Professional Documents
Culture Documents
A Project Report
On
FINGERPRINT RECOGNITION
Submitted to JNTU in partial fulfillment of the requirement for the award of Bachelor
of Technology
In
07361A0430
SWATHI
07361A04A2
CHAITANYA KUMARI
07361A0416
Department of
ELECTRONICS AND COMMUNICATION ENGINEERING
JAYA PRAKASH NARAYAN COLLEGE OF ENGINEERING
DHARMAPUR, MAHABUBNAGAR-509001(A.P.)
DEPARTMENT OF
ELECTRONICS & COMMUNICATION ENGINEERING
CERTIFICATE
This is to certify that the Project on FINGERPRINT
RECOGNITION is a bonafide work done by Mr. /Ms. HEENA
TARANUM bearing Roll. No. 07361A0430 in partial fulfillment of the
requirement of the award for the degree of Bachelor of Technology in
Electronics and Communications Engineering J.N.T.U., Hyderabad during
the year 2010-2011.
External Examiner:
Dept of E.C.E.
INDEX
INDEX
1. Abstract
2. Introduction
3. Background
3.1. What is fingerprint?
3.2. Classifying fingerprints
3.3. History of fingerprint recognition
3.3.1. William west
3.3.2. Minutia-based algorithm
3.3.3. Spectrum analysis
3.3.4. Hybrid technology
4. Fingerprint recognition
4.1. Preprocessing
4.1.1. Image enhancement
4.1.2. Noise reduction
4.1.3. Binarization
4.1.4. Thinning
4.2. Segmentation
4.3. Feature extraction
5. Classification of scattering
6. Conclusion and future scope
7. References
ABSTRACT
1. ABSTRACT
A fingerprint is an imprint made by the pattern of ridges on the pad of a human finger, in our
process; segmentation is takes place, is the goal of segmentation is to simplify and/or change
the representation of an image into something that is more meaningful and easier to analyze.
For feature extraction, We are using global method and local method. Many object
recognition systems use global features that describe an entire image. Global method can be
done in two ways. One way is for binary image, another is for gray image.
Local feature is an image pattern which differs from its immediate neighborhood. It is usually
associated with a change of image property or several properties simultaneously. The image
properties considered as feature. Local method can be done in two ways. One way is level 1,
another is level 2.
INTRODUCTION
2. INTRODUCTION
Identity verification in computer systems is done based on measures like keys, cards,
passwords, PIN and so forth. Unfortunately, these may often be forgotten, disclosed or
changed. A reliable and accurate identification/verification technique may be designed using
biometric technologies, which are further based on the special characteristics of the person
such as face, iris, fingerprint, signature and so forth. This technique of identification is
preferred over traditional passwords and PIN-based techniques for various reasons:
10
During Capture, raw biometric is captured by a sensing device, such as a fingerprint scanner
or video camera; then, distinguishing characteristics are extracted from the raw biometric
sample and converted into a processed biometric identifier record (biometric template). Next
is enrollment, in which the processed sample (a mathematical representation of the template)
is stored/ registered in a storage medium for comparison during authentication. In many
commercial applications, only the processed biometric sample is stored. The original
biometric sample cannot be reconstructed from this identifier.
Among the various biometric technologies being considered are fingerprint, facial features,
hand geometry, voice, iris, retina, vein patterns, palm print, DNA, keystroke dynamics, ear
shape, odor, signature and so forth.
2.1 Fingerprint
Fingerprint biometric is an automated digital version of the old ink-and-paper method used
for more than a century for identification, primarily by law enforcement agencies (Maltoni,
2003). The biometric device requires each user to place a finger on a plate for the print to be
read. Fingerprint biometrics currently has three main application areas: large-scale Automated
Finger Imaging Systems (AFIS), generally used for law enforcement purposes; fraud
prevention in entitlement programs; and physical and computer access.
A major advantage of finger imaging is the long-time use of fingerprints and its wide
acceptance by the public and law enforcement communities as a reliable means of human
recognition. Others include the need for physical contact with the optical scanner, possibility
of poor-quality images due to residue on the finger such as dirt and body oils (which can
build up on the glass plate), as well as eroded fingerprints from scrapes, years of heavy labor
or mutilation.
