47
8/18/2019 xử lý vân tay http://slidepdf.com/reader/full/xu-ly-van-tay 1/47 Fingerprint Recognition By WUZHILI (99050056) A thesis subitte! in p"rti"# $u#$i##ent o$ the re%uireents $or the !egree o$ B"che#or o$ &cience (Honors) in 'oputer &cience 'oputer &yste Hong ong B"ptist Uniersity *"te+ ,9 Apri# -00- 1

xử lý vân tay

Embed Size (px)

Citation preview

Page 1: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 1/47

Fingerprint RecognitionBy

WUZHILI (99050056)

A thesis subitte! in p"rti"# $u#$i##ent o$

the re%uireents $or the !egree o$ 

B"che#or o$ &cience (Honors) in 'oputer &cience

'oputer &yste

Hong ong B"ptist Uniersity

*"te+ ,9 Apri# -00-

1

Page 2: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 2/47

*ec#"r"tion

  I Hereby declare that all the design and implementation of the

Honors Project is my independent effort except otherwise specified. I also

certify that this project have never been submitted for academic or 

employment credit.

(99!!"# $u %hili

&omputer 'ystem ajor )epartment of &omputer 'cienceHong *ong +aptist ,niversity

)ate- 19/pril00

0

Page 3: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 3/47

Hong ong B"ptist Uniersity

*ep"rtent o$ 'oputer &cience

'oputer &yste ."/or

$e hereby recommend that the Honors Project submitted by

$u%hili entitled 2ingerprint 3ecognition4 be accepted in partial

fulfillment of the re5uirements for the degree of +achelor of 'cience

(honors# in &omputer 'cience (&omputer 'ystem#.

'upervisor- )r. 6.6. 7ang 8bserver- )r 6.$. eung

)ate- )ate-

:

Page 4: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 4/47

;

Page 5: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 5/47

/c<nowledgement

I would li<e to express my great gratitude towards my supervisor= )r. 7ang=

6uan 6an who has given me much suggestion= support and help. /lso I would li<e to

than< my observer= )r. eung= 6iu wing= for his useful comments. I also ta<e this

opportunity to give than<s to all others who give me support for the project or in other 

aspects of my study at H*+,.

 

!

Page 6: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 6/47

Fingerprint Recognition+y

$,>HII (99!!"#

/bstract

y Honors Project is to investigate the current techni5ues for fingerprint

recognition. 7his target can be mainly decomposed into image preprocessing= feature

extraction and feature match. 2or each sub?tas<= some classical and up?to?date

methods in literatures are analy%ed. +ased on the analysis= an integrated solution for 

fingerprint recognition is developed for demonstration.

y demonstration program is coded by /7/+. 2or the program= some

optimi%ation at coding level and algorithm level are proposed to improve the

 performance of my fingerprint recognition system. 7hese performance enhancements

are shown by experiments conducted upon a variety of fingerprint images. /lso= the

experiments illustrate the <ey issues of fingerprint recognition that are consistent with

what the available literatures say.

"

Page 7: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 7/47

7able of &ontents

&hapter 1- Introduction P11.1 $hat is / 2ingerprint P1

1.0 $hat is 2ingerprint 3ecognition P:1.: 7wo main approaches for 2ingerprint 3ecognition P!

&hapter 0- 'ystem )esign P"0.1 'ystem evel )esign P"0.0 /lgorithm evel )esign P@

&hapter :- 2ingerprint Image Preprocessing P9:.1 2ingerprint Image Anhancement P9:.0 2ingerprint Image +inari%ation P1:

:.: 2ingerprint Image 'egmentation P1;

&hapter ;- inutia Axtraction P1@;.1 2ingerprint 3idge 7hinning P1@;.0 inutia ar<ing P1B

&hapter ! inutia Post?processing P0!.1 2alse inutia 3emove P0!.0 ,nify inutia 3epresentation 2eature Cectors P00

&hapter "-inutia atch P0;".1 /lignment 'tage P0!".0 atch 'tage P0B

&hapter @- Axperimentation 3esults [email protected] Avaluation Indexes [email protected] Axperiment /nalysis P:

&hapter B- &onclusion P:0

3eferences P::

,ser anual P:!

@

Page 8: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 8/47

&H/P77A3 1- ID738),&7I8D

1.1 $hat is / 2ingerprintE

/ fingerprint is the feature pattern of one finger (2igure 1.1.1#. It is believed with

strong evidences that each fingerprint is uni5ue. Aach person has his own fingerprints

with the permanent uni5ueness. 'o fingerprints have being used for identification and

forensic investigation for a long time.

