Symmetric hash functions for fingerprint minutiae

Slides:



Advertisements
Similar presentations
Image Registration  Mapping of Evolution. Registration Goals Assume the correspondences are known Find such f() and g() such that the images are best.
Advertisements

More Vectors.
Alignment Visual Recognition “Straighten your paths” Isaiah.
Principal Component Analysis Based on L1-Norm Maximization Nojun Kwak IEEE Transactions on Pattern Analysis and Machine Intelligence, 2008.
Medical Image Registration Kumar Rajamani. Registration Spatial transform that maps points from one image to corresponding points in another image.
Biometrics & Security Tutorial 9. 1 (a) What is palmprint and palmprint authentication? (P10: 9-10)
Presented by Xinyu Chang
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
Securing Fingerprint Template - Fuzzy Vault with Helper Data
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Fingerprint Minutiae Matching Algorithm using Distance Histogram of Neighborhood Presented By: Neeraj Sharma M.S. student, Dongseo University, Pusan South.
Fingerprint recognition using MATLAB (using minutiae matching) Graduation project Prepared by: Zain S. Barham Supervised by: Dr. Allam Mousa.
Mapping: Scaling Rotation Translation Warp
Image Indexing and Retrieval using Moment Invariants Imran Ahmad School of Computer Science University of Windsor – Canada.
The Statistics of Fingerprints A Matching Algorithm to be used in an Investigation into the Reliability of the Use of Fingerprints for Identification Bob.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Cascaded Filtering For Biometric Identification Using Random Projection Atif Iqbal.
A Versatile Depalletizer of Boxes Based on Range Imagery Dimitrios Katsoulas*, Lothar Bergen*, Lambis Tassakos** *University of Freiburg **Inos Automation-software.
Instructor: Dr. G. Bebis Reza Amayeh Fall 2005
CS 790Q Biometrics Face Recognition Using Dimensionality Reduction PCA and LDA M. Turk, A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive.
Biometrics and Security Tutorial 8. 1 (a) Understand the enrollment and verification of hand geometry? (P9: 8)
Biometrics II CUBS, University at Buffalo
CS485/685 Computer Vision Prof. George Bebis
Face Recognition Based on 3D Shape Estimation
COMP322/S2000/L221 Relationship between part, camera, and robot (cont’d) the inverse perspective transformation which is dependent on the focal length.
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Basic Concepts and Definitions Vector and Function Space. A finite or an infinite dimensional linear vector/function space described with set of non-unique.
Chapter 11 Integration Information Instructor: Prof. G. Bebis Represented by Reza Fall 2005.
Object Recognition Using Geometric Hashing
Scale Invariant Feature Transform (SIFT)
Fingerprint Matching Chapter On-Line Fingerprint Verification Anil Jain, Fellow, IEEE, Lin Hong, and Ruud Bolle, Fellow, IEEE Presented by Chris.
Venus. Classification Faces – Different Faces -- Same.
MSU CSE 803 Fall 2008 Stockman1 CV: 3D sensing and calibration Coordinate system changes; perspective transformation; Stereo and structured light.
Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics IEEE Trans on PAMI, VOL. 25, NO.9, 2003 Kyong Chang, Kevin W. Bowyer,
Automatic Fingerprint Verification Principal Investigator Venu Govindaraju, Ph.D. Graduate Students T.Jea, Chaohang Wu, Sharat S.Chikkerur.
Transforms: Basis to Basis Normal Basis Hadamard Basis Basis functions Method to find coefficients (“Transform”) Inverse Transform.
IIIT Hyderabad Atif Iqbal and Anoop Namboodiri Cascaded.
Face Recognition Using Neural Networks Presented By: Hadis Mohseni Leila Taghavi Atefeh Mirsafian.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
1 Fingerprint Classification sections Fingerprint matching using transformation parameter clustering R. Germain et al, IEEE And Fingerprint Identification.
Introduction to Biometric Systems
Dimensionality Reduction: Principal Components Analysis Optional Reading: Smith, A Tutorial on Principal Components Analysis (linked to class webpage)
CS 376b Introduction to Computer Vision 04 / 29 / 2008 Instructor: Michael Eckmann.
CRYPTO KEY GENERATION USING SLICING WINDOW ALGORITHM M.S. Altarawneh, L.C. Khor, W.L. Woo, and S.S. Dlay School of Electrical, Electronic and Computer.
1 Preview At least two views are required to access the depth of a scene point and in turn to reconstruct scene structure Multiple views can be obtained.
Course 12 Calibration. 1.Introduction In theoretic discussions, we have assumed: Camera is located at the origin of coordinate system of scene.
Fingerprint Analysis (part 2) Pavel Mrázek. Local ridge frequency.
Symmetric hash functions for fingerprint minutiae S. Tulyakov, V. Chavan and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo,
视觉的三维运动理解 刘允才 上海交通大学 2002 年 11 月 16 日 Understanding 3D Motion from Images Yuncai Liu Shanghai Jiao Tong University November 16, 2002.
Correspondence-Free Determination of the Affine Fundamental Matrix (Tue) Young Ki Baik, Computer Vision Lab.
Face Recognition: An Introduction
Master Thesis Presentation, 14Dec07 Pair Wise Distance Histogram Based Fingerprint Minutiae Matching Algorithm Developed By: Neeraj Sharma M.S. student,
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
CSE 185 Introduction to Computer Vision Face Recognition.
Geometric Hashing: A General and Efficient Model-Based Recognition Scheme Yehezkel Lamdan and Haim J. Wolfson ICCV 1988 Presented by Budi Purnomo Nov 23rd.
CS 376b Introduction to Computer Vision 04 / 28 / 2008 Instructor: Michael Eckmann.
1 Iris Recognition Ying Sun AICIP Group Meeting November 3, 2006.
Multimodal Interaction Dr. Mike Spann
Course14 Dynamic Vision. Biological vision can cope with changing world Moving and changing objects Change illumination Change View-point.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Pushpita Biswas Under the guidance of Prof. S.Mukhopadhyay and Prof. P.K.Biswas.
Determining 3D Structure and Motion of Man-made Objects from Corners.
An Improved Approach For Image Matching Using Principle Component Analysis(PCA An Improved Approach For Image Matching Using Principle Component Analysis(PCA.
A function is a rule f that associates with each element in a set A one and only one element in a set B. If f associates the element b with the element.
4. Affine transformations. Reading Required:  Watt, Section 1.1. Further reading:  Foley, et al, Chapter  David F. Rogers and J. Alan Adams,
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Secure and Privacy-Preserving User Authentication Using Biometrics
Facial Recognition in Biometrics
Application: Geometric Hashing
Image Registration  Mapping of Evolution
Presentation transcript:

