Sie sind auf Seite 1von 6

A FINGER PRINT RECOGNISER USING FUZZY EVOLUTIONARY

PROGRAMMING

Author1: Author2:
K.Raghu Ram K.Krishna Chaitanya
4th E.C.E 4th E.C.E
raghuram.kolipaka@gmail.com chaitu_kolluri@yahoo.com
Newton’s Institute of Engg., Newton’s Institute of Engg.,
Macherla,Guntur(Dist.) Macherla,Guntur(Dist.)

ABSTRACT:
A fingerprint recognizing system is built with are used to identify individuals and the process of
two principal components: the fingerprint minutiae extraction. The fingerprint administrator
administrator and the fingerprint recognizer. uses the method of gray scale ridge tracing backed
Fingerprints are identified by their special up by a validating procedure to extract the
features such as ridge endings, ridge minutiae of fingerprints. The fingerprint
bifurcation, short ridges, and ridge enclosures, recognizer employs the technique of fuzzy
which are collectively called the minutiae. It evolutionary programming to match the minutiae
explains the finger print characteristics that of an input fingerprint with those from a database.

1. INTRODUCTION: professional experts. But this task has become


Fingerprints of an individual are unique and are more difficult and time consuming
normally unchanged during the whole life. This In this paper, we explain the
method has been widely used in criminal method of direct gray scale minutiae detection
identification, access authority verification, proposed in improved by a backup validating
financial transferring confirmation, and many procedure to eliminate false minutiae. As for
other civilian applications. In the old days, minutiae matching, we employed the technique
fingerprint recognition was done manually by of fuzzy evolutionary programming, which

1
has been used successfully in speaker between the ridges as shown in fig 2(d). These
identification, images clustering, and fuzzy ridge features are collectively called the
algebraic operations. minutiae of the fingerprint. A full fingerprint
2. FINGER PRINT CHARACTERSTICS: normally contains 50 to 80 minutiae. According
A fingerprint is a textural image containing a to the Federal Bureau of Investigation, it
large number of ridges that form groups of suffices to identify a fingerprint by matching 12
almost parallel curves (Figure 1). It has been minutiae.
established that 3. MINUTAE EXTRACTION;
fingerprint's ridges are For convenience, we represent a fingerprint
individually unique and image in reverse gray scale. That is, the dark
are unlikely to change pixels of the ridges are assigned high values
during the whole life. where as the light pixels of the valleys are given
low values. Figure 3 shows a section of ridges in
this representation.

Although the structure of ridges in a fingerprint In a fingerprint, each minutia is represented by


is fairly complex, it is well known that a its location (x, y) and the local ridge direction
fingerprint can be identified by its special Figure 4 shows the attributes of a fingerprint's
features such as: minutia. The process of minutiae detection starts
Ridge endings: The ending of the ridges takes with finding a summit point on a ridge, and then
place at the middle as shown in fig 2(a) . continues by tracing the ridge until a minutia,
Ridge bifurcation: The division of the ridges in which can be either a ridge ending or
the middle as shown in fig 2(b). bifurcation, is encountered.
Short ridges: The small lines present in
between two ridges as shown in fig2(c). and
Ridge enclosures: These are the loops formed

2
3.1 FINDING A RIDGE SUMMIT POINT: 3.2 TRACING A RIDGE:
To find a summit point on a ridge, we start from The task of tracing a ridgeline to detect minutiae
a point x = (x1, x2) and compute the direction is described in the following algorithm. This
angle by using the gradient method. Then the algorithm also constructs a traced image of the
vertical section orthogonal to the direction is fingerprint. Every time a new summit point of
constructed. The point in this section with the ridge is found, its location in the traced
maximum gray level is a summit point on the image is assigned a high gray value and the
nearest ridge. The direction angle at a point x surrounding pixels are given lower gray levels if
they have not been marked.
Algorithm 1 (Ridge tracing):Start from a
summit point x of a ridge.
Repeat
mentioned above is computed as follows. A 9×9
Compute the
neighborhood around x is used to determine the
direction angle at x;
trend of gray level change. At each pixel u =
(u1, u2) in this neighborhood, a gradient vector Move ∝ pixels from x along the

v(u) = (v1(u), v2(u)) is obtained by applying the direction to another point y;

operator h = (h1, h2) with Find the next summit point z on the
ridge, which is the local maximum of
the section
orthogonal to direction at point y; Set
to the gray levels in a neighborhood of u. That x = z;
Until point x is a termination point (i.e. a
is,
minutia or off valid area).
Where y runs over the eight neighboring pixels
Determine if the termination point x is a valid
around u and g(y) is the gray level of pixel y in
minutia, if so record it.
the image. The angle represents the direction
End Algorithm 1
of the unit vector t that is (almost) orthogonal to
There are three criteria used to terminate tracing
all gradient vectors v. That is, t is chosen so that
a ridge. The first stopping condition is that when

is minimum. the current point is out of the area of interest.


