Fingerprint Project

14
Finger Print Recognition Progress Report 1 CHAPTER -I INTRODUCTION General Statement of the Problem In order to aid forensics in criminal identification, authentication in civilian applications and for preventing unauthorized there is a need to develop a finger print recognition and analysis system. Background Fingerprint verification is an important biometric technique for personal identification. Biometrics are automated methods of recognizing an individual based on their physiological (e.g., fingerprints, face, retina, iris) or behavioral characteristics (e.g., gait, signature). Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. Importance of problem Each biometric has its strengths and weaknesses and the choice typically depends on the application. No single biometric is expected to effectively meet the requirements of all the applications. The match between a biometric and an application is determined depending upon the characteristics of the application and the properties of the biometric. Information Fingerprints are graphical flow-like ridges present on human fingers. They are fully formed at about seven months of fetus development and finger ridge configurations do not change throughout the life of an individual except due to Created by Blue Lions

description

fingerprint recognition system...hw it works....

Transcript of Fingerprint Project

Page 1: Fingerprint Project

Finger Print Recognition Progress Report 1

CHAPTER -I INTRODUCTION

General Statement of the Problem

In order to aid forensics in criminal identification, authentication in civilianapplications and for preventing unauthorized there is a need to develop a finger printrecognition and analysis system.

Background

Fingerprint verification is an important biometric technique for personal identification. Biometrics are automated methods of recognizing an individual based on their physiological (e.g., fingerprints, face, retina, iris) or behavioral characteristics (e.g., gait, signature). Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy.

Importance of problem

Each biometric has its strengths and weaknesses and the choice typically depends on the application. No single biometric is expected to effectively meet the requirements of all the applications. The match between a biometric and an application is determined depending upon the characteristics of the application and the properties of the biometric.

Information

Fingerprints are graphical flow-like ridges present on human fingers. They are fully formed at about seven months of fetus development and finger ridge configurations do not change throughout the life of an individual except due to accidents such as bruises and cuts on the fingertips. This property makes fingerprints a very attractive biometric identifier. Fingerprint system can be separated into two categories Verification and identification.

Identification system recognizes an individual by searching the entire template database for a match. It conducts one-to-many comparisons to establish the identity of the individual. In an identification system, the system establishes a subject’s identity (or fails if the subject is not enrolled in the system database) without the subject having to claim an identity.

Created by Blue Lions

Page 2: Fingerprint Project

Finger Print Recognition Progress Report 2

Detailed Description of Fingerprint System

The various steps involved in a typical fingerprint recognition system are shownBelow

Figure 1: Various steps in a Fingerprint system

A finger print system works in two modes they are Enrollment mode and Authentication mode. Enrollment mode: fingerprint system is used to identify and collect the related information about the person and his/her fingerprint image. Authentication mode: fingerprint system is used to identify the person who is declared to be him/her.

Figure 2: Enrollment and Authentication stages of a fingerprint system

Created by Blue Lions

Page 3: Fingerprint Project

Finger Print Recognition Progress Report 3

CHAPTER -II OBJECTIVES

The overall objective of the project is to develop a finger print system based on directional filter bank technique which works on minutiae. A point in the fingerprint image is designated as a minutia if it belongs to an ending, beginning or bifurcation of a ridge. The extraction of minutiae relies heavily on the quality of the input images.

Simple smoothing and sharpening

Contrast stretching

Dry and wet area detection

Steps In The Design Process

Created by Blue Lions

Page 4: Fingerprint Project

Finger Print Recognition Progress Report 4

. Figure 3: Image Preprocessing and Feature Extraction

CHAPTER -III PHASES

Image Preprocessing

To eliminate extraction of erroneous minutiae & consequently mining the mismatch as much as possible, image preprocessing is a necessary step before any feature extraction is preformed.

Histogram Equalization

Extraction and Modification of Ridge Direction

Dynamic Threshold

Ridgeline Thinning

Histogram Equalization

Created by Blue Lions

Page 5: Fingerprint Project

Finger Print Recognition Progress Report 5

The method used for the unwanted part of the image is made lighter so as to emphasize the desired parts. Then the accumulation of histogram from 0 to I is given by

Extraction and Modification of Ridge Direction

The introduction of unnecessary false minutiae in the feature extraction process. To prevent this directional information of ridges is obtained & modified.

Figure 4: Ridges Direction

The effect of modifying the directional codes is shown in fig.

Figure 5: Before Enhancement Figure 6: After Modification Directional

Dynamic Threshold

Mapping of all data points having gray level more than the average gray level in a 16 x 16 sampling square 255 ( white ) and all other to zero (black). The result of it shown in fig.

Created by Blue Lions

Page 6: Fingerprint Project

Finger Print Recognition Progress Report 6

Figure 7: After Dynamic Threading

Ridgeline Thinning

Before the features can be extracted, the fingerprints have to be thinned or skeletons so that all the ridges are one pixel thick. Applying the thinning functions the following shows the result as under.

Figure 8: Before Thinning Figure9: After Thinning

The basic features extracted from a fingerprint image are ridge ending and ridge bifurcation. Mask used for features extraction is

Figure 10: 3x 3 Windows for Feature Extraction

Created by Blue Lions

Page 7: Fingerprint Project

Finger Print Recognition Progress Report 7

Features Extraction

The two basic features extracted from a fingerprint image are ridge endings & bifurcations.

Response of the result for ridge ending is

Response of the result for ridge bifurcation is

CHAPTER –V DELIVERABLES

MATLAB source code.

