ArticlePDF Available

Fingerprint Matching using Gabor Filters

Authors:
  • Mirpur University of Science and Technology (MUST), Mirpur, AJ&K

Abstract and Figures

We present a fingerprint matching scheme that utilizes a ridge feature map to match fingerprint images. The technique described here obviates the need for extracting minutiae points to match fingerprint images. The proposed scheme uses a set of 16 Gabor filters, whose spatial frequencies correspond to the average inter-ridge spacing in fingerprints, is used to capture the ridge strength at equally spaced orientations. A circular tessellation of filtered image is then used to construct the ridge feature map. This ridge feature map contains both global and local details in a fingerprint as a compact fixed length feature vector. The fingerprint matching is based on the Euclidean distance between two corresponding feature vectors. The genuine accept rate of the Gabor filter based matcher is observed to be ~ 10% to 15% higher than that of minutiae-based matcher at low false accept rates. Fingerprint feature extraction and matching takes ~ 7.1 seconds on a Pentium IV, 2.4 GHz processor.
Content may be subject to copyright.
National Conference on Emerging Technologies 2004 147
Fingerprint Matching using Gabor Filters
Muhammad Umer Munir and Dr. Muhammad Younas Javed
College of Electrical and Mechanical Engineering, National University of Sciences and Technology
Rawalpindi, Pakistan.
Abstract: We present a fingerprint matching scheme that
utilizes a ridge feature map to match fingerprint images.
The technique described here obviates the need for
extracting minutiae points to match fingerprint images.
The proposed scheme uses a set of 16 Gabor filters, whose
spatial frequencies correspond to the average inter-ridge
spacing in fingerprints, is used to capture the ridge
strength at equally spaced orientations. A circular
tessellation of filtered image is then used to construct the
ridge feature map. This ridge feature map contains both
global and local details in a fingerprint as a compact fixed
length feature vector. The fingerprint matching is based
on the Euclidean distance between two corresponding
feature vectors. The genuine accept rate of the Gabor
filter based matcher is observed to be ~ 10% to 15%
higher than that of minutiae-based matcher at low false
accept rates. Fingerprint feature extraction and matching
takes ~ 7.1 seconds on a Pentium IV, 2.4 GHz processor.
Keywords: Biometrics, Gabor filters, fingerprints,
matching, verification, core point
1. INTRODUCTION
Fingerprint-based identification is one of the most
important biometric technologies which has drawn a
substantial amount of attention recently. Humans have
used fingerprints for personal identification for centuries
and the validity of fingerprint identification has been well
established. In fact, fingerprint technology is so common
in personal identification that it has almost become the
synonym of biometrics. Fingerprints are believed to be
unique across individuals and across fingers of same
individual. Even identical twins having similar DNA, are
believed to have different fingerprints. These observations
have led to the increased use of automatic fingerprint-
based identification in both civilian and law-enforcement
applications.
A fingerprint is the pattern of ridges and furrows on the
surface of a fingertip. Ridges and valleys are often run in
parallel and sometimes they bifurcate and sometimes they
terminate. When fingerprint image is analyzed at global
level, the fingerprint pattern exhibits one or more regions
where ridge lines assume distinctive shapes. These shapes
are characterized by high curvature, terminations,
bifurcations, cross-over etc. These regions are called
singular regions or singularities. These singularities may
be classified into three topologies; loop, delta and whorl.
At local level, there are other important features known as
minutiae can be found in the fingerprint patterns. Minutiae
means small details and this refers to the various ways that
the ridges can be discontinuous. A ridge can suddenly
come to an end which is called termination or it can divide
into two ridges which is called bifurcations (Figure 1).
Figure 1: Ridge ending, core point and ridge bifurcation is
shown.
2. FINGERPRINT MATCHING
Fingerprint matching techniques can be broadly classified
as minutiae based and correlation based [1]. Minutiae-
based technique first locates the minutiae points in a given
fingerprint image and matches their relative placements in
a stored template fingerprint. A good quality fingerprint
contains between 60 and 80 minutiae, but different
fingerprints have different number of minutiae. The
performance of minutiae-based techniques rely on the
accurate detection of minutiae points and the use of
sophisticated matching techniques to compare two
minutiae fields which undergo non-rigid transformations.
