Professional Documents
Culture Documents
Dr. M.G.R. University, Chennai, Tamil Nadu, India. Dec. 20-22, 2007. pp.638-641.
Keywords: Fingerprint Authentication, Wavelet Scalar up to 0.6 MB). The most commonly used algorithm used here
Quantization (WSQ), Lifting algorithms, Huffman Encoding, is Wavelet Scalar Quantization (WSQ) [2] technique
EZW (Embedded Zero Tree Wavelet) Coding. developed by FBI, standardized by NIST - which involves a
DWT step, scalar quantization and finally compression. The
Abstract Figure 1 schematically describes how WSQ uses wavelet
transforms for image compression.
A biometric is any measurable, distinct personal trait, which
can be used to verify the identities of different individuals.
This paper describes a reliable and widely used biometric
system-fingerprint authentication as an application of
Wavelet Transforms.
1 Introduction
Wavelets are mathematical functions that split data into
different frequency components, and then analyze each
component with a resolution matched to its scale. They have
advantages over traditional Fourier [1] methods in analyzing
physical situations wherein the signal contains Figure 1: WSQ for image compression
discontinuities. Discrete Wavelet Transforms (DWT) plays
After DWT, it is simply required to round the coefficients off
an important role in fingerprint analysis.
to zero, then the only information needed is the low-
resolution image plus a few detail coefficients that did not get
2 Discrete Wavelet Transforms rounded off to zero. The process of rounding high-precision
numbers into lower precision numbers with fewer digits is
Discrete Wavelet transforms are a result of dilations and
called quantization (the “Q” in “WSQ”). The process of
scaling of a ‘mother function’, giving rise to a family of
transforming and quantizing can be repeated as many times
wavelets. Scaling results in a series of wavelet coefficients,
as desired, each time decreasing the bits of information by a
satisfying certain constraints. Wavelet transforms have an
factor of almost 2 and slightly degrading the quality of the
infinite set of possible basis functions. Thus, wavelet analysis
image. Depending on the needs of the user, the process can
provides an immediate access to information that can be
be stopped before the lower resolution starts to become
obscured by other frequency domain methods such as Fourier
apparent.
analysis, which utilizes only sine and cosine functions.
Discrete Wavelet Transforms (DWT) plays an important role However, the DWT output is then truncated by the scalar
in fingerprint analysis and image storage. quantization step; this is the lossy part of the process.
Inadequate recovery of DWT coefficients will degrade image
3 Image Compression Algorithms resolution and detail.
The use of image compression methodologies can be The image on the left of Figure 2 is original; the one on the
extended to efficient, compact storage of fingerprints [1] in right is reconstructed from a 26:1 compression in WSQ [3].
large databases, as they occupy a lot of space (one print takes
638
Information Secure Finger Print Analysis using Wavelets
B. Split
Figure 2: Finger Print image used in WSQ Technique
The samples of digital signal are broken into two sets of even
4 Modifications of Existing Scheme (a) and odd (b) samples
In the first step, Lifting scheme [4,8] or Lifting algorithms The process allows the DWT to output as smooth and coarse
are incorporated. This will execute a lossless DWT of the signals, forming consecutive DWT coefficients. It is a
signal. A sequence of lifting steps consists of alternating continuation of the former step, and checks the overall
‘lifts’, i.e. once the low pass and high pass is changed and in average of the signal.
the next step the high pass is fixed and the low pass is
changed. Figures 3 and 4 shows a schematic representation of Control system analysis at adder and subtractor give rise to
the lifting scheme, which yields all DWT outputs. following mathematical equations
b j −1 = b j −1 − P ( a j −1 ) (1)
a j −1 = a j −1 + U ( b j −1 ) (2)
An inverse lifting [5,10] step will allow perfect
reconstruction of signal (decoding). This is a relatively new
concept, and has not been used in image compression, but the
process prevents information loss.
5 Quantization
To reduce quantization errors of WSQ, Adaptive Step-size
Variation methods are used to automatically vary the step-
Figure 4: DWT Cascaded network size while truncating the different sub bands of the DWT
output (analogous to Adaptive Delta Modulation in
639
IET-UK International Conference on Information and Communication Technology in Electrical Sciences
640
Information Secure Finger Print Analysis using Wavelets
decompressed images will retain their standards despite Image Image Processing XIX, (1996).
storage in database. [2] J. N. Bradley, C. M. Brislawn, and Tom Hopper. “The FBI
Wavelet/Scalar Quantization Standard for greyscale fingerprint
image compression”, SPIE, Orlando,FL, Visual Info Processing 2,
8 Conclusion volume 1961, pp 293-304, (April 1993)
[3] J. N. Bradley and C. M. Brislawn. “Proposed First -Generation
Wavelets find application, which include human vision, WSQ Bit Allocation Procedure”. In anonymous internet ftp site,
seismic geology, (earthquake detection) and radar. As ftp.c3.1anl.gov in /pub/WSQ/documents/bit.alloc.ps file,(1993).
mentioned, wavelet transform based algorithms reduce [4] C. K. Chui. “An Introduction to Wavelets”, Academic Press
computation period, paving way for faster computer based Inc., (1992).
evaluation. Microprocessors that make use of the lifting [5] Federal Bureau of Investigation, “WSQ gray-scale fingerprint
algorithms will optimize the performance of database image compression specification”, document IAFIS-IC-0110v2,
management systems. Further research of Wavelet February (1993)
[6] R. C. Gonzalez and R. E. Woods. “Digital Image
Transforms is required to expand the range of its
Processing”.Addison Wesley, (1992).
applications, as the mathematical concepts are well known. [7] A. Jensen and A.La Cour-Harbo , “Ripples in Mathematics:
The Discrete Wavelet Transform”, Springer-Verlag, (2001).
Acknowledgements [8] W., Sweldens , “The Lifting Scheme:A Construction of
Second-generation wavelets”, SIAM Journal on Mathematical
The authors would like to thank S. Ravi and B. Rajan for Analysis, vol. 29(2), pp 511-546(1997)
numerous discussions and critical remarks on the manuscript. [9] J.M Shapiro., “Embedded image coding using zerotrees of
wavelet coefficients”, IEEE Transactions on Signal processing, Vol.
41, No. 12, pp. 3445-3462, (December 1993)
References [10] K.P.Soman and K.I.Ramachandran, “Insight into Wavelets –
From Theory to Practice”, Prentice-Hall Of India, (2004).
[1] C.M. Brislawn, J.N Bradley, R.J.Onyshzak, and T.Hopper.
[11] K..Sayood, “Introduction to Data compression, second
“The FBI compression standard for digitized fingerprint images”,
edition,Academic Press, (2000).
Proceedings of the SPIE conference 2847, applications of Digital
641