×

An application of the onion peeling algorithm for fingerprint verification purposes. (English) Zbl 1110.68492

Summary: We apply digital image processing techniques using the onion algorithm of computational geometry to develop fingerprint verification. This paper describes the design and implementation of a fingerprint verification system, which operates in two stages: (i) pre-processing stage (ii) feature extraction using a Computational Geometry Algorithm (CCA). This method may be characterized as an alternative method to well-known minutiae extraction algorithms. In particular, the proposed method is based on specific features, which depend exclusively on the pixels brightness degree of the fingerprint image. These were extracted from a specific geometric area (convex layer) in which the dominant brightness value of the fingerprint ranges. The proposed algorithm is also compared to a well-known commercial verification system which is based on a minutiae extraction algorithm proposed by Jain et al. In the experimental part 2256 verification on tests for each of the two methods took place. The results of this comparison showed that the proposed method yields correct positive and correct negative verification scores greater than 99%. In particular, the proposed CGA method produced extremely reliable results even in cases where the tested fingerprints were complete specimens yet the position or pressure applied wa not consistent. The computational complexity of the proposed aigorithm may also he characterized as extreme competitive.

MSC:

68T10 Pattern recognition, speech recognition
68W05 Nonnumerical algorithms
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Jain, A. K., Ross, A. and Pankanti, S. Fingerprint matching using minutiae and texture features. in Proc. International Conference on Image Processing (ICIP), pp.282–285. Greece: Thessalonica.
[2] Maio D., IEEE Transactions on PAMI 19 (1) pp 27– (1997) · Zbl 05110534 · doi:10.1109/34.566808
[3] Calabrese C., Login 24 (4) pp 56– (1999)
[4] O’Gorman L., Fingerprint verification in Biometrics (1999)
[5] Random Structure Algorithms 24 (2) pp 155– (2004) · Zbl 1041.60011 · doi:10.1002/rsa.10114
[6] Poon T., Contemporary Optical Image Processing with Matlab (2001)
[7] Bracewell R., Two-Dimensional Imaging (1995) · Zbl 0867.68113
[8] Nixon M., Feature Extraction and Image Processing (2002)
[9] Gonzales R., Digital Image Processing (2002)
[10] Spiegel M., Theory and Problems of Vector Analysis (1974)
[11] O’Rourke J., Computational Geometry in C (1993)
[12] O’Rourke J., Comput. Graph. Image Proees 19 (4) pp 384– (1982) · Zbl 0533.52001 · doi:10.1016/0146-664X(82)90023-5
[13] Hachez, G., Koeune, F. and Quisquater, U. Biometrics, access control, smart cards: a not so simple combination. Bristol. in Proc. of the 4th Working Conference on Smart Card Research and Advanced Applications(CARDIS 2000), pp.273–288.
[14] Jain A. K., in Proc. IEEE Conference on CVPR, Colorado 2 pp 187– (1999)
[15] Jain A. K., System and method for deriving a string-based representation of a fingerprint image 6 pp 487– (2002)
[16] Jain A. K., Determining an alignment estimation between two (fingerprint) images 6 pp 314– (2001)
[17] Zar J. H., Biostatistical Analysis (1999)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.