2igure1.1.1 / fingerprint image ac5uired by an 8ptical 'ensor 

/ fingerprint is composed of many ridges and furrows. 7hese ridges and furrows

 present good similarities in each small local window= li<e parallelism and average

width.

However= shown by intensive research on fingerprint recognition= fingerprints are

not distinguished by their ridges and furrows= but by inutia= which are some

abnormal points on the ridges (2igure 1.1.0#. /mong the variety of minutia types

reported in literatures= two are mostly significant and in heavy usage- one is called

termination= which is the immediate ending of a ridgeF the other is called bifurcation=

which is the point on the ridge from which two branches derive.

B

Page 9: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 9/47

2igure 1.1.0 inutia. (Calley is also referred as 2urrow=7ermination is also called Anding=

and +ifurcation is also called +ranch#

9

Page 10: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 10/47

1.0 $hat is 2ingerprint 3ecognitionE

7he fingerprint recognition problem can be grouped into two sub?domains- one is

fingerprint verification and the other is fingerprint identification (2igure 1.0.1#. In

addition= different from the manual approach for fingerprint recognition by experts=

the fingerprint recognition here is referred as /23' (/utomatic 2ingerprint

3ecognition 'ystem#= which is program?based.

2igure 1.0.1 Cerification vs. Identification

2ingerprint verification is to verify the authenticity of one person by his fingerprint.

7he user provides his fingerprint together with his identity information li<e his I)

number. 7he fingerprint verification system retrieves the fingerprint template

according to the I) number and matches the template with the real?time ac5uired

fingerprint from the user. ,sually it is the underlying design principle of /2/'

(/utomatic 2ingerprint /uthentication 'ystem#.

2ingerprint identification is to specify one personGs identity by his fingerprint(s#.

$ithout <nowledge of the personGs identity= the fingerprint identification system tries

1

Page 11: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 11/47

to match his fingerprint(s# with those in the whole fingerprint database. It is especially

useful for criminal investigation cases. /nd it is the design principle of /2I'

(/utomatic 2ingerprint Identification 'ystem#.

However= all fingerprint recognition problems= either verification or identification=

are ultimately based on a well?defined representation of a fingerprint. /s long as the

representation of fingerprints remains the uni5ueness and <eeps simple= the

fingerprint matching= either for the 1?to?1 verification case or 1?to?m identification

case= is straightforward and easy.

11

Page 12: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 12/47

1.: 7wo approaches for 2ingerprint recognition

7wo representation forms for fingerprints separate the two approaches for 

fingerprint recognition.

7he first approach= which is minutia?based= represents the fingerprint by its local

features= li<e terminations and bifurcations. 7his approach has been intensively

studied= also is the bac<bone of the current available fingerprint recognition products.

I also concentrate on this approach in my honors project.

7he second approach= which uses image?based methods"@= tries to do matching

 based on the global features of a whole fingerprint image. It is an advanced and newly

emerging method for fingerprint recognition. /nd it is useful to solve some intractable

 problems of the first approach. +ut my project does not aim at this method= so further 

study in this direction is not expanded in my thesis.

10

Page 13: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 13/47

&H/P7A3 0 '6'7A )A'IJD

0.1 'ystem evel )esign

/ fingerprint recognition system constitutes of fingerprint ac5uiring device= minutia

extractor and minutia matcher 2igure 0.1.1.

2igure 0.1.1 'implified 2ingerprint 3ecognition 'ystem

2or fingerprint ac5uisition= optical or semi?conduct sensors are widely used. 7hey

have high efficiency and acceptable accuracy except for some cases that the userGs

finger is too dirty or dry. However= the testing database for my project is from the

available fingerprints provided by 2C&00 (2ingerprint Cerification &ompetition

00#. 'o no ac5uisition stage is implemented.

7he minutia extractor and minutia matcher modules are explained in detail in the

next part for algorithm design and other subse5uent sections.

1:

Page 14: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 14/47

0.0 /lgorithm evel )esign

7o implement a minutia extractor= a three?stage approach is widely used by

researchers. 7hey are preprocessing= minutia extraction and postprocessing stage

2igure 0.0.1.

2igure 0.0.1 inutia Axtractor 

2or the fingerprint image preprocessing stage= I use Histogram A5uali%ation and

2ourier 7ransform to do image enhancement 9. /nd then the fingerprint image is

 binari%ed using the locally adaptive threshold method 10. 7he image segmentation

tas< is fulfilled by a three?step approach- bloc< direction estimation= segmentation by

direction intensity ; and 3egion of Interest extraction by orphological operations.

ost methods used in the preprocessing stage are developed by other researchers but

they form a brand new combination in my project through trial and error. /lso the

morphological operations for extraction 38I are introduced to fingerprint image

segmentation by myself.

