7 research outputs found

    A New Fingerprint Enhancement Approach Using Image Fusion of Histogram Equalisation and Skeleton

    Get PDF
    Fingerprint classification is a technique used to assign fingerprints into five established classes namely Whorl, Left loop, Right loop, Arch and Tented Arch based on their ridge structures and singular points’ trait. Although some progresses have been made thus far to improve accuracy rates, problem arises from ambiguous fingerprints is far from over, especially in large intra-class and small inter-class variations. Poor quality images including blur, dry, wet, low-contrast, cut, scarred and smudgy, are equally challenging. As a good start of work, fingerprint image enhancement has been focused on this study. It begins with greyscale normalization, followed by histogram equalization, binarization, skeletonization and ends with image fusion, which eventually produces high quality images with clear ridge flows. 27,000 fingerprint images acquired from The National Institute of Standard and Technology (NIST) Special Database 14, which is de facto dataset for experimental in this study. With the multi-type enhancement method, the fingerprint images became clearly visible

    The use of least significant bit (LSB) and knight tour algorithm for image steganography of cover image

    Get PDF
    Steganography is one of the method to communicate in a hidden way. In another word, steganography literally means the practice of hiding messages or information within another data. Previous studies have proposed various steganography techniques using different approaches including Least Significant Bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). However, different approaches still have its own weaknesses. Therefore image stenography using Knight Tour Algorithm with Least Significant Bit (LSB) technique is presented. The main objective is to improve the security factor in the stego image. Basically, the proposed technique is divided into two parts which are the sender and receiver side. Then, steganalysis which is a type of attack on stenography algorithm is used to detect the secret message in the cover image by the statistical analysis of pixel values. Chi Square Statistical Attach which is one of the type of steganalysis is used to detect these near-equal Po Vs in images and bases the probability of embedding on how close to equal the even pixel values and their corresponding odd pixel values are in the test image. The Knight Tour Algorithm is applied due to the common Least Significant Bit technique that is weak in security and easily decoded by outsider

    Automatic fingerprint classification scheme using template matching with new set of singular point-based features

    Get PDF
    Fingerprint classification is a technique used to assign fingerprints into five established classes namely Whorl, Left loop, Right loop, Arch and Tented Arch based on their ridge structures and singular points’ trait. Although some progresses have been made thus far to improve accuracy rates, problem arises from ambiguous fingerprints is far from over, especially in large intra-class and small inter-class variations. Poor quality images including blur, dry, wet, low-contrast, cut, scarred and smudgy, are equally challenging. Thus, this thesis proposes a new classification technique based on template matching using fingerprint salient features as a matching tool. Basically, the methodology covers five main phases: enhancement, segmentation, orientation field estimation, singular point detection and classification. In the first phase, it begins with greyscale normalization, followed by histogram equalization, binarization, skeletonization and ends with image fusion, which eventually produces high quality images with clear ridge flows. Then, at the beginning of the second phase, the image is partitioned into 16x16 pixels blocks - for each block, local threshold is calculated using its mean, variance and coherence. This threshold is then used to extract a foreground. Later, the foreground is enhanced using a newly developed filling-in-the-gap process. As for the third phase, a new mask called Epicycloid filter is applied on the foreground to create true-angle orientation fields. They are then grouped together to form four distinct homogenous regions using a region growing technique. In the fourth phase, the homogenous areas are first converted into character-based regions. Next, a set of rules is applied on them to extract singular points. Lastly, at the classification phase, basing on singular points’ occurrence and location along to a symmetric axis, a new set of fingerprint features is created. Subsequently, a set of five templates in which each one of them represents a specific true class is generated. Finally, classification is performed by calculating a similarity between the query fingerprint image and the template images using x2 distance measure. The performance of the current method is evaluated in terms of accuracy using all 27,000 fingerprint images acquired from The National Institute of Standard and Technology (NIST) Special Database 14, which is de facto dataset for development and testing of fingerprint classification systems. The experimental results are very encouraging with accuracy rate of 93.05% that markedly outpaced the renowned researchers’ latest works

    3D minutiae extraction in 3D fingerprint scans.

    Get PDF
    Traditionally, fingerprint image acquisition was based on contact. However the conventional touch-based fingerprint acquisition introduces some problems such as distortions and deformations to the fingerprint image. The most recent technology for fingerprint acquisition is touchless or 3D live scans introducing higher quality fingerprint scans. However, there is a need to develop new algorithms to match 3D fingerprints. In this dissertation, a novel methodology is proposed to extract minutiae in the 3D fingerprint scans. The output can be used for 3D fingerprint matching. The proposed method is based on curvature analysis of the surface. The method used to extract minutiae includes the following steps: smoothing; computing the principal curvature; ridges and ravines detection and tracing; cleaning and connecting ridges and ravines; and minutiae detection. First, the ridges and ravines are detected using curvature tensors. Then, ridges and ravines are traced. Post-processing is performed to obtain clean and connected ridges and ravines based on fingerprint pattern. Finally, minutiae are detected using a graph theory concept. A quality map is also introduced for 3D fingerprint scans. Since a degraded area may occur during the scanning process, especially at the edge of the fingerprint, it is critical to be able to determine these areas. Spurious minutiae can be filtered out after applying the quality map. The algorithm is applied to the 3D fingerprint database and the result is very encouraging. To the best of our knowledge, this is the first minutiae extraction methodology proposed for 3D fingerprint scans

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
    corecore