Fingerprint Recognition Based on Texture Feature

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 7 – March 2015
Fingerprint Recognition Based on Texture
Feature
Miss. Sindhu S Kale, Prof. Sachin B. Honrao
ME Student, ETC Department, Dr. BAMU Aurangabad, Maharashtra, India
Abstract— Fingerprints have been used for biometric
identification and employed in forensic science to support
criminal investigations, and in biometric systems. In Automatic
Fingerprint Recognition Classification and Matching are two key
issues. This paper provides work on the enhancement of
fingerprint images, and the subsequent extraction of minutiae
and provides reliable techniques for fingerprint image
enhancement and minutiae extraction
Core Point: is the point with the most variant changes in the
direction of the line.
Delta Point: the point where the ridges spread into three
directions.
Crossover Point: It is a short ridge that runs between two
parallel ridges.
Island Point: It is a line type which stands alone [1].
Keywords— Fingerprints, extraction, Recognition Classification,
Matching.
II. LITERATURE REVIEW
Prabhakar et al. [5] describe a classification technique for
fingerprint. In these method pictures of fingerprint divided
into 5 categories. First one is whorl, right loop, left loop, arch,
and tented arch as shown in the figure 2. This method
completely unique illustration (Finger Code) and relies on a 2
stage classifier to create a classification. The two-stage
classifier uses a k-nearest neighbor classifier in its 1st stage
and a group of neural network classifiers in its second stage to
classify a feature vector into one amongst the 5 fingerprint
categories.
I. INTRODUCTION
Fingerprint verification is one of the most reliable personal
identification methods and it plays a very important role in
forensic applications like criminal investigations, terrorist
identification and National security issues. In an increasingly
digitized world the reliable personal authentication has
become an important human computer interface activity.
National security, e-commerce and access to computer
networks are now very common where establishing a person’s
identity has become vital. Existing security measures rely on
knowledge-based approaches like passwords or token-based
approaches such as swipe cards and passports to control
access to physical and virtual spaces, but these methods are
not very secure [7]. Fingerprint recognition is mostly used for
person Identification and verification. Fingerprint is
comprised of ridges and valleys, the ridges are the dark area of
the fingerprint and valleys are the white area that exists
between the ridges [1]. The ridges create a point, which is
known by different names shown in the Figure1.
Fig.1: Different points from Fingerprint [1].
Ending Point: The point where a ridges break.
Bifurcation Point: The point where ridges divided into two.
ISSN: 2231-5381
Fig. 2: arch, right loop, whole, tented arch respectively [6].
Mukesh Kumar Thakur et al. [8] propose a wireless
fingerprint security system based on Zigbee technology to
overcome above dearth. In this paper the methodology based
on the taking fingerprint of a user, which can be taken with
the help of a fingerprint sensor module and matching it with
the database details corresponding to the user fingerprint and
displays it on the computer screen. From the results it is
clearly obtained that the proposed approach provides very
high accuracy. Thus the approach is very much secured. Thus
the system provides a substantive improvement over
recognition of a person based purely on biometric feature.
III. METHODOLOGY
This section describes the methods for constructing a series
of image enhancement techniques for fingerprint images. The
algorithm I have implemented is built on the techniques
developed by Hong et al. This algorithm consists of four main
stages:
normalization,
orientation estimation,
http://www.ijettjournal.org
Page 360
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 7 – March 2015
ridge frequency estimation, and
Gabor filtering.
In addition to these four stages, this paper implemented three
additional stages that include:
segmentation,
binarisation, and
thinning.
The first step of the fingerprint enhancement algorithm is
image segmentation. Segmentation is the process of separating
the foreground regions in the image from the background
regions. In this stage, Firstly, the image is divided into blocks
and the grey-scale variance is calculated for each block in the
image. If the variance is less than the global threshold, then
the block is assigned to be a background region; otherwise, it
is assigned to be part of the foreground.
The grey-level variance for a block of size W X W is defined
as:
Where, V (k) is the variance for block k, I(i; j) is the grey-level
value at pixel (i; j), and M(k) is the mean grey-level value for
the block k.
In next stage i.e. Binarisation is the process that converts a
grey-level image into a binary image.
This improves the contrast between the ridges and valleys in a
fingerprint image, and consequently facilitates the extraction
of minutiae. The binarisation process involves examining the
grey-level value of each pixel in the enhanced image, and, if
the value is greater than the global threshold, then the pixel
value is set to a binary value one; otherwise, it is set to zero.