2or minutia extraction stage= three thinning algorithms 100 are tested and the

orphological thinning operation is finally bid out with high efficiency and pretty

1;

Page 15: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 15/47

good thinning 5uality. 7he minutia mar<ing is a simple tas< as most literatures

reported but one special case is found during my implementation and an additional

chec< mechanism is enforced to avoid such <ind of oversight.

2or the postprocessing stage= a more rigorous algorithm is developed to remove

false minutia based on 101. /lso a novel representation for bifurcations is

 proposed to unify terminations and bifurcations.

2igure0.0.0 inutia atcher 

7he minutia matcher chooses any two minutia as a reference minutia pair and then

match their associated ridges first. If the ridges match well 1= two fingerprint images

are aligned and matching is conducted for all remaining minutia 2igure 0.0.0.

1!

Page 16: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 16/47

&H/P7A3 : 2IDJA3P3ID7 I/JA P3AP38&A''IDJ

:.1 2ingerprint Image Anhancement

2ingerprint Image enhancement is to ma<e the image clearer for easy further 

operations. 'ince the fingerprint images ac5uired from sensors or other medias are not

assured with perfect 5uality= those enhancement methods= for increasing the contrast

 between ridges and furrows and for connecting the false bro<en points of ridges due

to insufficient amount of in<= are very useful for <eep a higher accuracy to fingerprint

recognition.

7wo ethods are adopted in my fingerprint recognition system- the first one is

Histogram A5uali%ationF the next one is 2ourier 7ransform.

1,1, Histogr" 2%u"#i3"tion+

Histogram e5uali%ation is to expand (mK rLng# the pixel value distribution (phMn

tNn# of an image so as to increase the perceptional information. 7he original histogram

of a fingerprint image has the bimodal type 2igure :.1.1.1= the histogram after the

histogram e5uali%ation occupies (nOm trong <hong# all the range from to 0!! and

the visuali%ation effect is enhanced 2igure :.1.1.0.

1"

Page 17: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 17/47

  2igure :.1.1 the 8riginal histogram

of a fingerprint image

2igure :.1.0 Histogram after the Histogram

A5uali%ation

7he right side of the following figure 2igure :.1.1.: is the output after the

histogram e5uali%ation.

2igure :.1.: Histogram Anhancement.

8riginal Image (eft#. Anhanced image (3ight#

1@

Page 18: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 18/47

1,1- Fingerprint 2nh"nceent by Fourier 4r"ns$or

$e divide the image into small processing bloc<s (:0 by :0 pixels# and perform

the 2ourier transform according to-

  (1#

for u Q = 1= 0= ...= :1 and v Q = 1= 0= ...= :1.

In order to enhance a specific bloc< by its dominant fre5uencies= we multiply the

227 of the bloc< by its magnitude a set of times. $here the magnitude of the original

227 Q abs(2(u=v## Q R2(u=v#R.

Jet the enhanced bloc< according to

  (0# =

where 2?1(2(u=v## is done by-

  (:#

for x Q = 1= 0= ...= :1 and y Q = 1= 0= ...= :1.

7he < in formula (0# is an experimentally determined constant= which we choose

<Q.;! to calculate. $hile having a higher S<S improves the appearance of the ridges=

filling up small holes in ridges= having too high a S<S can result in false joining of 

ridges. 7hus a termination might become a bifurcation (TiUm <Vt thWc cX thU rY

nhNnh#. 2igure :.1.0.1 presents the image after 227 enhancement.

1B

Page 19: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 19/47

2igure :.1.0.1 2ingerprint enhancement by 227Anhanced image (left#= 8riginal image (right#

7he enhanced image after 227 has the improvements to connect some falsely

 bro<en points on ridges and to remove some spurious connections between ridges.

7he shown image at the left side of figure :.1.0.1 is also processed with histogram

e5uali%ation after the 227 transform. 7he side effect of each bloc< is obvious but it

has no harm to the further operations because I find the image after consecutive

 binari%ation operation is pretty good as long as the side effect is not too severe.

19

Page 20: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 20/47

:.0 2ingerprint Image +inari%ation

2ingerprint Image +inari%ation is to transform the B?bit Jray fingerprint image to a

1?bit image with ?value for ridges and 1?value for furrows. /fter the operation=

ridges in the fingerprint are highlighted with blac< color while furrows are white.

/ locally adaptive binari%ation method is performed to binari%e the fingerprint

image. 'uch a named method comes from the mechanism of transforming a pixel

value to 1 if the value is larger than the mean intensity value of the current bloc< 

(1"x1"# to which the pixel belongs 2igure :.0.1.

