Advertisement

Fingerprint System

  • David D. Zhang
Part of the The International Series on Asian Studies in Computer and Information Science book series (ASIS, volume 7)

Abstract

Fingerprint identification is the most widespread application of biometrics technology. In this chapter, we will firstly review the current fingerprint systems. Section 5.2 defines some different types of feature points and then systematically summarizes the rules of how to distinguish the true minutiae from the false ones. Fingerprint image processing and minutiae determination algorithms are described in Section 5.3 and 5.4, respectively. Fingerprint matching and the corresponding experiment results are finally given.

Keywords

Feature Point Binary Image Fingerprint Image Fingerprint Pattern Short Ridge 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    H.C. Lee and R.E. Gaensslen, editors, Advances in Fingerprint Technology, Elsevier, New York, 1991.Google Scholar
  2. [2]
    A.K. Jain, R. Bolle and S. Pankanti (editors), Biometrics: Personal Identification in a Networked Society, Kluwer Academic Press, 1999.Google Scholar
  3. [3]
    A. Jain, L. Hong and R. Bolle, “On-line Fingerprint Verification,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp. 302–314, 1997.CrossRefGoogle Scholar
  4. [4]
    V.S. Srinivasan and N.N. Murthy, “Detection of Singular Points in Fingerprint Images”, Pattern Recognition, vol. 25, no. 2, pp. 139–153, 1992.CrossRefGoogle Scholar
  5. [5]
    S. Marcelja, “Mathematical Description of the Responses of Simple Cortical Cells,” J. Opt. Soc. Am. A70, pp. 1297–1300, 1980.Google Scholar
  6. [6]
    M Lindenbaum, M. Fischer and A. Bruckstein, “On Gabor’s Contribution to Image Enhancement,” Pattern Recognition, vol. 27, no. 1, pp 1–8, 1994.CrossRefGoogle Scholar
  7. [7]
    A.K. Jain and F. Farrokhnia, “Unsupervised Texture Segmentation Using Gabor Filters,” Pattern Recognition, vol. 24, no. 12, pp. 1167–1186, 1991.CrossRefGoogle Scholar
  8. [8]
    J. Kittler and J. Illingworth, “Minimum Error Thresholding,” Pattern Recognition, vol. 19, no. 1, pp.41-47, 1986.Google Scholar
  9. [9]
    L. Lam, S.W. Lee and C.Y. Suen, “Thinning Methodology — A Comprehensive Survey,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 14, no. 9, pp. 869–885, 1992.CrossRefGoogle Scholar
  10. [10]
    C.V.K. Rao and K. Black, “Type Classification of Fingerprints: A Syntactic Approach,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 2, pp. 223–231, 1980.CrossRefGoogle Scholar
  11. [11]
    J.L. Blue, G.T. Candela, P. J. Grother, R. Chellapa and C. L. Wilson, “Evaluation of Pattern Classifiers of Fingerprint and OCR Applications”, Pattern Recognition, vol. 27, no. 4, pp. 485–501, 1994.CrossRefGoogle Scholar
  12. [12]
    C.L. Wilson, G.T. Candela and C.I. Waston, “Neural Network Fingerprint Calssification,” J. Artific. Nerual Networks, vol. 1, no. 2, pp. 1–25, 1993.Google Scholar
  13. [13]
    K. Karu and A.K. Jain, “Fingerprint Classification,” Pattern Recognition, vol. 29, no. 3, pp. 389–404, 1996.CrossRefGoogle Scholar
  14. [14]
    A.K. Jain, L. Hong, S. Pankanti, and R. Bolle, “An Identity-Authentication System Using Fingerprint”, Proceedings of The IEEE, vol. 85, no. 9, pp. 1365–1388, 1997.CrossRefGoogle Scholar
  15. [15]
    Z. Bian, D. Zhong (editors), Intelligent Signal Processing and Intelligent Control, Zhejiang Science & Technology Publishing House, 1998.Google Scholar
  16. [16]
    D.K. Isenor and S.G. Zaky, “Fingerprint Identification Using Graph Matching,” Pattern Recognition, vol. 19, no. 2, pp. 113–122, 1986.CrossRefGoogle Scholar
  17. [17]
    A.K. Herchak and J.A. McHugh, “Automated Fingerprint Recognition Using Structural Matching,” Pattern Recognition, vol. 23, no. 8, pp. 893–904, 1990.CrossRefGoogle Scholar
