Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept
Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept
H
0
+
_
I
0
(I(i,]) H)
2
I
i I(i,]) >H,
H
0
_
I
0
(I(i,]) H)
2
I
otcrwisc,
(1)
where M and V are the estimated mean and variance of I(i; j),
respectively, and M0 and V0 are the desired mean and
variance values, respectively.
0.2. Segmentation
Segmentation is the process of separating the foreground
regions in the image from the background regions. In
fingerprint image the foreground regions correspond to the
fingerprint area containing the ridges and valleys, which is our
area of interest and background corresponds to the regions
outside the borders of the fingerprint area, which do not
contain any valid fingerprint information. When minutiae
extraction algorithms are applied to fingerprint image due to
the background regions of an image, extraction algorithm
extract noisy and false minutiae. Therefore in this stage
segmentation is employed to discard these background
regions, which facilitates the reliable extraction of minutiae.
In a fingerprint image, the background regions generally
exhibit a very low grey-scale variance value, whereas the
foreground regions have a very high variance. Hence a
International Journal of Computer Trends and Technology (IJCTT) volume 8 number 4 Feb 2014
ISSN: 2231-2803 http://www.ijcttjournal.org Page181
method based on variance Thresholding [7] is used to perform
the segmentation. Firstly, the image is divided into blocks and
the grey-scale variance is calculated for each block in the
image. If the variance of block is less than the global
threshold, then the block is assigned to be a background
region; otherwise, it is assigned to be part of the foreground.
The grey-level variance for a block of size WW is calculated
as:
I(k) =
1
w
2
w-1
=0
w-1
]=0
(I(i,]) H(k))
2
(2)
where V(k) is the variance for block k, I(i, j) is the grey-level
value at pixel (i, j), and M(k) is the mean grey-level value for
the block k.
3.3. Fingerprint Image Enhancement
In this stage fingerprint image is enhanced using method
employed by Hong et al. [7] The configuration of parallel
ridges and valleys with well-defined frequency and orientation
in a fingerprint image provide useful information which helps
in removing undesired noise. Gabor filters have both
frequency-selective and orientation-selective properties and
have optimal joint resolution in both spatial and frequency
domains. Therefore, it is appropriate to use Gabor filters as
band pass filters to remove the noise and preserve true
ridge/valley structures.
3.4. Binarisation
Most minutiae extraction algorithms operate on binary images
where there are only two levels of interest: the black pixels
that represent ridges, and the white pixels that represent
valleys. Binarisation is the process that converts a grey level
image into a binary image. This improves the contrast
between the ridges and valleys in a fingerprint image, and
consequently facilitates the extraction of minutiae.
In this stage grayscale fingerprint image is converted
into binary image using a global threshold. [4] The
binarisation process involves examining the grey-level value
of each pixel in the enhanced image and if the value is greater
than the global threshold, then the pixel value is set to a binary
value one; otherwise, it is set to zero. The outcome is a binary
image containing two levels of information, the foreground
ridges and the background valleys.
Let I (x, y) represent the intensity value of enhanced
grayscale image at pixel position (x, y). Let Tp be the
threshold value. In case of fingerprint images Tp represents
the differentiating intensity between the background pixels
and ridge pixels. BW(x, y) represent the binary image
obtained by the equation.
Bw(x,y) =_
1, i I(x,y) I
p
0, 0tcrwisc
(S)
3.5. Thinning
In this stage thinning operation is performed on binary image
to create skeletonised version of the binary image. Thinning is
a morphological operation that successively erodes away the
foreground pixels in binary image until they are one pixel
wide[2]. A standard thinning algorithmis employed, which
performs the thinning operation using two sub-iterations. This
algorithmis accessible in MATLAB via the thin operation
under the bwmorph function. [2] The skeleton image is then
used in the subsequent extraction of minutiae.
