• Title/Summary/Keyword: fingerprint Recognition

Search Result 272, Processing Time 0.033 seconds

Fingerprint Pore Extraction Method using 1D Gaussian Model (1차원 가우시안 모델을 이용한 지문 땀샘 추출 방법)

  • Cui, Junjian;Ra, Moonsoo;Kim, Whoi-Yul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.4
    • /
    • pp.135-144
    • /
    • 2015
  • Fingerprint pores have proven to be useful features for fingerprint recognition and several pore-based fingerprint recognition systems have been reported recently. In order to recognize fingerprints using pore information, it is very important to extract pores reliably and accurately. Existing pore extraction methods utilize 2D model fitting to detect pore centers. This paper proposes a pore extraction method using 1D Gaussian model which is much simpler than 2D model. During model fitting process, 1D model requires less computational cost than 2D model. The proposed method first calculates local ridge orientation; then, ridge mask is generated. Since pore center is brighter than its neighboring pixels, pore candidates are extracted using a $3{\times}3$ filter and a $5{\times}5$ filter successively. Pore centers are extracted by fitting 1D Gaussian model on the pore candidates. Extensive experiments show that the proposed pore extraction method can extract pores more effectively and accurately than other existing methods, and pore matching results show the proposed pore extraction method could be used in fingerprint recognition.

An Algorithm of Fingerprint Image Restoration Based on an Artificial Neural Network (인공 신경망 기반의 지문 영상 복원 알고리즘)

  • Jang, Seok-Woo;Lee, Samuel;Kim, Gye-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.530-536
    • /
    • 2020
  • The use of minutiae by fingerprint readers is robust against presentation attacks, but one weakness is that the mismatch rate is high. Therefore, minutiae tend to be used with skeleton images. There have been many studies on security vulnerabilities in the characteristics of minutiae, but vulnerability studies on the skeleton are weak, so this study attempts to analyze the vulnerability of presentation attacks against the skeleton. To this end, we propose a method based on the skeleton to recover the original fingerprint using a learning algorithm. The proposed method includes a new learning model, Pix2Pix, which adds a latent vector to the existing Pix2Pix model, thereby generating a natural fingerprint. In the experimental results, the original fingerprint is restored using the proposed machine learning, and then, the restored fingerprint is the input for the fingerprint reader in order to achieve a good recognition rate. Thus, this study verifies that fingerprint readers using the skeleton are vulnerable to presentation attacks. The approach presented in this paper is expected to be useful in a variety of applications concerning fingerprint restoration, video security, and biometrics.

Robust Orientation Estimation Algorithm of Fingerprint Images (노이즈에 강인한 지문 융선의 방향 추출 알고리즘)

  • Lee, Sang-Hoon;Lee, Chul-Han;Choi, Kyoung-Taek;Kim, Jai-Hie
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.55-63
    • /
    • 2008
  • Ridge orientations of fingerprint image are crucial informations in many parts of fingerprint recognition such as enhancement, matching and classification. Therefore it is essential to extract the ridge orientations of image accurately because it directly affects the performance of the system. The two main properties of ridge orientation are 1) global characteristic(gradual change in whole part of fingerprint) and 2) local characteristic(abrupt change around core and delta points). When we only consider the local characteristic, estimated ridge orientations are well around singular points but not robust to noise. When the global characteristic is only considered, to estimate ridge orientation is robust to noise but cannot represent the orientation around singular points. In this paper, we propose a novel method for estimating ridge orientation which represents local characteristic specifically as well as be robust to noise. We reduce the noise caused by scar using iterative outlier rejection. We apply adaptive measurement resolution in each fingerprint area to estimate the ridge orientation around singular points accurately. We evaluate the performance of proposed method using synthetic fingerprint and FVC 2002 DB. We compare the accuracy of ridge orientation. The performance of fingerprint authentication system is evaluated using FVC 2002 DB.

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server (개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델)

  • Lee, Yong-Joon;Jeon, Taeyeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2019
  • Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.

A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors (임베디드 프로세서에 적합한 LSB 기반 지문영상의 효율적인 부분 암호화 방법)

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Kim, Ju-Man
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1304-1313
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a specific bitplane of each pixel of the fingerprint image. We use the LSB as specific bitplane instead of MSB used to encrypt general multimedia contents because simple attacks can reveal the fingerprint ridge information even from the MSB-based encryption. Based on the experimental results, our proposed algorithm can reduce the execution time of the full encryption by a factor of six and guarantee both the integrity and the confidentiality without any leakage of the ridge information.

