You are on page 1of 2

201

Fingerprint Based Access Control, System (Kerber - 1))


, .

Bogdan Rusyn, Volodymyr Ostap, Oleh Ostap, Oleh Kapshiy, Viroslav Kapshiy, Volodymyr Yelchev
Absrrocr - All stages of process of fingerprint identification system's development are considered. Such parts of the system as: compression, preprocessing, postprocessing, feature extraction. feature comparison .and device creation are described. K w o r d s - biometric identification system, fingerprint, image proceying, recognition,compression.

2. Development of image processing,, image ,analyzing,and feature extraction methods; ' 3. Recognition methods 'development; 4: Tuning algorithms' parameters' for given biosensor; 5 . Hardware implementahon of the system; 6. Software development, system programming.
',

'

8 .

.'

LINTRODUCTION.

11. COMPRESSION.
Developed compression algorithm is based on wavelet decomposition and is adapted io fingerprint images. The preservation of fingerprint ridges was the main goal, because most of needed information is concentrated in these structural elements. The raw (fig.l.a), compressed (fig.1.b) and difference images (fig.1.c) show that most of compression distortions are located in the high-frequency spectral band and are not important. The algorithm allows 8-times compression with PSNR=38dB, spending time, about 0,5 second (Intel PentiumlII-600MHz personal computer).
. . . .... .- . . . .. . . .. . .

Methods and hardware for information protection are very important in information technology age. The most of known guard devices are based on various kinds of mechanical or electronic keys (for example: passwords, keys, smart-cards, electrical-keys etc.). They have one important disadvantage, which can easily destroy protection. It is possible of voluntary or involuntary handing of key from legal person to impostor. Such disadvantage has initiated biometric identification systems development. These systems use some biometric information read from human body instead of any keys. So,. iris, fingerprint, face, hand, ear, etc. are used as biometric keys. The most specialists say that iris identification systems are most reliable, but they are complicated and expensive (the price is about 5000%). Fingerprint identification systems are used frequently, because they are cheaper (the price is about 100-IOOOS) and theylguamntee sufticientiy low false accept rate (FAR) - about 10". Many of the worldwide companies propose fingerprint identification systems, but research in the field of biometrics are not stopped. The competition between producers makes necessity of future research. The customers want to buy cheapest and most reliable systems, so producers have to satisfy their needs. Ukrainian biometric systems' market is empty and uncultivated, because quality of domestically produced devices is not very good. Foreign devices are also absent on Ukrainian market, because of high price. Above mentioned facts, were taken into account before beginning of developing fingerprint recognition methods and algorithms for own biometrics identification system. " . Our research field includes next stages: 1. Fingers images compression methods development;

Fig.1. Input (a), compressed (b) and amplified difference image (c).

111. PROCESSING AND FEATURES EXTRACTION.


Primary aims of this stage are following: elimination or reducing fingerprint ridge distortions appeared during capturing; - features extraction from given image; - features vector creation.

pattern

- Karpenko Physico-MechanicalInstitute, Naukova str., 5,


Lviv, 79601, UKRAINE, E-mail: russn:~ipni.lvir.iia,
vt,L;i?r:i~ni.lviv.i14 ol;l~rhi~;i~,iDni,luiv.oa

Bogdan Rusyn, Volodymyr Ostap, Oleh Ostap, Oleh Kapshiy

Viroslav Kapshiy - Lviv Radio Engineering Research Instipte, Naukova str.., 7. Lviv., 79601. UKRAINE . Volodymyr Yelchev - SofiServe, Inc. - Ukraine Office, V. Velykoho St., 52, Lviv, 79053, UKRAINE, E-mail ~vrlcllcv,i~~~,Rscrvzcl,ln.roni

Fig.2. Processing results: a) - preprocessed grayscale image; b) - sceleton; c) - result image with minutiae.

