37 research outputs found

    A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation

    Get PDF
    Latent fingerprint identification is attracting increasing interest because of its important role in law enforcement. Although the use of various fingerprint features might be required for successful latent fingerprint identification, methods based on minutiae are often readily applicable and commonly outperform other methods. However, as many fingerprint feature representations exist, we sought to determine if the selection of feature representation has an impact on the performance of automated fingerprint identification systems. In this paper, we review the most prominent fingerprint feature representations reported in the literature, identify trends in fingerprint feature representation, and observe that representations designed for verification are commonly used in latent fingerprint identification. We aim to evaluate the performance of the most popular fingerprint feature representations over a common latent fingerprint database. Therefore, we introduce and apply a protocol that evaluates minutia descriptors for latent fingerprint identification in terms of the identification rate plotted in the cumulative match characteristic (CMC) curve. From our experiments, we found that all the evaluated minutia descriptors obtained identification rates lower than 10% for Rank-1 and 24% for Rank-100 comparing the minutiae in the database NIST SD27, illustrating the need of new minutia descriptors for latent fingerprint identification.This work was supported in part by the National Council of Science and Technology of Mexico (CONACYT) under Grant PN-720 and Grant 63894

    Identifying individuals from average quality fingerprint reference templates, when the best do not provide the best results !

    Get PDF
    International audienceThe fingerprint is one of the most used biometric modalities because of its persistence, uniqueness characteristics and ease of acquisition. Nowadays, there are large country-sized fingerprint databases for identification purposes, for border access controls and also for Visa issuance procedures around the world. The objective usually is to identify an input fingerprint among a large fingerprint database. In order to achieve this goal, different fingerprint pre-selection, classification or indexing techniques have been developed to speed up the research process to avoid comparison of the input fingerprint template against each fingerprint in the database. Although these methods are fairly accurate for identification process, we think that all of them assume the hypothesis to have a good quality of the fingerprint template for the first step of enrollment. In this paper, we show how the quality of reference templates can impact the performance of identification algorithms. We collect information and implement differents methods from the state of the art of fingerprint identification. Then, for these differents methods, we vary the quality of reference templates by using NFIQ2 metric quality. This allowed us to build a benchmark in order to evaluate the impact of these different enrollment scenarios on identification

    Um novo arcabouço para análise de qualidade de imagens de impressões digitais de alta resolução

    Get PDF
    Orientador: Neucimar Jerônimo LeiteTese (doutorado) - Universidade Estadual de Campinas, Instituto de ComputaçãoResumo: A falta de robustez referente à degradação de qualidade de conjuntos de características extraídas de padrões de cristas-e-vales, contidos na epiderme dos dedos humanos, é uma das questões em aberto na análise de imagens de impressões digitais, com implicações importantes em problemas de segurança, privacidade e fraude de identificação. Neste trabalho, introduzimos uma nova metodologia para analisar a qualidade de conjuntos de características de terceiro nível em imagens de impressões digitais representados, aqui, por poros de transpiração. A abordagem sugerida leva em conta a interdependência espacial entre as características consideradas e algumas transformações básicas envolvendo a manipulação de processos pontuais e sua análise a partir de ferramentas anisotrópicas. Foram propostos dois novos algoritmos para o cálculo de índices de qualidade que se mostraram eficazes na previsão da qualidade da correspondência entre as impressões e na definição de pesos de filtragem de características de baixa qualidade a ser empregado num processo de identificação. Para avaliar experimentalmente o desempenho destes algoritmos e suprir a ausência de uma base de dados com níveis de qualidade controlados, criamos uma base de dados com diferentes recursos de configuração e níveis de qualidade. Neste trabalho, propusemos ainda um método para reconstruir imagens de fase da impressão digital a partir de um dado conjunto de coordenadas de poros. Para validar esta idéia sob uma perspectiva de identificação, consideramos conjuntos de minúcias presentes nas imagens reconstruídas, inferidas a partir das configurações de poros, e associamos este resultado ao problema típico de casamento de impressões digitaisAbstract: The lack of robustness against the quality degradation affecting sets of features extracted from patterns of epidermal ridges on our fingers is one of the open issues in fingerprint image analysis, with implications for security, privacy, and identity fraud. In this doctorate work we introduce a new methodology to analyze the quality of sets of level-3 fingerprint features represented by pores. Our approach takes into account the spatial interrelationship between the considered features and some basic transformations involving point process and anisotropic analysis. We propose two new quality index algorithms, which have proved to be effective as a matcher predictor and in the definition of weights filtering out low-quality features from an identification process. To experimentally assess the performance of these algorithms and supply the absence of a feature-based controlled quality database in the biometric community, we created a dataset with features configurations containing different levels of quality. In this work, we also proposed a method for reconstructing phase images from a given set of pores coordinates. To validate this idea from an identification perspective, we considered the set of minutia present in the reconstructed images and inferred from the pores configurations and used this result in fingerprint matchingsDoutoradoCiência da ComputaçãoDoutor em Ciência da Computação01-P-3951/2011147050/2012-0CAPESCNP

