Image Compression Algorithms For Fingerprint System
Image Compression Algorithms For Fingerprint System
Abstract
minutiae based automatic identification technique first
Fingerprint-which have been used for about 100 years are the locates the minutiae point and matches their relative
oldest biometric signs of identity. Humans have used fingerprints placement in a given finger and the stored template,
for personal identification for centuries and the validity of shown in figure 1.
fingerprint identification has been well established. In fact,
fingerprint technology is so common in Human Identification that
it has almost become the synonym of biometrics. Fingerprints are
believed to be unique across individuals and across fingers of
same individual. Even identical twins having similar DNA, are
believed to have different fingerprints. The analysis of
fingerprints for matching purposes generally requires the
comparison of several features of the print pattern. These include
patterns, which are aggregate characteristics of ridges, and minutia
points, which are unique features found within the patterns. is also
necessary to know the structure and properties of human skin in
order to successfully employ some of the imaging technologies. A
major approach for fingerprint recognition today is to extract
Fig. 1: Fingerprint Recognition System
minutiae from fingerprint images and to perform fingerprint
matching based on the number of corresponding minutiae pairings.
One of the most difficult problems in fingerprint recognition has The fingerprint image may be obtained from a thumb pad
been that the recognition performance is significantly influenced fingerprint scanner device scanning at 500 dpi [2] . A
by fingertip surface condition, which may vary depending on good quality fingerprint contains between 60 and 80
environmental or personal causes. Addressing this problem this minutiae, but different fingerprint have different number
paper propose some extra features that can be used to strengthen of minutiae. A fingerprint image essentially consists of a
the present approaches followed in developing Fingerprint
set of minutiae on the plane. Minutiae are the
recognition system. To increase security and accuracy we can use
Infrared technique and technique to assign a score value to each of terminations and bifurcations of ridge lines in a
extracted minutiae. fingerprint image. In order to extract these minutiae, we
have to undergo the operation linearization followed by
the process of thining. Thus, the set minutiae those are
Key Terms Biometric, Minutiae, Binarization, Thinning,
Median Filter.
well defined and more prominent then the rest are given
higher relevance and importance in the process of
minutiae matching.
1. Introduction
1. User Interface (with Infrared Sensor) the regions that can not be reliable recovered. The
enhanced fingerprint image is fed to the minutiae
2. System Database extractor again. The task of authentication module is
to authenticate the identity of the person who intends
3. Enrollment Module to access the system. The person to be authenticated
indicates his / her identity and places his / her finger
on the fingerprint scanner ; a digital image of his her
4. Authentication Module fingerprint is captured ; minutiae pattern is extracted
from the captured fingerprint image and fed to a
Infrared matching algorithms which matches it against the
Sensor persons minutiae templates stored in the system
database to establish the identity To increase
security and accuracy we can use Infrared technique
and technique to assign a score value to each of
extracted minutiae.
User name of the person , Fig. 4: Block diagrams of Enrollment ,Verification, Identification Task
Minutiae templates of the persons fingerprint,
and other information (e.g., specific user 3. Development of proposed system
privileges). Alongwith thermal parameter.
Proposed system consist of following sub modules -
The task of enrollment module is to enroll persons
and their fingerprints into the system database.
3.1 Normalization
When the fingerprint images and user name of a
person to be enrolled are fed to the enrollment
module, a minutiae extraction algorithm is first By normalizing an image, the colors of the image are
applied to the fingerprint images and the minutiae spread evenly throughout the gray scale. A normalized
patterns are extracted. A quality checking algorithm image is much easier to compare with other images, and
is used to ensure that the records in the system the quality of the image is easier determined.
database only consist of fingerprints of good quality, Normalization is a pixel-wise operation that does not
in which a significant number (default value is 25) change the clarity of the ridge and valley structures .
of genuine minutiae may be detected. If a fingerprint Normalization reduces the variations in gray level values
image is of poor quality, it is enhanced to improve along ridges and valleys, which facilitates the subsequent
the clarity of ridge/vally structures and mask out all processing steps.
