Elsevier

Pattern Recognition

Volume 67, July 2017, Pages 110-126
Pattern Recognition

Fingerprint indexing based on minutiae pairs and convex core point

https://doi.org/10.1016/j.patcog.2017.01.022Get rights and content

Highlights

  • An efficient fingerprint indexing, which uses ellipse properties, is proposed.

  • A new fingerprint indexing is proposed using minutiae pairs and convex core point.

  • Our fingerprint representation is very robust to distortions and noise.

  • The proposed fingerprint features are invariant to rotation and translation.

Abstract

Fingerprint identification is an important issue for identifying fingerprints and plays a key role in the fingerprint recognition systems. However, performing a fingerprint identification over a large database can be an inefficient task due to the lack of scalability and high computing times of fingerprint matching algorithms. Fingerprint indexing is a key strategy in automatic fingerprint identification systems (AFISs) which allows us to reduce the number of candidates, the search space, and the occurrences of false acceptance in large databases. In this paper, an efficient indexing algorithm is proposed using minutiae pairs and convex core point which employs k-means clustering and candidate list reduction criteria to improve the identification performance. Our proposal can effectively reduce the search space and number of candidates for fingerprint matching, and thus achieves higher efficiency and significantly improves the system retrieval performance. Experimental results over some of the fingerprint verification competition (FVC) and the national institute of standards and technology (NIST) databases prove the superiority of the proposed approach against some of the well known indexing algorithms.

Introduction

Fingerprints are physiological characteristics of biometric recognition and have been extensively used in both forensic and non-forensic applications [49]. A fingerprint is the pattern of ridges (single curved segments) and valleys (regions that lies in between ridges) on the surface of a fingertip [41], [74]. Fig. 1 shows an example of gray-scale image of fingerprint and the details extracted from it.

A fingerprint recognition system may be called either a verification system or an identification system. The aim of fingerprint verification systems is to focus on matching the fingerprint of a person with his/her stored fingerprint templates, i.e., matching module works in one-to-one comparison mode. In these systems, the speed of a comparison mainly depends on how the similarity measure is evaluated between a query print (probe) and the fingerprint stored in the database (gallery), whereas the selection of the similarity measure usually depends on representation of the features. On the other hand the aim of the fingerprint identification systems is to establish the identity of a person, given a query print and a database of enrolled fingerprints of different individuals to seek a match. In these systems, matching module works in one-to-many comparison mode [22], [39], [49], [52], [70]. If the number of templates in a database are N, thus identification systems can be viewed as a series of N one-to-one comparisons [49], [58].

Most of the well known fingerprint matching algorithms are fast and quite accurate to deal with small databases [59], but nowadays the size of most of modern fingerprint databases is very large and need a search on all gallery fingerprints which affect both accuracy and efficiency of fingerprint matching [7], [22], [52]. If there is a need for finding a person among these databases, it must be done in reasonable time, often shorter than a few seconds. Within this context, the bottleneck step in the identification process is the matching algorithm, because it must be performed once per each gallery to determine which one has the most similary with the probe.

There are various methods to reduce the search time and computational complexity, and to speed up the matching process in the literature [52], [58]. Generally, reducing the number of comparisons and increasing the speed of a comparison can efficiently speed up the matching process [70].

Fingerprint pre-selection techniques can significantly reduce the search space [49]. These techniques can be classified into two main groups: exclusive classification, a fixed number of classes, and continuous classification, fingerprint indexing [7], [10], [46]. In exclusive classification, a fingerprint database is divided to a fixed number of classes and the query print is compared with those belonging to the same class [46]. However, exclusive classification has two drawbacks:

  • Even with fixed number of classes involved exclusive classification is still a challenging problem due to small inter-class variability (much similarity between two images from different fingers), large intra-class variability (large variability in different impressions of the same finger), poor quality fingerprints, and the presence of noise [49].

  • The number of classes in which the search space is divided are small and fingerprints are unevenly distributed among them. For instance in Galton-Henry classification scheme, that consists of five major classes: whorl, left loop, right loop, arch, and tended arch, about 93% of the fingerprints belong to three classes right loop, left loop, and whorl [7], [10], [22], [23], [49], [52].

Therefore, using exclusive classification will not effectively reduce the number of potential candidates to a minimum.

Fingerprint indexing works by associating a query print with index codes or feature vectors that best describe their features [32]. Each extracted feature vector is used to conform an index which is stored in an index table. When a query is performed in the retrieving stage, the number of correspondences between the indices of the query and gallery fingerprints are computed [52].

