






Vol.3 , No. 5, Publication Date: Sep. 29, 2016, Page: 26-35
[1] | Kanaa Thomas F. N., Higher Technical Teacher Training College, University of Bamenda, Bambili, Cameroon; Laboratory of Electronics, Electrotechnics, Automation and Telecommunications, University of Douala, Douala, Cameroon. |
[2] | Ele Pierre, University Institute of Technology, Laboratory of Electronics, Electrotechnics, Automation and Telecommunications, University of Douala, Douala, Cameroon. |
[3] | Tchiotsop Daniel, Fotso Victor University Institute of Technology, Laboratory of Automation and Applied Computer Science, University of Dschang, Bandjoun, Cameroon. |
[4] | Tonye Emmanuel, National Advanced School of Engineering, Laboratory of Electronics and Signal Processing, University of Yaounde I, Yaounde, Cameroon. |
This paper is presenting a new and robust fingerprint identification/verification method liable to minimize any risk of human loss and to preserve peace and freedom when fighting against terrorism in a context of high public insecurity. For that matter, a database of 200 fingerprint images from a Boko Haram risk region of Cameroon has been put in place on which a noteworthy method from the literature and the author’s algorithm were tested. For this last algorithm, the enhanced image is computed by convolution of the Gabor filter attached to the ridge orientation and the ridge frequency, with the normalized fingerprint image from the minutiae rough segmentation by global thresholding on the variance. The minutiae are extracted gradually with the local Sauvola’s thresholding, the parallel thinning algorithm of the ridges and the false minutiae removal technique based on its branch. A minutia alignment and an elastic matching algorithm based on the optimization of the bounding box tolerance parameters are then combined to provide the matching score of the input fingerprint. With an accuracy of 99.27% at the equal error rate position, an improvement of 33.91% is observed as gap between the classical and the new approaches. The improved technique faithfully recognizes the fingerprints of the same individual and strongly rejects two different individuals’ fingerprints. An innovative development is therefore ready for detecting genuine and intruders in control systems to better solve the identification and verification problems in high public insecurity environments where a high performance is henceforth imposed as critical and strategic requirement in the whole world.
Keywords
Biometrics, Fingerprint, Segmentation, Minutiae Matching, Gabor Filtering, Sauvola’s Thresholding
Reference
[01] | Joseph N. Pato and Lynette I. Millett. ‘‘Biometric Recognition: Challenges and Opportunities’’ Ed. Whither Biometrics Committee and National Research Council of the National Academies, Washington DC, USA, 2010. |
[02] | Mark Maguire ‘‘The Birth of Biometric Security’’ Anthropology Today, Vol. 25, Issue 2, April 2009. |
[03] | Emilio Mordini and Sonia Massari ‘‘Body, Biometrics and Identity’’ Bioethics, Vol. 22, Issue 9, pp. 488-498, 2008. |
[04] | Institute for Economics and Peace ‘‘Measuring and Understanding the Impact of Terrorism’’ Global Terrorism Index, Report 2015. |
[05] | Jodi M. Delgado ‘‘Use of Biometrics within Sub-Saharan Refugee Communities’’ IDA Document NS D-5082. H 13-001757, Mark Center Drive Alexandria, Virginia 2013. |
[06] | June Gibbs Brown ‘‘Birth Certificate Fraud’’ Department of health and Public Services, 0EI-07-99-00570, USA Sept. 2000. |
[07] | Magaret Gitai ‘‘Evidence of Identity and Citizenship: Papua’s New Guinea experiences and challenges’’ Iran ICAO Security and Facilitation TRIP Seminar, 9th – 11th May 2016. |
