ArticlePDF Available

Abstract and Figures

Improving fingerprint matching algorithms is an active and important research area in fingerprint recognition. Algorithms based on minutia triplets, an important matcher family, present some drawbacks that impact their accuracy, such as dependency to the order of minutiae in the feature, insensitivity to the reflection of minutiae triplets, and insensitivity to the directions of the minutiae relative to the sides of the triangle. To alleviate these drawbacks, we introduce in this paper a novel fingerprint matching algorithm, named M3gl. This algorithm contains three components: a new feature representation containing clockwise-arranged minutiae without a central minutia, a new similarity measure that shifts the triplets to find the best minutiae correspondence, and a global matching procedure that selects the alignment by maximizing the amount of global matching minutiae. To make M3gl faster, it includes some optimizations to discard non-matching minutia triplets without comparing the whole representation. In comparison with six verification algorithms, M3gl achieves the highest accuracy in the lowest matching time, using FVC2002 and FVC2004 databases.
Content may be subject to copyright.
Sensors 2012,12, 3418-3437; doi:10.3390/s120303418
OPEN ACCESS
sensors
ISSN 1424-8220
www.mdpi.com/journal/sensors
Article
Improving Fingerprint Verification Using Minutiae Triplets
Miguel Angel Medina-P´
erez 1,2,, Milton Garc´
ıa-Borroto 1,
Andres Eduardo Gutierrez-Rodr´
ıguez 1and Leopoldo Altamirano-Robles 2
1Centro de Bioplantas, Universidad de Ciego de ´
Avila, Carretera a Mor´
on km 9, Ciego de ´
Avila ,
C.P. 69450, Cuba
2Instituto Nacional de Astrof´
ısica, ´
Optica y Electr´
onica. Luis Enrique Erro No. 1, Sta. Mar´
ıa
Tonanzintla, Puebla, C.P. 72840, M´
exico
Author to whom correspondence should be addressed; E-Mail: migue@bioplantas.cu;
Tel.: +53-33-224-016.
Received: 25 January 2012; in revised form: 28 February 2012 / Accepted: 28 February 2012 /
Published: 8 March 2012
Abstract: Improving fingerprint matching algorithms is an active and important research
area in fingerprint recognition. Algorithms based on minutia triplets, an important matcher
family, present some drawbacks that impact their accuracy, such as dependency to the
order of minutiae in the feature, insensitivity to the reflection of minutiae triplets, and
insensitivity to the directions of the minutiae relative to the sides of the triangle. To alleviate
these drawbacks, we introduce in this paper a novel fingerprint matching algorithm, named
M3gl. This algorithm contains three components: a new feature representation containing
clockwise-arranged minutiae without a central minutia, a new similarity measure that shifts
the triplets to find the best minutiae correspondence, and a global matching procedure
that selects the alignment by maximizing the amount of global matching minutiae. To
make M3gl faster, it includes some optimizations to discard non-matching minutia triplets
without comparing the whole representation. In comparison with six verification algorithms,
M3gl achieves the highest accuracy in the lowest matching time, using FVC2002 and
FVC2004 databases.
Keywords: fingerprint verification; minutiae descriptor; minutiae triplet
Sensors 2012,12 3419
1. Introduction
Fingerprints are the marks made by ridges and furrows in the fingers. They are formed during the sixth
month of intrauterine life of human beings and do not disappear until some time after death. Since there
are not two persons with the same fingerprints and they do not change naturally, they are an important
element to identify people.
Due to the high complexity of fingerprint matching and the huge amount of existing fingerprints, it is
necessary to build computer systems that automatically process fingerprints with high accuracy and low
computational costs. Historically, fingerprint recognition systems were mostly used in forensic sciences,
but the current popularity of these systems is mainly due to civilian applications such as the control of
physical access to facilities, the control of logical access to software, and the control of voters during
elections. A key component in fingerprint recognition systems is the fingerprint matching algorithm.
To measure the quality of a fingerprint matching algorithm, the evaluator must consider the context
in which it is applied. For example, the algorithms based on microscopic characteristics are suitable
for applications where fingerprints are acquired with high resolution sensors (1,000 dpi or higher); the
quality of these algorithms dramatically decreases when the resolution is low [1]. The following quality
parameters are proved to be important for evaluating general matchers:
Low computational cost: The algorithm satisfies memory and time restrictions for its application
context [2].
Invariance to translation: The algorithm returns a high similarity value when comparing
fingerprints from the same finger notwithstanding that fingerprints be translated horizontally and/or
vertically [3].
Invariance to rotation: The algorithm returns a high similarity value when comparing fingerprints
from the same finger in spite of fingerprints rotation [3].
Tolerance to non-linear distortion: The algorithm returns a high similarity value when comparing
fingerprints from the same finger even when fingerprints are affected by non-linear distortion, as a
result of fingerprint creation mechanisms [4].
Sensitivity to the individuality of fingerprints: The algorithm returns a high similarity value when
comparing fingerprints from the same finger and returns a low similarity value when comparing
fingerprints from different fingers [5].
Insensitivity to select a single alignment: The algorithm does not perform a single global alignment
from the best local alignment. Maximizing the local similarity value does not guarantee to find a
true matching local structure pair. Even if the selected local structure pair is a true matching pair,
it is not necessarily the best pair to carry out fingerprint alignment [3].
Tolerance to partial fingerprints: The algorithm returns a high similarity value when comparing
fingerprints from the same finger even when the fingerprints are not complete [5]. Partial
fingerprints can be produced by the restrictions of the sensors, latent fingerprints in crime scenes,
and different fingerprint creation mechanisms.
Tolerance to the low quality of fingerprints: The results of the algorithm are not significantly
affected by low fingerprint quality [6]. Due to different skin conditions and/or the different
fingerprint creation mechanisms, sometimes many details of the fingerprints do not appear clearly.
Sensors 2012,12 3420
Tolerance to errors of the feature extractor: The algorithm returns a high similarity value when
comparing fingerprints from the same finger even when the feature extractor has missed some
features and/or has extracted some non-existent features [3].
Determinism: Two executions of the algorithm with the same parameters return the same results.
Modern technologies impose new challenges to fingerprint matching algorithms; new systems reside
on light architectures, need standards for systems interoperability, and use small area sensors [3,4,7].
In these contexts, the algorithms with higher quality are those based on minutiae [2]. Minutiae are the
points where the ridge continuity breaks and they are typically represented as (x, y, θ); where (x, y)
represent the 2D point coordinates, and θthe ridge direction at that point.
As a minutia-based matcher should be invariant to translation and rotation, the process of minutia
pairing is ambiguous [8]. Thus, most matchers in this family use local minutia structures (minutiae
descriptors) to quickly establish the minutiae correspondences [4].
A simple and accurate minutiae descriptor is based on minutiae triplets [3]. Minutiae triplets are
local structures represented by three minutiae. Algorithms based on minutiae triplets have the following
advantages, which make them of higher quality than algorithms based on other representations:
They are tolerant to fingerprint deformations [9].
They are faster and more accurate, compared to algorithms based on other representations [10,11],
especially in applications with partial fingerprints [12].
They are suitable for applications based on interoperability standards because the most popular
standards are based only on minutiae [2].
They are appropriate for systems embedded on light architectures because the representation and
comparison of minutiae triplets can be performed efficiently [13].
Minutiae triplets have higher discriminative power than minutiae pairs and single minutiae [10].
Some important quality parameters related to fingerprint matching algorithms based on minutiae
triplets are:
Invariance to the order of minutiae in the feature: No matter the minutiae order in the triplet, the
algorithm finds the correct correspondences of minutiae when matching similar triplets (Figure 1).
