Paper id 36201507
- 1. International Journal of Research in Advent Technology, Vol.3, No.6, June 2015
E-ISSN: 2321-9637
32
Minutia Cylindrical Code Based Approach for
Fingerprint Matching
Dilip Tamboli1
, Mr.Sandeep B Patil 2
, Dr.G.R.Sinha 3
1
P.G. Scholar, Department of Electronics & Telecommunication Engg. SSGI Bhilai, C.G.India
2
P.G. Scholar, Department of Electronics & Telecommunication Engg. SSGI Bhilai, C.G.India2
3
Assosiate Director & Prof., Department of Electronics & Telecommunication Engg. SSGI Bhilai, C.G.India3
diliptamboli_123@yahoo.com
1
, Patilsandeepb1212@gmail.com
2
,drgrsinha@ssgi.edu.in3
Abstract- Impression from the fingers and its matching is one of the important task of law enforcing body.
Minutia extraction from the fingerprint image decides the accuracy of the matching. Method presented in this
paper is also very efficient in matching the algorithm. Minutia cylindrical code(MCC) which is local descriptor
of the fingerprint image is used for matching the fingerprint image. MCC, codes the local direction and distance
between the minutia and hence invariants to the scale and rotation. False Acceptance ratio (FAR) and False
Rejection ration(FRR) is also computed to test the accuracy of the proposed method.
Index Terms- Minutia, FFT, MCC, Euclidean distance
1. INTRODUCTION
Recognition of fingerprint is one of the complicated
pattern recognition problems which is being studied
for the last 40 years.
Though various efficient algorithm have been
designed for fingerprint matching, it cannot be
concluded that this problem has solved. Accuracy,
interoperability and computational efficient algorithm
are still an open issue [1] in fingerprinting matching.
Most of the current fingerprint matching algorithms
are based on the minutia. Special ridge pattern are
called minutia. Ridge ending and ridge bifurcation are
some of the minutia.
In the past, minutia matching is considered as the two
dimensional pattern matching problem for aligning the
two minutia pair. This forced the researcher to find all
the possible transformation for two minutia matching.
Hough transform is one of the solution of this
problem[2][3]. High computational cost and lack of
robustness are some the problems of the global
minutia matching algorithm.
In the last few years, these problem is addressed by
introducing the local minutia descriptor and its
matching.
The characteristics of the local minutia descriptor is
such that it is invariants to the global transformation
and therefore appropriate for matching without the
need of global alignment.
Since local minutia descriptor based matching is based
on the arrangement of the local property therefore it
excludes the global feature and give better results.
Global matching algorithms have some of the benefits
which is not possible in case of local descriptor based
matching and hence an hybrid approach can be applied
to get the benefit of both the algorithm.
In this types of approach, first of all the local structure
is used to match the minutia quickly and robustly. In
the next step, matching at global level is performed for
validation purpose.
The evaluation of the minutia matching based on the
local structure passed in three stages. Stage one
correspond to the earlier approach in which local
structure are formed by considering the minutia lies
inside some regions. In this approach no global
validation was performed [4][5]. The approach
adopted by the [6] and [7] comes in the second stage.
[6] and [7] were the first to establishe a relationship
between minutia and its neighbourhood in term of
invariant angle distance and structure. In this stage,
global validation was also performed .
Third stage comprises of the method proposed by
Jiang and Yau[6] and Ratha [7]. These methods are
variants of the method proposed by the same author.
In this phase they extend the feature set of the
fingerpring by incorporating local ridge, local
frequency, shape its. [1] contain the exhaustive review
in fingerprint matching and recognition. For further
reference reader may go through the
[8]-[33].
Two types of local minutia structure were proposed.
First one is based on the nearest neighbourhood while
the other one is based on the fixed radius. In the
nearest neighbourhood [6] approach, centre minutia is
characterized by the K- closest minutia which are
spatially arranged. This gives the fixed length
descriptor which can be matched very efficiently. The
later approach is given by the [7]. In this approach,
neighbours are defined as the all the neighbours which
are inside the radius R of the centre minutia. In this
approach, the length of the descriptor is not fixed
making it difficult to match the fingerprint locally. But
this approach shows better tolerant against missing
and spurious minutia.
- 2. International Journal of Research in Advent Technology, Vol.3, No.6, June 2015
E-ISSN: 2321-9637
33
2. PROPOSED METHODOLOGY
In this paper local descriptor based fingerprint
recognition is presented. Minutia cylinder code is used
as local descriptor. Block diagram of proposed
methodology is shown in figure 2.
First of all, with the help of scanner, Fingerprint image
of the input finger is registered. Minutia extraction
block is used to extract out the minutia from the
image.