    Novel Method of Identifying Fingerprint Using Minutiae Matching in Biometric Security System

    Full text link
    Fingerprint is one of the best apparatus to identify human because of its uniqueness, details information, hard to change and long-term indicators of human identity where there are several biometric feature that can be recycled to endorse the individuality. Identification of fingerprint is very important in forensic science, trace any part of human, collection of crime part and proof from a crime. This paper presents a new method of identifying fingerprint in biometrics security system. Fingerprint is one of the best example in biometric security because it can identify personal information and it is much secure than any other biometric identification system. The experimental result exhibits the performance of the proposed method

    A technique to improve ridge flows of fingerprint orientation fields estimation

    Get PDF
    An accurate estimated fingerprint orientation fields is a significant step for detection of singular points. Gradient-based methods are frequently used for estimating orientation fields but those methods are sensitive to noise. Fingerprints that perfect quality are seldom. They may be corrupted and degraded due to impression conditions or variations on skin. Enhancement of ridge flows improved the structure of orientation fields and hence increased the number of true singular points thereby conducting the overall performance of the classification process. In this paper, we provided discussion on the technique and implementation to improve local ridge flows of fingerprint orientation fields. That main technique have four steps; firstly, fingerprint segmentation; secondly, identification of noise areas and marking; thirdly, estimation of fingerprint orientation fields, and finally, enhancement of ridge flows using minimum variance of the cross centre block direction in squared gradients. A standard fingerprint database is used for testing of proposed technique to verify the tier of effectivity of algorithm. The experimental results suggest that our enhanced algorithm achieves visibly better ridge flows compare to other methods

    Security and accuracy of fingerprint-based biometrics: A review

    Get PDF
    Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper

    Security and accuracy of fingerprint-based biometrics: A review

    Get PDF
    Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper

    Fingerabdruckswachstumvorhersage, Bildvorverarbeitung und Multi-level Judgment Aggregation

    Get PDF
    Im ersten Teil dieser Arbeit wird Fingerwachstum untersucht und eine Methode zur Vorhersage von Wachstum wird vorgestellt. Die Effektivität dieser Methode wird mittels mehrerer Tests validiert. Vorverarbeitung von Fingerabdrucksbildern wird im zweiten Teil behandelt und neue Methoden zur Schätzung des Orientierungsfelds und der Ridge-Frequenz sowie zur Bildverbesserung werden vorgestellt: Die Line Sensor Methode zur Orientierungsfeldschätzung, gebogene Regionen zur Ridge-Frequenz-Schätzung und gebogene Gabor Filter zur Bildverbesserung. Multi-level Jugdment Aggregation wird eingeführt als Design Prinzip zur Kombination mehrerer Methoden auf mehreren Verarbeitungsstufen. Schließlich wird Score Neubewertung vorgestellt, um Informationen aus der Vorverarbeitung mit in die Score Bildung einzubeziehen. Anhand eines Anwendungsbeispiels wird die Wirksamkeit dieses Ansatzes auf den verfügbaren FVC-Datenbanken gezeigt.Finger growth is studied in the first part of the thesis and a method for growth prediction is presented. The effectiveness of the method is validated in several tests. Fingerprint image preprocessing is discussed in the second part and novel methods for orientation field estimation, ridge frequency estimation and image enhancement are proposed: the line sensor method for orientation estimation provides more robustness to noise than state of the art methods. Curved regions are proposed for improving the ridge frequency estimation and curved Gabor filters for image enhancement. The notion of multi-level judgment aggregation is introduced as a design principle for combining different methods at all levels of fingerprint image processing. Lastly, score revaluation is proposed for incorporating information obtained during preprocessing into the score, and thus amending the quality of the similarity measure at the final stage. A sample application combines all proposed methods of the second part and demonstrates the validity of the approach by achieving massive verification performance improvements in comparison to state of the art software on all available databases of the fingerprint verification competitions (FVC)

    The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Twenty two papers were submitted from Australia and overseas, of which eighteen were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conference. To our sponsors, also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference
    corecore