You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/334163315

The optimization of the process of recognation fingerprint through the


minutae technique

Conference Paper · April 2019

CITATIONS READS

0 138

1 author:

Erkan Duman
Firat University
27 PUBLICATIONS 66 CITATIONS

SEE PROFILE

All content following this page was uploaded by Erkan Duman on 02 July 2019.

The user has requested enhancement of the downloaded file.


The Optimization of The Process of
Recognization Fingerprint
Through The Minutiae Technique
E.GAZİOĞULLARI1 and E.DUMAN2
1
Fırat University, Elazığ/Turkey, gaziogullariesra@gmail.com
2
Fırat University, Elazığ/Turkey, erkanduman@firat.edu.tr

In the process of defining fingerprints, it is possible to


Abstract - Biometric data science can be referred to identifying perform the process in two ways: filtering and minutiae.
people uniquely and specifically, and in this field one of the most In the filtering technique, there are some filters to make the
commonly used parameter is “fingerprint”. Fingerprints are images seem better, some of these filters are
peculiar to each person, and thus using fingerprints has become
Contrast Enhancement, Mean Value Method, Median
very important especially in identifying people. Identifying
fingerprints specific to each person can be achieved by applying Filtering, Laplacion Filter.
some algorithms in correct order. The noises on the images can be removed by using some kinds
Our main research subject in this study is to suggest an approach of filters on the images, which is possible by applying the
that will use this commonly used identifying system in the most filters successively. Due to the fact that this process requires
efficient way and that will perform it much faster, too. being serially applied, much more complex algorithms are
In this article the optimization of identifying fingerprint process generally preferred [4].
has been examined by using minutiae technique, which is In the filtering technique, it is benefited from the datas like
preferred mainly after the image processing algorithms, described fingerprint direction and frequency of the improved and
as pre-process.
cleaned images [2]. The properties like the quality, magnitude
and clearness of the images gained from the fingerprint device
have a very important place in the filtering technique.
Keywords – Fingerprint, Minutiae, Image Processing, Crossing Moreover, if there is not a clear image, it becomes more
number, Biometric science.
difficult to achieve true a results, in other techniques, but the
minutiae technique is the least affected technique from these
negative factors.
I. INTRODUCTION
In the Minutiae technique, the points which differ from the
Using fingerprint as a biometric system is generally available others on the fingerprint image are determined, and then they
in more specific areas compared to other systems such as had are named according to their shapes suitable to their positions.
hand-held scanner, retinal scanning and voice recognition. In The main line and opposite lines determine the minutiae
Forensic Area fingerprints have been used regularly and classifications, which are ridge ending, bifurcation, dot, island,
commonly for more than a hundred year and also the lake, hook, bridge, double bifurcation, trifurcation, opposed
automatic fingerprint defining systems were founded bifurcation, ridge crossing, opposed bifurcation/ridge ending
approximately 50 years ago [1]. The fingerprint, which is used [5]. With the determination of these specific points, it is aimed
to ensure security in military and forensic areas for long years, to match local points and it requires matching the identified
is also important and used for datas security in private sectors minutiae points instead of matching the fingerprints as image-
in the last years [2]. based. The storage of these points as data provides much
There are many different techniques to attain fingerprints as efficiency and less cost compared to the image based studies.
it is commonly used in various areas.
There are some difficulties to define fingerprints and one of Through the determination of the minutiae points, it is
the most difficult one is related to the quality of pictures possible to identify the patterns of a person’s fingerprint as a
regarding with fingerprints [3]. In the defining systems the string, in which the standard properties of formerly determined
processes, which are defined as pre-processing, are performed specific points are found.
to make the image enhancement. In this process, the aim is to
get better and clear results from data.
The researches among the various fingerprint matching
algorithms in the literature are mostly based on Minutiae
Matching. Minutiae techniques is the most preferred one along
with the hybrid feature matching and local methods [3].
II. METHOD 2.2 The Step of Finding Threshold Value
During the binarization process, a thresholding process must
be performed after getting gray color.
This process is fundamental to determine whether black or
white color must be used for each pixel value of an image.
According to the determined thresholding value, one can
decide to use which color, black or white [9].
In the global thresholding, a random value is used for the
threshold value. However, in this process, it may not be
possible to get the same influence and result for the images
that have different color densities. Therefore, determining a
suitable dynamic threshold value peculiar to the image you
have and using that value is much more accurate [9,10].
There is another technique to determine threshold value:
