Fingerprint Direct
Click here to load reader
-
Upload
timoti-adri -
Category
Documents
-
view
212 -
download
0
Transcript of Fingerprint Direct
8/16/2019 Fingerprint Direct
http://slidepdf.com/reader/full/fingerprint-direct 1/6
On Analyzing of Fingerprint Direct-Access Strategies
G. Indrawan1, S. Akbar
2, B. Sitohang
3
123Data & Software Engineering Research Division - School of Electrical Engineering and Informatics
Bandung Institute of TechnologyBandung, Indonesia
Abstract — This paper analyzed several aspect of publicly
available fingerprint direct-access strategies over three public
data sets, including their advantages and drawbacks, related
works, and accuracy performance comparison on the graph of
error rate and penetration rate. On recent research, smaller
penetration rate at certain error rate (smaller area under curve)
could be obtained by certain strategy. Penetration rate equal to
5% could be produced at error rate equal to 4%, 10%, and 1%
on FVC2000 DB2A, FVC2000 DB3A, and FVC2002 DB1A,
respectively. Through this analysis, hopely it could be used as afoundation for better future developments over new strategies or
future improvements over existing strategies in area of
fingerprint identification, especially to obtain more accurate
result with smaller area under curve and achieved with faster
search time.
Keywords— direct-access; error rate; fingerprint; penetration
rate
I. I NTRODUCTION
Recent performance comparison in area of fingerprintdirect-access strategy [1], leaving further question on how farits accuracy and efficiency performance can be improved. In
general, direct-access strategy itself means any searchingstrategy to output a candidate list (CL) without performingone-to-one matching between a query and candidates in thedatabase. A CL from a query will have a list of certain ErrorRate (ER) at certain Penetration Rate (PR). The ER is theaverage percentage of searched queries that are not found, andthe PR is the portion of the database to be searched on theaverage. The accuracy performance is then measured by thegraph of the trade-off between ER and PR that shows at certainER how low PR can be achieved. The efficiency performancewas indicated by its search speed, memory usage andscalability (ability to search on larger database withoutaccuracy degradation).
Based on above question, analysis was conducted onseveral publicly available fingerprint direct-access strategiesover three public data sets, with motivation that this analysiscould be used as a foundation for better future developmentsover new strategies or future improvements over existingstrategies. An analysis was focused on accuracy performancesince systematic comparison can be conducted independentlyfrom hardware platform.
Several proposed fingerprint direct-access strategies have been roughly classified by Cappeli [1], i.e. 1) using globalfeatures such as global ridge-line frequency (e.g., [2]); 2) local
features such as local ridge-line frequency (e.g., [1], [3]), localridge-line orientations (e.g., [1], [2], [3], [4], [5], [6]), and localfeatures from the orientation image (e.g., [7], [8]); 3) minutiaefeatures such as geometric features from minutiae points and
perform searching through hashing strategy: triplets (e.g., [9],[10], [11], [4]), and local-star (e.g., [12], [13]); 4) other featuressuch as FingerCode (e.g., [4]), ridge curvature (e.g., [14]), andSIFT features (e.g., [15]), and matching scores to constructindex keys (e.g., [16], [17]). So, it is quite challenging to docomparison analysis for these various strategies on this area.
The rest of this paper was organized as follows. Section 2compares pros and cons of several direct-access strategiesabove. Section 3 analyses experiments on accuracy result overthree public data sets (several strategies above have no resultsusing those data sets). Finally, Section 4 draws the conclusion.
II. DIRECT ACCESS STRATEGIES
Table I shows three publicly available data sets and their
image samples were shown by Fig. 1. Pros and cons of several
direct-access strategies, including aspect of novelty, features
extraction, indexing and retrieval mechanism were described
hereafter.
TABLE I. THREE PUBLIC DATA SETS FOR ACCURACY COMPARISON.
No Data Set Sensor Type Pixels Direct Access Strategies
1 FVC2000
DB2A[18]
Low-Cost
CapacitiveSensor
256 x
364
De Boer at al. (2001) [4]
Jiang et al. (2006) [2]Liang et al. (2006) [11]
Capelli (2011) [1]
Indrawan et al. (2014) [13]
2 FVC2000DB3A
[18]
OpticalSensor
448 x478
Jiang et al. (2006) [2]Capelli (2011) [1]
Indrawan et al. (2014) [13]
3 FVC2002DB1A
[19]
OpticalSensor
388 x374
Liang et al. (2007) [20]Shuai et al. (2008) [15]
Capelli (2011) [1]Indrawan et al. (2014) [13]
Figure 1. From left to right: sample
fingerprints from FVC2000 DB2A,
FVC2000 DB3A, and FVC2002
DB1. For most of strategies, first
impressions were used for indexcreation (top row), and the others
(bottom row) were used for queries.