Sensitivity to the reflection of minutiae triplets: The algorithm does not match a triplet with its
reflected version (Figure 2).
Sensitivity to the directions of the minutiae relative to the sides of the triangle: In order to find
similar triplets, the algorithm takes into account the directions of the minutiae relative to the sides
of the triangles formed by the triplets (Figure 3).
Sensors 2012,12 3421
Figure 1. Similar minutiae triplets that were not classified as true matching by some
algorithms because in image (a) the features are arranged according to the length of the
sides, in image (b) the algorithms try to match the main minutia q1(left triplet) with the
main minutia p1(right triplet).
(a) (b)
Figure 2. Minutiae triplets that do not match because (p1,p2,p3)is a reflected version of
(q1,q2,q3).
Figure 3. Minutiae triplets that do not match because minutiae pairs (q1,p1),(q2,p2)and
(q3,p3)highly differ in the directions of the minutiae relative to the sides of the triangles.
State-of-the-art algorithms based on minutiae triplets do not fulfil all the quality parameters, which
has a negative impact on their accuracy. Table 1shows the lacking quality parameter of all the reviewed
matchers, according to the following parameters:
I Invariance to the order of minutiae in the feature.
Sensors 2012,12 3422
II Sensitivity to the reflection of minutiae triplets.
III Sensitivity to the directions of the minutiae relative to the sides of the triangle.
IV Insensitivity to select a single alignment.
V Tolerance to errors of the feature extractor.
VI Determinism.
Table 1. Summary of the lacking quality parameter on fingerprint matching algorithms based
on minutiae triplets.
Lacking quality parameter
Algorithms I II III IV V VI
JY [9] X X X
KV [14] X X X
PN [11] X X
JG1 [12] X X X X
JG2 [5] X X
RUR [13] X X
TB [15] X X
FFCS [16] X X
CTYZ [17] X X
XCF [18] X X X X
ZGZ [19] X X
HK [20] X X
GSM [21] X X
In this research, we introduce M3gl, a new fingerprint matcher that fulfils most quality parameters.
M3gl is based on a new representation and a new comparison function for minutia triplets. An
experimental comparison with algorithms based on different types of minutiae descriptors shows that
M3gl is highly accurate and it has acceptable computational costs.
2. Definitions
This section defines some basic functions that we use throughout the paper. Given two minutiae
pi= (xi, yi, θi)and pj= (xj, yj, θj),ed(pi,pj)represents the Euclidean distance between the
coordinates of piand pjEquation (1).
ed(pi,pj) = (xixj)2+ (yiyj)2(1)
For two given angles αand β,adπ(α, β)computes the minimum angle required to superpose two
vectors with the same origin and angles αand βrespectively using Equation (2), while ad2π(α, β)
Sensors 2012,12 3423
computes the angle required to rotate a vector with angle βin clockwise sense to superpose it to another
vector with the same origin and angle αusing Equation (3).
adπ(α, β) = min |αβ|,2π− |αβ|(2)
ad2π(α, β) = βαif β > α
βα+ 2πotherwise (3)
Finally, for a given pair of minutiae piand pj,ang(pi,pj)computes the angle of the vector with
initial point at piand terminal point at pjusing Equation (4).
ang(pi,pj) =
arctan(∆y/x)if x > 0y0
arctan(∆y/x)+2πif x > 0y < 0
arctan(∆y/x) + πif x < 0
π/2if x= 0 y > 0
3π/2if x= 0 y < 0
(4)
where y=yiyjand x=xixj.
3. Feature Representation
In this section, we introduce m-triplets, a robust feature representation based on minutiae triplets.
Provided that a fingerprint is described by the minutia set P, our representation is a tuple with the
following components (see Figure 4):
minutiae piPare clockwise arranged starting on p1.
di1...3, where diis the Euclidean distance between the minutiae different than pi.
dmax,dmid and dmin are the maximum, middle and minimum distances in the triplet, respectively.
Although these components can be calculated based on distance values, we store them because they
are a key point for the algorithm optimizations.
αi1...6are the angles ad2πang(p,q), θrequired to rotate the direction θof a minutia to superpose
it to the vectors associated with the other two minutiae in the triplet.
βi= ad2πθj, θkis the angle required to rotate the direction of the minutia pkin order to
superpose it to the direction of the minutia pj.
The m-triplets are sensitive to the directions of the minutiae relative to the sides of the triangle
(angles α). The minutiae in this representation are arranged in clockwise direction without a central
minutia. Therefore, in order to compare m-triplets, the similarity function considers the three minutiae
rotations in clockwise sense (next section contains a formal definition of this procedure). This
representation and the comparison function guarantee the invariance to the order of minutiae in the
feature, and the sensitivity to the reflection of minutiae triplets.
Sensors 2012,12 3424
Figure 4. The components of the new feature representation proposed in this paper.
4. M-Triplets Similarity
In this section, we introduce a new m-triplets similarity. It is designed to accurately distinguish
between similar and non-similar m-triplets. Given two m-triplets tand r, we propose sinv(t,r)in
Equation (5) to compare m-triplets.
sinv(t,r) = max spart(t,r),spart t, shif t(r),spart t, shiftshift(r)(5)
where: shift(r)is the clockwise-shifted m-triplet rand spart(t,r)is the base similarity function in
Equation (6).
spart(t,r) = 0 if sθ(t,r)=0 sd(t,r)=0 sα(t,r) = 0 sβ(t,r)=0
1-1- sd(t,r)1sα(t,r)1- sβ(t,r),otherwise (6)
The base similarity function spart is defined using functions sθ,sd,sα, and sβ, which consider different
components of the m-triplets. According to Equation (6), two m-triplets are totally dissimilar if they
have at least one component totally dissimilar. If all component similarities are above zero, the product
rule makes the similarity hight if at least one component is close to 1.
The invariance to rotation is an important quality parameter for fingerprint recognition, especially
for fingerprint identification. Nevertheless, for fingerprint verification, the rotation is usually restricted
by sensors. The function sθEquation (7) incorporates this information into the m-triplets similarity to
increase minutia discrimination for such problems. Consequently, two m-triplets are dissimilar if their
minutiae directions differ more than π/4.
sθ(t,r) =
0if iadπ(θt
i, θr
i)> π/4
1otherwise
(7)
Sensors 2012,12 3425
The function sdEquation (8) compares m-triplets in terms of the side lengths of the triangle formed
by the triplet minutiae. sdreturns values in the interval [0,1], returning 0if at least one length difference
is greater than threshold tl.sdreturns 1if all length differences are 0; that is, the triangles formed by
both m-triplets are identical.
sd(t,r) =
0if i|dt
idr
i|> tl)
1maxi=1...3{|dt
idr
i|}/tlotherwise
(8)
The function sαEquation (9) compares m-triplets based on the angles formed by minutiae directions
and the sides of the triangles (angles αon Figure 4).
sα(t,r) =
0if iadπ(αt
i, αr
i)> ta)
1maxi=1...6{adπ(αt
i, αr
i)}/taotherwise
(9)
The function sβEquation (10) compares m-triplets based on relative minutiae directions (angles βon
Figure 4
sβ(t,r) =
0if iadπ(βt
i, βr
i)> ta)
1maxi=1...3{adπ(βt
i, βr
i)}/taotherwise
(10)
Equations (9) and (10) return values in the interval [0,1]. They return 0if at least two compared
angles differ more than threshold ta. The less the angles differ, the higher is the value returned by the
equations; therefore, they return 1if the compared angles are identical.
In order to detect dissimilar m-triplets in advance, avoiding all costly shifts, we use Theorems 1,2,
and 3. Proofs for Theorems 1and 2appear in the appendixes. Proof of Theorem 3is similar to the proof
of Theorem 1and is not stated.