Otsu threshold. This technique provides the most optimum
threshold value by converting the image on gray level to dual
level. First of all, color histogram is computed as it is
important to look at the numbers of each color density on
images and the process goes on according to this color
histogram [10].
The hypothesis that the image consists of two color class as
background image and foreground of the image is created and
then the intra-class variance value of this two colored class is
Figure 1: Minutiae Exctraction Steps [1].
calculated for the all threshold values. The threshold value that
makes this value the lowest is called as the optimum threshold
As in the figure 1, the first step of the Minutiae extraction
value [10,11].
process is to transform the available image into the grayscale
After applying these steps, A grayscale image is turned into
image. Following this step, the process of threshold value is
binarization image. A binarization images has only two
performed, which is used to attain the black-white images.
different values, the “0” value for black color and the “1”
value for white one [6,7].
2.1 The Step of Converting an Image into Grayscale Image
Grayscale image is the image which has only gray tones
colors. In fact, a gray color is the color in which red, green and 2.3. The Step of Thinning
blue components all have equal density in RGB space. Thinning can be used for various applications, but it is more
Therefore, it requires stating only a density value for the three beneficial to use it especially for Extracting Skeletons and
density values of each pixel [6,7]. Medial Axis Transform [12]. In this mod, all the lines are
The usage of the grayscale images is very common as most turned into only one pixel and it is necessary to have binary
of our present time’s screen and image catching hardware can image first, which we have attained in the first step of our
support only 8 bit images. Moreover, most of the grayscale study.
images are sufficient in many areas in terms of usage, and thus In our study, The Zhang-Suen Thinning algorithm which is
there is no need to use much more complex and difficult based on the logic of extracting skeletons has been used [12].
colorful images [7].
In general, gray toning density is stored as an 8 bits integer Zhang-Suen Thinning Algorithm:
that gives possible 256 different gray tones from black to The application of this algorithm is not complex and slow,
white. The “0” value represents the black color while the also the iterations in this algorithm consists of two subordinate
“255” value represents the White color [7]. parts. In the first one if the four conditions stated below are
In fact, the converting process of a colorful image to a gray carried out, one pixel I(i,j) is deleted [13]. These conditions
toned color through the grayscale method is attaining gray are:
toned images that have their equivalents in each color in the 1.) The connection number has the value of “1”.
RGB model [6,7]. 2.) There can be at least two black neighbors and it is also
The gray toned image can be gained by computing the not more than 6.
aritmetic mean that corresponds to the colors in RGB model. 3.) At least one of the I(i,j+1) ,I(i-1,j) and I(i,j-1) is white.
However, this computation doesn’t precisely reflect the 4.) At least one of the I(i-1,j),I(i+1,j) and I(i,j-1) is white.
sensitivity of detecting each color differently. For this reason, In the second part of the iteration, the third and forth
to reach the most realistic and concrete result, the formula as conditions, belonging the first part, are changed as started
shown in (1) that is performed by scaling must be used [7,8]. below:
1.) The connection number has the value of “1”.
Gray-Scale= 0,299 * R + 0,587 *G + 0,114*B (1) 2.) There can be at least two black neighbour and it is not
more than six.
3.) At least one of the I(i-1,j),I(i,j+1) and I(i+1,j) is white.
4.) At least one of the I(i-1,j),I(i,j+1) and I(i,j-1) is white. P4 P3 P2
While applying the algorithm, if the repetitions used are
completed, the pixels carrying the necessary conditions are P5 P P1
deleted. If there are not any pixels to be deleted, then the
algorithm is ended [14].
P6 P7 P8
2.4. Minutiae Extraction
In a fingerprint defining system, it is necessary to match the
each user in database with the stored fingerprint template. This
process includes many computations and searching, which Figure2: 3×3 window for searching minutiae [16,17].
results in additional load. Therefore, we need to a fingerprint
classification system that helps us limit the dimension of In this method a 3x3 window is used and the minutiae points
database template dramatically. In order to achieve this goal, are extracted by searching and scanning the neighbourhood of
minutiae properties are extracted and then they are matched very ridge pixel in an image.
with the fingerprints. The dimension of template that bases on After that, the CN is calculated and it refers to the sum of
the minutiae technique is small and most of the fingerprint differences between adjoined pixels. For the P point that
defining systems depend on this minutiae technique, too [15]. belongs to 3x3 window, the process is performed counter
Minutiae points are the specific points that belong to a clockwise for the eight neighboring pixels [16,17].
fingerprint image and are used to make the image unique.
Minutiae can be defined as the points on which ridge lines end The CN value for a ridge pixel is calculated as shown below
or bifurcate and there are many minutiae types [15]. in (2) [18].