Noted, images are not in their actualsize but they are in their scale
difference.
8/16/2019 Fingerprint Direct
http://slidepdf.com/reader/full/fingerprint-direct 2/6
A. De Boer et al. (2001) [4]
The advantages of the proposed strategy start from itsnovelty
1 on indexing by combining multiple features of
Directional Field (DF), FingerCode, and minutiae triplets. Thehighest rank combination of multiple features results in aconsiderably better performance than the schemes that are
based on the individual features. High-resolution segmentationmethods by Bazen et al. (2001) [21] was used that possibly can
eliminate a DF that is estimated from a bad-quality fingerprintimage. An alternative registration point also was defined for anarch type fingerprint that does not contain any singular pointsfor DF estimation.
The drawbacks of this strategy start from its dependency onsingular point for registration points used in DF andFingerCode algorithm, with no anticipation for wrong or non-existing detection (on experiment, need manual correction forwrong detection or manual rejection for non-existingdetection). Running on a 450 MHz Intel Pentium II CPU,FingerCode extraction time takes about 40 seconds, longer thanDF feature vector extraction time, which takes about 15seconds. Searching 2.5% of database, only 77% of queries were
found by the minutiae triplets algorithm which was muchworse than the results by Bhanu et al. (2001) [22] where 100%of queries is found in the top 10 of a database of 400 fingers.This discrepancy might be because of some hiddenimplementation aspects by Bhanu et al. (2001) [22]. Addingminutiae triplets to any combination of features does notimprove the performance significantly. This could be explained
by the previous cause. Moreover, this strategy utilized nomultithreaded algorithm for faster implementation which wasindicated by CPU type mentioned previously.
Related works to unveil sub methods used by this strategywere based on minutiae-triplets based indexing [9], [22]; DF asthe local orientation of the ridge-valley structures [23], [24];
singular points as the discontinuities in the DF [24], [25];segmentation methods possibly to eliminate a DF from a bad-quality image [21]; and FingerCode extraction [26], [27].
B. Jiang et al. (2006) [2]
The advantages of the proposed strategy start from itsnovelty on indexing by combining multiple features oforientation field (main retrieval feature) and dominant ridgedistance (auxiliary retrieval feature). No minutiae needed forindexing since it was extracted through relatively long processthat could bring out spurious features and/or eliminate genuinefeatures. The dominant ridge distance is more robust to thenoise than the simple average ridge distance of a fingerprint.
Also, a new distance measure better quantifies the similarityevaluation between two orientation fields than the conventionalEuclidean and Manhattan measures. Moreover, a variablesearch tolerance was introduced for more efficient retrieval. Database clustering mechanism was also introduced with a fewclusters comparation on retrieval. Experiments show that theclustering-based approach of this strategy achieves betterretrieval results than various exclusive classification methods.
1 Authors believe that novelty is part of the advantage for knowledge
development.
The drawbacks of this strategy start from its accuracy androbustness that was depended on the reference point (itslocation and its direction) to produce a feature vector invariantto the translation and rotation. In fact, a substantial portion ofthe retrieval errors is caused by the falsely or inconsistentlydetected reference point due to poor fingerprint quality (seenext Section III Point 7). Moreover, no notice of multithreadedalgorithm utilization by this strategy.
Related works to unveil sub methods used by this strategywere based on the gradient-based estimation method for theOrientation Field (OF) computation [28], [29], [24];measurement of an anisotropy of OF estimation [30], [31]; thethree features based segmentation algorithm: block mean grayvalue, variance of gray values, and coherence [21]; and two-stage estimation method for the OF computation [32].
C. Liang et al. (2006) [11]
The advantages of the proposed strategy start from itsnovelty on indexing by combining multiple features ofminutiae detail and Delaunay triangle (its handedness, angles,maximum edge, and related angle between orientation field and
edges). Minutia detail represents not only the type but also theshape, which provides more minutiae classes than minutiatypes, so it will reduces search space. Delaunay triangle, whichdescribes of local similarity, provides more insensitivity toelastic distortion. Since Delaunay triangulation creates O(n)triangles, which is much less than O(n
3) triangles created by
triplets based algorithm, more redundant or wrong matchedtriangles are avoided. It will reduce search space using a sameT M as a threshold of maximum number of triangles. Thisstrategy utilized existing minutia extraction algorithm withrelatively small additional computing effort to obtain minutiadetail. All of the correspondences found in indexing can workas control points for estimating the nonlinear mapping function
between two fingerprints during distortion compensation. Moreover, this strategy does not depend on singular point foralignment, avoiding wrong or non-existing detection.