  • PDF

A Study on the fingerprint images classification based on the changes of direction fields of fingerprint images (방향척도을 이용한 지문영상 분류에 관한 연구)

  • Kim, S.G.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.108-113
    • /
    • 2007
  • The classification of fingerprint images is to classify fingerprint images into varies fingerprint types, it is very important in automatic fingerprint recognition. In this paper, a new singular points detection technique was presented. A direction uniform measure is defined to describe the changes of direction fields in a certain neighborhood of fingerprint images. Singular points can be detected by adopting the measure. It should be pointed out that singular points in accurate positions would be obtained in this ways. And an improved Poincare exponential algorithm is presented to identify core points and triangle points. In this paper. making use of 102 experimental fingerprint images datas and attained 7.8% classification errors. This was better than experimental result of abstract [9]. It is possible to use on-line fingerprint images classification.

Fingerprint Images Registration Method by Recursive Ridge Mapping (점진적 융선 정합을 통한 지문 영상 정렬 방법)

  • Choi, Kyoung-Taek;Choi, Hee-Seung;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1007-1010
    • /
    • 2005
  • This paper presents a fingerprint image registration method. In the fingerprint system, the insufficiency of mutual information between a template and a query fingerprint is one of major factors to deteriorate recognition performance. To overcome this problem, we need to register multiple impressions and integrate their information. Our method matches the ridges from multiple impressions recursively and then registers the impressions to minimize the registration error calculated from the Distance map. Our method use regularized TPS model as the transformation model to compensate for the plastic deformation. We compare our method with 3 prior arts (ICP, Distance Map, Ross's method). Our registration error and its' variance is the smallest and also the average registration error is below 3 pixels.

  • PDF

A Study on Safe Identification Card Using Fingerprint Recognition and Encrypted QR (지문인식기술과 암호화된 QR코드를 이용한 안전한 신분증 연구)

  • Song, Chung-Geon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.317-323
    • /
    • 2014
  • The registration cards that are currently used to identify the people of Korea may cause secondary damage once stolen because they contain very specifically expressed fingerprint information. In order to solve this problem, in ID is required that can utilize the state-owned fingerprint DB, while while maintaining confidentiality of the identification information and satisfying the cost as well. At this point accordingly, a secure form of ID, which uses the encrypted QR code and fingerprint information, is proposed.

Thinning Processor for 160 X 192 Pixel Array Fingerprint Recognition

  • Jung, Seung-Min
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.570-574
    • /
    • 2010
  • A thinning algorithm changes a binary fingerprint image to one pixel width. A thinning stage occupies 40% cycle of 32-bit RISC microprocessor system for a fingerprint identification algorithm. Hardware block processing is more effective than software one in speed, because a thinning algorithm is iteration of simple instructions. This paper describes an effective hardware scheme for thinning stage processing using the Verilog-HDL in $160\times192$ Pixel Array. The ZS algorithm was applied for a thinning stage. The hardware scheme was designed and simulated in RTL. The logic was also synthesized by XST in FPGA environment. Experimental results show the performance of the proposed scheme.

A Study on CRM(Center of Rotation Method) based on MST(Minimum Spanning Tree) Matching Algorithm for Fingerprint Recognition

  • Kwon, Hyoung-Ki;Lee, Jun-Ho;Ryu, Young-Kee
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.55.5-55
    • /
    • 2001
  • The MST (Minimum Spanning Tree) matching algorithm had been used for searching the part accord points extracted from the gray level fingerprint image. The method, however, had some limitations. To obtain the relationship between enrolled and inputted fingerprint, the MST was used to generate the tree graph that represent the unique graph for given fingerprint data. From the graph, the accord points are estimated. However, the shape of the graph highly depends on the positions of the minutiae. If there are some pseudo minutiae caused by noise, the shape of the graph will be different In this paper, to overcome the limitations of the MST, we proposed CRM (Center of Rotation Method) algorithm that found the true part accord points. The proposed method is based on the assumption ...

  • PDF