9
IEEE Proof IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 37, NO. 4, AUGUST 2007 1 Modeling and Analysis of Local Comprehensive Minutia Relation for Fingerprint Matching 1 2 Xiaoguang He, Jie Tian, Senior Member, IEEE, Liang Li, Yuliang He, and Xin Yang 3 Abstract—This paper introduces a robust fingerprint matching 4 scheme based on the comprehensive minutia and the binary re- 5 lation between minutiae. In the method, a fingerprint is repre- 6 sented as a graph, of which the comprehensive minutiae act as 7 the vertex set and the local binary minutia relations provide the 8 edge set. Then, the transformation-invariant and transformation- 9 variant features are extracted from the binary relation. The 10 transformation-invariant features are suitable to estimate the 11 local matching probability, whereas the transformation-variant 12 features are used to model the fingerprint rotation transforma- 13 tion with the adaptive Parzen window. Finally, the fingerprint 14 matching is conducted with the variable bounded box method 15 and iterative strategy. The experiments demonstrate that the pro- 16 posed scheme is effective and robust in fingerprint alignment and 17 matching. 18 Index Terms—Adaptive Parzen window, binary minutia rela- 19 tion, fingerprint identification, transformation-invariant feature, 20 transformation-variant feature. 21 I. I NTRODUCTION 22 A T PRESENT, fingerprint identification is much more re- 23 liable than most other biometric identification methods 24 such as signature, face, and speech [1]. Various algorithms 25 and techniques have been developed rapidly for fingerprint 26 identification systems in the past decade. In fact, a fingerprint is 27 the identity card that people carry for a lifetime. The classical 28 fingerprint identification was applied in security systems like 29 prison and criminal identification [1]. Recently, with the devel- 30 opment of the technology, it is increasingly used for civilian 31 daily life, such as access control, financial security, verification 32 of firearm purchaser [2], etc. 33 A fingerprint is a pattern of ridges and valleys on skin 34 surface. The uniqueness of a fingerprint can be determined 35 with an overall pattern of ridges and valleys as well as local 36 ridge anomalies, such as ridge endings and bifurcations, i.e., 37 minutiae. Many experts have designed fingerprint represen- 38 tation schemes under the strong assumption that the input 39 Manuscript received April 29, 2006; revised October 10, 2006. This work was supported in part by the Project of National Science Foundation for Dis- tinguished Young Scholars of China under Grant 60225008, by the Key Project of National Natural Science Foundation of China under Grants 60332010 and 60575007, by the Project for Young Scientists’ Foundation of National Natural Science of China under Grant 60303022, and by the Project of Natural Science Foundation of Beijing under Grant 4052026. This paper was recommended by Associate Editor N. Ratha. The authors are with the Key Laboratory of Complex Systems and Intelligence Science, Institute of Automation, Chinese Academy of Sci- ences, Beijing 100080, China (e-mail: [email protected]; [email protected]; [email protected]; [email protected]; [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TSMCB.2006.890285 fingerprint and template fingerprint are acquired by the same 40 sensor. Therefore, those schemes usually characterize the same 41 intensity range and admit a certain type of noise. In current 42 years, techniques [3]–[8] are developed to recover geometric 43 distortion and misalignment of fingerprints. However, these 44 methods are time and memory consuming since they usually 45 align all minutiae one by one with the local transformation 46 information. 47 In this paper, a robust fingerprint matching scheme is de- 48 signed to explore comprehensive information of minutiae and 49 ridges and the relations between minutiae. The method intro- 50 duces a graph in fingerprint representation. In the graph, the 51 vertex set is the comprehensive minutiae, and the edge set is 52 the local binary minutia structures. Local structure is subject 53 to the positional constraints, and it helps to represent a local 54 fingerprint region and prevent false matching caused by insuffi- 55 cient minutiae. Compared with the ternary minutia structure as 56 other researchers adopted [3]–[8], [19], binary structure makes 57 a proper tradeoff between the performance and computational 58 expense. The proposed feature representation is inexpensive in 59 time and memory cost. 60 Two types of features are extracted from the binary compre- 61 hensive minutia structure. One is the transformation-invariant 62 features, which are used for the local matching probabil- 63 ity measurement between local structures. Another is the 64 transformation-variant features, and they are used to model 65 the rotation transformation with the adaptive Parzen window, 66 which statistically explores the transformation information 67 from local structures and admits the periodic property of ro- 68 tation angle. Finally, the variable bounded box method [9] 69 and iterative strategy are used for rechecking local matching 70 probability. Both the variable bounded box method and iterative 71 strategy globally reduce the influence of deformation on match- 72 ing. Experimental results on the database of the International 73 Fingerprint Verification Competition (FVC) 2002 [17] have 74 proven that our technique is efficient in terms of fingerprint 75 alignment and matching. 76 The rest of this paper is organized as follows: Section II in- 77 troduces and analyses the representation of fingerprint feature. 78 Section III describes the measurement of transformation para- 79 meter. Section IV presents the scheme of fingerprint matching. 80 Section V provides the experimental results. The final section 81 concludes our work with future perspectives. 82 II. REPRESENTATION OF FINGERPRINT FEATURE 83 Many popular fingerprint representation schemes, based on 84 image analysis, can be classified into three types. The first type 85 1083-4419/$25.00 © 2007 IEEE

transformation-invariant features are suitable to estimate

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: transformation-invariant features are suitable to estimate