The drawbacks of this strategy start from its minutia detail,which is based on bifurcation-type minutia, would provide lessdiscriminator information on fingerprint whose lack number ofthis minutia type. This type of fingerprint would come from
partial or low-quality image where small number or wrong bifurcation-type minutiae were detected. Also, no notice ofmultithreaded algorithm utilization by this strategy. Moreover,through massive experiments, Liang et al. (2007) [20] showsthat Delaunay triangulation may not be stable if even a tinydistortion is applied on prints.
Related works to unveil sub methods used by this strategywere based on minutiae-triplets based indexing [9], [22];improved minutiae triplets by orientation field and FingerCode[4]; and improved minutiae triplets by novel features e.g.,triangle angles, handedness, type, and direction [10].
D. Liang et al. (2007) [20]
The advantages of the proposed strategy start from itsnovelty by using Low-order Delaunay triangle (LoD triangle)on improvement of indexing of combined multiple featuresabove by Liang et al. (2006) [11]. This strategy includes all of
8/16/2019 Fingerprint Direct
http://slidepdf.com/reader/full/fingerprint-direct 3/6
the advantages by Liang et al. (2006) [11], with the additionalone on insensitivity to small shifts of minutiae by distortionthat reduce time and space complexities (direct effect) andnarrows down the search space in database (indirect effect) bycreating only O(n) Delaunay triangles.
The drawbacks of this strategy are the same as thedrawbacks belong to Liang et al. (2006) [11], with theadditional one on more computational cost to generate certainnumber of additional order 1-Delaunay triangles, especially ondistorted fingerprints.
Related works to unveil sub methods used by this strategywere based on improved minutiae triplets by applyingDelaunay triangulation [33]; and improved minutiae triplets byusing minutia detail and Delaunay triangle [11].
E. Shuai et al. (2008) [15]
The advantages of the proposed strategy start from itsnovelty on indexing by using Scale Invariant FeatureTransformation (SIFT), which has been widely used in genericimage retrieval. Most of the minutiae points actually can also
be detected by SIFT interest point detector. Applying areducing procedure for SIFT results in slight loss ineffectiveness but great improvement in efficiency of retrieval. Moreover, by using Locality-Sensitive Hashing (LSH) on theindex construction phase, makes it could perform similarityqueries by only examining a small fraction of the database.
The drawbacks of this strategy start from its behaviorwithout a reducing procedure that will generate a large numberof features over a broad range of scales and locations. Also, theuncertainty of acquisition (e.g. partialness, distortion) washandled by using a composite set of features from multipleimpressions per finger, no handling if using single impression. Also, no notice of multithreaded algorithm utilization by this
strategy. Moreover, its accuracy comparison on FVC2000DB2A [18] to De Boer at al. (2001) [4] and Jiang et al. (2006)[2], was not head to head comparison because they used firstimpressions per finger for index creation, instead of randomfirst three impressions. Also, De Boer at al. (2001) [4] resultshave been obtained by using additional 80 fingerprints oftraining set “B” [18] (more detail, see next Table II).
Related works to unveil sub methods used by this strategywere based on LSH to index the set of 128-d SIFT descriptors
[34], [35]; and SIFT [36], [37].
F. Capelli (2011) [1]
The advantages of the proposed strategy start from its
novelty on indexing based on vector and scalar features,obtained from ridge-line orientations and frequencies. Itdepend on singular point (core) for alignment using twodetection approach [38], [39] where in case of ambiguities,
both approaches are allowed to propose up to five candidates. Running on a 2.66-GHz Intel Core 2 Quad CPU, scalabilityexperiments on a data set containing one million syntheticfingerprints achieved very good results: indexing one millionfingerprints requires 709 MB of memory, and a search oversuch a large data set takes less than 1 s. Moreover, multithreaded algorithm was already implemented.
The drawbacks of this strategy start from its limitation onlow fingerprint quality that causing incorrect core detectionand/or very noisy features to be extracted. Also, its limitation ison core point that was not present in the image and/or smalloverlapping region between the two fingerprints. Anotherlimitation is on large rotation because the proposed featuresand score measures cannot tolerate a large amount of rotation
between the query and candidate in the database. On FVC2002
DB1A [19] which have largest number of good quality images based on NFIQ measurement [13], this strategy result gaverelatively higher ER at PR below 10% than result on FVC2000DB2A [18]. It need work out to solve this symptom.
