100 research outputs found

    A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation

    Get PDF
    Latent fingerprint identification is attracting increasing interest because of its important role in law enforcement. Although the use of various fingerprint features might be required for successful latent fingerprint identification, methods based on minutiae are often readily applicable and commonly outperform other methods. However, as many fingerprint feature representations exist, we sought to determine if the selection of feature representation has an impact on the performance of automated fingerprint identification systems. In this paper, we review the most prominent fingerprint feature representations reported in the literature, identify trends in fingerprint feature representation, and observe that representations designed for verification are commonly used in latent fingerprint identification. We aim to evaluate the performance of the most popular fingerprint feature representations over a common latent fingerprint database. Therefore, we introduce and apply a protocol that evaluates minutia descriptors for latent fingerprint identification in terms of the identification rate plotted in the cumulative match characteristic (CMC) curve. From our experiments, we found that all the evaluated minutia descriptors obtained identification rates lower than 10% for Rank-1 and 24% for Rank-100 comparing the minutiae in the database NIST SD27, illustrating the need of new minutia descriptors for latent fingerprint identification.This work was supported in part by the National Council of Science and Technology of Mexico (CONACYT) under Grant PN-720 and Grant 63894

    Improving Fingerprint Verification Using Minutiae Triplets

    Get PDF
    Improving fingerprint matching algorithms is an active and important research area in fingerprint recognition. Algorithms based on minutia triplets, an important matcher family, present some drawbacks that impact their accuracy, such as dependency to the order of minutiae in the feature, insensitivity to the reflection of minutiae triplets, and insensitivity to the directions of the minutiae relative to the sides of the triangle. To alleviate these drawbacks, we introduce in this paper a novel fingerprint matching algorithm, named M3gl. This algorithm contains three components: a new feature representation containing clockwise-arranged minutiae without a central minutia, a new similarity measure that shifts the triplets to find the best minutiae correspondence, and a global matching procedure that selects the alignment by maximizing the amount of global matching minutiae. To make M3gl faster, it includes some optimizations to discard non-matching minutia triplets without comparing the whole representation. In comparison with six verification algorithms, M3gl achieves the highest accuracy in the lowest matching time, using FVC2002 and FVC2004 databases

    The fundamentals of unimodal palmprint authentication based on a biometric system: A review

    Get PDF
    Biometric system can be defined as the automated method of identifying or authenticating the identity of a living person based on physiological or behavioral traits. Palmprint biometric-based authentication has gained considerable attention in recent years. Globally, enterprises have been exploring biometric authorization for some time, for the purpose of security, payment processing, law enforcement CCTV systems, and even access to offices, buildings, and gyms via the entry doors. Palmprint biometric system can be divided into unimodal and multimodal. This paper will investigate the biometric system and provide a detailed overview of the palmprint technology with existing recognition approaches. Finally, we introduce a review of previous works based on a unimodal palmprint system using different databases

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book

    Minutiae-based Fingerprint Extraction and Recognition

    Get PDF

    A new algorithm for minutiae extraction and matching in fingerprint

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.A novel algorithm for fingerprint template formation and matching in automatic fingerprint recognition has been developed. At present, fingerprint is being considered as the dominant biometric trait among all other biometrics due to its wide range of applications in security and access control. Most of the commercially established systems use singularity point (SP) or ‘core’ point for fingerprint indexing and template formation. The efficiency of these systems heavily relies on the detection of the core and the quality of the image itself. The number of multiple SPs or absence of ‘core’ on the image can cause some anomalies in the formation of the template and may result in high False Acceptance Rate (FAR) or False Rejection Rate (FRR). Also the loss of actual minutiae or appearance of new or spurious minutiae in the scanned image can contribute to the error in the matching process. A more sophisticated algorithm is therefore necessary in the formation and matching of templates in order to achieve low FAR and FRR and to make the identification more accurate. The novel algorithm presented here does not rely on any ‘core’ or SP thus makes the structure invariant with respect to global rotation and translation. Moreover, it does not need orientation of the minutiae points on which most of the established algorithm are based. The matching methodology is based on the local features of each minutiae point such as distances to its nearest neighbours and their internal angle. Using a publicly available fingerprint database, the algorithm has been evaluated and compared with other benchmark algorithms. It has been found that the algorithm has performed better compared to others and has been able to achieve an error equal rate of 3.5%

