5
FPGA Implementation of Fingerint Recognition System using Adaptive Threshold Technique Satish S Bhairannawar 1 , Anand R 2 l) Department of Electronics and Communication Engineering, DayanandaSagar College of Engineering, Bangalore, India 1 [email protected] Abstract-The real time fingerprint biometric system is implemented using FGPA. In this paper, we propose FPGA Implementation of Fingerprint Recognition System using Adaptive Threshold Technique with novel adaptive threshold for each person. The fingerprint images are considered from FVC2004 (DB3_A) and processed to resize fingerprint size to 256x256. The DWT is applied on fingerprint and considered only LL coefficients as features of fingerprint. The Adaptive Threshold value for each person is computed using Deviations between two successive samples of a person, Average Deviation, Standard Deviation and constant. The Adaptive Threshold for test image is computed using Deviations between test images and samples of database, Average Deviation, Standard Deviation and constant. If the Average Threshold of test image is less than Average Threshold of a person then it is considered as match else mismatched. It is observed that the success rate of identifying a person is high in the proposed method compared to existing techniques and also the device utilization in the proposed architecture is less compared to existing architectures. Keywords- Biometrics, Fingerprint identification, Haar 2D- DWT architecture, Adaptive threshold and Adaptive comparator. I. INTRODUCTION The authentication of human beings is very important in the world for the reasons (i) Differentiate criminals and non- criminals to avoid terrorism. (ii) Identi status of a person in terms of annual income like GE, PSE, Business Persons, and Student etc., to avoid black money transactions for the growth of a nation. (iii) The credit card, debit card and currency notes can be eliminated to avoid audulent and robbery by identiing a person with proper annual income and (iv) The database of a nation is created to avoid intruders om neighbouring countries. The traditional methods used to identi a person are smart cards, PIN, tokens, passwords etc., which can be lost or stolen and hence not preferred to use. The biometric is alternate method to traditional methods of identiing persons. The biometric trails can't be lost or stolen, as these are human body parts and behavior of a person, hence accurate identification can be achieved. Fingerprint based identification is one of the most important biometric technology, which has drawn a substantial amount of attention recently, since the process of acquiring fingerprint samples are simple and also believed to be unique among individual persons. These essential attributes of 978-1-4799-7678-2/15/$31.00 ©2015 IEEE Raja K B 3 and Venugopal K R 4 3 Department of Electronics and Communication Engineering, UVCE, Bangalore, India 4 Principal, University Visvesvaraya College of Engineering, Bangalore University, Bangalore, India fingerprint samples leads to the increased use of automatic fingerprint based identification in both civilian and military applications KavitaTewari and Renu L Kalakoti [1] proposed techniques like Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) for feature extraction. These features consist of mean energy, standard deviation and Shannon entropy. The performance was evaluated on the basis of parameters like Correct Detection Rate (CDR), Correct Rejection Rate (CRR), Total Success Rate (TSR), Miss Rate (MR) and False Positive Rate (FPR). Javier Galballyet aI., [2] proposed soſtware-based fake detection method that can be used in multiple biometric systems to detect different types of audulent access attempts. The objective of the system is to enhance the security of biometric recognition ameworks, by adding liveness assessment in a fast, user-iendly, and non-intrusive manner, through the use of image quality assessment. The DWT has been extensively used for image processing which uses sub- band coding techniques that employs filtering methods with different cut-off equencies at different scales. The main advantages of using DWT are time-equency resolution and multilevel image decomposition. Most of the available DWT architectures [3, 4] are based on high speed linear convolution property of the wavelet filters. Many 2D-DWT architectures have been suggested for efficient hardware implementation. In the subsequent few of them are discussed. The four-processor architecture for 2D-DWT is used for block based implementation which requires large memory [5]. Liao et aI., [6] proposed 2D-DWT dual scan architecture, which requires two lines of data samples simultaneously for forward 2D- DWT and also another 2D-DWT architecture, which accomplished decomposition of all stages that result in inefficient hardware utilization and more sophisticated control circuitry. Barua et aI., [7] proposed folded based architecture for 2D-DWT by using hybrid level at each stage. In this approach the image is scanned in a raster format by using row processor which decreases the speed of entire structure. The development of VLSI architectures on reprogrammable hardware [8-10] with incorporation of general purpose microprocessor unit for automated fingerprint identification proves to be efficient and economical solution. Mariano Fons et aI., [11] proposed FPGA based personal verification system using fingerprints in which they performed an evaluation of system architectures substitute to existing personal computers.

