Sunteți pe pagina 1din 9

Informatica Economică vol. 15, no.

4/2011 13

Distorted Fingerprint Verification System

Divya KARTHIKAESHWARAN1, Jeyalatha SIVARAMAKRISHNAN2


1
Department of Computer Science, Amrita University, Bangalore, India
2
Department of Computer Science, BITS, Pilani, Dubai, UAE
kdivya_s@yahoo.co.in, jeylatha@yahoo.com

Fingerprint verification is one of the most reliable personal identification methods.


Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression
during the image acquisition process. This non-linear deformation changes both the position
and orientation of minutiae. The proposed system operates in three stages: alignment based
fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input
fingerprint image has been aligned with the template fingerprint image and matching score is
computed. To improve the performance of the system, a fuzzy clustering based on distance
and density has been used to cluster the feature set obtained from the fingerprint matcher.
Finally a classifier framework has been developed and found that cost sensitive classifier
produces better results. The system has been evaluated on fingerprint database and the
experimental result shows that system produces a verification rate of 96%. This system plays
an important role in forensic and civilian applications.
Keywords: Biometric, Fingerprints, Distortion, Fuzzy Clustering, Cost Sensitive Classifier

captured with different contact centers


1 Introduction
Fingerprints have been used for over a
century and are the most widely used form of
usually results in different warping mode.
Second, distortion will be introduced in the
biometric identification. The fingerprint of an fingerprint image by non-orthogonal pressure
individual is unique and remains unchanged exerted by the people on the sensor.
over a lifetime. A fingerprint is formed from There are different attempts to deal with the
an impression of the pattern of ridges on a nonlinear distortions in fingerprint images.
finger. Usually, fingerprint verification is Some methods measured the forces and
performed manually by professional torques on the scanner directly with the aid
fingerprint experts. However, manual of specialized hardware [4]. If excessive
fingerprint verification is so tedious and does force is applied or the estimated distortion is
not meet the performance requirements of the too large, the captured fingerprint image will
new applications. be deleted. However, this method does not
As a result, an automatic fingerprint work with the collected images.
identification system is in great demand. An alignment-based matching algorithm was
Fingerprint verification is usually associated used, which aligns the associated ridges of
with criminal identification, police work and template and input fingerprint image and an
it is now become more popular in civilian adaptive elastic matching algorithm was
applications such as access control, financial proposed to match the aligned minutiae [5].
security, and verification of firearm However, this approach results in a large
purchasers and driver license applicants. template size because the associated ridges
The main difficulty in matching two for each minutia must be saved. If only short
fingerprint impressions of the same finger is ridges are saved, the algorithm may results in
to deal with the nonlinear distortions, which an inaccurate alignment, or much worse, a
is caused during acquisition process. There false alignment. In order to overcome this
are two main reasons contributed to the problem another technique was introduced
fingerprint distortion. First, the acquisition of [3], where adaptive bounding box was used
a fingerprint is a three-dimensional/two- in the matching process. This method is more
dimensional warping process. The fingerprint robust to nonlinear distortion.
14 Informatica Economică vol. 15, no. 4/2011

