You are on page 1of 6

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Seonjoo Kim, Dongjae Lee, and Jaihie Kim


Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea sjkim23@seraph.yonsei.ac.kr

Abstract. A common problem in ngerprint recognition is the existence of false minutiae which increase both FAR and FRR in ngerprint matching. In this paper, a robust minutiae postprocessing algorithm is proposed. Unlike most algorithms which use simple distance and connectivity criterions for postprocessing, we also used orientation and ow of ridges as the key factor for postprocessing to avoid eliminating true minutiae while postprocessing. It is shown by the experiments that our postprocessing algorithm improves the minutiae extraction accuracy and the performance of the matching process.

Introduction

Most ngerprint recognition systems are based on minutiae matching [1]. Minutiae are local discontinuities of ngerprints and are restricted to two types : ridge ending and ridge bifurcation [2], [3]. A common problem in ngerprint recognition is the existence of false minutiae which increase both FAR and FRR in ngerprint matching. Therefore, the enhancement of the ngerprint image and the false minutiae elimination form an important part of the system. However, most of the researches emphasized on the ngerprint image enhancement and the false minutiae elimination process was based on simple distance and connectivity criteria [1], [2], [3], [4]. But the problem with such simple approaches is that it eliminates true minutiae while eliminating false minutiae. Xiao and Raafat proposed in [5], a minutiae postprocessing algorithm based on both statistical and structural information. However, their method relies heavily on connectivity which makes it complex and unreliable to bad quality ngerprints. Also, specic structural informations were not given. In this paper, we present an ecient minutiae postprocessing algorithm. The goal of our minutiae extraction algorithm is to remove as many false minutiae as possible while retaining true minutiae. The goal is achieved by postprocessing minutiae based on not only the minutiae distance and connectivity but also using the orientation and ow of ridges as the key factor. Rest of the paper is organized as follows. Section 2 briey decribes the adopted preprocessing procedures. Section 3 decribes the proposed minutiae postprocessing procedures. The performance of the proposed algorithm is shown by experiments in Section 4. Finally, Section 5 contains conclusion.

2
2.1

Preprocessing and Minutiae Extraction


Preprocessing

Preprocessing procedures necessary for minutiae extraction are shown in Fig.1.

Fig. 1. Preprocessing Procedures

The rst preprocessing procedure is the calculation of the local ridge orientation. The least mean square orientation estimation algorithm[6] is used and the local ridge orientation is specied by blocks rather than every pixel. The calculated orientation is in the range between 0 and After the ridge orientation calculation, ridge frequency is calculated[6]. Using the calculated orientations and frequencies, the input grayscale image is enhanced and binarized by Gabor lters which have both frequency-selective and orientation-selective properties[6]. The nal preprocessing operation required before extracting minutiae is thinning. Thinning reduces the the widths of the binary ridges down to a single pixel to facilitate the job of detecting ridge endings and bifurcations. The Zhang-Seun thinning algorithm[7] is used in this paper. 2.2 Minutiae Extraction

After a thinned ngerprint image is obtained, minutiae are directly extracted from the thinned image. To detect minutiae, a count of the pixel value transition at a point of interest in a 33 mask is used [4], [5]. If the count equals 2, then the point is an endpoint. If the count equals 6, then the point is a bifurcation. For each extracted minutia, the x & y coordinate and the orientation are recorded. The minutiae orientation is dened as the local ridge orientation of the associated ridge[2]. The minutiae orientation is in the range between 0 and .

Proposed Minutiae Postprocessing Algorithm

There are many false minutiae among the extracted minutiae. False minutiae will decrease the performance of the ngerprint identication system by increasing both FRR and FAR. Typical false minutiae structures are shown in Fig.2. In this section, minutiae postprocessing algorithm is proposed. To eliminate false minutiae without eliminating true minutiae, the proposed methods are based on the ow of ridges as well as the minutiae distance and connectivity.