Let I(x; y) denote the grayscale value at pixel (x; y), M and
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 9, May 2010 47
ISSN (Online): 1694-0784
ISSN (Print): 1694-0814
3.2 Median Filter Median filtering is a simple and very effective noise
removal filtering process. Its performance is particularly
good for removing shot noise. Shot noise consists of
In image processing it is usually necessary to perform
strong spike like isolated values.
high degree of noise reduction in an image before
performing higher-level processing steps, such as edge
detection. The median filter is a non-linear digital Shown below are the original image and the same image
filtering technique, often used to remove noise from after it has been corrupted by shot noise at 10%. This
images or other signals. The idea is to examine a sample means that 10% of its pixels were replaced by full white
of the input and decide if it is representative of the signal. pixels. Also shown are the median filtering results using
This is performed using a window consisting of an odd 3x3 and 5x5 windows; three (3) iterations of 3x3 median
number of samples. The values in the window are sorted filter applied to the noisy image; and finally for
into numerical order; the median value, the sample in the comparison, the result when applying a 5x5 mean filter
center of the window, is selected as the output. The to the noisy image.
oldest sample is discarded, a new sample acquired, and
the calculation repeats.
is used. Gray level images cannot be operated on for the 2. The algorithm finds out (x,y) location of the
determination of key features as the range of values of first block pixel which is not processed yet in
pixel intensities very widely. So it is very difficult to the original binary image.
discriminate conspicuously the valleys from the ridges, 3. A black pixel is inserted into thinned image at
as well as ridges bifurcations from ridge endings. Hence (x,y) location (gray pixels) and the black pixel
some half toning technique needs to be applied on the is removed from the original binary image at the
finger print image. A popular technique is that of location.
Threshold of Binarization [3] [4] [5]. Then algorithm looks at the ridge continuity , if
In many image-processing applications it is desired to there is ridge continuity , it follows the ridge.
convert the the gray images into white and black (bi-
level) image. Thesholding involves looking at each pixel 3.5 Noise Removal
and deciding whether it can be converted into white (0)
or black (255), the decision is made by comparing the
numerical pixel value against a fixed number called a After applying thining algorithm we are lift with an
threshold level (T). If any pixel of image(x ,y) is less image that still has got some noise , i.e. some ridges
than the threshold level (T), the pixel is set to zero are not of one pixel width or some other noise , this
(background point), otherwise it is set to 255 (object module is used to remove this noise
point). In this we check if in the neighborhood of a pixel
there are more than five pixels. Less than five pixels
Algorithm: imply that this pixel is a ridge end or bifurcation or
some part of a ridge. More than five pixels imply
1. Divide the image into 4*4 regions. that this pixel is associated with some noise.
2. Calculate the average of gray level in the first
4*4 region. 3.6 Depuration
3. Threshold the leftmost region of 4*2 by using
average gray level calculated in stage2. The image obtained from previous module still not
4. Move the 4*4 operation window by 2 pixels to suitable for minutie detection . This module removes
the right . If right edge of the image is reached , some more defects .Depuration of the ridge map
then move the window 4 pixels up and return to involves removal of the spurious elements,
the left edge . identified as undesirable spikes, and to join the
5. Repeat stage 2 to stage 4 until the entireimage is broken lines using a smoothening procedure . This
processed by RAT(Regional average depuration process is carried out by simple rules
thresholding). like .
defined as half the sum of the differences between pairs The number of minutiae in a given area is also limited
of adjacent pixels defining the 8-neighborhood of p. therefore the minutiae density must also be kept in check.
Mathematically in eq .(2). In order to filter out these false minutiae a 3 level-
filtering process is applied:
cn( p ) 1
2 | val ( p
i 1..8
i mod 8 ) val ( pi 1) | (2)
Level 1: Removes the false ridge endings created as a
result of the application of minutiae extraction algorithm
Where p0 to p7 are the pixels belonging to an ordered at the ends of the thinned image.
sequence of pixels defining the 8-neighborhood of p and
val (p) is the pixel value. Level 2: Removes the first five types of minutiae
mentioned above using the rule based morphological
minutiae filtering approach given by .
Let T and I be the representation of the template and more reliable . This system needs some extra cost
input fingerprint, respectively. Let the minutiae sets of and more processing time, but one can not
the two fingerprints be given by: compromise with the security.