SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
An Efficient Approach to Extract
    Singular Points for Fingerprint Recognition




Supervised By:   Dr. Muhammad Sheikh Sadi
                 Associate Professor, Department of Computer Science and Engineering,
                 Khulna University of Engineering & Technology
                 Contact: sheikhsadi@gmail.com
Submitted By:    MD. Mesbah Uddin Khan
                 Level-4, Term-2, Department of Computer Science and Engineering,
                 Khulna University of Engineering & Technology
                 Contact: mesbahuk@gmail.com
Dated:           June 10, 2012
Problem Statement

   • Over the years many approaches have been
     proposed     for   developing    fingerprint
     recognition systems. But some of them give
     inaccurate results due to low-quality images
     or have high time cost. We will focus on
     singular points extraction from low quality
     image and then matching fingerprint within
     low time cost.
Things we need to know

    • Fingerprints

    • Singular Points

    • Fingerprint Recognition
Fingerprint                       (1/2)
   •The fingerprint is a duplicate of a
   fingertip epidermis.

   •When a person touches a smooth
   surface, the fingertip epidermis
   characteristic transferred to the
   surface.

   •The pattern of the ridges and valleys
   on the human fingertips forms the
   fingerprint images.
Fingerprint                           (2/2)

  • Fingerprints have remained a valuable
    means of identification of an individual
    because:
       1. they are totally unique to the
          individual
       2. they never change (Immutability)
Fingerprint Ridge
Ridge patterns

   All fingerprints divided into 3 classes
     ▫ Loops
     ▫ Whorls
     ▫ Arches
Fingerprint Features
   Two types of features

   1. Local Features
     ▫   Ridge Ending
     ▫   Bifurcation

   2. Global Features
     ▫   Core
     ▫   Delta
Singular Points
   a special pattern of ridge and valleys
   formed by global features like core
   and delta are called singularities or
   Singular Points (SP).

   ▫ A core is defined as the top most
     point on the inner most ridge

   ▫ A delta defined as the center point
     where three different directions
     flows meet.
State of the Art
  • Poincaré Index is the most commonly used
    method for locating the singular points

  • Merits
   ▫ easy to understand and implement

  • Demerits
   ▫ it may lead to false detection in noisy images
State of the Art
  • Intersection-Based Method
   • proposed by Ramo et al., singular points are
     taken as the intersections of transition lines

  • Demerits
   • As they are intersected, these intersect
     points may not give accurate result always.
   • This method needs high quality images
State of the Art
  • Singular candidate method
   • uses both the local and global features
   • introducing singular candidate models that
     indicate the positions where the probability
     of the existence of singular points is high
  • Demerits
   • sometimes gives false candidate region
   • noisy images may also be extracted to find
     singular points
Proposed Methodology
 • The proposed methodology is composed of
   two main phases:
  1. Singular point Extraction

  2. Fingerprint Recognition.
Proposed Methodology
 • The proposed methodology is composed of
   two main phases:
  1. Singular point Extraction
    a) Image Filtering
    b) Directional Image Extraction and detecting
       DF’s angle
    c) Extracting Singular points
  2. Fingerprint Recognition.
Proposed Methodology
 • The proposed methodology is composed of
   two main phases:
  1. Singular point Extraction
    a) Image Filtering
    b) Directional Image Extraction and detecting
       DF’s angle
    c) Extracting Singular points
  2. Fingerprint Recognition.
     Relative distance, variance and standard
      deviation calculation for multiple singular points
Image Filtering

Step 1: Take an input image of defined WIDTH and HEIGHT.
Step 2: For all the pixels in the image Do the following.
        a. Calculate each pixel’s RGB values
        b. If R=O, G=O & B=O Then
                Put a BLACK pixel i.e RGB(0,0,0) to the pixel.
           Else
                Put a WHITE pixel i.e RGB(255,255,255) to that pixel.
        Loop.
Directional Image Extraction
  •
Marr-Hilderth Filter
  •
Gaussian Filter
  •
Extracting Singular Points                                     1/2
  • For the extraction of singular points from the directional image,
    the following pseudo code is applied.
Extracting Singular Points   2/2
Core and Delta Region
Fingerprint Recognition
 Schema:
Calculations
  We know,
  • Variance,

  • Standard Deviation,

  Where, x denotes the distances

  Using these relations we can calculate relative
   distance, variance and standard deviation for
   multiple singular points
Experimental Setup
  A short list of tools and libraries used for this
  experimental setup are given below:

  •   OS       : Microsoft Windows 7 Prof. Edition
  •   IDE      : Microsoft Visual Studio 2010
  •   Framework: .NET Framework 4.0
  •   Language : C#
  •   Library : AForge.Imaging
  •   Database : FVC 2004 (DB4)
System
Experimental Results                               1/2
  The proposed method is applied on 75 fingerprint
  images selected from FCV 2004 database.

