Effective and Efficient Fingerprint Image Postprocessing

Similar documents
An Algorithm for Fingerprint Image Postprocessing

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction

Segmentation of Fingerprint Images

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy

Segmentation of Fingerprint Images Using Linear Classifier

CHAPTER 4 MINUTIAE EXTRACTION

Adaptive Fingerprint Binarization by Frequency Domain Analysis

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

Fingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India

A Study of Distortion Effects on Fingerprint Matching

Quantitative Assessment of the Individuality of Friction Ridge Patterns

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database

Touchless Fingerprint Recognization System

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

Designing and Implementation of an Efficient Fingerprint Recognition System Using Minutia Feature and KNN Classifier

Fingerprint Recognition using Minutiae Extraction

Information hiding in fingerprint image

Learning ngerprint minutiae location and type

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Iris Segmentation & Recognition in Unconstrained Environment

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

Reduction of Musical Residual Noise Using Harmonic- Adapted-Median Filter

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

Automatic Licenses Plate Recognition System

Research on Friction Ridge Pattern Analysis

Card IEEE Symposium Series on Computational Intelligence

Iris Recognition using Histogram Analysis

Contrast adaptive binarization of low quality document images

Image Compression Algorithms for Fingerprint System Preeti Pathak CSE Department, Faculty of Engineering, JBKP, Faridabad, Haryana,121001, India

Extraction and Recognition of Text From Digital English Comic Image Using Median Filter

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Study and Analysis of various preprocessing approaches to enhance Offline Handwritten Gujarati Numerals for feature extraction

AUTOMATIC NUMBER PLATE DETECTION USING IMAGE PROCESSING AND PAYMENT AT TOLL PLAZA

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition

Keyword: Morphological operation, template matching, license plate localization, character recognition.

Research Article K-Means Based Fingerprint Segmentation with Sensor Interoperability

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

Fingerprint Recognition Improvement Using Histogram Equalization and Compression Methods

Experiments with An Improved Iris Segmentation Algorithm

Open Access An Improved Character Recognition Algorithm for License Plate Based on BP Neural Network

Edge Histogram Descriptor for Finger Vein Recognition

A JOINT MODULATION IDENTIFICATION AND FREQUENCY OFFSET CORRECTION ALGORITHM FOR QAM SYSTEMS

Multiresolution Analysis of Connectivity

Segmentation using Saturation Thresholding and its Application in Content-Based Retrieval of Images

Fingerprint Image Enhancement via Raised Cosine Filtering

Removal of High Density Salt and Pepper Noise through Modified Decision based Un Symmetric Trimmed Median Filter

An Improved Binarization Method for Degraded Document Seema Pardhi 1, Dr. G. U. Kharat 2

An Improved Bernsen Algorithm Approaches For License Plate Recognition

Postprint.

Audio Fingerprinting using Fractional Fourier Transform

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

ACCURACY FINGERPRINT MATCHING FOR ALTERED FINGERPRINT USING DIVIDE AND CONQUER AND MINUTIAE MATCHING MECHANISM

Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition

Fingerprint Combination for Privacy Protection

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

License Plate Localisation based on Morphological Operations

C. Efficient Removal Of Impulse Noise In [7], a method used to remove the impulse noise (ERIN) is based on simple fuzzy impulse detection technique.

SVC2004: First International Signature Verification Competition

Biometric Recognition: How Do I Know Who You Are?

An Adaptive Kernel-Growing Median Filter for High Noise Images. Jacob Laurel. Birmingham, AL, USA. Birmingham, AL, USA

A Novel Region Based Liveness Detection Approach for Fingerprint Scanners

sensors ISSN

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

AUTOMATED MALARIA PARASITE DETECTION BASED ON IMAGE PROCESSING PROJECT REFERENCE NO.: 38S1511

MODIFIED DCT BASED SPEECH ENHANCEMENT IN VEHICULAR ENVIRONMENTS

An Efficient DTBDM in VLSI for the Removal of Salt-and-Pepper Noise in Images Using Median filter

中国科技论文在线. An Efficient Method of License Plate Location in Natural-scene Image. Haiqi Huang 1, Ming Gu 2,Hongyang Chao 2

A Novel Morphological Method for Detection and Recognition of Vehicle License Plates