Correlation based techniques compare the global pattern of
ridges and valleys to see if the ridges in the two
fingerprints align. The global approach to fingerprint
representation is typically used for indexing [2] and does
not offer reliable fingerprint discrimination.
The ridge structure in a fingerprint can be viewed as an
oriented texture patterns having a dominant spatial
frequency and orientation in a local neighborhood. The
frequency is due to inter ridge-spacing present in a
fingerprint and the orientation is due to the flow pattern
exhibited by ridges. Most textured images contain a
narrow range of spatial frequencies. For a typical
fingerprint images scanned at 500 dpi, there is a little
variation in the spatial frequencies among different
fingerprints. This implies that there is an optimal scale
National Conference on Emerging Technologies 2004 148
(spatial frequency) for analyzing the fingerprint texture.
By capturing the frequency and orientation of ridges in
local regions in the fingerprint, a distinct representation of
the fingerprint is possible [3].
The proposed scheme first detects the core point in a
fingerprint image using two different techniques. Core
point is defined as the north most point of inner-most ridge
line. In practices, the core point corresponds to center of
north most loop type singularity. Some fingerprints do not
contain loop or whorl singularities, therefore it is difficult
to define core. In that kind of images, core is normally
associated with the maximum ridge line curvature.
Detecting a core point is not a trivial task; therefore two
different techniques have been used to detect optimal core
point location. A circular region around the core point is
located and tessellated into 128 sectors. The pixel
intensities in each sector are normalized to a constant
mean and variance. The circular region is filtered using a
bank of sixteen Gabor filters to produce a set of sixteen
filtered images. Gabor filter-banks are a well known
technique to capture useful information in specific band
pass channels. Two such techniques have been discussed
in [3] and [4]. The average absolute deviation with in a
sector quantifies the underlying ridge structure and is used
as a feature. The feature vector (2048 values in length) is
the collection of all the features, computed from all the
128 sectors, in every filtered image. The feature vector
captures the local information and the ordered
enumeration of the tessellation captures the invariant
global relationships among the local patterns. The
matching stage computes the Euclidean distance between
the two corresponding feature vectors.
It is desirable to obtain representations for fingerprints
which are translation and rotation invariant. In the
proposed scheme, translation is taken care of by a
reference point which is core point during the feature
extraction stage and the image rotation is handled by a
cyclic rotation of the feature values in the feature vector.
The features are cyclically rotated to generate feature
vectors corresponding to different orientations to perform
the matching.
3. CORE POINT DETECTION
Two different methods are used to detect core point in a
fingerprint image (Figure 2). The core point location is
more accurately detected by using multiple techniques.
3.1 Core point detection using Poincare index
1) Estimate the orientation field O using the least square
orientation estimation algorithm [5]. Orientation field
O is defined as an M x N image, where O(i,j)
represents the local ridge orientation at pixel (i,j). An
image is divided into a set of w x w non-overlapping
blocks and a single orientation is defined for each
block.
2) Initialize A, a label image used to indicate the core
point.
3) For each pixel (i,j) in O, compute Poincare index [2]
and assign the corresponding pixels in A the value of
one if Poincare index is between 0.45 and 0.51.The
Poincare index at pixel (i,j) enclosed by a digital
curve, which consists of sequence of pixels that are on
or within a distance of one pixel apart from the
corresponding curve, is computed as follows:
Np-1
Poincare (i ,j) = 1/(2π) (k) (1)
k=0
δ(k) if (k)| < π/2
(k) = π + δ(k) if δ(k) −π/2 (2)
π δ(k) otherwise
δ(k) = θ(x
(k+1) mod Np
, y
(k+1) mod Np
) θ(x
k
, y
k
)
(3)
For our method, Np is selected as 8.
4) The center of block with the value of one is
considered to be the center of fingerprint. If more than
one block has value of one, then calculate the average
of coordinates of these blocks.
3.2 Core point detection using slope
1) Estimate the orientation field O using the least square
orientation estimation algorithm [5].
2) Smooth the orientation field in local neighborhood.
Let the smoothed orientation field be represented as
O’.
3) Initialize A, a label image used to indicate the core
point.
4) In O’(i , j) , start from first row (0, 0), find the block
whose angle is between 0 and π /2 and then trace
down vertically until a block with a slope not with in
Figure 2: Optimal core point location
National Conference on Emerging Technologies 2004 149
Figure 3: Filtered images and their corresponding feature vectors for orientations
ο
0 ,
ο
5.22 , and
ο
45 are shown.
that range (0 and π /2) is encountered. That block is
then marked [6] in A. This procedure is performed on
all the rows of orientation field O’(i,j).