3.6. Minutiae Detection
The most commonly employed method of minutiae extraction
is the Crossing Number (CN) concept. This method involves
the use of the skeleton image where the ridge flow pattern is
eight-connected. The minutiae are extracted by scanning the
local neighborhood of each ridge pixel in the image using a
33 window. The CN value is then computed, which is
defined as half the sumof the differences between pairs of
adjacent pixels in the eight-neighborhood. According to
Rutovitz the CN for a ridge pixel P is given by: [6][10]
CN =
1
2
|P
P
-1
|, P
9
= P
1
8
=1
(4)
where Pi is the pixel value in the neighborhood of P. For a
pixel P, its eight neighbouring pixels are scanned in an anti-
clockwise direction as follows:
P
4
P
3
P
2
P
5
P P
1
P
6
P
7
P
8
Fig 3: 33 window for searching minutiae [6] [10]
After the CN for a ridge pixel has been computed, the
pixel can then be classified according to the property of its CN
value. Using the properties of the CN as shown in Table 2, the
ridge pixel can then be classified as a ridge ending, bifurcation
or non-minutiae point. For example, a ridge pixel with a CN
of one corresponds to a ridge ending, and a CN of three
corresponds to a bifurcation.
Table: 2 Properties of Crossing Number [6] [10]
CN Property
0 Isolated Point
1 Ridge Ending Point
2 Continuing Ridge Point
3 Bifurcation Point
4 Crossing Point
International Journal of Computer Trends and Technology (IJCTT) volume 8 number 4 Feb 2014
ISSN: 2231-2803 http://www.ijcttjournal.org Page182
3.7. Minutiae Matching
Let T and I be the representation of the template and input
fingerprint, respectively. Each minutia is considered as a
triplet m = {x, y, } that indicates the x, y minutia location
coordinates and the minutia angle :
T ={m
1,
m
2,
m
3..
m
m
}, m
i
={x
i
, y
i
,
i
} , i=1,2m
I ={m
1,
m
2,
m
3 ..
m
n
}, m
j
={x
j
, y
j
,
j
} , j=1,2n
where mand n denote the number of minutiae in T and I,
respectively.
A minutia m
j
in I and a minutia m
i
in T are
considered matching, if the spatial distance (sd) between
themis smaller than a given tolerance r
0
and the direction
difference (dd) between them is smaller than an angular
tolerance
0.
[3]
4. EXPERIMENTAL RESULTS
The proposed systemis implemented using MATLAB 7.10
(R2010a) and tested on database which is contains total 440
fingerprint images out of which 160 images are fromFVC
2000 (DB1 and DB2)[13], 160 images are fromFVC 2002
(DB1 and DB2)[14] and 120 fingerprint images (size
260300) are scanned using SecuGen Hamster plus. This
scanner employs a high-performance and maintenance-free
optical sensor. To evaluate the performance of proposed
system FAR and FRR of proposed system are calculated.
Table 2 shows the FAR and FRR of proposed fingerprint
identification system. At first we have enrolled 440 fingerprint
images in database, and then to calculate FRR of the proposed
system we have tested the system by giving 440 input
fingerprint images for identification. The systemis also tested
by giving 200 imposter fingerprint images as input.
Table: 3 Performance Evaluation of Proposed System.
Enrolled
Fingerprints
Imposter
Fingerprints
Input test Fingerprints 440 200
Accepted Fingerprints 439 0
Rejected Fingerprints 1 200
FRR=0.23% FAR=0%
Fig 4 shows experimental results of various stages in proposed
system. Fig 4(a) shows original images, Fig 4(b) shows
fingerprint image after normalization, Fig 4(c) shows
fingerprint image after segmentation using variance
Thresholding, Fig 4(d) shows resulting fingerprint image after
enhancement using Gabor filter Fig 4(e) shows result if
binarisation using global threshold, Fig 4(f) shows skeleton
image after applying thinning operation on binary image and
Finally Fig 4(g) shows extracted minutiae using Crossing
Number method.