A minutiae-based fingerprint matching considerable, the process of matching is


algorithm uses distance normalization and slower since a set of Gabor filter is involved.
local alignment to deal with the nonlinear A minutiae matching method that describes
distortion [6]. Here the ridge structures are elastic distortion by means of a thin plate
thinned which helps in extracting minutiae. spline model [13] is developed and this
However, in order to tolerate the position model normalizes the shape of the test
change of the corresponding minutiae, the fingerprint with respect to the template. One
size of the bounding boxes has to be of the fingerprints deformed and registered
increased. As a side effect, this may lead to a according to the estimated model and then
higher false acceptance rate by wrongly matching minutiae are found. The drawback
pairing the non-matching minutiae. of this algorithm is that it detects only small
A fuzzy feature match based on a local elastic deformations.
triangle feature set is used in [7] to match the Global features [14] shape a special pattern
deformed fingerprint. In this approach, the of ridges and valleys called Singular points.
fingerprint is represented by the fuzzy feature This algorithm makes uses of short Fourier
set of local triangles. The similarity between transform analysis followed by calculating
the feature sets is characterized by the degree the orientation field reliability and locates the
to which the template and input fingerprints singular points.
are similar. In this paper an alignment based fingerprint
A normalized fuzzy similarity measure [1] is matcher is presented. The fingerprint image
used to compute the similarity between the is enhanced to improve the quality of the
template and an input fingerprint image. In image which facilitates better minutiae
this method, a local topological structure is extraction. The fingerprint images are
defined from which fuzzy feature vector is aligned and matching score is computed.
computed. A Cauchy function is used has a From the fingerprint matcher two features are
membership function to find the similarity taken. A fuzzy clustering based on distance
between two fingerprint images. and density is used to cluster these features
In automated fingerprint identification, a into genuine and imposter cluster. Finally, a
clustering algorithm [8] is used to detect classifier framework is developed using
similar minutiae group from multiple bagging, boosting and cost sensitive
template images generated from the same classifier and their performance is evaluated.
finger and create the cluster core set. The In the following sections, details of distorted
minutiae of test fingerprint are compared fingerprint verification system are provided.
with cluster core set and decision is made Section 2 gives a brief overview of the
whether it is from same finger or not. system design. Section 3 discusses about
Another algorithm developed first estimated alignment based fingerprint matcher. Section
the local ridge frequency in the entire 4 discusses about fuzzy clustering. Section 5
fingerprint and then converted a distorted presents the classifier framework. Section 6
fingerprint image into an equally ridge provides the experimental results and Section
spaced fingerprint [9]. The stricter matching 7 contains the conclusion and future work.
condition slightly decreases the algorithm
performance, this method only solves a part 2 Overview of the System
of the deformations. The distorted fingerprint verification system
In the filter-based algorithm, a bank of Gabor as shown in fig 1 operates in five stages
filters is used to capture both the local and namely, fingerprint enhancement, minutiae
global details of the fingerprints in a compact extraction, fingerprint matcher, fuzzy
fixed length finger code [12]. The fingerprint clustering and classifier framework.
matching is based on the Euclidean distance In the fingerprint enhancement block, quality
between the two corresponding Finger of an input grayscale fingerprint image is
Codes. Although verification rate is improved thereby facilitating better
Informatica Economică vol. 15, no. 4/2011 15

extraction of reliable minutiae. A fast All minutiae may not be genuine and
fingerprint enhancement algorithm [10] is significant amount of spurious minutiae are
used which can adaptively improve the detected during extraction process. Therefore
clarity of ridge and valley structures of the a methodology is used to remove all the
input fingerprint image based on the spurious minutiae detected in the minutiae
estimated local ridge orientation and extraction process. A minutia is considered to
frequency. be spurious if it lies in the fingerprint border
The enhanced binary image is thinned and or forms small clusters in the middle area of
minutiae are extracted. The ridge ending and the fingerprint image.
ridge bifurcation are the minutiae considered.

Fig. 1. System Architecture of Distorted fingerprint Verification System

In the fingerprint matcher block, an input 3 Alignment Based Fingerprint Matcher


fingerprint image is aligned with respect to Alignment based fingerprint matcher [3]
the template fingerprint image and both the operates in two stages namely, alignment
minutiae set are converted to the polar stage and matching stage.
coordinate system. The two fingerprint
images are matched using adaptive bounding 3.1 Alignment Stage
box technique and match score is found. In the alignment stage [3] transformation
An adaptive bounding box is more robust in such as translation, rotation and scaling
matching distorted fingerprint images. Due to between an input and a template fingerprint
the presence of distortion, there is lot of image are estimated and input minutiae are
vagueness in such fingerprint images. aligned with the template minutiae
Fuzzy clustering based on distance and accordingly to the estimated parameters.
density is used to group the fingerprint data Each minutia in a fingerprint is associated
set into two clusters namely, genuine cluster with a ridge. It is clear that alignment can be
and imposter cluster. For the process of achieved by aligning corresponding ridges.
clustering two features are considered. For each detected minutiae, the following
In the classifier framework block, a parameters are recorded:
comparative study of different machine • x and y coordinates of the minutiae point.
learning models is made and the most • Orientation which is defined as the local
appropriate algorithm for the fingerprint ridge orientation of the associated ridge.
dataset is selected. • The type of the minutiae point whether it
16 Informatica Economică vol. 15, no. 4/2011

