Recognition of Fingerprint Images Using CNN For Cybercrime Detection System
Recognition of Fingerprint Images Using CNN For Cybercrime Detection System
Abstract- Fingerprint identification plays a crucial role in crime agencies to swiftly identify suspects and solve cases. [4][5]
detection, but manual analysis is time-consuming and error- This limitation has motivated researchers to explore
prone. This research aims to develop an automated system for automated techniques leveraging machine learning
accurate and efficient fingerprint matching using machine algorithms, aiming to enhance the efficiency and reliability of
learning. The proposed approach involves image acquisition, fingerprint recognition systems. [6] The primary objective of
preprocessing, feature extraction, and classification. Fingerprint
this work is to develop a robust fingerprint image
images are enhanced, binarized, and segmented. Minutiae (ridge
endings and bifurcations) are extracted as features. A identification system for crime detection using advanced
convolutional neural network (CNN) is trained on a dataset of machine learning techniques, specifically convolutional
fingerprint images for classification. By comparing algorithms, neural networks (CNNs). [7] By automating the process of
Random Forest achieved over 81% accuracy, outperforming feature extraction, classification, and matching, the proposed
Decision Trees (nearly 75% accuracy). The trained CNN model system aims to provide law enforcement agencies with a
can accurately match fingerprints from crime scenes with reliable and efficient tool for identifying suspects based on
potential suspects, providing reliable evidence. The developed fingerprint evidence from crime scenes. [8] The key
system offers law enforcement agencies an automated and contributions of this research include an in-depth analysis of
accurate fingerprint identification tool, improving crime-solving
various CNN architectures and their performance in
efficiency and reducing manual effort. The proposed approach
showcases the potential of machine learning in forensic fingerprint classification, as well as the development of a user-
applications. friendly interface for seamless interaction with the fingerprint
identification system. [9][10][11]. The paper isorganized as
Keywords- Random Forest Algorithm, Ensemble Learning, Image follows: Section II discusses about the literature survey and
Analysis, Pattern Recognition, Fingerprint Matching. Section III explains about the proposed work. Section IV gives
the overview of implementation. Section V discusses about the
I. INTRODUCTION results and discussion and finally conclusion in given in
Fingerprint recognition has long been considered the gold section VI.
standard for personal identification in forensics, having II. LITERATURE SURVEY
provided crucial evidence in numerous criminal investigations Fingerprint recognition and identification have been
over the past century. [1] Despite the emergence of DNA extensively researched for crime detection and forensic
fingerprinting, fingerprint analysis remains universally used applications, employing diverse techniques and approaches.
due to the unique and durable nature of friction ridge patterns Several studies have focused on image enhancement, feature
found on the skin. These intricate formations, developed extraction, and classification methods. Murthy et al. [1]
during the third to fourth month of fetal development, serve to proposed a methodology involving image enhancement,
enhance grip and prevent slippage when handling objects. thresholding, skeletonization, and minutiae extraction using
[2][3]. The distinctive arrangement and combination of ridge the Cross-Number method, along with the AlexNet CNN
characteristics make fingerprints an ideal biometric marker for architecture. Yilmaz [2] utilized Generative Adversarial
establishing human identity. However, the process of Networks (GANs) and one-shot learning for feature extraction
fingerprint identification for crime detection is not without its and differentiation. Militello et al. [3] compared pre-trained
challenges. Crime scene fingerprints are often partial, CNN architectures like AlexNet, GoogLeNet, and ResNet for
distorted, or obscured by noise, making them difficult to fingerprint classification, while Wen et al. [4] proposed a
analyze and match accurately. Traditional manual analysis lightweight CNN structure based on singularity Region of
methods are labor-intensive, time-consuming, and prone to Interest (ROI).
human error, hindering the ability of law enforcement
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on April 07,2025 at 07:27:11 UTC from IEEE Xplore. Restrictions apply.