2igure :.0.1 the 2ingerprint image after adaptive binari%ation

+inari%ed image(left#= Anhanced gray image(right#

0

Page 21: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 21/47

:.: 2ingerprint Image 'egmentation

In general= only a 3egion of Interest (38I# is useful to be recogni%ed for each

fingerprint image. 7he image area without effective ridges and furrows is first

discarded since it only holds bac<ground information. 7hen the bound (biZn# of the

remaining effective area is s<etched (phNt h[a# out since the minutia in the bound

region are confusing with those spurious (gi# minutia that are generated when the

ridges are out of the sensor.

7o extract the 38I= a two?step method is used. 7he first step is bloc< direction

estimation (\]c l\^ng <h_i tr\`ng Tnh h\]ng# and direction variety chec< (<iUm tra

tr\`ng Tnh h\]ng# 1= while the second is intrigued from some orphological

methods.

1. B#oc !irection esti"tion

1.1 Astimate the bloc< direction for each bloc< of the fingerprint image with $x$

in si%e($ is 1" pixels by default#. 7he algorithm is-

I. &alculate the gradient values along x?direction (gx# and y?direction (gy# for 

each pixel of the bloc<. 7wo 'obel filters are used to fulfill the tas<.

II. 2or each bloc<= use 2ollowing formula to get the east '5uare approximation

(xp x# of the bloc< direction.

tg0 Q 0 ∑ ∑ (gxgy#∑ ∑  (gx0?gy0# for all the pixels in each bloc<.

01

Page 22: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 22/47

7he formula is easy to understand by regarding gradient values along x?

direction and y?direction as cosine value and sine value. 'o the tangent value

of the bloc< direction is estimated nearly the same as the way illustrated by the

following formula.

tg2θ = 2sinθ cosθ /(cos2θ -sin2θ )

1.0 /fter finished with the estimation of each bloc< direction= those bloc<s without

significant information on ridges and furrows are discarded (loi b# based on the

following formulas-

A Q 2 ∑ ∑ (gx*gy)+ ∑ ∑  (gx2-gy

2)}/ W*W*∑ ∑  (gx2+gy

2)

2or each bloc<= if its certainty level A is below a threshold (ng\ng#= then the

 bloc< is regarded as a bac<ground bloc<.

7he direction map is shown in the following diagram. $e assume there is only onefingerprint in each image.

2igure :.:.1.1 )irection map.

+inari%ed fingerprint (left#= )irection map (right#

-1 RI e7tr"ction by .orpho#ogic"# oper"tions

00

Page 23: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 23/47

7wo orphological operations called 8PADG and &8'AG are adopted. 7he

8PADG operation can expand images and remove pea<s introduced by bac<ground

noise 2igure :.:.0.0. 7he &8'AG operation can shrin< images and eliminate small

cavities 2igure :.:.0.:.

2igure :.:.0.1 8riginal Image /rea 2igure :.:.0.0 /fter &8'A operation

2igure :.:.0.: /fter 8PAD operation 2igure :.:.0.; 38I k +ound

2igure :.:.0.; show the interest fingerprint image area and its bound. 7he

 bound is the subtraction of the closed area from the opened area. 7hen the algorithm

0:

Page 24: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 24/47

throws away those leftmost= rightmost= uppermost and bottommost bloc<s out of the

 bound so as to get the tightly bounded region just containing the bound and inner area.

0;

Page 25: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 25/47

&H/P7A3 ; ID,7I/ A73/&7I8D

;.1 2ingerprint 3idge 7hinning

3idge 7hinning is to eliminate the redundant pixels of ridges till the ridges are just

one pixel wide. 10 uses an iterative= parallel thinning algorithm. In each scan of the

full fingerprint image= the algorithm mar<s down redundant pixels in each small

image window (:x:#. /nd finally removes all those mar<ed pixels after several scans.

In my testing= such an iterative= parallel thinning algorithm has bad efficiency

although it can get an ideal thinned ridge map after enough scans. 0 uses a one?in?

all method to extract thinned ridges from gray?level fingerprint images directly. 7heir 

method traces along the ridges having maximum gray intensity value. However=

 binari%ation is implicitly enforced since only pixels with maximum gray intensity

value are remained. /lso in my testing= the advancement of each trace step still has

large computation complexity although it does not re5uire the movement of pixel by

 pixel as in other thinning algorithms. 7hus the third method is bid out which uses the

 built?in orphological thinning function in /7/+.

7he thinned ridge map is then filtered by other three orphological operations to

remove some H brea<s= isolated points and spi<es.

0!

Page 26: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 26/47

11

1

1

1

1

1 11

1

;.0 inutia ar<ing

/fter the fingerprint ridge thinning= mar<ing minutia points is relatively easy. +ut it

is still not a trivial tas< as most literatures declared because at least one special case

evo<es my caution during the minutia mar<ing stage.

