Finger Print Methods Overview
Finger Print Methods Overview
1
Chapter 1
After Dr. Nehemiah Grew published his first paper in 1684, he was closely
followed in 1686 by the publication of Professor Marcello Malpighi (De Ex-
temo Tactus Organo) [?]. However, this is not before 1798 that the first
theory on fingerprint uniqueness and permanence was given by J.C. Mayer.
Later, in the years 1896 to 1897, Sir Edward Henry, Inspector General of the
Bengal Police in India, developed the Henry Classification System [?], [?],
which was the first fingerprint matching system to find a worldwide accep-
tance because its classification achieved a significant increase of performances
by reducing the matching time from days or weeks to only few hours.
1
Although historical records also relate the use of fingerprints to establish identity in
courts, it is not agreed by historians and researchers wheter or not the Chinese were aware
of the uniqueness of fingerprints
2
Chapter 2
The litterature describes that two given fingerprints come from the same
person if there is a topological match [?] between their features patterns.
However, matching two fingerprints is not an easy task. Issues such ro-
tation, translation, deformation and spurious or missing minutiae are to
be addresses with the use of techniques from image processing and pattern
recognition methods.
To introduce to the typical steps carried out within the approaches de-
scribed in the review, the next two sections will be describing a simple ap-
proach of features extraction and matching, as described in [?].
• Ridge detection
• Minutiae detection
The orientation of the flow-like ridges can be done using the Rao’s [?]
algorithm. The image is then enhanced using image processing techniques.
3
Figure 2.1: Ridge endings and bifurcations
Regarding the detection of ridges, [?] gives the following property: “gray
level on ridges attain their local maxima along the normal directions of the
local ridges”. This property can be applied with the use of convolution masks
that take the (previously estimated) orientation in consideration. Still after
this image enhancement step, spurious minutiae are left due to noise, breaks
and smudges in the fingerprint image. Heuristics and algorithms can then
be used to delete spurious minutiae and reconnect broken ridges, thus finally
producing a thinned ridge map where minutiae shall be easy to detect.
A technique to then locate the minutiae is to assume that a black pixel is a
ridge ending if there is exactly 1 single black pixel among his 8 neighbooring
pixels while a ridge bifurcation pixel would require strictly more than 2.
The different steps of the minutiae detection are illustrated in figure ??.
Even though the given techniques used during the following steps of the
extraction are not the most efficient, they are the basis of most of the later
methods.
4
Figure 2.2: Extraction of minutiae
5
Chapter 3
6
• Total number of surrounding minutiae
• Number of ridges between the central minutiae of the window and the
surrounding ones
• Angle between the direction of the central minutiae ridge and the ridge
of surrounding minutiae
7
3.2 Orientation-based Minutia Descriptor
Keeping in mind that considering only the minutiae location and direc-
tion does only exploit a very low amount of the rich information content
that is present in fingerprint patterns, [?] introduces a minutiae descriptor
that relies on describing the orientation information of the fingerprint pat-
tern with regards to each minutiae details. Fingerprint are here classified
as “weakly-order textures exhibiting a dominant ridge orientation at each
point”. To compare with the method in [?], the description around each
minutiae is orientation-based, rather than minutiae-based. In other words,
not the surrounding minutiae, but the ridge orientation of each of them are
considered. Their orientation are even invarient to rotation and translation
with noisy inputs, thus bringing a substantial advantage over the minutiae-
based method. The minutiae descriptor is further said to be “independant
with respect to any other minutiae.
• Detect the minutiae of the input pattern and pair as many of them
with those of the template.
The experimental results report that the rejection rates increases with factors
such as errors in minutiae detection, unreliable orientation. Poor quality
images are also an issue because they reduce the number overlapping (because
not detected) minutiae to be compared.
8
• Alignment: transformations due to rotation, translation and scaling are
estimated and then used to realign the minutiae of the input pattern
with the template (see figure ??)
Figure ?? illustrates the alignment during the matching process. In the first
step the input pattern is aligned with the template by rotation and transla-
tion. The elastic point pattern algorithm concatenates each of the minutiae
(then represented as polygons in the polar coordinate system) into two strings
in the increasing order of radial angles. The distance between the two strings
is calculated and used to compute the match score.
9
Figure 3.2: (a) Input minutiae set, (b) template minutiae set, (c) alignment,
(d) pairing of the minutiae
• Determine a reference frame for the image and tesselate this region into
8 sectors
• Using the bank of Gabor filters, filter the image in 8 different directions
The first obvious advantage of this method is that the rotation invariance
can be very easily achieved. Thanks to its circular shape, the tesselated re-
gion (see figure ??(a)) can be simply rotated like a disc. The FingerCodes
are 640-dimensional (8 filtered images tesselated into 80 cells). The matching
1
Gabor filterbank is an efficient technique to perform the capture and decomposition
of useful information in a particular bandpass
10
is very fast because it is done by measuring their euclidean distance. Due to
the nature of the data and because the calculation of the euclidean distance
involves bit comparison, the matching scheme is suitable for hardware im-
plementation. Furthermore, because of their small size, the templates could
easily be embeded in the chip of a smart card.
