66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

QR Code Recognition Based On Image Processing
Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Fingerprint recognition using MATLAB (using minutiae matching) Graduation project Prepared by: Zain S. Barham Supervised by: Dr. Allam Mousa.
Chapter 4: Image Enhancement
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
Pattern Recognition 1/6/2009 Instructor: Wen-Hung Liao, Ph.D. Biometrics.
Biometrics & Security Tutorial 5. 1 (a) Understand two stages (Enrollment and Authentication) in a fingerprint system. (P6: 12)
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
Face Recognition & Biometric Systems, 2005/2006 Face recognition process.
Biometrics & Security Tutorial 7. 1 (a) Please compare two different kinds of biometrics technologies: Retina and Iris. (P8:2-3)
A Versatile Depalletizer of Boxes Based on Range Imagery Dimitrios Katsoulas*, Lothar Bergen*, Lambis Tassakos** *University of Freiburg **Inos Automation-software.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
Introduction to Fingerprint Biometrics By Tamar Bar.
Automatic Fingerprint Matching System Hsing-Hua Yu and Chaur-Chin Chen Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan.
Fingerprint Authentication Kevin Amendt David Friend April 26, MIT Course Project Presentations.
Symmetric hash functions for fingerprint minutiae
Biometrics and Security Tutorial 8. 1 (a) Understand the enrollment and verification of hand geometry? (P9: 8)
Department of Electrical and Computer Engineering Physical Biometrics Matthew Webb ECE 8741.
FIT3105 Biometric based authentication and identity management
Good quality Fingerprint Image Minutiae Feature Extraction
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
A survey of image-based biometric identification methods: Face, finger print, iris, and others Presented by: David Lin ECE738 Presentation of Project Survey.
Thermal imaging of ear biometrics Steinar Watne. Outline – Introduction to biometrics – Ear as biometric – Research questions – Experiment – Pre-processing.
Biometrics: Ear Recognition
Karthiknathan Srinivasan Sanchit Aggarwal
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
1 Fingerprint Classification sections Fingerprint matching using transformation parameter clustering R. Germain et al, IEEE And Fingerprint Identification.
+ Hand Biometrics Measurement and biometric technologies for identification and security applications.
Introduction to Biometric Systems
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
BIOMETRICS By: Lucas Clay and Tim Myers. WHAT IS IT?  Biometrics are a method of uniquely identifying a person based on physical or behavioral traits.
Video Based Palmprint Recognition Chhaya Methani and Anoop M. Namboodiri Center for Visual Information Technology International Institute of Information.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
Biometrics Authentication Technology
EE 7740 Fingerprint Recognition. Bahadir K. Gunturk2 Biometrics Biometric recognition refers to the use of distinctive characteristics (biometric identifiers)
Content-Based Image Retrieval Using Block Discrete Cosine Transform Presented by Te-Wei Chiang Department of Information Networking Technology Chihlee.
Biometric for Network Security. Finger Biometrics.
1 Figure 2-8: Access Cards Magnetic Stripe Cards Smart Cards  Have a microprocessor and RAM  More sophisticated than mag stripe cards  Release only.
Face Image-Based Gender Recognition Using Complex-Valued Neural Network Instructor :Dr. Dong-Chul Kim Indrani Gorripati.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Guest Lecture + Some Topics in Biometrics September 12,
Pixel Parallel Vessel Tree Extraction for a Personal Authentication System 2010/01/14 學生:羅國育.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Implementation of An Automatic Fingerprint Identification System
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Hand Geometry Recognition
FINGER PRINT RECOGNITION USING MINUTIAE EXTRACTION FOR BANK LOCKER SECURITY Presented by J.VENKATA SUMAN ECE DEPARTMENT GMRIT, RAJAM.
ARTIFICIAL NEURAL NETWORKS
Improving the Performance of Fingerprint Classification
FACE RECOGNITION TECHNOLOGY
Coarse Classification
Faculty of Science IT Department Lecturer: Raz Dara MA.
Hybrid Finger print recognition
A maximum likelihood estimation and training on the fly approach
Lab 2: Fingerprints CSE 402.
Presentation transcript:

66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar

 There are two types of systems that help to automatically establish the identity of a person: (a) authentication (verification) systems, and (b) identification systems.  In a verification (authentication) system, a person desired to be identified submits a claim to an identity to the system, usually via a magnetic stripe card, login name, smart card etc., and the system either rejects or accepts the submitted claim of identity.  In an identification system, the system establishes a subject’s identity (or fails if the subject is not enrolled in the system database) without the subject having to claim an identity.