Other studies have explored texture features and classifier [12] analyzed fingerprint recognition using the Cross-Number
algorithms for fingerprint classification. Hameed et al. [5] method for minutiae extraction and counting[14-15]. Fig 1 and
presented a method based on Histogram of Oriented Gradient Fig 2 shows the comparison of various algorithem with respect
(HOG) and Segmentation-based Feature Texture Analysis to different performance metrics like memory usage, training
(SFTA) features, combined with Discriminant Analysis and time per epoch, accuracy and loss. From the graph it is
Gaussian Discriminant Analysis classifiers. Li et al. [9] observed that CNN given more accuracy with less loss and at
proposed a fingerprint liveness detection method using fine- the same time it needs less memory. So for the proposed
grained feature fusion of SIFT, HOG, and LBP features, with system CNN is used to improve efficiency.
an SVM classifier. Uliyan et al. [7] introduced an anti-
spoofing method using a Deep Boltzmann Machine (DBM) III. PROPOSED WORK
and the KNN classifier to combat spoof forgeries. Techniques
for automated latent fingerprint identification have also been
A. SYSTEM ARCHITECTURE
investigated. Singla et al. [8] reviewed existing techniques and
The system architecture of the proposed system is shown in
highlighted the need for a completely automated system,
Fig 3. It encompasses several distinct phases, including image
addressing challenges in segmentation, overlapped fingerprint
acquisition, pre-processing, feature extraction, and
separation, and enhancement. Win et al. [6] surveyed
classification. The initial step involves the collection of
fingerprint classification algorithms and their applications in
fingerprint images utilizing specialized equipment.
criminal investigations, discussing methods like K-Means
Subsequently, these images undergo a pre-processing stage,
Algorithm, Apriori Algorithm, minutiae extraction, thinning,
during which any noise or artifacts that could potentially
and vein recognition[10-11].
interfere with the analysis are removed. The pre-processed
images are then subjected to sophisticated feature extraction
techniques, which identify the unique characteristics of the
fingerprints, such as ridge endings, bifurcations, and minutiae
points. Once the relevant features have been extracted, they
are utilized to train a machine learning algorithm, such as a
convolutional neural network (CNN), to classify the
fingerprint images. The algorithm leverages these features to
create a model that can distinguish between matching and non-
matching fingerprints with a high degree of accuracy
1. Image Enhancement:
Image segmentation is performed by partitioning the grayscale
fingerprint image based on pixel characteristics, separating the
regions of interest. Advanced filtering techniques and contrast
enhancement methods are applied for noise removal and ridge-
valley visibility improvement, respectively. Additionally,
Fig 2.Accuracy and Loss of Various Model
Random Forest models trained on diverse fingerprint datasets
Several studies have proposed unique approaches to are employed for tailored image enhancement.
fingerprint identification and matching. Amer et al. [10] The Random Forest algorithm constructs multiple decision
presented a model fusing morphological and neural network trees, where each tree is represented by:
approaches for latent fingerprint segmentation, patch f(x) = Σ w_i * I(x ∈ R_i) (1)
classification, and reconstruction. Witefee and Al-Asad [12- Here, x is the input feature vector, R_i represents the partitions
14] introduced an algorithm based on the angle direction of of the feature space, I(x ∈ R_i) is an indicator function that
minutiae objects, utilizing the Scale Invariant Feature takes the value 1 if x falls within the region R_i, and 0
Transformation (SIFT) method for matching. Awasthi et al. otherwise, and w_i is the prediction value associated with the
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on April 07,2025 at 07:27:11 UTC from IEEE Xplore. Restrictions apply.
region R_i. The final prediction is the aggregation of multiple 5. Matching: The Random Forest algorithm is an ensemble
decision trees' predictions. learning method that combines multiple decision trees to
2. Cutting-Edge Segmentation Strategies: Image binarization improve accuracy and robustness. The mathematical equation
and segmentation are crucial steps in fingerprint analysis. for the Random Forest model can be represented as:
Binarization converts the grayscale image into a binary f(x) = 1/M * Σ(m=1 to M) fm(x) (4)
format, representing ridges as black and valleys as white. One Where f(x) is the final prediction of the Random Forest model
common method is Otsu's algorithm, which determines an for input x,
optimal threshold value, T, by minimizing the intra-class M is the number of decision trees in the ensemble
variance: fm(x) is the prediction of the m-th decision tree for input x
σ_w^2(T) = ω_1(T)σ_1^2(T) + ω_2(T)σ_2^2(T) (2)
Here, ω_1(T) and ω_2(T) are the class weights, and σ_1^2(T)
and σ_2^2(T) are the variances of the two classes separated by
the threshold T.