11
By using binary image (in this we converting original image into binary and proceeding next
steps), finding the images means and averaging all values to get a single value. This single
value is used for matching by comparing that value to each of the mean value of image. But
this method is providing better result so going for another method.
In another method instead of binary image we using original image, and calculating same
process as mentioned above. And matching is done by using that average value and
individual mean value of image value .in this process we find the better result than previous
one.
In local method, Local feature is an image pattern which differs from its immediate
neighborhood. In this method we are dividing into some equal windows in 3*3 or 5*5 or 7*7
window. This entire process is done into two types; they are level one and level2.
In level 1, only taking the mean and standard deviation of the image with respect to that
window. And taking the average of that individual values and comparison is done between
average value and individual value.
In level2 level1 process and mean of mean ,mean of std , std of mean and std of std is
calculating for individual images and taking average of that images (m of m, m of s, s of m
and s of s are averaging separately).at last we comparing with all image individual values to
average value.
11
12
BACK GROUND
12
13
3. BACK GROUND
3.1 WHAT IS FINGER PRINT?
3.1.1 Fingerprint:
1. The characteristic dermal ridges on the finger. This is the original meaning of fingerprint.
2. The characteristic pattern of the peptide fragments of a protein that have been subjected
electrophoresis and, at a right angle, chromatography. Peptide fingerprinting was invented by
Vernon Ingram in 1957.
3. The characteristic pattern of DNA fragments identified by Southern hybridization or by
PCR (polymerase chain reaction) DNA fingerprinting was invented by Alec Jeffreys in 1984.
A fingerprint is an imprint made by the pattern of ridges on the pad of a human finger.
These prints are often left on objects at a crime scene and are therefore used in forensic
science to identify suspects. No two humans have ever been found to have identical
fingerprints, thus fingerprints are widely believed to be unique.
Sometimes the prints are invisible, in which case they are called latent fingerprints, but there
are chemical techniques such as cyanoacrylate fuming and ninhydrin spray that can make
them visible.
Recently the American Federal Bureau of Investigation adopted a wavelet-based system for
efficient storage of fingerprint data, developed by Ingrid Daubechies.
In the 2000s, electronic fingerprint readers have been introduced for security applications
such as identification of computer users (log-in authentication). However, early devices have
been discovered to be vulnerable to quite simple methods of deception, such as fake
fingerprints cast in gels.
There is some controversy over the uniqueness of fingerprints. Even those who accept their
uniqueness sometimes argue that the techniques used to compare fingerprints are fallible. The
same fingerprint as it would be detected on a surface.
13
14
Fingerprint analysis (or Dactylographic, a term mainly used in the US) is the science of
using fingerprints to uniquely identify someone. Humans leave behind prints of the ridges of
the skin on their fingertips when handling certain materials. The pattern of ridges is thought
to be unique for each person and in practice has proved unique enough to identify the person
who left the fingerprint.
15
classification systems developed by Sir Edward R. Henry, who later became chief
commissioner of the London metropolitan police, and by Juan Vucetich of Argentina.
Officially introduced at Scotland Yard in 1901 and quickly became the basis for its criminalidentification records. The system was adopted immediately by law-enforcement agencies in
the English-speaking countries of the world and is now the most widely used method of
fingerprint classification. Juan Vucetich, an employee of the police of the province of Buenos
Aires in 1888, devised an original system of fingerprint classification published in book form
under the title Dactiloscopa Compared (1904; "Comparative Fingerprinting"). His system is
still used in most Spanish-speaking countries.
Fingerprints are classified in a three-way process: by the shapes and contours of individual
patterns, by noting the finger positions of the pattern types, and by relative size, determined
by counting the ridges in loops and by tracing the ridges in whorls. The information obtained
in this way is incorporated in a concise formula, which is known as the individual's
fingerprint classification.
