• Title/Summary/Keyword: fingerprint image

Search Result 240, Processing Time 0.033 seconds

Practically Secure and Efficient Random Bit Generator Using Digital Fingerprint Image for The Source of Random (디지털 지문 이미지를 잡음원으로 사용하는 안전하고 효율적인 난수 생성기)

  • Park, Seung-Bae;Joo, Nak-Keun;Kang, Moon-Seol
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.541-546
    • /
    • 2003
  • We present a random bit generator that uses fingerprint image as the source of random, and the random bit generator is the first generator in the world that uses biometric information for the source of random in the world. The generator produces, on the average, 9,334 bits a fingerprint image in 0.03 second, and the produced bit sequence passes all 16 statistical tests that are recommended by NIST for testing the randomness.

Image Fingerprint for Contents based Video Copy Detection Using Block Comparison (블록 비교를 이용한 내용기반 동영상 복사 검색용 영상 지문)

  • Na, Sang-Il;Jin, Ju-Kyoun;Cho, Ju-Hee;Oh, Weon-Geun;Jeong, Dong-Seok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.5
    • /
    • pp.136-144
    • /
    • 2010
  • Two types of informations are used for content-based video copy detection: spatial information and temporal information. The spatial information means content-based image fingerprint. This image fingerprint must have following characteristic. First, Extraction is simple. Second, pairwise independence for random selected two images. At last, Robust for modifications. This paper proposed image fingerprint method for contents based video copy detection. Proposed method's extraction speed is fast because this method's using block average, first order differentiation and second order differentiation that can be calculated add and minus operation. And it has pairwise independence and robust against modifications. Also, proposed method feature makes binary by comparisons and using coarse to fine structure, so it's matching speed is fast. Proposed method is verified by modified image that modified by VCE7's experimental conditions in MPEG7.

Detection of Fingerprint Ridge Direction Based on the Run-Length and Chain Codes (런길이 및 체인코드를 이용한 지문 융선의 방향 검출)

  • Lee Jeong-Hwan;Park Se-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1740-1747
    • /
    • 2004
  • In this paper, we proposed an effective method for detecting fingerprint ridge direction based on the run-length and chain codes. First, a fingerprint image is normalized, and it is thresholded to obtain binary image with foreground and background regions. The foreground regions is composed of fingerprint ridges, and the ridges is encoded with the run-length and chain codes. To detect directional information, the boundary of ridge codes is traced, and curvature is calculated at ecah point of boundary. And the detected direction value is smoothed with appropriate window locally. The proposed method is applied to NIST and FVC2002 fingerprint database to evaluate performance. By the experimental results, the proposed method can be used to obtain ridge direction value in fingerprint image.

Fingerprint Image Generation using Filter Combination based on the Genetic Algorithm (GA기반 영상필터 조합을 이용한 지문영상생성)

  • Cho, Ung-Keun;Hong, Jin-Hyuk;Cho, Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.5
    • /
    • pp.455-464
    • /
    • 2007
  • The construction of a fingerprint database is important to evaluate the performance of an automatic fingerprint recognition system. Due to the cost of collecting fingerprints, there are only few benchmark databases available. Since it is hard to evaluate how robust the system is in various environments with the databases, this paper proposes a novel method that generates fingerprint images automatically from only a few training samples by using the genetic algorithm. Fingerprints generated by the proposed method include similar characteristics of those collected from the corresponding real environment. The proposed method has been verified by comparing with real fingerprint images, showing the usefulness of the method.

Quality Assessment of Fingerprint Images and Correlation with Recognition Performance (지문 영상의 품질 평가 및 인식 성능과의 상관성 분석)

  • Shin, Yong-Nyuo;Sung, Won-Je;Jung, Soon-Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.61-68
    • /
    • 2008
  • In this paper, we propose a new method to assess fingerprint image quality. In the proposed method, analysis of local variance of image's gray values, local orientation, minutiae density, size and position is applied. Especially by using position information of inputted fingerprint images, partial fingerprint images are filtered and recognition performance is improved. In the experimental results, quality threshold value for improving performance can be decided by analysis of correlation between image quality and recognition rate.

