Professional Documents
Culture Documents
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 1, Issue 2, July August 2012 ISSN 2278-6856
PhD Research Scholar, Teerthanker Mahaveer University, College of Engineering, Moradabad, Uttar Pradesh, India
Professor and HoD , Computer Science and Engineering, IET, Gautam Budha Technical University, Sitapur Road, Lucknow, Uttar Pradesh, India
3
Ashutosh Singh, Integral University, Department of Computer Science & Engineering, Lucknow, Uttar Pradesh, India
Keywords: Fingerprint, Minutiae, Minutiae matching, Thinning, Scanning, Edge Enhancement, Region Coloring
1. INTRODUCTION
The subject of fingerprint image enhancement and processing for matching has been examined and many methods are proposed. Most of the methods have several steps, out of that one step is to detect fingerprint ridge direction and other step is to use the direction to enhance the image [2, 3, 5, 6]. Two of the fundamentally important conclusions that have risen from research are: (i) a person's fingerprint is natural structure and is not of changing nature (ii) everyone in this world has his own Volume 1, Issue 2 July-August 2012
fingerprint with the permanent uniqueness. Even the fingerprints in twins are not the same. In practice two humans with the same fingerprint have never been found. A fingerprint contains narrow ridges separated by narrow valleys and these ridges flows almost parallel to each other. The ridges are the dark area of the fingerprint and the valleys are the white area that exists between the ridges [9,12,15]. However in the research on finger print verification, we can distinguish it with the help of minutiae, which are the some abnormal points on ridges. There are two types of termination of minutiae, immediate ending of ridges or a point from where edges ends abruptly called termination and the point on ridge from where ridge split into two or more branches is known as bifurcation as shown in Fig.1. The most commonly used minutiae in current fingerprint matching techniques are ridge endings and bifurcations because they can be easily detected by only looking at points that surround them. Henry Faulds , Francis Galton and Edward Henry and among others had established scientific basis for using fingerprints as a method of personal identification in late 19th century. Since then the finger matching was mostly used by law enforcement agencies worldwide to establish the identity of suspect/victims based on partial prints or latent and to identify repeat offenders based on prints of all their fingers. But these techniques are finding many other applications like identity management, access control, attendance and time management etc. Due to rising concern on about security and frauds many Government and commercial organizations have substantially increased their own deployment of finger based matching and recognition system in several no forensic applications including physical and logical access control , ATM transaction ,border control and consumer device services. Fingerprint is dominant biometric trait in this application compared to other common traits such as face, iris and voice and new Page 17
3. IMPLEMENTATION PROCESS
Finger print image extraction is first step in this implementation process. This is mainly done to improve the image quality and make it clearer for further operations. Often Finger print image from various sources lack sufficient contrast and clarity. Hence enhancement by way image extraction is performed to improve accuracy of matching .It increases contrast between ridges and furrows and connect the some of the false broken points of ridges due to insufficient amount of ink or poor quality of sensing devices. It can be done by utilizing Histogram Equalization. Histogram equalization [12] is a technique of improving the global contrast of an image by adjusting the intensity distribution on a histogram. This allows areas of lower local contrast to gain a higher contrast without affecting the global contrast. Histogram equalization accomplishes this by effectively spreading out most frequent intensity values. The original histogram of fingerprint image has bimodal type (in Fig.2.a), the histogram after equalization occupies all the ranges from 0 to 255 and the visualization effect is enhanced as shown in Fig.2.b The result of histogram equalization is shown for one of the case of fingerprint image in fig.3.
(a) (b) Figure 1 Minutiae Features In this paper Section 2 describes the Minutiae matching method. Section 3 explains implementation process. Section 4 deals testing procedure. Section 5 describes output results as net outcome of proposed method and section 6 at the end future work.
