561 research outputs found

    A survey of fingerprint classification Part I: taxonomies on feature extraction methods and learning models

    Get PDF
    This paper reviews the fingerprint classification literature looking at the problem from a double perspective. We first deal with feature extraction methods, including the different models considered for singular point detection and for orientation map extraction. Then, we focus on the different learning models considered to build the classifiers used to label new fingerprints. Taxonomies and classifications for the feature extraction, singular point detection, orientation extraction and learning methods are presented. A critical view of the existing literature have led us to present a discussion on the existing methods and their drawbacks such as difficulty in their reimplementation, lack of details or major differences in their evaluations procedures. On this account, an experimental analysis of the most relevant methods is carried out in the second part of this paper, and a new method based on their combination is presented.This work was supported by the Research Projects CAB(CDTI), TIN2011-28488, and TIN2013-40765-P.

    A Survey of Fingerprint Classification Part I: Taxonomies on Feature Extraction Methods and Learning Models

    Get PDF
    This paper reviews the fingerprint classification literature looking at the problem from a double perspective. We first deal with feature extraction methods, including the different models considered for singular point detection and for orientation map extraction. Then, we focus on the different learning models considered to build the classifiers used to label new fingerprints. Taxonomies and classifications for the feature extraction, singular point detection, orientation extraction and learning methods are presented. A critical view of the existing literature have led us to present a discussion on the existing methods and their drawbacks such as difficulty in their reimplementation, lack of details or major differences in their evaluations procedures. On this account, an experimental analysis of the most relevant methods is carried out in the second part of this paper, and a new method based on their combination is presented.Research Projects CAB(CDTI) TIN2011-28488 TIN2013-40765Spanish Government FPU12/0490

    A Reinforcement Learning Agent for Minutiae Extraction from Fingerprints

    Get PDF
    In this paper we show that reinforcement learning can be used for minutiae detection in fingerprint matching. Minutiae are characteristic features of fingerprints that determine their uniqueness. Classical approaches use a series of image processing steps for this task, but lack robustness because they are highly sensitive to noise and image quality. We propose a more robust approach, in which an autonomous agent walks around in the fingerprint and learns how to follow ridges in the fingerprint and how to recognize minutiae. The agent is situated in the environment, the fingerprint, and uses reinforcement learning to obtain an optimal policy. Multi-layer perceptrons are used for overcoming the difficulties of the large state space. By choosing the right reward structure and learning environment, the agent is able to learn the task. One of the main difficulties is that the goal states are not easily specified, for they are part of the learning task as well. That is, the recognition of minutiae has to be learned in addition to learning how to walk over the ridges in the fingerprint. Results of successful first experiments are presented

    A PUF-and biometric-based lightweight hardware solution to increase security at sensor nodes

    Get PDF
    Security is essential in sensor nodes which acquire and transmit sensitive data. However, the constraints of processing, memory and power consumption are very high in these nodes. Cryptographic algorithms based on symmetric key are very suitable for them. The drawback is that secure storage of secret keys is required. In this work, a low-cost solution is presented to obfuscate secret keys with Physically Unclonable Functions (PUFs), which exploit the hardware identity of the node. In addition, a lightweight fingerprint recognition solution is proposed, which can be implemented in low-cost sensor nodes. Since biometric data of individuals are sensitive, they are also obfuscated with PUFs. Both solutions allow authenticating the origin of the sensed data with a proposed dual-factor authentication protocol. One factor is the unique physical identity of the trusted sensor node that measures them. The other factor is the physical presence of the legitimate individual in charge of authorizing their transmission. Experimental results are included to prove how the proposed PUF-based solution can be implemented with the SRAMs of commercial Bluetooth Low Energy (BLE) chips which belong to the communication module of the sensor node. Implementation results show how the proposed fingerprint recognition based on the novel texture-based feature named QFingerMap16 (QFM) can be implemented fully inside a low-cost sensor node. Robustness, security and privacy issues at the proposed sensor nodes are discussed and analyzed with experimental results from PUFs and fingerprints taken from public and standard databases.Ministerio de Economía, Industria y Competitividad TEC2014-57971-R, TEC2017-83557-

    Fast fingerprint verification using sub-regions of fingerprint images.