is ridge ending or ridge bifurcation. easier to formulate rotation, which


• Associated ridge. constitutes the main part of the alignment
The associated ridge is sampled at regular error between an input image and a template,
intervals and entire ridge is not taken for the in the polar space rather than in the Cartesian
process of alignment. This speeds the process space.
of alignment and reduces the unnecessary
computation of distance and angle of 3.2 Matching Stage
minutiae. If two identical ridge patterns are exactly
Based on the distance and angle, the aligned with each other, each pair of
similarity of ridges is computed and the corresponding minutiae is completely
respective minutia on corresponding ridge is coincident. In such a case, a point pattern
considered to be the reference points of matching can be simply achieved by
template and input fingerprint image. The counting the number of overlapping pairs.
angle to which the input image has to be However, in practice, such a situation is not
rotated with the template image is estimated. encountered. On the other hand, the error in
To align the input minutiae set with the determining and localizing minutia hinders
template minutiae set in the polar coordinate, the alignment algorithm to recover the
all that needs to be done is to translate the relative pose transformation exactly.
input minutiae and the template minutiae to Therefore, the aligned point pattern matching
polar coordinate with respect to the reference algorithm needs to be elastic which means
minutiae and then add the angle rotate to the that it should be capable of tolerating, to
radial angle of the polar coordinate of every some extent, the deformations due to inexact
input minutia. The minutiae set are converted extraction of minutia positions and nonlinear
into polar coordinates using the formula: deformations. Usually, such an elastic
matching can be achieved by placing a
r = ((xi - xr)2+(yi - yr)2)1/2 bounding box around each template minutia,
e = tan-1((yi - yr)/(xi-xr))+rotate (1) which specifies all the possible positions of
θ = θi-θr the corresponding input minutia with respect
to the template minutia, and restricting the
where (xr, yr, θr) represents the coordinates corresponding minutia in the input image to
of reference minutiae, (r, e, θ) represents be within this box. The steps of minutiae
the minutiae in polar coordinate system and matching algorithm is as follows:
rotate represents the angle to which input 1. Select a reference minutia point both in
image as to rotated. Rotate can be computed the template and input fingerprint image.
using this formula: 2. Convert each minutia point in the
template minutia set and the input
Rotate = dir_temp – dir_in (2) minutia set to the polar coordinate system
as given in equation 1.
where, dir_temp is the orientation of template 3. Represent the template and input
minutiae and dir_in is the orientation of input minutiae in the polar coordinate system
minutiae. as symbolic strings by concatenating each
Minutia matching in the polar coordinate has minutia in the increasing order of radial
several advantages. It has been observed that angle.
the nonlinear deformation of fingerprints has 4. Match the resulting strings using adaptive
a radial property. In other words, the bounding box technique and compute the
nonlinear deformation in a fingerprint matching score.
impression usually starts from a certain point 5. If the matching score is higher than a
(region) and nonlinearly radiates outward. threshold value, then the input image is
Therefore, it is beneficial to model it in the considered to come from the same finger
polar space. At the same time, it is much as the template image.
Informatica Economică vol. 15, no. 4/2011 17