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

A Method of Multi-License Plate Location in Road Bayonet Image

Chapter 6. [6]Preprocessing

Iris Recognition using Hamming Distance and Fragile Bit Distance

Individuality of Fingerprints

Feature Level Two Dimensional Arrays Based Fusion in the Personal Authentication system using Physiological Biometric traits

A Generative Model for Fingerprint Minutiae

An Evaluation of Automatic License Plate Recognition Vikas Kotagyale, Prof.S.D.Joshi

The Elevator Fault Diagnosis Method Based on Sequential Probability Ratio Test (SPRT)

The Role of Biometrics in Virtual Communities. and Digital Governments

A new method of spur reduction in phase truncation for DDS

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Thoughts on Fingerprint Image Quality and Its Evaluation

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

APPENDIX 1 TEXTURE IMAGE DATABASES

Feature Extraction of Human Lip Prints

Detection of License Plates of Vehicles

Image Recognition for PCB Soldering Platform Controlled by Embedded Microchip Based on Hopfield Neural Network

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

Method for Real Time Text Extraction of Digital Manga Comic

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Automated Number Plate Verification System based on Video Analytics

Target Recognition and Tracking based on Data Fusion of Radar and Infrared Image Sensors

Fuzzy-Heuristic Robot Navigation in a Simulated Environment

Highly Adaptive Indian High Security Vehicle Number Plate Recognition

Pattern Recognition in Blur Motion Noisy Images using Fuzzy Methods for Response Integration in Ensemble Neural Networks

A Review of Optical Character Recognition System for Recognition of Printed Text

Transcription:

Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg xdjiang@lit.org.sg wyyau@lit.org.sg Abstract Minutiae extraction is a crucial step in an automatic fingerprint identification system. However, the presence of noise in poor-quality images causes a large number of extraction errors, including the dropping of true minutiae and production of false minutiae. A study on these errors reveals that postprocessing is effective in removing false minutiae while keeping true ones. Furthermore, the overall processing efficiency could be improved because of the reduction in total minutia number. In this paper, we present a novel fingerprint image postprocessing algorithm. It is developed based on several rules, which are generalized through a study on the errors that commonly occur in minutiae extraction and their effects on the overall verification performance. Thorough experimental tests demonstrate the proposed postprocessing algorithm to be both effective and efficient. 1 Introduction Most fingerprint identification systems are based on minutiae matching [1], and there are two minutia structures that are most prominent: ridge endings and ridge bifurcations [2]. For fingerprint images of poor quality, a large number of spurious minutiae are often extracted due to noise. This problem could be tackled either in the preprocessing stage such as fingerprint image enhancement [2,3], or in the postprocessing stage [4,5]. Fingerprint image postprocessing has been addressed in the literature by several authors. Xiao and Raafat propose a combined statistical and structural approach [4]. Hung exploits the duality between ridge images and valley images to detect and remove false minutiae [5]. A neural network based minutiae filtering method is proposed by Maio and Maltoni [6]. Ratha et al. use three heuristic rules to eliminate false minutiae [7]. In [8], Farina et al. present a set of postprocessing algorithms, including some classical methodologies and some new approaches such as ending and bifurcation validation algorithms. Spurious minutiae are produced in minutiae extraction due to noisy ridge structures in a fingerprint image. To some extent, they are also related to the specific minutiae extraction algorithm used, as discussed in [1]. Consequently, a postprocessing algorithm, aiming at correcting extraction errors, is related to the extraction algorithm, and optimal postprocessing algorithms could be different for different minutiae extraction algorithms. In this paper, we propose a new postprocessing algorithm that is developed for the minutiae extraction algorithm in [1]. Efforts are made to preserve true minutiae while eliminating false minutiae. Several rules for postprocessing have been generalized and used as guide in the development. These rules and the approaches taken are applicable to postprocessing for other minutiae extraction algorithms as well. 2 Postprocessing algorithm Under noisy conditions, a minutiae extraction algorithm could erroneously detect spurious minutiae, or make errors in deciding minutia types and localizing minutiae. Postprocessing can minimize these errors by removing false minutiae, correcting wrongly classified minutia types and increasing precision in minutia localization. At the same time, efforts should be taken to avoid removal of true minutiae during postprocessing. The new postprocessing algorithm is developed for the minutiae extraction algorithm presented in [1], where the gray-level fingerprint image is traced adaptively, and each valid ridge traced is associated with a ridge number m. If a tracing ridge m intersects another traced ridge l, a bifurcation is detected. An ending is detected when the tracing of a ridge m stops with no other ridge intersection (in this case, l is denoted as zero). A detected minutia is described by its position (i, j), its direction ϕ and the two associated ridge numbers m, l. The postprocessing algorithm proposed deals with the minutia list after extraction, using minutia information and the skeleton image S. The original graylevel fingerprint image is referred to when needed. Another useful parameter is the average ridge distance d in pixels. 2.1 Bifurcation correction Noises in a fingerprint image could cause an ending to be detected as a bifurcation, or result in a false ridge break with one bifurcation and one ending, as shown in Fig. 1. This kind of spurious bifurcations usually have one highly curved branch and could be identified by checking two direction conditions: α<2π/3 and β>π/3, where α and β are as shown in Fig. 2a. If a bifurca-