    Textural features for fingerprint liveness detection

    Get PDF
    The main topic ofmy research during these three years concerned biometrics and in particular the Fingerprint Liveness Detection (FLD), namely the recognition of fake fingerprints. Fingerprints spoofing is a topical issue as evidenced by the release of the latest iPhone and Samsung Galaxy models with an embedded fingerprint reader as an alternative to passwords. Several videos posted on YouTube show how to violate these devices by using fake fingerprints which demonstrated how the problemof vulnerability to spoofing constitutes a threat to the existing fingerprint recognition systems. Despite the fact that many algorithms have been proposed so far, none of them showed the ability to clearly discriminate between real and fake fingertips. In my work, after a study of the state-of-the-art I paid a special attention on the so called textural algorithms. I first used the LBP (Local Binary Pattern) algorithm and then I worked on the introduction of the LPQ (Local Phase Quantization) and the BSIF (Binarized Statistical Image Features) algorithms in the FLD field. In the last two years I worked especially on what we called the “user specific” problem. In the extracted features we noticed the presence of characteristic related not only to the liveness but also to the different users. We have been able to improve the obtained results identifying and removing, at least partially, this user specific characteristic. Since 2009 the Department of Electrical and Electronic Engineering of the University of Cagliari and theDepartment of Electrical and Computer Engineering of the ClarksonUniversity have organized the Fingerprint Liveness Detection Competition (LivDet). I have been involved in the organization of both second and third editions of the Fingerprint Liveness Detection Competition (LivDet 2011 and LivDet 2013) and I am currently involved in the acquisition of live and fake fingerprint that will be inserted in three of the LivDet 2015 datasets

    Privacy protecting biometric authentication systems

    Get PDF
    As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can not be canceled or reissued), and iii) disclosure of sensitive information such as race, gender and health problems which may be revealed by biometric traits. The straightforward suggestion of keeping the biometric data in a user owned token (eg. smart cards) does not completely solve the problem, since malicious users can claim that their token is broken to avoid biometric verification altogether. Put together, these concerns brought the need for privacy preserving biometric authentication methods in the recent years. In this dissertation, we survey existing privacy preserving biometric systems and implement and analyze fuzzy vault in particular; we propose a new privacy preserving approach; and we study the discriminative capability of online signatures as it relates to the success of using online signatures in the available privacy preserving biometric verification systems. Our privacy preserving authentication scheme combines multiple biometric traits to obtain a multi-biometric template that hides the constituent biometrics and allows the possibility of creating non-unique identifiers for a person, such that linking separate template databases is impossible. We provide two separate realizations of the framework: one uses two separate fingerprints of the same individual to obtain a combined biometric template, while the other one combines a fingerprint with a vocal pass-phrase. We show that both realizations of the framework are successful in verifying a person's identity given both biometric traits, while preserving privacy (i.e. biometric data is protected and the combined identifier can not be used to track people). The Fuzzy Vault emerged as a promising construct which can be used in protecting biometric templates. It combines biometrics and cryptography in order to get the benefits of both fields; while biometrics provides non-repudiation and convenience, cryptography guarantees privacy and adjustable levels of security. On the other hand, the fuzzy vault is a general construct for unordered data, and as such, it is not straightforward how it can be used with different biometric traits. In the scope of this thesis, we demonstrate realizations of the fuzzy vault using fingerprints and online signatures such that authentication can be done while biometric templates are protected. We then demonstrate how to use the fuzzy vault for secret sharing, using biometrics. Secret sharing schemes are cryptographic constructs where a secret is split into shares and distributed amongst the participants in such a way that it is constructed/revealed only when a necessary number of share holders come together (e.g. in joint bank accounts). The revealed secret can then be used for encryption or authentication. Finally, we implemented how correlation attacks can be used to unlock the vault; showing that further measures are needed to protect the fuzzy vault against such attacks. The discriminative capability of a biometric modality is based on its uniqueness/entropy and is an important factor in choosing a biometric for a large-scale deployment or a cryptographic application. We present an individuality model for online signatures in order to substantiate their applicability in biometric authentication. In order to build our model, we adopt the Fourier domain representation of the signature and propose a matching algorithm. The signature individuality is measured as the probability of a coincidental match between two arbitrary signatures, where model parameters are estimated using a large signature database. Based on this preliminary model and estimated parameters, we conclude that an average online signature provides a high level of security for authentication purposes. Finally, we provide a public online signature database along with associated testing protocols that can be used for testing signature verification system

    Fingerprint Recognition: A Histogram Analysis Based Fuzzy C-Means Multilevel Structural Approach