Extraction of discriminative and reliable features is crucial for fingerprint indexing. Fingerprint indexing algorithm is usually at first is used to quickly choose a subset of candidates and then accurate but slower matching algorithm is employed to determine the final result [63]. Fingerprint indexing causes reduction of the search space of AFIS without missing accuracy [46], [52] and can be classified into three approaches [63]:

  • Level-1 indexing: These approaches use level-1 features, such as the ridge flow structures, pattern types, orientation field, ridge frequency field and singular points (core and delta), and are commonly faster than level-2 indexing approaches.

  • Level-2 indexing: These approaches are based on level-2 features (minutiae).

  • Combined indexing: These approaches combine both level-1 and level-2 features to arrive at a better performance.

Other solutions to deal with large databases are related to hardware and parallel computing. Jiang and Crookes [37] presented an efficient implementation of fingerprint matching on field-programmable gate arrays (FPGAs), which takes advantage of an early jump-out (EJO) mechanism to speed up the large database retrieval. Peralta et al. [59] proposed a two-level distributed and parallel framework that allows a parallel search through the fingerprint database, providing an increased system performance. Gutiérrez et al. [28] presented a graphics processing unit (GPU) fingerprint matching system based on minutia cylinder-code (MCC). GPUs provide large-scale parallelism on computing platforms.

In this paper we introduce a new fingerprint indexing algorithm, a combined indexing approach, based on the minutiae pairs and convex core point which employs k-means clustering and candidate list reduction criteria to speed up the search and to improve the accuracy in large databases. k-means clustering and candidate list reduction criteria can effectively reduce the search space and number of candidates in fingerprint matching, and thus achieve higher efficiency and significantly improve the system retrieval performance. Experiments over six data sets demonstrate that the proposed algorithm outperforms some of the best state-of-the-art indexing algorithms.

The remainder of the paper is organized as follows. Section 2 presents a review of some of the related work in fingerprint indexing. Section 3 deals with image enhancement and feature extraction. Section 4 discusses the proposed indexing approach. Section 5 presents experimental results and analysis. Finally, Section 6 draws some conclusions.

Section snippets

Related work

Many fingerprint indexing approaches have been reported in the literature. We classify these approaches according to the level-2 features used for indexing into the following categories: non-minutia based approaches, minutia single based approaches, minutiae double based approaches, minutiae triplet based approaches, minutiae quadruplet based approaches, minutia K-Plet based approaches, and minutia cylinder-code (MCC) based approaches. In general, the difference between indexing methods is

Preprocessing and fingerprint image enhancement

The first processing step after fingerprint image acquisition is segmentation, that is, dividing a fingerprint image into foreground and background regions. Several fingerprint image segmentation techniques have been proposed in the literature. In this paper, we employ fingerprint image segmentation proposed by Fahmy and Thabet [15]. After carrying out the segmentation, fingerprint image enhancement has been employed to reduce noise and to increase the contrast between ridges and valleys in the

Indexing features and technique

After performing the fingerprint features extraction, we obtain the true minutiae and convex core point from the fingerprint image. In this section, we propose an indexing algorithm that uses minutiae pairs and the convex core point u, combined with a strategy that employs a weighting method to take into account the significance and importance of feature vectors.

By pairing up any two minutiae mi and mj, in the set M, a minutiae pair (mi, mj) can be constructed. Hence, our weighting method is

Experiment results and analysis

An exhaustive experimental evaluation has been carried out in this research to study the performance of the proposed algorithm. This evaluation has been performed on several data sets in order to evaluate the effectiveness and robustness of the proposed algorithm with respect to distortions and low-quality fingerprint images. Fig. 9 displays average number of minutiae obtained using different quality thresholds to filter the minutiae. In Fig. 9(a), M1 is minutiae set belongs to high quality

Conclusions

In this paper, we have introduced a novel fingerprint indexing algorithm based on minutiae details and convex core point. This algorithm uses a new representation of the fingerprints based on the triangles and their deep relations to ellipses, which is invariant to rotation and translation and is robust to distortions. Also, we have employed a k-means clustering algorithm and candidate list reduction criteria to increase performance of our indexing algorithm.

Experiments on some of the data sets

Acknowledgments

The authors would like to thank the anonymous reviewers for their valuable comments and suggestions, which have contributed a lot towards improving the content and presentation of this paper.

Javad Khodadoust received his B.Sc. and M.Sc. degrees in computer engineering from the Payame Noor University (PNU), Iran, in 2011 and 2014, respectively. His research interests include pattern recognition, image processing, computer vision, biometrics, and machine learning.

References (76)

  • M. Liu et al.

    Invariant representation of orientation fields for fingerprint indexing

    Pattern Recognit.

    (2012)
  • A. Muñoz-Briseño et al.