In general= for each :x: window= if the central pixel is 1 and has exactly : one?value

neighbors= then the central pixel is a ridge branch 2igure ;.0.1. If the central pixel is

1 and has only 1 one?value neighbor= then the central pixel is a ridge ending

2igure;.0.0.

2igure ;.0.1 +ifurcation 2igure ;.0.0 7ermination

  2igure ;.0.: 7riple counting branch

2igure ;.0.: illustrates a special case that a genuine branch is triple counted.

'uppose both the uppermost pixel with value 1 and the rightmost pixel with value 1

have another neighbor outside the :x: window= so the two pixels will be mar<ed as

0"

Page 27: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 27/47

 branches too. +ut actually only one branch is located in the small region. 'o a chec< 

routine re5uiring that none of the neighbors of a branch are branches is added.

/lso the average inter?ridge width ) is estimated at this stage. 7he average inter?

ridge width refers to the average distance between two neighboring ridges. 7he way to

approximate the ) value is simple. 'can a row of the thinned ridge image and sum up

all pixels in the row whose value is one. 7hen divide the row length with the above

summation to get an inter?ridge width. 2or more accuracy= such <ind of row scan is

 performed upon several other rows and column scans are also conducted= finally all

the inter?ridge widths are averaged to get the ).

7ogether with the minutia mar<ing= all thinned ridges in the fingerprint image are

labeled with a uni5ue I) for further operation. 7he labeling operation is reali%ed by

using the orphological operation- +$/+A.

0@

Page 28: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 28/47

&H/P7A3 ! ID,7I/ P8'7P38&A''IDJ

!.1 2alse inutia 3emoval

7he preprocessing stage does not totally heal the fingerprint image. 2or example=

false ridge brea<s due to insufficient amount of in< and ridge cross?connections due to

over in<ing are not totally eliminated. /ctually all the earlier stages themselves

occasionally introduce some artifacts which later lead to spurious minutia. 7hese false

minutia will significantly affect the accuracy of matching if they are simply regarded

as genuine minutia. 'o some mechanisms of removing false minutia are essential to

<eep the fingerprint verification system effective.

'even types of false minutia are specified in following diagrams-

  m1 m0 m: m;

m! m" m@

2igure !.1.1. 2alse inutia 'tructures. m1 is a spi<e piercing into a valley. In the m0case a spi<e falsely connects two ridges. m: has two near bifurcations located in the same ridge.7he two ridge bro<en points in the m; case have nearly the same orientation and a short distance.m! is ali<e the m; case with the exception that one part of the bro<en ridge is so short thatanother termination is generated. m" extends the m; case but with the extra property that a thirdridge is found in the middle of the two parts of the bro<en ridge. m@ has only one short ridgefound in the threshold window.

; only handles the case m1= m;=m! and m". 9 and 0 have not false minutia

removal by simply assuming the image 5uality is fairly good. 10 has not a

0B

Page 29: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 29/47

systematic healing method to remove those spurious minutia although it lists all types

of false minutia shown in 2igure !.1.1 except the m: case.

y procedures in removing false minutia are-

1. If the distance between one bifurcation and one termination is less than ) and

the two minutia are in the same ridge(m1 case# . 3emove both of them. $here )

is the average inter?ridge width representing the average distance between two

 parallel neighboring ridges.

0. If the distance between two bifurcations is less than ) and they are in the same

ridge= remove the two bifurcations. (m0= m: cases#.

:. If two terminations are within a distance ) and their directions are coincident

with a small angle variation. /nd they suffice the condition that no any other 

termination is located between the two terminations. 7hen the two terminations

are regarded as false minutia derived from a bro<en ridge and are removed.

(case m;=m!= m"#.

;. If two terminations are located in a short ridge with length less than )= remove

the two terminations (m@#.

y proposed procedures in removing false minutia have two advantages. 8ne is

that the ridge I) is used to distinguish minutia and the seven types of false minutia arestrictly defined comparing with those loosely defined by other methods. 7he second

advantage is that the order of removal procedures is well considered to reduce the

computation complexity. It surpasses the way adopted by 10 that does not utili%e the

relations among the false minutia types. 2or example= the procedure: solves the m;=

m! and m" cases in a single chec< routine. /nd after procedure := the number of false

minutia satisfying the m@ case is significantly reduced.

09

Page 30: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 30/47

1

11 1

!.0 ,nify terminations and bifurcations

'ince various data ac5uisition conditions such as impression pressure can easily

change one type of minutia into the other= most researchers adopt the unification

representation for both termination and bifurcation. 'o each minutia is completely

characteri%ed by the following parameters at last- 1# x?coordinate= 0# y?coordinate=

and :# orientation.