5) The center of block with the highest number of marks
is considered to be the center of fingerprint.
3.3 Optimal Core Point
Now we have two core point locations obtained from
above two techniques. Optimal core point is then
calculated by taking average of x-coordinate values and
taking the maximum of two y-coordinate values as
maximum y-coordinate is more precise location of core
point.
4. TESSELLATION
The spatial tessellation of fingerprint image which consists
of the region of interest is defined by a collection of
sectors. We use four concentric bands around the core
point. Each band is 20 pixels wide and segmented into
thirty two sectors. Thus we have a total of 32 x 4 = 128
sectors and the region of interest is a circle of radius 100
pixels, centered at the core point.
5. NORMALIZATION
Normalization is performed to remove the effects of
sensor noise and gray level background due to finger
pressure differences. For all the pixels in sector Si, where i
(0,1,2….127), the normalized image is defined as:
i
io
V
MyxIV
M
2
0
)),(( ×
+
if I(x,y) > Mi
Ni(x, y) = (4)
i
io
V
MyxIV
M
2
0
)),(( ×
otherwise
Mi and Vi are estimated mean and variance of grey levels
in sector Si respectively. M
o
and V
o
are the desired mean
and variance values, respectively. For our experiments,
both M
o
and V
o
are set to a value of 50.
6. FILTERING
Gabor filters optimally capture both local orientation
and frequency information from a fingerprint image. By
tuning a Gabor filter to specific frequency and direction,
the local frequency and orientation information can be
obtained [2][3] as shown in Figure 3. Thus, they are suited
for extracting texture information from images [4].
Daugman has successfully used these filters to extract
discriminatory features from human iris [7].
An even symmetric Gabor filter has the following
general form in the spatial domain:
G(x, y ; f,
θ
) =
)'2cos(
'
'
2
1
exp
2
'
2
2
'
2
fx
y
x
yx
π
δδ
+
(5)
x’ = x sin
θ
+ y cos
θ
(6)
y’ = x cos
θ
- y sin
θ
(7)
National Conference on Emerging Technologies 2004 150
Figure 4: The ROC curve comparing the performance of the Gabor filter based approach with the minutiae based approach
where f is the frequency of the sinusoidal plane wave
along the direction
θ
from the x-axis, and
x
δ
and
y
δ
are the space constants of the Gaussian envelope along x
and y axes, respectively.
The filtering is performed in the spatial domain with a
mask size of 17x17. The frequency f is the average ridge
frequency (1/K), where K is the average inter ridge
distance. The average inter ridge distance is approximately
10 pixels in a 500 dpi fingerprint image. Hence, f = 1/10.
Sixteen different orientations are examined. These
correspond to
θ
values of 0, 11.25, 22.5, 33.75, 45,
56.25, 67.5, 78.75, 90, 101.25, 112.5, 123.75, 135, 146.25,
157.5 and 168.75 degrees. The values for
'x
δ
and
'y
δ
were empirically determined and each is set to 4 (about
half the average inter ridge distance).
7. FEATURE VECTOR
Let
),( yxF
i
θ
be the
θ
-direction filtered image for sector
Si. Now,
i
(0,1,2….127) and
(0, 11.25,
22.5, 33.75, 45, 56.25, 67.5, 78.75, 90, 101.25, 112.5,
123.75, 135, 146.25, 157.5, 168.75 degrees) the feature
value,
θ
i
V
, is the average absolute deviation from the
mean defined as:
θ
i
V
=
i
n
ii
i
PyxF
n
θθ
),(
1
(8)
where n
i
is the number of pixels in S
i
and
θ
i
P is the mean
of pixel values of
),( yxF
i
θ
in sector S
i
. The average
absolute deviation of each sector in each of the sixteen
filtered images defines the components of our 2048-
dimensional feature vector [4]. The average absolute
deviation from the mean of each sector in each of the
sixteen filtered images defines the components of our
feature vector.
The rotation invariance is achieved by cyclically rotating
the features in a feature vector itself. A single step cyclic
rotation of the features corresponds to a feature vector
which would be obtained if the image was rotated by
11.25 degrees.
