Image source: teachingonlineblog.blogspot.com |
Fingerprint Recognition is one of
the research hotspots in Biometrics. It refers to the automated method of
verifying a match between two human fingerprints. It is essentially a
challenging pattern recognition problem where two competing error rates: the False
Accept Rate (FAR) and the False Reject Rate (FRR) need to be minimized.
Advancement of computing capabilities led to the development of Automated
Fingerprint Authentication Systems (AFIS) and this led to extensive research
especially in the last two decades. In this article, we attempt to give a
comprehensive scoping of the fingerprint recognition problem and address its
major design and implementation issues as well as give an insight into its
future prospects.
In order to access the Internet or
any other important resource safely, high-security authentication systems are
essential. However, studies [10] show that users usually choose weak passwords,
frequently re-use passwords across multiple sites, and often forget them.
According to the 2002 NTA Monitor Password Survey, heavy web users have an
average of 21 passwords, 81% of users choose a common password and 30% write
their passwords down or store them in a file. Automated identity authentication
using fingerprint recognition [4, 3] is an effective solution in such cases.
Historically speaking, fingerprints have been long associated with criminology,
specifically forensics. The development of cheaper and robust automated fingerprint
authentication systems coupled with the inherent ease of fingerprint acquisition has led to its widespread commercial and civilian applications. One of the
world’s largest fingerprint recognition systems is the Integrated Automated
Fingerprint Identification System (IAFIS), maintained by the FBI in the US
since 1999.
A.Fingerprint
as a Biometric
“Two like fingerprints would be found only once every 1048 years” —
Scientific American, 1911.
The individuality of fingerprints is
based on empirical observations. However, Golfarelli et al [6] formulated the
optimum Bayesian decision criterion for a biometric verification system and
obtained a theoretical equal error rate (EER) of 1.31 x 10-5 for a
hand-geometry-based verification system and of 2 x 10-3 for a face-based
verification system. Similarly, Pankanti et al [5] also showed that there is a limited probability of correspondence of two fingerprints.
B. Classification & Indexing of Fingerprints
Fingerprint authentication includes
two subdomains: one is fingerprint verification (Am I who I claim I am?) and
the other is fingerprint identification (Who am I?), the latter being more
difficult requiring extensive indexing and classification of fingerprints for
efficient retrieval.
Nearly all fingerprint
classification schemes used today are derived from the famous ―Henry System‖
[1] – a detailed fingerprint indexing method for aiding manual fingerprint
comparison. For instance, the FBI uses one variant which recognizes eight
different types of patterns: radial loop, ulnar loop, double loop, central
pocket loop, plain arch, tented arch, plain whorl, and accidental. Whorls are
usually circular or spiral in shape. Arches have a mound-like contour, while
tented arches have a spikelike or steeple-like appearance in the center. Loops
have concentric hairpin or staple-shaped ridges and are described as
"radial" or "ulnar" to denote their slopes; ulnar loops
slope toward the little finger side of the hand, radial loops toward the thumb.
Figure: Fingerprint classification involving 6 classes |
Fingerprint classification &
indexing is a difficult pattern recognition problem due to small inter-class
variability compared to large intra-class variations in fingerprint patterns.
Germain et al describe a popular efficient technique for indexing into
large fingerprint databases using minutiae triplets in their indexing
procedure. More efficient classification schemes have also been proposed like Jain, et al.
Fingerprint Features
A fingerprint is an impression of
the epidermal ridges of a human fingertip. A hierarchy of three levels of
features, namely, Level 1 (pattern), Level 2 (minutiae points) and Level 3
(pores and ridge shape) are used for recognition purposes. Most AFISs employ
Level 1 & Level 2 features. Level 1 features refer to the overall pattern
shape of the unknown fingerprint—a whorl, loop, or some other pattern. This
level of detail cannot be used to individualize, but it can help narrow down
the search. Level 2 features refer to specific friction ridge paths — the overall
flow of the friction ridges and major ridge path deviations (ridge
characteristics called minutiae) like ridge endings, lakes, islands,
bifurcations, scars, incipient ridges, and flexion creases.
