Académique Documents
Professionnel Documents
Culture Documents
ABSTRACT
In this work an attempt is made to enhance biometric have been used for over a century, more recently
fingerprint for identification & recognition using becoming automated (i.e. a biometric) due to
Discrete Wavelet Transform (DWT). In conventional advancement in computing capabilities. Fingerprint
biometric systems Fast Fourier Transform has been identification is popular because of the inherent ease
ea
used, use of the wavelets provides higher degree of in acquisition. For a long time, researchers had come
resolution enhancement. In this work first the up with many approached identify and verify a
biometric image is taken as input from stored fingerprint. Although the position, type of minutiae,
database, then it undergone through histogram ridges and many other parameters are used, the results
equalization, which makes the pixel value distribution are still not satisfied in recognizing fingerprint.
finge
of an image to increase the perceptional image However, all fingerprint recognition verification or
information. After that resolution enhancement is identification, are eventually based on a well-defined
well
done by Discrete Wavelet Transform. Then the image representation of a fingerprint. The underlying
is binarized, followed by segmentation is used to principle of well-defined
defined representation of a
locate the objects & boundaries like the lines & fingerprint and matching remains the same. The
curves present in an images. Then, the partitioning of verification would be straightforward if the
the fingerprint image is done into distinguished blocks representation of fingerprints remains the uniqueness
specific size. After that ROI extraction is pe
performed. and kept simple.
In Minutia extraction there are two steps involved,
named Ridge thinning & minutia marking. Then the 2. FINGER IDENTIFICATION SYSTEM
post processing stage consists of False minutia An identification system can be defined as the one
removal, unify termination & bifurcation and which helps in identifying the individual from many
minutiae matching. Finally, the enhanced fingerprints people
ple available. It generally involves matching
are matched for performance evolution of the available biometrics feature like fingerprint with the
proposed technique. fingerprints which are already enrolled in the
database.
Keywords: Minutiae extraction, Wavelet Transform,
minutiae matching, fingerprint, biometrics, A fingerprint identification system constitutes of
fingerprint enhancement. fingerprint acquiring device, image pre-processes
pre and
minutia extractor and minutia matcher.
1. INTRODUCTION
Fingerprint recognition or fingerprint authentication
During the fingerprint image pre-processing
pre stage,
refers to the automated method of verifying a match
Histogram Equalization and Fourier Transform were
between two human fingerprints. Fingerprints are one
deployed to perform image enhancement. And then
of many forms of biometrics used to identify an
the fingerprint image is binarized using the locally
individual and verify their identity. Because of their
adaptive
ive threshold method. The image segmentation
uniqueness and consistency over time, fingerprints
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2107
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
low-low (LL) channel, while the other three represent In order to enhance each block by its dominant
the details, namely the low-high (LH) channel, high- frequencies, each block after DWT will be multiplied
low (HL) channel and high-high (HH) channel. LL is with its magnitude a set of times. Where magnitude
a smoothed version of the original image, while the can be given as:
detail images LH, HL and HH contain respectively 𝑎𝑏𝑠 𝐹(𝑢, 𝑣) = |𝐹(𝑢, 𝑣)|
the details of the vertical, horizontal and diagonal and the enhanced block will be based on:
directions, thus retaining specific orientation 𝑔(𝑥, 𝑦) = 𝐹 {𝐹(𝑢, 𝑣) × |𝐹(𝑢, 𝑣)| }
information. After this, a sub sampling in both 𝑤ℎ𝑒𝑟𝑒 𝐹 {𝐹(𝑢, 𝑣)} 𝑖𝑠 𝑔𝑖𝑣𝑒𝑛 𝑏𝑦
directions can be performed. As in the one
dimensional case, by iterating the procedure on 1
𝐹(𝑥, 𝑦) = 𝐹(𝑢, 𝑣)
successive low pass images LL, sub images LL on 𝑀𝑁
different levels are generated. This results in a 𝑢𝑥 𝑣𝑦
pyramid with detail images for different scales and × 𝑒𝑥𝑝 𝑗2𝜋 × +
𝑀 𝑁
orientations, and is called two dimensional standard or 𝑓𝑜𝑟 𝑥 = 0,1,2, … . ,31, and
pyramidal wavelet decomposition. 𝑓𝑜𝑟 𝑦 = 0,1,2, … . ,31.
𝐹(𝑢, 𝑣) = 𝑓(𝑥, 𝑦)
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2108
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
after the binarization operation ridges are highlighted in fingerprint recognition thinning is done to thin the
with black color and furrows are highlighted with ridges so that each is one pixel thick. In each scan of
white color. the fingerprint image, the algorithm removes the
redundant pixels in small image window (3x3).In our
Here, we will use a locally adaptive binarization algorithm, for thinning purposes we had invoked an
method called as ‘adaptive thresholding’ to binarize inbuilt morphological operation in MATLAB.
the fingerprint image. In this method we transform the
gray level to 0 if it is below threshold value and to 1 if
it is above threshold value. The threshold value is the
mean taken from the gray level of the current block
(16*16) to which the pixel belongs [Figure7].