(a) (b) Figure 1: Bifurcations to be corrected tion satisfies these two conditions, its minutia type is changed to ending and its minutia position is changed to the position of T, the turning point found by tracking the direction change in tracing. In Fig. 2a, directions φ 1, φ 2 and φ 3 are calculated as the directions of corresponding lines. Each of these lines connects a start point of tracing and an end point of tracing, pointing to the end point of tracing. The start point of tracing for both φ 1 and φ 2 is the bifurcation point p, and that for φ 3 is T. T is also the end point of tracing for φ 2. In addition, it should be noted that most bifurcations near the core, where ridges are highly curved, are likely to satisfy the two conditions if φ 1 is calculated from tracing a very short distance as φ 1, shown in Fig. 2b. Thus, the distance traced to calculate φ 1 should be large enough so that this kind of true bifurcations won t be corrected mistakenly. This distance is set to 3d in our postprocessing. This processing contributes to not only the correction of minutia type, but also a more accurate localization. Furthermore, after this processing, the spurious minutiae caused by a break as in Fig.1b are converted to a pair of facing endings, which could be identified and eliminated in the ending pair processing later. (a) (b) Figure 2: Bifurcation correction From Fig. 3, line po is orthogonal to ϕ p at a small offset from the ending p. It is traced in both directions (φ o1 and φ o2 ) for a distance of 2d in the skeleton image S, and the tracing stops if any other ridge is met. The ending is possibly false if an edge is met when tracing, e.g. in φ o1. However, this condition alone is not reliable enough to claim that the ending near edge is false because of possible segmentation problems. Hence, the original gray-level image is used to further verify the validity of the ending. The gray-level image is traced in φ o1, searching first for a valley by comparing intensities, and then for a ridge in a similar manner. The ending will be classified as false only when no ridge is found while a valley is detected. Figure 3: Near-edge ending handling 2.3 False bifurcation pair processing False bifurcation pairs include conventional bridges, crosses, and islands. False islands could be easily identified and removed. Bridges and crosses are commonly due to noise between nearby ridges with similar orientations and they can be classified as type A or type B, as shown in Fig. 4, where p and q are a bifurcation pair. Such bifurcation pairs are usually facing each other, and they are possibly false when ϕ pq > 3π/4, where ϕ pq = ϕ p ϕ q if ϕ p ϕ q π and ϕ pq =2π ϕ p ϕ q if ϕ p ϕ q >π. Next, if these two bifurcation points are quite close with distance pq d, they are very likely to be false and hence eliminated. Otherwise, if d < pq < 1.5d, β needs to be checked, which is the angle between ϕ p and φ pq, the direction of line pq. FortypeA, this pair are false if β<π/8. For type B, the pair are false only if β<π/12, which is more strict to avoid removal of true minutiae. 2.2 Near-edge ending handling Due to imperfect segmentation, false minutiae could be present near edges. In [7], this is called boundary effects and the solution is to delete minutiae detected within a specified border of the foreground boundary, but a number of true minutiae could be deleted this way. It is observed that most false bifurcations near edges could be corrected to endings by the bifurcation correction introduced above. Therefore, problems near edges could be reduced to handling of endings. (a) Type A: l p = l q (b) Type B: l p = m q Figure 4: False bifurcation pair processing