Related works to unveil sub methods used by this strategywere based on the traditional gradient-based technique toestimate the local orientations [40]; the fingerprint patternsegmentation from the background. [28]; the local ridge-linefrequencies estimation based on the local orientations [29]; theiterative singularity approach for fingerprint core detection[38]; ridge-line normal approach for fingerprint core detection[39]; and similarity measure inspired by the distance measureof local orientation [2].
G. Indrawan et al. (2014) [13]
The advantages of the proposed strategy start from itsnovelty on indexing by using local-star structure, hashing-
based mechanism, multi stage similarity score computation,and variable-threshold-on-score-ratio based CL reduction. Itutilized existing minutia extraction algorithm that produceinformation of its Cartesian coordinate, orientation, and type,with relatively no additional computing effort. Also it reducedtime complexity for second stage verification [11][20] byreducing CL through variable threshold on score ratio. Thisstrategy do not depend on singular point for alignment,avoiding wrong or non-existing detection. Moreover,
multithreaded algorithm, was already implemented asdescribed by Indrawan et al. (2014) [12].
The drawbacks of this strategy start from unused extractedlocal orientations which has been found very useful forindexing in several other studies by Lumini et al. (1997) [41],Cappelli et al. (1999) [6], Cappelli et al. (2002) [5], Lee et al.(2005) [3], and Jiang et al. (2006) [2]. Also it still has noadvance database clustering mechanism for reducing searchspace. Moreover, no utilization of image quality algorithm bythis strategy. Running on a 2.40 GHz Intel Core 2 Quad CPU, aquery from FVC2000 DB2A (256 x 364 pixel) takes averagetime about 247ms, drastically increasing about triple time for aquery from FVC2000 DB3A (448 x 478 pixel) which takes
average time about 756ms. It need work out to suppress thissymptom.
Related works to unveil sub methods used by this strategywere based on hashing mechanism inspired by minutiae-triplets
based indexing [9]; improved local-star based matching fortranslation and rotation invariant [42]; minutia featuresextraction (Cartesian coordinate, orientation, and type) [43];variable threshold on score ratio to reduce CL length forverification [11], [20], [44]; and Hill-climbing learning foroptimization of 71 algorithm’s parameters [45].
8/16/2019 Fingerprint Direct
http://slidepdf.com/reader/full/fingerprint-direct 4/6
III. EXPERIMENTAL R ESULT COMPARISON
Based on compilation by Capelli [1] and Indrawan et al.[13], Figs. 2 - 4 show accuracy of several fingerprint directaccess strategies on three publicly available data sets. Theexperiment design was summarized by Table II.
Figure 2. Accuracy of direct-access strategies on FVC2000 DB2A.
Figure 3. Accuracy of direct-access strategies on FVC2000 DB3A.
Figure 4. Accuracy of direct-access strategies on FVC2002 DB1A.
TABLE II. ACCURACY COMPARISON OF DIRECT-ACCESS STRATEGIES.
N
oData set Published strategies
Index from
each finger
1 FVC2000
DB2A [18]
(Fig. 2)
De Boer at al. (2001)2 [4]
Jiang et al. (2006) [2]
Liang et al. (2006)2 [11]Capelli (2011)3 [1]
Indrawan et al. (2014) (M3) [13]
Indrawan et al. (2014) (M) [13]
First imp.
First imp.
First imp.First imp.
First imp.
First imp.2 FVC2000
DB3A [18]
(Fig. 3)
Jiang et al. (2006) [2]Capelli (2011)3 [1]
Indrawan et al. (2014) (M3) [13]
Indrawan et al. (2014) (M) [13]
First imp.First imp.
First imp.
First imp.
3 FVC2002
DB1A [19]
(Fig. 4)
Shuai et al. (2008) [15]
Capelli (2011)3 [1]
Indrawan et al. (2014) (M3) [13]Indrawan et al. (2014) (M) [13]
Liang et al. (2007)1, 2 [20]
Shuai et al. (2008)1 [15]Capelli (2011)1, 3 [1]
Indrawan et al. (2014) (M1, 3) [13]
Indrawan et al. (2014) (M1) [13]
Random imp.
First imp.
First imp.First imp.
Random 3 imps.
Random 3 imps.First 3 imps.
First 3 imps.
First 3 imps.1 Results have been obtained by using three fingerprint impressions (3 imps.)
from each finger for index creation, instead of one (imp.).
2 Results have been obtained by using additional 80 fingerprints of training set“B” [18][19], resulting in 880 fingerprints from 110 fingers.
3 Results have been obtained by selecting Top 10% Scores of CL ( N T = N /10).
1. All of the results, except them with a superscript number
“1” (Table II), were obtained by using first fingerprint
impression from each finger for index creation, and the
remaining seven for queries (In this scheme, Indrawan et al.