Fingerprint matching is based on finding the Euclidean
distance between the corresponding feature vectors. This
minimum score corresponds to the best alignment of the
two fingerprints being matched. If the Euclidean distance
between two feature vectors is less than a threshold, then
the decision that “the two images come from the same
finger” is made, otherwise a decision that “the two images
come from different fingers” is made. Since the template
generation for storage in the database is an off-line
process, the verification time still depends on the time
taken to generate a single template
.
8. EXPERIMENTAL RESULTS
The database of fingerprint images contains 180 images.
There are eight different impressions per finger. The
performance of biometric system can be shown as a
Receiver Operating Characteristic (ROC) curve that plots
the Genuine Accept Rate (GAR) against the False Accept
Rate (FAR) at different thresholds on the matching score.
We compare this performance with a minutiae-based
approach [4][8]. As can be seen in Figure 4, our approach
outperforms the minutiae based approach over wider range
of FAR values. For example, at 1% FAR, the Gabor filter
based fingerprint matcher gives a GAR of 91% while the
minutiae based matcher gives a GAR of 73%.
The Gabor filter based fingerprint technique takes ~ 7.1
seconds on Pentium – IV, 2.4 GHz processor, for feature
extraction and matching. About 95% of the total time i.e. ~
Minutiae based matching
60
65
70
75
80
85
90
0.112345610
False Accept Rate (%)
Genunie Accept Rare (%)
Gabor filter based matching
80
85
90
95
100
0.1 0.9 3.5 5.3 8 16
False Accept Rate (%)
Genunie Accept Rate (%)
National Conference on Emerging Technologies 2004 151
6.7 seconds, is taken by the convolution of the input image
with 16 Gabor filters. The convolution operation can be
made significantly faster by dedicated DSP processors. If
the core point is correctly located, the features are
translation invariant and the rotation handled in the
matching stage is very fast. As a result, the matching
process is extremely fast.
9. SUMMARY AND FUTURE WORK
We have presented a fingerprint matching scheme that
utilizes both the frequency and orientation information
available in a fingerprint. Sixteen Gabor filters are used to
extract features from the template and input images. The
primary advantage of our approach is improved translation
and rotation invariance. The following areas of
improvement are also being studied:
(1) New matching methods for comparing the ridge
feature maps of two images
(2) Constructing the ridge feature maps using adaptive
methods for optimal selection of Gabor filters
REFERENCES
[1] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar,
Handbook of Fingerprint Recognition, Springer-
Verlag, June 2003.
[2] A. K. Jain, S. Prabhakar and L. Hong, "A
Multichannel Approach to Fingerprint
Classification", IEEE Transactions on PAMI,
Vol.21, No.4, pp. 348-359, April 1999.
[3] A. Ross, A. K. Jain, and J. Reisman, "A Hybrid
Fingerprint Matcher", Pattern Recognition, Vol.
36, No. 7, pp. 1661-1673, 2003.
[4] A. K. Jain, A. Ross, and S. Prabhakar, "Fingerprint
Matching Using Minutiae and Texture Features",
Proc International Conference on Image
Processing (ICIP), pp. 282-285, Greece, October
7-10, 2001.
[5] L. Hong, Y. Wan and A.K. Jain, "Fingerprint
Image Enhancement: Algorithms and Performance
Evaluation", IEEE Transactions on PAMI, Vol. 20,
No. 8, pp.777-789, August 1998.
[6] A. R. Rao, A Taxonomy for Texture Description
and Identification, New York: Springer-Verlag,
1990.
[7] J. Daugman, Recognizing persons by their iris
patterns, in: A. K. Jain, R. Bolle, S. Pankanti
(Eds.), Biometrics: Personal Identification in a
Networked Society, Kluwer Academic Publishers,
1999, pp. 103-121.
[8] Anil K. Jain, Lin Hong, Sharat Pankanti, and Ruud
Bolle, “An identity authentication system using
fingerprints,” Proceedings of the IEEE, vol. 85,
no. 9, pp. 1365–1388, 1997
... And at last calculation is done between two vectors to find the Euclidean distance. Genuine Accept Rate (GAR) and the False Accept Rate (FAR) are the two parameters which are used to find the efficiency of the system [3]. ...