IEEE

Proo

f

IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 37, NO. 4, AUGUST 2007 1

Modeling and Analysis of Local ComprehensiveMinutia Relation for Fingerprint Matching

1

2

Xiaoguang He, Jie Tian, Senior Member, IEEE, Liang Li, Yuliang He, and Xin Yang3

Abstract—This paper introduces a robust fingerprint matching4scheme based on the comprehensive minutia and the binary re-5lation between minutiae. In the method, a fingerprint is repre-6sented as a graph, of which the comprehensive minutiae act as7the vertex set and the local binary minutia relations provide the8edge set. Then, the transformation-invariant and transformation-9variant features are extracted from the binary relation. The10transformation-invariant features are suitable to estimate the11local matching probability, whereas the transformation-variant12features are used to model the fingerprint rotation transforma-13tion with the adaptive Parzen window. Finally, the fingerprint14matching is conducted with the variable bounded box method15and iterative strategy. The experiments demonstrate that the pro-16posed scheme is effective and robust in fingerprint alignment and17matching.18

Index Terms—Adaptive Parzen window, binary minutia rela-19tion, fingerprint identification, transformation-invariant feature,20transformation-variant feature.21

I. INTRODUCTION22

A T PRESENT, fingerprint identification is much more re-23

liable than most other biometric identification methods24

such as signature, face, and speech [1]. Various algorithms25

and techniques have been developed rapidly for fingerprint26

identification systems in the past decade. In fact, a fingerprint is27

the identity card that people carry for a lifetime. The classical28

fingerprint identification was applied in security systems like29

prison and criminal identification [1]. Recently, with the devel-30

opment of the technology, it is increasingly used for civilian31

daily life, such as access control, financial security, verification32

of firearm purchaser [2], etc.33

A fingerprint is a pattern of ridges and valleys on skin34

surface. The uniqueness of a fingerprint can be determined35

with an overall pattern of ridges and valleys as well as local36

ridge anomalies, such as ridge endings and bifurcations, i.e.,37

minutiae. Many experts have designed fingerprint represen-38

tation schemes under the strong assumption that the input39

Manuscript received April 29, 2006; revised October 10, 2006. This workwas supported in part by the Project of National Science Foundation for Dis-tinguished Young Scholars of China under Grant 60225008, by the Key Projectof National Natural Science Foundation of China under Grants 60332010 and60575007, by the Project for Young Scientists’ Foundation of National NaturalScience of China under Grant 60303022, and by the Project of Natural ScienceFoundation of Beijing under Grant 4052026. This paper was recommended byAssociate Editor N. Ratha.

The authors are with the Key Laboratory of Complex Systems andIntelligence Science, Institute of Automation, Chinese Academy of Sci-ences, Beijing 100080, China (e-mail: [email protected]; [email protected];[email protected]; [email protected]; [email protected]).

Color versions of one or more of the figures in this paper are available onlineat http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TSMCB.2006.890285

fingerprint and template fingerprint are acquired by the same 40

sensor. Therefore, those schemes usually characterize the same 41

intensity range and admit a certain type of noise. In current 42

years, techniques [3]–[8] are developed to recover geometric 43

distortion and misalignment of fingerprints. However, these 44

methods are time and memory consuming since they usually 45

align all minutiae one by one with the local transformation 46

information. 47

In this paper, a robust fingerprint matching scheme is de- 48

signed to explore comprehensive information of minutiae and 49

ridges and the relations between minutiae. The method intro- 50

duces a graph in fingerprint representation. In the graph, the 51

vertex set is the comprehensive minutiae, and the edge set is 52

the local binary minutia structures. Local structure is subject 53

to the positional constraints, and it helps to represent a local 54

fingerprint region and prevent false matching caused by insuffi- 55

cient minutiae. Compared with the ternary minutia structure as 56

other researchers adopted [3]–[8], [19], binary structure makes 57

a proper tradeoff between the performance and computational 58

expense. The proposed feature representation is inexpensive in 59

time and memory cost. 60

Two types of features are extracted from the binary compre- 61

hensive minutia structure. One is the transformation-invariant 62

features, which are used for the local matching probabil- 63

ity measurement between local structures. Another is the 64

transformation-variant features, and they are used to model 65

the rotation transformation with the adaptive Parzen window, 66

which statistically explores the transformation information 67

from local structures and admits the periodic property of ro- 68

tation angle. Finally, the variable bounded box method [9] 69

and iterative strategy are used for rechecking local matching 70

probability. Both the variable bounded box method and iterative 71

strategy globally reduce the influence of deformation on match- 72

ing. Experimental results on the database of the International 73

Fingerprint Verification Competition (FVC) 2002 [17] have 74

proven that our technique is efficient in terms of fingerprint 75

alignment and matching. 76

The rest of this paper is organized as follows: Section II in- 77

troduces and analyses the representation of fingerprint feature. 78

Section III describes the measurement of transformation para- 79

meter. Section IV presents the scheme of fingerprint matching. 80

Section V provides the experimental results. The final section 81

concludes our work with future perspectives. 82

II. REPRESENTATION OF FINGERPRINT FEATURE 83

Many popular fingerprint representation schemes, based on 84

image analysis, can be classified into three types. The first type 85

1083-4419/$25.00 © 2007 IEEE

Melanin
Comment on Text
delete
Melanin
Comment on Text
insert text: , by Chair Professors of Cheung Kong Scholars Program, by PCSIRT, and by CAS Hundred Talents Program.
Melanin
Comment on Text
inset: . Jie Tian is also with Life Science Center, Xidian University, Xi’an, Shanxi 710071, China
Page 2: transformation-invariant features are suitable to estimate