[13] results were represented by black dashed-lines). The
results with a superscript number “1” were obtained by
using first three fingerprint impressions from each finger
for index creation and the remaining five for queries (In this
scheme, Indrawan et al. [13] results were represented by
grey dashed-lines). Shuai et al. [15] and Liang et al. [20]are the exceptions, as shown by Table II. They used randomimpression or random three impressions from each finger
for index creation. This will have a consequence on
unpredictable quality of created index since first impression
or first three impressions, as it represents or they represent
higher quality image(s) than others from the same finger,
was or were not selected for sure. Because of thatconsequence, random selection is not so appropriate for
head to head comparison. However, they are still worthy
shown to enrich analysis in this paper.
2. All of the results, except them with a superscript number
“2” (Table II), were obtained by using 800 fingerprints of
testing set “A” [18][19] from 100 fingers. The results with asuperscript number “2” were obtained by using additional
80 fingerprints of training set “B” [18][19], resulting in 880
fingerprints from 110 fingers. In another word, the results
with a superscript number “2” were obtained by using
additional 10 impressions for index creation and 70
impressions for queries. Both of the results cannot be
merged for head to head comparison. However once again,
the results with a superscript number “2” are still worthy
shown to enrich analysis in this paper.
8/16/2019 Fingerprint Direct
http://slidepdf.com/reader/full/fingerprint-direct 5/6
3. All of the results, except them with a superscript number
“3” (Table II), were obtained without selecting Top 10%
Scores of CL ( N T = N /10), where N is number ofimpressions used by index creation (number of candidates
in database). The results with a superscript number “3”
were obtained by selecting Top 10% Scores of CL.
4. Based on previous points, Indrawan et al. [13] provides
results that come from two search mode: 1) up to matcher
stage with N T selection of CL (dashed-lines with trianglemark); and 2) up to matcher stage without N T selection of
CL (dashed-lines with round mark). For the next
discussion, two black dashed-lines with triangle and round
mark on Fig. 2, Fig. 3, and Fig. 4, each will be referred as
Matcher 3 (M
3) and Matcher (M). Whilst, two grey dashed-
lines with triangle and round mark on Fig. 4, each will bereferred as Matcher
1,3 (M
1,3) and Matcher
1 (M
1). As Liang
et al. [11], [20] stated that the fingerprint identification can
be divided into fingerprint indexing and fingerprint
verification, M3, M, M
1,3, and M
1 of Indrawan et al. [13]
could be considered as sort of fingerprint verification. As
shown by Table II, M3 and M
1,3 was provided for head to
head comparison each with Capelli3 [1] and Capelli1,3 [1],whilst M and M
1 was provided for head to head comparison
with other strategies. As confirmed by Fig. 2, Fig. 3, and
Fig. 4, M3/M
1,3 was less accurate than M/M
1. M
3/M
1,3 loss
its accuracy in certain degree compare to M/M1 because of
final CL selection by the second step of CL reduction [12]
which is simply selecting maximum top N T candidates ofCL if length of CL longer than N T .
5. This point refers to head to head comparison for strategies
utilizing N T . On Fig. 2 and Fig. 3, up to PR equal to 4%,
Indrawan et al. (M3) [13] gave lower ER rather than
Capelli3 [1]. Larger than PR equal to 4%, Capelli
3 [1] has
faster rate of decrease of its ER to PR, so it gave lower ER
rather than Indrawan et al. (M3) [13]. On Fig. 4, at all PR on
the graph, Indrawan et al. (M3) [13] gave lower ER rather
than Capelli3 [1], and Indrawan et al. (M
1,3) [13] gave lower
ER rather than Capelli1,3
[1]. Moreover, Indrawan et al.
(M1,3
) [13] gave step down ideal curve where it canmaintain its PR equal to 1% for smaller ER. It means for
every query, search result of top one of CL (1% of number
of fingerprint at index) always give correct candidate.
6. This point refers to head to head comparison for strategies
not utilizing N T . On Fig. 2, up to PR equal to 5%, Indrawan
et al. (M) [13] gave lower ER rather than all otherstrategies. Higher than PR equal to 5%, De Boer et al. [4]
(Combined) gave lower ER rather than Indrawan et al. (M)
[13]. Higher than PR equal to 13%, Liang et al. [11] gave
lower ER rather than Indrawan et al. (M) [13]. Higher than
PR equal to 22%, De Boer et al. [4] (Directional Field) gave
lower ER rather than Indrawan et al. (M) [13].