7he orientation calculation for a bifurcation needs to be specially considered. /ll

three ridges deriving from the bifurcation point have their own direction= 9

represents the bifurcation orientation using a techni5ue proposed in 1: 2igure

1.1.0. 1 simply chooses the minimum angle among the three anticloc<wise

orientations starting from the x?axis. +oth methods cast the other two directions away=

so some information loses. Here I propose a novel representation to brea< a

 bifurcation into three terminations. 7he three new terminations are the three neighbor 

 pixels of the bifurcation and each of the three ridges connected to the bifurcation

 before is now associated with a termination respectively 2igure !.0.1.

2igure !.0.1 / bifurcation to three terminations  7hree neighbors become terminations (eft#

  Aach termination has their own orientation (3ight#

:

Page 31: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 31/47

/nd the orientation of each termination (tx=ty# is estimated by following method

boo< ch0-

7rac< a ridge segment whose starting point is the termination and length is ). 'um

up all x?coordinates of points in the ridge segment. )ivide above summation with )

to get sx. 7hen get sy using the same way.

Jet the direction from- atan((sy?ty#(sx?tx##.

:1

Page 32: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 32/47

&H/P7A3 " ID,7I/ /7&H

Jiven two set of minutia of two fingerprint images= the minutia match algorithm

determines whether the two minutia sets are from the same finger or not.

/n alignment?based match algorithm partially derived from the 1 is used in my

 project. It includes two consecutive stages- one is alignment stage and the second is

match stage.

1. /lignment stage. Jiven two fingerprint images to be matched= choose any oneminutia from each image= calculate the similarity of the two ridges associated

with the two referenced minutia points. If the similarity is larger than a

threshold= transform each set of minutia to a new coordination system whose

origin is at the referenced point and whose x?axis is coincident with the direction

of the referenced point.

0. atch stage- /fter we get two set of transformed minutia points= we use the

elastic match algorithm to count the matched minutia pairs by assuming two

minutia having nearly the same position and direction are identical.

:0

Page 33: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 33/47

".1 /lignment 'tage

1. 7he ridge associated with each minutia is represented as a series of x?

coordinates (x1= x0xn# of the points on the ridge. / point is sampled per ridge length

starting from the minutia point= where the is the average inter?ridge length. /nd n

is set to 1 unless the total ridge length is less than 1.

'o the similarity of correlating the two ridges is derived from-

' Q ∑miQxii∑m

iQxi0i

0.!=

where (xixn# and (i D # are the set of minutia for each fingerprint image

respectively. /nd m is minimal one of the n and D value. If the similarity score is

larger than .B= then go to step 0= otherwise continue to match the next pair of ridges.

0. 2or each fingerprint= translate and rotate all other minutia with respect to the

reference minutia according to the following formula-

xinew

yinew

θinew

 

 

 

 

 

xi x−( #

yi y−( #

θi

  θ−( )

=TM *

=where (x=y=θ# is the parameters of the reference minutia= and 7 is

TM =

cosθ

sinθ

sinθ−

cosθ

1

 

 

 

7he following diagram illustrate the effect of translation and rotation-

::

Page 34: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 34/47

θ

)

A

2

?axis

6?axis

q?axis

6q?axis

y

)

A

2

θ

)

A

2

)

A

2

?axis

6?axis

q?axis

6q?axis

y

x

7he new coordinate system is originated at minutia 2 and the new x?axis is coincident with thedirection of minutia 2. Do scaling effect is ta<en into account by assuming two fingerprints from thesame finger have nearly the same si%e.

y method to align two fingerprints is almost the same with the one used by 1 but

is different at step 0. inGs method uses the rotation angle calculated from all the

sparsely sampled ridge points. y method use the rotation angle calculated earlier by

densely tracing a short ridge start from the minutia with length ). 'ince I have

already got the minutia direction at the minutia extraction stage= obviously my method

reduces the redundant calculation but still holds the accuracy.

/lso inGs way to do transformation is to directly align one fingerprint image to

another according to the discrepancy of the reference minutia pair. +ut it still re5uires

a transform to the polar coordinate system for each image at the next minutia match

:;

Page 35: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 35/47

stage. y approach is to transform each according to its own reference minutia and

then do match in a unified x?y coordinate. 7herefore= less computation wor<load is

achieved through my method.

:!

Page 36: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 36/47

".0 atch 'tage

7he matching algorithm for the aligned minutia patterns needs to be elastic since the

strict match re5uiring that all parameters (x= y= θ# are the same for two identical

minutia is impossible due to the slight deformations and inexact 5uanti%ations of 

minutia.

y approach to elastically match minutia is achieved by placing a bounding box

around each template minutia. If the minutia to be matched is within the rectangle box

and the direction discrepancy between them is very small= then the two minutia are

regarded as a matched minutia pair. Aach minutia in the template image either has no

matched minutia or has only one corresponding minutia.