Theorem 1. Given two m-triplets tand r, if |dt
max dr
max|> tlthen sinv(t,r) = 0.
Theorem 2. Given two m-triplets tand r, if |dt
mid dr
mid|> tlthen sinv(t,r) = 0.
Theorem 3. Given two m-triplets tand r, if |dt
min dr
min|> tlthen sinv(t,r) = 0.
Based on these theorems, we can modify sinv Equation (5). This way, our m-triplets similarity can be
re-written as Equation (11).
sinv(t,r) = 0if (|dt
max dr
max|> tl)(|dt
mid dr
mid|> tl)(|dt
min dr
min|> tl)
max{spart(t,r),spart (t, shif t(r)),spart(t, shif t(shift(r)))}, otherwise (11)
Local distance threshold tland angle threshold taare parameters of the algorithm and must be tuned
according to the image characteristics.
The function sinv, by means of spart, achieves the invariance to translation and the invariance to
restricted rotation, the tolerance to non-linear distortion and the sensitivity to the directions of the
minutiae relative to the sides of the triangle. The clockwise shifting makes function sinv invariant to
the order of minutiae in the feature and sensitive to the reflection of minutiae triplets.
Sensors 2012,12 3426
5. M3GL Algorithm
In this section, we introduce M3gl, a new fingerprint verification algorithm based on the proposed
minutiae triplet representation and similarity measure.
Given a fingerprint described by the minutia set Pwe compute the m-triplets as follows. For each
pP, find its cnearest minutiae in Pand build all m-triplets that include pand two of its nearest
minutiae, discarding duplicates. This way of computing m-triplets makes M3gl tolerant to the low quality
of fingerprints and tolerant to errors of the feature extractor. Additionally, m-triplets in the fingerprint
are sorted according to the length of the largest side to perform a binary search when looking for similar
m-triplets; Theorem 1guarantees the safety of this procedure.
M3gl consists of the following major steps: local minutiae matching, global minutiae matching, and
similarity score computation.
5.1. Local Minutiae Matching
This step finds the similar m-triplets in the template fingerprint using binary search. Then, it sorts
all matching pairs according to the similarity value and finds the local matching minutiae. Formally, the
algorithm is the following:
1. Let Qand Pbe the query and template fingerprint minutiae sets respectively. Let Rand Tbe the
query and template fingerprint m-triplets sets respectively. Let A {} be the set that will contain
local matching m-triplets pairs.
2. For each query m-triplet riRperform binary search looking for the template
m-triplets {t1,t2, . . . , tu} ⊂ Twith similarity value higher than 0 and add the pairs
(ri,t1),(ri,t2),...,(ri,tu)to A.
3. Sort in descendant order all matching pairs (r,t)in Aaccording to the similarity value.
4. Let M← {} be the set containing local matching minutiae pairs.
5. For each (r,t)Ado
(a) Let B(q1,p1),(q2,p2),(q3,p3)be the matching minutiae that maximizes sinv(r,t)
where q1,q2,q3Qand p1,p2,p3P.
(b) For each (qi,pi)Bdo:
i. If there is not any pair (qj,pj)Mthat qj=qior pj=pithen MM∪ {(qi,pi)}.
5.2. Global Minutiae Matching
This step uses every minutiae pair as a reference pair for fingerprint rotation and performs a query
minutiae transformation for each reference pair. Later, it selects the transformation that maximizes the
amount of matching minutiae. This strategy overcomes the limitations of the single alignment based
matching. M3gl uses three criteria to determine if two minutiae match at global level and to achieve the
tolerance to non-linear distortion. First, the Euclidean distance must not exceed threshold tg. Second,
minutia directions must not exceed threshold ta. Third, the directions differences relative to reference
minutiae pair must not exceed threshold ta. The formal algorithm is the following:
Sensors 2012,12 3427
1. Let n0be the maximum number of matching minutiae computed after performing all
fingerprint rotations.
2. For each (qi,pi)Mdo:
(a) Let E← {} be the set containing global matching minutiae pairs for the current iteration.
(b) For each (qj,pj)M, if (qk,pk)E(qj̸=qk)(pj̸=pk)
i. Compute q= (x, y, θ)as
x
y
θ
=
cos(∆θ)sin(∆θ) 0
sin(∆θ)cos(∆θ) 0
0 0 1
x3x1
y3y1
θ3θ1
+
x2
y2
θ2
where qi= (x1, y1, θ1),pi= (x2, y2, θ2),θ=θ2θ1,qj= (x3, y3, θ3).
ii. Let pj= (x4, y4, θ4); if ed(q,pj)tgadπad2π(θ2, θ1),ad2π(θ4, θ3)ta
adπ(θ, θ4)ta, then EE∪ {(qj,pj)}.
(c) if n < |E|then n← |E|.
5.3. Similarity Score Computation
The similarity value is computed using the formula n2
|P||Q|; where Pand Qare the template and query
fingerprint minutiae sets respectively, and nis the amount of matching minutiae pairs.
Global distance threshold tgand angle threshold taare parameters of the algorithm, and must be tuned
based on the image characteristics.
6. Experimental Results
In order to evaluate the new fingerprint matching algorithm, we use databases DB1 A, DB2 A,
DB3 A and DB4 A of FVC2002 and FVC2004 competitions. These databases are commonly used
as benchmarks for evaluating fingerprint matchers in the context of fingerprint verification. We also use
the FVC evaluation protocol [22]. Performance is measured by indicators EER, FMR100, FMR1000
and ZeroFMR. The indicator Time refers to the average matching time in milliseconds. We carry out all
the experiments on a laptop with an Intel Core i7 740QM processor (1.73 GHz) and 4 GB of RAM.
We use the same parameters values for M3gl in all databases (tl= 12,tg= 12,ta=π/6,c= 4).
We estimate these parameters through a few experiments using fingerprint databases DB1 B, DB2 B,
DB3 B and DB4 B of FVC2004 competition.
In the experimental comparisons, we include the algorithm proposed by Jiang and Yau [9] (JY)
because it is the most popular algorithm based on minutiae triplets in the literature. We implement
the algorithm proposed by Parziale and Niel [11] (PN) because it is the algorithm based on minutiae
triplets more similar to our proposal and we are interested in showing the difference in accuracy and
speed. We also compare our proposal with algorithms based on other types of minutiae descriptors, that
is why we implement the algorithms proposed by Wang et al. [23] (WLC), Qi et al. [24] (QYW), Tico
and Kuosmanen [25] (TK), and Udupa et al. [26] (UGS).
Figures 5and 6show that M3gl achieves lower FNMR for most of the FMR values. Tables 2and
3show that our algorithm achieves the best results for most of the performance indicators. Figure 7
shows examples where our algorithm is able to find true matching minutiae in difficult cases (partial
Sensors 2012,12 3428
fingerprints with low overlapping, non-linear distortion and low quality) where the other algorithms fail.
M3gl is also the fastest algorithm due to the following reasons:
The m-triplets similarity function includes the properties demonstrated in Theorems 1,2and 3to
discard comparisons without performing all its operations.
The algorithm performs binary search when looking for similar m-triplets in the local minutiae
matching step.
Figure 5. ROC curves with the performance of the compared algorithms in FVC2002.
Sensors 2012,12 3429
Figure 6. ROC curves with the performance of the compared algorithms in FVC2004.