(a)

(b)

(c)

(d)

(e)

(f)

(g)

Fig. 2. Typical false minutiae : (a)Broken ridge, (b)Bridge, (c)Short ridge, (d)Short ridge, (e) Short Ridge, (f) Hole, (g)Triangle

(a)

(b)

Fig. 3. False Minutiae Structures: (a)Broken ridge, (b)Bridge

3.1

Detecting Broken Ridge Structure

Because of scars and insucient nger pressure on the input device, a ridge may break into two ridges creating two endpoints. Obviously, these two endpoints are false minutiae and should be eliminated. Two endpoints are identied as a broken ridge structure by the following decision rules.(Fig.3(a)) (1) (x1 x2 )2 + (y1 y2 )2 < Dist1 (1) (2) The line constructed by connecting two endpoints and two ridges connected with each minutia should all ow in the same direction tan1 ( y2 y1 ) x2 x1 1 (ORA + ORB ), 2 (2)

(3) Two ridges should be owing to the opposite direction without being connected. For example(Fig.3(a)), if ridge connected with minutia A ows downwards,the other ridge should ow upwards and minutia B should be placed above the minutia A. 3.2 Detecting Bridge Structure

Due to excessive nger pressure or noise in the image, two separate ridges are sometimes connected by a short ridge to make a bridge structure. Based on the fact that ridges in ngerprint ow smooth and neighbor ridges ow in similar direction, method for detecting two false bifurcation associated with bridge structures is as follows. (Fig.3(b))

(1) Start tracking three ridges connected to a bifurcation(Point A). (2) If one of the tracked ridges meet another bifurcation(Point B), calculate orientation of the ridge connected by two bifurcations(ORAB ) and the distance between two bifurcations(DistAB ). (3) If the DistAB is less than a threshold value(Dist2 ) and the dierence between the ORAB and the average orientation of two bifurcations(ORA , ORB ) is larger than a specied angle( used in this dissertation),then two bifurcations 4 are identied as a bridge structure. Note that by applying the described rule, false minutiae in triangular structures (Fig.2(g)) can also be detected eciently. Two false minutiae and a true minutia are form a triangular structure. In the triangular structure, it is important to eliminate the two false minutiae while not eliminating the true minutia. By using the rule above, only two false minutiae are detected. 3.3 Detecting Short Ridge Structure

All short ridges should be considered as false minutiae because they are usually artifacts introduced by image preprocessing procedure such as ridge segmentation and thinning. To detect this kind of false minutiae, we start tracking ridges from ridge endings. If a tracked ridge meets another endpoint or a bifurcation within a distance(Dist3 ), two minutiae are considered as false minutiae. Also if a bifurcation meets another bifurcation while traking ridges and two bifurcations ow in opposite direction(Fig.2(e)), two bifurcations are considered false minutiae. 3.4 Detecting Hole Structure

Hole structures occur due to pores and dirts on ngerprints. The hole structure can be detected by tracking three ridges connected to an extracted bifurcation. If two tracked ridges meet to form another bifurcation and two bifurcations are within a distance(Dist4 ), then both bifurcations are considered as false minutiae. 3.5 Thresholds and False Minutiae Elimination

Because ngers are elasitic, distances between ridges change everytime due to different pressure a user puts on a input device. To cope with this problem, various thresholds used in this paper are made adaptive based on ridge frequency(Table.1). Ridge frequency is already calculated in image enhancement process[6]. To eciently eliminate false minutiae while retaining true minutiae, false minutiae are detected and eliminated in specic order as shown in Fig.4.