  • It detects 65 true and 4 false core points out of 70.
    ▫ accuracy rate 92.85%
  • It detects 36 true and 3 false delta points out of 39.
    ▫ accuracy rate 92.31%
        Singular Points   Total   Missed   False


        Core              70      5        4


        Delta             39      3        3
Experimental Results                            2/2
  The proposed approach is applied in FCV2004(DB4)
  fingerprint image database for recognizing
  fingerprints.

  • It recognized and matched fingerprints in of 24
    runs out of 26 runs.

  • The overall accuracy rate of fingerprint
    recognition is found 92.31%
Comparisons                                      1/4
  • Comparison of missed singular points extraction
    rate between different methods:

  Methods       Missed Core (%)   Missed Delta (%)

  Chikkerur     4.74              76.7
  Peng          10.04             30.0
  Yin           4.65              14.1
  Proposed      7.14              7.69
Comparisons                                                       2/4
     90


     80


     70


     60


     50
                                               Missed Core (%)
     40                                        Missed Delta (%)


     30


     20


      10


      0
           Chikkerur   Peng   Yin   Proposed


  • Figure: Missed Core and Delta rate comparison
Comparisons                                           3/4
  • Comparison of false singular points extraction rate
    between different methods:


      Methods      False Core (%)   False Delta (%)

      Chikkerur    22.54            0.0
      Peng         12.14            6.67
      Yin          5.42             6.4
      Proposed     5.71             7.69
Comparisons                                                 4/4
   25




   20




    15

                                              False Core
                                              False Delta
   10




    5




    0
         chikkerur   peng   yin    proposed



  • Figure: False Core and Delta rate comparison
Concluding Remarks
  • This thesis work proposes and implements a
    technique for detecting fingerprints using Singular
    Points for both high and low resolution image. It
    also helps Recognizing them in low cost and less
    time overhead.

  • This thesis works with FCV 2004 database images,
    which were much noisy. For better results
    Fingerprint Scanners can be used.
Future plan
  • This thesis work supposes that all the fingerprint
    images are in straight orientation. So while a
    fingerprint is rotated than sometimes it fails to
    recognize it.

  • All of these works can undergo further study for
    better results
Thank you all…   

Contenu connexe

Tendances

Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featurevarsha mohite
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand GeometryMazin Alwaaly
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognitionDheerendra k
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System123456chan
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security PresentationPrabh Jeet
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric systemBhavi Bhatia
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingcsandit
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiNishikant Taksande
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition Systemchristywong1234
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemShakti Patil
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprintPiyush Mittal
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintJayakrishnan U
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on BiometricsPathik504
 

Tendances (20)

Fingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based featureFingerprint recognition using minutiae based feature
Fingerprint recognition using minutiae based feature
 
Pattern recognition Hand Geometry
Pattern recognition Hand GeometryPattern recognition Hand Geometry
Pattern recognition Hand Geometry
 
Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Biometrics
Biometrics Biometrics
Biometrics
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Biometric security Presentation
Biometric security PresentationBiometric security Presentation
Biometric security Presentation
 
Design of a hand geometry based biometric system
Design of a hand geometry based biometric systemDesign of a hand geometry based biometric system
Design of a hand geometry based biometric system
 
Experimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matchingExperimental study of minutiae based algorithm for fingerprint matching
Experimental study of minutiae based algorithm for fingerprint matching
 
Fingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New DelhiFingerprint, seminar at IASRI, New Delhi
Fingerprint, seminar at IASRI, New Delhi
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformFingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
finger prints
finger printsfinger prints
finger prints
 
Presentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification SystemPresentation Automated Fingerprint Identification System
Presentation Automated Fingerprint Identification System
 
Biometrics
BiometricsBiometrics
Biometrics
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprint
 
Biometrics Technology In the 21st Century
Biometrics Technology In the 21st CenturyBiometrics Technology In the 21st Century
Biometrics Technology In the 21st Century
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 
Slide-show on Biometrics
Slide-show on BiometricsSlide-show on Biometrics
Slide-show on Biometrics
 
biomatric system
biomatric systembiomatric system
biomatric system
 

En vedette

An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesIDES Editor
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptMukta Gupta
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUAlpesh Kurhade
 
