You are on page 1of 4

1

Fingerprint Recognition

T.Vinodh, II B.Tech., CSE, A.Manikanta, II B.Tech., CSE,


E-Mail: t.vinodh88@gmail.com, EMail:manimani.manju@gmail.com,
Mekapati Rajamohan Reddy Institute Mekapati Rajamohan Reddy Institute
of Technology and Science, of Technology and Science,
Udayagiri-524 226, Udayagiri-524 226,
S.P.S.R. Nellore(dist), S.P.S.R. Nellore(dist),
Andhra Pradesh. Andhra Pradesh.

1. Abstract and maintaining such a system is very


Fingerprint image analysis for cumbersome, time consuming and
automatic identification technology expensive as the number of finger print
has been developed for use in a records grows at a rate from 30 to 50
number of major applications. thousands cards per day [1]. With the
Important industries affected by this advancement of computer technology
technology include network security the problem of automatic finger print
and protection, smart money, ATM identification has attracted wide
transaction, and biometric identifier attention among researchers that
systems for many major government results in automatic fingerprint
sectors. In this paper we discuss the identification system (AFIS) available
major components of the technology today. Going in hands with the
including the live-scan fingerprint recognition problem
subsystem, the WSQ compression
algorithm, and the recognition
algorithm. is the problem of real-time matching
system for large fingerprint data bases.
2. Introduction Since the storage requirement for such
a large amount of data can be
The fingerprints have been used thousands of terabytes system, data
as a mean for identifying individual for compression is another aspect of
a long time because the fingerprints are automatic identification using
unique and stay unchanged through out fingerprints. Currently the FBI data
an individual life time. The chance of compression specification for finger is
two people—even identical twins— the “de facto national standard which
having the same fingerprint is probably is based on wavelet transform scalar
less than one in a billion. Fingerprint quantization (WSQ)”.
comparison is the most widely used
method of biometric authentication and
the most cost effective. Currently there 3. AFIS: Automatic Fingerprint
are about 200 million FBI cards (10 Identification System
fingerprints per cards) stored in
cabinets that would fill an area of one The four main components of
acre. The manual effort of identifying an AFIS system is the scanner, the
2

recognition algorithm, the search and deviation and the black noise standard
query algorithm of the data base and deviation.
the data compression algorithm.
¨ Grey-Scale Range of Image Data
3.1 The Live Scanner At least 80% of the captured images
should have a dynamic range of at least
The live scanner captures the 200 grey levels and at least 90% shall
finger print at a minimum resolution of have a dynamic range of at least 128
500 pixels per inch in both row and grey levels.
column and each pixel shall be gray
level quantized to 8 bits. Regardless of ¨ Grey Scale Linearity and Grey Level
the method and media used by the Uniformity
scanner, the electronic image must be Linearity and uniformity of the grey
sufficient quality to provide conclusive level must meet a standard to assure an
finger print comparison, successful image quality suitable for AFIS. When
finger classification and feature scanning a uniform reference of white
detection, and can support an AFIS (and black), no two adjacent rows or
search reliably. The major columns of length 5 pixels or greater
consideration for the scanner is shall have an average grey scale
whether or not it meets number test different more than a threshold value,
procedures that will warranty the pixel’s grey level must remain within a
image quality as stated in the deviation from mean value of local
Minimum Image Quality Requirement, area, the mean grey level of adjacent
Electronically Produced, Fingerprint quarter inch area shall not differ by
Cards, and Appendix F- IAFIS Image certain value.
Quality Specifications.
3.2FingerprintMatching

The pre-processing aim is to improve


3.1.1 Modulation Transfer the quality of the image. The pre-
Function(MTF) processing has two tasks:
¨ Ridge enhancement
MTF is the point response of the ¨ Restoration and segmentation of
image capturing system. For each fingerprint image
frequency the Image Modulation (IM) The pre-processing step produces a
is computed. binary segmented fingerprint ridge
image from an input grey scale image.
IM = (Max- Min)/ (Min-Max) The ridges have a value of ‘1’ and the
The MTF is then computed by dividing rest of the image has value of ‘0’. The
the Image Modulation by the Target pre-processing steps involve
Modulation. ¨ Computation of orientation field
3.1.2 Signal to Noise Ratio (SNR)
¨ foreground/background separation,
¨ ridge segmentation ,
For adequate image quality, the ¨ Directional smoothing of ridge
SNR must be less than 125 for both Analysis of the fingerprints shows that
black and white noise. the ridges exhibit different anomalies
The SNR is computed as the difference referred to as ridge ending, ridge
between the average white and the bifurcation, short ridge, ridge
average black value, alternately crossovers etc... There are some
divided by the white noise standard eighteen different types of features
3

