Control Number : 262 The Problem of Fingerprint Recognition Background The fingerprints are characterized in terms of two aspects: overall and detailed. ·Overall characteristics(being defined as those that can be observed by eyes). 1. Three basic ridge characteristics are shown in Fig.1 Loop Arch Whorl Fig.1 Overall characteristics 2. Pattern Area That is the characteristics, from which we can learn the category the fingerprint belongs to. 3. Core Point At the center of the fingerprint, it is often used as the reference point when we capture the fingerprint and compare it with others. 4. Delta Located at the first bifurcation, dot, ridge ending or opposed ridge ending beginning from core point. 5. Ridge Count Within the pattern area, the count of ridges crossed by the straight line made to join core point and delta. Page 1 of 11 Control Number : 262 ·Detailed characteristics (details of fingerprints). Minutiae points, which break the continuation and smoothing of ridge with the form of ending, bifurcation or dot, are presented below. 1. Type Ending ---- a ridge ends here. Bifurcation---- a ridge changes into two or more here. Ridge Divergence---- two parallel lines separate here. Dot or Island ----a very short ridge which can be seen as a single point. Enclosure---- a small circle formed as a ridge changes into two and assembles one immediately. Short Ridge---- a short ridge. Orientation -- --direction the ridge trends to. 3. Curvature-- --the rate of change of ridge’s orientation. 4. Position-- --described by the Cartesian coordinate (x, y), it can be absolute, or relative. 2. Assumptions ·The fingerprints we research are all from thumbs. ·The ridges on our thumb are equally distributed. ·Breadth between ridges is equal. ·Fingerprints are invariable all the life. Outer factors such as humidity, air bubble and the cleanness of air as Page 2 of 11 Control Number : 262 well as the change of age can not change them. ·Fingerprints are extracted while the directions of thumbs are vertically upward and the directions agree with the coordinate’s orientation we establish. ·The fingerprints extracted here are all integrated, not considering their mar as the result of injury. Problem Analysis From the Background section, we learn that minutiae offer the unique information for recognition. We can extract the minutiae to change fingerprint image into minutiae image, based on which we establish a minutia-coordinate model to digitize the image. So, if the fingerprint is unique for each person, the digitized information can not be repeated. In other words, the degree of resemblance must be low. This offers direction for our modeling and testing. Model Design ·The minutiae From the analysis, there are six kinds of minutiae which occupy different proportions in Fingerprint Recognition. The data are shown in Table.1[6]. Table.1 Percentage and number of each minutia Characteristics Percentage (%) Num Ridge 68.2 238 Bifurcation 18.9 66 Orifice 1.1 4 Thorn 4.9 17 Cross 3.2 11 Bridge 3.7 13 From Table 1.we can see the proportion of the first two kinds of minutiae is about 87%, and the proportion of the remaining four kinds of minutiae is so small that they can be ignored to simplify the model. Among various algorithms detecting minutiae, the grads-vector algorithm gives the most accurate for solving our problem, but puts high demands for sensors. To reduce the demands for hardware and the complexity of algorithm, we adopt a modularized method. First we use a template to search the location of a minutia and distinguish its category. As shown in Fig.2, M stands for the point searched, are the neighboring points arranged clockwise, and each point presents a pixel. s3 s4 s5 Fig.2 s2 M s6 s1 s8 s7 Template to capture minutiae Page 3 of 11 Control Number : 262 where s i is defined as the value of BOOL, that is 1 si 0 if si is black if si is white Typical templates for ridge ending and bifurcation are given in Figs.3 and 4 Fig.3 From the Figs. above, let c s Fig.4 7 k 0 s( k 1) s( k ) we obtain c s 2 , if M is a ridge ending, and c s 6 , if M is a bifurcation. ·Modification We ignore the last four kinds of minutiae in the analysis above, but the modularized method cannot meet this requirement . In fact, the points the method searches involve many false minutiae which we want to discard.. Eight kinds of false minutiae and their modifications are presented in Fig.5. Fig.5 ·The Coordinates We use the core point as the origin to set up a Cartesian coordinate. As given in Fig.6, the minutiae’s information can be represented by ( x, y, k ) , where ( x, y ) stands for the coordinates and k is the category. Page 4 of 11 Control Number : 262 Fig.6 The coordinates of the minutiae ·Initial Analysis Fingerprint’s characteristic consists of overall characteristics and detailed characteristics. While the former normally remains unchanged in many fingerprints, the latter is different from each other. [Background]. A fingerprint consists of about 40 ~ 50 minutiae, [3], from which we extract 10 minutiae with the shortest distances from the origin to design our algorithm. Let p and Q be two concourses of points extracted from two different fingerprints. Then we have P { {( x1p , y1p , k1p ), , ( x10p , y10p , k10p )}, where ( xip , y ip , k ip ) stands for three parameters of the i th point in the coordinates of x and y , and the minutia’s category. Similarly, we p: have Q {( x1q , y1q , k1q ), , ( x10q , y10q , k10q )} . Let the probability that xip xiq be 1 / a (a 1). Then the probability that y ip y iq is also 1 / a(a 1). Among the minutiae adopted, the percentage ridge endings occupy is 68.2% 78.3% . And bifurcations occupy 1 78.3% 21.7% . Only when the minutiae in 18.9% 68.2% p and Q are both ridge endings or bifurcations, can we get k ip k iq . Thus the probability that k i k i p q is 78.3% 78.3% 21.7% 21.7% 66.0% . From this we obtain that the probability that the i th points in p and Q have exactly the same information is 12 66.0% , we obtain the probability when 10 minutiae a in p absolutely agree with those in Q is 1 10 ) (66.0%)10 a 20 (1) 2 a From the equation above, we can see that N decreases sharply as a increases. Taking centimeter as the unit, among the 10 minutiae with the shortest distances from the origin, the coordinates will not overflow N (66.0% the range [1,1] .