An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

24
An Identity- authentication system using fingerprints By Jain, Hong, Pankanti and Bolle. Jesse Twardus Chris Del Checcolo Dec. 2 nd 2004

description

An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle. Jesse Twardus Chris Del Checcolo Dec. 2 nd 2004. Presentation Overview. Overview of fingerprint based biometrics systems Fingerprint Minutia Extraction Algorithm Fingerprint Matching Algorithm - PowerPoint PPT Presentation

Transcript of An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Page 1: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

An Identity-authentication system using fingerprints

By Jain, Hong, Pankanti and Bolle.

Jesse TwardusChris Del Checcolo

Dec. 2nd 2004

Page 2: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Presentation Overview

I. Overview of fingerprint based biometrics systems

II. Fingerprint Minutia Extraction Algorithm

III. Fingerprint Matching Algorithm

IV. Advantages / Disadvantages

V. Results

Page 3: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Fingerprint Based Biometric Systems

Image

Acquisition

Feature

Extraction

Feature

MatchingOutcome

Page 4: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Biometrics overview

Identifying an individual based on his/her physiological or behavioral characteristics.

Examples: Iris, Gait, hand geometry, face recognition, speech,DNA,handwriting and fingerprint.

Uses: banking, Physical Access, Information systems, Voter registration and immigration.

Page 5: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Qualities for a successful biometric

Universality Uniqueness Permanence Collectability Performance Acceptability Circumvention

Page 6: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.
Page 7: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Focus on Fingerprints

Oldest biometric Characteristics

Ridges Valleys Minutiae

Core Delta

Page 8: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Focus on Fingerprints cont.

Advantages Ridges and Valleys are different for each finger

and person Fingerprints can be easily classified:

Left loop, right loop, whorl, arch, tented arch Ridges are permanent…and valleys are too.

Page 9: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Steps in the algorithm

Acquire image Estimate orientation field Feature extraction Matching

Page 10: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Acquire image

Problems Inconsistent contact. Nonuniform contact Different finger orientations Distortion

The algorithm attempts to account for the above problems that can occur during image acquisition

Page 11: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Orientation Field Est. Part 1.

Image is divided into WxW sized blocks

Compute the gradient of each pixel

Change in intensity at each pixel

Estimate the orientation field of each block by using the following functions

2

2

2

2

),(),(2),(

wi

wiu

wj

wjv

vuGyvuGxjiVx

2

2

2

2

22 )),(),((),(

wi

wiu

wj

wjv

vuyGvuxGjiVy

)),(

),((tan

2

1, 1

jiVy

jiVxji

Page 12: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Orientation Field Est. Part 2.

Compute the consistency level of the orientation field.

if the consistency level is above a threshold Tc, re-estimate the orientation of this region at a lower resolution level (smaller block)

Dji

jijijiC)','(

2|),()','(|),(

|'|d if(d=(Θ’-Θ+360)mod 360)< 180

d – 180 otherwise

Page 13: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Ridge Detection

Page 14: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Image Thinning

After ridge detection, the resulting image will

have holes and “speckles”

These are smoothed in the following manner:

If the angle formed by a ridge branch is between 70 and 110 degrees and the length of the branch is less than 20 pixels, the branch is removed.

If the break in a ridge is shorter than 15 pixels and no other ridges pass though it, the break is connected

Then the image is thinned

Page 15: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Minutiae Detection

Add up all 8 of the pixel’s neighbors If the sum = 1, pixel is a ridge ending If the sum > 2, pixel is a ridge bifurcation

For each minutiae, we will have the X and Y coordinates, the orientation and its associated ridge segment.

Page 16: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Matching

The images are aligned using the extracted ridges in the following manner: Ridges are matched by

the formula If S is larger than 0.8

then the two ridges are declared a match

L

i

i

l

i

ii

iDd

DdS

0

22

0

Page 17: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Matching cont.

After 2 ridges are matched, estimate the transformation via the following formula.Δx = xd-xD

Δy = yd-yD

Δθ= )(1

0

L

i

iiL

Page 18: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Matching cont.

Translate and rotate all the input minutiae with respect to the reference minutiae

Page 19: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

X

Y

Template2 Template & Input

Page 20: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Matching cont.

The minutiae points are represented as a string in the polar coordinate system.

The strings are matched using the following dynamic programming algorithm

Page 21: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Matching cont.

An adaptive bounding box is used when an inexact match is found

The bounding box is adjusted in the following manner

Page 22: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Paper Results

Average False Accept rate: 0.026% Average False Reject rate: 13.34%

Filterbank FAR = 1.92 FRR = 10.0

Page 23: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Advantages

Robust, simple and fast verification system 1.3 seconds for minutiae extraction and

matching on a Sun ULTRA 1 (170 mhz and 256 megs memory) Filter bank requires approximately 3 seconds

on a Sun ULTRA 10 Small template size: store minutiae points

and ridges, not images. Ridges stored as a 1D discrete signal.

Page 24: An Identity-authentication system using fingerprints By Jain, Hong, Pankanti and Bolle.

Disadvantages

High FRR. Approximately 13 out of 100 people will be rejected.

For a high security location, this rate could be considered ideal.