    Get PDF
    Chan Ka Cheong.Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.Includes bibliographical references (leaves 77-85).Abstracts in English and Chinese.Chapter 1. --- Introduction --- p.1Chapter 1.1 --- Introduction to Fingerprint Verification --- p.1Chapter 1.1.1 --- Biometrics --- p.1Chapter 1.1.2 --- Fingerprint History --- p.2Chapter 1.1.3 --- Fingerprint characteristics --- p.4Chapter 1.1.4 --- A Generic Fingerprint Matching System Architecture --- p.6Chapter 1.1.5 --- Fingerprint Verification and Identification --- p.8Chapter 1.1.7 --- Biometric metrics --- p.10Chapter 1.2 --- Embedded system --- p.12Chapter 1.2.1 --- Introduction to embedded systems --- p.12Chapter 1.2.2 --- Embedded systems characteristics --- p.12Chapter 1.2.3 --- Performance evaluation of a StrongARM processor --- p.13Chapter 1.3 --- Objective -An embedded fingerprint verification system --- p.16Chapter 1.4 --- Organization of the Thesis --- p.17Chapter 2 --- Literature Reviews --- p.18Chapter 2.1 --- Fingerprint matching overviews --- p.18Chapter 2.1.1 --- Minutiae-based fingerprint matching --- p.20Chapter 2.2 --- Fingerprint image enhancement --- p.21Chapter 2.3 --- Orientation field Computation --- p.22Chapter 2.4 --- Fingerprint Segmentation --- p.24Chapter 2.5 --- Singularity Detection --- p.25Chapter 2.6 --- Fingerprint Classification --- p.27Chapter 2.7 --- Minutia extraction --- p.30Chapter 2.7.1 --- Binarization and thinning --- p.30Chapter 2.7.2 --- Direct gray scale approach --- p.32Chapter 2.7.3 --- Comparison of the minutiae extraction approaches --- p.35Chapter 2.8 --- Minutiae matching --- p.37Chapter 2.8.1 --- Point matching --- p.37Chapter 2.8.2 --- Structural matching technique --- p.38Chapter 2.9 --- Summary --- p.40Chapter 3. --- Implementation --- p.41Chapter 3.1 --- Fast Fingerprint Matching System Overview --- p.41Chapter 3.1.1 --- Typical Fingerprint Matching System --- p.41Chapter 3.1.2. --- Fast Fingerprint Matching System Overview --- p.41Chapter 3.2 --- Orientation computation --- p.43Chapter 3.21 --- Orientation computation --- p.43Chapter 3.22 --- Smooth orientation field --- p.43Chapter 3.3 --- Fingerprint image segmentation --- p.45Chapter 3.4 --- Reference Point Extraction --- p.46Chapter 3.5 --- A Classification Scheme --- p.51Chapter 3.6 --- Finding A Small Fingerprint Matching Area --- p.54Chapter 3.7 --- Fingerprint Matching --- p.57Chapter 3.8 --- Minutiae extraction --- p.59Chapter 3.8.1 --- Ridge tracing --- p.59Chapter 3.8.2 --- cross sectioning --- p.60Chapter 3.8.3 --- local maximum determination --- p.61Chapter 3.8.4 --- Ridge tracing marking --- p.62Chapter 3.8.5 --- Ridge tracing stop criteria --- p.63Chapter 3.9 --- Optimization technique --- p.65Chapter 3.10 --- Summary --- p.66Chapter 4. --- Experimental results --- p.67Chapter 4.1 --- Experimental setup --- p.67Chapter 4.2 --- Fingerprint database --- p.67Chapter 4.3 --- Reference point accuracy --- p.67Chapter 4.4 --- Variable number of matching minutiae results --- p.68Chapter 4.5 --- Contribution of the verification prototype --- p.72Chapter 5. --- Conclusion and Future Research --- p.74Chapter 5.1 --- Conclusion --- p.74Chapter 5.2 --- Future Research --- p.74Bibliography --- p.7