Full n final prjct
Full n final prjctFull n final prjct
Full n final prjctpunu2602
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementAnkit Nayan
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICKUL2700
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-pptMohankumar Ramachandran
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Sandeep Kumar Panda
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 

En vedette (11)

An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint FeaturesAn Indexing Technique Based on Feature Level Fusion of Fingerprint Features
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
A High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPUA High Performance Fingerprint Matching System for Large Databases Based on GPU
A High Performance Fingerprint Matching System for Large Databases Based on GPU
 
Full n final prjct
Full n final prjctFull n final prjct
Full n final prjct
 
Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image Enhancement
 
fingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCICfingerprint classification systems Henry and NCIC
fingerprint classification systems Henry and NCIC
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 

Similaire à An Efficient Approach to Extract Singular Points for Fingerprint Recognition

Face recognition.ppt
Face recognition.pptFace recognition.ppt
Face recognition.pptssuser7ec6af
 
151106 Sketch-based 3D Shape Retrievals using Convolutional Neural Networks
151106 Sketch-based 3D Shape Retrievals using Convolutional Neural Networks151106 Sketch-based 3D Shape Retrievals using Convolutional Neural Networks
151106 Sketch-based 3D Shape Retrievals using Convolutional Neural NetworksJunho Cho
 
Long-term Face Tracking in the Wild using Deep Learning
Long-term Face Tracking in the Wild using Deep LearningLong-term Face Tracking in the Wild using Deep Learning
Long-term Face Tracking in the Wild using Deep LearningElaheh Rashedi
 
Biometric Recognition using Deep Learning
Biometric Recognition using Deep LearningBiometric Recognition using Deep Learning
Biometric Recognition using Deep LearningSahithiKotha2
 
MLSEV Virtual. Searching for Anomalies
MLSEV Virtual. Searching for AnomaliesMLSEV Virtual. Searching for Anomalies
MLSEV Virtual. Searching for AnomaliesBigML, Inc
 
Efficient architecture to condensate visual information driven by attention ...
Efficient architecture to condensate visual information driven by attention ...Efficient architecture to condensate visual information driven by attention ...
Efficient architecture to condensate visual information driven by attention ...Sara Granados Cabeza
 
From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networksCSIRO
 
Using nasal curves matching for expression robust 3D nose recognition
Using nasal curves matching for expression robust 3D nose recognitionUsing nasal curves matching for expression robust 3D nose recognition
Using nasal curves matching for expression robust 3D nose recognitionMehryar (Mike) E., Ph.D.
 
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET Journal
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approachessadique_ghitm
 
Multimodal Learning Analytics
Multimodal Learning AnalyticsMultimodal Learning Analytics
Multimodal Learning AnalyticsXavier Ochoa
 
A New Technique of Extraction of Edge Detection Using Digital Image Processing
A New Technique of Extraction of Edge Detection Using Digital  Image Processing A New Technique of Extraction of Edge Detection Using Digital  Image Processing
A New Technique of Extraction of Edge Detection Using Digital Image Processing IJMER
 
Passive stereo vision with deep learning
Passive stereo vision with deep learningPassive stereo vision with deep learning
Passive stereo vision with deep learningYu Huang
 
Algorithmic Techniques for Parametric Model Recovery
Algorithmic Techniques for Parametric Model RecoveryAlgorithmic Techniques for Parametric Model Recovery
Algorithmic Techniques for Parametric Model RecoveryCurvSurf
 
Object detection at night
Object detection at nightObject detection at night
Object detection at nightSanjay Crúzé
 
Applying your Convolutional Neural Networks
Applying your Convolutional Neural NetworksApplying your Convolutional Neural Networks
Applying your Convolutional Neural NetworksDatabricks
 

Similaire à An Efficient Approach to Extract Singular Points for Fingerprint Recognition (20)

Face recognition.ppt
Face recognition.pptFace recognition.ppt
Face recognition.ppt
 
face detection
face detectionface detection
face detection
 
151106 Sketch-based 3D Shape Retrievals using Convolutional Neural Networks
151106 Sketch-based 3D Shape Retrievals using Convolutional Neural Networks151106 Sketch-based 3D Shape Retrievals using Convolutional Neural Networks
151106 Sketch-based 3D Shape Retrievals using Convolutional Neural Networks
 