2.4 False ending pair processing False ending pairs are commonly due to ridge breaks and scars. For an ending p, if there are several other endings that could form a pair with it, the nearest one q is chosen. The line pq is traced first. These two endings are true if there is any other ridge met during the tracing. When there is no ridge in between, they are eliminated if they are very close with distance pq 0.5d, and if pq > 0.5d, they are possibly false for ϕ pq > 2π/3 since such an ending pair are in opposite directions mostly. Next, β, the angle between ϕ p and φ pq, needs to be considered. For 0.5d < pq d, p and q are deleted if β>2π/3. For d< pq 1.8d, they are deleted only if β>5π/6. Figure 5: False ending pair processing 2.5 Other techniques employed and processing sequence We also employed some other simple techniques. False minutiae detection using these techniques is based on distance and direction relations, and ridge information. These techniques include very-close minutia pair deletion, facing-spur and against-spur handling, and a special treatment for fingerprint images of very poor quality. A spur consists of a bifurcation p and an ending q within a specific distance. It is a facing-spur if ϕ pq > 3π/4, and it is an against-spur otherwise. From our observation, facing-spurs are more likely to be false. Thus, the distance threshold for facing-spurs is larger than that for against-spurs, which is a looser condition. The special treatment for very poor images is to remove all minutiae within 12 pixels distance from edges in the skeleton image S. The processing sequence could have a significant impact on the overall performance. As seen in the description of bifurcation correction and near-edge ending handling, various techniques are not totally independent and one could have some effects on another. On the other hand, some techniques are more reliable than others. Therefore, to achieve the best performance, the more reliable a processing technique is, the earlier stage it should be put in the postprocessing sequence. This is also verified in experiments. Hence, various processing techniques are arranged in the following sequence: (1) Very-close minutia pair deletion (2) Bifurcation correction (3) Near-edge ending handling (4) Facing-spur handling (5) False bifurcation pair processing (6) False ending pair processing (7) Against-spur handling (8) Special treatment for very poor images 2.6 Guiding rules In the development of these postprocessing techniques, some guiding rules are followed, as detailed below. Firstly, although the target is to remove false minutiae, keeping true minutiae is more important for reliable minutiae matching, based on our testing. In practice, a technique designed to remove false minutiae is likely to remove some true minutiae as well. Thus, a postprocessing technique will only be adopted if it removes significantly more false minutiae than true minutiae. Secondly, the setting of parameters, mostly some thresholds, should be related to the image to be processed if possible. For instance, it is advantageous to relate distance thresholds to the average ridge distance d. Parameters adaptive to the image usually perform better than fixed values. Thirdly, false minutiae are preferable to be processed either solely or in pairs since most of them could be viewed as occurring solely or in pairs. Even in the case of a scar where many false minutiae present, it is still advantageous to process in pairs to avoid removing true minutiae, especially when there is any true minutia near the scar. A pair of false minutiae will be removed once detected and both will not be considered in following processing. Next, for some complex types of false minutiae, some processing rules could be over-simplified. They are not sufficient to tackle these problems effectively to achieve better performance. Hence, it would be beneficial to introduce several layers of processing, as illustrated in near-edge ending handling, false bifurcation pair processing and false ending pair processing. Lastly, as described previously, more reliable processing techniques should be placed at an earlier stage. 3 Performance evaluation The performance of this new postprocessing algorithm is evaluated in a similar way as in the Fingerprint Verification Competition (FVC) 2000 [9]. Four databases used in FVC2000 with 800 fingerprint images per database are tested to evaluate the accuracy and efficiency. They are called DB1, DB2, DB3, and DB4 in the following discussions. The performance of the new postprocessing algorithm is compared with that of the old postprocessing algorithm presented in [1].