Image Fingerprinting Scheme for Print-and-capture Attacking Model (Print-and-capture 공격 모델을 위한 이미지 핑거프링팅 기법)

  • Lee, Seon-Hwa;Kim, Won-Gyum;Seo, Yong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.427-428
    • /
    • 2006
  • This paper presents an image fingerprinting scheme for the print-to-capture model performed by a photo printer and digital camera. When capturing an image by a digital camera, various kinds of distortions such as noise, geometrical distortions, and lens distortions are applied. slightly and simultaneously. In this paper, we consider several steps to extract fingerprints from the distorted image in print-and capture scenario. To embed ID into an image as a fingerprint, multi-bits embedding is applied. We embed 64 bits information as a fingerprint into spatial domain of color images. In order to restore a captured image from distortions a noise reduction filter is performed and a rectilinear tiling pattern is used as a template. To make the template, a multi-bits fingerprint is embedded repeatedly like a tiling pattern. We show that the extracting is successful from the image captured by a digital camera through the experiment.

  • PDF

Postprocessing Algorithm of Fingerprint Image Using Isometric SOM Neural Network (Isometric SOM 신경망을 이용한 지문 영상의 후처리 알고리듬)

  • Kim, Sang-Hee;Kim, Yung-Jung;Lee, Sung-Koo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.110-116
    • /
    • 2008
  • This paper presents a new postprocessing method to eliminate the false minutiae, that caused by the skelectonization of fingerprint image, and an image compression method using Isometric Self Organizing Map(ISOSOM). Since the SOM has simple structure, fast encoding time, and relatively good classification characteristics, many image processing areas adopt this such as image compression and pattern classification, etc. But, the SOM shows limited performances in pattern classification because of it's single layer structure. To maximize the performance of the pattern classification with small code book, we a lied the Isometric SOM with the isometry of the fractal theory. The proposed Isometric SOM postprocessing and compression algorithm of fingerprint image showed good performances in the elimination of false minutiae and the image compression simultaneously.

Enhanced segmentation method of a fingerprint image using run-length connectivity (Run-Length Connectivity를 이용한 지문영상의 영역분리 방법의 개선)

  • Park Jung-Ho;Song Jong-Kwan;Yoon Byung-Woo;Lee Myeong-Jin
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.4
    • /
    • pp.249-255
    • /
    • 2004
  • In fingerprint verification and identification, fingerprint and background region should be segmented. For this purpose, most systems obtain variance of brightness of X and Y direction using Sobel mask. To decide given local region is background or not, the variance is compared with a certain threshold. Although this method is simple, most fingerprint image does not separated with two region of fingerprint and background region. In this paper, we presented a new segmentation algorithm based on Run-Length Connectivity analysis. For a given binary image after thresholding, suggested algorithm calculates RL of X and Y direction. Until the given image is segmented to two regions, small run region is successively inverted. Experimental result show that this algorithm effectively separates fingerprint region and background region.

  • PDF

A Study on the Translation Invariant Matching Algorithm for Fingerprint Recognition (위치이동에 무관한 지문인식 정합 알고리즘에 관한 연구)

  • Kim, Eun-Hee;Cho, Seong-Won;Kim, Jae-Min
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.2
    • /
    • pp.61-68
    • /
    • 2002
  • This paper presents a new matching algorithm for fingerprint recognition, which is robust to image translation. The basic idea of this paper is to estimate the translation vector of an imput fingerprint image using N minutiae at which the gradient of the ridge direction field is large. Using the estimated translation vector we select minutiae irrelevant to the translation. We experimentally prove that the presented algorithm results in good performance even if there are large translation and pseudo-minutiae.

Implementation of Fingerprint Recognition System Based on the Embedded LINUX

  • Bae, Eun-Dae;Kim, Jeong-Ha;Nam, Boo-Hee
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1550-1552
    • /
    • 2005
  • In this paper, we have designed a Fingerprint Recognition System based on the Embedded LINUX. The fingerprint is captured using the AS-S2 semiconductor sensor. To extract a feature vector we transform the image of the fingerprint into a column vector. The image is row-wise filtered with the low-pass filter of the Haar wavelet. The feature vectors of the different fingerprints are compared by computing with the probabilistic neural network the distance between the target feature vector and the stored feature vectors in advance. The system implemented consists of a server PC based on the LINUX and a client based on the Embedded LINUX. The client is a Tynux box-x board using a PXA-255 CPU. The algorithm is simple and fast in computing and comparing the fingerprints.

  • PDF