    A survey of fingerprint classification Part II: experimental analysis and ensemble proposal

    Get PDF
    In the first part of this paper we reviewed the fingerprint classification literature from two different perspectives: the feature extraction and the classifier learning. Aiming at answering the question of which among the reviewed methods would perform better in a real implementation we end up in a discussion which showed the difficulty in answering this question. No previous comparison exists in the literature and comparisons among papers are done with different experimental frameworks. Moreover, the difficulty in implementing published methods was stated due to the lack of details in their description, parameters and the fact that no source code is shared. For this reason, in this paper we will go through a deep experimental study following the proposed double perspective. In order to do so, we have carefully implemented some of the most relevant feature extraction methods according to the explanations found in the corresponding papers and we have tested their performance with different classifiers, including those specific proposals made by the authors. Our aim is to develop an objective experimental study in a common framework, which has not been done before and which can serve as a baseline for future works on the topic. This way, we will not only test their quality, but their reusability by other researchers and will be able to indicate which proposals could be considered for future developments. Furthermore, we will show that combining different feature extraction models in an ensemble can lead to a superior performance, significantly increasing the results obtained by individual models.This work was supported by the Research Projects CAB(CDTI), TIN2011-28488, and TIN2013-40765-P

    Indexing techniques for fingerprint and iris databases

    Get PDF
    This thesis addresses the problem of biometric indexing in the context of fingerprint and iris databases. In large scale authentication system, the goal is to determine the identity of a subject from a large set of identities. Indexing is a technique to reduce the number of candidate identities to be considered by the identification algorithm. The fingerprint indexing technique (for closed set identification) proposed in this thesis is based on a combination of minutiae and ridge features. Experiments conducted on the FVC2002 and FVC2004 databases indicate that the inclusion of ridge features aids in enhancing indexing performance. The thesis also proposes three techniques for iris indexing (for closed set identification). The first technique is based on iriscodes. The second technique utilizes local binary patterns in the iris texture. The third technique analyzes the iris texture based on a pixel-level difference histogram. The ability to perform indexing at the texture level avoids the computational complexity involved in encoding and is, therefore, more attractive for iris indexing. Experiments on the CASIA 3.0 database suggest the potential of these schemes to index large-scale iris databases

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book

    Reconstruction of fingerprints from minutiae points

    Get PDF
    Most fingerprint authentication systems utilize minutiae information to compare fingerprint images. During enrollment, the minutiae template of a user\u27s fingerprint is extracted and stored in the database. In this work, we concern ourselves with the amount of fingerprint information that can be elicited from the minutiae template of a user\u27s fingerprint. We demonstrate that minutiae information can reveal substantial details such as the orientation field and class of the (unseen) parent fingerprint that can potentially be used to reconstruct the original fingerprint image.;Given a minutiae template, the proposed method first estimates the orientation map of the parent fingerprint by constructing minutiae triplets. The estimated orientation map is observed to be remarkably consistent with the underlying ridge flow of the unseen parent fingerprint. We also discuss a fingerprint classification technique that utilizes only the minutiae information to determine the class of the fingerprint (Arch, Left loop, Right loop and Whorl). The proposed classifier utilizes various properties of the minutiae distribution such as angular histograms, density, relationship between minutiae pairs, etc. A classification accuracy of 82% is obtained on a subset of the NIST-4 database. This indicates that the seemingly random minutiae distribution of a fingerprint can reveal important class information. (Abstract shortened by UMI.)
    corecore