Professional Documents
Culture Documents
Abstract—A critical step in automatic fingerprint matching is to automatically and reliably extract minutiae from the input fingerprint
images. However, the performance of a minutiae extraction algorithm relies heavily on the quality of the input fingerprint images. In
order to ensure that the performance of an automatic fingerprint identification/verification system will be robust with respect to the
quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement algorithm in the minutiae extraction
module. We present a fast fingerprint enhancement algorithm, which can adaptively improve the clarity of ridge and valley structures
of input fingerprint images based on the estimated local ridge orientation and frequency. We have evaluated the performance of the
image enhancement algorithm using the goodness index of the extracted minutiae and the accuracy of an online fingerprint
verification system. Experimental results show that incorporating the enhancement algorithm improves both the goodness index and
the verification accuracy.
——————————F——————————
1 INTRODUCTION
(a) (b)
Fig. 3. Fingerprint regions. (a) Well-defined region. (b) Recoverable corrupted region. (c) Unrecoverable corrupted region.
algorithm relies heavily on the quality of the input finger- 2) a large percent of genuine minutiae may be ignored,
print images. In an ideal fingerprint image, ridges and val- and
leys alternate and flow in a locally constant direction and 3) large errors in their localization (position and orienta-
minutiae are anomalies of ridges, i.e., ridge endings and tion) may be introduced.
ridge bifurcations. In such situations, the ridges can be eas- Examples of fingerprint images of very poor quality, in
ily detected and minutiae can be precisely located from the which ridge structures are completely corrupted, are shown
thinned ridges. Fig. 1b shows an example of good quality in Fig. 2. In order to ensure that the performance of the mi-
live-scan fingerprint image. However, in practice, due to nutiae extraction algorithm will be robust with respect to
variations in impression conditions, ridge configuration, the quality of input fingerprint images, an enhancement
skin conditions (aberrant formations of epidermal ridges algorithm which can improve the clarity of the ridge struc-
of fingerprints, postnatal marks, occupational marks), ac- tures is necessary.
quisition devices, and noncooperative attitude of subjects, A fingerprint expert is often able to correctly identify
etc., a significant percentage of acquired fingerprint im- the minutiae by using various visual clues such as local
ages (approximately 10 percent according to our experi- ridge orientation, ridge continuity, ridge tendency, etc., as
ence) is of poor quality. The ridge structures in poor-quality long as the ridge and valley structures are not corrupted
fingerprint images are not always well-defined and, hence, completely. It is possible to develop an enhancement algo-
they cannot be correctly detected. This leads to following rithm that exploits these visual clues to improve the clar-
problems: ity of ridge structures in corrupted fingerprint images.
1) a significant number of spurious minutiae may be Generally, for a given digital fingerprint image, the region
created, of interest can be divided into the following three catego-
ries (Fig. 3):
HONG ET AL.: FINGERPRINT IMAGE ENHANCEMENT: ALGORITHM AND PERFORMANCE EVALUATION 779
• Well-defined region, where ridges and valleys are cause it spends a significant amount of efforts in local ori-
clearly differentiated from one another such that a entation estimation from the filtered images which is com-
minutiae extraction algorithm is able to operate rea- putationally expensive. We present a fast enhancement al-
sonably. gorithm which is able to adaptively enhance the ridge and
• Recoverable corrupted region, where ridges and valleys valley structures using both the local ridge orientation and
are corrupted by a small amount of creases, smudges, local frequency information. Instead of using a computa-
etc. But, they are still visible and the neighboring re- tional expensive method to precisely estimate the local
gions provide sufficient information about the true ridge orientation, a simple but efficient method is used. In
ridge and valley structures. addition, since this algorithm is designed to be integrated
• Unrecoverable corrupted region, where ridges and val- in an online system, a computationally efficient filtering
leys are corrupted by such a severe amount of noise technique is used.
and distortion that no ridges and valleys are visible In the following sections, we will describe in detail our
and the neighboring regions do not provide sufficient fast fingerprint enhancement algorithm. Section 2 addresses
information about the true ridge and valley structures the main steps of our algorithm. A goal-directed perform-
either. ance evaluation of the implemented fingerprint enhance-
We refer to the first two categories of regions as recover- ment algorithm on fingerprint databases is described in
able and the last category as unrecoverable. The goal of an Section 3. Section 4 contains the summary and discussion.