Article
Full-text available
No traditional election procedure present today is ideal. All of the current procedures have some major flaws to them. These flaws can lead to undemocratic election procedure, where people can manipulate the system using loopholes present in them. This tends to increase the risk of monopoly (i.e. a dominant leader keeps taking control of the post by manipulating the elections). Current traditional systems include technologies like ballot paper and EVM's. When people think about election based on ballot papers, they imagine that they are thinking of ancient technology, and in a way, this is true. Manipulations are possible by discarding many votes with even minute discrepancies and adding votes to the favored party. Although EVM's have taken great steps in improving the election procedure by making it safe, fast, efficient it still has its flaws and can be manipulated. Proposed System uses fingerprint identification to verify a voter, only then he/she will be allowed to cast a vote. There are two major algorithms for fingerprint identification, the pattern based and the minutiae based algorithm. In the pattern based algorithm, the image of the scanned fingerprint is directly compared with the stored samples of the fingerprint. This method is useful when the scanned image is not very clear and minutiae details cannot be extracted. The disadvantages of this method are that it consumes a lot of memory as the entire fingerprint is stored. The minutiae-based algorithm is the fastest and most reliable method for fingerprint identification. In the minutiae based algorithm, the minutiae details of the finger are stored and not the original image. This is useful since it requires much less memory, and is required only when there are multiple fingerprints to be stored. The minutiae-based method is precise and much more efficient than the pattern based algorithm.
... The most popular technique of minutiae detection is through the use of the crossing numbers approach [22]. Gabor filter is also used for feature extraction [27]. Once the features are extracted from fingerprint image, matching is performed with already registered template or by machine learning techniques. ...
Article
Full-text available
Fingerprint recognition is one of the most well-known and publicized biometrics for personal identification and authentication. With the advancement of technology and for security purposes in various civilian, defence and commercial applications, fingerprint recognition is studied since a long time. Since second millennium BCE when fingerprints were used as signature, researchers have done studies on different aspects and features of fingerprint. This paper specifies a literature survey of the widely used techniques in fingerprint recognition system. Some of the renowned techniques of feature extraction and matching modules are discussed in deep.
... Gabor filtering function has the following format [14]: ...
Conference Paper
Fingerprint recognition is one of the most popular biometric recognition methods nowadays. It is applicable in many areas including time recorder systems, criminal tracking, authentication and system security. However, one of the challenges to current traditional methods is the dependence on the minutiae extraction and recognition time. Hence, the limitations of these methods are that they do not effect to recognition in a large data environment. In addition, the processing of input image is very important for improving the accuracy of the recognition process. MapReduce technique is used in exploring and analyzing of large data that can not be processed on classical techniques due to some constraints on computer resources such as processing capability, memory, etc. We performed parallel processing in feature extraction and recognition with the MapReduce model in a Spark environment. we have also compared the accuracy and the runtime of our method before and after using MapReduce in the Spark. The experimental results show that the proposed method has achieved the automatic and effective fingerprint recognition.
... • Fingerprint Image Thinning, in thinning stage the ridges will reduce into 1 pixel so that the useful ridges will be clear and the useless ridges will clear also. An advantage of this method is that it doesn't produce a discontinuity on the lines , the algorithm is deleting points that lie outer boundaries of the ridge where the width is longer than one pixel but if that may cause a disconnectivety on the graph the pixel will not be deleted, see figure (7). The thinned image may contain some unnecessary spikes and breaks which may lead to recognition of false minutiae those spikes and breaks should be removed in order to extract the minutia, as in traditional, if an angel comes with a branch and ridge is larger than the 70 degrees and less than the 110 degrees, and if the length of the branch is less than the 20 pixel so that this branch will be removed. ...
Article
Full-text available
Law enforcement officers and forensic specialists spend hours thinking about how fingerprints solve crimes, and trying to find, collect, record and compare these unique identifiers that can connect a specific person to a specific crime. These individuals understand that a basic human feature that most people take for granted, can be one of the most effective tools in crime solving. This research will exploit our previous work to be applicable in criminal investigation field. So, here aim to advance crime solving by strength fingerprint's criminal investigation to control the alterations happen intentionally to criminals' fingerprint. That done by suggest strategy introduce an optimal fingerprint image feature's vector to the person and then considers it to be stored in database for future matching. Selecting optimal fingerprint feature's vector strategy deal with considering 10 fingerprints for each criminal person (take the fingerprint in different time and different circumstance of criminal such as finger is dirty, wet, trembling, etc.). Proposal begin with apply a proposed enrollment on all 10 fingerprint for each criminal, the enrollment include the following consequence steps; begin with preprocessing step for each of 10 images including enhancement, then two level of feature extraction (first level to extract arches, whorls, and loops, where second level extract minutiae), after that applying proposed Genetic Algorithm to select optimal fingerprint, master fingerprint, which in our point of view present the most universal image which include more detailed features to recognition. Master fingerprint will be feature's vector which stored in database. Then apply the proposed matching by testing fingerprints with these stored in database. While measures of criminal fingerprint investigation performance by calculating False Reject Rate (FRR) and False Accept Rate (FAR) for the traditional system and the proposed in criminal detection field the obtained results were encouraged to publish this work.