    Get PDF
    In order to fight identity fraud, the use of a reliable personal identifier has become a necessity. Fingerprints are considered one of the best biometric measurements and are used as a universal personal identifier. There are two main phases in the recognition of personal identity using fingerprints: 1) extraction of suitable features of fingerprints, and 2) fingerprint matching making use of the extracted features to find the correspondence and similarity between the fingerprint images. Use of global features in minutia-based fingerprint recognition schemes enhances their recognition capability but at the expense of a substantially increased complexity. The recognition accuracies of most of the fingerprint recognition schemes, which rely on some sort of crisp clustering of the fingerprint features, are adversely affected due to the problems associated with the behavioral and anatomical characteristics of the fingerprints. The objective of this research is to develop efficient and cost-effective techniques for fingerprint recognition, that can meet the challenges arising from using both the local and global features of the fingerprints as well as effectively deal with the problems resulting from the crisp clustering of the fingerprint features. To this end, the structural information of local and global features of fingerprints are used for their decomposition, representation and matching in a multilevel hierarchical framework. The problems associated with the crisp clustering of the fingerprint features are addressed by incorporating the ideas of fuzzy logic in developing the various stages of the proposed fingerprint recognition scheme. In the first part of this thesis, a novel low-complexity multilevel structural scheme for fingerprint recognition (MSFR) is proposed by first decomposing fingerprint images into regions based on crisp partitioning of some global features of the fingerprints. Then, multilevel feature vectors representing the structural information of the fingerprints are formulated by employing both the global and local features, and a fast multilevel matching algorithm using this representation is devised. Inspired by the ability of fuzzy-based clustering techniques in dealing more effectively with the natural patterns, in the second part of the thesis, a new fuzzy based clustering technique that can deal with the partitioning problem of the fingerprint having the behavioral and anatomical characteristics is proposed and then used to develop a fuzzy based multilevel structural fingerprint recognition scheme. First, a histogram analysis fuzzy c-means (HA-FCM) clustering technique is devised for the partitioning of the fingerprints. The parameters of this partitioning technique, i.e., the number of clusters and the set of initial cluster centers, are determined in an automated manner by employing the histogram of the fingerprint orientation field. The development of the HA-FCM partitioning scheme is further pursued to devise an enhanced HA-FCM (EAH-FCM) algorithm. In this algorithm, the smoothness of the fingerprint partitioning is improved through a regularization of the fingerprint orientation field, and the computational complexity is reduced by decreasing the number of operations and by increasing the convergence rate of the underlying iterative process of the HA-FCM technique. Finally, a new fuzzy based fingerprint recognition scheme (FMSFR), based on the EHA-FCM partitioning scheme and the basic ideas used in the development of the MSFR scheme, is proposed. Extensive experiments are conducted throughout this thesis using a number of challenging benchmark databases. These databases are selected from the FVC2002, FVC2004 and FVC2006 competitions containing a wide variety of challenges for fingerprint recognition. Simulation results demonstrate not only the effectiveness of the proposed techniques and schemes but also their superiority over some of the state-of-the-art techniques, in terms of the recognition accuracy and the computational complexity

    Low-Quality Fingerprint Classification

    Get PDF
    Traditsioonilised sĂ”rmejĂ€lgede tuvastamise sĂŒsteemid kasutavad otsuste tegemisel minutiae punktide informatsiooni. Nagu selgub paljude varasemate tööde pĂ”hjal, ei ole sĂ”rmejĂ€lgede pildid mitte alati piisava kvaliteediga, et neid saaks kasutada automaatsetes sĂ”rmejĂ€ljetuvastuse sĂŒsteemides. Selle takistuse ĂŒletamiseks keskendub magistritöö vĂ€ga madala kvaliteediga sĂ”rmejĂ€lgede piltide tuvastusele – sellistel piltidel on mitmed ĂŒldteada moonutused, nagu kuivus, mĂ€rgus, fĂŒĂŒsiline vigastatus, punktide olemasolu ja hĂ€gusus. Töö eesmĂ€rk on vĂ€lja töötada efektiivne ja kĂ”rge tĂ€psusega sĂŒgaval nĂ€rvivĂ”rgul pĂ”hinev algoritm, mis tunneb sĂ”rmejĂ€lje Ă€ra selliselt madala kvaliteediga pildilt. Eksperimentaalsed katsed sĂŒgavĂ”ppepĂ”hise meetodiga nĂ€itavad kĂ”rget tulemuslikkust ja robustsust, olles rakendatud praktikast kogutud madala kvaliteediga sĂ”rmejĂ€lgede andmebaasil. VGG16 baseeruv sĂŒgavĂ”ppe nĂ€rvivĂ”rk saavutas kĂ”rgeima tulemuslikkuse kuivade (93%) ja madalaima tulemuslikkuse hĂ€guste (84%) piltide klassifitseerimisel.Fingerprint recognition systems mainly use minutiae points information. As shown in many previous research works, fingerprint images do not always have good quality to be used by automatic fingerprint recognition systems. To tackle this challenge, in this thesis, we are focusing on very low-quality fingerprint images, which contain several well-known distortions such as dryness, wetness, physical damage, presence of dots, and blurriness. We develop an efficient, with high accuracy, deep neural network algorithm, which recognizes such low-quality fingerprints. The experimental results have been conducted on real low-quality fingerprint database, and the achieved results show the high performance and robustness of the introduced deep network technique. The VGG16 based deep network achieves the highest performance of 93% for dry and the lowest of 84% for blurred fingerprint classes
    • 

    corecore