[08] | Christopher P. Raab ‘‘Fighting terrorism in an electronic age: does the patriot act unduly compromise our civil liberties?’’ Duke Law & Technology review, Vol. 2, 2006. |
[09] | A. K. Jain, Lin Hong, S. Pankanti and R. Bolle. ‘‘An identity-Authentication System using Fingerprints’’ Proceedings of the IEEE, Vol. 85, Issue 9, 1997. |
[10] | Benjamin Miller. ''Vital signs of identity.'' IEEE Spectrum. Vol. 31, Issue 2, pp: 22-30, 1994. |
[11] | Maltoni Davide, Dario Maio, Anil K. Jain, Salil Prabhakar. ''Handbook of fingerprint recognition'' 2nd edition, Springer-Verlag London Limited, New York, 2009. |
[12] | Penny Duquenoy, Carlisle George, Kai Kimppa, and Emilio Mordini ‘‘Ethical, Legal and Social Issues in Medical Informatics - Chapitre XI: Biometrics, Human Body, and Medicine: A Controversial History’’ IGI Global, Italy 2008. |
[13] | Daugman J., G. ''High Confidence Visual Recognition of Persons by a Test of Statistical Independence.'' IEEE Transactions on Pattern Analysis and Machine Intelligence. Vol. 15, issue 11, pp. 1148-1161. 1993. |
[14] | Clarke R. ''Human identification in information systems: Management challenges and public policy issues.'' Information Technology and People. Vol. 7, issue 4, pp. 6-37, 1994. |
[15] | Davies S., G. ''Touching big brother: How biometric technology will fuse flesh and machine.'' Information Technology and People. Vol. 7, issue 4, pp. 60-69, 1994. |
[16] | Newham E. ''The Biometric Report.'' SJB Services, New York, 1995. |
[17] | Drahanský Martin. ''Biometric Security Systems Fingerprint Recognition Technology'' Ph.D Thesis, BRNO University of Technology, Czech Republic, 2005. |
[18] | M. Gamassi, Massimo Lazzaroni, M. Misino, Vincenzo Piuri, D. Sana and F. Scotti. ‘‘Quality Assessment of Biometric Systems: A Comprehensive Perspective Based on Accuracy and Performance Measurement’’ IEEE Transactions on Instrumentation and Measurement. Vol. 54, pp 1489-1496, 2005. |
[19] | American National Standard for Information Systems ''Data Format for the Interchange of Fingerprint, Facial, & Scar Mark & Tattoo (SMT) Information.'' ANSI/NIST-ITL 1-2000, NIST Special Publication 500-245, 2000. |
[20] | Henry E., R. ''Classification and Uses of Finger Prints'' George Routledge and Sons ltd, London, 1900. |
[21] | Moenssens, A. A. ''Fingerprint Techniques'' Chilton Book Company, Philadelphia, 1971. |
[22] | Sangram Bana and Davinder Kaur ''Fingerprint Recognition using Image Segmentation'' International Journal Of Advanced Engineering Sciences And Technologies (IJAEST), Vol. 5, Issue 1, pp. 012 - 023, 2011. |
[23] | Richard O. Duda, Peter E. Hart and David G. Stork. ''Pattern Classification'' 2nd Edition, Wiley-Interscience, New York, USA, 2000. |
[24] | Francesco Turroni ''Fingerprint Recognition: Enhancement, Feature Extraction and Automatic Evaluation of Algorithms.'' Doctorate Thesis, University of Bologna, Italy, 2012. |
[25] | Bhawna Negi and Varun Sharma. ‘‘Fingerprint Recognition System’’ International Journal of Electronics and Computer Science Engineering (IJECSE), Vol. 1, Issue 3, pp 872-878, 2012. |
[26] | Roli Bansal, Priti Sehgal and Punam Bedi ‘‘Minutiae Extraction from Fingerprint Images - a Review’’ IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, 2011. |
[27] | Alessandro Farina, Zsolt M. Kova´ cs-Vajna and Alberto Leone ''Fingerprint minutiae extraction from skeletonized binary images'' The Journal of Pattern Recognition Vol. 32, pp. 877—889, 1999. |
[28] | Shlomo Greenberg, Mayer Aladjem, Daniel Kogan and Itshak Dimitrov ''Fingerprint Image Enhancement Using Filtering Techniques'' IEEE, pp 322-325, 2000. |