There are several variants of the Henry system, but that used by the Federal Bureau of
Investigation (FBI) in the United States recognizes eight different types of patterns: radial
loop, ulnar loop, double loop, central pocket loop, plain arch, tented arch, plain whorl, and
accidental. Whorls are usually circular or spiral in shape. Arches have a mound like contour,
while tented arches have a spike like or steeple like appearance in the center. Loops have
concentric hairpin or staple-shaped ridges and are described as "radial" or "ulnar" to denote
their slopes; ulnar loops slope toward the little finger side of the hand, radial loops toward the
thumb. Loops constitute about 65 percent of the total fingerprint patterns; whorls make up
about 30 percent and arches and tented arches together account for the other 5 percent. The
most common pattern is the ulnar loop.
Dactyloscopy, the technique of fingerprinting, involves cleaning the fingers in benzene or
ether, drying them, and then rolling the balls of each over a glass surface coated with printer's
ink. Each finger is then carefully rolled on prepared cards according to an exact technique
designed to obtain a light gray impression with clear spaces showing between each ridge so
that the ridges may be counted and traced. Simultaneous impressions are also taken of all
fingers and thumbs.
15
16
17
flow out the other with a rise or wave in the center. The ridges of radial arches slope towards
the thumb, have one delta and no re-curving ridges. On ulnar arches, the ridges slope towards
the little finger, have one delta and no re-curving ridges. Tented arches have an angle, an up
thrust, or two of the three basic characteristics of the loop. They dont have the same "easy"
flow that plain arches do and particularly have significant up thrusts in the ridges near the
middle that arrange themselves on both sides of a spine or axis towards which the adjoining
ridges converge and appear to form tents.
Plain
Arch
Tented
Arch
Loops occur in about 60-70 % of fingerprint patterns encountered. One or more of the
ridges enters on either side of the impression, re-curves, touches or crosses the line running
from the delta to the core and terminates on or in the direction of the side where the ridge or
ridges entered. Each loop pattern has is one delta and one core and has a ridge count. Radial
loops are named after the radius, a bone in the forearm that joins the hand on the same side as
the thumb. The flow of the pattern in radial loops runs in the direction of the radius (toward
the thumb). Radial loops are not very common and most of the time radial loops will be
found on the index fingers. Ulnar loops are named after the ulna, a bone in the forearm. The
ulna is on the same side as the little finger and the flow of the pattern in a ulnar loop runs in
the direction of the ulna (toward the little finger).
Radial Loop
17
Ulnar Loop
18
Whorls are seen in about 25-35 % of fingerprint patterns encountered. In a whorl, some of
the ridges make a turn through at least one circuit. Any fingerprint pattern which contains 2
or more deltas will be a whorl pattern. There are four types of whorl patterns. Plain whorls
consist of one or more ridges which make or tend to make a complete circuit with two deltas,
between which an imaginary line is drawn and at least one re-curving ridge within the inner
pattern area is cut or touched. Central pocket loop whorls consist of at least one re-curving
ridge or an obstruction at right angles to the line of flow, with two deltas, between which
when an imaginary line is drawn, no re-curving ridge within the pattern area is cut or
touched. Central pocket loop whorl ridges make one complete circuit which may be spiral,
oval, circular or any variant of a circle. Double loop whorls consist of two separate and
distinct loop formations with two separate and distinct shoulders for each core, two deltas and
one or more ridges which make, a complete circuit. Between the two at least one re-curving
ridge within the inner pattern area is cut or touched when an imaginary line is drawn.
Accidental whorls consist of two different types of patterns with the exception of the plain
arch; have two or more deltas or a pattern which possess some of the requirements for two or
more different types or a pattern which conforms to none of the definitions.
Plain Whorl
18
Accidental Whorl
19
19
20
In 1996 after nearly a year of study, the National Institute of Standards and Technology has
been convinced that minutia is an acceptable way to store fingerprint biometric data on smart
cards. With the NIST acceptance of minutia it became inevitable this would set an industry
standard.
3.3.2 Minutia-Based Algorithm
Minutia-based algorithms extract information such as ridge ending, bifurcation, and short
ridge from a fingerprint image.