Level 3 detail refers to the
intrinsic detail present in a developed fingerprint — pores, ridge units, edge
detail, scars, etc. High-resolution sensors (∼1000dpi) are
required for the extraction of Level 3 features. But as [8] shows, EER values are
reduced (relatively ∼20%) using them along with Level 1 & 2 features.
Moreover, Level 3 features offer greater success in partial fingerprint
recognition as shown in [9].
Fingerprint Sensing
Fingerprint sensing techniques can
be of two types – offline scanning and live-scanning. In off-line sensing, fingerprints are obtained on paper by “ink technique” which are then scanned
using paper scanners to produce the digital image. Most AFIS use live-scanning
where the prints are directly obtained using an electronic fingerprint scanner.
Almost all the existing sensors
belong to one of the three families: optical, solid-state, and ultrasound.
Optical sensors, based on the frustrated total internal reflection (FTIR) the technique is commonly used to capture live-scan fingerprints in forensic and
government applications. They are the most common fingerprint sensors.
Fig: Optical Sensor using FTIR |
An important breakthrough in sensor the technology was the development of optical sensors based on fiber-optics as
described in the US patent, leading to sensor miniaturization and enhanced
portability.
Solid-state touch and sweep sensors
— silicon-based devices that measure the differences in physical properties
such as capacitance or conductance of the friction ridges and valleys dominate
in commercial applications. Tartagni and Guerrieri describe a feedback
capacitive sensing scheme using a 200x200 element sensor array implement in
standard 2-metal CMOS technology. Jeong-Woo Lee et al discusses another
such solid-state sensor, based on capacitive differences, capable of producing
600dpi fingerprints. Many commercially available sweep sensors like Fujitsu
MBF320 is based on such low-power solid-state devices.
Fig: Capacitive Solid-State Sensor |
A special case of off-line sensing
is the acquisition of a latent fingerprint from a crime scene. Used
extensively in forensics, latent prints are accidental impressions left by
friction ridge skin on a surface, due to natural secretions of the eccrine
glands present on the skin. While tremendous progress has been made in plain
fingerprint matching, latent fingerprint matching continues to be a difficult
problem. Poor quality of ridge impressions, small finger area, and large
non-linear distortion are the main difficulties in latent fingerprint matching,
compared to plain fingerprint matching.
Extraction of Fingerprints
For the purpose of automation, a
suitable representation i.e. feature extraction of fingerprints is essential.
This representation should have the following properties –
- · Retention
of discriminating power of each fingerprint at several levels of resolution
- · Easy computability
- · Amenable to automated matching algorithms
- · Stable and invariant to noise and distortions
- · Efficient and compact representation
Several feature extraction methods
have been proposed and implemented successfully over the years. Roughly
speaking there are four categories of methods based on fingerprint feature
extraction by image processing. The first category of methods extract minutiae
directly from the gray-level image without using binarization
and thinning processes while the second category extracts features from binary
image profile patterns. The third category of methods uses machine
learning for extracting minutiae and the last category extracts
minutiae from binary skeletons.
Binarization is the process by
which an enhanced gray level image is transformed into a binary image for
subsequent feature detection. Good binarization algorithms should minimize
information loss and also provides efficient computational complexity. A
binarization approach based on the peak detection in the cross-section
gray-level profiles orthogonal to the local ridge orientation has been proposed
by Ratha, et al. Liang et al proposed a Euclidean distance
transform method to obtain a near-linear time binarization of fingerprint
images.
Fingerprint ridge thinning is
basically, the elimination of redundant pixels till each ridge is just one pixel thick.
An innovative iterative thinning technique has been proposed by Ahmed and Ward while a multi-scale thinning approach has been proposed by you, et al.