IEEE

Proo

f

2 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 37, NO. 4, AUGUST 2007

is the minutia-based technologies, which are predominantly86

dependent on local landmarks [1], [3], [10], i.e., ridge endings87

and bifurcates. This is widely used for its time saving and less88

memory consumption. However, a minutia set cannot charac-89

terize overall patterns of a fingerprint, and it is hard to further90

improve the performance. The second type is the exclusive91

global feature-based approaches [11]. With these methods,92

the holistic patterns of fingerprint texture are used to calcu-93

late the maximum mutual information between two finger-94

prints. The approaches are employed not only in identification95

[11], [12] but also in indexing [13], [14]. However, these96

methods require the exact determination of central point, and it97

is difficult to deal with distortion in the fingerprints. Moreover,98

the exclusive global information-based method needs much99

memory to store a fingerprint template. The third type is100

technologies based on comprehensive feature [12], [15]. In101

these schemes, fingerprints are matched by fusing minutiae,102

local features, and global features with a hybrid method. Local103

features accelerate the alignment of the input minutia pat-104

terns in different sizes, and the global features are used to105

overcome the shortage of minutiae and local features in low-106

quality fingerprints. In addition, these methods may combine107

various technologies, such as bounding box method and mutual108

information method. These approaches are popular for their109

robust performance with acceptable memory expense in recent110

years. However, these methods are not omnipotent for some111

special conditions with large deformation.112

This paper introduces a comprehensive feature-based tech-113

nique with two novel aspects: 1) A fingerprint pattern is114

characterized by the comprehensive minutiae and the binary115

relations between minutiae; and 2) as an improvement of our116

previous work [9] in alignment, the adaptive Parzen window is117

proposed to model the relationship between the local matching118

probability and the fingerprint transformation.119

A. Comprehensive Minutia120

A poor-quality fingerprint may be too dry or too wet, or the121

foreground area may be narrow with insufficient reliable minu-122

tiae. In some cases, even two fingerprints from the same finger123

fail to match for lack of common minutiae. Therefore, associ-124

ated ridge information is combined to improve the fingerprint125

representation. As demonstrated in Fig. 1, a comprehensive126

minutia Mn includes a minutia and the associated ridge feature,127

formally128

Mn = {xn, yn, θn, βn} ∪ {ϕnm|m = 1, 2, . . . , L} (1)

where (xn, yn) is the coordinate, and θn is the tangent direction.129

βn is the local gray variance of an area centered on (xn, yn).130

ϕnm is the direction from (xn, yn) to Rnm, which is a point131

sampled on the ridge derived from the minutia. {ϕnm|m =132

1, 2, . . . , L} embodies the information of the ridge curvature133

and the local shape, and L is the number of sampled points on134

the associated ridge. Here, the type information of the minutiae,135

e.g., ending or bifurcate, is not employed since it usually makes136

false matching in our experiments.137

Fig. 1. Comprehensive minutiae and binary comprehensive minutia structure.

In this paper, the comprehensive minutia set of a finger- 138

print F is denoted as MF = {Mn|n = 1, 2, . . . ,m(F )}, where 139

m(F ) is the minutia number of F . MF contains the compre- 140

hensive information of all minutiae. 141

B. Binary Comprehensive Minutia Structure 142

In fingerprint representation, minutia is a unary property. 143

There is the binary or higher order relation that conveys the 144

contextual constraints, which are crucial in fingerprint match- 145

ing. In this algorithm, binary structure between minutiae is 146

introduced. For each pair of comprehensive minutia points 147

Mi and Mj , where Mi,Mj ∈ MF and Mi �= Mj , if their 148

Euclidean distance d(Mi,Mj) =√

(xi − xj)2 + (yi − yj)2 149

satisfies dl ≤ d(Mi,Mj) ≤ dh, then Mi and Mj are connected 150

as a local binary structure Ek, formally 151

Ek = {sk, ek} ∪ {υk, θsk, θ

ek,Ψ

sk,Ψ

ek} ∪ {dk, β

sk, β

ek, α

sk, α

ek}(2)