TCSET'2004: February 24-28, 2004, Lviv-Slavsko, Ukraine

202

In fig.2.a results of preprocessing of the raw image (fig. 1.a) is shown. -This stage improves results of skeletization (fig.2.h). The skeleton is needed for features extraction (fig.2.c). Features vector includes position, orientation and interposition of minutiae's. Processing time is about 100 milliseconds for image's size 400x300 pixels.

Recognition and training algorithms mentioned above were implemented and approved in biometric systems of company "Testech Inc" [2] (fig.4). Among them:

IV. FEATURES VECTORS

COMPARISON.
b) C) a) Fig.4. Existent fingerprintidentification systems.

The aim of this stage is making decision about fingerprints .identity. Features vector is used for graph creation. Graph nodes correspond to minutiae's (fig.2.c), graph branches - interpositions of minutiae's. Also, additional description of fingerprint pattem around each minutia is used for achieving higher recognition speed. So, recognition algorithm compares input image's graph and images' graphs from data base (fie.31.

a) . b) Fig.3. Comparison oftwo fingerprint patterns: a) - scaled, shifted and rotated input image; , b)- etalon image. Output result of the comparison is the maximal matching score. between input and database pattern. If matching score is higher than some identification threshold than decision about identity is accepted. Developed recognition algorithm and features vectors are invariant to images scale - = *20%, rotation *180, shift - necessary images' common area 525%. Intellect elements, used in the algorithm, decrease negative effect of elastic distortions and increase identification quality. As a result, our algorithms are characterized by: false accept rate =IOd, and false refusal rate =IO4, that allows OUT algorithms to compete with the hest worldwide systems [3].
'
~

1 . Sensor for personal computer. It is used for access control and information protection on the PC (fig. 4a). 2. Identification module that, includes fingerprint sensor and control hoard with microprocessor HITACHI (used as a calculation unit). This type of devices is used for creating another fingerprint based access control systems (fig. 4b). 3. Sngerprint identification system for controlling rooms' access. It can he extended to many places using system's possibility to work in networks (fig.4~). But these devices' production out of Ukraine has an essential disadvantage - a high price. Due to this condition, these devices have not widespread in Ukraine. fig.!. "Cerber-I" VI. DEVICE CREATION.
Taking into account mentioned circumstance, a new access control device "Cerher" was developed. Form of its main unit is presented in the fig3 and its block diagram is presented in the fig.6. Guarded s p a c e

.,

,. ,

. : .

b , - - - - - - - - i.*u!eFig.?.bd? % I
,

V. SYSTEM TEACHING'AND TUNING.


A lot of sensors' types have been developed. There are semiconductor, capacitance, optical, ultrasonic, thermal types among them. It is not easy way to develop universal algorithms that can work with all types of sensors, because each type needs fitting many algorithms' Carameters for reliable work. So, algorithm, and program for automatic system tuning based on ' client-server technology (with distributed calculation process) were developed. The algorithm is .' based on iterative tuning of fingerprint recognition systems' parameters with minimization of FAR and FRR with a help of Levenberg-Macvardt's method [I]. System training was carried out using training database that includes 20000 fingerprints images. Cluster based program which distributes calculation on 'many personal computers allows time of training to he significantly decreased.

Fig.6. Flow-chart of "Cerber". Developing the own system allows prime cost of the device to he decreased in comparison with foreign analogs. There are next advantages of the developed device: I , Low price; 2. Autonomous work (device does not need a PC for setup); 3. Adaptation to Ukrainian market (emergency power supply, open door sensor, breaking signalization, etc) It gives a right to tall about great potential of this devices' productionand actuality of the research&development.

REFERENCES
[I]
121

non.

pea.

napcwempm,

B.r.ropcKoro, H e h e r i x o e Moc~sa:3nwse, 1919..

oyeausaxue

http://ww.testech.com.kr

[3] http:/mias.csr.unibd.it

TCSET'2004, February 24-28, 2004, Lviv-Slavsko, Ukraine ,.

You might also like