Professional Documents
Culture Documents
IMPLEMENTATION OF DAUBAUCHI
WAVELET WITH RADIAL BASIS
FUNCTION AND FUZZY LOGIC IN
IDENTIFYING FINGERPRINTS
1
Guhan P.,2Purushothaman S., and 3Rajeswari R.,
1 2 3
Guhan P., Research Scholar, Dr.Purushothaman S.,Professor, Rajeswari R., Research scholar,
Department of MCA, VELS PET Engineering College, Vallioor, Mother Teresa Women’s University,
University, Chennai–600 117, India India-627117, Kodaikanal-624102, India.
Abstract-This paper implements wavelet decomposition Although inkless methods for taking fingerprint
for extracting features of fingerprint images. These impressions are now available, these methods also
features are used to train the radial basis function suffer from the positional shifting caused by the skin
neural network and Fuzzy logic for identifying elasticity. Thus, a substantial amount of research
fingerprints. Sample finger prints are taken from data reported in the literature on fingerprint identification
base from the internet resource. The fingerprints are is devoted to image enhancement techniques.
decomposed using daubauchi wavelet 1(db1) to 5 levels.
The coefficients of approximation at the fifth level is Current approaches in pattern recognition to
used for calculating statistical features. These statistical search and query large image databases, based upon
features are used for training the RBF network and the shape, texture and color are not directly
fuzzy logic. The performance comparisons of RBF and applicable to fingerprint images. The contextual
fuzzy logic are presented. dependencies present in the images and the complex
nature of two dimensional images make the
Keywords- Fingerprint;Daubauchiwavelet, radial basis representational issue very difficult. It is very
function, fuzzy logic. difficult to find a universal content-based retrieval
technique. For these reasons an invariant image
I. INTRODUCTION representation of a fingerprint image[Islam, et al,
Fingerprint image databases are characterized by 2010;Pokhriyal and Lehri, 2010] is still an open
their larger size. Distortions are very common in research issue.
fingerprint images due to elasticity of the skin. The problems associated with fingerprint
Commonly used methods for taking fingerprint identification [Pankanti,et al, 2002] are very
impressions involve applying a uniform ink on the complex, and an inappropriate representation scheme
finger and rolling the finger on the paper. This causes can make it intractable. For the purpose of
1. over-inked areas of finger, which create automating the process of fingerprint identification, a
smudgy areas in the images, suitable representation of fingerprints is essential. But
2. breaks in ridges, created by–under-inked these representations do not guarantee exact
areas, matching because of the presence of noise or
3. the elastic nature of the skin can cause availability of a partial image. Hence, high level
positional shifting, and structural features, which can uniquely represent a
4. thenon-cooperative attitude of criminals also fingerprint, are extracted from the image for the
leads to smearing in parts of the fingerprint purpose of representation and matching.
images.
73 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 11, No. 10, October 2013
74 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 11, No. 10, October 2013
75 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 11, No. 10, October 2013
Step 3: Calculate final weights which are Figure 3 presents number of persons’ fingerprints
inverse of RBF matrix multiplied with Target and RBF network estimation. All the 10 fingerprints
values. are correctly identified only when the RBF center is
9. When the RBF centers are less or more than 9,
Step 4: During testing the performance of the then fingerprint identification performance comes
RBF network, RBF values are formed from the down
features obtained from fingerprint image and
processed with the final weights obtained during C.Fuzzy logic
training. Based on the result obtained, the image
is classified to particular fingerprint. Fuzzy Logic (FL) is a multi valued logic that
allows intermediate values to be defined between
Training RBFfor identifying fingerprints conventional evaluations like true/false, yes/no,
high/low. Fuzzy systems are an alternative to
Step 1: Apply Radial Basis Function. traditional notions of set membership and logic.
No. of Input = 5 The training and testing fuzzy logic is to
No. of Patterns = 50 map the input pattern with target output data. For
this, the inbuilt function has to prepare membership
No. of Centers= 50 table and finally a set of number is stored. During
Calculate RBF as testing, the membership function is used to test the
pattern.
RBF = exp (-X)
Training Fuzzy logic for identifying
CalculateMatrix as fingerprints
G = RBF Step 1: Read the statistical features of the wavelet
A = GT * G coefficients and its target value.
Step 4: Check the output with the templates RADII specifies the range of influence of
the cluster center for each input and output
dimension, assuming the data falls within a unit
hyperbox (range [0 1]). Specifying a smaller cluster
radius will usually yield more, smaller clusters in the
data, and hence more rules. When RADII is a scalar
it is applied to all input and output dimensions.
IV. RESULTS AND DISCUSSION
The coefficient values are presented
‘approximation’ (Figure 4), ‘horizontal’ (Figure 5),
‘vertical’ (Figure 6) and ‘details (Figure 7) at 5th level
Fig 3 Performance of RBF of decomposition using ‘db1’ wavelet. Figure 8
presents fingerprints at all 5 levels for the fingerprint
of person 1 with event 1.
76 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 11, No. 10, October 2013
200
100
0
0 50 100 150 200 250
Levels 1-5
0
10
-50
8
-100
Fuzzy output
0 50 100 150 200 250 6 Target
Levels 1-5 Estimated
4
Fig. 5. Horizontal at all 5 levels
2
Vertical at all five levels of decomposition
150
0
Maximum 1 2 3 4 5 6 7 8 9 10
Persons
100 Minimum
Fig.10. Performance of Fuzzy logic
Coefficients
50
77 http://sites.google.com/site/ijcsis/
ISSN 1947-5500
(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 11, No. 10, October 2013
P.GUHANCompletedM.C.A.,a
tShanmugaCollegeofEngineerin
g,Thanjavur,andM.Phil.,inCom
puterScienceatPeriyarUniversit
y,Salem.Hehas8Publicationstoh
iscredit.
Hehas13yearsofTeachingandRe
searchexperience.Presentlyheis
workingasAssistantProfessorin
DepartmentofM.C.A.,JAYACO
LLEGEOFARTS&SCIENCE,C
hennaiandcurrentlypursuingPh
D.,inVELSUniversity,Chennai.
78 http://sites.google.com/site/ijcsis/
ISSN 1947-5500