  18. [18]
    A. Wahab, S.H. Chin, E.C. Tan, “Novel Approach to Automated Fingerprint Recognition,” IEE Proc, Vision, Image Signal Proc-ess, vol. 145, no. 3, June 1998.Google Scholar
  19. [19]
    B. Moayer, and K.S. Fu, “A Tree System Approach for Fingerprint Pattern Recognition,” IEEE Trans., PAMI, vol. 8, no. 3, pp. 376–387, 1986.CrossRefGoogle Scholar
  20. [20]
    B.G. Sherlock, D.M Monro, and K. Millard, “Fingerprint Enhancement by Directional Fourier Filtering,” IEE Proc, Vision, Image, Signal Process., vol. 141, no. 2, pp. 87–94, 1994.CrossRefGoogle Scholar
  21. [21]
    K.R. Nalini, K. Kam, S. Chen and A.K. Jain, “A Real-time Matching System for Large Fingerprint Databased,” IEEE Trans., PAMI, vol. 18, no. 8, pp. 799–813, 1996.CrossRefGoogle Scholar
  22. [22]
    B.G. Sherlock, D.M Monro and K. Millard, “Algorithm for Enhancing Fingerprint Images,” Electron. Lett., vol. 28, no. 18, pp. 1720–1721, 1992.Google Scholar
  23. [23]
    Q. Xio and H. Raafat, “A Combined Statistical and Structural Approach for Fingerprint Image Postprocessing,” Proc. of IEEE International Conference on Systems, Man and Cybernetics, Los Angeles, CA, USA, pp. 331–335, Nov. 1990.Google Scholar
  24. [24]
    R. Bahuguna, “Fingerprint Verification Using Hologram Matched Filterings,” in Proc. Biometrics Consortium Eighth Meeting, San Jose, CA, June, 1996.Google Scholar
  25. [25]
    L. Coetzee and E.C. Botha, “Fingerprint Recognition in Low Quality Images,” Pattern Recognition, vol.26, no. 10, pp. 1441–1460, 1993.Google Scholar
  26. [26]
    P.E. Danielsson and Q.Z. Ye, “Rotation-Invariant Operators Applied to Enhancement of Fingerprints,” Proc. Eighth ICPR, pp. 329–333, Rome, 1988.Google Scholar
  27. [27]
    L. Hong, A.K. Jain, S. Pankanti, and R. Bolle, “Fingerprint Enhancement,” in Proc. IEEE Workshop on Applications of Computer Vision, Sarasota, FL, pp. 202–207, 1996.Google Scholar
  28. [28]
    D.C.D. Hung, “Enhancement and Feature Purification of Fingerprint Images,” Pattern Recognition, vol. 26, no. 11, pp. 1661–1671, Nov. 1993.CrossRefGoogle Scholar
  29. [29]
    M. Kawagoe and A. Tojo, “Fingerprint Pattern Classification,” Pattern Recognition, vol. 17, no. 3, pp.295-303, 1984.Google Scholar
  30. [30]
    D. Maio and D. Maltoni, “A Structural Approach to Fingerprint Classification”, in Proc. 13th ICPR, Vienna, Austria, pp. 132–138, 1996.Google Scholar
  31. [31]
    L. O’Gorman and J. Nickerson, “An approach to fingerprint filter design,” Pattern Recognition, vol.22, pp. 29–38, 1989.Google Scholar
  32. [32]
    A. Sherstinsky and R.W. Picard, “Restoration and Enhancement of Fingerprint Images Using M-Lattice-A Novel Nonlinear Dynamical System,” Proc. 12th 1CPR-B, pp. 195–200, Jerusalem, 1994.Google Scholar
  33. [33]
    J. D. Stosz and L. A. Alyea, “Automated System for Fingerprint Authentication Using Pores and Ridge Structure,” in Proc. SPIE, Automatic Systems for the Identification and Inspection of Humans, San Diego, CA, vol. 2277, pp. 210–223, July 1994.Google Scholar
  34. [34]
    A.R. Roddy, J. D. Stosz, “Fingerprint Features — Statistical Analysis and System Performance Estimates, ” Proceedings of the IEEE, vol.85, no.9, September 1997.Google Scholar
  35. [35]
    B.M. Mehtre, “Fingerprint Image Analysis for Automatic Identification,” Machine Vision and Applications, vol.6, pp. 124–139, 1993.Google Scholar
  36. [36]
    D. Maio and D. Maltoni, “An Efficient Approach to On-lne Finger Print Verification,” Proc. VIII Int. Symposium on Artificial Intelligence, 1995.Google Scholar

Copyright information

© Springer Science+Business Media New York 2000

Authors and Affiliations

  • David D. Zhang
    • 1
  1. 1.Hong Kong Polytechnic UniversityHong Kong

Personalised recommendations