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2109
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
bifurcation and minutiae matching. Finally, the 5. SIMULATION RESULTS
enhanced fingerprints are matched for performance This work used fingerprint database which includes
evolution of the proposed technique. The proposed fingerprint of 16 persons and each of them with 8
procedure follows the below steps; image fingerprint and matching score was obtained in
1. Fingerprint Image Enhancement by order to compare same image and finally the
H. E. & D. W. T. recognition performance analyzed.
2. Fingerprint Image Binarization.
3. Fingerprint Image Segmentation. 5.1 PERFORMANCE PARAMETERS
4. Block Direction Estimation. To determine the performance of a fingerprint
5. ROI Extraction. recognition system False Rejection Rate (FRR) is
6. Minutia Extraction. most commonly used as performance evaluation
7. Post Processing. index. Sometimes the biometric security system may
8. Performance Evolution. incorrectly reject an access attempt by an authorized
user. To measure these types of incidents FAR is
The flow chart of the proposed system is shown in basically used. A system’s FRR basically states the
figure 9. ratio between the number of false rejections and the
number of identification attempts.
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2110
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Step 3. Step 8.
Figure 15: Orientation Flow Estimate Figure 20: Identification of Real Minutia after
Step 7. Extraction
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2111
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
thus the percentage of matching 100% and percentage CONCLUSION
of FRR is 0.0%. The eleventh person has the database This work focuses on image enhancement that include
of fingerprint 8 and recognition match 6/8 and FRR noise reduction, smoothing, contrast stretching,
2/8 therefore percentage of matching 75.0% and Fourier transform and edge enhancement and from
percentage of FRR 25.0%. Overall 16 person that presented a practical performance for minutiae
weighted average percentage of matching is 89.062% extraction and recognition of the fingerprint images.
and FRR 10.937%. In the reference [3] the false The matching score of the minutiae was observed to
rejection rate (FRR) is 23.7% due to major variation increase at a lower enhancement threshold and by
of finger print ridges depth. . Hence, an overall limiting the minimum number of minutiae extracted
improvement is 12.76% is achieved in this work. prior to recognition. These results validate that the
Table 1 showing the FRR and recognition rate of collection of image enhancement technique can
fingerprint matching.Results comparison is shown in further improve the recognition rate and matching
table 2. score by using minutiae extraction. It is believed that
further research can be made in producing a better
slight image rotation and filtration of unsuitable
images that lacking criteria for fingerprint detection.
REFERENCES
1. Muzhir Shaban et-al, “Effective Fingerprint
Recognition Approach Based on Double
Fingerprint Thumb”, International Conference on
Current Research in Computer Science and
Information Technology (ICCIT), Iraq, 2017.
2. C. Kauba et-al, “Fingerprint recognition under the
influence of image sensor ageing”, IEEE IET
journal International Workshop on Biometrics and
Forensics (IWBF), 2017.
3. U. M. Tomar et-al, “Fingerprint Recognition by
Hybrid Optimization Based On Minutaies
Distance and Pattern Matching”, International
Table 1: Simulation Results Summary conference on Signal Processing, Communication,
Power and Embedded System (SCOPES)-2016.
4. Sehasnainjot Singh et-al, “Finger Print Fusion
Using Daubechies (Db1) Wavelet Transformation
& Quality Measures”, 2nd IEEE International
Conference on Computing for Sustainable Global
Development (INDIACom), Pp. 822-826, 2015.
Table 2: Simulation Results Comparison
5. R. Priya et-al, “A Novel algorithm for Secure
Internet Banking with finger print recognition”,
IEEE International Conference on Embedded
Systems (ICES), Pp.104-109, Coimbatore, 2014.
6. Sayak Bhowal et-al, “A Case Study of
Illumination Robust Face & Finger Print Merging
Identification Technique using Cross Correlation”,
IEEE International Conference on Emerging
Trends in Communication, Control, Signal
Processing & Computing Applications (C2SPCA),
2013.
7. Dr. V. Vijayalakshmi et-al, “Finger & Palm print
Figure 21: Graph of Simulation Results Comparison
based Multibiometric Authentication System with
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2112
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
GUI Interface”, IEEE International conference on Minutiae-Based Fingerprint Recognition System”
Communication & Signal Processing, Pp. 738- in IEEE Systems Journal, Vol.3, No.4, Pp. 418-
742, 2013. 427, 2009.