The purpose for using an adaptive bounding 12 78


box [3] is to deal with nonlinear deformation 7 89
more robustly. When the radius of the
minutia is small, a small deformation will 10 74
mean a large change of the radial angle while
the change of radius remains small. The fingerprint feature set is normalized in
On the other hand, when the radius of the the range of [0, 1]. The dataset is clustered
minutia is large, a small change in radial into two classes namely, genuine cluster and
angle will cause a large change in the imposter cluster.
position of the minutia. While the radius can Genuine cluster represents the data of
have larger deformation as it is the matched fingerprint images from same
accumulation of deformation from all the finger. Imposter cluster represents the
regions between this minutia and the fingerprint images from different fingers. In
reference minutia. this technique two parameters have to be
specified namely, density radius and select
4 Fuzzy Clustering Based on Distance and density. The rationale here is that the two
Density data points whose distance is less than
Cluster analysis has been a fundamental density radius and density difference is less
research area in pattern recognition. than a threshold, is in the same cluster.
Clustering helps to find natural boundaries in To compute the distance between the data
the data. Since the fingerprint is distorted point’s xi and xj which has two attributes
there is lot of vagueness involved during each is given in formula below,
matching.
To overcome this problem fuzzy clustering Dij= ((xi1-xj1)2+ (xi2–xj2)2)1/2 (3)
[2] technique is used to find vague
boundaries of genuine and imposter cluster. The maximal distance Dmax and minimal
In fuzzy clustering, the requirement of crisp distance Dmin for the entire data set has to be
partition of the data is replaced by a weaker computed. The value of the density radius
requirement of fuzzy partition. For the chosen should be within the range of Dmin
process of fuzzy clustering, two features are and Dmax. In order to satisfy this condition,
selected. the density radius r is calculated using the
• Number of matched minutiae points formula where value of α lies within the
of the template and input fingerprint range of 0 to 1.
image
• The mean distance difference of the r = Dmin + α (Dmax - Dmin) (4)
matched minutiae pairs.
Table 1 represents the sample fingerprint Using the density radius r, density and
dataset where first three data are from image density set of each data point in the feature
of same finger and the last three data are set is calculated using the formula
obtained from different finger. If the
fingerprints are from different finger then the ρi = Num (Dij <= r) (5)
value of n will be small and d will be large.
The maximal density ρmax and minimal
Table 1. Sample Fingerprint dataset density ρmin for the data set is computed. The
No of matching Mean distance value of the select density chosen should be
minutiae (n) difference (d) within the range of ρmin and ρmax. In order to
83 8.6 satisfy this condition, the select density ρ is
calculated using the formula where value of
56 14
β lies within the range of 0 to 1.
63 10
18 Informatica Economică vol. 15, no. 4/2011

Select density = ρmin + β (ρmax - ρmin) (6) study for effective classification of
fingerprint dataset are random forest, J48,
The two data point’s xi and xj are considered NB tree, Bagging, adaboost and cost
to be in the same cluster if the following sensitive classifier.
condition is satisfied. Random forest is an ensemble decision trees
that offers good predictive performance.
ρi – ρj <= select density (7) Random forests construct a series of tree-
based learners. Each base learner receives
where ρi is the density of xi and ρj is the different training set which are drawn
density of xj. The un-chosen set represents independently with replacement from the
the data points which have never been original learning set. Each tree predicts a
selected for processing. The various steps of class which is considered as a vote and the
the clustering algorithm is as follows forest selects the class which as the most
1. The number of clusters and un-chosen votes.
set is given has input to the process. J48 tree is a reimplementation of C4.5 tree.
2. Calculate the distance between every NB Tree is a hybrid between decision trees
two data points and find Dmin and Dmax. and Naïve Bayes. It creates trees whose
3. Specify the density radius according to leaves are Naïve Bayes classifiers for the
Dmin and Dmax.. instances that reach the leaf. When
4. Calculate the density of each data point constructing the tree, cross-validation is used
and find ρmin and ρmax. to decide whether a node should be split
5. Specify the select density according to further or a Naive Bayes model should be
ρmin and ρmax. used instead.
6. Select a data point xi which has never Ensembles of classifiers are groups of
been chosen. classifiers in which the individual classifiers
7. Select any data point xj from xj‘s predictions are combined to classify new
density set and check for the same samples. Bagging and boosting is ensemble
cluster condition of classifiers used to improve the
8. Delete xi from the un-chosen set. performance of classification.
9. Select the next data point for clustering In bagging, many bootstrap samples are
from the un-chosen set using the drawn from the available data set, and some
following criteria prediction method like decision tree is
a. If intersection of un-chosen and applied to each bootstrap sample, and then
density set is not empty, select the next the prediction of individual classifiers are
data from the intersection set. combined by simple voting to obtain the
b. Otherwise, select any data from overall prediction. Here REP trees are used
un-chosen set. as base classifier. REP Tree builds a decision
tree using information gain/variance
5 Classifier Framework reduction and prunes it using reduced-error
The experience shows that no single machine pruning.
learning scheme is appropriate for all data Boosting, like bagging, is a committee-based
mining problems. In this section, different approach that can be used to improve the
learning models are compared and the most accuracy of classification. In adaboost,
appropriate algorithm is selected. The decision stump is used as base classifier. The
WEKA [11] is an open source data mining Decision Stump is a one-level binary
package which provides a collection of decision trees that can generate tree using
machine learning algorithms. During categorical or numeric class. It deals
training, all base classifiers are evaluated by effectively with missing values.
cross-validation on the fingerprint dataset. The cost-sensitive learning addresses the
The various classifiers used for comparative issue of classification in the presence of
Informatica Economică vol. 15, no. 4/2011 19