Chapter
In recent years, fingerprint analysis has expanded to include the estimation of age information, providing an additional layer of personal identification because of its uniqueness and permanence. In this study, 2D-Discrete Wavelet Transform (DWT) and 2D-Discrete Fourier transform (DFT) are used for fingerprint-based age group classification and their performance is compared against fingerprint dataset which is distributed among various age groups from the age of 10 to 90 including both genders. The face-based age group classification techniques have limited practice for crime scene investigation due to their dependency on the availability of vast global features, that is, complete face image. The research gap identifies that the accuracy between 2D-DWT and 2D-DFT, varied, and this is proved even for the unbalanced age group classes collected in this study’s real-time database and its corresponding results. The three variants of 2D-DWT Level-4, level-3, level-2 and 2D-DFT are considered for this research work and the most accurate was the DWT Level-4 which classified the age group using the fingerprint images with an astonishing accuracy 99.96 which is verified and supported by detailed analysis of all classification metrics.
Article
Full-text available
A fingerprint is an impression left by the friction ridges of a human finger. A fingerprint classification system groups fingerprint according to their characteristics and therefore helps to match a fingerprint against an extensive database of fingerprints. The Henry classification system is widely used among fingerprint classification systems. Some researchers have used traditional machine learning or deep learning for fingerprint classification. Nevertheless, traditional algorithms cannot extract the depth features of the fingerprint, and most deep learning algorithms lack fingerprint image enhancement. So, this paper combined the Gabor Filter and Convolutional Neural Network to extract fingerprint features. The model has two channels, one is a Deep Convolutional Neural Network (DCNN), and the other is a Shallow Convolutional Neural Network (SCNN). The DCNN consists of a neural network with eight layers, which can extract deep features of the fingerprint. The SCNN consists of Gabor Filter and a neural network with two layers that can extract features from clear fingerprint images. This paper uses NIST Special Database 4 for experiments. Experimental results show that the model proposed in this paper has achieved 91.4% accuracy. Compared with other algorithms, this model has higher accuracy than others. It shows that combined with the Gabor Filter and Convolutional Neural Network can better extract the ridge features of fingerprint images.
Article
Full-text available
security access control systems and forensic applications. Performance of conventional unimodal biometric systems is generally suffered due to the noisy data, non universality and intolerable error rate. In propose system, multi layer Convolutional Neural Network (CNN) is applied to multimodal biometric human authentication using face, palm vein and fingerprints to increase the robustness of system. For the classification linear Support Vector Machine classifier is used. For the evaluation of system self developed face, palm vein and fingerprint database having 4,500 images are used. The performance of the system is evaluated on the basis of % recognition accuracy, and it shows significant improvement over the unimodal-biometric system and existing multimodal systems.
Article
Full-text available
An automatic method for the selection of subsets of images, both modern and historic, out of a set of landmark large images collected from the Internet is presented in this paper. This selection depends on the extraction of dominant features using Gabor filtering. Features are selected carefully from a preliminary image set and fed into a neural network as a training data. The method collects a large set of raw landmark images containing modern and historic landmark images and non-landmark images. The method then processes these images to classify them as landmark and non-landmark images. The classification performance highly depends on the number of candidate features of the landmark.
Conference Paper
Full-text available
We describe a hybrid fingerprint matching scheme that uses both minutiae and ridge flow information to represent and match fingerprints. A set of 8 Gabor filters, whose spatial frequencies correspond to the average inter-ridge spacing in fingerprints, is used to capture the ridge strength at equally spaced orientations. A square tessellation of the filtered images is then used to construct an eight-dimensional feature map, called the. ridge feature map. The ridge feature map along with the minutiae set of a fingerprint image is used for matching purposes. The genuine accept rate of the hybrid matcher is observed to be ∼10% higher than that of a minutiae-based matcher at low false accept rates. Fingerprint verification using the hybrid matcher on a Pentium III (800 MHz) processor takes ∼1.4 seconds.