Long-term Face Tracking in the Wild using Deep Learning
Long-term Face Tracking in the Wild using Deep LearningLong-term Face Tracking in the Wild using Deep Learning
Long-term Face Tracking in the Wild using Deep Learning
 
Biometric Recognition using Deep Learning
Biometric Recognition using Deep LearningBiometric Recognition using Deep Learning
Biometric Recognition using Deep Learning
 
MLSEV Virtual. Searching for Anomalies
MLSEV Virtual. Searching for AnomaliesMLSEV Virtual. Searching for Anomalies
MLSEV Virtual. Searching for Anomalies
 
Line detection algorithms
Line detection algorithmsLine detection algorithms
Line detection algorithms
 
E017443136
E017443136E017443136
E017443136
 
Efficient architecture to condensate visual information driven by attention ...
Efficient architecture to condensate visual information driven by attention ...Efficient architecture to condensate visual information driven by attention ...
Efficient architecture to condensate visual information driven by attention ...
 
From ensembles to computer networks
From ensembles to computer networksFrom ensembles to computer networks
From ensembles to computer networks
 
Using nasal curves matching for expression robust 3D nose recognition
Using nasal curves matching for expression robust 3D nose recognitionUsing nasal curves matching for expression robust 3D nose recognition
Using nasal curves matching for expression robust 3D nose recognition
 
IRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET- Image Feature Extraction using Hough Transformation Principle
IRJET- Image Feature Extraction using Hough Transformation Principle
 
Dip
DipDip
Dip
 
Face recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based ApproachesFace recognition: A Comparison of Appearance Based Approaches
Face recognition: A Comparison of Appearance Based Approaches
 
Multimodal Learning Analytics
Multimodal Learning AnalyticsMultimodal Learning Analytics
Multimodal Learning Analytics
 
A New Technique of Extraction of Edge Detection Using Digital Image Processing
A New Technique of Extraction of Edge Detection Using Digital  Image Processing A New Technique of Extraction of Edge Detection Using Digital  Image Processing
A New Technique of Extraction of Edge Detection Using Digital Image Processing
 
Passive stereo vision with deep learning
Passive stereo vision with deep learningPassive stereo vision with deep learning
Passive stereo vision with deep learning
 
Algorithmic Techniques for Parametric Model Recovery
Algorithmic Techniques for Parametric Model RecoveryAlgorithmic Techniques for Parametric Model Recovery
Algorithmic Techniques for Parametric Model Recovery
 
Object detection at night
Object detection at nightObject detection at night
Object detection at night
 
Applying your Convolutional Neural Networks
Applying your Convolutional Neural NetworksApplying your Convolutional Neural Networks
Applying your Convolutional Neural Networks
 