7he final match ratio for two fingerprints is the number of total matched pair 

over the number of minutia of the template fingerprint. 7he score is 1ratio and

ranges from to 1. If the score is larger than a pre?specified threshold= the two

fingerprints are from the same finger.

However= the elastic match algorithm has large computation complexity and is

vulnerable to spurious minutia.

:"

Page 37: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 37/47

&H/P7A3 @ APA3IAD7/7I8D 3A',7'

@.1 Avaluation indexes for fingerprint recognition

7wo indexes are well accepted to determine the performance of a fingerprint

recognition system- one is 233 (false rejection rate# and the other is 2/3 (false

acceptance rate#. 2or an image database= each sample is matched against the

remaining samples of the same finger to compute the 2alse 3ejection 3ate. If the

matching  g against h is performed= the symmetric one (i.e.= h against  g # is not

executed to avoid correlation. /ll the scores for such matches are composed into a

series of &orrect 'core. /lso the first sample of each finger in the database is matched

against the first sample of the remaining fingers to compute the 2alse /cceptance

3ate. If the matching g  against h is performed= the symmetric one (i.e.= h against g # is

not executed to avoid correlation. /ll the scores from such matches are composed into

a series of Incorrect 'core.

:@

Page 38: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 38/47

@.0 Axperimentation 3esults

/ fingerprint database from the 2C&0 (2ingerprint Cerification &ompetition

0# is used to test the experiment performance. y program tests all the images

without any fine?tuning for the database. 7he experiments show my program can

differentiate imposturous minutia pairs from genuine minutia pairs in a certain

confidence level. 2urthermore= good experiment designs can surely improve the

accuracy as declared by 1. 2urther studies on good designs of training and testing

are expected to improve the result.

Here is the diagram for &orrect 'core and Incorrect 'core distribution-

2igure @.0.1 )istribution of &orrect 'cores and Incorrect 'cores3ed line- Incorrect 'coreJreen line- &orrect 'cores

It can be seen from the above figure that there exist two partially overlapped

distributions. 7he 3ed curve whose pea<s are mainly located at the left part means the

average incorrect match score is 0!. 7he green curve whose pea<s are mainly located

on the right side of red curve means the average correct match score is :!. 7his

:B

Page 39: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 39/47

indicates the algorithm is capable of differentiate fingerprints at a good correct rate by

setting an appropriate threshold value.

2igure @.0.0 2/3 and 233 curve+lue dot line- 233 curve3ed dot line- 2/3 curve

7he above diagram shows the 233 and 2/3 curves. /t the e5ual error rate 0!= the

separating score :: will falsely reject 0! genuine minutia pairs and falsely accept

0! imposturous minutia pairs and has @! verification rate.

7he high incorrect acceptance and false rejection are due to some fingerprint images

with bad 5uality and the vulnerable minutia match algorithm.

:9

Page 40: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 40/47

&H/P7A3 B &8D&,'7I8D

y project has combined many methods to build a minutia extractor and a minutiamatcher. 7he combination of multiple methods comes from a wide investigation into

research paper. /lso some novel changes li<e segmentation using orphological

operations= minutia mar<ing with special considering the triple branch counting=

minutia unification by decomposing a branch into three terminations= and matching in

the unified x?y coordinate system after a two?step transformation are used in my

 project= which are not reported in other literatures I referred to.

/lso a program coding with /7/+ going through all the stages of the

fingerprint recognition is built. It is helpful to understand the procedures of 

fingerprint recognition. /nd demonstrate the <ey issues of fingerprint recognition.

;

Page 41: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 41/47

3A2A3AD&A'

1 in Hong. S/utomatic Personal Identification ,sing 2ingerprintsS= Ph.). 7hesis=

199B.0 ).aio and ). altoni. )irect gray?scale minutiae detection in fingerprints.

IAAA 7rans. Pattern /nal. /nd achine Intell.= 19(1#-0@?;= 199@.

: ain= /.*.= Hong= .= and +olle= 3.(199@#= 8n?ine 2ingerprint Cerification=4

IAAA 7rans. 8n Pattern /nal and achine Intell= 19(;#= pp. :0?:1;.

; D. 3atha= '. &hen and /.*. ain= S/daptive 2low 8rientation +ased 2eature

Axtraction in 2ingerprint ImagesS= Pattern 3ecognition= Col. 0B= pp. 1"!@?1"@0=

 Dovember 199!.

