967 research outputs found

    Documentation and analysis of plastic fingerprint impressions involving contactless three-dimensional surface scanning

    Get PDF
    Fingerprint impressions are frequently encountered during the investigation of crime scenes, and may establish a crucial linkage between the suspect and the crime scene. Plastic fingerprint impressions found at crime scenes are often transient and delicate, leaving photography the sole means of documentation. A traditional photography approach can be inadequate in documenting impressions that contain three-dimensional (3D) details due to the limitations of camera and lighting conditions on scene. In this study, 3D scanning was proposed as a novel method for the documentation of plastic fingerprints. Structured-light 3D scanning (SLS) captures the distortion of projected light patterns on the subject to obtain its 3D profile, which allows fast acquisition of the complete 3D geometric information of the surface. The contactless operation of SLS also eliminates the risk of destroying fragile evidence, making it a sound choice for forensic applications. In this study, the feasibility of 3D scanning of plastic fingerprint impressions was evaluated and compared with traditional photography regarding the quantity and quality of perceptible friction ridge features. Attempts were made to develop a procedure to extract curvature features from 3D scanned fingerprints and flatten the friction ridge features into two-dimensional (2D) images to allow direct comparison with the traditional photography method in the CSIpix® Matcher and NFIQ 2.0 software. One of the developed methods (3DR) utilizing a discrete geometry operator and convexity features outperformed traditional photography, both in minutiae count and match quality, while traditional photography could not always capture enough high-quality minutiae for comparisons, even after digital enhancement. The reproducibility of the 3D scanning process was evaluated using 3D point cloud statistics. The pair-wise mean distance and standard deviation were calculated for four levels of comparisons with theoretically increasing disparity, including pairs of scans of the same impressions. The results showed minimal shape deviation from scan to scan for the same impression, but high variations for different impressions

    An overview of touchless 2D fingerprint recognition

    Get PDF
    Touchless fingerprint recognition represents a rapidly growing field of research which has been studied for more than a decade. Through a touchless acquisition process, many issues of touch-based systems are circumvented, e.g., the presence of latent fingerprints or distortions caused by pressing fingers on a sensor surface. However, touchless fingerprint recognition systems reveal new challenges. In particular, a reliable detection and focusing of a presented finger as well as an appropriate preprocessing of the acquired finger image represent the most crucial tasks. Also, further issues, e.g., interoperability between touchless and touch-based fingerprints or presentation attack detection, are currently investigated by different research groups. Many works have been proposed so far to put touchless fingerprint recognition into practice. Published approaches range from self identification scenarios with commodity devices, e.g., smartphones, to high performance on-the-move deployments paving the way for new fingerprint recognition application scenarios.This work summarizes the state-of-the-art in the field of touchless 2D fingerprint recognition at each stage of the recognition process. Additionally, technical considerations and trade-offs of the presented methods are discussed along with open issues and challenges. An overview of available research resources completes the work

    On the Feasibility of Interoperable Schemes in Hand Biometrics

    Get PDF
    Personal recognition through hand-based biometrics has attracted the interest of many researchers in the last twenty years. A significant number of proposals based on different procedures and acquisition devices have been published in the literature. However, comparisons between devices and their interoperability have not been thoroughly studied. This paper tries to fill this gap by proposing procedures to improve the interoperability among different hand biometric schemes. The experiments were conducted on a database made up of 8,320 hand images acquired from six different hand biometric schemes, including a flat scanner, webcams at different wavelengths, high quality cameras, and contactless devices. Acquisitions on both sides of the hand were included. Our experiment includes four feature extraction methods which determine the best performance among the different scenarios for two of the most popular hand biometrics: hand shape and palm print. We propose smoothing techniques at the image and feature levels to reduce interdevice variability. Results suggest that comparative hand shape offers better performance in terms of interoperability than palm prints, but palm prints can be more effective when using similar sensors

    Deep Fingerprint Matching from Contactless to Contact Fingerprints for Increased Interoperability

    Get PDF
    Contactless fingerprint matching is a common form of biometric security today. Most smartphones and associated apps now let users opt into using this form of biometric security. However, it’s difficult to match a finger-photo to a fingerprint because of perspective distortion occurring at the edges of the finger-photo, so direct matching using conventional methods will not be as accurate due to a lack of sufficient matching minutiae points. To address this issue, we propose a deep model, Perspective Distortion Rectification Model (PDRM), to estimate the fingerprint correspondence for finger-photo images in order to recover more minutiae points. Not only do we determine the feasibility of matching synthesized fingerprints from finger-photos, but we also show that matching a finger-photo to a fingerprint directly is possible by using our proposed Coupled Generative Adversarial Network (CpGAN) verifier. The results from our PDRM show that our method for creating synthetic fingerprints from finger-photos provides a more accurate matching (AUC=96.4%, EER= 8.9%) than just using the same commercial matcher to match finger-photo and fingerprints directly (AUC=92.1%, EER=15.7%). Finally, our proposed CpGAN verifier provides the best matching accuracy with AUC=98.4% and EER=6.3%

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers

    Deep Learning based Fingerprint Presentation Attack Detection: A Comprehensive Survey

    Full text link
    The vulnerabilities of fingerprint authentication systems have raised security concerns when adapting them to highly secure access-control applications. Therefore, Fingerprint Presentation Attack Detection (FPAD) methods are essential for ensuring reliable fingerprint authentication. Owing to the lack of generation capacity of traditional handcrafted based approaches, deep learning-based FPAD has become mainstream and has achieved remarkable performance in the past decade. Existing reviews have focused more on hand-cratfed rather than deep learning-based methods, which are outdated. To stimulate future research, we will concentrate only on recent deep-learning-based FPAD methods. In this paper, we first briefly introduce the most common Presentation Attack Instruments (PAIs) and publicly available fingerprint Presentation Attack (PA) datasets. We then describe the existing deep-learning FPAD by categorizing them into contact, contactless, and smartphone-based approaches. Finally, we conclude the paper by discussing the open challenges at the current stage and emphasizing the potential future perspective.Comment: 29 pages, submitted to ACM computing survey journa
    • …
    corecore