Figure 3 (a) Original Image (b) Enhanced image after Histogram Equalization Page 18
Pseudo Code for Zhang Suen Thinning: Let A(P) be the number of 01 patters in the order set P2 P9 Let B(P) be the number of non-zero neighbors of P Do until image is stable (i.e. no changes made) Sub-iteration 1: Delete P from image if: a) 2 = B(P) = 6 b) A(P) = 1 c) P2* P4* P6= 1 d) P4*P6*P8=1 Sub iteration 2: a) and b) above c) P2*P4*P8 =1 d) P2*P4*P6 =1 This processes effectively thins the image, however, it sometimes creates undesirably artifacts. In the example of a Zhang-Suen thinned fingerprint there are gaps between edges as well as regions of small area that need to be removed for proper regional analysis as shown in Fig.4. Example of Zhang-Suen Thinned fingerprint:
Figure 5 Scanning of finger print Image 3.3 Edge Enhancement Regions are defined by the fingerprint edges that bound them. However, because of the nature of the fingerprint and current scanning techniques, ridge detail can be missing from the scanned fingerprint. Furthermore, the thinning algorithm can also eliminate some of the edge detail. Most missing edges take the form of gaps in an edge and are usually easily identified by a human. Still problem occurred in computer to recognize them. In the course of the project one of the edge enhancement techniques utilized, which caught some of the simple gaps, however, did not fill in the bigger or more complex ones. Pseudo Code for Edge Enhancement: Scan Image as explained in previous section: For each window: Find all the endpoints in the window For each endpoint pair Look at the line that goes through the points If the line is "strong" Draw the line between the points A line is said to be strong if many points on the line are already in or near points in the existing edge detail. If the line is strong then it is most likely that the ridge was supposed to span the gap and therefore can be drawn in. Note that because the image has been thinned, it is easy to find endpoints in the image. Endpoints are merely pixels that only have one neighboring pixel. Page 19
Thinned Image
3.4 Region Coloring Once the edge enhancement process completed and edges have been properly added to the image, the region coloring [11] process started. The region coloring is similar to taking the image into Microsoft Paint and using the color fill tool on all the valleys of the fingerprint, however, the code does it in a little more efficient way. The image is scanned and colors are associated with white space in the image. While the image is being colored in each pixel looks at the pixels around it to determine what color it should be and color equivalences are set up. Once again image is being scanned, replacing all the colors in the equivalence set with just one of the colors from them. Therefore, each pixel in a region has the same color number associated with it. Example of Region coloring:
5. RESULT
Four input Image 1,2,3 and 4 are taken as input for region coloring, then spurious region removal, if present any by using algorithm written .The results are shown below as output Image 5,6,7 and 8 respectively. Input Fingerprints:
Image1
Image2
(b) Output Image Image3 Image4 Figure 7 Four input Image (1, 2, 3, and 4) The pre-processing algorithms were run on each of the 4 different scans of the same finger to obtain the output fingerprints:
3.5. Spurious Region Removal As an artifact of the thinning process small regions are created where there should be no region. Because the matching process relies on the region pre-processing to be accurate these regions must be removed. Pse udo Code for Re gi on Re moval : For each window in scan: For each region encased in the window that is sufficiently small Remove the border between the erroneous region and the region it borders with least. This will make it so that regions that are small are spilled into a surrounding region that it most likely was supposed to belong to.
Image 5
Image 6
4. TESTING PROCEDURE
Once pre-processing is completed, the image is used for the matching process. In matching process, first we had to show that the region data was a good indication of matching minutiae. That is we need to show that the amount of regions between two minutiae is consistent across many different scans of the same fingerprint. To test our hypothesis 4 different scans of the same finger Volume 1, Issue 2 July-August 2012
Image 7
Image 8 Page 20
Figure 8 Output Image 5,6,7,8 (corresponding output image of input image1, 2, 3, 4 respectively)
ACKNOWLEDGEMENT
Authors are highly thankful to Teerthankar Mahaveer University (TMU) , Moradabad, U.P., India for all kind of support and co-operation to pursue research work under able Professor Dr. S.P.Tripathi of Gautam Budhha Technical University (GBTU), Lucknow, U.P. India.
REFERENCES
[1] L.Lam, S.W.Lee, and C.Y. Suen, Thinning Methodology-A Comprehensive Survey, IEEE Transaction on Pattern Analysis and machine intellgence,vol.14,no.9,1992. [2] Toshio Kamei and Masanori Mizoguchi ITRL, NEC Corporation, Japan: Image Filter Design For Fingerprint Enhancement- Proc. ISCV, 95, pp109114, 1995. [3] L. Hong, A. K. Jain, S. Pankanti and R. Bolle, Finger print Enhancement, Proc. First IEEE WACV, pp.202-207, Sarasota, 1996. [4] N.K Ratha, K.Karu,S.Chen, A.K.Jain, A Real-time matching system for large fingerprint database, IEEE transaction on Pattern Analysis and Machine Intelligence Vol..18, No.8,pp.799-813,1996 [5] Hong Y. Wan, A.K.Jain, Fingerprint Image enhancement Algorithm and performance Evaluation, IEEE Trans., Pattern Analysis & Matching,Intell.20,pp.777-789,1998. [6] Lin Hong, Wan Yi-fei and A. Jain, Finger print image Enhancement: Algorithm and Performance Evaluation, IEEE transaction on Pattern Analysis and Matching Intellgence, Vol.20, no.8, pp777-789, 1998. [7] K. Asai, Y. Hoshino and K. Kiji, Automated fingerprint Identification by minutiae-network
[15] C Saraswat and Amit Kumar, An Efficient Automatic Attendance System using Fingerprint Verification Technique, IJCSE, Vol.02, No.2, pp.264-269, 2010. Dinesh Kumar Misra has received B.Tech (ET) from IETE, New Delhi, M.Tech.(CSE) from AAIDU, Allahabad, U.P., India, MBA (HR) from IGNOU, New Delhi and Perusing Ph.D in CSE form College of Engineering, TMU, Moradabad, U.P., India on Digital Image processing. He has published 5 International and 3 National papers. Presently he is working as Scientist/Engineer in Department of Space, ISRO, Lucknow U.P., India since 1993. Dr. S.P. Tripathi, Professor and Head in CSE Department, IET, GBTU, Lucknow, U.P., India. He is Ph .D in CSE from Lucknow University, Lucknow, U.P., India and able Professor to supervise more than 8 Ph.D students. He has published more than 25 research paper. He has keen interest in research in the field of Data structure, Fuzzy Logic and Data Base Management. Ashutosh Singh, B.Tech in CSE from Integral University, Lucknow, U.P., India is Final year student and working on the above cited work.
Page 21