Function to enhance the fingerprint and then applying basic global threshold image is differentiated from background

function image = enhanced(img)img = double(img);img1 = histeq(img);T = graythresh(img1)% T = 200 ;% global C1 C2 G1 G2% C1 = 0 ;% C2 = 0 ;

Created by Blue Lions

Page 8: Fingerprint Project

Finger Print Recognition Progress Report 8

% G1 = 0 ;% G2 = 0 ;% img = thresholding(img1,T) ;% u1 = G1/C1 ;% u2 = G2/C2 ;% T = (u1+u2)/2 ;% C1 = 0 ;% C2 = 0 ;% G1 = 0 ;% G2 = 0 ;% img1 = thresholding(img,T) ;% u1 = G1/C1 ;% u2 = G2/C2 ;% T = (u1+u2)/2 ;% C1 = 0 ;% C2 = 0 ;% G1 = 0 ;% G2 = 0 ;image = thresholding(img1,T) ;image

%%%%Helper Function Starts%%%%%%

function imag2 = thresholding(img,T)[M,N] = size (img);for i=1:M for j=1:N if ( img(i,j) > T ) img(i,j) = 1 ; imag2 = img(i,j);% G1 = G1 + img(i,j) ;% C1 = C1 + 1 ; else img(i,j) = 0 ; imag2 = img(i,j);% G2 = G2 + img(i,j) ;% C2 = C2 + 1 ; end endendimag2

%%%%%Helper Function Ends%%%%%%%%

Created by Blue Lions

Page 9: Fingerprint Project

Finger Print Recognition Progress Report 9

Function "Preprocessing" is used to preprocess the image for features extraction. The main objective of the function is to change the finger ridges into 1 pixel thick line which is mandatory for the extraction of bifurcation & minutiae.

%Syntax:%I = imread('fingerprint.tif');%%then pass the image matrix 'I' as an argument and the function will%return the 'image' in which ridges are 1 pixel thickl%%image = preprocessing(img);

function image = preprocessing(img)img = histeq(img);%T = threshold value T = graythresh(img) ;%bwimage is image got from thresholding using 'im2bw' functionbwimage = im2bw(img,T);bw1 = bwmorph(bwimage,'thin',inf);%bw1 is 1 pixel thick ridge line which was the main objective of the whole%process. This is necessary for the extraction of the features from the%finger print images.comp = imcomplement(bw1);image = comp

Function "Features" extracts the minutiae points, ridge endings &bifurcations , and write them to a file. This will use the function preprocessing as auxiliary function to preprocess the image for features extraction. Implementing the following 3x3 window for features extraction.

% X1 X2 X3% X8 M X4% X7 X6 X5% % M is the center pixel and it will decide whether the center pixel % is a ridge ending ( M = 2 ), or it is ridge bifurcation ( M = 6 )%% Syntax:% fingerprint = imread('fingerprint.tif');

Created by Blue Lions

Page 10: Fingerprint Project

Finger Print Recognition Progress Report 10

% Features_extract(fingerprint);

function Features_extract(image)

image1 = preprocessing( image );image = imcomplement( image1 );[M,N] = size( image ) ;imview( image ) ;

K = M -2 ;L = N -2 ;x = 1 ;y = 1 ;m = 1 ;n = 1 ;

global C

for i=2: K for j=2: L C = 0 ; C = abs( image(i,j+1) - image(i,j) ) ; C = C + abs( image(i,j+2) - image(i,j+1) ) ; C = C + abs( image(i+1,j+2) - image(i,j+2) ) ; C = C + abs( image(i+2,j+2) - image(i+1,j+2) ) ; C = C + abs( image(i+2,j+1) - image(i+2,j+2) ) ; C = C + abs( image(i+2,j) - image(i+2,j+1) ) ; C = C + abs( image(i+1,j) - image(i+2,j) ) ; C = C + abs( image(i,j) - image(i+1,j) ) ; if ( C == 2 ) ending1(x) = i ; ending2(y)= j ; x = x + 1 ; y = y + 1 ; end if ( C == 6 ) bif1(m) = i ; bif2(n) = j ; m = m + 1 ; n = n + 1 ; end endend

Created by Blue Lions

Page 11: Fingerprint Project

Finger Print Recognition Progress Report 11

save minut

GANTT CHART

Stages

Figure 11: Gantt chart Time

REFERENCES

Journal Articles

1) K. Jain, L. Hong, S. Pankanti, and R. Bolle, “An identity authentication system using fingerprints,” Proc. IEEE, vol. 85, pp. 1365-388, Sept. 1997

2) K. Jain, L. Hong, and R. Bolle, “On-line fingerprint verification,” IEEE Trans. Pattern Anal. Machine Intell., vol. 19, pp. 302–314, Apr. 1997

3) Aho, A. V., Hopcroft, J.E., and Ullman J. D., 1983, “Data Structures and Algorithms”, Addison-Wesley Publishing Company, Massachusetts, USA

Books

Created by Blue Lions

Page 12: Fingerprint Project

Finger Print Recognition Progress Report 12

Rafeel C. Gonzalez, Richard E. Woods, Digital Image Processing, 2nd Edition, Prentice Hall, New York, 2002

Rafeel C. Gonzalez, Richard E. Woods, Digital Image Processing using MATLAB, 2nd Edition, Prentice Hall, New York, 2002

Web Pages

1) http://www.atvs.diac.upm.es/publicaciones/publicaciones_en.htm 2) http://fpserver.cse.cuhk.edu.hk/paper/fingertechpart2.pdf 3) http://www.research.ibm.com/ecvg/pubs/sharat-minver.pdf 4) http://www.cordis.lu/infosec/src/stud5fr.htm

Created by Blue Lions