enhancement algorithm is to improve the clarity of ridge struc-
tures of fingerprint images in recoverable regions and to 2 FINGERPRINT ENHANCEMENT
remove the unrecoverable regions. Since the objective of a
A fingerprint image enhancement algorithm receives an
fingerprint enhancement algorithm is to improve the clarity
input fingerprint image, applies a set of intermediate steps
of ridge structures of input fingerprint images to facilitate
on the input image, and finally outputs the enhanced im-
the extraction of ridges and minutiae, a fingerprint en-
age. In order to introduce our fingerprint image enhance-
hancement algorithm should not result in any spurious
ment algorithm, a list of notations and some basic defini-
ridge structures. This is very important because spurious
tions are given below.
ridge structure may change the individuality of input fin-
gerprints. 2.1 Notation
Fingerprint enhancement can be conducted on either A gray-level fingerprint image, ,, is defined as an N ¥ N ma-
1) binary ridge images or trix, where ,(i, j) represents the intensity of the pixel at the
2) gray-level images. ith row and jth column. We assume that all the images are
A binary ridge image is an image where all the ridge pixels scanned at a resolution of 500 dots per inch (dpi), which is
are assigned a value one and nonridge pixels are assigned a the resolution recommended by FBI. The mean and variance
value zero. The binary image can be obtained by applying a of a gray-level fingerprint image, ,, are defined as
05 Â Â , 1i , j 6
ridge extraction algorithm on a gray-level fingerprint image N -1 N -1
1
[6]. Since ridges and valleys in a fingerprint image alternate M, = (1)
N2 i=0 j =0
and run parallel to each other in a local neighborhood, a
number of simple heuristics can be used to differentiate the and
spurious ridge configurations from the true ridge configu-
05 Â Â 3, 1i , j6 - M0, 58
N -1 N -1
1 2
rations in a binary ridge image [5]. However, after applying VAR , = 2
(2)
a ridge extraction algorithm on the original gray-level im- N i=0 j =0
ages, information about the true ridge structures is often
respectively.
lost depending on the performance of the ridge extraction
An orientation image, 2, is defined as an N ¥ N image,
algorithm. Therefore, enhancement of binary ridge images
where 2(i, j) represents the local ridge orientation at pixel
has its inherent limitations.
(i, j). Local ridge orientation is usually specified for a block
In a gray-level fingerprint image, ridges and valleys in a
rather than at every pixel; an image is divided into a set of
local neighborhood form a sinusoidal-shaped plane wave
w ¥ w nonoverlapping blocks and a single local ridge ori-
which has a well-defined frequency and orientation. A
entation is defined for each block. Note that in a fingerprint
number of techniques that take advantage of this informa-
image, there is no difference between a local ridge orienta-
tion have been proposed to enhance gray-level fingerprint o o o
tion of 90 and 270 , since the ridges oriented at 90 and the
images [2], [16], [8], [20], [21]. However, they usually as- o
ridges oriented at 270 in a local neighborhood cannot be
sume that the local ridge orientations can be reliably esti-
differentiated from each other.
mated. In practice, this assumption is not valid for finger-
A frequency image, ), is an N ¥ N image, where )(i, j) rep-
print images of poor quality, which greatly restricts the ap-
resents the local ridge frequency, which is defined as the fre-
plicability of these techniques. Hong et al. [4] proposed a
quency of the ridge and valley structures in a local neigh-
decomposition method to estimate the orientation field
borhood along a direction normal to the local ridge orien-
from a set of filtered images obtained by applying a bank of
tation. The ridge and valley structures in a local neighbor-
Gabor filters on the input fingerprint images. Although this
hood (Fig. 4) where minutiae or singular points [9] appear
algorithm can obtain a reliable orientation estimate even for
do not form a well-defined sinusoidal-shaped wave. In
corrupted images, it is unsuitable for an on-line system be-
such situations, the frequency is defined as the average
780 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 20, NO. 8, AUGUST 1998
frequency in the neighborhood of block (i, j). Like orienta- 2.3 Normalization
tion image, frequency image is specified block-wise. Let ,(i, j) denote the gray-level value at pixel (i, j), M and
The region mask, 5, is defined as an N ¥ N image with VAR denote the estimated mean and variance of ,, respec-
5(i, j) indicating the category of the pixel. A pixel could be tively, and *(i, j) denote the normalized gray-level value at
either pixel (i, j). The normalized image is defined as follows:
1) a non-ridge-and-valley (unrecoverable) pixel (with %KM 3 1 6 82
VAR0 , i , j - M
1 6
* 1i , j 6 = &
value zero) or 0 + VAR
if , i , j > M
K'M
(3)
2) a ridge-and-valley (recoverable) pixel (with value one).