FPGA Implementation of Fingerprint Recognition System ... · The objective of the system is to enhance the security of biometric recognition frameworks, by adding liveness assessment

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: FPGA Implementation of Fingerprint Recognition System ... · The objective of the system is to enhance the security of biometric recognition frameworks, by adding liveness assessment

FPGA Implementation of Fingerprint Recognition System using Adaptive Threshold Technique

Satish S Bhairannawar1, Anand R2 l)Department of Electronics and Communication

Engineering, DayanandaSagar College of Engineering, Bangalore, India

1 [email protected]

Abstract-The real time fingerprint biometric system is implemented using FGPA. In this paper, we propose FPGA Implementation of Fingerprint Recognition System using

Adaptive Threshold Technique with novel adaptive threshold for each person. The fingerprint images are considered from FVC2004 (DB3_A) and processed to resize fingerprint size to 256x256. The DWT is applied on fingerprint and considered only

LL coefficients as features of fingerprint. The Adaptive Threshold value for each person is computed using Deviations between two successive samples of a person, Average Deviation, Standard Deviation and constant. The Adaptive Threshold for

test image is computed using Deviations between test images and samples of database, Average Deviation, Standard Deviation and constant. If the Average Threshold of test image is less than Average Threshold of a person then it is considered as match else

mismatched. It is observed that the success rate of identifying a person is high in the proposed method compared to existing techniques and also the device utilization in the proposed

architecture is less compared to existing architectures.

Keywords- Biometrics, Fingerprint identification, Haar 2D­DWT architecture, Adaptive threshold and Adaptive comparator.

I. INTRODUCTION

The authentication of human beings is very important in the world for the reasons (i) Differentiate criminals and non­criminals to avoid terrorism. (ii) Identity status of a person in terms of annual income like GE, PSE, Business Persons, and Student etc., to avoid black money transactions for the growth of a nation. (iii) The credit card, debit card and currency notes can be eliminated to avoid fraudulent and robbery by identifying a person with proper annual income and (iv) The database of a nation is created to avoid intruders from neighbouring countries. The traditional methods used to identify a person are smart cards, PIN, tokens, passwords etc., which can be lost or stolen and hence not preferred to use. The biometric is an alternate method to traditional methods of identifying persons. The biometric trails can't be lost or stolen, as these are human body parts and behavior of a person, hence accurate identification can be achieved.

Fingerprint based identification is one of the most important biometric technology, which has drawn a substantial amount of attention recently, since the process of acquiring fingerprint samples are simple and also believed to be unique among individual persons. These essential attributes of

978-1-4799-7678-2/15/$31.00 ©2015 IEEE

Raja K B3 and Venugopal K R4 3Department of Electronics and Communication

Engineering, UVCE, Bangalore, India 4Principal, University Visvesvaraya College of Engineering,

Bangalore University, Bangalore, India

fingerprint samples leads to the increased use of automatic fingerprint based identification in both civilian and military applications