Symmetric hash functions for fingerprint minutiae S. Tulyakov, F. Farooq and V. Govindaraju Center for Unified Biometrics and Sensors SUNY at Buffalo, New York, USA

Securing password information It is impossible to learn the original password given stored hash value of it.

Securing fingerprint information Wish to use similar functions for fingerprint data:

Obstacles in finding fingerprint hash functions Fingerprint space Hash space f1 h(f1) h f2 h(f2) Since match algorithm will work with the values of hash functions, similar fingerprints should have similar hash values rotation and translation of original image should not have big impact on hash values partial fingerprints should be matched

Existing Approaches Davida, Frankel, Matt (1998) - use error correcting codes, features should be ordered Biometric encryption (Soutar et al., 1998) - use filters for Fourier transform of fingerprint image - translation is accounted for, but not rotation (example of such filters for face verification)

Existing Approaches Ratha, Connell, Bolle (2001) - polynomial transform; need alignment. Juels, Sudan (2002) - map points to the values of error correcting codes , introduce variation by adding some other points. Follow-ups: Clancy et al, 2003 Uludag, Jain (2004)

Minutia points of the fingerprint Minutia points - points where ridge structure changes: end of the ridge and branching of the ridge. The positions of minutia points uniquely identifies the fingerprint.

Assumptions on minutiae sets extracted from the same finger Assume that two fingerprints originating from one finger differ by scale and rotation. Thus the set of minutia points of one fingerprint image can be obtained from the set of minutia points of another fingerprint image by scaling and rotating.

Background on complex numbers(1) Point in 2-dimensional plane can be represented as a complex number: ( is an element satisfying ) Adding complex number to all points in the complex plane results in a parallel shift of the plane by vector

Background on complex numbers (2) Polar representation of complex numbers: Denote - magnitude of Then

Background on complex numbers (3) Multiplying all points in the complex plane by some complex number results in a rotation around origin by angle and scaling by factor

Transformation of minutiae set If we represent minutia points as points on a complex plane, then scaling and rotation can be expressed by function: where is the complex number determining rotation and scaling, and is the complex number determining translation of minutia point. Multiplying by r means rotating by angle and scaling by factor .