varying costs associated with different types cost-sensitive classifiers. For cost-sensitive
of misclassification. In particular, learning, one typically specifies only the
misclassification errors typically have non- costs for the false positives (C10) and false
uniform costs. These misclassification costs negatives (C01) and assigns a cost of zero to
are often determined by the class associated the true positives (C11) and true negatives
with an example, such that for two-class (C00).
problems, the cost of a false positive Conceptually, the cost of labeling an example
prediction is not equal to the cost of a false incorrectly should always be greater than the
negative prediction. cost of labeling it correctly.
Table 2 specifies the cost matrix used for

Table 2. Cost Matrix


Actual Negative Actual Positive
Predicted C00 C01
Negative
Predicted C10 C11
Positive

Table 3 illustrates the comparative results of classifiers and NB trees. The cost sensitive
various classifiers like bagging, Adaboost, classifier produces a better result with errors
J48, Random Forest, Cost sensitive minimized.

Table 3. Comparison of classifier performance


Comparative Bagging Adaboost J48 Random Cost NB
Measure Forest Sensitive tree
Percentage correct 95.06 95.06 93.87 94.03 96 91.23

Mean absolute 0.08 0.08 0.09 0.09 0.07 0.13


error
RMSE 0.17 0.19 0.19 0.19 0.17 0.21

Precision 0.93 0.93 0.93 0.93 0.94 0.90

Recall 0.89 0.88 0.86 0.87 0.90 0.85

F_measure 0.82 0.84 0.85 0.85 0.82 0.80

Training time 0.02s 0.02s 0.01s 0.02s 0.02s 0.01s

6 Results and Discussion pixels with a resolution of 512 dpi. The


The proposed system has been evaluated on fingerprint matcher is evaluated using two
the fingerprint database of fingerprint parameters namely, verification rate and
verification competition. The emphasis is on rejection rate.
distorted and dry and wet fingerprints. These
fingerprints were acquired through optical Verification rate = correct-num / (correct-
sensor. num + false-num) * 100 % (8)
For matching, 100 images captured from 20 Reject rate = reject-num /total number of
different fingers, five images form each matches * 100 % (9)
finger is used. The size of images is 640*480 where correct-num denotes no of correct
20 Informatica Economică vol. 15, no. 4/2011

matches obtained, reject-num denotes no of In order to evaluate the performance of the


genuine images rejected and false-num fuzzy clustering algorithm, the clustering
denotes no of false matches produces. Table results are compared with class labels of the
4 represents the verification rate and dataset. The fuzzy clustering increases the
rejection rate for the various input fingerprint performance of the alignment based
images. algorithm to 93% of accuracy.
The performance of a biometric system can
Table 4. Verification Rate and Reject Rate be represented as receiver operating
Verification Rate Rejection Rate characteristic (ROC) curve showing the
100% 11.1% genuine acceptance rate against false
98.3% 9.1% acceptance rate. Figure 2 illustrates the
91.7% 7.3% comparison of the performance of fingerprint
87.52% 5% matcher using alignment based algorithm and
81% 3% fuzzy clustering of fingerprint dataset.
80% 2%

Fig. 2. Performance comparison of fingerprint matcher

7 Conclusion performance of the system, a classifier


The design and implementation of the framework is developed and the cost
distorted fingerprint verification system is sensitive classifier is found to have higher
presented in this paper. The performance of accuracy.
fingerprint identification system relies Based on the experimental results, it is
critically on the image quality. Hence, good observed that the matching errors in the
quality images make the system performance proposed system mainly results from
more robust. However, it is always very incorrect minutiae extraction and inaccurate
difficult to obtain good quality images in alignment. Further improvements in the
practical use. distorted fingerprint verification system can
To overcome this problem, image be made by using more ridge information
enhancement step is performed to improve like pores and ridge width in the matching
the clarity of ridges and valleys. An process.
alignment based matching algorithm is used
to match the fingerprint images. The References
vagueness present in the distorted fingerprint [1] X. J. Chen, J. Tian, and X. Yang, “A new
images is effectively handled by the fuzzy algorithm for distorted fingerprints
clustering based on distance and density matching based on normalized fuzzy
technique. In order to improve the similarity measure,” IEEE Transaction on
Informatica Economică vol. 15, no. 4/2011 21