 Fingerprint matching techniques can be broadly divided in two categories, minutiae-based and correlation-based.  Minutiae-based techniques attempt to align two sets of minutiae points from two fingerprints and count the total number of matched minutia.  In the correlation-based approach, global patterns of ridges and furrows are compared to determine if the two fingerprints align.  Any human physiological or behavioral characteristic can be used as a biometric characteristic for person identification as long as it satisfies the following requirements: (a) universality (b) uniqueness (c) permanence (d) collectability

 The proposed system is represented briefly in the block diagram shown in figure. The system is based mainly on two techniques. The first one adopts the minutia algorithm and the second adopts the ridge algorithm.

 Algorithm: This algorithm tests the validity of each minutiae point by scanning the skeleton image and examining the local neighborhood around the point.  The subsequent steps of the algorithm depend on whether the candidate minutiae point is a ridge ending or a bifurcation. 1. For a candidate ridge ending point: If T01 = 1, then the candidate minutiae point is validated as a true ridge ending. 2. For a candidate bifurcation point: If T01 = 1 ^ T02 = 1 ^ T03 = 1, the candidate minutiae point is validated as a true bifurcation.

 The four main steps in our feature extraction algorithm are: 1. determine a centre point for the fingerprint image 2. tessellate the region around the centre point 3. filter the region of interest in eight different directions 4. compute the average absolute deviation from the mean (AAD)

1. Aligning Query and Template Images:  For comparing the ridge feature maps of two images, it is necessary that the images themselves are aligned appropriately to ensure an overlap of common region in the two fingerprint images. This is done by determining the transformation parameters, (tx, ty, tφ ).  Let H represent the enhanced query image, and (tx, ty, tφ ) be the translation and rotation parameters obtained using the minutiae matching information. Then the filtered image, Vθ ;tφ, is obtained as,

2. Matching Scores:  The ridge feature maps of the query and the template images are compared by computing the sum of the Euclidean distances of the 8-dimensional feature vectors in the corresponding tessellated cells.  Cells that are marked as background are not used in the matching process.  This results in a distance score measure; a higher distance score indicates a poor match.

 The matching scores generated by comparing the minutiae sets and the ridge feature maps are combined to generate a single matching score.  There are three cases to generate a single matching score: 1. If the verification system detects a fingerprint image more than or equal to the threshold and the identification system detects the same fingerprint image we adopt the following sum rule. 2. If the verification system detects a fingerprint image less than the threshold and the identification system detects the same fingerprint image we adopt the same sum rule equation. 3. If the verification system detects fingerprint images more than or equal to the threshold and the identification system did not detect the same fingerprint image we use the following equation.

 This research uses two databases to test a fingerprint matching system. 1. individual database 2. identical twins database  Experimental results are obtained for the following three algorithms: 1. Proposed verification matching which used two algorithms in the post-process phase, Xiao et al and Tico algorithms, 2. Central point identification matching and 3. Hybrid matching which is a combination of previous two algorithms. All the above three algorithms are experimented using Individual Data base as well as Identical Twins Database.

 1. Proposed Verification Matching Algorithm: Table shows the fingerprint verification matching using Xiao and Tico algorithms, separately in individual fingerprint database and after using the proposed combined verification fingerprint matching algorithm, corresponding to different threshold values.

 2. The Central Point Identification Matching Algorithm: Acceptance rate 86.5 % (independent of threshold values).  3. Hybrid Matching Algorithm: Hybrid between two previous matching algorithms results in different thresholds. They are: 0.15, 0.2, 0.25 and 0.3. The corresponding matching rates are 99.3%, 99.3%, 97.9%, and 95.9% respectively.

 1. Proposed Verification Matching Algorithm:- Table shows the results for Xiao and Tico algorithms and the proposed combined verification algorithm, for the identical twins algorithm. 2. Central Point Identification Matching Algorithm: Result of using central point identification matching algorithm. Acceptance rate: 87.7 % (independent of threshold values).

3. Hybrid Matching Algorithm: The matching results were conducted by using hybrid matching in identical twins at different thresholds. Thresholds (0.25, 0.3, 0.35, and 0.4) it is matching results in Hybrid matching system are (100%, 100%, 98.5%, and 98.5%) respectively.  There are some problems in collecting the second database: 1. The different age of the persons leads to a different size of the fingerprint 2. Some of the twins are children so there are scratches in the fingerprints 3. Some of them did not fully cooperate with the researchers, so most of the images of their fingerprints do not contain enough features to create an extraction.

 This research introduces an Automatic Fingerprint Recognition System (AFRS) based on hybrid techniques for matching.  Experiments indicated that the hybrid technique performs much better than each algorithm individually.