! /lessandro 2arina= >solt .*ovacs?Cajna= /lberto leone= 2ingerprint minutiae

extraction from s<eletoni%ed binary images= Pattern 3ecognition= Col.:0= Do.;=

 ppB@@?BB9= 1999.

" ee= &..= and $ang= '.).- 2ingerprint feature extration using Jabor filters=

Alectron. ett.= 1999= :!= (;#= pp.0BB?09.

@ . 7ico= P.*uosmanen and .'aarinen. $avelet domain features for fingerprint

recognition= Alectroni. ett.= 01= :@= (1#= pp.01?00.

B . Hong= 6. $an and /.*. ain= S2ingerprint Image Anhancement- /lgorithms

and Performance AvaluationS= IAAA 7ransactions on P/I =Col. 0= Do. B= pp.@@@?

@B9= /ugust 199B.

9 Image 'ystems Angineering Program= 'tanford ,niversity. 'tudent project +y

7homas 6eo= $ee Peng 7ay= 6ing 6u 7ai.

http-ise.stanford.educlassee:"Baproj1dropboxproject00finger

1 2C&0. http-bias.csr.unibo.itfvc0

11 2C&00. http-bias.csr.unibo.itfvc00

;1

Page 42: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 42/47

10 .&. ain= ,.Halici= I. Hayashi= '.+. ee and '.7sutsui. Intelligent biometric

techni5ues in fingerprint and face recognition. 1999= the &3& Press.

1: . . )onahue and '. I. 3o<hlin= S8n the ,se of evel &urves in Image

/nalysis=S Image ,nderstanding= C8. !@= pp "!0 ? "!!= 1990.

;0

Page 43: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 43/47

User ."nu"#

1. 7ype command st"rt8gui8sing#e8o!e in /7/+ ".

2igure .1 the ,ser Interface of the 2ingerprint 3ecognition 'ystem. 7he series of buttons on theleft side will be invo<ed se5uentially in the conse5uent demonstration. 7he two blan< areas are

used to show the fingerprint image before and after a transaction respectively.

0. &lic< Lo"! +utton

2igure .0 oad a gray level fingerprint image from a drive specified by ,sers. ultiple formats

are supported and the image si%e is not limited. +ut the fingerprint ridges should have large grayintensity comparing with the bac<ground and valleys.

;:

Page 44: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 44/47

:. &lic< his2%u"#i3"tion +utton

2igure .: /fter Histogram A5uali%ation. 7he image on the left side is the original fingerprint.7he enhanced image after the Histogram A5uali%ation is shown on the right side.

;. &lic< $$t +utton

2igure .; &aptured window after clic< 227G button. 7he pop?up dialog accepts the parameter < (please refer the formula 0#. 7he experimental optimal < value is .;!. ,sers can fill any other constant in the dialog to get a better performance. 7he enhanced image will be shown in the leftscreen box= which however is not shown here.

!. &lic<  Bin"ri3"tion +utton

".&lic< *irection +utton

;;

Page 45: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 45/47

2igure .!." 'creen capture after binari%ation (left# and bloc< direction estimation (right#.

@. &lic< RI Are" +utton

2igure .@ 38I extraction(right#. 7he intermediate steps for all the morphological operations suchclose and open are not shown. 7he right screen box shows the final region of interest of thefingerprint image. 7he subse5uent operations will only operate on the region of interest.

B. &lic< 4hinning +utton

9. &lic< Reoe H bre"s +utton

1. &lic< Reoe spies +utton

;!

Page 46: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 46/47

2igure .1 the 2ingerprint image after thining= H brea<s removal= isolated pea<s removal andspi<e removal.(right#.

11. &lic<  27tr"ct +utton

10. &lic< Re"# .inuti" +utton

2igure .10 inutia ar<ing (right# and 2alse inutia 3emoval (eft#. +ifurcations are locatedwith yellow crosses and terminations are denotes with red stars. /nd the genuine minutia (left# arelabeled with orientations with green arrows.

1:. &lic< &"e +utton

;"

Page 47: xử lý vân tay

8/18/2019 xử lý vân tay

http://slidepdf.com/reader/full/xu-ly-van-tay 47/47

2igure .1: 'ave minutia to a text file. 7he saved text file stores the information on all genuineminutia. 7he exact format of the files are explained in the source code.

1;. &lic< ."tch +utton

2igure .1; oad two minutia files and do matching. ,sers can open two minutia data files fromthe dialog invo<ed by clic<ing the atchG button. 7he match algorithm will return a prompt of thematch score. +ut be noted that matching in the J,I mode is not encouraged since the matchalgorithm relies on heavy computation. ,npredicted states will happen after a long irresponsiverunning time. +atch testing is prepared for testing match. Please refer the source files for batchtesting.