Fig. 4. False Minutiae Elimination Order

Dist Dist1 Dist2 Dist3 Dist4

Description Broken Ridge Bridge Short Ridge Hole

Threshold 2/freq 1.5/freq 1.7/freq 2/freq

Table 1. Threshold Values : Freq indicates the ridge frequency at the minutia

DMR(%) EMR(%) TMR(%) FMR(%)

Method A 9.8 6.1 84.1 54.2

Method B 12.3 5.8 81.9 21.2

Table 2. Postprocessing performance: Method(A)- Raw Minutiae Extraction, Method(B)-Postprocessing adopted (DMR : Dropped Minutiae Ratio, EMR : Exchanged Minutiae Ratio, TMR : True Minutiae Ratio, FMR : False Minutiae Ratio)

Experimental Results

In this section, the performance of the proposed minutiae postprocessing algorithm is evaluated. Fingerprint images were acquired through optic-based ngerprint sensor manufactured by Nitgen. The size of the image is 248 292 with the resolution of 450 dpi and 1000 ngerprint images(10 ngerprints for 100 individuals) with various image qualities were used for experiments. Before showing the experimental results, we will describe some terms used to evaluate the performance. True Minutiae(TM) are minutiae picked by an expert. Paired Minutiae(PM) are minutiae extracted by the system which coincide with TM. False Minutiae(FM) are minutiae extracted by the system which do not coincide with TM. Dropped Minutiae(DM) are minutiae picked by an expert which are not extracted by the system. Finally, Exchanged Minutiae(EM) are minutiae extracted by the system which coincide with TM except the type. Table 2 shows the performance of our proposed minutiae postprocessing algorithm. The method A indicates the results of the raw minutiae extraction(without postprocessing) and the method B indicates the results when our postprocessing algorithm is adopted. It shows that the False Minutiae Ratio drops 33% while the True Minutiae Ratio only drops 2.2%. In addition, to see the eect of our postprocessing algorithm on actual ngerprint matching, we adopted matching procedure from [8]. Fig.5 shows matching results with ROC curves. It is clear from the results that the performance of the matching system is greatly improved by adopting the proposed postprocessing algorithm.

Fig. 5. ROC(Receiver Operating Characteristic) Curves

Conclusion

A minutiae postprocessing algorithm was proposed in this paper. To avoid eliminating true minutiae while postprocessing, our proposed algorithm was based on the orientation and ow of ridges as well as minutiae distance and connectivity. Experimental results showed that our algorithm is indeed very eective; eliminating great deal of false minutiae while retaining most of true minutiae. It was also shown that the proposed algorithm improves the ngerprint matching performance.

References
[1] D. Maio, and D. Maltoni, Direct Gray-Scale Minutiae Detection in Fingerprints, IEEE Trans. Pattern Anal. Machine Intell., vol. 19, no. 1, pp. 27 - 39, 1997 [2] A. K. Jain, L. Hong, and R. Bolle, On-Line Fingerprint Verication, IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp.302-313, April 1997. [3] L. C. Jain, et al, Eds., Intelligent Biometric Techniques in Fingerprint and Face Recognition, CRC Press International Series on Computational Intelligence, 1999. [4] N. K. Ratha, S. Chen, and A. K. Jain, Adaptive Flow Orientation Based Feature Extraction in Fingerprint Images, Pattern Recognition, vol. 28, no. 11, pp. 1,657 1,672, 1995 [5] Q. Xiao, and H. Raafat, Fingerprint Image Postprocessing : A Combined Statistical and Structural Approach, Pattern Recognition, vol. 28, no. 11, pp. 1,657 1,672, 1995 [6] L. Hong, Y. Wan, and A. K. Jain, Fingerprint Image Enhancement: Algorithm and Performance Evaluation, IEEE Trans. Pattern Analysis and Machine Intelligence, vol.20, pp.777789, Aug. 1998. [7] J. R. Parker, Algorithms for Image Processing and Computer Vision, New York : Wiley Computer Publishing, 1997. [8] A. Wahab, S. H. Chin, E. C. Tain, Novel Approach to Automated Fingerprint Recognition, IEE Proc.- Vis. Image Signal Process, vol.145, no.3, pp.160166, Jun. 1998.

You might also like