The similarity score computation of M3gl is simple but robust. In order to test this robustness we
substitute the similarity score computation of M3gl for the strategies proposed by Wang et al. [23],
Qi et al. [24], Jiang and Yau [9], and Tico and Kuosmanen [25]; we name the new algorithms M3gl1,
M3gl2, M3gl3 and M3gl4 respectively. We test M3gl and its variations in the testing databases DB1 B,
DB2 B, DB3 B and DB4 B of FVC2002 and FVC2004. The experimental results (Tables 4and 5) do not
show a clear superiority of any algorithm; nevertheless, when comparing M3gl with the other algorithms
by pairs, we find that M3gl wins in most of the accuracy indicators.
Sensors 2012,12 3430
Table 2. Experimental results on databases DB1 A, DB2 A, DB3 A and DB4 A of
FVC2002.
Database Algorithm EER FMR100 FMR1000 ZeroFMR Time(ms)
WLC 29.5 57.2 63.6 66.9 123.0
D QYW 22.8 46.8 52.6 55.9 13.6
B JY 5.1 10.6 23.9 31.9 3.3
1 TK 4.0 4.9 7.0 8.9 12.4
- PN 1.9 2.5 3.4 5.8 20.3
A UGS 2.2 2.8 4.1 5.9 1,239.4
M3gl 1.1 1.3 2.3 3.8 1.4
WLC 34.0 63.6 69.3 72.6 269.6
D QYW 22.8 47.8 53.7 59.2 27.2
B JY 4.5 8.3 17.3 27.6 4.6
2 TK 3.6 4.6 6.3 23.1 19.1
- PN 1.4 1.6 2.4 3.5 44.4
A UGS 1.9 2.3 4.9 5.6 2,846.1
M3gl 1.3 1.4 1.9 2.2 1.6
WLC 29.8 57.4 62.7 65.0 27.1
D QYW 30.0 55.7 63.5 77.9 6.3
B JY 9.4 16.4 26.1 33.1 1.5
3 TK 7.7 9.8 12.6 16.4 5.8
- PN 5.6 6.9 10.2 12.8 5.6
A UGS 5.3 8.0 12.2 26.4 96.0
M3gl 3.1 4.5 7.5 9.4 0.6
WLC 22.9 51.7 61.0 63.5 37.0
D QYW 24.3 57.3 63.2 67.6 8.5
B JY 7.4 13.0 23.0 28.3 2.1
4 TK 5.1 7.1 9.4 12.1 8.4
- PN 3.1 3.9 5.6 10.3 10.3
A UGS 4.2 7.1 12.6 16.8 463.0
M3gl 2.4 3.4 5.6 11.2 1.0
Sensors 2012,12 3431
Figure 7. Two examples where all matching algorithms fail but our algorithm finds true
matching minutiae. The first row contains fingerprints db1 36 1 and db1 36 4 of database
DB1 A (FVC2002); the second row contains fingerprints 85 6 and 85 8 of database DB1 A
(FVC2004).
Table 3. Experimental results on databases DB1 A, DB2 A, DB3 A and DB4 A of
FVC2004.
Database Algorithm EER FMR100 FMR1000 ZeroFMR Time(ms)
WLC 27.3 64.8 73.9 77.3 150.0
D QYW 24.3 60.6 80.3 97.3 15.5
B JY 13.5 28.5 42.8 55.9 4.2
1 TK 15.9 29.1 41.8 51.0 11.7
- PN 11.4 17.7 24.4 25.9 20.9
A UGS 7.9 14.8 24.9 31.3 1,649.4
M3gl 6.3 11.4 19.3 21.7 1.3
WLC 28.1 62.1 68.9 78.0 103.0
D QYW 24.8 52.1 58.9 73.7 12.9
B JY 11.0 19.4 28.4 39.2 3.0
Sensors 2012,12 3432
Table 3. Cont.
Database Algorithm EER FMR100 FMR1000 ZeroFMR Time(ms)
2 TK 7.8 12.0 18.7 24.9 11.6
- PN 10.0 12.1 15.1 16.9 14.9
A UGS 6.4 10.5 16.7 19.9 1,210.8
M3gl 6.2 9.1 13.6 15.3 1.1
WLC 24.5 57.9 64.9 69.5 312.0
D QYW 19.7 47.7 65.9 87.5 22.6
B JY 12.0 22.1 32.3 41.4 6.4
3 TK 9.6 19.7 32.9 37.3 17.0
- PN 7.1 10.7 17.6 24.9 38.0
A UGS 5.1 8.6 14.1 22.4 6,510.9
M3gl 6.1 8.6 14.4 16.4 1.9
WLC 23.6 54.9 65.0 70.0 108.8
D QYW 25.5 55.5 65.8 74.7 13.3
B JY 9.7 16.3 25.3 28.6 3.2
4 TK 7.6 11.4 16.6 39.4 11.8
- PN 5.2 6.9 9.3 11.9 17.2
A UGS 5.1 7.6 11.2 13.1 1,687.1
M3gl 3.0 4.0 6.9 10.3 1.2
Table 4. Experimental results on databases DB1 B, DB2 B, DB3 B and DB4 B of
FVC2002.
Database Algorithm EER FMR100 FMR1000 ZeroFMR Time(ms)
D M3gl1 1.7 2.5 3.6 3.6
B M3gl2 2.5 1.6 3.2 3.2
1 M3gl3 1.4 2.9 3.6 3.6
- M3gl4 1.6 2.9 3.2 3.2
B M3gl 2.0 2.5 3.2 3.2
D M3gl1 0.7 1.1 1.8 1.8
B M3gl2 1.9 2.5 3.2 3.2
2 M3gl3 0.8 0.8 1.8 1.8
- M3gl4 1.9 2.9 2.9 2.9
B M3gl 0.7 1.1 1.8 1.8
D M3gl1 6.5 9.4 12.1 12.1
Sensors 2012,12 3433
Table 4. Cont.
Database Algorithm EER FMR100 FMR1000 ZeroFMR Time(ms)
B M3gl2 7.7 13.9 18.6 18.6
3 M3gl3 6.9 9.3 11.8 11.8
- M3gl4 6.9 11.4 27.9 27.9
B M3gl 6.4 9.3 11.1 11.1
D M3gl1 2.3 3.6 19.6 19.6
B M3gl2 2.8 3.9 11.1 11.1
4 M3gl3 2.2 3.2 16.4 16.4
- M3gl4 4.0 32.5 78.2 78.2
B M3gl 2.4 3.6 19.6 19.6
Table 5. Experimental results on databases DB1 B, DB2 B, DB3 B and DB4 B of
FVC2004.
Database Algorithm EER FMR100 FMR1000 ZeroFMR Time(ms)
D M3gl1 4.0 5.4 10.4 10.4
B M3gl2 5.8 24.3 30.7 30.7
1 M3gl3 3.8 6.1 13.6 13.6
- M3gl4 6.4 33.6 50.4 50.4
B M3gl 2.5 5 9.3 9.3
D M3gl1 9.7 21.1 24.3 24.3
B M3gl2 12.9 25.0 28.6 28.6
2 M3gl3 8.9 18.9 20.7 20.7
- M3gl4 11.4 25.0 31.1 31.1
B M3gl 10.5 20.7 25.7 25.7
D M3gl1 0.9 1.4 2.5 2.5
B M3gl2 3.1 6.1 24.6 24.6
3 M3gl3 1.0 1.4 2.5 2.5
- M3gl4 3.7 48.2 70.4 70.4
B M3gl 0.6 0.7 1.4 1.4
D M3gl1 3.4 6.1 7.5 7.5
B M3gl2 4.6 11.4 13.2 13.2
4 M3gl3 3.8 6.1 7.9 7.9
- M3gl4 5.3 20.0 72.9 72.9
B M3gl 4.2 6.1 7.5 7.5
Sensors 2012,12 3434
Experimental results confirm that fulfilling the quality parameters discussed in Section 1has a direct
impact in the matcher accuracy.