With the help of minutia, a cylindrical code for
minutia is formed. Minutia cylindrical code represent
minutia local structure of the minutia distribution.
Once, minutia cylindrical code is generated for each
finger print then a database is created which contain
the minutia cylindrical codes of all the fingerprint
image. The last step of this method is matching or
testing. Next section describe the functioning of last
four block of this algorithm.
Fig.1 Basic Flow Diagram of Proposed Method
2.1. Minutia Extraction Process
In any fingerprint recognition system, Minutia
extraction is one of the important phase because the
performance of any fingerprint recognition system
depends on the how accurately minutia are extracted.
In this algorithm following steps have been adopted
for minutia extraction.
2.2 FP Image Enhancement
First step in any fingerprint recognition system is the
enhancement of the fingerprint image. This step is
adopted to improve the quality of the fingerprint
image so that all the minutia points become more clear
and extraction of the minutia points become easier.
Generally, Fingerprint image obtained by the
fingerprint scanner is noisy and of poor contrast.
Ridge and furrows are not visible due to the poor
contrast. Image enhancement increase the contrast of
ridge and furrows and also joined some of the broken
line which occurred in fingerprint image due to sensor
deficiency.
2.3 Histogram equalization
Histogram equalization basically adjust the intensity
distribution of the histogram and with this approach it
improve the global contrast of the image. This step
helps the lower contrast region to gain a higher
contrast while keeping the global contrast intact. This
method basically spread out the most frequently
occurred intensity value. Figure 3 represent the
histogram before and after applying histogram
equalization.
2.4 Fast Fourier Transform.
This process is accomplished for connecting the ridge
broken line . In this process first of all, Fingerprint
image is divided in to a block of 32 * 32 pixel and
then Fourier transform of this block is computed using
following formula.
for u = 0, 1, 2, ..., 31 and v = 0, 1, 2, ..., 31.
2.5 Image Binarization
This process is performed to convert the 8-bit gary
image to 1 bit image. In this, 0 represent the ridge and
1 represent the furrows. This step highlight the ridge
and furrows clearly in the image. A local adaptive
binarization method is used for this purpose.
2.6 Fingerprint Segmentation
This process is accomplished to extract out the region
of interest from the fingerprint image. In fingerprint
image, some of the area is not useful and carry
insignificant ridge and furrows. It is necessary to
discard this area . Segmentation process consist of two
Finger
Finger print
Scanner
Minutia
Extraction
Minutia Cylindrical code formation
Database Creation
Matching Algorithm
Fingerprint
Registration
- 3. International Journal of Research in Advent Technology, Vol.3, No.6, June 2015
E-ISSN: 2321-9637
34
part i.e. Estimation of block direction, extraction of
region of interest by applying morphological
operation.
2.7 Estimation of Block Diagram
Block direction estimation is performed to separate
out background and foreground information. In finger
print image, foreground is represented by the ridges
and furrows while the background represent the no
information.
In order to compute the block diagram estimation, a
block of 16 *16 pixel is chosen and then block
direction is computed by using below mentioned
formula
tan2ß =
here
gx= Gradient along x-direction
gy= Gradient along y-direction
Certainity level for each block is then computed using
formula-
E =
Here
W= size of block (i.e. 16 in this case)
The value of E is compared with the threshold value to
decide whether the block comes under the
background( if E<threshold) or foreground (i.e if
E>threshold).
2.8 Morphological Operation for ROI extraction
In the last step morphological operation “opening” and
“closing” is applied to to extract the region of interest.
2.8.1 Ridge Thinning
This operation is applied to make the ridge width 1
pixel wide. This is performed by thinning operation.
2.8.2Minutia Marking
Next step is applied to mark the minutia by
applying a 3*3 window.
2.8.3False Minutia Removal
Inter-ridge distance is used for eliminating the false
minutia points which may affect the over all accuracy
of the fingerprint recognition system.
2.8.4Minutia Marking
At the final step each true minutia is marked with
three element. i.e. x-coordinate, y-coordinate and the
minutia direction or angle.
2.9 Minutia Cylindrical Code Information
Once the minutia information is obtained then the next
step is to form the minutia cylindrical code. In minutia
cylindrical code, a cylinder with 6 different layer is
used to represent the relative direction and distance
among different minutia. One such cylinder is shown
in figure 3.
Figure 3 represent the cylinder associated with the
minutia m={xm, ym, θm}. Radius of the cylinder is R
and xm and ym is the center of this cylinder. As
shown in the figure, a cuboid encloses the cylinder
whose base is aligned as per the direction of the
minutia i.e θm. The cuboid is divided in to a cell
where
The size and height of each cell is × and
respectively.
