15
4. MINUTIAE EXTRACTION
The image obtained after binarization and thinning is ready to extract the features. If all the white pixels are 1 and black pixels are 0 then the width of the rigid lines of fingerprint is represented by only one zero pixel. In the image each pixel is surrounded by eight pixels and called neighbor pixel. In any point of a rigid line the summation of the neighbor pixels must be 6. If the rigid line is terminated then the summation will be changed and that will be 7. On the other hand in a point of bifurcation the summation will be 5 . To develop this algorithm we have to consider 3x3 window and the window will scan the whole image where the center pixel is black or 0. After passing the image through the algorithm we will get a new image where each bifurcation and termination is represented by a dot of a white pixel.
Fig 4.1 Fingerprint Minutiae feature The following algorithm and the Fig 4.2 representing the whole process.
Department of MCA
2012-2013
16
Fig 4.2: (a) 3x3 Window for searching minutiae (b) rigid line with Pc=6 (c) bifurcation with Pc=5 (d) termination with Pc= 7
After implementing the algorithm in Eclipse platform using javaCV library which is wrapper for openCV library the following image is obtained. Each dot in the image represents either a bifurcation or a termination of a rigid line. The image data provide the coordinate of all bifurcating or terminating points of the input fingerprint image. This paved the way for the recognition of the image as these are the required features of an fingerprint image.
Department of MCA
2012-2013
17
(a)
(b)
Department of MCA
2012-2013
18
The Images are matched with each and every images in the database until a matching is found or matched with all images in database if there does not exist a matching image.
Department of MCA
2012-2013
19
6.1.INTRODUCTION
Several techniques are there for matching fingerprints Minutiae points. Computation of these minutiae points requires several tasks like calculating distance between points, finding angle between ridges, finding match for images with different orientation. Since the images of fingerprint is often poor quality the preprocessing of the images highly challenging to obtain clear image fingerprint which tend to loss features or obtain spurious minutiae. In the process of minutiae extraction many spurious minutiae gets extracted dealing with this problem is another challenging task The project developed is for clear fingerprint images of same size and orientation. With the clear and identical images the matching works accurately.
Department of MCA
2012-2013
20
The images matched are identical and the result of match was 90% accurate Test case V: Finding Matching Image in the database 1 . The query image was identical to one of the image in the database and result obtained is matched image. 2. The query image was not present in the database. The result obtained was no match found.
7. CONCLUSION
The project Fingerprint Identification Application is developed for finding fingerprint match between two images. The application works well for identical images. The methods used in the project for processing fingerprint images are Image Enhancement, Binarization, Thinning,Minutiae extract using 3x3 window image for convolution, Minutiae matching on distance between features. The application works well for images of good quality and same orientation and size.
Department of MCA
2012-2013
21
8. FUTURE ENHANCEMENT
The proposed system works well on the images of good quality and minutiae matching are done on distance based method and correlation based method. The method used for minutiae extraction generates spurious minutiae. The application can be made to work on images of low quality by improving the image and accuracy on minutiae extraction can be made much accurate to eliminate spurious minutiae, minutiae matching techniques can be made finding angle between points. The fingerprint images captured may often vary in their orientation so application can be made match identical images in different orientation.
Department of MCA
2012-2013
22
9. BIBLOGRAPHY
[1] Bebis, G., Deaconu, T., Georgiopaulos, M., 1999. Fingerprint Identification using Delaunay Triangulation. IEEE Transactions on Information Intelligence and Systems, 452459. [2] Jain A, Hong L, Bolle R. On-line fingerprint verification. IEEE Transactions on Pattern Analysis and Machine Intelligence 1997;19:30214. [3] D.K. Isenor, S.G. Zaky, Fingerprint identification using graph matching, Pattern Recognition 19 (2) (1986) 113122. [4] A.K. Hrechak, J.A. McHugh, Automated fingerprint recognition using structural matching, Pattern Recognition 23 (1990) 893904.
BOOKS: Digital Image Processing Computer Vision For Visual Effects Authors: Rafael C. Gonzales and Richard E. Woods Richard J. RADKE
Department of MCA
2012-2013