where sk and ek denote the serial numbers of the binary minu- 152

tiae in minutia set MF . As shown in Fig. 1, sk = i and ek = j. 153

{vk, θsk, θ

ek,Ψ

sk,Ψ

ek} stands for the transformation-variant fea- 154

tures; it describes the information that is affected by fin- 155

gerprint transformation, where vk = arctan((yi − yj)/(xi − 156

xj)), θsk = θi, θe

k = θj , Ψsk = {ϕim|m = 1, 2, . . . , L}, and 157

Ψek = {ϕjm|m = 1, 2, . . . , L}. {dk, β

sk, β

ek, α

sk, α

ek} is the 158

transformation-invariant features; it represents the unchanged 159

information under transformation, where dk = d(Mi,Mj), 160

βsk = βi, βe

k = βj , αsk = θi − vk, and αe

k = θj − vk. 161

The binary comprehensive minutia structure set is formally 162

EF = {Ek|k = 1, 2, . . . , e(F )}, where e(F ) is the number of 163

Page 3: transformation-invariant features are suitable to estimate

IEEE

Proo

f

HE et al.: MODELING AND ANALYSIS OF COMPREHENSIVE MINUTIA RELATION FOR FINGERPRINT MATCHING 3

structures. e(F ) is much smaller than m(F )(m(F ) − 1)/2164

because the Euclidean distance d of most minutia pair do not165

satisfy dl ≤ d ≤ dh. The size of EF can be controlled by166

modifying the values of dl and dh. The minutia set MF and167

the binary structure set EF represent fingerprint F as a graph168

GF = (MF , EF ), where MF acts as the vertex set, and EF169

provides the edge set. GF explores the first- and second-order170

minutia relations of fingerprint F , and the higher order relations171

behave as the connected subgraphs of GF .172

III. MEASUREMENT OF TRANSFORMATION PARAMETER173

It is important to align the input minutiae with the template174

during matching. The alignment generally includes rotation,175

translation, and shearing. This matching algorithm is designed176

assuming that the input and template fingerprints are captured177

by the same device in the same condition but with little scaling178

deformation. Since the fingerprint matching performs well in179

polar coordinate, the translation of the input features to the180

template is not concerned if the central point is set in advance.181

One of the most important tasks in alignment is to find the182

optimal rotation parameter.183

A. Matching Probability of Binary Comprehensive184

Minutia Structure185

Since the transformation-invariant features remain un-186

changed under fingerprint transformation, they are ideal for187

the matching probability estimation of local comprehensive188

minutia structures. For each pair of local structures Ei and Et,189

where Ei ∈ EI , Et ∈ ET , and EI and ET denote the local190

structure sets of input fingerprint I and template fingerprint T ,191

respectively, then similarity Sit between Ei and Et is estimated,192

formally193

Sit =

{0, eit > ε and e′it > ε

1 − min(eit,e′it)

ε , otherwise(3)

eit =((di − dt)2 + (βs

i − βst )2 + (βe

i − βet )2

+ (αsi − αs

t )2 + (αe

i − αet )

2) 1

2(4)

e′it =((di − dt)2 + (βs

i − βet )2 + (βe

i − βst )2

+ (αsi − αe

t − 180)2 + (αei − αs

t − 180)2) 1

2(5)

where ε is the matching threshold of transformation-invariant194

feature. If Sit = 0, Mi and Mt are not matched; otherwise195

they are. The more similar the Ei and Et are, the larger the196

Sit is. However, two local structures, which are not from the197

same location of the same fingerprint, can be false matched198

accidentally. The false-matching cases can be excluded with199

the variable bounded box method, and the detail is presented in200

Section IV. All of the matching probability values construct a201

similarity matrix S = [Sit]1≤i≤e(I),1≤t≤e(T ), which represents202

the local comprehensive similarity between fingerprints I and203

T . In the next section, the rotation parameter is statistically204

analyzed with S, and in Section IV, S is used for adjusting 205

translation transformation with iterative strategy. 206

B. Adaptive Parzen Window for Modeling Rotation 207

Transformation 208

The transformation-variant feature is useful for the rotation 209

parameter estimation since it reflects the rotation transforma- 210

tion of a fingerprint. The local rotation parameter between local 211

structures Ei and Et is denoted as δit, and it is estimated as 212

follows: 213

δit =∆υit + ∆θit + ∆Ψit

3(6)

∆υit = υi − υt (7)

∆θit =θs

i + θei − θs

t − θet

2(8)

∆Ψit =1

2L((ϕsi1 + ϕsi2 + · · · + ϕsiL)

+ (ϕei1 + ϕei2 + · · · + ϕeiL)

− (ϕst1 + ϕst2 + · · · + ϕstL)

−(ϕet1 + ϕet2 + · · · + ϕetL)) . (9)

Then, Parzen Window is an effective method for estimating 214

the probability density. When Gaussian function is chosen as 215

the smooth kernel, the probability density f(δ) of rotation 216

parameters δ is formally 217

f(δ,∆x,∆y) =

∑1≤i≤e(I)

∑1≤t≤e(T )

K(δ − δit)

e(I) · e(T )(10)

K(δ − δit) =1√

2πσ2exp

(− (δ−δit)

2

2σ2

)(11)

where σ controls the size of the Parzen window. However, 218

the Parzen window is not appropriate for the estimation since 219

f(δ) is a periodic function and the similarity information of 220

local binary structures is very important for the estimation. 221

Therefore, the adaptive Parzen window is proposed as follows: 222

f(δ) =

∑1≤i≤e(I)

∑1≤t≤e(T )

K(δ − δit)

e(I) · e(T )(12)