Short Ridge
Ridge Ending
Bifurcation
These features are then stored as mathematical templates. The identification or verification
process compares the template of the live image with a database of enrolled templates
(identification), or with a single enrolled template (authentication).
20
21
People with no or few minutia points (special skin conditions) cannot enroll or use the system
effectively. This is exemplified by the fingerprint immigration programs where finger
moistening peripherals are standard. Moreover, a low number of minutia points can be a
limiting factor for security of the algorithm. This can lead to false minutia points (areas of
obfuscation that appear due to low-quality enrollment, imaging, or fingerprint ridge detail). In
an application environment, enrollment without assistance may take several attempts due to
poor position or lack of pressure. While not quantified, user frustration will certainly have a
negative impact on technology acceptance.
3.3.3 Spectrum Analysis
Utilizing research from Nagoya Institute of Technology Graduate School in Japan, DDS has
developed an algorithm based on Spectrum Analysis. This technique captures cross sections
of a sliced fingerprint pattern and converts them to waves. Spectrum analysis uses the
spectral series of the waves as feature information, finding the maximum correlations in the
wave and verifies the identity of the fingerprint.
This algorithm of spectrum analysis works extremely well because this algorithm extracts
characteristics from the concavo-convex information of a fingerprint without being
influenced by the position of the characteristic points used in the conventional Minutia and
Pattern-matching method.
In the course of verification under the spectrum analysis algorithm, it is not necessary to store
the fingerprint image itself in the system which eliminates the possibility of exposure or
leakage of fingerprint images. In principle, it is impossible to regenerate original fingerprint
image from the extracted characteristics of images. This addresses issues raised by the IEEE
on fingerprint reconstruction of minutiae based systems.
21
22
The algorithm performs extremely well in controlled environments where positioning of the
finger in enrollment and verification are similar. However, with disparate fingerprint
positioning for enrollment and verifications results can be less than desired. This requirement
limits the application developer to more controlled ergonomic environments and may reduce
some commercial viability.
3.3.4 The Hybrid technology:
To accentuate the strengths of both the Spectrum Analysis and Minutiae-based algorithm and
limited the inherent weaknesses, the company has combined both algorithms and created a
Hybrid algorithm. The combined technology provides for rapid and accurate enrollment and
verification in difficult environments.
This Hybrid algorithm extends beyond combining scores from both techniques to form a
single decision; instead the technology utilizes a proprietary technique of Shading.
Shading analyzes the scores of both results and places and associates an importance value
with each. Using an algorithm based upon a database of past results, a final score is
calculated by using the individual results as a function of importance. With shading, if one
score is high and one is low, more decision weighting is placed upon the higher score. If both
scores are low then information from both are weighed more equally and the results are
combined together for a final decision. This ability allows for both algorithms to have low
scores and still be accurate.
22
23
The technology addresses both the strengths of both as well as the challenges. Spectrum
analysis can work well with poor image quality and difficult to read fingerprints and
minutiae-based algorithms can work very well with angles.
Hybrid
Example
23
Enrollment
24
FINGERPRINT RECOGNITION
24
25
25
26
Following figures shows A. original finger print image and B. enhanced image.
4.1.3 Binarization
In the pre-processing stage, the image is converted from grayscale to black and white. This is
done by calculating the average background intensity and subtracting this value from the
grayscale image.
Next grey scale threshold (basic global and adaptive thresholding) is calculated so pixels
above this value become black, and the ones below become white.
26
27
4.1.4 Thinning
Next the ridges must be thinned to a width of one-pixel. In this step two consecutive fast
parallel thinning algorithms are applied, in order to reduce to a single pixel the width of the
ridges in the binary image.
These operations are necessary to simplify the subsequent structural analysis of the image for
the extraction of the fingerprint minutiae. The thinning must be performed without modifying
the original ridge structure of the image.
During this process, the algorithms cannot miscalculate beginnings, endings and or
bifurcation of the ridges, neither ridge can be broken.