-
31 6 8
VAR0 , i , j - M
2
otherwise
Region mask is also specified block-wise. 0 VAR
(a) (b)
Fig. 6. The result of normalization. (a) Input image. (b) Normalized image (M0 = 100, VAR0 = 100).
1 6 Â Â 0 5 0 5
2 2 u =- w F 2 v =- w F 2
9x i , j = 2 ∂ x u, v ∂ y u, v , (5)
where W is a two-dimensional low-pass filter with
u= i - w v= j- w
2 2
unit integral and wF ¥ wF specifies the size of the fil-
i+ w j+ w ter. Note that the smoothing operation is performed at
1 6 Â Â 4∂ 0u, v5∂ 0u, v59 ,
2 2
9y i , j =
2 2
(6) the block level. The default size of the filter is 5 ¥ 5.
x y
u=i - w v= j- w
5)Compute the local ridge orientation at (i, j) using
2 2
1 6 .
1 6 , 1 6
2 i, j =
1
tan -1 1 6
F ¢y i , j
1 6 9y i , j (12)
1 6
1 2 F ¢x i , j
q i , j = tan -1 (7)
2 9x i , j
With this algorithm, a fairly smooth orientation field es-
where q(i, j) is the least square estimate of the local timate can be obtained. Fig. 7 shows an example of the ori-
ridge orientation at the block centered at pixel (i, j). entation image estimated with our algorithm.
Mathematically, it represents the direction that is or-
thogonal to the dominant direction of the Fourier spec- 2.5 Ridge Frequency Image
trum of the w ¥ w window. In a local neighborhood where no minutiae and singular
4)Due to the presence of noise, corrupted ridge and val- points appear, the gray levels along ridges and valleys can
ley structures, minutiae, etc. in the input image, the be modeled as a sinusoidal-shaped wave along a direction
estimated local ridge orientation, q(i, j), may not al- normal to the local ridge orientation (see Fig. 8). Therefore,
ways be correct. Since local ridge orientation varies local ridge frequency is another intrinsic property of a fin-
slowly in a local neighborhood where no singular gerprint image. Let * be the normalized image and 2 be
points appear, a low-pass filter can be used to modify the orientation image, then the steps involved in local ridge
the incorrect local ridge orientation. In order to per- frequency estimation are as follows:
form the low-pass filtering, the orientation image 1)Divide * into blocks of size w ¥ w (16 ¥ 16).
needs to be converted into a continuous vector field, 2)For each block centered at pixel (i, j), compute an ori-
which is defined as follows: ented window of size l ¥ w (32 ¥ 16) that is defined in
Fx(i, j) = cos(2q(i, j)), (8) the ridge coordinate system (Fig. 8).
and 3)For each block centered at pixel (i, j), compute the x-
signature, X[0], X[1], ... X[l - 1], of the ridges and val-
Fy(i, j) = sin(2q(i, j)), (9) leys within the oriented window, where
where Fx and Fy are the x and y components of the
 * 0 u , v 5,
w -1
1
vector field, respectively. With the resulting vector Xk = k = 0 , 1, K , l - 1 , (13)
w
field, the low-pass filtering can then be performed as d=0
follows:
782 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 20, NO. 8, AUGUST 1998
(a) (b)
Fig. 7. Comparison of orientation fields using the method proposed in [17] (a) and our method; w = 16 and wF = 5 (b).
w cos 21i, j6 + k - l sin 21i, j6 , assigned a value of -1 to differentiate it from the valid
u=i+ d-
2 2 (14) frequency values.
