Partial Fingerprint Reconstruction with Improved Smooth Extension

  • Wei Zhou
  • Jiankun Hu
  • Ian Petersen
  • Mohammed Bennamoun
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)


Almost all existing attempts on partial fingerprints focus on one-to-one fingerprint matching using level 2 or level 3 features obtainable in the partial segment. Recently a model-based partial fingerprint reconstruction algorithm is introduced, which aims to extend the fingerprint ridge flows smoothly into the missing part from a different perspective. This novel idea has shown promising results for narrowing down the candidate lists before matching. On this basis we propose to improve the scheme of smooth extensions and take into account the boundary effect while retrieving the initial raw orientation field. The experiment results show that the orientation field reconstructed by our algorithm is more faithful to the ground truth.


partial fingerprint orientation field smooth extension image forensic biometrics 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Xi, K., Hu, J., Han, F.: Mobile device access control: an improved correlation based face authentication scheme and its java me application. Concurr. Comput.: Pract. Exper. 24(10), 1066–1085 (2012)CrossRefGoogle Scholar
  2. 2.
    Xi, K., Tang, Y., Hu, J.: Correlation keystroke verification scheme for user access control in cloud computing environment. Comput. J. 54(10), 1632–1644 (2011)CrossRefGoogle Scholar
  3. 3.
    Ahmad, T., Hu, J., Wang, S.: Pair-polar coordinate-based cancelable fingerprint templates. Pattern Recogn. 44(10-11), 2555–2564 (2011)CrossRefGoogle Scholar
  4. 4.
    Wang, S., Hu, J.: Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (ditom) approach. Pattern Recogn. 45(12), 4129–4137 (2012)CrossRefGoogle Scholar
  5. 5.
    Xi, K., Ahmad, T., Han, F., Hu, J.: A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment. Journal of Security and Communication Networks 4(5), 487–499 (2011)CrossRefGoogle Scholar
  6. 6.
    Xi, K., Hu, J.: Introduction to Bio-cryptography. In: Handbook of Information and Communication Security. Springer (2010)Google Scholar
  7. 7.
    Jea, T.Y., Govindaraju, V.: A minutia-based partial fingerprint recognition system. Pattern Recogn. 38(10), 1672–1684 (2005)CrossRefGoogle Scholar
  8. 8.
    Chen, Y., Jain, A.K.: Dots and excipients extended features for partial fingerprint matching. In: Proc. Biometric Consortium Conf. (September 2007)Google Scholar
  9. 9.
    Feng, J., Jain, A.K.: Filtering large fingerprint database for latent matching. In: Proc. Int. Conf. on Pattern Recognition (ICPR 2008), pp. 1–4 (2008)Google Scholar
  10. 10.
    Jain, A.K., Feng, J.: Latent fingerprint matching. IEEE Transactions on Pattern Analysis and Machine Intelligence 33(1), 88–100 (2011)CrossRefGoogle Scholar
  11. 11.
    Wang, Y., Hu, J.: Global ridge orientation modeling for partial fingerprint identification. IEEE Trans. Pattern Anal. Mach. Intell. 33(1), 72–87 (2011)CrossRefGoogle Scholar
  12. 12.
    Wang, Y., Hu, J., Phillips, D.: A fingerprint orientation model based on 2d fourier expansion (fomfe) and its application to singular-point detection and fingerprint indexing. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 573–585 (2007)CrossRefGoogle Scholar
  13. 13.
    Wang, Y., Hu, J., Schroder, H.: A gradient based weighted averaging method for estimation of fingerprint orientation fields. In: Proceedings of the Digital Image Computing: Techniques and Applications, DICTA 2005 (December 2005)Google Scholar
  14. 14.
    Zhang, P., Hu, J., Li, C., Bennamoun, M., Bhagavatula, V.: A pitfall in fingerprint bio-cryptographic key generation. Computers & Security 30(5), 311–319 (2011)CrossRefGoogle Scholar
  15. 15.
    Wang, Y., Hu, J., Han, F.: Enhanced gradient-based algorithm for the estimation of fingerprint orientation field. Applied Mathematics and Computation 185(2), 823–833 (2007)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Wei Zhou
    • 1
  • Jiankun Hu
    • 1
  • Ian Petersen
    • 1
  • Mohammed Bennamoun
    • 2
  1. 1.School of Engineering and Information TechnologyThe University of New South WalesCanberraAustralia
  2. 2.School of Computer Science and Software EngineeringThe University of Western AustraliaPerthAustralia

Personalised recommendations