Image Processing Vol. 15, no. 3, pp. identification using cluster algorithm”, in
767–776, Mar. 2006. Proc. 16th ICPR, Vol. 2, pp. 398-401,
[2] X. Qiu, Y. Tang and Dan Meng, “ A new Aug. 2002
fuzzy clustering method based on [9] A. Senior and R. Bolle, “Improved
distance and density”, IEEE Conference fingerprint matching by distortion
on System, Man & Cybernetics, Oct. removal,” IEICE Trans. Information
2002,Vol 7, pp 6- 9. System, Special issue on Biometrics, Vol.
[3] X. P. Luo, J. Tian, and Y.Wu, “A minutia E84-D, no. 7, pp. 825–831, Jul. 2001.
matching algorithm in fingerprint [10] L. Hong, Y. Wan, and A. K. Jain,
verification,” in Proc. 15th ICPR, Sep. “Fingerprint image enhancement:
2000, Vol. 6, pp. 1039–1045 algorithms and performance evaluation,”
[4] N. K. Ratha and R. M. Bolle, “Effect of IEEE Transaction on Pattern Analysis
controlled acquisition on fingerprint and Machine Intelligence, Vol. 20, no. 8,
matching,” in Proc. 14th ICPR, 1998, pp. 777–789, Aug. 1998.
Vol. 2, pp. 1659–1661. [11] The WEKA package,
[5] A. K. Jain, L. Hong, and R. Bolle, “On- http://www.cs.waikato.ac.nz/ml/weka/
line fingerprint verification,” IEEE [12] A. K. Jain, S. Prabhakar, L. Hong, and
Transaction on Pattern Analysis and S. Pankanti, “Filterbank-based fingerprint
Machine Intelligence, Vol. 19, no. 4, pp. matching,” IEEE Trans. Image Process.,
302–313, Apr. 1997. vol. 9, no. 5, pp. 846–859 , May 2000.
[6] D. Lee, K. Choi, and J. Kim, “A robust [13] A. M. Bazen and S. H. Gerez,
fingerprint matching algorithm using “Fingerprint matching by thin-plate
local alignment,” in Proc. 16th ICPR, spline modeling of elastic deformations,”
Aug. 2002, Vol. 3, pp. 803–806 Pattern Recognition., vol. 36, no. 8, pp.
[7] X. Chen, J. Tian, X. Yang, and Y. Zhang, 1859–1867, 2003.
“An Algorithm for Distorted Fingerprint [14] M.S.Khalil1, D. Muhammad, M.K.
Matching Based on Local Triangle Khan and K. Alghathbar, "Singular
Feature Set,” IEEE Transaction on points detection using fingerprint
Information Forensics & security, Vol. 1, orientation field reliability", International
pp. 169-177, June 2006 Journal of Physical Sciences Vol.5, pp
[8] R. Qun, T. Jie, H. Yuliang and C. 352-357, April 2010
Jiangang, “Automatic fingerprint

Divya KARTHIKAESHWARAN holds a M.E., in Multimedia Technology


from College of Engineering, Anna University, Chennai, India. She has 2
years of experience in software industry and 1.6 years of teaching experience
in University. Her areas of interest include image processing, pattern
recognition and data mining.

Jeyalatha SIVARAMAKRISHNAN holds a M.E., in Computer Science


from Anna University, Chennai, India and a PhD student from BITS, Pilani-
India. She has 10 years of teaching experience. Presently, she is working as
Senior Lecturer, CS, BITS, Pilani-Dubai. Her areas of interest include Web
Mining, Data Mining and Database Systems. She is a member of Computer
Society of India.

S-ar putea să vă placă și