K(δ − δit)=

+∞∑

n=−∞1√

2πσ2it

exp

(− (δ−δit+360n)2

2σ2it

), Sit �= 0

1360 , Sit = 0

(13)

where σ2it = 1/2π(aSit)2, and a is an experiential value. 223

Compared with Parzen window, the window size of every 224

sample’s smooth kernel is flexible, and it is determined by 225

the corresponding similarity. Given a rotation angle δit of a 226

local structure, the probability density function conditioned 227

on δit is formally f(δ|δit) = exp(−(δ − δit)2/2σ2it)/

√2πσ2

it. 228

The more similar the local structures are, the more crucial the 229

Melanin
Comment on Text
delete
Page 4: transformation-invariant features are suitable to estimate

IEEE

Proo

f

4 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 37, NO. 4, AUGUST 2007

corresponding rotation angle estimation is. When it is assumed230

that the probabilistic certainty is in proportion to the sim-231

ilarity, i.e., f(δ|δit)|δ=δit= 1/

√2πσ2

it = a · Sit, then σ2it =232

1/(2π(aSit)2). The larger the Sit is, the sharper the f(δ|δit) is.233

In other words, the larger the similarity of two local structures234

is, the more definite the fingerprint rotation angle equals to δit.235

When two local structures are not matched, i.e., Sit = 0, the236

corresponding angle δit cannot make any contribution to the237

final estimation. In this case, f(δ|δit) = 1/360. In (13), it does238

not need to sum the periodic responses from −∞ to +∞; the239

sum from −3 to +3 can yield a satisfying approach.240

To accurately calculate the transformation parameters,241

a confidence interval [δmax − σδ, δmax + σδ] is defined,242

where δmax satisfies f(δmax) = maxδ{f(δ)}, and σδ satis-243

fies σ2δ =

∑it(Sit · (δit − δ)2)/

∑it Sit, where δ =

∑it(Sit ·244

δit)/∑

it Sit. The confidence interval can reduce the effect245

of false matching of local binary structures because the false-246

matching contribution to f(δ) mainly concentrates on the out-247

side of the confidence interval. Moreover, as denoted in (14),248

it is effective to use the barycenter of δ on the interval as the249

optimal estimation δopt rather than δmax, which is sensitive to250

noises, i.e.,251

δopt =

δmax+σδ∫δmax−σδ

δ · f(δ)dδ. (14)

IV. FINGERPRINT MATCHING252

The task of fingerprint matching is to obtain the minimal253

difference between input fingerprint I and template T by254

an optimal alignment. In this paper, however, deformation in255

fingerprints may bring false matching of local structures and256

therefore affects the final result. Thus, the global fingerprint257

matching is essential after the coarse local matching if the258

transformation model is known. In this process, the variable259

bounded box [9] is used to recheck all local matched structures260

to reduce the influence of deformation in fingerprints. The261

matching steps are listed as follows:262

Step 1. For each comprehensive minutia pair Mi and Mt,263

where Mi ∈ M I and Mt ∈ MT , calculate the con-264

nected subgraph similarity Sit, formally265

Sit =∑

n∈RI(n)

∑m∈RT (m)

Snm (15)

where RI(n) = {k|Ek ∈ EI , sk = n, or ek = n},266

and RT (m) = {k|Ek ∈ ET , sk = m, or ek = m}.267

Sit is the similarity between the starlike subgraph268

centered at Mi in GI and the starlike subgraph269

centered at Mt in GT .270

Step 2. Set the iterative number c = 1.271

Step 3. Find the cth maximum connected subgraph similar-272

ity Sci ct and define the corresponding minutia pair273

Mci and Mct as the reference minutia pair.274

Step 4. Use the reference minutiae Mci and Mct as the275

original points of the two graphs GI and GT , re-276

spectively. All minutiae are aligned into their new 277

polar systems and rotated with the statistical pa- 278

rameter δopt. 279

Step 5. For each pair of matched local structures Ei and 280

Et, where Ei ∈ EI , Et ∈ ET , and Sit �= 0, if the 281

two minutiae of Ei are located within the variable 282

bounded boxes [9] centered at the two minutiae of 283

Et, respectively, then Ei and Et are true match; 284

otherwise, they are false match. 285

Step 6. Calculate the similarities of two fingerprints I and T 286

as follows: 287

Sc = fGLM(nc;nth1, nth2)

·fGLM(mc;mth1,mth2) (16)

where nc and mc denote the number and the 288

similarity mean of true-matching local structures, 289

respectively; nth1, nth2, mth1, and mth2 are 290

four empirical values; and fGLM(x; th1, th2) is 291

borrowed from the nonlinear matching technique, 292

formally 293

fGLM(x; th1, th2) =

{ 0, x < th2x−th2

th1−th2 , th2 ≤ x < th11, th1 ≤ x.