KavitaTewari and Renu L Kalakoti [1] proposed techniques like Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), and Discrete Wavelet Transform (DWT) for feature extraction. These features consist of mean energy, standard deviation and Shannon entropy. The performance was evaluated on the basis of parameters like Correct Detection Rate (CDR), Correct Rejection Rate (CRR), Total Success Rate (TSR), Miss Rate (MR) and False Positive Rate (FPR). Javier Galballyet aI., [2] proposed software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The DWT has been extensively used for image processing which uses sub­band coding techniques that employs filtering methods with different cut-off frequencies at different scales. The main advantages of using DWT are time-frequency resolution and multilevel image decomposition. Most of the available DWT architectures [3, 4] are based on high speed linear convolution property of the wavelet filters. Many 2D-DWT architectures have been suggested for efficient hardware implementation. In the subsequent few of them are discussed. The four-processor architecture for 2D-DWT is used for block based implementation which requires large memory [5]. Liao et aI., [6] proposed 2D-DWT dual scan architecture, which requires two lines of data samples simultaneously for forward 2D­DWT and also another 2D-DWT architecture, which accomplished decomposition of all stages that result in inefficient hardware utilization and more sophisticated control circuitry. Barua et aI., [7] proposed folded based architecture for 2D-DWT by using hybrid level at each stage. In this approach the image is scanned in a raster format by using row processor which decreases the speed of entire structure. The development of VLSI architectures on reprogrammable hardware [8-10] with incorporation of general purpose microprocessor unit for automated fingerprint identification proves to be efficient and economical solution. Mariano Fons et aI., [11] proposed FPGA based personal verification system using fingerprints in which they performed an evaluation of system architectures substitute to existing personal computers.

Page 2: FPGA Implementation of Fingerprint Recognition System ... · The objective of the system is to enhance the security of biometric recognition frameworks, by adding liveness assessment

Contributions

In this paper, the FPGA implementation of fingerprint recognition system using adaptive threshold is proposed. The 2D-DWT architecture is used to generate LL band coefficients of fingerprint images. The adaptive threshold for each person and test image is calculated and matching is performed to improve performance parameters.

II. PROPOSED HARDWARE ARCHITECTURE

The novel technique of adaptive threshold for each person and test image are computed using average difference, standard deviation and system parameter constant to improve matching technique. The basic block diagram of Top Module of fingerprint identification system is shown in Fig. 1. The Control Unit (CU) controls all components in a particular order to obtain the desired result. The CU works with different states to synchronize all components and also introduces wait states to maintain absolute synchronization between all components. The Control Unit (CU) is also used to tum off individual blocks when not in use resulting in low power optimization of the system.

J 2D Haar DWT J l J

J Adaptive

J l TIrresho1d

Contro] Unit 1 r Adaptive

J l Co!noarator (CO)

1 J Database J l ,'_ ____________ -r/

Fig. I. Top Level Description of Hardware Implementation of Fingerprint System

A. Database Image

The fingerprint database of FVC2004 is considered to test the performance of biometric system. The DB3 _A database of FVC2004 [12] has 8 fmgerprint samples per person as shown in the Fig. 2. The total numbers of persons in DB3 _A are 100 with 8 sample images per person with each fmgerprint size of 300x480. The original fingerprint image is resized to 256x256 in pre-processing.

Fig. 2. Eight Sample Images of a Person of FVC2004 (DB3_A) Database

B. Implementation of2D Haar DWT

The image is divided into 2x2 non-overlapping matrices to calculate LL coefficients The hardware structure for generating LL-band using 20 Haar transform is shown in Fig.

3. The non-overlapping 2x2 matrix block of an image is considered to compute LL coefficients. The D flip-flops (0 Jrs) and Shift Register are connected in series to form shift register of 258 data samples for 256x256 image. The connections from four flip flops which form 2x2 matrices are connected to adder which performs addition of all four pixel values in tum right shifted using shifter block to obtain the required LL coefficients. The elk_ div block is used to achieve divide by 2 of elk which in tum connected to 0 Jf to obtain 2x2 non-overlapping matrices.

Shih Register ell:

Adder Hand

Fig. 3. Hardware Structure for LL band of 2D Haar Transform

C. Implementation of Adaptive Threshold

The deviations between two column vectors in the database and deviations between test and database vectors are computed. The maximum and minimum deviations are averaged using adders and shifters. The (J and A are multiplied and added with average deviation to obtain AT using multiplier and adder respectively. Similarly ATT of test image with database is also computed. The AAT is compared with A T. The values of AA T are compared with AT values in the database. If AAT values are less than AT then the person is matched or else mismatched. The basic block diagram of adaptive threshold implementation is shown in Fig. 4.

