ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods
ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods
Aswatha A. R
Department of Telecommunication
Dayananda Sagar College of Engineering, Visvesvaraya Technological University
Bengaluru-Karnataka, 560078, India
Email: [email protected]
Abstract—The field of fraud identification is reaching a refers to the automated method of verifying a match
very high proportion in the society, thus leading to an between human fingerprints.
increase in the need for fingerprint-based identification. The analysis and study of fingerprints for matching
This paper presents ASIC implementation of fingerprint compares the several print pattern features. This
recognition based on Overlap-add method and Integer fingerprint contains patterns like ridges and minutia
Wavelet Transforms. In overlap-add method, the present points, which are unique features of patterns. A
output overlaps the next output and in the integer to fingerprint is represented by location, types, and some
integer wavelet, low component at 2nd level attributes like angle of inclination of minutiae etc., are
decomposition is taken as approximate integer value. The shown in Fig 1. One hundred years of study on
implementation presents an analysis for speed, area and fingerprints ensures the uniqueness of minutiae based
power dissipation between the two algorithms and other representation for a very large population in the world.
methods. To establish the identity, 50 to 150 minutiae’s are enough
but in automated systems 10 matching minutiae are
Index Terms—Biometrics, Fingerprint Identification, assumed to be sufficient.
Overlap-add Method, Integer Wavelet Transform,
Application Specific Integrated Circuits.
I. INTRODUCTION
Biometrics is the science and technology of analyzing
and measure biological data. Biometric methods of
identification are referred to traditional methods mainly
for two reasons:
Copyright © 2017 MECS I.J. Image, Graphics and Signal Processing, 2017, 7, 36-44
ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods 37
recognition [2]. This approach effectively extracts the scale value. Hence in thresholding is performed based on
global features from the aligned fingerprint images. PCA threshold values. First, the image is divided into number
transforms a number of correlated variables into of blocks and for each block grey-scale mean is
uncorrelated variables known as principal components. calculated. If the grey value (Gi) of a particular pixel is
Anil K. Jain [3] in his paper has proposed filter bank less than the mean of that block (Bi), then zero is
based algorithm for fingerprint recognition. Gabor filters assigned otherwise one is assigned. The outcome of this
are used to consider the global and local details of process is shown in Fig 3, is a binary image having two
fingerprint. Anil K. Jain, et. al,[4] have proposed a levels of information.
method on the combination of different fingerprint
matching algorithms to develop the performance of a I(x; y) = 0; if Gi < Bi; = 1; otherwise; (1)
Finger Print Recognition (FPR) system. In this paper they
B. Skeletonisation
have combined the scores values from logistic transform,
which are generated from three dissimilar fingerprint Skeletonisation of binary images is done by a process
matching algorithms. Arun Ross, Anil K Jain and Salil called thinning that reduces all lines to a single pixel
Prabhakar [5] have proposed fingerprint matching using thickness. Thinning algorithm retains the connectivity of
minutiae and texture features. F. G. Hashad, et. al. [7] ridge structures while forming a skeletonised finger
have introduced Mel Frequency Cepstral Coefficients image. To eliminate a pixel the following conditions must
(MFCCs) for Fingerprint Recognition. Manisha be considered:
Redhuand and Dr.Balkishnan [9] has proposed new
method in FPR system. They used score values obtained The pixel will not be reasoned as an endpoint.
from matching method and image enhancement is done The elimination of pixel does not break
by using histogram technique and FFT. S. Gayathri and connections of the skeleton.
Dr. V.Sridhar [12] have shown the ASIC implementation The elimination does not cause excessive erosion
of fingerprint recognition process. The efficiency of the of the region.
fingerprint recognition system depends on the minutiae
obtained from the unprocessed image.
