37 research outputs found

    Image enhancement and segmentation on simultaneous latent fingerprint detection

    Get PDF
    A simultaneous latent fingerprint (SLF) image consists of multi-print of individual fingerprints that is lifted from a surface, typically at the crime scenes. Due to the nature and the poor quality of latent fingerprint image, segmentation becomes an important and very challenging task. This thesis presents an algorithm to segment individual fingerprints for SLF image. The algorithm aim to separate the fingerprint region of interest from image background, which identifies the distal phalanx portion of each finger that appears in SLF image. The algorithm utilizes ridge orientation and frequency features based on block-wise pixels. A combination of Gabor Filter and Fourier transform is implemented in the normalization stage. In the pre-processing stage, a modified version of Histogram equalization is proposed known as Alteration Histogram Equalization (AltHE). Sliding windows are applied to create bounding boxes in order to find out the distal phalanges region at the segmentation stage. To verify the capability of the proposed segmentation algorithm, the segmentation results is evaluated in two aspects: a comparison with the ground truth foreground and matching performance based on segmented region. The ground truth foreground refers to the manual mark up region of interest area. In order to evaluate the performance of this method, experiments are performed on the Indian Institute of Information Technology Database- Simultaneous Latent Fingerprint (IIITD-SLF). Using the proposed algorithm, the segmented images were supplied as the input image for the matching process via a state art of matcher, VeriFinger SDK. Segmentation of 240 images is performed and compared with manual segmentation methods. The results show that the proposed algorithm achieves a correct segmentation of 77.5% of the SLF images under test

    A survey of fingerprint classification Part I: taxonomies on feature extraction methods and learning models

    Get PDF
    This paper reviews the fingerprint classification literature looking at the problem from a double perspective. We first deal with feature extraction methods, including the different models considered for singular point detection and for orientation map extraction. Then, we focus on the different learning models considered to build the classifiers used to label new fingerprints. Taxonomies and classifications for the feature extraction, singular point detection, orientation extraction and learning methods are presented. A critical view of the existing literature have led us to present a discussion on the existing methods and their drawbacks such as difficulty in their reimplementation, lack of details or major differences in their evaluations procedures. On this account, an experimental analysis of the most relevant methods is carried out in the second part of this paper, and a new method based on their combination is presented.This work was supported by the Research Projects CAB(CDTI), TIN2011-28488, and TIN2013-40765-P.

    A Survey of Fingerprint Classification Part I: Taxonomies on Feature Extraction Methods and Learning Models

    Get PDF
    This paper reviews the fingerprint classification literature looking at the problem from a double perspective. We first deal with feature extraction methods, including the different models considered for singular point detection and for orientation map extraction. Then, we focus on the different learning models considered to build the classifiers used to label new fingerprints. Taxonomies and classifications for the feature extraction, singular point detection, orientation extraction and learning methods are presented. A critical view of the existing literature have led us to present a discussion on the existing methods and their drawbacks such as difficulty in their reimplementation, lack of details or major differences in their evaluations procedures. On this account, an experimental analysis of the most relevant methods is carried out in the second part of this paper, and a new method based on their combination is presented.Research Projects CAB(CDTI) TIN2011-28488 TIN2013-40765Spanish Government FPU12/0490

    A Warp Speed Chain-Code Algorithm Based on Binary Decision Trees

    Get PDF
    Contours extraction, also known as chain-code extraction, is one of the most common algorithms of binary image processing. Despite being the raster way the most cache friendly and, consequently, fast way to scan an image, most commonly used chain-code algorithms perform contours tracing, and therefore tend to be fairly inefficient. In this paper, we took a rarely used algorithm that extracts contours in raster scan, and optimized its execution time through template functions, look-up tables and decision trees, in order to reduce code branches and the average number of load/store operations required. The result is a very fast solution that outspeeds the state-of-the-art contours extraction algorithm implemented in OpenCV, on a collection of real case datasets. Contribution: This paper significantly improves the performance of existing chain-code algorithms, by smartly introducing decision trees to reduce code branches and the average number of load/store operations required