Where
Fig.2 Minutia Cylinder
Each cell of the cylinder can be accessed by three
coordinate i.e. i, j, k which represent the position of
the cell inside the cylinder. The value of i and j is
between 1 and Ns while the k takes the value between
- 4. International Journal of Research in Advent Technology, Vol.3, No.6, June 2015
E-ISSN: 2321-9637
35
1 to Nd. The height k of the cylinder represent the
angle which is represented by the
If
Represent the centre of the cell having indices i,j.
In MCC, the contribution of each minutia for
each cell is computed and is given by
Which is computed by the spatial contribution
and directional contribution
Where spatial contribution is given by
And directional contribution is given by
And
Is the neighbourhood of the .
Here is the neighbourhood radius and ds (p, m)
represent the Euclidean distance between minutia m
and point p as shown in the figure given below-
Fig.3 Neighbourhood Radius
Once the MCC for all the fingerprint image is
obtained then a database of MCC is created.
2.10 Fingerprint Matching
In order to match the two fingerprint MCC, Euclidean
distance is computed between two fingerprint MCC as
given in the below
Where
= MCC of the testing fingerprint image
= MCC of the database.
MCC for each fingerprint image is rotation and scale
invariants therefore it gives better result in even if the
fingerprint image is rotated or scaled.
The database MCC for which the value of Ed is less
than the certain threshold is considered as the
matching one and corresponding fingerprint image is
considered as the matching image
3. EXPERIMENTAL RESULTS
A database of fingerprint images comprises of the
200 different fingerprint images are created for testing
the performance of the proposed method. A simulation
program is designed with the help of MATLAB ver
2009B. The simulation program is tested in a
core2duo processor computer with 2GB RAM.
- 5. International Journal of Research in Advent Technology, Vol.3, No.6, June 2015
E-ISSN: 2321-9637
36
Fig.4 Original Fingerprint Image
Figure 5 display the original fingerprint image while
figure 6 display the extracted minutia points of the
fingerprint image.
Fig.5 Extracted Minutia Points in fingerprint image
In order to evaluate the performance of this method,
statistical measure like FAR(False acceptance Ratio)
and FRR(False rejection ratio) is also computed and
tabulated in table 1.
Fr AR is computed using following formula
Table 1 FAR and FRR for different value of
Threshold (Without Rotation)
Threshold Value FAR(in %) FRR(in %)
6 6.9 0.07
7 7.4 0.05
8 9.2 0.05
9 11.9 0.03
10 13.1 0.02
Table2 FAR and FRR of rotated fingerprint image
for different value of Threshold
Threshold Value FAR(in %) FRR(in %)
6 6.3 0.12
7 7.6 0.08
8 10.1 0.07
9 12.1 0.03
10 13.9 0.03
Fig.6 Minutia Cylindrical Code of the fingerprint
image shown in figure 5
4. CONCLUSION
Since from its inception, finger-print matching area
has been in the search of some robust technique for
matching the fingerprint accurately. The requirement
of rotation , scale invariants re the need of the hour. In
this paper a MCC based fingerprint matching
algorithm is implemented and presented. The
performance of the proposed system is satisfactory as
clear from the table 1. Even after rotating and scaling
the fingerprint, proposed system is able to achieve
good accuracy.
- 6. International Journal of Research in Advent Technology, Vol.3, No.6, June 2015
E-ISSN: 2321-9637
37
REFERENCES
[1] D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar,
Handbook of Fingerprint Recognition. second
ed. Springer-Verlag, 2009.
[2] N.K. Ratha, K. Karu, S. Chen, and A.K. Jain, “A
Real-TimeMatching System for Large
Fingerprint Databases,” IEEE Trans. Pattern
Analysis and Machine Intelligence, vol. 18, no.
8, pp. 799-813, Aug. 1996.
[3] S.H. Chang, F.H. Cheng, W.H. Hsu, and G.Z. Wu,
“Fast Algorithmfor Point Pattern Matching:
Invariant to Translations, Rotations and Scale
Changes,” Pattern Recognition, vol. 30, pp. 311-
320, 1997.
[4] A.K. Hrechak and J.A. McHugh, “Automated
Fingerprint Recognition Using Structural
Matching,” Pattern Recognition, vol. 23, pp.
893-904, 1990.
[5] A.J. Willis and L. Myers, “A Cost-Effective
Fingerprint Recognition System for Use with
Low-Quality Prints and Damaged Fingertips,”
Pattern Recognition, vol. 34, pp. 255-270, 2001.
[6] X. Jiang and W.Y. Yau, “Fingerprint Minutiae
Matching Based on the Local and Global
Structures,” Proc. Int’l Conf. Pattern
Recognition, vol. 2, pp. 6038-6041, 2000.
[7] N.K. Ratha, V.D. Pandit, R.M. Bolle, and V.