(a) Original image (b) Normalized image
(c) Segmented image (d) Enhanced image
(e) Binary image (f) Thinned image
(g) Minutiae Extracted Using CN Concept
Fig: 4 Experimental results in various stages of proposed
system
V. CONCLUSIONS AND FUTURE WORK
The performance of a fingerprint feature extraction and
matching algorithms heavily depends upon the quality of the
input fingerprint image. Gabor filters has both frequency
selective and orientation-selective properties. It is observed
that Gabor filter method of fingerprint image enhancement is
International Journal of Computer Trends and Technology (IJCTT) volume 8 number 4 Feb 2014
ISSN: 2231-2803 http://www.ijcttjournal.org Page183
giving better results. Minutiae extraction algorithmcan detect
all the minutiae, including both true and false minutiae, using
the Rutovitz Crossing Number (CN) on the skeleton images
after thinning stage. The performance of proposed system is
evaluated by calculating FAR and FRR. The proposed system
has 0% FAR and 0.23% FRR which shows that the accuracy
of proposed systemis high. The proposed system is simulated
on 2.30 GHz Intel core i5 general purpose system using
MATLAB 7.10. The proposed minutiae based fingerprint
identification shows better performance in identifying the
fingerprint, till it takes more time. The time required for
detection and recognition could considerable be reduced by
implementing the same systemon dedicated hardware using
low or middle level language such as C and C++. In future, we
will try to implement the same systemusing C language. Also
it is observed that thinning process sometime breaks the ridges
which results in increasing number of false minutiae so there
is scope to improve thinning algorithm so that it will reduce
number of false minutiae and increase accuracy of the system.
REFERANCES
[1] Lili Liu and Tianjie Cao, The Research and Design of an
Efficient Verification System Based on Biometrics,
International Conference on Computer Science and Electrical
Engineering, 2012.
[2] Dr. Salah M. and Dr. Feryal I. Haj Hassan, Fingerprint
Minutiae Extraction, Journal of Computing Press., Vol. 2,
November 2010.
[3] Maltoni D., Maio D., Jain A. K., and Prabhakar S.
Handbook of Fingerprint Recognition. Springer, 2003.
[4] Lavanya B. N., K. B. Raja and Venugopal K. R.,
Minutiae Extraction in Fingerprint using Gabor Filter
Enhancement, International Conference on Advances in
Computing, Control and Telecommunication Technologies,
IEEE, 2009.
[5] F. A. Afsar, M. Arif and M. Hussain, Fingerprint
Identification and Verification System using Minutiae
Matching, National Conference on Engineering
Technologies, 2004.
[6] Feng Zhao and Xiaoou Tang, Preprocessing and
postprocessing for skeleton-based fingerprint minutiae
extraction, Pattern Recognition Society, Published by
Elsevier Ltd, 2006.
[7] L. Hong, Y. Wan and A. Jain, "Fingerprint Image
Enhancement: Algorithm and Performance Evaluation, IEEE
Pattern Analysis and Machine Intelligence, vol. 20, No. 8, pp.
777-787, 1998.
[8] Manvjeet Kaur, Mukvinder Singh and Parvinder S.
Sindhu, Fingerprint Verification System using Minutiae
Extraction Technique, Proceedings of World Academy of
Science, Engineering and Technology, vol. 36, December
2008.
[9] Lin Hong, Anil Jain, Sharath PanKanti and R. Bolle,
Identity Authentication Using Fingerprints, Proceedings of
the IEEE, Vol. 85, September1997.
[10] Ishpreet Singh Virk and Raman Maini, Fingerprint
Image Enhancement and Minutiae Matching in Fingerprint
Verification, Journal of Computing Technologies, vol. 1,
June 2012.
[11] Weiping Chen and Yongsheng Gao, A Minutiae-based
Fingerprint Matching Algorithm Using Phase Correlation,
Digital Image Computing Techniques and Applications, IEEE,
2007.
[12] Anil Jain, Yi Chen, and MeltemDemirkus, Pores and
Ridges: Fingerprint Matching Using Level 3 Features, 2007.
[13] Fingerprint Verification Competition (FVC2000)
http://bias.csr.unibo.it/fvc2000/
[14] Fingerprint Verification Competition (FVC2002)
http://bias.csr.unibo.it/fvc2002/
[15] Mary Lourde R. and Dushyant Khosla, Fingerprint
Identification in Biometric Security Systems, International
Journal of Computer and Electrical Engineering, vol. 2, No.
5, October 2010.
[16] Ravi J., K. B. Raja and Venugopal K. R., Fingerprint
Recognition using Minutia Score Matching, International
Journal of Engineering Science and Technology, vol. 1(2),
2009.
[17] A. K. J ain, A. Ross, and S. Prabhakar, An introduction
to biometric recognition", IEEE Transaction on Circuits and
Systems for Video Technology, vol. 14, no. 1, pp. 4-20,
January 2004.