    A Biometric Approach to Prevent False Use of IDs

    Get PDF
    What is your username? What is your password? What is your PIN number? These are some of the commonly used key questions users need to answer accurately in order to verify their identity and gain access to systems and their own data. Passwords, Personal Identification Numbers (PINs) and ID cards are different means of tokens used to identify a person, but these can be forgotten, stolen or lost. Currently, University of Hertfordshire (UH) carries out identity checks by checking the photograph on an ID card during exams. Other processes such as attendance monitoring and door access control require tapping the ID card on a reader. These methods can cause issues such as unauthorised use of ID card on attendance system and door access system if ID card is found, lost or borrowed. During exams, this could lead to interruptions when carrying out manual checks. As the invigilator carries out checks whilst the student is writing an exam, it is often difficult to see the student’s face as they face down whilst writing the exam. They cannot be disturbed for the ID check process. Students are also required to sign a manual register as they walk into the exam room. This process is time consuming. A more robust approach to identification of individuals that can avoid the above mentioned limitations of the traditional means, is the use of biometrics. Fingerprint was the first biometric modality that has been used. In comparison to other biometric modalities such as signature and face recognition, fingerprint is highly unique, accepted and leads to a more accurate matching result. Considering these properties of fingerprint biometrics, it has been explored in the research study presented in this thesis to enhance the efficiency and the reliability of the University’s exam process. This thesis focuses on using fingerprint recognition technology in a novel approach to check identity for exams in a University environment. Identifying a user using fingerprints is not the only aim of this project. Convenience and user experience play vital roles in this project whilst improving speed and processes at UH

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    A new three-stage scheme for fingerprint enhancement and its impact on fingerprint recognition

    Get PDF
    In order to provide safety and security from fraudulent acts, it is necessary to use a reliable biometric identifier. Fingerprint is considered to be one of most effective biometric identifiers because of its universal characteristics. The recognition rate of identification/verification systems depends to a great extent on the quality of the fingerprint image. In a fingerprint recognition system, there are two main phases: 1) extraction of suitable features of fingerprints, and 2) fingerprint matching using those extracted features to find the correspondence and similarity between the fingerprint images. The low quality of fingerprint images provides false minutiae at the stage of feature extraction and reduces the recognition rate of minutiae-based fingerprint matching systems. Use of enhanced fingerprint images improves the recognition rate but at the expense of a substantially increased complexity. The objective of this research is to develop an efficient and cost-effective scheme for enhancing fingerprint images that can improve minutiae extraction rate as well as effectively improve the recognition rate of a minutiae-based fingerprint matching system. In the first part of this thesis, a novel low-complexity three-stage scheme for the enhancement of fingerprint images is developed. In the first stage of the scheme, a linear diffusion filter driven by an orientation field is designed to enhance the low-quality fingerprint image. The computational complexity is reduced by using a simple gradient-based method for estimating the orientation field and by using a small number of iterations. Although some of the broken ridges in the fingerprint image are partially connected after the first stage, this stage has a limitation of not being able to connect ridges broken with wide creases, and also not being able to recover ridges in the smeared regions. To overcome the shortcomings of the first stage, the fingerprint image obtained after the first-stage enhancement is passed through a compensation filter in the second stage. Although the broken ridges in the enhanced fingerprint image after the second stage are fully connected, the ridges affected by smears are only partially recovered. Hence, the output obtained from the second stage is passed through the third-stage enhancement, which has two phases: short-time Fourier transform (STFT) analysis and enhancement by an angular filter. In the first phase, a Gaussian spectral window is used in order to perform the STFT and this window helps to reduce the blocking effect in the enhanced image. In the second phase, the image obtained from the STFT is passed through an angular filter, which significantly improves the overall quality of the fingerprint image. In the second part of this thesis, the effectiveness and usefulness of the proposed enhancement scheme are examined in fingerprint feature extraction and matching for fingerprint recognition applications. For this purpose, a minutiae extraction algorithm is first applied to extract minutiae from fingerprint images and then a minutia-based matching algorithm is applied to the set of extracted minutiae using a hybrid shape and orientation descriptor in order to find similarity between a pair of fingerprints. Extensive experiments are conducted throughout this thesis using a number of challenging benchmark databases chosen from FVC2000, FVC2002 and FVC2004. Simulation results demonstrate not only the effectiveness of the proposed enhancement scheme in improving the subjective and objective qualities of fingerprint images, but also a superior minutiae extraction rate and a recognition accuracy of the fingerprint images enhanced by the proposed scheme at a reduced computational complexity

    Unimodal and multimodal biometric sensing systems : a review

    Get PDF
    Biometric systems are used for the verification and identification of individuals using their physiological or behavioral features. These features can be categorized into unimodal and multimodal systems, in which the former have several deficiencies that reduce the accuracy of the system, such as noisy data, inter-class similarity, intra-class variation, spoofing, and non-universality. However, multimodal biometric sensing and processing systems, which make use of the detection and processing of two or more behavioral or physiological traits, have proved to improve the success rate of identification and verification significantly. This paper provides a detailed survey of the various unimodal and multimodal biometric sensing types providing their strengths and weaknesses. It discusses the stages involved in the biometric system recognition process and further discusses multimodal systems in terms of their architecture, mode of operation, and algorithms used to develop the systems. It also touches on levels and methods of fusion involved in biometric systems and gives researchers in this area a better understanding of multimodal biometric sensing and processing systems and research trends in this area. It furthermore gives room for research on how to find solutions to issues on various unimodal biometric systems.http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=6287639am2017Electrical, Electronic and Computer Engineerin
    corecore