Test feHllP-S

De",-i.abon Cakularion H �-� '----'

Fig. 4. Block Diagram of Adaptive Threshold Implementation

Page 3: FPGA Implementation of Fingerprint Recognition System ... · The objective of the system is to enhance the security of biometric recognition frameworks, by adding liveness assessment

III. MATHEMATICAL MODEL

A. Deviations between two images in the Database

The column vectors of seven fingerprint samples of a person in database are considered and deviations between two column vectors are computed using Average Deviation (AD) . The AD between corresponding coefficients of two samples of a person in the database is computed using the following pseudo code.

forl = 1: (k - 1) fori == (l + 1): k

AD(Xl, Xi) = 2:j!liX(j)/-XU)ti(1) n;

end end

Where, I and i are column vector variables of database image samples, k is total number of image samples in database per person, mis total number of LL coefficient features i.e.,16384.

Example The AD between first column vector Xl and second

column vector Xl of first person is computed using equation

(2). AD(Xl' X2) = 2:f;lI(XU;: )-xU)zi(2)

1) Adaptive Threshold (A 7) ofaperson in the Database: The Max(AD) and Min(AD) of first person and compute

average of MClx(ADj and Min(AD) using equation (3).

c =

Max(AD)+Min(AD\3)

2

The standard deviation (J are calculated using AD's given by equation (4)

The Adaptive Threshold (AT)[13] for each person in the database is calculated using the parameters C, (J and system parameter (/...) using equation (5).

Similarly Adaptive Threshold values [AT2' AT3 . . . . . . . . . . . . . . . . . . . ATp}are computed for all persons in the database.

2) Compute Adaptive Threshold of Test image The AD of test image samples with image in database is

computed using equation (6).

forT == 1: p forS == 1: q

AD](xr, xs) = 2:f;ll(xUh )-xU)si(6) m

end end

Where, q is total number of image samples in database=p*k. p is total number of persons. T is the test image sample.

Example The AD of test image with first image in the data base is

computed as using equation (7)

Similarly compute AD's between test image and all image samples in database using equation (8).

AD](xr,Xq) = Lj�llx(j)r - x(j)qIC8) The Average of AD of each person IS computed using

equation (9)

Where, K is number of samples per person. Similarly the Average of AD of remaining persons are

computed with test image using equation (10).

Note the max and min of A_AD _ Tp and compute CT using equation (Il)

Cr = mUX(A_AD]p)+1Ilin(A_AD]r\

11) 2 The standard deviation a are calculated using Average

AD's given in equation (12)

ow, Adaptive threshold of test is given using equation (13).

ATT = C + .A. 0"(13) Where, /...=0.5

3) Comparison of test and Database images The computed AAT values of test images are compared

with AT values of the database person. If the AA T value is less than AT then the test image is matched with the corresponding person.

IV. PERFORMANCE ANALYSIS

A. Software Simulation and Comparison

The algorithm is implemented using MA TLAB. The percentage values of TSR of proposed method is compared

Page 4: FPGA Implementation of Fingerprint Recognition System ... · The objective of the system is to enhance the security of biometric recognition frameworks, by adding liveness assessment

with existing methods presented by Maya and Sethu [14], Dattatray and Pawan [15], M. Mani Roja and Sudhir [16] and lossy P. George et aI., [17]. It is observed that the value of TSR is high in the case of proposed method compared to existing methods as shown in TABLE I.