The objective of this paper is to design a high speed,
low area based fingerprint recognition system, which can
process every fingerprint image of the user. The finger
print identification has been implemented by using two
algorithms: they are Fast Convolution and Integer
Wavelet Transforms. The fast-convolution method uses
overlap add method than overlap save method, because
overlap save method saves previous stage outputs, thus
requiring huge memory. In the overlap add method the
previous stage is not saved and hence memory
requirement will be less. The integer wavelet is a 2nd
level transformation technique to transform the low order
coefficient in the time-frequency domain. With an On-
chip architecture being developed for a high speed and
low area FPR system, the designed system is verified as
Fig.2. Flow Diagram for Fingerprint Recognition
an IP for Functionality and Performance. The rest of the
paper is organized with Section II describing the overlap-
add method and IWT algorithm used. Section III presents
simulation results and performance evaluation of the
systems. Section V gives the conclusion for the paper.
III. METHODOLOGY
The flow diagram shown in the Fig 2 explains general
process of fingerprint recognition. The
thresholding/binarization and skeletonisation are the pre-
processing steps and feature extractions are common to
both the algorithms. Features of fingers are extracted
Fig.3. Binarized Image
using fast convolution and IWT method after which, bit
wise matching is done using hamming distance. In the Fig 4 is the skeletonized image used in the
A. Thresholding/Binarisation subsequent extraction of minutiae. After Skeletonisation
the features like ridges, delta points are extracted using
In fingerprint image the foreground have high grey Overlap-add and IWT method, as explained in the
value and the background regions exhibit a low grey- following sections.
Copyright © 2017 MECS I.J. Image, Graphics and Signal Processing, 2017, 7, 36-44
38 ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods
That is,
Copyright © 2017 MECS I.J. Image, Graphics and Signal Processing, 2017, 7, 36-44
ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods 39
o Zero pad fm(n) to be of length N = L + M convolution based DWT. In IWT the computational
-1. complexity is reduced to almost a half as compared to
o Take N-DFT of fm(n) to give Fm(k), k = convolution approach.
0,1,....N -1. The main advantages are as follows:
o Multiply: Hm(k) = Fm(k) * G(k), k =
0,1,....N -1. It consents to a faster implementation.
o Take N-IDFT of Hm(k) to give Hm(n), n = It permits fully in place calculation, in other words,
0,1,....N -1. no auxiliary memory is needed and the original
signal (image) can be replaced with its wavelet
Form h(n) by overlapping the last M -1 samples of transform.
hm(n) with the rest M -1 samples of hm+1(n). By reversing the operations, the inverse wavelet
The adding overlapped samples of hm(n) and transform is created.
hm+1(n).
The 5 DFT overlap add method is shown in Fig 6. There are several frameworks are explained, in that
most popular are S+P, Lifting scheme and overlapping
Fig 6 Overlap Add Method with 5 DFTs in frequency rounding transform (ORT) frameworks. The S-transform
domain. is the most basic framework for ITI transform. The below
section briefly describes the S-transform for the basics of
ii. Integer wavelet transform
ITI and also other three frameworks which are generally
The second algorithm is used to extract the finger used.
image feature is Integer Wavelet Transform (IWT). The S-Transform: The Sequential (S) transform is
disadvantage of DWT is that it contains real numbers as uncomplicated and ubiquitous ITI transform. The S
wavelet coefficients. So efficient lossless coding is not transform is the approximated (linear) Haar transform of
possible using linear transforms. The lifting scheme (LS) ITI and is allied with UMD filter bank as shown in Fig 7.
is an efficient implementation of the DWT and also The forward and inverse transform is calculated by the
perfect reconstruction is ensured. This creates new analysis and synthesis side of the filter bank respectively
transformation, like integer wavelet transform (IWT). as shown in Fig 7. The mathematical analysis of the S-
IWT is a basic modification of linear transforms, in transform is given by,
which output is rounded to the nearest integer. It is also
of interest for hardware implementations, where the use Y0 [n]=[1/2(x[2n]+x[2n+1])] (6)
of floating point is still a costly operation.
and
Y1 [n]=[1/2(x[2n]-x[2n+1])] (7)
Y0 [n]=[1/2(x[2n]+x[2n+1])] (8)
and
Y1 [n]=[v_0[n]-[t[n]+1/2]] (9)
Fig.6. Overlap add method
y0 [n]=[1/2(x[2n]-x[2n+1])] (10)
The convolution based DWT needs a large number of
arithmetic computations and a large memory for storage. and
The IWT requires fewer computations compared to the
Copyright © 2017 MECS I.J. Image, Graphics and Signal Processing, 2017, 7, 36-44
40 ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods
L0, L1 and K are integers satisfying L0 ≤ L1 and K≤ 1. forward transform of 1-D two channel UMD filter bank.