(17)

Step 7. If c < C, go back to Step 3, where C is the maxi- 294

mum iterative number and C > 1. 295

Step 8. max1≤c<C{Sc} is the optimal matching value of 296

fingerprints I and T ; the larger the value is, the 297

more similar the two fingerprints are. If the optimal 298

matching value is more than the threshold Sth, the 299

two fingerprints are considered from the same finger. 300

In our method, the thresholds, i.e., ε and Sth, are estimated 301

with the iterated conditional mode, which selects threshold by 302

maximum entropy criterion [16]. The other empirical values, 303

such as C, L, dl, and dh, are predetermined with many experi- 304

ments on a training set. 305

V. EXPERIMENTS 306

We evaluate our algorithm on the fingerprint databases pro- 307

vided by FVC in 2002 [17], which are appropriate for test- 308

ing online fingerprint systems. Our experiments analyzed the 309

character of adaptive Parzen window, checked the validity of 310

rotation parameter estimation, and evaluated the final matching 311

performance. 312

A. Character of the Probability Density Curve 313

In this section, an experiment is performed to analyze the 314

character of the probability density curve estimated by the 315

adaptive Parzen window. The curve from the same fingerprint 316

pair has been compared with that from different fingerprint 317

pairs. 318

Three probability density curves are estimated, as shown in 319

Fig. 2. The first curve is calculated with images A and B, which 320

Page 5: transformation-invariant features are suitable to estimate

IEEE

Proo

f

HE et al.: MODELING AND ANALYSIS OF COMPREHENSIVE MINUTIA RELATION FOR FINGERPRINT MATCHING 5

Fig. 2. Probability density curves of rotation parameter estimated by the adaptive Parzen window.

Fig. 3. Probability density curves under different global rotation parameters.

are acquired from the same finger. The second is estimated321

with images C and D, which come from two similar fingers.322

The third is computed with images A and C, which come323

from two dissimilar fingers. Among these three experiments, 324

the curve of the same fingerprints is very sharp because there 325

are many true-match local structure pairs, which contribute to 326

Page 6: transformation-invariant features are suitable to estimate

IEEE

Proo

f

6 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 37, NO. 4, AUGUST 2007

TABLE IADAPTIVE PARZEN WINDOW VERSUS PARZEN WINDOW AND HISTOGRAM

the density around the true rotation angle. The curve of similar327

fingerprints is more convex than that of dissimilar fingerprints328

since several local structure pairs with the same rotation angle329

are accidentally matched. The experiment shows that the more330

similar the two fingerprints are, the sharper their probability331

density curve is. It is meaningful for quick rejection of impostor332

in practical recognition application. A simple way is to use333

the curve’s peak value as the match value of two fingerprints,334

and if the value is under a threshold, the two fingerprints are335

considered from different fingers.336

B. Performance of the Adaptive Parzen Window337

Two experiments are conducted to evaluate the accuracy338

of the rotation parameter estimation with the adaptive Parzen339

window because the parameter plays a very important role in340

the fingerprint alignment and final matching.341

In the first experiment, a fingerprint is selected randomly342

from FVC2002 database as the template T . Then, the finger-343

print image is transformed with the angles 5◦, 10◦, and 15◦,344

respectively, as the input fingerprint I . Finally, the rotation345

parameter δk between T and I is estimated with the adaptive346

Parzen window, as illuminated in Fig. 3.347

In the experiment, the adaptive Parzen window method is348

compared with the original method and the histogram method.349

As shown in Table I, the average error of our algorithm is below350

half of the Parzen window, and it is about one-third of the351

histogram estimation.352

In the second experiment, a randomly selected fingerprint353

is rotated from 14◦ to −14◦, and in total, 29 estimations are354

conducted, as illuminated in Table II and Fig. 4. The mean and355

standard deviation of the absolute errors are 0.420 and 0.242,356

respectively.357

C. Matching Results on FVC2002358

To evaluate the overall matching performance of our method,359

a series of experiments are conducted over the four fingerprint360

databases of FVC2002. To judge whether the binary compre-361

hensive minutia structure is helpful, the method without the362

binary structure [9], i.e., Alg_1, is compared with the proposed363

method, named Alg_2. The receiving operating curves (ROCs)364

[18] illustrate the overall performance, as shown in Fig. 5.365

Among the four data sets, the fingerprint quality of DB2_a is366

the best, whereas that of DB3_a is the worst [17]. As indicated367

by the ROCs, the proposed method outperforms the algorithm368

that does not involve the binary comprehensive minutia struc-369

tures on FVC2002 databases. The equal error rates (EER) of370

our method are 1.6%, 0.9%, 3.4%, and 1.8% in DB1_a, DB2_a,371

TABLE IIESTIMATED PARAMETER δk VERSUS REAL PARAMETER K

Fig. 4. Trend of the precision of estimated rotation angles.