Minutiae types:
§ If the ridge ends suddenly, that points is called as (2)
‘ridge ending’.
§ If one ridge branches out into one or more ridges, then The types of points that refer to calculated CN values are as
it is ‘ridge bifurcation’. in the below [19].
§ Too small ridges are called as ‘ridge dots’.
§ If the ridges are a bit longer than the dots and are found CN Property
between two diverging ridges, they are called as
’ridge islands’. 0 Isolated Point
§ If there is nothing between two diverging ridges then
1 Ridge ending point
they are lakes.
§ If small ridges participate in two longer ridges, then 2 Continuing ridge point
they are ‘bridges’.
3 Bifurcation point
§ If two ridges cross one another, then they are called as
‘crossovers’ [15]. 4 Crossing point
Among these minutiae types, ridge ending and ridge
Figure 3: Crossing number types [19].
bifurcation are the most common minutiae types.
In the minutiae technique, after our first step pre-processing
The ending point that has ‘1’ value for the CN number and
are completed, then it is time to extract minutiae. In this
the bifurcation that has “3” value for CN number are as in the
process, the most widespread minutiae extraction technique is
the “crossing number”, in which minutiae points are identified. Figure 4 stated below [20].
This technique is generally preferred to extract minutiae points
due to its pureness, simplicity and performance efficiency.

Cross Number Technique:


This is the most common minutiae extraction method and it
is shown as CN referring to crossing number.

Figure 4: Ending Point and Bifurcation [20].


The identifying process is fulfilled according to the specific
properties of the minutiae points. These properties can be
stated as the x and y coordinate points, the calculated angle
value of the minutiae and also the type of the minutiae. After
these processes, it is possible to identify a person through
these flocks of minutiae.

2.5. Post-Processing Technique: Figure 8: Minutiae Points.


This process is the last process and it is performed after the
extraction of minutiae points.
After identifying the minutiae points, the wrong points that IV. CONCLUSION
are not clear and explicit are extracted and then these points
are deleted [18, 19]. Using more accurate and clear minutiae In this article, it is aimed to inform about the fingerprint
points increases the accuracy of the identifying processes. identifying system, which is a very popular technique among
the biometric applications in technology. Moreover, the
identifying process has been applied to ensure high quality of
III. EXPERIMENTAL RESULTS fingerprint images through the minutiae technique and in the
end, an output in the text format that includes specific points to
In this study, the dataset of fingerprint images from Cornell identify a person has been attained.
University was used which consists of 6.000 fingerprint When compared to the comparisons of images, much faster
images of 600 persons [21]. The dimension of the each results have been attained by means of text matching
fingerprint image is 96x103 size and bmp. technique.
In the proposed method, the fingerprint image is first The necessary steps for the process of extracting minutiae
converted to a black-and-white image. This binary image is have been defined through the optimum parameters and in
then applied to the Thinning process and the Crossing number each step the optimum techniques have been applied.
technique. Finally, minutiae points are deduced according to Especially the design of each step’s working in parallel in
CN value. After these stages, the value of the minutiae points itself is a very important acquisition as it means the more
belonging to the fingerprint picture is recorded in the file in parallel the processes are, the faster results you gain. In our
text format. These four fields are the coordinate information (x next studies, it is especially aimed to search the parallel
and y values), angle values and the class name of the minutiae implementation of the process of extracting minutiae by
type. The process is completed by keeping the file format as depending on this framework.
string. The outputs of the steps applied to the
original fingerprint image are shown in Figure 5, Figure 6,
Figure 7, Figure 8 below. REFERENCES

[1] BANSAL R., SEHGAL P.,BEDİ P., (September, 2011), “Minutiae


Extraction from Fingerprint Images-a Review”, IJCSI International Journal
of Computer Science Issues, Vol. 8, Issue 5, No 3, ISSN [Online]: 1694-0814
September 2011.

Figure 5: Fingerpint Image. [2] Akın N., Takmaz B., Güvenoğlu E., “Image Encryption Using
Fingerprint”, XV. Academical Informatics Conference Presentations,
Antalya, January 2013.