The forward transform divides the input coefficients The cascade of two input two outputs ITI networks is
x[n] into low-pass and high-pass coefficients as y0[n] and performed from polyphase filtering.
y1[n] respectively.
From the above equations, it is found that the S+P
transform is generated by adding an extra step to S-
transform; that is the high-pass component of S-transform
is adjusted with an extra prediction operation. The
predictor component αi and βi is shown in table 1.
A 1/4 1/4 0 0
Finger features are extracted by using the lifting
B 3/8 2/8 0 0
scheme based ITI transform.
C 8/16 4/16 1/16 6/16
D. Minutiae Reduction
Minutiae are the trivial details of fingerprint. An
unavoidable source of error in fingerprint recognition is
false minutiae. These are inevitable because of distortion
such as scars, sweat, etc. Existence of false minutiae
forces the matching process to fail. It is possible to handle
excessive numbers of them; therefore after the feature
extraction phase, the minutiae list is analyzed to eliminate
false minutiae. Our approach is to eliminate minutiae
features using distance criteria, e.g., minutiae which are
too close to each other are discarded. For a particular
Fig.7. S+P transform with UMD filter bank minutiae point within the D8 distance (also called as
chessboard distance), only one minutia point is
Lifting framework: The most popular framework of ITI considered. Any other minutiae point existing within of 3
transform is based on the lifting scheme. The lifting are all eliminated.
framework is a polyphase comprehension of UMD filter
banks, which adopts ladder networks for filtering. The 1- E. Matching using Hamming Distance
D two channel UMD filter bank contains 2 steps, they are The Hamming distance between two strings of equal
lifting and scaling steps. In lifting step, the filters Ak is length is calculated by creating a sequence of logical
constituted and in scaling step the amplifiers of gain sk as Boolean values indicating matches and mismatches
shown in Fig 8. between their position in the two inputs, and then
The ladder network of lifting scheme has to sustain summing the sequence.
their invariability even for quantization error (rounding
error by finite precision arithmetic). The construction of I(x,y)=I(xi,yi) xor I(xj,yj) (11)
lifting scheme based ITI transform follows initially to
constrict the lifting scheme, eliminate the scaling function
having a non-integer gain factor, and then transforms
IV. RESULT
each lifting step to the rounding operation Q at the output
of its corresponding filter as shown in Fig 8. The inputs which are described in the modules are
functionally verified using ModelSim. After the
successful completion of simulation, the design is
synthesized using Cadence tool.
The input image is in matrix form. Image enhancement is
done for the images to improve the quality \& mean is
calculated. If the grey value of a particular pixel is less
than the mean of that block then zero is assigned,
otherwise one is allotted. The outcome is an binary image
containing two logical levels of information.
Skeletonisation is done using thinning process to reduce
all lines to single pixel values. The skeletonized image is
used for feature extraction, which is done using overlap
Fig.8. Lifting framework with UMD filter bank
add method of fast convolution and IWT. Then the
Overlapping Rounding Transform: Overlapping minutiae reduction is done to remove false minutiae.
Rounding Transform (ORT) framework is a polyphase Finally matching of the test fingerprint with the reference
apprehension of UMD filter bank. The Fig 9 shows the images is done.