7. Conclusions
Fingerprint matching algorithms based on minutiae triplets have proved to be fast and accurate.
They are commonly used on light architectures and in systems based on interoperability standards for
fingerprints represented by minutiae. However, existing algorithms have several limitations that affect
their accuracy. In this paper, we identify the quality parameters that have a more significant impact on
fingerprint matching accuracy in order to create M3gl, a more accurate matcher.
M3gl uses a new representation based on minutiae triplets and a new comparison function that
achieves the invariance to the translation and rotation of fingerprints, and achieves the sensitivity to
the directions of the minutiae relative to the sides of the triangle. The new representation arranges the
minutiae in clockwise sense and the comparison function performs the three possible rotations of the
triplets achieving the invariance to the order of minutiae in the feature and the sensitivity to the reflection
of minutiae triplets. The components of the proposed representation are compared using thresholds that
allow the tolerance to the non-linear distortion of fingerprints. Besides, the new comparison function
includes optimizations that avoid comparing all the components of the triplets, increasing the matching
speed in many cases.
M3gl is deterministic, insensitive to select a single alignment, and sensitive to the individuality of
fingerprints. It uses a simple and effective procedure to compute minutiae triplets which makes the
algorithm tolerant to the low quality of fingerprints and to errors of the feature extractor.
Experimental results in databases of the FVC2002 and FVC2004 competitions show that M3gl has
low computational costs and is more accurate than other algorithms based on minutiae triplets and other
algorithms based on different representations.
In the near future we plan to study the behaviour of the new algorithm for latent fingerprint
identification.
Acknowledgment
The authors would like to thank Dania Yudith Su´
arez Abreu for her valuable contribution improving
the grammar and style of this paper.
References
1. Zhao, Q.; Zhang, D.; Zhanga, L.; Luoa, N. High resolution partial fingerprint alignment using
pore-valley descriptors. Pattern Recogn. 2010,43, 1050–1061.
2. Cappelli, R.; Ferrara, M.; Maltoni, D. Minutia cylinder-code: A new representation and matching
technique for fingerprint recognition. IEEE Trans. Pattern. Anal. Mach. Intell. 2010,32,
2128–2141.
3. Maltoni, D.; Maio, D.; Jain, A.K.; Prabhakar, S. Handbook of Fingerprint Recognition, 2nd ed.;
Springer-Verlag: London, UK, 2009.
4. Jain, A.K.; Feng, J.; Nandakumar, K. Fingerprint matching. Computer 2010,43, 36–44.
Sensors 2012,12 3435
5. Jea, T.Y. Minutiae-Based Partial Fingerprint Recognition. PhD Thesis, State University of New
York, NY, USA, 2005.
6. Jain, A.K.; Feng, J. Latent fingerprint matching. IEEE Trans. Pattern. Anal. Mach. Intell. 2011,
33, 88–100.
7. Prabhakar, S.; Ivanisov, A.; Jain, A.K. Biometric recognition: Sensor characteristics and image
quality. IEEE Instrum. Meas. Mag. 2011,14, 10–16.
8. Feng, J. Combining minutiae descriptors for fingerprint matching. Pattern Recogn. 2008,41,
342–352.
9. Jiang, X.; Yau, W.Y. Fingerprint Minutiae Matching Based on the Local and Global Structures.
In Proceedings of the 15th International Conference on Pattern Recognition, Barcelona, Spain,
3–7 September 2000; Volume 2, pp. 1038–1041.
10. Chen, X.; Tian, J.; Yang, X. A new algorithm for distorted fingerprints matching based on
normalized fuzzy similarity measure. IEEE Trans. Image Process. 2006,15, 767–776.
11. Parziale, G.; Niel, A. A Fingerprint Matching Using Minutiae Triangulation. In Proceedings of the
1st International Conference on Biometric Authentication, Hong Kong, China, 15–17 July 2004;
Volume LNCS 3072, pp. 241–248.
12. Jea, T.Y.; Govindaraju, V. A minutia-based partial fingerprint recognition system. Pattern Recogn.
2005,38, 1672–1684.
13. Reisman, J.; Uludag, U.; Ross, A. Secure Fingerprint Matching with External Registration. In
Proceedings of the 5th International Conference on Audio- and Video-Based Biometric Person
Authentication (AVBPA ’05), Tarrytown, NY, USA, July 2005; Volume LNCS 3546, pp. 720–729.
14. Kovcs-Vajna, Z.M. A fingerprint verification system based on triangular matching and dynamic
time warping. IEEE Trans. Pattern. Anal. Mach. Intell. 2000,22, 1266–1276.
15. Tan, X.; Bhanu, B. Fingerprint matching by genetic algorithms. Pattern Recogn. 2006,39,
465–477.
16. Feng, Y.; Feng, J.; Chen, X.; Song, Z. A Novel Fingerprint Matching Scheme Based on
Local Structure Compatibility. In Proceedings of the 18th International Conference on Pattern
Recognition, Hong Kong, China, 20–24 August 2006; Volume 4, pp. 374–377.
17. Chen, X.; Tian, J.; Yang, X.; Zhang, Y. An algorithm for distorted fingerprint matching based on
local triangle feature set. IEEE Trans. Inf. Forensics Secur. 2006,1, 169–177.
18. Xu, W.; Chen, X.; Feng, J. A Robust Fingerprint Matching Approach: Growing and Fusing of
Local Structures. In Proceedings of the 2nd International Conference on Biometrics, Seoul, Korea,
27–29 August 2007; Volume LNCS 4642, pp. 134–143.
19. Zheng, J.D.; Gao, Y.; Zhang, M.Z. Fingerprint Matching Algorithm Based on Similar Vector
Triangle. In Proceedings of the 2nd International Congress on Image and Signal Processing
(CISP ’09), Tianjin, China, 17–19 October 2009; pp. 1–6.
20. Hoyle, K. Minutiae Triplet-Based Features with Extended Ridge Information for Determining
Sufficiency in Fingerprints. Master Thesis, Virginia Polytechnic Institute and State University,
Burruss Hall Blacksburg, VA, USA, 2011.
Sensors 2012,12 3436
21. Ghazvini, M.; Sufikarimi, H.; Mohammadi, K. Fingerprint Matching Using Genetic Algorithm and
Triangle Descriptors. In Proceedings of the 19th Iranian Conference on Electrical Engineering,
Tehran, Iran, 17–19 May 2011; pp. 1–6.
22. Cappelli, R.; Maio, D.; Maltoni, D.; Wayman, J.L.; Jain, A.K. Performance evaluation of fingerprint
verification systems. IEEE Trans. Pattern. Anal. Mach. Intell. 2006,28, 3–18.
23. Wang, W.; Li, J.; Chen, W. Fingerprint Minutiae Matching Based on Coordinate System Bank
and Global Optimum Alignment. In Proceedings of the 18th International Conference on Pattern
Recognition, Hong Kong, China, 20–24 August 2006; Volume 4, pp. 401–404.
24. Qi, J.; Yang, S.; Wang, Y. Fingerprint matching combining the global orientation field with minutia.
Pattern Recogn. Lett. 2005,26, 2424–2430.
25. Tico, M.; Kuosmanen, P. Fingerprint matching using an orientation-based minutia descriptor. IEEE
Trans. Pattern. Anal. Mach. Intell. 2003,25, 1009–1014.
26. Udupa U, R.; Garg, G.; Sharma, P. Fast and Accurate Fingerprint Verification. In Proceedings
of the 3rd International Conference on Audio- and Video-Based Biometric Person Authentication
(AVBPA ’01), Halmstad, Sweden, 6–8 June 2001; Volume LNCS 2091, pp. 192–197.