Unfortunately, Indrawan et al. (M) [13] cannot be
compared head to head to De Boer et al. [4] and Liang et al.
[11] because of different number of data set (see Table II).
Moreover, De Boer et al. obtained those results by
manually correcting the core point in 13% of thefingerprints and by discarding 1% of the fingerprints
because no core point could be found. Indrawan et al. (M)
[13] have been performed neither such manual adjustments
nor rejections. Furthermore, Indrawan et al. (M) [13] canonly be compared head to head to Jiang et al. [2] start at PR
equal to 5% where Indrawan et al. (M) [13] gave lower ER
rather than Jiang et al. [2]. On Fig. 3, up to PR equal to
22%, Indrawan et al. (M) [13] gave lower ER rather than
Jiang et al. [2]. Higher than PR equal to 22%, Jiang et al.
[2] gave lower ER rather than Indrawan et al. (M) [13]. OnFig. 4, at all PR on the graph, Indrawan et al. (M) [13] and
Indrawan et al. (M1) [13] gave lower ER rather than all
other strategies, even though no head to head comparison
exist because of different number of data set and different
impression(s) selection mechanism for index creation (see
Table II).7. Beside related to the used methods with their pros and cons,
accuracy performance comparison results also related to the
used data set characteristics. Several points about these
characteristics that could explain those results (point 5 and
6): 1) Jiang et al. [2] stated fingerprints of FVC2000
DB2A have a higher image quality than those of FVC2000
DB3A. At a lower PR, successful retrieval needs closer
similarity between the query and the candidates, which is
more sensitive to the image quality. Therefore, FVC2000
DB2A has better retrieval performance than FVC2000
DB3A at lower PR. However, FVC2000 DB2A has a worseretrieval performance than FVC2000 DB3A at higher PR
because of partial fingerprints whose core point is near the
image edge or out of the image. FVC2000 DB2A has more
such partial fingerprints than FVC2000 DB3A, which fails
to be retrieved even at high PR; 2) About fingerprint image
quality, Indrawan et al. [13] confirmed it by measurementusing NIST Fingerprint Image Quality (NFIQ) algorithm
[46]. NFIQ outputs the image quality value (where 1 is the
highest quality and 5 is the lowest quality) for 800 images
per data set. Percentage of images with quality 1 and 2 (two
highest image quality value) are about 88%, 26%, and 93%
for FVC2000 DB2A, FVC2000 DB3A, and FVC2002DB1A, respectively. Unlike Jiang et al. [2], Indrawan et al.
[13] has nothing to do with core point (not depend on it), so
its retrieval performance on those data sets is in accordance
to their image quality results by NFIQ, i.e. best result on
FVC2002 DB1A, follow by FVC2000 DB2A, and thenFVC2000 DB3A.
IV. CONCLUSION
In this paper, analysis has been conducted for severalaspects of publicly available fingerprint direct-access strategiesover three public data sets. It is including their advantages anddrawbacks, related works to unveil sub methods that constructoverall method, and systematic accuracy comparison which isindependent to the hardware platform. Accuracy comparisongave a thought about “a configuration standardization” sinceseveral different configurations were introduced that makehead to head comparison rather difficult to conduct. However,it could be concluded on this recent accuracy comparison, PRequal to 5% could be obtained at ER equal to 4%, 10%, and
8/16/2019 Fingerprint Direct
http://slidepdf.com/reader/full/fingerprint-direct 6/6
1% each on FVC2000 DB2A, FVC2000 DB3A, and FVC2002DB1A by certain strategies with their certain configuration.
This analysis gives important foundation on providingknowledge for future possible combination of all the best thingfrom the other compared fingerprint direct access strategies.This foundation is for better future developments over newstrategies or future improvements over existing strategiesinclude authors’ work. Better future developments orimprovements is not intended only in area of fingerprint directaccess strategies, but also other data with same fashion ofdirect access mechanism whose final objective to obtain moreaccurate result with smaller area under ER/PR curve andachieved with faster search time.
R EFERENCES
[1] R. Cappelli, “Fast and Accurate Fingerprint Indexing based on Ridge
Orientation and Frequency,” IEEE Trans. Sys., Man, Cybern. B,
Cybern., vol. 41, no. 6, pp. 1511–1521, Dec. 2011.[2] X. Jiang, M. Liu, and A. C. Kot, “Fingerprint Retrieval for
Identification,” IEEE Trans. Inf. Forensics Secur., 2006.
[3] S. O. Lee, Y. G. Kim, and G. T. Park, “A Feature Map Consisting ofOrientation and Inter-Ridge Spacing for Fingerprint Retrieval,” in Proc.