[1]. If one digit after the decimal point are valid, the probability that there are two different thumbs haveing the same fingerprint is M (66.0%)10 20 20 60 108 2 40 10. This value approaches 0 . In fact, if we extract 6 minutiae from each fingerprint, then the probability is 0.01 0 00 . This is sufficient to show that the fingerprints are unique. ·Further Analysis In the analysis above, we mainly use probability theory to tackle the problem, from which we know that the number of minutiae chosen in one fingerprint is mainly determined by the parameter’s number of minutiae and the digits after the decimal point of the parameter. The number of minutiae extracted is not constant. If more parameters (such as the ridge’s orientation and curvature) or more digits (for instance, two digits after the decimal point are valid) are adopted, the minutiae could be extracted less. But this makes a high demand on hardware. Page 5 of 11 Control Number : 262 From the initial analysis, we define the probability as N (66.0%)10 a 2b (2) where b is the number of extracted minutiae, and b is a positive integer, b (2,50) . Supposing b remains constant, and we study the relationship between N and a . We make b 5,6,7,,15 and get function curves about N and a respectively. The curves can be shown as follows: . Function curves about N and a Fig.7 Conclusions In Fig.7, we find that among the curves the values of b decrease from inner to outer. That is the values of b from the center to the outer curves correspond to 15 and 5 respectively. From Fig.7, we learn that when N remains constant, the more minutiae we extracted, and the less precise of each minutia’s value. While a remains constant---to require the same precision for each minutia’s value, the more minutiae extracted, the lower rate of error exist. Improvement ·The Function on the Degree of Resemblance. Based on the initial analysis above, we attempt to explain why the fingerprint is unique by comparing the fingerprints’ degree of resemblance. We set up a Cartesian coordinate for each fingerprint image in the database from Appendix, and find out 10 minutiae with the shortest distances to the origin. Since the category of minutiae only influence the results with a constant coefficient (for example, the " (66.0%)10 " in the equation (2)). We discard the parameters of minutiae’s category to simplify the minutiae’s parameters as coordinates of ( x, y ) , while constructing the resemblance function. Matching Method We compare different fingerprints with the 10 minutiae using two rules below: 1) Order the minutiae under the rules that the minutiae’s distance to the origin ranging from short to long. 2) Compare the minutiae with changing from small to large. is defined in Fig.8. Page 6 of 11 Control Number : 262 Fig.8 ·Degree of Resemblance Let b stand for the point selected in the coordinates. According to the matching method, if the distance from b to another point b extracted from another fingerprint is no more than a certain range. We get(3) as follows: xb xb ' xb yb yb ' or yb (3) where is a certain small positive number, then we can say that the points b and b ' are resemble. Under this condition, the distance has a normal distribution with standard deviation .So as long as 2 , that is, the coordinates of b ' are within the range xb 4.56% xb , yb 4.56% yb as shown in Fig.9, the result can meet our requirement. Fig.9 Using the Markov-Distance function the distance between two fingerprints is defined by 10 [( xip xiq ) 2 ( y ip y iq ) 2 ] ( 4) i 1 where ( xip , y ip ) and ( xiq , y iq ) are coordinates of minutiae from two distinct fingerprints, and i 1,2, 10 . While computing, we use a pixel on a computer with the resolution of 1024 768 as unit. Select 8 fingerprints’ images from database in Appendix as a concourse, which is defined as A { A1 , A2 ,, A8 }, where Ai stands for the i th image. Then the minutiae’s information of Ai and A j can be presented as Page 7 of 11 Control Number : 262 Ai ( x ik , yik ) k 1,2,3...10 A j ( x jk , y jk ) We obtain the distance between the i th fingerprint and the j th as S ij k 1 ( xik x jk ) 2 ( yik y jk ) 2 10 (5) Now substitute the data of concourse A into equation (*) to derive the distances between the eight fingerprints (as given in the appendix). Up till now, each fingerprint in the database has its distances with others defined as i ij j 1,2. .8. Let min min ij where j 1,2...8 . Further, let 10 Ti 4.56% xik y ik k 0 2 2 ( 6) stands for the allowable error of distance. While computing, we enlarge Ti , let 10 Ti 10% xik y ik k 0 2 2 (7 ) to make the computation convenient. Compare each i min with Ti , as min represents the minimum distance between the fingerprints Ai and other fingers and i min ij , if i min Ti , then the degree of resemblance between two fingerprints is very low, which shows that the fingerprints cannot be repeated. The relationship between i min and Ti of the eight fingerprints are given in Fig.10 Fig.10 Comparing i min with Ti From the Fig.10, we can see that i min Ti , which fits well with what we obtain from the analysis above, that is, for each person, the fingerprint is unique. Page 8 of 11 Control Number : 262 ·Testing We enlarge the samples size to thirty, and express the relationship between i min and Ti in Fig.11 from which we have the same conclusion as above. Fig.11 Comparing i min with Ti The conclusion is universal and representative because the samples are randomly adopted from the database. Although we cannot obtain the fingerprint of every person on the earth, we still may conclude from the existing data that min Ti is still correct with an increase in the sample size. Comparison Between Fingerprint Recognition and Identification ·Evaluation In our model, we use the parameters of several minutiae extracted to substitute the entire information of a fingerprint. On one hand, this reduces the difficulty for dealing with information. As long as parameters are adopted rationally, we can derive the results rapidly. This makes the algorithm very effective. On the other hand, there are also some shortcomings: . 1) While dealing with the fingerprint image, the information we obtain is limited, causing reduction in precision. 2) Blurring and imperfection of the fingerprint’s image makes the data possessing low precision, impacting on the dependability of the result on the contrary, the DNA identification, as the data is external, not obtained from the model, is based on very high precision and dependability. Take a fraction of DNA sequence for example, as show in Fig.12. Fig.12 At the locations of to base-pairs, the probability that each location adopt one base-pair from {A, G, C, T} 1 is . If it is compared with another fraction of DNA from another person, then the probability that the two 4 10 1 fractions are the same is . Since one chromosome contains 30 Billion base-pairs, according to the 4 Page 9 of 11 Control Number : 262 1 algorithm above, the probability that two chromosome of two persons with no pin are the same is 4 3109 , this value would be smaller, if we consider all the chromosomes. ·Exceptions (Identical Twins) From the analysis, DNA identification has a higher precision and dependability than using fingerprints, but it encounters difficulty while dealing with identical twins. While the DNA from identical twins are the same, the fingerprints are distinct. Thus, from this aspect, fingerprint has a relatively low degree of error than using DNA identification. Strengths and Weaknesses ·Strengths 1) While dealing with the fingerprint image, we establish a Cartesian coordinate for each fingerprint and extract the minutiae, key factor for fingerprint recognition, as researched subjects. For further computing, we digitize the minutiae, using its coordinates as the entire information. Simplicity and high efficiency is sufficiently presented here. 2) To solve the model, we first use the probability theory, and then make further conclusions using the function of resemblance. 3) The algorithm makes low demands on hardware. ·Weaknesses 1) Because of the limitation of the sample size, errors cannot be avoided. 2) When establish Cartesian coordinate for each image, we take the core point as the origin, ignoring the possible error caused by the change of core point. 3) The precision of managing data is relatively not high. 4) In this model, we mainly research the key factor-minutiae, not considering the condition that the fingerprint’s overall characteristics maybe different. For this reason, the results are not perfect. References [1] Control of Web Access Based on The Fingerprint Recognition Technology (in Chinese), Accessed February 7 2004 http://www.ahetc.gov.cn/cit/200109/05.doc [2] Zhong yi fingerprints (in Chinese), Accessed February 7 2004 http://www.chinajoy1.com/TechDatum.htm [3] Matching algorithm for fingerprints based on the diffused error (in Chinese), Accessed February 7 2004 http://nlpr-web.ia.ac.cn/english/irds/chinese/model.doc [4] Fingerprint characteristics (in Chinese), Accessed February 7 2004 http://www.imagesoft.com.cn/htm/tec.htm [5] Principle and technique of fingerprint recognition (in Chinese), Accessed February 7 2004 http://www.idsmartech.com/html/new01.htm Page 10 of 11 Control Number : 262 [6] Yan Zhiwei. et.al. Forensics. China Inspection Press, 1997. [7] Fingerprint identification system and its applications (in Chinese), Accessed February 8 2004 http://202.118.192.202:85/~kjqk/dnjsxx/dnjs99/dnjs9912/991203.htm [8] Fingerprint identification based on the Morphology and configuration (in Chinese) [9] Database of fingerprint samples(in Chinese), Accessed February 8 2004 http://202.118.192.202:85/~kjqk/jsjgcyyy/jsjg2002/0204pdf/020427.pdf [10] FingerCell (in Chinese), Accessed February 8 2004 http://www.neurotechnologija.cn/download.html [11] Matching algorithm for fingerprints based on the diffused error (in Chinese), Accessed February 8 2004 http://www.hotwinfiles.com/software_details.asp?r=4826# [12] Matching algorithm for fingerprints based on the diffused error (in Chinese), Accessed February 8 2004 http://www.sinobiometrics.com/chinese/ppt/Haoying.pdf [13] “DNA image” and Forensics (in Chinese), Accessed February 8 2004 http://bioscience.sjtu.edu.cn/General_Biology_Lab/biology/fingerprinting.htm Page 11 of 11