[29] | Jossy P. George, Abhilash S. K. and Raja K. B. ‘‘Transform Domain Fingerprint Identification Based on DTCWT’’ International Journal of Advanced Computer Science and Applications (IJACSA), Vol. 3, Issue 1, 2012. |
[30] | Liu Wei-Chao and Guo Hong-Tao. ‘‘Occluded Fingerprint Recognition Algorithm Based on Multi Association Features Match’’ Journal of Multimedia, Vol. 9, Issue 7, July 2014. |
[31] | Ravi J., K. B. Raja and Venugopal K. R. ''Fingerprint recognition using minutia score matching'' International Journal of Engineering Science and Technology, Vol. 1, issue 2, pp: 35-42, 2009. |
[32] | Lokhande S. K., Dhongde V. S ''Fingerprint Identification System Based On Neural Network'' International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET), Vol. 3, Special Issue 4, 2014. |
[33] | Prajakta M. M., Ramesh P. A. “A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank” ACEEE International Journal on Network Security, Vol. 2, issue 3, 10-4, 2011. |
[34] | Hamsa, A. A. ''Fingerprint Identification System Using Neural Networks'' Nahrain University, College of Engineering Journal (NUCEJ), Vol. 15, pp. 234-244, 2012. |
[35] | Yuliang He, Jie Tian, Xiping Luo, Tanghui Zhang ‘‘Image enhancement and minutiae matching in fingerprint verification’’ Pattern Recognition Letters 24, 1349–1360, 2003. |
[36] | Shahadat Hossain, Rafiqul Islam “Fingerprint Matching Through Minutiae Based Feature Extraction Method” American Journal of Science and Technology, Vol. 2, No. 6, pp. 262-269, 2015. |
[37] | A. Jain, A. Ross and Salil Prabhakar. ‘‘Fingerprint Matching Using Minutiae and texture features’’ Proceedings of International Conference on Image Processing (ICIP), pp. 282-285, Thessaloniki, Greece, Oct 7-10, 2001. |
[38] | Anil K. Jain, Salil Prabhakar, Lin Hong, and Sharat Pankanti, “Filterbank-based fingerprint matching,” IEEE Transactions on Image Processing, vol. 9, Issue 5, pp. 846–859, May 2000. |
[39] | A. Noor, N. Manivanan and W. Balachandran, “Transformation invariant algorithm for automatic fingerprint recognition” Electronics Letters, IET Journals & Magazines. Vol. 48, Issue 14, pp. 834-835, 2012. |
[40] | Rajanna, U., Erol, A., Bebis, G.: A comparative study on feature extraction for fingerprint classification and performance improvements using rank-level fusion. Patt. Anal. Appl. 13, 263–272, 2013. |
[41] | Paulino, A., Feng, J., Jain, A. K.: Latent fingerprint matching using descriptor-based Hough transform. IEEE Trans. Inform. Forensics Secur. 8 (1), 34, 2013. |
[42] | Thanh-Nghi Do, P. Lenca and S. Lallich “Classifying many-class high-dimensional fingerprint datasets using random forest of oblique decision trees” Vietnam Journal of Computer Science, Springer. Vol. 2, pp. 3–12, 2015. |
[43] | R. F. Nogueira, R. De A. Lotufo, R. C. Machado “Fingerprint Liveness Detection Using Convolutional Neural Networks” IEEE Transactions on Information Forensics and Security, IEEE Journals & Magazines. Volume: 11, Issue: 6, pp. 1206-1213, 2016. |
[44] | Hong Lin, Yifei Wan and Anil Jain. ''Fingerprint Image Enhancement: Algorithm and Performance Evaluation'' IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 20, issue 8. pp. 777-789, 1998. |
[45] | J. Sauvola and M. Pietikainen ''Adaptive document image binarization.'' Pattern Recognition Vol. 33, issue 2, pp. 225–236, 2000. |
[46] | T. Y. Zhang and C. Y. Suen. ''A Fast Parallel Algorithm for Thinning Digital Patterns.'' Communications of the ACM, Vol. 27, issue 3. pp. 236-239, 1984. |
[47] | S. T. M. Anzar and P. S. Sathidevi. “On combining multi-normalization and ancillary measures for the optimal score level fusion of fingerprint and voice biometrics” EURASIP Journal on Advances in Signal Processing, Springer. Vol. 10, 2014. |