Segmentation separates an image containing multiple
fingerprints into individual images, each containing a single
fingerprint. If the initial image has N distinct fingerprints, the
segmentation process extracts N separate images. This can be Fig 4. Image Enhancement
achieved using techniques like connected component analysis
or contour detection, which identify and separate connected B.MODULE DESCRIPTION
regions or contours in the binary image. 1. Image Enhancement: The input fingerprint image
3. Feature Extraction: Feature extraction is a crucial step in undergoes segmentation to separate the fingerprint area
fingerprint analysis, where distinctive minutiae details are from the background. Next, normalization is applied to
identified from the thinned fingerprint image. The most enhance the image quality. Fig. 4: Orientation
prominent and stable minutiae types used are bifurcations and estimation is then performed to determine the ridge
ridge endings. The Cross-Number (CN) concept is a widely orientation in the fingerprint. Ridge frequency
employed method for minutiae extraction, which involves estimation is carried out to calculate the frequency of
scanning the local neighborhood of each ridge pixel in the the ridges. These steps are crucial for accurate
skeleton image using a 3×3 window. The CN for a ridge pixel fingerprint feature extraction and matching in
is calculated as: biometric recognition systems.
CN = 0.5 * Σ |P_i - P_{i+1}| (3) 2. Preprocessing: The input image undergoes gray
Where P_i and P_{i+1} are the values of two adjacent pixels conversion to obtain a grayscale representation. Next,
in the 3×3 window. The skeleton image is then classified into filtering operations are applied to remove noise and
bifurcations (CN = 3) and ridge endings (CN = 1) based on the enhance the image quality. Fig. 5: Binarization is then
CN properties, extracting the minutiae details. performed to convert the grayscale image into a binary
format, where pixels are represented as either black or
4. Training and testing Model white. These preprocessing steps of gray conversion,
After minutiae extraction, the fingerprint data is used for filtering, and binarization are crucial for effective
training a CNN (convolutional neural network). If the dataset fingerprint image analysis and feature extraction in
has 2000 fingerprint images, 1500 are used for training and the biometric recognition systems.
remaining 500 for testing. An investigator takes fingerprints 3. Minutiae Extraction: The input image file undergoes
from the crime scene and compares them to a database of generative image maps creation. Binarization is then
previous criminals. After preprocessing the images, the CNN performed to convert the image into a binary format.
extracts features and ranks the identified criminals based on Fig. 6: Minutiae (ridge endings and bifurcations) are
similarity to the crime scene fingerprints, providing an detected from the binarized image. False minutiae are
accuracy score. The CNN's deep learning ability allows it to removed based on certain criteria, and neighboring
learn relevant features from the images, outperforming SVM ridges are counted to assess the quality of the remaining
(support vector machine) classifiers. Using the CNN classifier, minutiae. Finally, an output minutiae file containing
an improved fingerprint identification accuracy of 99% is the extracted genuine minutiae is generated for further
achieved. Here is the 6-line paragraph condensed into 3 lines: processing in fingerprint recognition systems.
For testing the fingerprint identification model, a separate test
set of 500 fingerprint images distinct from the 1500 training
images is used. After preprocessing, the test fingerprints are
passed through the trained CNN model which extracts
features, matches against the database, and outputs ranked
matches with similarity scores. The top matches are compared
to ground truth labels to evaluate the CNN model's accuracy
on the test set using metrics like precision, recall, and F1-
score. Fig 5. Preprocessing
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on April 07,2025 at 07:27:11 UTC from IEEE Xplore. Restrictions apply.
