Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
Nbis Non Export Control

Nbis Non Export Control

Ratings: (0)|Views: 26 |Likes:
Published by David Viana

More info:

Published by: David Viana on Jul 01, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/27/2013

pdf

text

original

 
i
User's Guide to
NIST Biometric Image Software(NBIS)
Craig I. Watson (cwatson@nist.gov)Michael D. Garris (mgarris@nist.gov)Elham Tabassi (elham.tabassi@nist.gov)Charles L. Wilson (cwilson@nist.gov)R. Michael McCabe (mccabe@nist.gov)Stanley Janet (sjanet@nist.gov)Kenneth Ko (kenko@nist.gov) National Institute of Standards and TechnologyBldg. 225, Rm. A216100 Bureau Drive, Mail Stop 8940Gaithersburg, MD 20899-8940
 
ii
ACKNOWLEDGEMENTS
We would like to acknowledge the Federal Bureau of Investigation and the Department of Homeland Security who provided funding and resources in conjunction with NIST to support thedevelopment of this fingerprint image software.
NOTE TO READER 
This document provides guidance on how the NIST Biometric Image Software (NBIS) non-export controlled packages are installed and executed. Its content and format is one of user'sguide and reference manual. Some algorithmic overview is provided, but more details can befound in the cited references.The Table of Contents provides the reader a map into the document, and the hyperlinks in theelectronic version enable the reader to effectively navigate the document and locate desiredinformation. These hyperlinks are unavailable when using a paper copy of the document. Anyupdates to this software will be posted NIST Image Group’s Open Source Sever (NIGOS).
 
iiiTABLE OF CONTENTS
1.
 
INTRODUCTION......................................................................................................................................................1
 
2.
 
INSTALLATION GUIDE.........................................................................................................................................5
 
2.1.
 
Software Installation............................................................................................................................................5
 
2.2.
 
Data and Testing Directories...............................................................................................................................7
 
3.
 
OPEN SOURCE PACKAGES ON NIGOS...........................................................................................................8
 
3.1.
 
PCASYS – Fingerprint Pattern Classification....................................................................................................8
 
3.2.
 
MINDTCT Minutiae Detection......................................................................................................................10
 
3.2.1.
 
Definition of Minutiae...............................................................................................................................10
 
3.2.2.
 
Latent Fingerprints.....................................................................................................................................12
 
3.3.
 
 NFIQ – Fingerprint Image Quality...................................................................................................................13
 
3.4.
 
AN2K7 – Standard Reference Implementation................................................................................................14
 
3.5.
 
IMGTOOLS – General Purpose Image Utilities..............................................................................................15
 
4.
 
EXPORT CONTROL PACKAGES......................................................................................................................17
 
4.1.
 
 NFSEG – Four-Finger Plain Segmentation......................................................................................................17
 
4.2.
 
BOZORTH3 – Fingerprint Matcher.................................................................................................................17
 
5.
 
ALGORITHMS........................................................................................................................................................18
 
5.1.
 
PCASYS.............................................................................................................................................................18
 
5.1.1.
 
Algorithmic Description............................................................................................................................18
 
5.1.2.
 
Computing Features...................................................................................................................................37
 
5.1.3.
 
Training the Neural Networks...................................................................................................................38
 
5.1.4.
 
Running
PCASYS
.......................................................................................................................................43
 
5.1.5.
 
Classification Results.................................................................................................................................45
 
5.2.
 
MINDTCT..........................................................................................................................................................48
 
5.2.1.
 
Input Fingerprint Image File
[/NBIS/Main/an2k7/src/lib/an2k7/fmtstd.c;read_ANSI_NIST_file(),/NBIS/Main/imgtools/src/lib/image/imgdecod.c;read_and_decode_grayscale_image()]
..............................................................................................49
 
5.2.3.
 
Binarize Image
[/NBIS/Main/mindtct/src/lib/lfs/binar.c; binarize_V2()]
.59
 
5.2.4.
 
Detect Minutiae
[/NBIS/Main/mindtct/src/lib/lfs/minutia.c;detect_minutiae_V2()]
...............................................................................................................................60
 
5.2.5.
 
Remove False Minutiae
[/NBIS/Main/mindtct/src/lib/lfs/remove.c;remove_false_minutia_V2()]
..................................................................................................................61
 
5.2.6.
 
Count Neighbor Ridges
[/NBIS/Main/mindtct/src/lib/lfs/ridges.c;count_minutiae_ridges()]
.......................................................................................................................69
 
5.2.7.
 
Assess Minutia Quality
[/NBIS/Main/mindtct/src/lib/lfs/quality.c;combined_minutia_quality()]
................................................................................................................69
 
5.2.8.
 
Output Minutiae File
[/NBIS/Main/an2k7/src/lib/an2k7/fmtstd.c;write_ANSI_NIST_file(), /NBIS/Main/mindtct/src/lib/lfs/results.c;write_text_results()]
...............................................................................................................................71
 
5.3.
 
 NFIQ
[/NBIS/Main/nfiq/src/lib/nfiq/{nfiq.c, nfiqggbls.c, nfiqread.c,znorm.c}]
..................................................................................................................................................................73
 
5.3.1.
 
 NFIQ Neural Network Training................................................................................................................73
 
6.
 
REFERENCES.........................................................................................................................................................76
 
APPENDIX A.
 
MLP TRAINING OUTPUT
.............................................................................................................80
 
Explanation of the output produced during MLP training..........................................................................................80
 
Pattern-Weights........................................................................................................................................................80
 
Explanation of Output..............................................................................................................................................81
 

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->