The outcome is a binary image containing two levels of
information, the foreground ridges and the background valley
the average of the grey-level values within an image window
at each pixel, and if the average is greater than the threshold,
then the pixel value is set to a binary value of one; otherwise,
it is set to zero. The grey-level image is converted to a binary
image, as there are only two levels of interest, the foreground
ridges and the background valleys.
The final image enhancement step typically performed prior to
minutiae extraction is thinning. Thinning is a morphological
operation that successively erodes away the foreground pixels
until they are one pixel wide. This algorithm is accessible in
MATLAB via the `thin' operation under the’ bwmorph’
function. Each sub-iteration begins by examining the
neighborhood of each pixel in the binary image, and based on
a particular set of pixel-deletion criteria, it checks whether the
pixel can be deleted or not. These sub-iterations continue until
no more pixels can be deleted.
IV. EXPERIMENTAL RESULT
Table1. Summarizes the results from experiments
conducted on a sample of 30 fingerprint images. The sample
size figures shown in the table represent the total number of
distances calculated between a minutiae point and its nearest
neighbour. Additionally, the histogram plots for each of the
data types from the table are shown in Figure 3. It can be seen
ISSN: 2231-5381
that the results exhibit large standard deviation values. This
suggests that the shortest distance values vary greatly for both
types of minutiae, and that the configuration of a group of
neighbouring minutiae is not evenly distributed throughout a
fingerprint image. In addition, further work can be done to fit
a probability distribution model to this set of observed data,
which can provide further insight into the statistical nature of
distances between neighbouring minutiae points.
TABLE I
THE RESULTS FROM EXPERIMENTS CONDUCTED ON A
SAMPLE OF 30 WITH EXISTING METHODS
Data Set
Number
Source
Data
of
Sample
Size
Mean
Minutiae
Density
(per
mm2)
Standard
Deviation
1
Dankmeijer
et al. [2]
1000
0.1900
0.0069
2
Stoney et al.
[3]
412
0.2230
0.0045
3
Kingston [4]
100
0.2460
0.0084
4
Current
Study
30
0.2040
0.0285
Fig.3: The estimated orientation for well-defined synthetic images.
V. CONCLUSION
The primary focuses of the work on the enhancement of
fingerprint images, and the subsequent extraction of minutiae
and provides reliable techniques for fingerprint image
enhancement and minutiae extraction. These techniques can
then be used to facilitate the further study of the statistics of
fingerprints. In addition, these techniques can be also
employed in other fingerprinting applications such as
fingerprint matching and classification.
http://www.ijettjournal.org
Page 361
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 7 – March 2015
[5]
REFERENCES
[1]
[2]
[3]
[4]
Dr. Neeraj Bhargava, Dr. Ritu Bhargava, Prafull Narooka, Minaxi
Cotia, “Fingerprint Recognition Using Minutia Matching”,
International Journal of Computer Trends and Technology, vol.3,
Issue4, pp.641-643, 2012.
Dankmeijer, J., Waltman, J. M., and Wilde, A. G. D.,“Biological
foundations for forensic identification based on fingerprints”, Acta
Morpho-logica Neerlando-scandivanica18, pp. 67–83, 1980.
Kingston, C. R. “Probabilistic Analysis of Partial Fingerprint Patterns”,
PhD thesis, University of California, Berkeley, 1964.
Stoney, D. A., and Thornton, J. I. “A systemic study of epidermal ridge
minutia” Journal of forensic sciences 32, pp. 1182–1203, 1987.
ISSN: 2231-5381
[6]
[7]
[8]
Jain, A. K., Prabhakar, S., and Hong, L. A “multichannel approach to
fingerprint classification”, IEEE Transactions on Pattern Analysis and
Machine Intelligence 21, pp. 348–359, 1999.
http://en.wikipedia.org/wiki/Fingerprint
Rakesh Verma, Anuj Goel, “Wavelet Application in Fingerprint
Recognition”, International Journal of Soft Computing and
Engineering, Volume-1, Issue-4, pp. 129-134, 2011.
Mukesh Kumar Thakur, Ravi Shankar Kumar, Mohit Kumar, Raju
Kumar, “Wireless Fingerprint Based Security System Using”,
International Journal of Inventive Engineering and Sciences, Volume-1,
Issue-5, pp. 14-17, April 2013.
http://www.ijettjournal.org
Page 362
Download