27
28
4.2 SEGMENTATION:
In computer vision, segmentation refers to the process of partitioning a digital image into
multiple segments (sets of pixels, also known as super pixels). The goal of segmentation is to
simplify and/or change the representation of an image into something that is more meaningful
and easier to analyze.
Image segmentation is typically used to locate objects and boundaries (lines, curves, etc.) in
images. More precisely, image segmentation is the process of assigning a label to every pixel
in an image such that pixels with the same label share certain visual characteristics.
The result of image segmentation is a set of segments that collectively cover the entire image,
or a set of contours extracted from the image. Each of the pixels in a region is similar with
respect to some characteristic or computed property, such as color, intensity, or texture.
Adjacent regions are significantly different with respect to the same characteristic(s).
In this particular method, we first reading the particular image, and figure is shown by
appropriate command of mat lab. Then we moves for convolution.
28
29
C = conv2 (A, B)
In our finger print reorganization convolution is takes place between main image and ones
matrix (in this all rows and columns all denoted by 1) image. The resultant image is shown by
using figure.
In below shown figure, first image is original image and second image is segmented image.
In second image is portioned as black and white, i.e. the image is represented in white color.
29
30
In this algorithm we used very easy methods for better understanding; we commonly use
mean and standard deviation, which is familiar and implementing easily.
In firstly images and portioning into eight groups by adding noise, and forming as individual
images. Now the image reading is done, and it is converted into gray to binary. Gray is a
color of combination of black to white which has 0 to 255 pixels.
Binarization is a process of converting only in two colors; they are black and white, 1 for
white and 0 for black.
30
31
Applying the mean (average) and standard deviation of each image by different ways i.e. by
normal, increasing size, decreasing size, horizontal rotation, vertical rotation and rotation in
particular angle. Mean values are shown in table below
Image
Normal
Zoom
Horizontal
Vertical
Rotation
0.9207
0.9207
0.9207
0.9207
0.9207
0.9576
0.9576
0.9576
0.9576
0.9576
0.9997
0.9997
0.9997
0.9997
0.9997
0.8733
0.8733
0.8733
0.8733
0.8733
0.9700
0.9700
0.9700
0.9700
0.9700
0.9515
0.9515
0.9515
0.9515
0.9515
0.9245
0.9245
0.9245
0.9245
0.9245
0.9950
0.9950
0.9950
0.9950
0.9950
32
Image
Normal
Zoom
Horizontal
Vertical
Rotation
0.1722
0.1722
0.1722
0.1722
0.1722
0.1665
0.1665
0.1665
0.1665
0.1665
0.2241
0.2241
0.2241
0.2241
0.2241
0.0132
0.0132
0.0132
0.0132
0.0132
0.1348
0.1348
0.1348
0.1348
0.1348
0.0794
0.0794
0.0794
0.0794
0.0794
0.0099
0.0099
0.0099
0.0099
0.0099
0.0066
0.0066
0.0066
0.0066
0.0066
For matching taking the average of every group values and checking each value in it.
This method is not sufficient for feature extraction of matching fingerprint; binary image
contains only 50% of white and 50% of black. The mean of that is may be 50 it and STD is
relatively very small, if some images having poor binarization so that will get insufficient
values. Due to this reason we are going to use direct image in feature extraction.
33
Image
Normal
Zoom
Horizontal
Vertical
Rotation
178.1069
178.1069
178.1069
178.1069
178.1069
177.3688
177.3688
177.3688
177.3688
177.3688
177.4977
177.4977
177.4977
177.4977
177.4977
198.3028
198.3028
198.3028
198.3028
198.3028
187.2216
187.2216
187.2216
187.2216
187.2216
197.4129
197.4129
197.4129
197.4129
197.4129
214.1794
214.1794
214.1794
214.1794
214.1794
226.2012
226.2012
226.2012
226.2012
226.2012
33
Image
Normal
Zoom
Horizontal
Vertical
Rotation
33.1452
33.1452
33.1452
33.1452
33.1452
33.1313
33.1313
33.1313
33.1313
33.1313
33.8583
33.8583
33.8583
33.8583
33.8583
30.5665
30.5665
30.5665
30.5665
30.5665
24.4904
24.4904
24.4904
24.4904
24.4904
26.5039
26.5039
26.5039
26.5039
26.5039
19.5420
19.5420
19.5420
19.5420
19.5420
21.6679
21.6679
21.6679
21.6679
21.6679
34
After finding the values of each group result, matching is performed by comparing those
values to individual images.