Transformation function If is a set of minutia points of first fingerprint and is a set of minutia points of second fingerprint (same finger), then we assume that there is a transformation such that for any .

Hash functions of minutia points Consider following functions of minutia positions: The values of these symmetric functions do not depend on the order of minutia points.

Hash functions of transformed minutiae What happens with hash functions if minutia point set is transformed?

Finding transformation parameters from hash function values Thus can be expressed as a linear combinations of with coefficients depending on transformation parameters r and t. Denote: Thus And r,t can be calculated given

Verifying fingerprint match using hash functions When and are found we can use higher order hash functions to check if fingerprints match. For example, if extracted minutia set is identical to the stored in the database, then for the hash function of third order we should get: The difference between two parts of above equation can serve as a confidence measure for matching two sets of minutia points.

Practical considerations for matching localized hash values Since direction of the minutia (direction of the ridge where minutia is located) is also important in fingerprint matching, we consider unit direction vectors and same hash functions of that vectors (associating direction vector with complex number) The small changes in locations of minutia points result in big changes of symmetric functions of higher orders. Thus we limited ourselves to the symmetric functions of 1st and 2nd orders.

Matching Localized Subsets Since it is rare that two fingerprint images contain exactly same minutia points, we consider subsets of minutia points. To ensure privacy we must have less symmetric functions than points in the minutia subset. Consider two subsets of 3 minutiae points & 2 functions The dist function provides a “goodness” of match between the subsets

Goodness of Match For all “local” subsets find how many subsets are matched and whether values of and are similar. For each minutiae point, find the 3 nearest neighbors and form 3 triplets that always include the initial minutia.

Fingerprint Matching Algorithm(1) Enrollment: For each triplet generated let (c1,c2,c3) and (d1,d2,d3) be the locations and directions of the minutia Compute hash functions h1 = (c1 + c2 + c3)/3 g1 = (d1 + d2 + d3)/3 h2 = (c12 + c22 + c32)/3 g2 = (d12 + d22 + d32)/3 3. Store 4 values (h1, h2, g1, and g2) corresponding to each triplet in the database.

Fingerprint Matching Algorithm Compute hash functions (h1’, h2’, g1’, and g2’) for all “local” triplets in the test fingerprint For each pair of local hash value sets find the distance of match Note that t can be derived from the match between h and h’ and establishing the pivot. For a given t, search several quantized r

Experimental results Co.3: 3 pts and 2 hash fns ERR = 3% Original no-hash matching ERR = 1.7% Co.2: 3 pts and 1 hash fn Co.1: 2 points and 1 hash fn tested on FVC2002 set, with 2800 genuine tests and 4950 impostor tests

Algorithm limitations Different local minutia sets can have same hash value sets. Thus the expected performance of the algorithm is lower than the performance of the matching algorithm using all available fingerprint information. Usually there are less matching hash values than matching minutiae. This means bigger difficulty in producing good match score, and setting match thresholds. 3 matching minutiae can result in only one matching hash pair

Thank you ! References  Davide Maltoni, Dario Maio, Anil K. Jain and Salil Prabhakar, Handbook of Fingerprint Recognition, Springer-Verlag, New York, 2003 Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy and B.V.K. Vijaya Kumar, “Biometric Encryption”, in ICSA Guide to Cryptography, R.Nichols, ed. (McGraw-Hill, 1999) G.I. Davida, Y. Frankel, and B.J. Matt. “On enabling secure applications through offline biometric identification”. In IEEE Symposium on Privacy and Security, 1998. Tsai-Yang Jea, Viraj S. Chavan, Venu Govindaraju and John K. Schneider, “Security and matching of partial fingerprint recognition systems”, In SPIE Defense and Security Symposium, 2004.

Security If the number of stored hash functions is less than the number of minutia points, it is not possible to find the positions of minutia points from local hash values. Using system of hash equations is difficult, since it is not known which minutia correspond to particular hash value.

Cancelable Fingerprint Templates If fingerprint database is compromised, the different set of symmetric hash functions should be chosen. It can be any function set, constituting a basis in the set of symmetric polynomial functions of order less than Also, different set of hash functions can be chosen for each individual, resulting in cancelable fingerprint templates.