4)For a fingerprint image scanned at a fixed resolution,
w l
v = j + d - sin 2 1i , j 6 + - k cos 2 1i , j 6 .
the value of the frequency of the ridges and valleys in
(i) For each block centered at (i, j), responding to the six cluster centers) were used in an one-
1 6
W¢ i , j =
nearest neighbor (1NN) classifier to classify each w ¥ w
block in an input fingerprint image into a recoverable or an
%KW1i, j6 1 6
if W i , j π -1
unrecoverable block. If a block centered at (i, j) is recover-
able, then 5(i, j) = 1, else 5(i, j) = 0. After the image 5 is
K& Â wW 2 wW 2
 0 53 1
Wg u , v m W i - uw , j - vw 68 obtained, the percentage of recoverable regions is com-
KK Â u = - wW 2 v = - wW 2
wW 2 wW 2
 Wg 0 u , v 5d 3W1i - uw , j - vw 6+18
otherwise puted. If the percentage of recoverable regions is smaller
than a threshold, Grecoverable = 40, then the input fingerprint
' u = - wW 2 v = - wW 2 image is rejected. An accepted image is then passed
through the filtering stage.
where
0 5 %&'
0 if x £ 0
m x = x otherwise
2.7 Filtering
The configurations of parallel ridges and valleys with well-
d 0 x 5 = %&1
defined frequency and orientation in a fingerprint image
0 if x £ 0
'
provide useful information which helps in removing unde-
otherwise sired noise. The sinusoidal-shaped waves of ridges and
Wg is a discrete Gaussian kernel with mean and valleys vary slowly in a local constant orientation. There-
variance of zero and nine, respectively, and wW = 7 fore, a bandpass filter that is tuned to the corresponding
is the size of the kernel. frequency and orientation can efficiently remove the unde-
(ii) If there exists at least one block with the frequency sired noise and preserve the true ridge and valley struc-
value of -1, then swap W and W¢ and go to step (i). tures. Gabor filters have both frequency-selective and ori-
6)Interridge distances change slowly in a local neigh- entation-selective properties and have optimal joint resolu-
borhood. A low-pass filter can be used to remove the tion in both spatial and frequency domains [3], [7]. There-
outliers in f ¢ : fore, it is appropriate to use Gabor filters as bandpass fil-
ters to remove the noise and preserve true ridge/valley
1 6 0 5 1 6
wl 2 wl 2
structures.
F i, j = Â Â Wl u, v W¢ i - uw , j - vw , (17)
The even-symmetric Gabor filter has the general form [7]
%K 1 x "#(K
u =- wW 2 v =- wW 2
2 2
where Wl is a two-dimensional low-pass filter with 2 7
h x , y : f , f = exp - &K 2 d f
+
yf
#$)K* cos42pfx 9 , (18)
' !
2 f
unit integral and wl = 7 is the size of the filter. x d 2y
exp &-
1)a = (average height of the peaks - average depth of f 0 f 0
2pd xd y +
the valleys).
2)b = 1/T(i, j), where T(i, j) is the average number of K' !
2 d
2
u d
#$K*
2
v
 X i - l  X i .
l l
1
exp &-
3) g = f 0 f 0
2pd xd y +
K' ! #$K*
l (21)
i =1 i =1 2 d
2
d
2
u v
(a) (b)
Fig. 9. An even-symmetric Gabor filter. (a) The Gabor filter with f = 10 and f = 0. (b) The corresponding MTF.
2p sin f print images and make them more suitable for the minu-
v0 = , (25) tiae extraction algorithm. The ultimate criterion for evalu-
f
ating such an enhancement algorithm is the total amount
where du = 1/2pdx and dv = 1/2pdy. Fig. 9 shows an even- of “quality” improvement when the algorithm is applied
symmetric Gabor filter and its MTF. to the noisy input fingerprint images. Such an improve-
To apply Gabor filters to an image, three parameters ment can be assessed subjectively by a visual inspection of
must be specified: a number of typical enhancement results. However, a pre-
cise and consistent characterization of the quality im-
1) the frequency of the sinusoidal plane wave, f,
provement is beyond the capability of subjective evalua-
2) the filter orientation, and
tion. Examples of the enhancement results are shown in
3) the standard deviations of the Gaussian envelope, dx
Fig. 10. From these examples, we can see that our en-
and dy.
hancement algorithm does improve the clarity of the ridge
Obviously, the frequency characteristic of the filter, f, is and valley structures of input fingerprint images.
completely determined by the local ridge frequency and the A goal-directed performance evaluation assesses the
orientation is determined by the local ridge orientation. The overall improvement in the system performance that in-
selection of the values of dx and dy involves a trade-off. The corporates the enhancement module as a component.
larger the values, the more robust to noise the filters are but Therefore, it is capable of providing a more reliable as-
the more likely the filters will create spurious ridges and sessment of the performance benchmark and is directly
valleys. On the other hand, the smaller the values of dx and associated with the ultimate goal of the system [22]. In the
dy, the less likely the filters will create spurious ridges and following, we present the results of the goal-directed per-
valleys; consequently they will be less effective in removing formance evaluation of our enhancement algorithm.