As compared to above method it gives the better result.
4.3.2.1 Level 1
In this type of windowing sequences calculating only mean and STD is directly. Finding the
mean and variance is gives the value of that particular part of the image. So using it is not
effective of finding feature.
In this method, we compute the mean and variance for particular window size.
4.3.2.2 Level 2
In this type of widowing sequence along with the mean and STD, again calculating mean of
mean, mean of STD ,STD of mean , STD of STD. it is a level two process.
In this section we are using level 2 for better results. While performing mean of mean stands
for mean of the total image which is portioned into some small images, and to obtain a single
value. STD a measure of the variation between individuals on a variables, the variance is
used as a measure of how far a set of numbers are spread out from each other. It is one of
several descriptors of a probability distribution, describing how far the numbers lie from the
mean (expected value). In particular, the variance is one of the moments of a distribution. In
that context, it forms part of a systematic approach to distinguishing between probability
distributions. While other such approaches have been developed, those based on moments are
advantageous in terms of mathematical and computational simplicity.
34
35
For level 1:
In this method mean &standard deviation of a fingerprint image are calculated for every
individual image of the group and then average the mean &standard deviation of each person
to form a one value for every group representation. Arrange them in matrix form. The matrix
is as follows.
35
36
Person
average of mean
101
142.5927
60.3239
102
135.6616
70.4338
103
140.8924
66.7694
104
150.3288
63.0280
105
179.7887
34.4733
106
134.5820
62.1796
107
112.7660
65.2008
108
155.1999
70.8154
For level2:
In this method finger print image is divided into 5*5 windows or 3*3 windows or 7*7
windows. Find the mean and standard deviation of the window. The values of mean is stored
in new image the values of standard deviation is stored in another new image. Find the mean
&standard deviation of mean image. Find the mean &standard deviation of standard
deviation image. So, we get 4 values.
The 4 values are mean of mean, mean of standard deviation, standard deviation of mean,
standard deviation of standard deviation. The values are arranged into the form of matrix.
36
37
Value1
Value2
Value3
Value4
101
182.7476
8.5417
33.5428
4.7375
102
180.2235
8.6952
30.6629
5.1416
103
194.8966
7.8224
29.5237
4.7500
104
205.6726
8.2255
27.1873
4.7734
105
213.1428
6.5175
26.2242
4.5586
106
213.1428
6.5175
26.2242
4.5586
107
217.3441
5.4815
24.1845
3.8095
108
185.9957
6.6812
32.1824
4.3552
Value1
Value2
Value3
Value4
101
181.0733
12.7290
34.9037
6.2025
102
178.6504
12.5450
32.3001
6.5500
103
193.2517
11.5380
31.9981
6.2999
104
204.0442
12.0221
30.3596
6.1085
105
181.2084
10.3635
36.5220
5.5687
106
211.4820
9.2420
30.4348
6.0274
107
215.6881
7.9292
29.1469
5.0887
108
184.3521
9.5137
34.5525
5.8304
38
Person
Value1
Value2
Value3
Value4
101
179.4063
33.5428
8.5417
4.7375
102
180.2235
30.6629
8.6952
5.1416
103
194.8966
29.5237
8.224
4.7500
104
205.6726
27.1873
8.2255
4.7734
105
182.9563
34.6545
7.1993
4.3590
106
213.1428
26.2242
6.5175
4.5586
107
217.3441
24.1845
5.4815
3.8095
108
185.9957
32.1824
6.6812
4.3552
The above matrices are loaded into the mat lab for processing these matrices are saved in
individual way. And for matching process those values are loaded into mat lab and compared
with any finger print image .in this process we find the minimum distance to that entire
matrix and image values. In this process, if the value of image is near to any row we conclude
that it is from that group.