    Fingerprint indexing with bad quality areas

    Expert Syst. Appl.

    (2013)
  • D. Peralta et al.

    Minutiae filtering to improve both efficacy and efficiency of fingerprint matching algorithms

    Eng. Appl. Artif. Intell.

    (2014)
  • D. Peralta et al.

    A survey on fingerprint minutiae-based local matching for verification and identification: taxonomy and experimental evaluation

    Inf. Sci.

    (2015)
  • D. Peralta et al.

    Fast fingerprint identification for large databases

    Pattern Recognit.

    (2014)
  • P.J. Rousseeuw

    Silhouettes: a graphical aid to the interpretation and validation of cluster analysis

    J. Comput. Appl. Math.

    (1987)
  • Y. Su et al.

    Fingerprint indexing with pose constraint

    Pattern Recognit.

    (2016)
  • P. Sutthiwichaiporn et al.

    Adaptive boosted spectral filtering for progressive fingerprint enhancement

    Pattern Recognit.

    (2013)
  • T. Uz et al.

    Minutiae-based template synthesis and matching for fingerprint authentication

    Comput. Vision Image Underst.

    (2009)
  • S. Wang et al.

    Alignment-free cancelable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach

    Pattern Recognit.

    (2012)
  • C. Winter et al.

    Fast indexing strategies for robust image hashes

    Digital Invest.

    (2014)
  • E. Zhu et al.

    Walking to singular points of fingerprints

    Pattern Recognit.

    (2016)
  • C. Bai et al.

    An efficient indexing scheme based on k-plet representation for fingerprint database

    Proceedings International Conference on Intelligent Computing

    (2015)
  • G. Bebis et al.

    Fingerprint identification using delaunay triangulation

    Proceedings International Conference Information Intelligence and Systems

    (1999)
  • F. Belhadj et al.

    Efficient fingerprint singular points detection algorithm using orientation-deviation features

    J. Electron Imag.

    (2015)
  • B. Bhanu et al.

    Fingerprint indexing based on novel features of minutiae triplets

    IEEE Trans. Pattern Anal. Mach. Intell.

    (2003)
  • S. Biswas et al.

    Exploring ridge curvature for fingerprint indexing

    Proceedings of the 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS)

    (2008)
  • G.R. Bradski et al.

    Learning OpenCV: Computer Vision with the OpenCV Library

    (2009)
  • R. Cappelli

    Fast and accurate fingerprint indexing based on ridge orientation and frequency

    IEEE Trans. Syst. Man Cybern.

    (2011)
  • R. Cappelli et al.

    Minutia cylinder-code: a new representation and matching technique for fingerprint recognition

    IEEE Trans. Pattern Anal. Mach. Intell.

    (2010)
  • R. Cappelli et al.

    Fingerprint indexing based on minutia cylinder-code

    IEEE Trans. Pattern Anal. Mach. Intell.

    (2011)
  • R. Cappelli et al.

    Candidate list reduction based on the analysis of fingerprint indexing scores

    IEEE Trans. Inf. Forensics Secur.

    (2011)
  • S. Chikkerur et al.

    K-plet and coupled BFS: a graph based fingerprint representation and matching algorithm

    Proceedings International Conference on Biometrics (ICB 2006)

    (2005)
  • H. Choi et al.

    Fingerprint matching incorporating ridge features with minutiae

    IEEE Trans. Inf. Forensics Secur.

    (2011)
  • K. Choi et al.

    An improved fingerprint indexing algorithm based on the triplet approach

    Proceedings of the 4th International Conference Audio and Video based Biometric Person Authentication (AVBPA03)

    (2003)
  • J. Demšar

    Statistical comparisons of classifiers over multiple data sets

    J. Mach. Learn. Res.

    (2006)
  • M.F. Fahmy et al.

    A fingerprint segmentation technique based on morphological processing

    Proceedings IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)

    (2013)
  • H. Fronthaler et al.

    Local features for enhancement and minutiae extraction in fingerprints

    IEEE Trans. Image Process.

    (2008)
  • Cited by (0)

    Javad Khodadoust received his B.Sc. and M.Sc. degrees in computer engineering from the Payame Noor University (PNU), Iran, in 2011 and 2014, respectively. His research interests include pattern recognition, image processing, computer vision, biometrics, and machine learning.

    Ali Mohammad Khodadoust received his B.Sc. degree in electrical engineering from Khavaran Institute of Higher Education (KHI), Iran, in 2010 and his M.Sc. degree in electrical engineering from Sadjad University of Technology, Iran, in 2013. His research interests include image processing, signal processing, and wireless systems.

    View full text