Fig: Extraction Of Fingerprints |
After initial fingerprint feature
extraction some post-processing is required for removing false or spurious
minutiae detected in highly corrupted regions or introduced by previous
processing steps (e.g., thinning). Chen and Kuo proposed a three-step
false minutiae filtering method, which dropped minutiae with short ridges,
minutiae in noise regions and minutiae in ridge breaks using ridge direction
information. Another method for removing all the spurious pixels generated at
the thinning stage in order to facilitate subsequent minutiae filtering has
been proposed by Zhao and Tang.
Fingerprint Matching Techniques
Matching fingerprint images is an
extremely difficult problem, mainly due to the large variability in different
impressions of the same finger (i.e., large intra-class variations).
Fingerprint matching algorithms are roughly classified into 3 major categories
–
A. Correlation-based Matching
Two fingerprint images are
superimposed and the correlation between corresponding pixels is computed for
different alignments (e.g. various displacements and rotations). Fourier
transform, as well as Fourier-Mellin Transform, can be used to speed up
the correlation computation.
B. Feature-based (or Minutiae- based) Matching
Typical fingerprint recognition
methods employ feature-based matching, where minutiae (i.e., ridge ending and
ridge bifurcation) are extracted from the registered fingerprint image and the
input fingerprint image, and the number of corresponding minutiae pairings
between the two images is used to recognize a valid fingerprint image.
Alternatively, Jain et al. [2] used a string matching technique while Isenor
and Zaky proposes a graph-based fingerprint matching algorithm. Fan et al describes a fingerprint verification algorithm based on a bipartite graph
construction between model and query fingerprint feature clusters.
The minutiae matching problem has
been generally addressed as a point pattern matching problem which has been
extensively studied yielding families of approaches known as relaxation
methods, algebraic and operational research solutions, tree-pruning approaches,
energy minimization methods, Hough transform, etc.
C. Pattern-based (or Image-based) Matching
Pattern-based algorithms compare
the basic fingerprint patterns (e.g., local orientation and frequency, ridge
shape, texture information) between a previously stored template and a
candidate fingerprint. The images need to be aligned in the same position, about
a central point on each image. The candidate fingerprint image is then
graphically compared with the template to determine the degree of match. The
image-based techniques include both optical as well as computer-based image
correlation techniques. Recently, several transform-based techniques have also
been explored. For instance, a phase-based fingerprint image matching technique
using 2D discrete Fourier transforms has been proposed by Ito while
Hamamoto describes a Gabor filter based fingerprint matching technique.
Major implementation and design issues
A fingerprint recognition system
can make two types of errors: a false match, when a match occurs between images
from two different fingers, and a false non-match when images from the same
finger are not a match. Thus the chief objective behind the design of a good
fingerprint matching system is to reduce both these errors. However both the
error rates cannot be reduced simultaneously as they are inversely dependent on
each other.
Another important design issue is
the security of the fingerprint recognition system itself along with the
fingerprint template database. The unauthorized use or disclosure of
fingerprint template information from such databases can be a serious security and
privacy threat.
Although fingerprint recognition
has been extensively studied, there are still many open research problems in
this domain, for instance:
· Fully Automated Latent Fingerprint
Recognition
· Altered or Fake Fingerprint Detection
· Efficient Compression of Fingerprint
Templates
· Automated Artificial Fingerprint Generation
· Efficient Automated Fingerprint
Classification
Latent fingerprint matching poses
another whole new set of problems altogether. Compared to good quality full
fingerprints acquired using live-scan or inking methods during enrollment,
latent fingerprints are often smudgy and blurred, capture only a small finger
area, and have large nonlinear distortion. Hence they require enhanced
extraction and matching techniques to make latent fingerprint recognition free
of manual matching and fully automated.