Copyright © 2017 MECS I.J. Image, Graphics and Signal Processing, 2017, 7, 36-44
ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods 41
Table 2 describes the signal details of the top module. The resultant cell layout is shown in Fig 13. The Table
3 and Table 4 describe the memory usage and power
Table 2. Signal Description of Top Level Module.
utilization before routing. The total area of 9100.560µm2,
Signal I/O Description the total power 444030.394nW and total cells of 1496 in
CLK Input Synchronous clock signal of finger print top that sequential gate of 1211 and the logic gate count of
module 743.
rst Input Reset signal
Table 3. Area Utilization Summary of overlap add Method
en Input Enable signal
MATCH Output The final authentication match signal Instance No. of Cells Cell Area
Sequential 1211 8036.582µm2
Table 2 describes the signal details of the top module. Inverter 212 212.420 µm2
Logic 743 851.558 µm2
The simulation results for the finger print top module are Total Area 1496 9100.560 µm2
given in Fig 11 and Fig 12. In this module the two finger
images are obtained from the text file. All these data are Table 4. Power Utilization Summary of overlap add Method
of eight bit in nature. The module operates for the
Leakage Power 291.522 nW
positive edge of clk and rst=0. Initially when the clk Dynamic Power 443738.872 nW
signal is at the positive edge and rst=1, no data Total power 444030.394 nW
evaluation process is taking place as shown in Fig 11 and
Fig 12. Fig 11 shows the unmatched condition if the test
image does not match with the reference image. It shows
that fingerprint is not identified.
Fig.11. Simulation Results for Unmatched Condition Fig 13. Final routed Cell layout of the overlap add Method
Copyright © 2017 MECS I.J. Image, Graphics and Signal Processing, 2017, 7, 36-44
42 ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods
Copyright © 2017 MECS I.J. Image, Graphics and Signal Processing, 2017, 7, 36-44
ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods 43
V. CONCUSION
Table 6. Area Utilization Summary of Integer Wavelet Method The comparative study reveals that IWT is highly
Instance No. of Cells Cell Area efficient compared to overlap-add Method, Image
Sequential 912 23701.104µm2 enhancement technique and O2D. The characteristics of
Inverter 158 334.454 µm2
low area, low power and low delay for IWT is shown
through the ASIC Implementation of the same. It has
Logic 682 20235.125 µm2
been observed that the recognition rate of IWT is better
Total Area 1752 44270.683 µm2
than overlap-add method. The credibility to use both
algorithms has been justified with improved recognition
Table 7. Power Utilization Summary of Integer Wavelet Method rate, area, power and delay, compared to other algorithms.
Leakage Power 285.735 nW In future, only those features in the required region of the
Dynamic Power 387736.218 nW finger can be concentrated upon and can be derived for
higher recognition rate and effective ASIC
Total power 388021.953 nW
implementation.
Copyright © 2017 MECS I.J. Image, Graphics and Signal Processing, 2017, 7, 36-44
44 ASIC Implementation of Finger Print Recognition Using Overlap-Add and Integer Wavelet Transform Methods
Journal of Engineering Research and Applications (IJERA) Signal Processing(IJIGSP), Vol.9, No.2, pp.9-18,
ISSN: 2248-9622, Volume 3, Issue 4, 2013, pp.2488-2497. 2017.DOI: 10.5815/ijigsp.2017.02.02
[10] Ajit Kumar, and Cyril Kwong, “Towards contactless, low- [20] Iwasokun Gabriel Babatunde, “Fingerprint Matching
cost and accurate 3D fingerprint identification”, IEEE Using Minutiae-Singular Points Network”, International
Transactions on Pattern Analysis and Machine Journal of Signal Processing, Image Processing and
Intelligence, Volume 37, Issue 3, 2015, pp.681-696. Pattern Recognition”, Volume 8, Issue 2, 2015, pp.375-
[11] M. Kamaraju and P. A. Kumar, “DSP based embedded 388.
fingerprint recognition system”, Proc. IEEE 13th
International Conference on In Hybrid Intelligent Systems
(HIS), 2013, pp.6-11.