5th Int. Conf. AVBPA, 2005.
[4] J. De Boer, A. M. Bazen, and S. H. Gerez, “Indexing FingerprintDatabases based on Multiple Features,” in ProRISC , 2001.
[5] R. Cappelli, D. Maio, and D. Maltoni, “A Multi-Classifier Approach to
Fingerprint Classification,” Pattern Anal. Appl., 2002.[6] R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, “Fingerprint
Classification by Directional Image Partitioning,” IEEE Trans. Pattern
Anal. Mach. Intell., vol. 21, no. 5, pp. 402–421, May 1999.[7] J. Li, W. Y. Yau, and H. Wang, “Fingerprint Indexing Based on
Symmetrical Measurement,” in Proc. 18th ICPR, 2006.[8] M. Liu, X. Jiang, and A. C. Kot, “Fingerprint Retrieval by Complex
Filter Responses,” in Proc. 18th ICPR, 2006, vol. 1, no. 1.
[9] R. S. Germain, A. Califano, and S. Colville, “Fingerprint Matching
Using Transformation Parameter Clustering,” IEEE Comput. Sci. Eng.,
vol. 4, no. 4, pp. 42–49, Dec. 1997.
[10] B. Bhanu and X. Tan, “Fingerprint Indexing Based on Novel Features
of Minutiae Triplets,” IEEE Trans. Pattern Anal. Mach. Intell., 2003.[11] X. Liang, T. Asano, and A. Bishnu, “Distorted Fingerprint Indexing
Using Minutia Detail and Delaunay Triangle,” in Proc. 3rd ISVD,2006, pp. 217–223.
[12] G. Indrawan, S. Akbar, A. S. Nugroho, and B. Sitohang, “A Multi-
Threaded Fingerprint Direct-Access Strategy Using Local-Star-Structure-based Discriminator Features,” TELKOMNIKA Indones. J.
Electr. Eng., vol. 12, no. 5, pp. 4079–4090, 2014.
[13] G. Indrawan, S. Akbar, and B. Sitohang, “Fingerprint Direct-AccessStrategy Using Local-Star-Structure-based Discriminator Features: A
Comparison Study,” Int. J. Electr. Comput. Eng., 2014.
[14] S. Biswas, N. K. Ratha, G. Aggarwal, and J. Connell, “Exploring RidgeCurvature for Fingerprint Indexing,” in Proc. IEEE 2nd Int. Conf.
BTAS , 2008, pp. 1–6.
[15] X. Shuai, C. Zhang, and P. Hao, “Fingerprint Indexing Based onComposite Set of Reduced SIFT Features,” in Proc. 19th ICPR, 2008.
[16] A. Gyaourova and A. Ross, “A Novel Coding Scheme for IndexingFingerprint Patterns,” in Proc. 7th Int’l Workshop S+SSPR, 2008.
[17] T. Maeda, M. Matsushita, and K. Sasakawa, “Identification Algorithm
Using A Matching Score Matrix,” IEICE Trans. Inf. Syst. - Spec. Issue
Biometric Pers. Authentication, vol. E84-D, no. 7, pp. 819–824, 2001.
[18] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain,
“FVC2000: Fingerprint Verification Competition,” IEEE Trans.
Pattern Anal. Mach. Intell., vol. 24, no. 3, pp. 402–412, Mar. 2002.[19] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain,
“FVC2002: Second Fingerprint Verification Competition,” in Proc.
16th Int’l Conf. Pattern Recognition, 2002, vol. 3, pp. 811–814.
[20] X. Liang, A. Bishnu, and T. Asano, “A Robust Fingerprint Indexing
Scheme Using Minutia Neighborhood Structure and Low-OrderDelaunay Triangles,” IEEE Trans. Inf. Forensics Secur., 2007.
[21] A. M. Bazen and S. H. Gerez, “Segmentation of Fingerprint Images,”
in Proceedings of ProRISC2001, 12th Annu. Workshop Circuits,Systems, and Signal Processing , 2001.
[22] B. Bhanu and X. Tan, “A Triplet based Approach for Indexing of
Fingerprint Database for Identification,” in Proc. 3rd Int. Conf. Audio-and Video-Based Biometric Person Authentication, 2001, pp. 205–210.
[23] A. M. Bazen and S. H. Gerez, “Directional Field Computation for
Fingerprints based on the Principal Component Analysis of LocalGradients,” in Proceedings of ProRISC2000, 11th Annual Workshop on
Circuits, Systems and Signal Processing , 2000.