TABLE!. COMPARISON OF PERCENTAGE EER AND TSR VALUES OF PROPOSED METHOD WITH EXISTING METHODS

Author Techuiques %TSR Maya and Sethu [14] Curvelet -Euclidean 95.02

Dattatray and Pawan [15] DWT and PCA 96.3

M. Mani and Sudhir[16] OR Logic (DCT) 95

Jossy P. George et aI., [17] DTCWT 85

Proposed Method Adaptive Threshold 96.5

The algorithm uses novel adaptive threshold technique where unique adaptive thresholds are calculated for each person compared to traditional method of having fixed threshold for fingerprint matching. This unique method of calculating thresholds are based on average difference (AD) between image samples C, standard deviation between image samples and constant which improves the tolerance for matching accuracy.

B. Hardware Implementation

The proposed architectures are implemented on FPGA device using Spartan-3 xc3s400-4pq208 commercial version with speed grade -4. The TABLE II shows the hardware requirements with respect to performance for the FPGA implementation The deviation calculations requires 39 slices, 59 flip-flops, 32 4-input LUT's and 1 GCLK and to implement Haar DWT it requires 54 slices, 33 flip-flops, 99 4-input LUT's and 1 GCLK. The Interface Unit, requires 85 slices, 97 flip-flops, 132 4-input LUT'S and 2 GCLKs.

TABLE II. SYNTHESIS REPORTS ON FPGA

Logic Utilization Deviation DWT Interface Calculation No. of Slices 39 54 85

No. of Slice Flip Flops 59 33 97

No. of 4-input LUTs 32 99 132

No. of Bounded lOBs 67 43 32

NO. of GCLKs I I 2

C. Hardware Comparison between Proposed and Existing Architectures

The estimated CLB LUT's using FPGA for the proposed algorithm and existing algorithms for entire system (pre­processing-matching) are given in TABLE III. The values of area in terms of LUT's of proposed method is compared with existing methods presented by Fons et aI., [18], Marion Lopez

and Enrique Canto [19] and Conti et aI., [20]. It is observed that the value of used LUT's are very less in the case of proposed method compared to existing methods.

TABLE III. AREA COMPARISONS OF PROPOSED METHOD AND EXISTING ARCHITECTURES

Author Techniques Area (LUT's) Fons et aI. , [18] Minutiae Based 21504

Marion Lopez and Minutiae Based 7014

Enrique Canto [19]

Conti et aI., [20] Minutiae Based and

37031 AES Encryption

Proposed Method Adaptive Threshold 263

The adaptive threshold techniques are based on adders and comparators. This reduces the computational complexity of hardware utilization and also it helps in reducing power consumption.

V. CONCLUTION

In this paper, the FPGA implementation of fingerprint recognition system using adaptive threshold is proposed. The LL band coefficients are generated using Haar 2D-DWT. The Adaptive Threshold values for each fingerprint coefficients are assigned using Deviations between two successive samples of a person, Average Deviation, Standard Deviation and constant which is unique. The ATT of test image features are calculated using database features and compared with database AT values for matching. The proposed architecture is compared with existing hardware architectures. [t is observed that the proposed technique has less hardware utilization of 263 LUT's, since it uses adders, multipliers and comparators for adaptive threshold calculation matching. Further it helps in reducing the power which is useful for low power fingerprint recognition system.

References [I] Kavita Tewari and Renu L Kalakoti, "Fingerprint Recognition using

Transform Domain Techniques", International Technological Conference, pp. 136-140, January 2014.

[2] Javier Galbally, Sebastien Marcel and Julian Fierrez, "Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition", IEEE Transactions on Image Processing, Vol. 23, No. 2, pp. 710-724, February 2014.

[3] Radomir S. Stankovic and Bogdan 1. Falkowski, "The Haar Wavelet Transform: Its Status and Achievements", Computers and Electrical Engineering, Elsevier, Vol. 29, pp. 25-44, 2003.

[4] Martin Vetterli and Cormac Herley, "Wavelet and Filter Banks: Theory and Design", IEEE Transactions on Signal Processing, Vol. 40, No. 9, pp. 2207-2232, 1992.