The effectiveness of the new postprocessing algorithm is shown by the improvement in fingerprint verification accuracy. As in FVC2000 [9], the Receiving Operating Curves (ROC) are plotted and shown in Fig. 6, and the Equal Error Rates (EER) are computed and presented in Table 1. on average. It should be noted also that the time spent on the new postprocessing is still negligible on average (< 0.5%), compared with the total extraction time. Hence, the new postprocessing algorithm does not affect the efficiency of our fingerprint verification algorithm much, which ranks top in FVC2000 [9]. (a) FVCDB1 (b) FVCDB2 Table 2: Processing time FVCDB TExtract(ms) TMatch(ms) Post% Old New Old New Old New DB1 63.4 63.6 1.03 0.97 0.16 0.64 DB2 68.4 68.5 0.85 0.88 0.09 0.61 DB3 153.7 154.4 1.80 1.76 0.16 0.45 DB4 56.8 57.0 0.40 0.42 0.06 0.31 Average 85.6 85.9 1.02 1.01 0.13 0.49 4 Conclusions (c) FVCDB3 (d) FVCDB4 Figure 6: ROCs for FVC databases In Table 1, EER for the old postprocessing algorithm is denoted as OldEER and EER for the new algorithm proposed in this paper is denoted as NewEER. The improvement achieved is called EERImprove, and EERImprove = (OldEER NewEER)/OldEER. Table 1: EER improvement FVCDB OldEER NewEER EERImprove DB1 7.87% 6.84% 13.15% DB2 3.38% 2.67% 20.96% DB3 5.93% 4.87% 17.84% DB4 7.60% 5.84% 23.19% Average 6.20% 5.06% 18.42% It could be seen from both ROCs and EERs that the new postprocessing algorithm has effectively improved the accuracy of the minutiae matching algorithm. The efficiency is evaluated by the processing time. One is the average minutiae extraction time TExtract, which includes postprocessing time, and the other is the average minutiae matching time TMatch. The processing time shown in Table 2 is the five times average running under the same PC environment. In the table, Post% = T imespentonp ostprocessing/t Extract. As shown in the table, for the new postprocessing, the extraction time is increased by only a very small amount while the matching time is reduced slightly, In this paper, an effective and efficient postprocessing algorithm has been proposed for the minutiae extraction algorithm in [1]. To improve the overall performance of an automatic fingerprint identification system, it is very important to preserve true minutiae while removing spurious minutiae in postprocessing. Thus, our new postprocessing algorithm makes efforts to reliably differentiate spurious minutiae from true ones. These efforts include making use of ridge number information, referring to the original gray-level image, designing and arranging various processing techniques properly, and selecting various processing parameters carefully. The experimental results have shown that the postprocessing algorithm proposed has effectively improved the verification accuracy with little effect on efficiency, compared with the previous postprocessing algorithm. References [1] X. D. Jiang, W. Y. Yau, and W. Ser, Detecting the fingerprint minutiae by adaptive tracing the gray-level ridge, Pattern Recognition, vol. 34, no. 5, pp. 999 1013, May 2001. [2] L. Hong, Y. Wan, and A. K. Jain, Fingerprint Image Enhancement: Algorithm and Performance Evaluation, IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 777 789, Aug. 1998. [3] X. Luo, and J. Tian, Knowledge Based Fingerprint Image Enhancement, in Proceedings of Int. Conference on Pattern Recognition, pp. 783 786, 2000. [4] Q. Xiao, and H. Raafat, Fingerprint image postprocessing: a combined statistical and structural approach, Pattern Recognition, vol. 24, no. 10, pp. 985 992, Oct. 1991.

[5] D. C.D. Hung, Enhancement and feature purification of fingerprint images, Pattern Recognition, vol. 26, no. 11, pp. 1661 1671, Nov. 1993. [6] D. Maio, and D. Maltoni, Neural Network Based Minutiae Filtering in Fingerprints, in Proceedings of Int. Conference on Pattern Recognition, pp. 1654-1658, 1998. [8] A. Farina, Z. M. Kovacs-Vajna, and A. Leone, Fingerprint minutiae extraction from skeletonized binary images, Pattern Recognition, vol. 32, no. 5, pp. 877 889, May 1999. [9] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, FVC2000: Fingerprint Verification Competition, IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 24, no. 3, pp. 402 412, Mar. 2002. [7] N. K. Ratha, S. Chen, and A. K. Jain, Adaptive flow orientation-based feature extraction in fingerprint images, Pattern Recognition, vol. 28, no. 11, pp. 1657 1672, Nov. 1995.