Appendix Theorem Proofs
Theorem A1. Given two m-triplets tand r, if |dt
max dr
max|> tlthen sinv (t,r) = 0.
Proof. From the definition of m-triplet we have:
dr
max dr
mid (A1)
dr
max dr
min (A2)
dr
mid dr
min (A3)
Assume, without loss of generality, that dt
max > dr
max; then, from the hypothesis of Theorem A1, we
infer that:
dt
max dr
max > tl(A4)
which is equivalent to:
dt
max tl> dr
max (A5)
From Equations (A5) and (A1) we have dt
max tl> dr
mid; which is equivalent to:
dt
max dr
mid > tl(A6)
Similarly, from Equations (A5) and (A2) we obtain:
dt
max dr
min > tl(A7)
From Equations (A4), (A6) and (A7) we conclude that dt
max differs more than threshold tlwith respect
to dr
max,dr
mid and dr
min respectively. Therefore, sd(t,r)returns 0for every clockwise shifting of rand
consequently sinv(t,r) = 0.
Sensors 2012,12 3437
Theorem A2. Given two m-triplets tand r, if |dt
mid dr
mid|> tlthen sinv(t,r) = 0.
Proof. From the definition of m-triplet we have:
dt
max dt
mid (A8)
Assume, without loss of generality, that dt
mid > dr
mid; then, from the hypothesis of Theorem A2, we
infer that:
dt
mid dr
mid > tl(A9)
which is equivalent to:
dt
mid tl> dr
mid (A10)
From Equation (A10) and (A3) we have dt
mid tl> dr
min; which is equivalent to:
dt
mid dr
min > tl(A11)
Similarly, from Equations (A8) and (A9) we obtain:
dt
max dr
mid > tl(A12)
Additionally, from Equations (A8) and (A11) we obtain:
dt
max dr
min > tl(A13)
From Equations (A9), (A11), (A12) and (A13) we conclude that dt
max and dt
mid differ more than
threshold tlwith respect to both dr
mid,dr
min. Therefore, sd(t,r)returns 0for every clockwise shifting of
rand consequently sinv(t,r) = 0.
c
2012 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article
distributed under the terms and conditions of the Creative Commons Attribution license
(http://creativecommons.org/licenses/by/3.0/).
... These are specific, predefined characteristics that are manually extracted from fingerprint images for the purpose of identification [1]. However, the performance of these methods can degrade with variations in fingerprint quality [7]. ...
... This research endeavors to investigate the integration of Convolutional Neural Networks (CNNs) with Gabor filters for enhanced fingerprint recognition [3] [7]. By capitalizing on the intricate texture details within fingerprint images, we aspire to leverage the complementary advantages of deep learning models and established feature extraction methodologies [5] [9]. ...
... The primary objective of this research is to evaluate the integration of Convolutional Neural Networks (CNNs) with Gabor filters for enhanced fingerprint recognition [3] [7]. By investigating the performance of various classification algorithms and assessing their potential for real-world implementation, we aim to enrich the domain of fingerprint recognition and contribute to advancements in biometric authentication technology [10] [11]. ...
Conference Paper
Full-text available
I. ABSTRACT Fingerprint recognition systems stand as pillars in the realm of biometric authentication, providing indispensable security measures across various domains. This study investigates integrating Convolutional Neural Networks (CNNs) with Gabor filters to improve fingerprint recognition accuracy and robustness. Leveraging a diverse dataset sourced from the Sokoto Coventry Fingerprint Dataset, our experiments meticulously evaluate the efficacy of different classification algorithms. Our findings underscore the supremacy of CNN-based approaches, boasting an impressive overall accuracy of 94%. Furthermore, the amalgamation of Gabor filters with CNN architectures unveils promising strides in discerning altered fingerprints, illuminating new pathways for enhancing biometric authentication systems. While the CNN-Gabor fusion showcases commendable performance, our exploration of hybrid approaches combining multiple classifiers reveals nuanced outcomes. Despite these mixed results, our study illuminates the transformative potential of deep learning methodologies in reshaping the landscape of fingerprint recognition. Through rigorous experimentation and insightful analysis , this research not only contributes to advancing biomet-ric authentication technologies but also sheds light on the intricate interplay between traditional feature extraction methods and cutting-edge deep learning architectures. These findings offer actionable insights for optimizing fingerprint recognition systems for real-world deployment, paving the way for enhanced security and reliability in diverse applications.
... This approach, however, cannot be applied for geometrically transformed image segments, which will additionally require a manual image alignment before such a match. Therefore, a pair of minutiae, minutiae triangles, and minutiae polygons have been exploited to mitigate the issue of geometrical normalization in the past [8][9][10]. However, one minutiaebased triangle may match with another triangle that is located in a different region of the compared print. ...
... Since minutiae topological structure provides inadequate information to overcome geometrical transformations of the matching images, many researchers exploited minutiaerelated local structures, such as ridge frequency, ridge orientation, relationship and curvature [20,21]. The methods of minutiae-based fingerprint matching represented in the literature involve the use of minutiae pairs, minutiae triplets [9,19], Delaunay triangles [8,10], and minutiae quadruplets where minutiae direction and coordinate information are commonly used for the matching of two fingerprint images. This information, however, is sensitive to geometric transformations which necessitate image alignment before the matching process. ...
... In the minutiae-based polygon approach, pairs of minutiae and surrounding textures were used in the past, which needs an additional alignment step as one minutiae pair can match many pairs of minutiae located on different regions of the compared image. On the other hand, Miguel [9] exploited minutiae triplets where the feature vector consists of angles and distances between minutiae of a triangle. However, one triangle on an image can still possibly match more than one triangle on the counterpart or compared image. ...
Article
Full-text available
Contact-based biometric applications primarily use prints from a finger or a palm for a single instance in different applications. For access control, there is an enrollment process using one or more templates which are compared with verification images. In forensics applications, randomly located, partial, and often degraded prints acquired from a crime scene are compared with the images captured from suspects or existing fingerprint databases, like AFIS. In both scenarios, if we need to use handprints which include segments from the finger and palm, what would be the solution? The motivation behind this is the concept of one single algorithm for one hand. Using an algorithm that can incorporate both prints in a common processing framework can be an alternative which will have advantages like scaling to larger existing databases. This work proposes a method that uses minutiae or minutiae-like features, Delaunay triangulation and graph matching with invariant feature representation to overcome the effects of rotation and scaling. Since palm prints have a large surface area with degradation, they tend to have many false minutiae compared to fingerprints, and the existing palm print algorithms fail to tackle this. The proposed algorithm constructs Delaunay triangulated graphs (DTG) using minutiae where Delaunay triangles form from minutiae, and initiate a collection of base triangles for opening the matching process. Several matches may be observed for a single triangle match when two images are compared. Therefore, the set of initially matched triangles may not be a true set of matched triangles. Each matched triangle is then used to extend as a sub-graph, adding more nodes to it until a maximum graph size is reached. When a significant region of the template image is matched with the test image, the highest possible order of this graph will be obtained. To prove the robustness of the algorithm to geometrical variations and working ability with extremely degraded (similar to latent prints) conditions, it is demonstrated with a subset of partial-quality and extremely-low-quality images from the FVC (fingerprint) and the THUPALMLAB (palm print) databases with and without geometrical variations. The algorithm is useful when partial matches between template and test are expected, and alignment or geometrical normalization is not accurately possible in pre-processing. It will also work for cross-comparisons between images that are not known a priori.