DB3_a, and DB4_a, respectively, and the results are better 372

than the best academic participants, i.e., PA24 and PA21, in 373

FVC2002 [17]. With Pentium-III 933-MHz central processing 374

unit, the average matching times are 0.37, 0.55, 0.27, and 375

0.29 s in the four databases, respectively, which are much faster 376

than the best industry participants, i.e., PA15 and PA27, in 377

FVC2002 [17]. The better performance is contributed by two 378

aspects: 1) Minutia is replaced by binary minutia structure, 379

and the structure has many effective features to represent a 380

fingerprint; 2) the rotation parameter is accurately measured 381

with the adaptive Parzen Window, and it makes satisfactory 382

fingerprint alignment. 383

Additional experiment is conducted to compare the perfor- 384

mance of binary minutia structure and ternary minutia structure 385

in DB1_a and DB4_a of FVC2002. As illuminated in Table III, 386

the EER of Chen’s algorithm [19] with ternary minutia struc- 387

ture is about two-thirds of the proposed method, but in terms 388

of the resource consumption, the proposed method is very 389

competitive. By employing the binary minutia structure, our 390

method makes a proper tradeoff between the performance and 391

computational expense. This is important for applications that 392

have limited computational resources. 393

VI. CONCLUSION AND FUTURE WORK 394

This paper introduces a robust fingerprint matching method 395

based on the comprehensive features of fingerprint, and it 396

employs two novel technologies: 1) The binary comprehen- 397

sive minutia structure with the transformation-variant and 398

Page 7: transformation-invariant features are suitable to estimate

IEEE

Proo

f

HE et al.: MODELING AND ANALYSIS OF COMPREHENSIVE MINUTIA RELATION FOR FINGERPRINT MATCHING 7

Fig. 5. ROCs of the matching experimental results over the four fingerprint databases of FVC2002.

TABLE IIIBINARY STRUCTURE VERSUS TERNARY STRUCTURE. MMC DENOTES

MAXIMUM MEMORY CONSUMPTION, AND ATS STANDS FOR AVERAGE

TEMPLATE SIZE

transformation-invariant features is implemented to provide399

a comprehensive representation of fingerprint. Meanwhile, it400

results in a graph representation of fingerprint. 2) The adaptive401

Parzen window is proposed to measure the transformation para-402

meter. Compared with the traditional one, the adaptive Parzen403

window admits the periodic property, and it is more accurate404

by exploring the similarity information of local structure pairs.405

Moreover, it is more robust and needs fewer samples than the406

simple histogram estimation. By the way, the probability den-407

sity curve, which is estimated by the adaptive Parzen window,408

shows the potential ability for fast impostor rejection.409

Our method is based on the assumption that input fingerprint410

and the template are captured from the same sensor. In the case411

of different modal fingerprints [20], transformation invariants412

and variants of local structures will become invalid. Therefore,413

we will investigate the technique that employs a multiscale414

search strategy to address the issue. In addition, global pat-415

tern and features, as well as a hybrid matching technique,416

will be investigated to minimize false matching, which occa-417

sionally occurs with large deformation and very poor quality418

fingerprints.419

ACKNOWLEDGMENT 420

The authors would like to thank Dr. Y. He for his grand 421

contribution and crucial advice on this paper, as well as 422

Dr. Y. Liu for revising the English. 423

REFERENCES 424

[1] A. Jain, L. Hong, S. Pankanti, and R. Bolle, “An identity authentication 425system using fingerprints,” Proc. IEEE, vol. 85, no. 9, pp. 1365–1388, 426Sep. 1997. 427

[2] A. Jain, R. Bolle, and S. Pankanti, BIOMETRICS Personal Identification 428in Networked Society. Norwell, MA: Kluwer, 1999. 429

[3] X. Jiang and W. Yau, “Fingerprint minutiae matching based on the local 430and global structures,” in Proc. 15th Int. Conf. Pattern Recog., 2000, 431vol. 2, pp. 1042–1045. 432

[4] X. Lou and J. Tian, “A minutia matching algorithm in fingerprint verifica- 433tion,” in Proc. 15th Int. Conf. Pattern Recog., 2000, vol. 4, pp. 833–836. 434

[5] A. Jain, A. Ross, and S. Prabhakar, “Fingerprint matching using minutiae 435and texture features,” in Proc. 4th Int. Conf. Image Process., Thessaloniki, 436Greece, 2001, pp. 282–285. 437

[6] S. Gold and A. Rangarajan, “A graduated assignment algorithm for 438graph matching,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 18, no. 4, 439pp. 377–388, Apr. 1996. 440

[7] A. Hrechak and J. McHugh, “Automated fingerprint recognition using 441structural matching,” Pattern Recognit., vol. 23, no. 8, pp. 893–904, 1990. 442

[8] Z. Kovacs-Vajna, “A fingerprint verification system based on triangular 443matching and dynamic time warping,” IEEE Trans. Pattern Anal. Mach. 444Intell., vol. 22, no. 11, pp. 1266–1276, Nov. 2000. 445

[9] Y. He, J. Tian, X. Luo, and T. Zhang, “Image enhancement and minutiae 446matching in fingerprint verification,” Pattern Recognit. Lett., vol. 24, 447no. 9, pp. 1349–1360, Jun. 2003. 448

[10] D. Maio and D. Maltoni, “Direct gray-scale minutiae detection in finger- 449prints,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 1, pp. 27–40, 450Jan. 1997. 451

[11] L. Hong and A. Jain, “Classification of fingerprint images,” in Proc. 11th AQ1452Scandinavian Conf. Image Anal., Kangerlussuaq, Greenland, 1999. 453

[12] J. Chang and K. Fan, “A new model for fingerprint classification by ridge 454distribution sequences,” Pattern Recognit., vol. 35, no. 6, pp. 1209–1223, 455Jun. 2002. 456

Melanin
Comment on Text
insert: pp781-795,
Page 8: transformation-invariant features are suitable to estimate