This methods also brings its collection of shortcomings. The first one is
the determination of the reference frame. The detection of the core point
is not a trivial task. The region of interest may also be partially omited
during acquisition or it could even happen that the core point (center of the
reference frame) is not even present in the acquired image. Occlusion and
obliteration have the same consequences. It is true that the circular tessela-
tion offers the great advantage to achieve very easily the rotation invariance,
but on the other side it does not cover the whole image, thus reducing dis-
crimination and therefore accuracy. This gets even worse if the core point
is determined to be close to the boundary, because we obtain not only a
partial image but partial image which is partially void. In this case, the
features in the Fingercode can not very discriminative enough. The experi-
ments also show that about 99% of the process is spent on the Gabor filtering
• The tesselation is a square (see figure ??(b)) that does not consider a
landmark point, thus covering the entire image.
• The minutiae are extracted with the method of [?] and are indeed used
to align the squared tesselation and add more discrimination.
11
• The Gabor filter computation is achieved in the frequency space.
Covering the entire image rather than only a limited region further to
align the tesselation with the extracted minutiae instead od detecting an
empirical core point, is far more accurate. The dimension of the feature
vector is substantially increased (1352 dimensions for a 13x13 tesselation
with 8 Gabor-filtered images). The matching code of the FingerCodes (their
euclidean distance) and of the minutiae-based are merged into a single match-
ing score. In the previous implementation, the Gabor filtering was the most
CPU-expensive step of the process is now fairly reduced by the new com-
putation scheme. Experiments claim better results with this hybrid match-
ing method. However, the method could be improved by first performing a
12
minutiae-based match and only continue the verification is the match score
is below a given treshold, thus reducing the processing time.
13
Chapter 4
Conclusion
14
Bibliography
[NSW Police] The Thin Blue Line, The History of Fingerprinting. New
South Wales Australia, Unofficial Police Website. Retrieved
March 23, 2004, from http://www.policensw.com/info/
fingerprints/finger01.html
[Henry, 1900] E.R. Henry, “Classification and uses of finger prints”, Rout-
ledge, London, 1900
[Lee, 1991] H.C. Lee and R.E. Gaensslen, eds., Advances in Fingerprint
Technology. New York: Elsevier, 1991.
[Rao, 1990] A.R. Rao, A taxonomy for Texture Description and Identifica-
tion. New Yor: Springer-Verlag, 1990
15
[Mallesware, 1976] T.C. Mallesware, “Feature Extraction for Fingerprinting
Classification”, Pattern Recognition, Vol 8, 1976, pp 181-192
[Ansari, 1992] N. Ansari, M.H. Chen, and E.S.H. Hou, “A Genetic Algo-
rithm for Point Pattern Matching”, Chapt. 13, B. Soucek and
the IRIS Group, eds., Dynamic, Genetic, and Chaotic Program-
ming. New York: John Wiley & Sons, 1992
[Ranade, 1993] A. Ranade and A. Rosenfeld, “Point Pattern Matching by
Relaxation”, Pattern Recognition, vol. 12, no. 2, pp. 269-275,
1993
[Starink, 1995] J.P.P Starink and E. Backer, “Finding Point Correspondance
Using Simulated Annealing”, Pattern Recognition, vol 28, no. 2,
pp. 231-240, 1995
[Tico, 2003] M. Tico, P. Kuosmanen, “Fingerprint Matching Using an
Orientation-Based Minutiae Descriptor”, Trans. on Pattern
Analysis and Machine Intelligence, Vol 25, pp. 1009-1014
[Isenor, 1986] D. K. Isenor, S. G. Zaky, “Fingerprint Identification Using
Graph Matching”, Pattern Recognition, Vol. 19, pp. 111-112,
1986
[Chen, 1991] Z. Chen, C. H. Kuo, “A Topology-Based Matching Algorithm
for Fingerprint Authentication”, Proc. of 25 Annual IEEE In-
ternational Carnahan Conference on Security Technology, pp.
84-87, 1991
[Huttenlocher, 1987] D.P. Huttenlocher und S. Ullman, “Object Recognition
Using Alignment”, Proc. First Int’l Conf. Computer Vision, pp.
102-111, London, 1987
[Jain, 2000] A.K. Jain, S. Prabhakar, L. Hong and S. Pankanti. Filter-bank
based Fingerprint Matching. IEEE Transactions on Image Pro-
cessing, 9(5):846-859, May 2000
[Ross, 2002] A. Ross, A. Jain, J. Reisman. A Hybrid Fingerprint Matcher.
Proc. of International Conference on Pattern Recognition, Que-
bec City, 2002
[Wilson, 2000] C. Wilson, C. Watson and E. Paek, “Effect of Resolution
and Image Quality on Combined Optical and Neural Network
Fingerpritn Matching”, Pattern Recognition, Vol 33, no. 2, pp.
317-331, 2000
16
[Gamble, 1992] F. Gamble, L. Frye and D. Grieser, “Real Time Fingerprint
Verification System”, Applied Optics, Vol 31., no. 5, pp. 652-655,
1992
[Isenor, 1986] D.K. Isenor and S.G. Zaky, “Fingerprint Identification Using
Graph Matching”, Patter Recognition, Vol. 19, no. 2, pp. 113-
122, 1986
17