enumerated and called minutiaes. The


most frequently used are the ridge WSQ Decoder
ending and ridge bifurcations. The encoding consists of three main
processes:
¨ The discrete wavelet transform
A typical good finger print has about (DWT) decomposition,
70 to 80 minutiae points. Other ¨ The scalar quantization, and
complex fingerprint features can be ¨ The Huffman entropy coding.
expressed as a combination of these
two features. The features are normally In the DWT step, the digital image is
recorded as a vector with three split into 64 spatial frequency sub
attributes: the x-co-ordinate, the y-co- bands by a two-dimensional discrete
ordinate, and the local ridge wavelet transform which is a multi rate
θ direction digital filter bank. The output DWT
The finger matching is the matching of coefficient which is in floating point
the minutiae sets. This can be done arithmetic format is truncated by the
with number of techniques including scalar quantization step ("quantized").
point set matching, graph matching, The integer indices output by the
and sub-graph isomorphism. quantization encoder are entropy-
encoded by run-length coding of zeros
3.3 Fingerprint classification: and Huffman coding. The compressed
image data, a table of wavelet
Given the database for the fingerprints transform specifications, tables for the
is very large, the matching should be scalar quantizes and the Huffman
done only on a subset of the database. codes are concatenated into a single bit
To this end, the fingerprints are stream of compressed data.
classified in to five main categories as In the WSQ, a two-dimensional
high-level features that can be used in symmetric wavelet transform is
reducing the search source during a applied to the input image by
match. They are: arch, tented arch, left transforming first the rows and then
loop, right loop, and whorl. The the column yielding four-channel
singular points commonly used are the decomposition. The four sub bands are
core and the delta. The core is the then cascaded back through the two-
highest point on the innermost ridge; dimensional analysis bank to produce
the delta is the point at which three more refined sixteen-bank
ridges radiated from it. decomposition. This process is
repeated until 64-band decomposition
4. The Wavelet Scalar Quantization: is achieved.
The WSQ decoder reverses the process
The US Federal Bureau of above to reproduce the finger print
Investigation (FBI) has formulated a image from compressed data. The
national standard for digitization and Huffman decoder first recovers the
compression of grey-scale fingerprint quantized DWT coefficients. Through
image. At a 15:1 compression ration, the de quantizes, approximation of the
the WSQ is a lossy compression but original floating point format of the
can produce archival-quality image. DWT coefficients obtained and the
The compression and decompression is coefficients are feed to an inverse
based on adaptive uniform scalar DWT to reconstruct the finger print
quantization of discrete wavelet image.
transform sub band decomposition.
4

predict an explosion in the number of


applications of the fingerprint
5. Applications technology to important industries
including network security and
The Conceptual Design of a protection, smart money, ATM
Fingerprint based Identifier transaction, military installations,
airports and other secure facilities.
¨ Verification of driver-license
authenticity and license validity check

Verifying the matching between driver


fingerprint and the fingerprint features
stored on the license assures that the
driver is indeed the person that the
license is issued for. This task can be
done on-site where the fingerprint
features obtained from the driver by
live scanning is compared with the
features magnetically stored on the
driver license. Current "smart card"
technology allows abundant memory
capacity to store the features on card.
A driver/ license match means that the
license indeed belongs to the driver,
this, however does no warranty that the
driver license is not falsified. To check
for validity of the driver license the
police officer has the option to make
additional inquiry against the database.
In this case license validity check will
result.

6.Conclusion

We have presented the overview of the


finger print technology which include
primarily the scanner, the classification
of fingerprint image in the database,
the matching algorithms and the
compression\decompression algorithm
standardized by the FBI. Certain
standard perhaps might be needed for
this area before major commercial
system applications can be
implemented. An application which is
a part of the fingerprint based
biometric systems for commercial
driver license has been shown. Once
the standards and compliance
procedures are in place, one can

You might also like