Fingerprint Authentication has been
studied for well over a century. However, its use has truly become widespread
and mainstream only in the last few decades due to the development of automated
fingerprint recognition systems. The ever increasing demand for reducing the
error and failure rates of automated fingerprint recognition systems and the
need for enhancing their security has opened many interesting and unique
research opportunities that encompass multiple domains such as image
processing, computer vision, statistical modeling, cryptography, and sensor
development. Our preliminary analysis shows that fingerprints have been proven
to be excellent if not the best biometric and its potential has not yet been
fully realized.
But still, issues such as
fingerprint authentication at a distance, real-time identification in
large-scale applications with billions of fingerprint records, developing
secure and revocable fingerprint templates that preserve accuracy, and
scientifically establishing the uniqueness of fingerprints will likely remain
as grand challenges in the near future.
References
Dibyendu Nath, Saurav
Ray, Sumit Kumar Ghosh {Dept. of Computer Science & Engineering,
Heritage Institute of Technology, Kolkata, India.}
[1] E. Henry, Classification and
Uses of Finger Prints, Routledge, London, 1900.
[2] A. K. Jain, L. Hong, and R.
M. Bolle, ―On-line fingerprint verification‖, IEEE Trans. on Pattern Analysis
and Machine Intelligence, 19(4):302–313, April 1997.
[3] D. Maltoni, D. Maio, A. K.
Jain & S. Prabhakar, Handbook of Fingerprint Recognition, Springer, 2003.
[4] P. Komarinski, Automated
Fingerprint Identification Systems, Elsevier Academic Press, 2004
[5] S. Pankanti, S. Prabhakar,
and A. K. Jain, ―On the Individuality of Fingerprints‖, IEEE Transactions on
PAMI, Vol. 24, No. 8, pp. 1010- 1025, 2002.
[6] Golfarelli M., Maio D., and Maltoni
D., ―On the Error-Reject Tradeoff in Biometric Verification Systems‖ IEEE
Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no.7, pp.
786-796,1997.
[7] A. K. Jain, S. Prabhakar and
S. Pankanti, ―Matching and Classification: A Case Study in Fingerprint Domain‖,
Proc. INSA-A (Indian National Science Academy), Vol. 67, A, No. 2, pp. 223-241,
March 2001.
[8] Anil Jain, Yi Chen, and
Meltem Demirkus, ―Pores and ridges: fingerprint matching using level 3
features,‖ 18th International Conference on Pattern Recognition, pp. 477 – 480,
2006.
[9] K. Kryszczuk, A. Drygajlo,
and P. Morier, ―Extraction of level 2 and level 3 features for fragmentary
fingerprints,‖ Proc. of the 2nd COST275 Workshop, Vigo, Spain, pp. 83-88, 2004.
[10] D. Florencio and C. Herley,
―A large-scale study of web password habits,‖ Proceedings of the 16th
International conference on the World Wide Web, 2007.
4 Comments
GraphPad Prism Crack I am very impressed with your post because this post is very beneficial for me and provide a new knowledge to me
ReplyDeleteGreat set of tips from the master himself. Excellent ideas. Thanks for Awesome tips Keep it up.
ReplyDeleteCubase Pro Crack
Trend Micro Antivirus Crack
ESET NOD32 Antivirus Crack
VyprVPN Premium Crack
VSDC Video Editor Pro Crack
Phone Backup Extractor Crack
Mirillis Action Crack
Infix PDF Editor Pro Crack
GraphPad Prism Crack
Excellent post, Its really friendly article...
ReplyDeletePassword Depot Crack
Prism Video Converter Crack
WinCatalog Crack
Adobe Dimension Crack
Wondershare PDFelement Pro Crack
Is this a paid topic or do you change it yourself?
ReplyDeleteHowever, stopping by with great quality writing, it's hard to see any good blog today.
Trend Micro Maximum Security Crack
Wondershare PDFelement Crack
Microsoft Office Product Crack
novaPDF Pro 11.3 Build 248 Crack