the noise. The values of dx and dy were set to 4.0 and 4.0,
respectively based on empirical data. Let * be the normal- 3.1 Evaluation Using Goodness Index
ized fingerprint images, 2 be the orientation image, ) be We have used the goodness index (GI) of the extracted minu-
the frequency image, and 5 be the recoverable mask, the tiae to quantitatively assess the performance of our finger-
enhanced image ( is obtained as follows:
4
print enhancement algorithm. Let Md = fd1 , fd2 , K , fdn 9 be
1 6
( i, j = the set of n minutiae detected by the minutiae extraction
%K255 1 6
if 5 i , j = 0
4 9
algorithm and Me = fe1 , fe2 , K , fem be the set of m minutiae
&K Â
wg 2 wg 2
 3 1 6 1 68 1
h u, v : 2 i , j , ) i , j * i - u, j - v 6 otherwise
(26)
identified by human expert in an input fingerprint image.
We define the following terms:
K'
u =- w g 2 v =- w g 2
• Paired minutiae (p): Minutiae fd and fe are said to be
where wg = 11 specifies the size of the Gabor filters. paired if fd is located in a tolerance box centered around
fe. In this evaluation, the tolerance box size is 8 ¥ 8.
• Missing minutiae (a): A minutiae that is not detected
3 EXPERIMENTAL RESULTS by the minutiae extraction algorithm.
The purpose of a fingerprint enhancement algorithm is to • Spurious minutiae (b): A minutiae that is detected by
improve the clarity of ridges and valleys of input finger- the minutiae extraction algorithm, but which is not in
the tolerance box of any minutiae, fe.
HONG ET AL.: FINGERPRINT IMAGE ENHANCEMENT: ALGORITHM AND PERFORMANCE EVALUATION 785
(a) (b)
(c) (d)
Fig. 10. Examples of enhancement results; (a), (c), (e), and (g) are the input images; (b), (d), (f), and (h) show enhanced recoverable regions
superimposed on the corresponding input images.
The goodness index (GI) is defined as follows [18]: ous minutiae. It is a reasonable measure of the quality of
r the extracted minutiae. The larger the value of GI, the better
 qi pi - ai - bi the minutiae extraction algorithm. The maximum value of
GI = i =1
, (27) GI equals one, which means there are no missing and spu-
r
rious minutiae.
 qiti Our fingerprint enhancement algorithm was tested on 50
i =1
typical poor fingerprint images obtained from IBM. First,
where r is the number of 16 ¥ 16 windows in the input fin- we computed the goodness index of the extracted minutiae
gerprint image, pi represents the number of minutiae paired without applying the enhancement algorithm and then the
in the ith window, qi represents the quality factor of the ith goodness index of the extracted minutiae was computed
window (good = 4, medium = 2, poor = 1), ai represents the with the enhancement algorithm applied to the input fin-
number of missing minutiae in the ith window, bi repre- gerprint images before the minutiae were extracted. Exam-
sents the number of spurious minutiae in the ith window, ples of minutiae extraction with and without enhancement
and ti represents the number of true minutiae in the ith are shown in Fig. 11. Table 1 shows the GI values of eight
window. GI penalizes both the missing minutiae and spuri- typical fingerprint images and the mean and standard de-
786 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 20, NO. 8, AUGUST 1998
(e) (f)
(g) (h)
viation of GI values for all the 50 images. The GI values the fingerprint enhancement algorithm was not applied.
after applying the enhancement algorithm are always larger Each fingerprint image in the data set was directly
than that without the enhancement algorithm. Thus, we can matched against the other fingerprint images in the da-
conclude that our fingerprint enhancement algorithm does tabase. In the second test, the fingerprint enhancement
improve the quality of the fingerprint images, which, in algorithm was applied to each fingerprint image in the
turn, improves the accuracy and reliability of the extracted data set. Then, the verification was conducted on the
minutiae. enhanced fingerprint images. The receiver operating
curves (ROC) resulting from these two tests are shown in
3.2 Evaluation Using Verification Performance Fig. 12. From these experimental results, we can observe
The performance of the enhancement algorithm was also that the performance of the fingerprint verification sys-
assessed on the first volume of the MSU fingerprint da- tem is significantly improved when our fingerprint en-
tabase (700 live-scan images; 10 per individual) using the hancement algorithm is applied to the input fingerprint
verification accuracy of an online fingerprint verification images. In particular, the enhancement algorithm sub-
system [6]. We demonstrated that incorporating the en- stantially reduced the false reject rate while maintaining
hancement algorithm in the fingerprint verification sys- the same false accept rate.