That is, the current point is within 10 pixels
from the border, as experiments show that there

3
are rarely any minutiae close to the edges of the system, called the Fingerprint. The Fingerprint
image. The second criterion determines a ridge Administrator is used to extract minutiae of
ending: the section at the current point contains known fingerprints and store them in a database.
no pixels with gray levels above a pre-specified It is also used to extract minutiae of an input
threshold. In this case, the previous point on the fingerprint for the purpose of identification.
ridge is recorded as a ridge endpoint. The last 4. FINGER PRINT RECOGNITION:
stopping condition corresponds to the case of a The primary purpose of our fingerprint
possible bifurcation: the current point is recognizing system is to calculate the matching
detected to be on another ridge that has been degree of the target fingerprint with the images
marked on the traced image. Algorithm 1 is in a database and to decide if it belongs to a
backed up by a checking procedure that particular individual. A fingerprint is said to
determines if a termination point is a valid match one image in the database if the degree of
minutia. The procedure is expressed as follows. matching between its minutiae and that of the
Algorithm 2 (Elimination of false minutiae): image in the database is higher than some pre-
¾ If the current ridge end is close to specified acceptance level. The method of
another ridge end with almost opposite calculating this matching degree is based on our
direction, then delete both of them and fuzzy evolutionary programming technique,
join the gap, as they are simply broken which is described below.
ends of the same ridge. Consider two fingerprints that are represented
¾ If the current bifurcation point is close to by their sets of minutiae
the end of one of its branch, then delete P= {P1, K, Pm}, Q={Qq1, K, Qn}
both of them, as short branch of a
where for
bifurcation is normally a result of light
. Observe that the two sets may
noise in the image.
not have the same number of points, and that the
¾ If the current termination is close to
order of the points in each set is possibly
more than two other terminations, then
arbitrary.
delete all of them, as they are likely
The principal task is to find a transformation
caused by damaged ridges in the image.
F = (s, θ, δx, δy) that transforms the set of
End of algorithm2
minutiae P into the set Q Here, s represents a
The above algorithms form one major
scaling factor, an angle of rotation, and
component of our fingerprint recognizing
a translation in the x y-plane. Thus, the

4
transform F (p) = (x', y', ') of a minutiae p = (x, Algorithm 3 (Estimation of rotation):
y, ) is defined by: ¾ Divide the interval [- π, π] into K
Also, in order subintervals [θk, θk+1], k = 1 to K.
to calculate the ¾ Set up an integer array c[1, K] and a real
degree of array Θ[1, K] and initialize them to 0.
matching, we ¾ For each i = 1 to m and each j = 1… n do
associate with each Find an index k such that θk ≤ βj - αI <
minutia F (p) a fuzzy θk+1. Increment c[k] by 1 and increment
set (also denoted by Θ[k] by (βj – αi). Find the index k* such
F(p) for convenience) that c [k*] is maximum. Let θ be defined
the membership by
function of which is
definedby: End of algorithm3
Having established the rotation angle θ, the
where and
remaining parameters s and δx, δy of the
transformation F are estimated by the following
represents a fuzzy subset of the real line
algorithm.
defined as follows:
Algorithm4(Fuzzyevolutionary programming):
¾ Generate a population of m
chromosomes

Intuitively, we allow some degree of where the

tolerance in matching the minutiae F (p) and q, parameter values are randomly taken

but this tolerance decreases rapidly when the from appropriate intervals.

two minutiae are far apart. The matching degree ¾ For each k = 1…m, compute the fitness:

between two sets F (P) and Q


is defined as:
Repeat

The task of finding a transformation F ¾ For each k = 1… m, generate an

to match two sets of minutiae P and Q consists offspring

of two phases. First the rotation angle θ is as


estimated by the following algorithm. follows:

5
tracing backed up by a validating procedure to
detect fingerprint's minutiae and that employs
the technique of fuzzy evolutionary
programming to match two sets of minutiae in
Where is a normal distribution with
order to identify a fingerprint. The experimental
variance inversely
results show that the system is highly effective
proportional to the fitness fk, and the
with relatively clean fingerprints. However, for
factors are used to
poorly linked and badly damaged fingerprints,
ensure that the new values are within the
the system appears to be not so successful. In
predetermined intervals.
order to handle those bad types of fingerprints,
¾ Compute the fitness of the the addition of a preprocessing component that
new offspring using formula (1). also adopts the fuzzy evolutionary approach to
For each k = 1… 2m, select a reconstruct and enhance the fingerprints before
random set U of c indices from 1 they are processed by the system. Also, it is
to 2m, and record the possible to connect the system with a live

number such fingerprint scanner that obtains a person's


fingerprint directly and sends it to the system for
that . Select m
identification.
chromosomes from the set
7. References
that have highest [1] Arcelli, C., and Baja, G.S.D. "A Width
scores wk to form the next Independent Fast
generation of population. Thinning Algorithm", IEEE Trans. Pattern
Until the population is stabilized.
Analysis Machine
End of algorithm4 Intelligence, Vol. 7, No. 4, 1984, pp. 463-474.
6. Conclusion: [2] Baruch, O. "Line Thinning by Line
We have presented a fingerprint recognizing
Following", Pattern Recognition Letters, Vol. 8,
system that uses the method of gray scale ridge
No. 4, 1988, pp. 271-276.
o Algorithms, McGraw-Hill, New York, 1990.

Das könnte Ihnen auch gefallen