Dernier

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 

Dernier (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 

An Efficient Approach to Extract Singular Points for Fingerprint Recognition

  • 1. An Efficient Approach to Extract Singular Points for Fingerprint Recognition Supervised By: Dr. Muhammad Sheikh Sadi Associate Professor, Department of Computer Science and Engineering, Khulna University of Engineering & Technology Contact: sheikhsadi@gmail.com Submitted By: MD. Mesbah Uddin Khan Level-4, Term-2, Department of Computer Science and Engineering, Khulna University of Engineering & Technology Contact: mesbahuk@gmail.com Dated: June 10, 2012
  • 2. Problem Statement • Over the years many approaches have been proposed for developing fingerprint recognition systems. But some of them give inaccurate results due to low-quality images or have high time cost. We will focus on singular points extraction from low quality image and then matching fingerprint within low time cost.
  • 3. Things we need to know • Fingerprints • Singular Points • Fingerprint Recognition
  • 4. Fingerprint (1/2) •The fingerprint is a duplicate of a fingertip epidermis. •When a person touches a smooth surface, the fingertip epidermis characteristic transferred to the surface. •The pattern of the ridges and valleys on the human fingertips forms the fingerprint images.
  • 5. Fingerprint (2/2) • Fingerprints have remained a valuable means of identification of an individual because: 1. they are totally unique to the individual 2. they never change (Immutability)
  • 7. Ridge patterns All fingerprints divided into 3 classes ▫ Loops ▫ Whorls ▫ Arches
  • 8. Fingerprint Features Two types of features 1. Local Features ▫ Ridge Ending ▫ Bifurcation 2. Global Features ▫ Core ▫ Delta
  • 9. Singular Points a special pattern of ridge and valleys formed by global features like core and delta are called singularities or Singular Points (SP). ▫ A core is defined as the top most point on the inner most ridge ▫ A delta defined as the center point where three different directions flows meet.
  • 10. State of the Art • Poincaré Index is the most commonly used method for locating the singular points • Merits ▫ easy to understand and implement • Demerits ▫ it may lead to false detection in noisy images
  • 11. State of the Art • Intersection-Based Method • proposed by Ramo et al., singular points are taken as the intersections of transition lines • Demerits • As they are intersected, these intersect points may not give accurate result always. • This method needs high quality images
  • 12. State of the Art • Singular candidate method • uses both the local and global features • introducing singular candidate models that indicate the positions where the probability of the existence of singular points is high • Demerits • sometimes gives false candidate region • noisy images may also be extracted to find singular points
  • 13. Proposed Methodology • The proposed methodology is composed of two main phases: 1. Singular point Extraction 2. Fingerprint Recognition.
  • 14. Proposed Methodology • The proposed methodology is composed of two main phases: 1. Singular point Extraction a) Image Filtering b) Directional Image Extraction and detecting DF’s angle c) Extracting Singular points 2. Fingerprint Recognition.
  • 15. Proposed Methodology • The proposed methodology is composed of two main phases: 1. Singular point Extraction a) Image Filtering b) Directional Image Extraction and detecting DF’s angle c) Extracting Singular points 2. Fingerprint Recognition.  Relative distance, variance and standard deviation calculation for multiple singular points
  • 16. Image Filtering Step 1: Take an input image of defined WIDTH and HEIGHT. Step 2: For all the pixels in the image Do the following. a. Calculate each pixel’s RGB values b. If R=O, G=O & B=O Then Put a BLACK pixel i.e RGB(0,0,0) to the pixel. Else Put a WHITE pixel i.e RGB(255,255,255) to that pixel. Loop.
  • 20. Extracting Singular Points 1/2 • For the extraction of singular points from the directional image, the following pseudo code is applied.
  • 22. Core and Delta Region
  • 24. Calculations We know, • Variance, • Standard Deviation, Where, x denotes the distances Using these relations we can calculate relative distance, variance and standard deviation for multiple singular points
  • 25. Experimental Setup A short list of tools and libraries used for this experimental setup are given below: • OS : Microsoft Windows 7 Prof. Edition • IDE : Microsoft Visual Studio 2010 • Framework: .NET Framework 4.0 • Language : C# • Library : AForge.Imaging • Database : FVC 2004 (DB4)
  • 27. Experimental Results 1/2 The proposed method is applied on 75 fingerprint images selected from FCV 2004 database. • It detects 65 true and 4 false core points out of 70. ▫ accuracy rate 92.85% • It detects 36 true and 3 false delta points out of 39. ▫ accuracy rate 92.31% Singular Points Total Missed False Core 70 5 4 Delta 39 3 3
  • 28. Experimental Results 2/2 The proposed approach is applied in FCV2004(DB4) fingerprint image database for recognizing fingerprints. • It recognized and matched fingerprints in of 24 runs out of 26 runs. • The overall accuracy rate of fingerprint recognition is found 92.31%
  • 29. Comparisons 1/4 • Comparison of missed singular points extraction rate between different methods: Methods Missed Core (%) Missed Delta (%) Chikkerur 4.74 76.7 Peng 10.04 30.0 Yin 4.65 14.1 Proposed 7.14 7.69
  • 30. Comparisons 2/4 90 80 70 60 50 Missed Core (%) 40 Missed Delta (%) 30 20 10 0 Chikkerur Peng Yin Proposed • Figure: Missed Core and Delta rate comparison
  • 31. Comparisons 3/4 • Comparison of false singular points extraction rate between different methods: Methods False Core (%) False Delta (%) Chikkerur 22.54 0.0 Peng 12.14 6.67 Yin 5.42 6.4 Proposed 5.71 7.69
  • 32. Comparisons 4/4 25 20 15 False Core False Delta 10 5 0 chikkerur peng yin proposed • Figure: False Core and Delta rate comparison
  • 33. Concluding Remarks • This thesis work proposes and implements a technique for detecting fingerprints using Singular Points for both high and low resolution image. It also helps Recognizing them in low cost and less time overhead. • This thesis works with FCV 2004 database images, which were much noisy. For better results Fingerprint Scanners can be used.
  • 34. Future plan • This thesis work supposes that all the fingerprint images are in straight orientation. So while a fingerprint is rotated than sometimes it fails to recognize it. • All of these works can undergo further study for better results