[24] A. M. Bazen and S. H. Gerez, “Systematic Methods for the
Computation of the Directional Field and Singular Points of
Fingerprints,” IEEE Trans. Pattern Anal. Mach. Intell., 2002.
[25] A. M. Bazen and S. H. Gerez, “Extraction of Singular Points fromDirectional Fields of Fingerprints,” in Mobile Communications in
Perspective, CTIT Workshop on Mobile Communications, University of
Twente, 2001, pp. 41–44.[26] A. K. Jain, S. Prabhakar, and L. Hong, “A Multichannel Approach to
Fingerprint Classification,” IEEE Trans. Pattern Anal. Mach. Intell.,
vol. 21, no. 4, pp. 348–359, Apr. 1999.[27] A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, “Filterbank-based
Fingerprint Matching,” IEEE Trans. Image Process., 2000.
[28] D. Maio and D. Maltoni, “Direct Gray-Scale Minutiae Detection in
Fingerprints,” IEEE Trans. Pattern Anal. Mach. Intell., 1997.[29] L. Hong, Y. Wan, and A. K. Jain, “Fingerprint Image Enhancement:
Algorithm and Performance Evaluation,” IEEE Trans. Pattern Anal.
Mach. Intell., vol. 20, no. 8, pp. 777–789, 1998.
[30] A. K. Jain, L. Hong, and R. Bolle, “On-line Fingerprint Verification,” IEEE Trans. Pattern Anal. Mach. Intell., 1997.
[31] A. K. Jain, L. Hong, S. Pankanti, and R. Bolle, “An Identity-
authentication System Using Fingerprints,” in Proc. IEEE , 1997.[32] X. D. Jiang, “On Orientation and Anisotropy Estimation for Online
Fingerprint Authentication,” IEEE Trans. Signal Process., 2005.
[33] G. Bebis, T. Deaconu, and M. Georgiopoulos, “Fingerprint
Identification Using Delaunay Triangulation,” in Proc. Int. Conf.
Information Intelligence and Systems, 1999, pp. 452–459.
[34] A. Gionis, P. Indyk, and R. Motwani, “Similarity Search in HighDimensions via Hashing,” in Proc. 25th Int’l Conf. VLDB, 1999.
[35] Y. Ke, R. Sukthankar, and L. Huston, “Efficient Near-Duplicate
Detection and Sub-Image Retrieval,” in Proc. ACM Multimedia Conf.,2004, pp. 869–876.
[36] D. G. Lowe, “Distinctive Image Features from Scale-Invariant
Keypoints,” Int. J. Comput. Vis., vol. 60, no. 2, pp. 91–110, 2004.[37] J. J. Foo and R. Sinha, “Pruning SIFT for Scalable Near-Duplicate
Image Matching,” in Proc. 18th ADC , 2007, pp. 63–71.
[38] K. Karu and A. K. Jain, “Fingerprint Classification,” Pattern Recog.,vol. 29, no. 3, pp. 389–404, Mar. 1996.
[39] K. Rerkrai and V. Areekul, “A New Reference Point for Fingerprint
Recognition,” in Proc. Int. Conf. Image Process., 2000, pp. 499–502.[40] N. K. Ratha, S. Y. Chen, and A. K. Jain, “Adaptive Flow Orientation-
based Feature Extraction in Fingerprint Images,” Pattern Recog., 1995.
[41] A. Lumini, D. Maio, and D. Maltoni, “Continuous versus ExclusiveClassification for Fingerprint Retrieval,” Pattern Recog. Lett., 1997.
[42] N. K. Ratha, V. D. Pandit, R. M. Bolle, and V. Vaish, “Robust
Fingerprint Authentication Using Local Structural Similarity,” in Proc.
Work. Appl. Comput. Vis., 2000, pp. 29–34.[43] R. Vazan, “SourceAFIS | Fingerprint Recognition Library for .NET and
Experimentally for Java,” 2009. [Online]. Available:
http://sourceforge.net/projects/sourceafis/. [Accessed: 25-Oct-2013].
[44] R. Cappelli, M. Ferrara, and D. Maio, “Candidate List Reduction Based
on The Analysis of Fingerprint Indexing Scores,” IEEE Trans. Inf. Forensics Secur., vol. 6, no. 3, pp. 1160–1164, Sep. 2011.
[45] S. J. Russell and P. Norvig, Artificial Intelligence: A Modern
Approach, 2nd ed. New Jersey: Upper Saddle River, 2003.[46] C. I. Watson, M. D. Garris, E. Tabassi, C. L. Wilson, R. M. McCabe, S.
Janet, and K. Ko, “User’s Guide to NIST Biometric Image Software,”
Gaithersburg, 2004.