Here we are using different window sizes for every window size the probability of matching
is different. It is shown in below table.
Window sizes
Probability of
Probability of
matching correct
60%
matching wrong
40%
70%
30%
80%
20%
From the above table, window 7*7 is obtaining correct is greater than 3*3 and 5*5
38
39
5. CLASSIFICATION OF SCATTERING
5. CLASSIFICATION OF SCATTERING
39
40
CLUSTERING TECHNIQUE:
Cluster analysis, also called segmentation analysis or taxonomy analysis, creates groups, or
clusters, of data. Clusters are formed in such a way that objects in the same cluster are very
similar and objects indifferent clusters are very distinct. Measures of similarity depend on the
application.
'Cluster analysis' is a class of statistical techniques that can be applied to data that exhibit
natural groupings. Cluster analysis sorts through the raw data and groups them into
clusters. A cluster is a group of relatively homogeneous cases or observations. Objects in a
cluster are similar to each other. They are also dissimilar to objects outside the cluster,
particularly objects in other clusters.
The diagram below illustrates the results of a survey that studied drinkers perceptions of
spirits (alcohol). Each point represents the results from one respondent. The research
indicates there are four clusters in this market.
41
Firstly image is read by using its appropriate command and it is converted into binary image.
1. Formulate the problem - select the variables to which you wish to apply the clustering
technique
2. Select a distance measure- various ways of computing distance:
o
Squared Euclidean distance - the square root of the sum of the squared
differences in value for each variable
Manhattan distance - the sum of the absolute differences in value for any
variable
41
split the data randomly into two halves and analyze each part separately
42
In our method we are finding distance from selected image to cluster by using distance
transform of binary image.
Syntax,
D = bwdist (BW)
[D, L] = bwdist (BW)
[D, L] = bwdist (BW, method)
Methods include is as shown below.
1. Chessboard: In 2-D, the chessboard distance between (x1, y1) and (x2,y2) is
Ch=max ([x1-x2], [y1-y2])
2. 'City block: In 2-D, the city block distance between (x1, y1) and (x2, y2) is
Ct=[x1-x2] + [y1-y2]
3.Euclidean': In 2-D, the Euclidean distance between (x1, y1) and (x2, y2) is
Ec=sqrt ((x1-x2) ^2+ (y1-y2) ^2)
This is the default method.
43
43
44
44
45
7. REFFERENCES
45
46
7. REFFERENCES
1. Jain, L.C. et al. (Eds.). 1999. Intelligent Biometric Techniques in Fingerprint and
Face Recognition. Boca Raton, FL: CRC Press.
2. Lunenburg, Glenn (January 24, 2005). "Are one's fingerprints similar to those of his
or her parents in any discernable way?". Scientific American. Retrieved 28 August
2010.
3. Thornton, John (May 9, 2000). "Latent Fingerprints, Setting Standards In The
Comparison and Identification". 84th Annual Training Conference of the California
State Division of IAI.. Retrieved 30 August 2010.
4. Diaz, Raul (2007). "Biometrics: Security Vs Convenience". Security World
Magazine.. Retrieved 30 August 2010.
5. Meghdadi, Majid; Jalilzadeh, Saeed (29 October 2005). "Validity and Acceptability of
Results in Fingerprint Scanners". Proceedings of the 7th WSEAS International
Conference on Mathematical Methods and Computational Techniques In Electrical
Engineering. World Scientific and Engineering Academy and Society.. Retrieved 4
November 2010.
6. Setlak, Dale. "Advances in Biometric Fingerprint Technology are Driving Rapid
Adoption in Consumer Marketplace". Authentic. Retrieved 4 November 2010.
7. Mazumdar, Subhra; Dhulipala, Venkata (2008). "Biometric Security Using Finger
Print Recognition"(PDF). University of California, San Diego. p. 3.. Retrieved 30
August 2010.
8. Minutia vs. Pattern Based Fingerprint Templates. (2003). Retrieved December 13,
2005, from (archived from www.ibia.org on 2007-09-29)
46
47
47