Conference Paper
Full-text available
The advent of solid-state fingerprint sensors presents a fresh challenge to traditional fingerprint matching algorithms. These sensors provide a small contact area (&ap;0.6"×0.6") for the fingertip and, therefore, sense only a limited portion of the fingerprint. Thus multiple impressions of the same fingerprint may have only a small region of overlap. Minutiae-based matching algorithms, which consider ridge activity only in the vicinity of minutiae points, are not likely to perform well on these images due to the insufficient number of corresponding points in the input and template images. We present a hybrid matching algorithm that uses both minutiae (point) information and texture (region) information for matching the fingerprints. Results obtained on the MSU-VERIDICOM database shows that a combination of the texture-based and minutiae-based matching scores leads to a substantial improvement in the overall matching performance
Article
Full-text available
Fingerprint classification provides an important indexing mechanism in a fingerprint database. An accurate and consistent classification can greatly reduce fingerprint matching time for a large database. We present a fingerprint classification algorithm which is able to achieve an accuracy better than previously reported in the literature. We classify fingerprints into five categories: whorl, right loop, left loop, arch, and tented arch. The algorithm uses a novel representation (FingerCode) and is based on a two-stage classifier to make a classification. It has been tested on 4000 images in the NIST-4 database. For the five-class problem, a classification accuracy of 90 percent is achieved (with a 1.8 percent rejection during the feature extraction phase). For the four-class problem (arch and tented arch combined into one class), we are able to achieve a classification accuracy of 94.8 percent (with 1.8 percent rejection). By incorporating a reject option at the classifier, the classification accuracy can be increased to 96 percent for the five-class classification task, and to 97.8 percent for the four-class classification task after a total of 32.5 percent of the images are rejected
Article
Full-text available
In order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and the verification accuracy
Article
Full-text available
Fingerprint verification is an important biometric technique for personal identification. We describe the design and implementation of a prototype automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual. We have developed an improved minutiae-extraction algorithm that is faster and more accurate than our earlier algorithm (1995). An alignment-based minutiae-matching algorithm has been proposed. This algorithm is capable of finding the correspondences between input minutiae and the stored template without resorting to exhaustive search and has the ability to compensate adaptively for the nonlinear deformations and inexact transformations between an input and a template. To establish an objective assessment of our system, both the Michigan State University and the National Institute of Standards and Technology NIST 9 fingerprint data bases have been used to estimate the performance numbers. The experimental results reveal that our system can achieve a good performance on these data bases. We also have demonstrated that our system satisfies the response-time requirement. A complete authentication procedure, on average, takes about 1.4 seconds on a Sun ULTRA I workstation (it is expected to run as fast or faster on a 200 HMz Pentium)
Article
Most fingerprint matching systems rely on the distribution of minutiae on the fingertip to represent and match fingerprints. While the ridge flow pattern is generally used for classifying fingerprints, it is seldom used for matching. This paper describes a hybrid fingerprint matching scheme that uses both minutiae and ridge flow information to represent and match fingerprints. A set of 8 Gabor filters, whose spatial frequencies correspond to the average inter-ridge spacing in fingerprints, is used to capture the ridge strength at equally spaced orientations. A square tessellation of the filtered images is then used to construct an eight-dimensional feature map, called the ridge feature map. The ridge feature map along with the minutiae set of a fingerprint image is used for matching purposes. The proposed technique has the following features: (i) the entire image is taken into account while constructing the ridge feature map; (ii) minutiae matching is used to determine the translation and rotation parameters relating the query and the template images for ridge feature map extraction; (iii) filtering and ridge feature map extraction are implemented in the frequency domain thereby speeding up the matching process; (iv) filtered query images are catched to greatly increase the one-to-many matching speed. The hybrid matcher performs better than a minutiae-based fingerprint matching system. The genuine accept rate of the hybrid matcher is observed to be ∼10% higher than that of a minutiae-based system at low FAR values. Fingerprint verification (one-to-one matching) using the hybrid matcher on a Pentium III, system takes , while fingerprint identification (one-to-many matching) involving 1000 templates takes per match.