tem improves the system performance. In the first test,
HONG ET AL.: FINGERPRINT IMAGE ENHANCEMENT: ALGORITHM AND PERFORMANCE EVALUATION 787
(a) (b)
(c) (d)
Fig. 11. Examples of minutiae extraction with and without enhancement; (a) and (c) show the extracted minutiae without applying the enhance-
ment algorithm; (b) and (d) show the extracted minutiae after applying the enhancement algorithm.
Fig. 12. Receiver Operating Curves (ROC); the ROC shows the improvement in verification performance using the enhancement algorithm.
TABLE 2
THE WALL TIME OF THE ENHANCEMENT ALGORITHM ON A PENTIUM 200MHZ PC
Normalization Orientation Frequency Region Mask Filtering Total
(seconds) (seconds) (seconds) (seconds) (seconds) (seconds)
0.11 0.14 0.09 0.07 2.08 2.49
[16] L. O’Gorman and J.V. Nickerson, “An Approach to Fingerprint Yifei Wan received the BSc degree in electrical
Filter Design,” Pattern Recognition, vol. 22, no. 1, pp. 29-38, 1989. engineering from Shanghai Jiao Tong University
[17] A. Rao, A Taxonomy for Texture Description and Identification. New in 1994. He is currently pursuing his MSc degree
York, NY: Springer-Verlag, 1990. in computer science at Michigan State Univer-
[18] N. Ratha, S. Chen, and A.K. Jain, “Adaptive Flow Orientation sity. His research interests include pattern rec-
Based Feature Extraction in Fingerprint Images,” Pattern Recogni- ognition and image processing.
tion, vol. 28, no. 11, pp. 1,657-1,672, 1995.
[19] G. Sapiro and A. Bruckstein, “A B-Spline Based Affine Invariant
Multiscale Shape Representation,” Proc. Seventh Int’l Conf. Image
Analysis and Processing III, pp. 20-22, Monopoli, Italy, 1993.
[20] D. Sherlock, D.M. Monro, and K. Millard, “Fingerprint Enhance-
ment by Directional Fourier Filtering,” IEE Proc. Visual Image Sig-
nal Processing, vol. 141, no. 2, pp. 87–94, 1994. Anil Jain is a University Distinguished Professor
[21] A. Sherstinsky and R.W. Picard, “Restoration and Enhancement of and Chair of the Department of Computer Sci-
Fingerprint Images Using M-Lattice: A Novel Non-Linear Dy- ence at Michigan State University. His research
namical System,” Proc. 12th ICPR-B, pp. 195–200, 1994. interests include statistical pattern recognition,
[22] O. Trier and A. Jain, “Goal-Directed Evaluation of Binarization Markov random fields, texture analysis, neural
Methods,” IEEE Trans. Pattern Analysis and Machine Intelligence, networks, document image analysis, fingerprint
vol. 17, no. 12, pp. 1,191–1,201, 1996. matching, and 3D object recognition. He re-
ceived the best paper awards in 1987 and 1991,
and certificates for outstanding contributions in
Lin Hong received the BS and MS degrees in 1976, 1979, 1992, and 1997 from the Pattern
computer science from Sichuan University, Recognition Society. He also received the 1996
China, in 1987 and 1990, respectively. He is IEEE Transactions on Neural Networks Outstanding Paper Award. He
currently a PhD student in the Department of was the Editor-in-Chief of the IEEE Transactions on Pattern Analysis
Computer Science at Michigan State University. and Machine Intelligence (1990-1994). He is the coauthor of Algo-
His research interests include pattern recogni- rithms for Clustering Data, Prentice-Hall, 1988, and coedited the
tion, image processing multimedia, biometrics, books, Analysis and Interpretation of Range Images, Springer-Verlag,
computer graphics, and computer vision applica- 1989, Markov Random Fields, Academic Press, 1992, Artificial Neural
tion. Networks and Pattern Recognition, Elsevier, 1993, 3D Object Recogni-
tion, Elsevier, 1993, and BIOMETRICS: Personal Identification in Net-
worked Society to be published by Kluwer in 1998. He is a fellow of the
IEEE and IAPR, and has received a Fulbright research Award.