Fig 6. Minutiae Extracgtion
Fig 8.Fingerprint Data Flow Diagram
4. Matching:
Fig. 7 depicts the fingerprint recognition process. The input C. .USE CASE
fingerprint undergoes acquisition, preprocessing, and feature Fig. 9 depicts a Criminal Detection System with a use case
extraction stages. A convolutional neural network (CNN) is diagram illustrating the interactions between users and the
trained on a dataset, with one subset used for training and system. Users can load fingerprint images into the system,
another for testing. During an investigation, crime scene which can then be added to the database. Additionally, users
fingerprints are preprocessed, and the trained CNN extracts can match an input fingerprint against the database to identify
features. These features are matched against a database of potential matches or no matches. The system facilitates
known offenders' fingerprints through a dedicated matching fingerprint management and identification, aiding criminal
module. Potential matches are ranked based on similarity, and investigations through fingerprint evidence. For example, if
an accuracy metric quantifies the confidence level of each there are 100 instances of the Tented Arch pattern in the
match, leading to the final decision. testing set, and the Random Forest classifier correctly
identifies 91 of them, the accuracy for the Tented Arch pattern
would be 0.91 or 91%.
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on April 07,2025 at 07:27:11 UTC from IEEE Xplore. Restrictions apply.
INPUT IMAGE GRAY IMAGE PROCESSED IMAGE
Fig 10.Acquisition
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on April 07,2025 at 07:27:11 UTC from IEEE Xplore. Restrictions apply.
[9] S. S. Hameed, I. T. Ahmed and O. M. A. Okashi, "Real and altered
fingerprint classification based on various features and classifiers,"
Accuracy Value Computers, Materials & Continua, vol. 74, no.1, pp. 327–340, 2023.
[10] W. Jian, Y. Zhou and H. Liu, "Lightweight Convolutional Neural
Network Based on Singularity ROI for Fingerprint Classification," in
Pattern Name
REFERENCES
[1] Baskar M, Rajagopal RD, BVVS P, Babu JC, Bartáková GP, Arulananth
TS. Multi-region minutiae depth value-based efficient forged finger
print analysis. Plos one. 2023 Nov 16;18(11).
[2] Nogueira, Rodrigo Frassetto, Roberto de Alencar Lotufo, and Rubens
Campos Machado. "Fingerprint liveness detection using convolutional
neural networks." IEEE transactions on information forensics and
security 11.6 (2016): 1206-1213.
[3] Kaur, Manvjeet, et al. "Fingerprint verification system using minutiae
extraction technique." International Journal of Computer and
Information Engineering 2.10 (2008): 3405-3410.
[4] Deepthi Murthy T S, Chirakala Sravya , Chadavala Sai Niharika,
Dudekula Sai Kumar , Dwarsala Ramanjaneyula Reddy: “Fingerprint
Image Recognition for Crime Detection”,Turkish Journal of Computer
and Mathematics Education Vol.12 No.12 (2021), 2230-2237.
[5] Kumar, Tarun, and Ravi Shanker Garg. "The recognition of latent
fingerprints using swarm intelligence based hybrid approach." Int J
Emerg Technol 11.5 (2020): 90-97.
[6] Pavithra, R., and K. V. Suresh. "Fingerprint image identification for
crime detection." 2019 International Conference on Communication and
Signal Processing (ICCSP). IEEE, 2019.
[7] Khin Nandar Win, Kenli Li, Jianguo Chen, Philippe Fournier Viger,
Keqin Li,Fingerprint classification and identification algorithms for
criminal investigation: A survey,Future Generation Computer Systems,
Volume 110, 2020, Pages 758-771, ISSN 0167-739X.
[8] Ibrahim Yilmaz Department of Computer Science Tennessee
Technological University “Enhanced Fingerprint Identification
Approach Using GAN and One-shot learning Techniques”
arXiv:2208.05615v1 [cs.CV] 11 Aug 2022.
Authorized licensed use limited to: REVA UNIVERSITY. Downloaded on April 07,2025 at 07:27:11 UTC from IEEE Xplore. Restrictions apply.