[5] Kishore Andra, Chaitali Chakrabarti and Tinku Acharya, "A VLSI Architecture for Lifting-Based Forward and Inverse Wavelet Transform", IEEE Transaction on Signal Processing, Vol. 50, No. 4, pp. 966-977, April 2002.

[6] H. Liao, M. K. Mandai and B. F. Cockburn, "Efficient Architectures for 1-0 and 2-D Lifting-Based Wavelet Transforms", IEEE Transaction on Signal Processing, Vol. 52, No. 5, pp. 1315-1326, May 2004.

Page 5: FPGA Implementation of Fingerprint Recognition System ... · The objective of the system is to enhance the security of biometric recognition frameworks, by adding liveness assessment

[7] S. Barua, 1. E. Carletta, K. A. Kotteri and A. E. Bell, "An Efficient Architecture for Lifting-Based Two-Dimensional Discrete Wavelet Transform", Integration VLSI Journal, Vol. 38, No. 3, pp. 341-352, 2005.

[8] Phang Chang, and Phang Piau, "Modified Fast and Exact Algorithm for Fast Haar Transform", Journals of Electrical and Electronics Engineering, Vol. 2, pp. 344-347, 2008.

[9] Abdullah Al Muhit, Md. Shabiul Islam and Masuri Othman, "VLSI Implementation of Discrete Wavelet Transform (DWT) for Image Compression " , Second International Conference on Autonomous Robots and Agents, December 13-15, 2004, New Zealand.

[10] Ricardo Jose Colom-Palero, Rafael Gadea-Girones and Francisco Jose Ballester-Merelo, Marcos Martinez-Peiro, "Flexible Architecture for the Implementation of the Two-Dimensional Discrete Wavelet Transform (2D-DWT) Oriented to FPGA Devices", Microprocessor and Microsystems, Elsevier, Vol. 28, pp. 509-518, 2004.

[11] Mariano Fons, Francisco Fons, Enrique Canto and Mariano Lopez, "FPGA Based Personal Authentication using Fingerprints", International Journal of Signal Processing Systems, Springer, Vol. 16, Issue. 2, pp. 153-189, 2011.

[12] http://bias.csr.unibo.it/fvc2004/download.asp [Online], "FVC 2004 Database Reference", Third Fingerprint Verification Competition, 2004.

[13] W. Niblack, "An Introduction to Image Processing", Prentice-Hall, Englewood Cliffs, NJ, pp. 115-116, 1986.

[14] Maya V Karki and S Sethu Selvi, "Multimodal Biometrics at Feature Level Fusion using Texture Features", International Journal of Biometrics and Bioinformatics, Vol. 7, Issue. 1, pp. 58-72, 2013.

[15] Dattatray V. Jadhav and Pawan K. Ajmera, "Multi Resolution Feature Based Subspace Analysis for Fingerprint Recognition", International Journal of Computer Applications,Vol. 1, No. 13, pp. 1-4, 2010.

[16] M. Mani Roja and Sudhir Sawarkar, "Fingerprint Verification System-A Fusion Approach", International Journal of Computer Applications, Vol. 3, No. 3, pp. 17-20, 2011.

[17] .lossy P. George, Abhilash S. K. and Raja K. B., "Transform Domain Fingerprint Identification Based on DTCWT", International Journal of Advanced Computer Science and Applications, Vol. 3, No. I, pp. 190-195, 2012.

[18] M. Fons, F. Fons, and E. Canto, "Fingerprint Image Processing Acceleration through Run-Time Reconfigurable Hardware", IEEE Transactions on Circuits and Systems-II: Express Briefs, Vol. 57, No. 12, December 20 I O.

[19] Mariano Lopez and Enrique Canto, "FPGA Implementation of a Minutiae Extraction Fingerprint Algorithm",Biometric Signal Processing Conference, pp. 21-25, September 2008.

[20] V. Conti, S. Vitabile, G. Vitello and F. Sorbello, "An Embedded Biometric Sensor for Ubiquitous Authentication", AEIT Annual Conference, pp.I-6, October 2013.