[3] N. U. Ain, F. Shaukat, A.S. Nagra and G. Raja,


“AN EFFICIENT ALGORITHM FOR FINGERPRINT RECOGNITION
USING MINUTIAE EXTRACTION”, Pakistan Journal of Scienc, Vol 70,
June 2018.

[4] VARLIK A., ÇORUMLUOĞLU Ö., ”Photogrammetric Approach in


Figure 6: Binary Image. Person Identification”, TUFUAB IV. Technical Symposium, June 2007.

[5] ÖZKAYA N., SAĞIROĞLU Ş., BEŞDOK E., “General Purpose


Automatic Fingerprint Recognition System Design and Implementation”,
Journal of Polytechnic, Vol: 8 No: 3 pp. 239-247, 2005.

[6] C. Saravanan, “Color Image to Grayscale Image Conversion”, 2010


Second International Conference on Computer Engineering and
Applications, Vol 2, April 2010.

[7] Fisher R., Perkins S., Walker A., Wolfart E., “Hypermedia Image
Figure 7: The Image following the thinning process. Processing Reference “,1996.
[8] Isnanto R. R., Riyadi M. A., Awaj M. F. , “Herb Leaves Recognition
using Gay Level Co-occurrence Matrix and Five Distance-based Similarity
Measures”, International Journal of Electrical and Computer Engineering(IJ
ECE), Vol.8,pp. 1920-1932, June 2018.

[9] Bangare S. L.,Dubal A.,Bangare P. S.,Patil S.T.,”Reviewing Otsu’s


Method For Image Thresholding”, International Journal of Applied
Engineering Research ,Vol. 10, pp. 21777-21783,2015.

[10] Otsu N., “A Threshold Selection Method from Gray-Level Histograms”,


Vol. 3, pp. 62-66, January 1979.

[11]Atasoy H., ”Otsu Threshold Determination Method”,


Available:http://huseyinatasoy.com/Otsu-Esik-Belirleme-Metodu,,February
2011. [Online](02.03.2019)

[12] Morphology Thinning,


Available: http://www.cee.hw.ac.uk/hipr/html/thin.html[Online].

[13] Image Processing Techniques For Machine Vision, Available:


http://www.eng.fiu.edu/me/robotics/elib/am_st_fiu_ppr_2000.pdf [Online].

[14]The Zyang- Suen Thinning Algorithm: Introduction and applications,


Available: http://jaredgerschler.blog/2018/02/25/the-zhang-suen-thinning-
algorithm-introduction-and-applications/ [Online].

[15] Thakkar D.,”Minutiae Based Extraction in Fingerprint Recognition"


,Available:https://www.bayometric.com/minutiae-based-extraction-
fingerprint-recognition/ [Online].

[16] Feng Zhao and Xiaoou Tang, “Preprocessing and postprocessing for
skeleton-based fingerprint minutiae extraction”, Pattern Recognition
Society,pp. 1270-1281,April 2007.

[17] Ishpreet Singh Virk and Raman Maini, “Fingerprint Image Enhancement
and Minutiae Matching in Fingerprint Verification”, Journal of Computing
Technologies, vol. 1, June 2012.

[18] Sudiro S. A. and Yuwono R. T. ,


“ADAPTABLE FINGERPRINT MINUTIAE EXTRACTION
ALGORITHM BASED-ON CROSSING NUMBER
METHOD FOR HARDWARE IMPLEMENTATION
USING FPGA DEVICE”, International Journal of Computer Science,
Engineering and Information Technology (IJCSEIT), Vol.2, No.3, June 2012.

[19] Babatunde I. G., Akinyokun, Charles O., Kayode A. B.,


“A Modified Approach to Crossing Number and Post-processing Algorithms
for Fingerprint Minutiae Extraction and Validation”, IMS Manthan - Volume
VI, No. 1, June 2011.

[20] RAVI. J, K. B. RAJA and VENUGOPAL. K. R,


“FINGERPRINT RECOGNITION USING MINUTIA SCORE
MATCHING”, International Journal of Engineering Science and
Technology Vol.1(2), pp. 35-42, 2009.

[21] Shehu Y.I., Ruiz-Garcia A., Palade V., James e. A. ,” Sokoto Coventry
Fingerprint Dataset”, CoRR journal, vol. abs/1807.10609, 2018.

View publication stats

You might also like