8. Smital D. Patil & Shailaja A. Patil, “Fingerprint 18. Ravi. J, K. B. Raja, Venugopal K. R, “Fingerprint
Recognition Using Minutia Matching”, in Recognition Using Minutia Score Matching”,
Proceedings of "Conference on Advances in International Journal of Engineering Science and
Communication & Computing (NCACC'12)”, Technology Vol.1 (2), Pp. 35-42, 2009.
2012.
19. D. Maltoni, D. Maio, A.K. Jain, S. Prabhakar,
9. M. N. Shah Zainudin, Radi et-al ., “Face "Handbook of Fingerprint Recognition (Second
Recognition using Principle Component Analysis Edition)," Springer, London, 2009.
(PCA) & Linear Discriminant Analysis (LDA)”,
20. A. Jain, K. Nandakumar, and A. Nagar,
International Journal of Electrical & Computer
“Biometric Template Securtiy EURASIP Journal
Sciences, Vol-12, No-05, 2012.
on Advance Signal Processing vol.4, 2008.
10. Vikram Singh & Kalpna Kashyap, “A survey
21. H. Xu, R. Veldhuis, T. Kevenaar, A. Akkermans,
paper on “hybrid system for finger print
and A.Bazen,“ Spectral Minutiae A Fixed Length
identification”, International Journal of Emerging
Representation of a Minutiae Set Proceedings of
Trends & Technology in Computer Science
Biometrics, Pp. 1-6, June 2008.
(IJETTCS), Volume 1, Issue 4, 2012.
22. K. Nallaperumall, A. L. Fred and S. Padmapriya,
11. Vaidehi. V, Naresh Babu N T, Ponsamuel Mervin.
“A Novel for Fingerprint Feature Extraction Using
A, Praveen Kumar. S, Velmurugan. S, Balamurali,
Fixed Size Templates”, IEEE 2005 Conference,
Girish Chandra, "Fingerprint Identification Using
Pp. 371-374, 2005.
Cross Correlation of Field Orientation," Second
International Conference on Advanced Computing 23. P. Komarinski, P. T. Higgins, and K. M. Higgins,
(ICoAC), Pp. 66- 69, 2010. K. Fox Lisa , “Automated Fingerprint
Identification Systems (AFIS)”, Elsevier
12. Ashwini R. Patil, Mukesh A. Zaveri, “Novel
Academic Press, pp. 1-118, 2005.
Approach for Fingerprint Matching using
Minutiae”, in Fourth Asia IEEE International 24. S M Mohsen, S M Zamshed Farhan and M MA
Conference on Mathematical/Analytical Modeling Hashem, “Automated Fingerprint Recognition:
and Computer Simulation, 2010. Using Minutiae Matching Technique for the Large
Fingerprint Database”, 3rd IEEE International
13. J.A. Carrasco-Ochoa et al. (Eds.): “Fingerprint
Conference on Electrical & Computer
verification with Non-linear Composite
Engineering (ICECE), Pp. 28-30, 2004.
Correlation Filters,” MCPR 2010, LNCS 6256,
pp. 90–97, Springer-Verlag Berlin Heidelberg, 25. D. Maltoni, D. Maio, and A. Jain, S. Prabhakar,
2010. “4.3: Minutiae-based Methods‟ (extract) from
Handbook of Fingerprint Recognition”, Springer,
14. S. L. de O. Gonzaga, “A Method for Fingerprint
New York, Pp. 141-144, 2003.
Image Identification Based on Gabor Filter and
Power Spectrum”, 2010. 26. Salil Prabhakar, Anil K Jain and Sharath Pankanti,
“Learning fingerprint minutiae location and type”,
15. R. N. Rodrigues, L.L. Ling, and V. Govindarju, “:
Pattern recognition, Pp. 1847-1857, 2003.
Robustness of Multimodal Biometric Fusion
methods against Spoof Attacks,” Journal of Visual 27. Lin Hong, Student Member, IEEE, Yifei Wan,
Languages Communication, vol. 20, no. 3, pp. and Anil Jain, “Fingerprint Image Enhancement:
169–179, 2009. Algorithm and Performance Evaluation” IEEE
Transactions on Pattern Analysis And Machine
16. A. Nagar and A. K. Jain, “On the Security of Non-
Intelligence, Vol. 20, Pp. 777-787, 1998.
invertible Finger Print Template Transforms,”
Proceedings of IEEE Workshop on Information 28. D. Maio, and D. Maltoni, “Direct gray-scale
Forensic sand Security, London, U.K, 2009. minutiae detection in fingerprints”, IEEE
Transactions Pattern Analysis and Machine
17. Haiyun Xu, Raymond N. J. Veldhuis, Tom A.M.
Intelligence, vol. 19(1), Pp. 27-40, 1997.
Kevenaar and Ton A.H.M. Akkermans, “A Fast
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018 Page: 2113