... The first category relies on relationships between the observed minutia and its neighboring minutiae in a fixed radius, i.e., star structure [13] and minutiae cylinder-code [14]. On the other hand, the second category forms the relationships between the observed minutia and the -nearest neighbors [15,16,17,18,19]. In this work, we focus on improving algorithms in the second category. ...
... The latter methods handle these issues by increasing the number of feature representations for mismatched compensation. Medina-Pérez et al. [18] increase the number of minutiae-triplets by selecting more than two nearest neighboring minutiae ( ) to provide matching redundancy. Chikkerur et al. [19] choose -nearest neighbors ( ) to build -plets representation. ...
... The conventional fingerprint matching algorithm based on minutiae-triplets [16,18] comprises two main processes; minutiae-triplets formation and local and global minutiae-triplets matching. This work focuses on the first process. ...
Article
Most fingerprint matching methods suffer from elastic deformation of fingerprints, resulting in an increment of the false-rejection rate. We propose a new distance model for the minutiae-triplets formation that can remedy the elastic deformation of fingerprints. The new distance model, called a directionally weighted distance model, provides higher priority to neighboring minutiae within the same direction or the same ridge flow of the observed minutia. We introduce two methods that apply the proposed distance model to the minutiae-triplets formation. While the first method directly applies the model, the second method combines the model with ridge flow to handle highly curved areas such as singular-point areas or highly distorted fingerprint areas. We evaluate the proposed methods using two minutiae-triplets matching algorithms on sixteen public domain fingerprint databases. The experimental results show that the proposed distance model can significantly improve the accuracy of both matching algorithms on most databases.
... Minutia cylinder coding (MCC) [12] has been considered one of the most popular local matching methods that is computationally efficient and works well compared to earlier methods [10,11]. Besides MCC algorithm, minutia-triplets [13,15] and neighboring minutia-based descriptor (NMD) [14] are other popular local matching methods. These algorithms that utilized both local and global features have been widely accepted and used in sensor fingerprint image recognition tasks in the past decade. ...
Article
Latent fingerprints are ubiquitously used as forensic evidence by law enforcement agencies in solving crimes. However, due to deformations and artifacts within latent fingerprint images, performance of the automated latent recognition systems are far from desired levels. A basic matcher specifically designed for clean fingerprints using a minutiae-based matching algorithm can have high speed and accuracy in a sensor-to-sensor matching task, but low accuracy in matching latent prints, due to scale, rotation and quality differences between latent and sensor images. In this study, we propose a unique multistep fusion matcher (FM) on top of a base matcher that would utilize scale, rotation, and quality attributes of minutiae with speed, memory, and accuracy trade options in the latent recognition process. FM match characteristics are analyzed by using a private dataset consisting of 5560 latent and 1M slap/rolled fingerprint images. In addition, 292 domain expert selected latents are used to compare the nationwide performance of the proposed method. FM’s with multiresolution fusion (MRF) option have achieved competitive accuracy rates when searching 292 latent against 1 million background and projecting predictions for 69 million background. On the NIST SD302 public dataset, FM6 (FM option prioritizing accuracy for latent-to-sensor search) with MRF correctly recognizes 911 latent in rank-1, while the COTS system referenced in the NIST SD302 documentation recognizes only 790 from a gallery composed of 5950 latent and 100K rolled background database. FM6 MRF rank-1 count for 10K latent of NIST SD302 is 1415, whereas NIST’s referenced matcher rank-1 count is 880 for the same dataset. In addition, NIST SD302 rank-1 latents are used to construct 722 latent pairs to evaluate latent-to-latent matching performance. FM8 (FM option prioritizing accuracy for latent-to-latent search) with MRF has 46.1% rank-1 identification rate for latent-to-latent search against 10K latent background. Moreover, on a private 1457 latent palmprint versus 2296 sensor palmprint background, a palm matcher designed by dividing latent and palm images into 512x512 pixel segments produces 85.45% rank-1 accuracy by using FM6.
... Most of the algorithms utilize translation and rotation variant minutiae triplet features (spatial coordinate and orientation) for fingerprint matching [37][38][39][40][41]. Therefore, a registration of two matching fingerprints is required that necessitates the detection of a singular point to serve as the reference for alignment. ...
Article
Full-text available
Since long time fingerprint has been the most compelling biometric due to its permanence, universality, acceptability, and collectability. However, fingerprint recognition raises some privacy concerns. A stolen fingerprint template from the reference database could be used by an antagonist to gain a unauthorized access of the system. Therefore, the fingerprint needs to be secured from being compromised. In this paper, a non-invertible transformation function-based method for generating the cancellable fingerprint template is proposed. The transformation matrix is governed by the user key which is in the form of a randomly generated binary string. An alignment-free approach is proposed in which the fingerprint template is stored in the form of a polar histogram that contains the information about location of neighbouring minutiae around each detected minutia point. The matching score is obtained by computing the Chi-square distance between two templates. The pre-requisites for being the secured template are satisfied by conducting series of experiments on DB1 and DB2 datasets of FVC2000, FVC2002, FVC2004, and FVC2006 databases. The performance is evaluated in both non-transformed and transformed domains by computing error rates based on the receiver operating characteristic (ROC) of the fingerprint recognition system.
Article
Full-text available
Fingerprint recognition is widely used in daily life. However, the physiological phenomena of human can still fail recognition under dry and low temperature conditions.We present two main approaches for enhancing the accuracy of fingerprint recognition systems in cases of dry fingerprints. The first approach is an image enhancement algorithm with multiple training stages (MTS) for fingerprints at low temperatures, which aims to restore low quality fingerprints to normal quality. The second method is a Cycled Contrastive Ridge Generative Adversarial Network (CCRGAN) learning framework for synthesizing enrolled templates, aimed at improving the accuracy of low-temperature fingerprint matching in authentication systems. For FVC2002 dataset, we have achieved 0.05% for EER on DB1A, which is better than 0.09% for [1] and 0.18% for [2] on the MTS algorithm. After adding CCRGAN pseudo low fingerprint, the EER is improved to 0.0009%. As for inference time, our inference time is about 83 times faster than [3] on the FVC2002 DB3B.
Article
Nowadays, both fingerprint and palmprint databases are massive and whose size has exceeded millions. Therefore, applying a filtering technique, such as indexing, is vital for automatic fingerprint/palmprint identification systems. Geometric distortion present in fingerprints and the creases in palmprints have a significant drop in recognition accuracy. Moreover, protecting an enrollment template is an important and challenging issue today. Template protection is a technique to convert an unprotected enrollment biometric template to a protected biometric template and is used to prevent the access of illegal users and attackers to the enrolled biometric template. Hence, in this paper, we propose a new feature called the middle of the triangle’s side (MTS) derived from each minutiae pair of a triangle-based representation to mitigate the negative effect of the geometric distortion and creases. Furthermore, they can be used as a feature transformation to protect templates. For computing MTSs, we first estimate the quality of input images and then extract reliable minutiae from the input images. After that, we apply the Delaunay triangulation of order k to minutiae for obtaining a triangle-based representation. Then, we calculate the median of sides of each triangle for extracting MTSs. To obtain the direction of each MTS, we use the direction difference between each minutiae pair placed in both vertices of the triangle’s side. This makes MTSs robust against fingerprint and palmprint rotation. Afterward, we obtain new triangles by connecting the MTSs of each triangle and weight feature vectors based on the quality of minutiae, and generate indices. Finally, we propose a new feature vector for triangles to increase the recognition accuracy. Experimental results on two public fingerprint databases containing distorted fingerprints, and two public palmprint databases containing latent prints, show that MTSs are more robust than minutiae against geometric distortion. Also, MTSs are secure, and its reason is that minutiae direction and location are changed. In addition, the number of MTSs is more than minutiae, making them more appropriate for prints with a low number of minutiae. Our experimental results show that MTSs and the proposed indexing algorithm can obtain good results for distorted fingerprints and latent palmprints.