[12] S. Gayathri and Dr. V.Sridhar, “ASIC Implementation of Authors’ Profiles
Image Enhancement Technique for Fingerprint
Recognition Process:, Proc. International Conference on Shashidhara H R is working as Assistant
Contemporary Computing and Informatics, 2014, pp.868- Professor in the Department of Electronics
873. and Communication Engineering, JSS
[13] S. Santhosh, “Design and development of a security Academy of Technical Education,
module with inbuilt neural network methodologies and an Begaluru and research scholar in the
advanced technique on fingerprint recognition”, IEEE Department of Electronics and
International Conference on Circuit, Power and Communication Engineering at Dayanand
Computing Technologies, 2014, pp. 1490-1495. Sagar College of engineering affiliated to
[14] Fred Kaggwa, John Ngubiri and Florence Tushabe, Visvesvaraya Technological University. He obtained his M.
“Evaluation of multiple enrollment for fingerprint Tech degree in VLSI Design and Embedded System from
recognition”, IEEE Global Summit on Computer \& Visvesvaraya Technological University in the year 2008 and
Information Technology, 2014, pp.1-6. Bachelor of Engineering in Electronics and Communication
[15] BinduGarg, ArjunChaudhary, KunalMendiratta and Vijay from Mangalore University in the year 2001. His major area of
Kumar, “Fingerprint Recognition Using Gabor Filter”, research On-Chip and ASIC implementation of Image
International Conference on Computing for Sustainable processing techniques, TLM architecture and Verification
Global Development (INDIACom), 2014, DOI: Methodologies, Network on chip design and implementation,
10.1109/IndiaCom.2014.6828105. Biometric and Image processing. He is Life member of IETE.
[16] Satish S Bhairannawar, SayantamSarkar, Raja K B and
Venugopal K R, “An Efficient VLSI Architecture for
Fingerprint Recognition using O2D-DWT Architecture Dr. Aswatha A R is working as Dean-
and Modified CORDIC-FFT”, IEEE International Academics, Professor and Head of the
Conference on Signal Processing, Informatics, department of Telecommunication at
Communication and Energy Systems (SPICES 2015), Dayanand Sagar College of Engineering.
Kozhikode (Calicut), India, 2015, pp.193-197. Lastly (in 2010), he received Ph.D. in the
[17] Om Preeti Chaurasia, Saumya Ranjan Giri, Anchal Garg, area of VLSI Circuit Design, and also he
"A Novel Algorithm for Minutiae Matching", earned M. Tech in Lighting Science and
International Journal of Image, Graphics and Signal Engineering in 1996 and MS in Software
Processing(IJIGSP), Vol.4, No.3, pp.8-14, 2012.DOI: Engineering in 2002 and also Engineer degree in Electricals and
10.5815/ijigsp.2012.03.02. Electronics in 1991. He is contributed IGI-Global book chapter
[18] Jyoti Malik,Dhiraj Girdhar,Ratna Dahiya,G. and published over 27 papers in referred international journal
Sainarayanan,"Reference Threshold Calculation for and 30 International conferences. His major area of research is
Biometric Authentication", IJIGSP, vol.6, no.2, pp.46-53, ASIC and On-Chip architecture implementation and verification
2014.DOI: 10.5815/ijigsp.2014.02.06 methodologies, Low power circuits, biometrics, pattern
[19] Shiv Gehlot, John Deva Kumar,"The Image Segmentation recognition and image processing. He is a member of the IEEE,
Techniques", International Journal of Image, Graphics and Member of IE (INDIA) and Life member of ISTE.
How to cite this paper: Shashidhara H. R, Aswatha A. R,"ASIC Implementation of Finger Print Recognition Using
Overlap-Add and Integer Wavelet Transform Methods", International Journal of Image, Graphics and Signal
Processing(IJIGSP), Vol.9, No.7, pp.36-44, 2017.DOI: 10.5815/ijigsp.2017.07.04
Copyright © 2017 MECS I.J. Image, Graphics and Signal Processing, 2017, 7, 36-44