IEEE

Proo

f

8 IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 37, NO. 4, AUGUST 2007

[13] A. Jain, S. Prabhakar, L. Hong, and S. Pankanti, “Filterbank-based finger-457print matching,” IEEE Trans. Image Process., vol. 9, no. 5, pp. 846–859,458May 2000.459

[14] M. Tico and P. Kuosmanen, “Fingerprint matching using an orientation-460based minutia descriptor,” IEEE Trans. Pattern Anal. Mach. Intell.,461vol. 25, no. 8, pp. 1009–1014, Aug. 2003.462

[15] Y. He and J. Tian, “Fingerprint matching based on global comprehen-463sive similarity,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 6,464pp. 850–862, Jun. 2006.465

[16] X. Lou and J. Tian, “The ICM algorithm for multi-level threshold selec-466tion by maximum entropy criterion,” J. Softw., vol. 11, no. 3, pp. 379–385,4672000. (in Chinese, with English abstract).468

[17] D. Maio, D. Maltoni, R. Cappelli, J. Wayman, and A. Jain, “FVC2002:469Second fingerprint verification competition,” in Proc. 16th Int. Conf.470Pattern Recog., 2002, vol. 3, pp. 811–814.471

[18] ——, “FVC2000: Fingerprint verification competition,” IEEE Trans.472Pattern Anal. Mach. Intell., vol. 24, no. 3, pp. 402–412, Mar. 2002.473

[19] X. Chen, J. Tian, and X. Yang, “An novel algorithm for distorted474fingerprint matching based on fuzzy features match,” in Proc. 5th Int.475Conf. Audio- and Video-Based Biometric Person Authentication, 2005,476pp. 665–673.477

[20] Y. He, J. Tian, R. Qun, and X. Yang, “Maximum-likelihood deformation478analysis of different-sized fingerprints,” in Proc. 4th Int. Conf. Audio- and479Video-Based Biometric Person Authentication, 2003, pp. 421–428.480

Xiaoguang He received the B.S. degree from the481Special Class for the Gifted Young, University of482Science and Technology of China, Beijing, China,483in 2002. He is currently working toward the Ph.D.484degree at the Key Laboratory of Complex Systems485and Intelligence Science, Institute of Automation,486Chinese Academy of Sciences, Beijing.487

His research interests include pattern recognition,488machine learning, and image processing and their489applications in biometrics.490

Jie Tian (M’03–SM’03) received the Ph.D. degree491(with honors) in artificial intelligence from the Insti-492tute of Automation, Chinese Academy of Sciences493(CAS), Beijing, China, in 1992.494

From 1994 to 1996, he was a Postdoctoral Fellow495with the Medical Image Processing Group, Univer-496sity of Pennsylvania, Philadelphia. Since 1997, he497has been a Professor with the Key Laboratory of498Complex Systems and Intelligence Science, Institute499of Automation, CAS. He has published more than50050 papers in academic journals and international501

conferences. His research interests include medical image process and analysis,502pattern recognition, etc.503

Prof. Tian received the Awards of National Scientific and Technological504Progress in 2003 and 2004, respectively. He is a specially invited reviewer for505Mathematical Reviews.506

Liang Li received the B.S. degree from Northwest- 507ern Polytechnical University, Xi’an, China, in 2002. 508He is currently working toward the Ph.D. degree at 509the Key Laboratory of Complex Systems and In- 510telligence Science, Institute of Automation, Chinese 511Academy of Sciences, Beijing, China. 512

His research interests include pattern recognition, 513machine learning, and image processing and their 514applications in biometrics. 515

Yuliang He received the B.S. degree in computer 516and system science from Nankai University, Tianjin, 517China, in 1997 and the M.S. and Ph.D. degrees from 518the Institute of Automation, Chinese Academy of 519Sciences (CAS), Beijing, China, in 2003 and 2006, 520respectively. 521

He is currently with the Key Laboratory of Com- 522plex Systems and Intelligence Science, Institute of 523Automation, CAS. His research interests include pat- 524tern recognition, machine learning, and information 525fusion and their applications in biometrics. 526

Dr. He received the CAS President Scholarship in 2005. 527

Xin Yang received the B.S., M.S., and Ph.D. degrees 528in intelligent instruments from Tianjin University, 529Tianjin, China, in 1994, 1997, and 2000, respec- 530tively. 531

From 2001 to 2003, she was a Postdoctoral Fellow 532with the Biometric Research Group, Key Labora- 533tory of Complex Systems and Intelligence Science, 534Institute of Automation, Chinese Academy of Sci- 535ences, Beijing, China. Since 2003, she has been 536an Associate Professor with the Laboratory. Her 537research interests include bioinformatics, pattern 538recognition, etc. 539

Melanin
Comment on Text
replace: D. Maio, D. Maltoni, R. Cappelli, J. Wayman, and A. Jain
Melanin
Comment on Text
replace: M’01
Page 9: transformation-invariant features are suitable to estimate

IEEE

Proo

f

AUTHOR QUERIES

AUTHOR PLEASE ANSWER ALL QUERIES

AQ1 = Please provide page range in Ref. [11].Note: 1) “Guildford” was deleted in Ref. [20].

END OF ALL QUERIES