Article
Full-text available
Latent fingerprints are the fingerprint traces obtained from various surfaces of objects found at the crime scene. Latent fingerprint quality is, therefore, poor and they suffer from non-linear distortions. This is why latent fingerprints contain partial or incomplete minutia information. Developing an automatic fingerprint identification system (AFIS) for latent fingerprints becomes a major challenge because of a small number of minutia features. Moreover, currently developed AFIS for latent fingerprints are not robust against geometric transformations. In this article, based on the existing partial minutiae characteristics, we propose a method for detecting latent fingerprints. To identify an individual with existing nearest neighbor minutia structures, we develop a scale and rotation invariant algorithm called “Ratio of Minutiae Triangles (RMT)”. The algorithm utilizes the features which are based on the local minutiae arrangements around a reference minutia. To deal with missing minutiae in latent fingerprints, we consider minutiae clusters based on nearest minutiae neighborhood relation to form hash structures. In the fingerprint retrieval process, these hash structures are used. On the FVC2004 (Maio et al., FVC2004: third fingerprint verification competition. In: International Conference on Biometric Authentication. ICBA, Hong Kong, pp 1–7, 2004) and NIST SD27 (Garris and Mccabe, NIST Special Database 27: Fingerprint Minutiae from Latent and Matching Tenprint Images, Technical Report. National Institute of Standards and Technology, Gaithersburg, 2000) databases, experiments are carried out with different rotation and scale settings. For the FVC2004 and NIST SD27 datasets, we achieved Rank-1 identification accuracy of 78.75% and 86.82%, respectively. The result demonstrates substantial changes in the matching results relative to state-of-the-art algorithms, and the proposed method is robust against geometric transformations.
Article
Full-text available
Because of some complex distortions which occur in fingerprint, the fingerprint matching is still known as a difficult problem. In this paper we propose a fingerprint matching method based on genetic algorithm. Since in the low quality images, minutiae extraction error is high, so in this method we have used the local properties of minutiae. Also in this paper a new kind of triangle descriptors are proposed, which uses these descriptors properties, the approximated value of transfer parameters for alignment and similarity between two fingerprints can be attained. These descriptors have been used to generate the initial population and are applied to the genetic algorithm. The results show that using this method will increase the convergence speed of genetic algorithm significantly. Also appropriate values of transfer parameters are achieved directly using this method. The proposed method in this paper has been evaluated on FVC2002-DB1_B and comparing the aforementioned results with other papers results shows that our proposed method has a better performance in convergence speed.
Conference Paper
Fingerprint matching is the key component of Automated Fingerprint Identification System (AFIS). Not only the online and real-time fingerprint identification system, but also the fingerprint identity key and the challenge-response authentication based on biological feature, acquires fingerprint matching algorithm based on minutiae with high accuracy and robustness. This paper introduces a novel fingerprint matching algorithm based on minutiae, which doesn't rely on fingerprint global feature, such as core points and ridge structure. The algorithm uses a method of similar vector triangle to solve the key problem of point pattern matching algorithm reference point positioning. It can keep off a common situation happening in the traditional reference point positioning based on congruent or approximate congruent triangle which assumes the degree of deformation. Experimental results show that this algorithm can be invariant to translation, rotation and deformation. And it proves to be robust for fingerprint matching.
Article
Biometric recognition, or simply biometrics, refers to recognizing a person based on one or more of his anatomical or behavioral characteristics. A good biometric trait should be measurable, distinctive (different for every person) and stable over time. The sensing method should not be intrusive or socially unacceptable, and the system should be easy to use. A biometric system based on this trait should be accurate, fast, robust and inexpensive. In this article, we discuss the signal acquisition aspects of fingerprint and iris biometrics-two of the most widely used biometric traits.Personal recognition of people is necessary to conduct many social and economic activities. Besides visual recognition of acquaintances, checking a person's government issued photo ID is the most common procedure. In electronic access or transactions, passwords and security tokens are commonly used. These credentials are surrogates of a person's identity Their major shortcoming is that they can be easily compromised by being lost, stolen, or given to someone else. For better security, it is necessary to link the digital identity of a person to his body's characteristics.
Article
Fingerprint matching has been successfully used by law enforcement for more than a century. The technology is now finding many other applications such as identity management and access control. The authors describe an automated fingerprint recognition system and identify key challenges and research opportunities in the field.
Article
We define a novel feature vector for each fingerprint minutia based on the global orientation field. These features are used to identify corresponding minutiae between two fingerprint impressions by computing the Euclidean distance between vectors. A novel fingerprint matching algorithm is developed using both the orientation field and minutia. A series of experiments conducted on the public data collection, DB3, FVC2002, demonstrates the effectiveness of our method. (c) 2005 Elsevier B.V. All rights reserved.
Article
This paper discusses the alignment of high resolution partial fingerprints, which is a crucial step in partial fingerprint recognition. The previously developed fingerprint alignment methods, including minutia-based and non-minutia feature based ones, are unsuitable for partial fingerprints because small fingerprint fragments often do not have enough features required by these methods. In this paper, we propose a new approach to aligning high resolution partial fingerprints based on pores, a type of fingerprint fine ridge features that are abundant on even small fingerprint areas. Pores are first extracted from the fingerprint images by using a difference of Gaussian filtering approach. After pore detection, a novel pore–valley descriptor (PVD) is proposed to characterize pores based on their locations and orientations, as well as the ridge orientation fields and valley structures around them. A PVD-based coarse-to-fine pore matching algorithm is then developed to locate pore correspondences. Once the corresponding pores are determined, the alignment transformation between two partial fingerprints can be estimated. The proposed method is compared with representative minutia based and orientation field based methods using the established high resolution partial fingerprint dataset and two fingerprint matchers. The experimental results show that the PVD-based method can more accurately locate corresponding feature points, estimate the alignment transformations, and hence significantly improve the accuracy of high resolution partial fingerprint recognition.
Article
A novel minutiae-based fingerprint matching algorithm is proposed. A minutiae matching algorithm has to solve two problems: correspondence and similarity computation. For the correspondence problem, we assign each minutia two descriptors: texture-based and minutiae-based descriptors, and use an alignment-based greedy matching algorithm to establish the correspondences between minutiae. For the similarity computation, we extract a 17-D feature vector from the matching result, and convert the feature vector into a matching score using support vector classifier. The proposed algorithm is tested on FVC2002 databases and compared to all participators in FVC2002. According to equal error rate, the proposed algorithm ranks 1st on DB3, the most difficult database in FVC2002, and on the average ranks 2nd on all 4 databases.
Article
Matching incomplete or partial fingerprints continues to be an important challenge today, despite the advances made in fingerprint identification techniques. While the introduction of compact silicon chip-based sensors that capture only part of the fingerprint has made this problem important from a commercial perspective, there is also considerable interest in processing partial and latent fingerprints obtained at crime scenes. When the partial print does not include structures such as core and delta, common matching methods based on alignment of singular structures fail. We present an approach that uses localized secondary features derived from relative minutiae information. A flow network-based matching technique is introduced to obtain one-to-one correspondence of secondary features. Our method balances the tradeoffs between maximizing the number of matches and minimizing total feature distance between query and reference fingerprints. A two-hidden-layer fully connected neural network is trained to generate the final similarity score based on minutiae matched in the overlapping areas. Since the minutia-based fingerprint representation is an ANSI-NIST standard [American National Standards Institute, New York, 1993], our approach has the advantage of being directly applicable to existing databases. We present results of testing on FVC2002's DB1 and DB2 databases.