Vaish, “Robust Fingerprint Authentication Using
Local Structural Similarity,” Proc. IEEE
Workshop Applications of Computer Vision, pp.
29-34, 2000.
[8] T.Y. Jea and V. Govindaraju, “A Minutia-Based
Partial Fingerprint Recognition System,” Pattern
Recognition, vol. 38, pp. 1672-1684, 2005.
[9] S. Chikkerur, A.N. Cartwright, and V.
Govindaraju, “K-plet and Coupled BFS: A
Graph Based Fingerprint Representation and
Matching Algorithm,” Lecture Notes in
Computer Science, vol. 3832, pp. 309-315,
Springer, 2006.
[10] D. Kwon, I.D. Yun, D.H. Kim, and S.U. Lee,
“Fingerprint Matching Method Using Minutiae
Clustering and Warping,” Proc. Int’l Conf.
Pattern Recognition, vol. 4, 2006.
[11] H. Chen, J. Tian, and X. Yang, “Fingerprint
Matching with Registration Pattern Inspection,”
Lecture Notes in Computer Science, pp. 327-
334, Springer, 2003.
[12] J. Feng, “Combining Minutiae Descriptors for
Fingerprint Matching,” Pattern Recognition, vol.
41, pp. 342-352, 2008.
[13] X. Tan and B. Bhanu, “A Robust Two Step
Approach for Fingerprint Identification,” Pattern
Recognition Letters, vol. 24, pp. 2127-2134,
2003.
[14] G. Parziale and A. Niel, “A Fingerprint Matching
Using Minutiae Triangulation,” Lecture Notes in
Computer Science, pp. 241-248, Springer, 2004.
[15] X. Chen, J. Tian, J. Yang, and Y. Zhang, “An
Algorithm for Distorted Fingerprint Matching
Based on Local Triangle Feature
Set,” IEEE Trans. Information Forensics and Security,
vol. 1, no. 2, pp. 169-177, June 2006.
[16] D.Q. Zhao, F. Su, and A. Cai, “Fingerprint
Registration Using Minutia Clusters and
Centroid Structure,” Proc. Int’l Conf. Pattern
Recognition, pp. 413-416, 2006.
[17] W. Xu, X. Chen, and J. Feng, “A Robust
Fingerprint Matching Approach: Growing and
Fusing of Local Structures,” Lecture Notes in
Computer Science, vol. 4642, p. 134, Springer,
2007.
[18] X. Linag, A. Bishnu, and T. Asano, “A Robust
Fingerprint Indexing Scheme Using Minutia
Neighborhood Structure and Low-Order
Delaunay Triangles,” IEEE Trans. Information
Forensics and Security, vol. 2, no. 4, pp. 721-
733, Dec. 2007.
[19] M. Tico and P. Kuosmanen, “Fingerprint
Matching Using an Orientation-Based Minutia
Descriptor,” IEEE Trans. Pattern Analysis and
Machine Intelligence, vol. 25, no. 8, pp. 1009-
1014, Aug. 2003.
[20] J. Qi and Y. Wang, “A Robust Fingerprint
Matching Method,” Pattern Recognition, vol. 38,
pp. 1665-1671, 2005.
[21] E. Zhu, J. Yin, and G. Zhang, “Fingerprint
Matching Based on Global Alignment of
Multiple Reference Minutiae,” Pattern
Recognition, vol. 38, pp. 1685-1694, 2005.
[22] X. Wang, J. Li, and Y. Niu, “Fingerprint
Matching Using Orientationcodes and
PolyLines,” Pattern Recognition, vol. 40, pp.
3164-3177, 2007.
[23] Y. He, J. Tian, L. Li, H. Chen, and X. Yang,
“Fingerprint Matching Based on Global
Comprehensive Similarity,” IEEE Trans. Pattern
Analysis and Machine Intelligence, vol. 28, no.
6, pp. 850-862, June 2006.
[24] X. He, J. Tian, L. Li, Y. He, and X. Yang,
“Modeling and Analysis of Local
Comprehensive Minutia Relation for Fingerprint
Matching,” IEEE Trans. Systems, Man, and
Cybernetics, Part B, vol. 37, no. 5, pp. 1204-
1211, Oct. 2007.
[25] H. Wei, M. Guo, and Z. Ou, “Fingerprint
Verification Based on Multistage Minutiae
Matching,” Proc. Int’l Conf. Pattern
Recognition, pp. 1058-1061, 2006.
[26] G.S. Ng, X. Tong, X. Tang, and D. Shi,
“Adjacent Orientation Vector Based Fingerprint
Minutiae Matching System,” Proc. Int’l Conf.
Pattern Recognition, pp. 528-531, 2004.
[27] X. Tong, J. Huang, X. Tang, and D. Shi,
“Fingerprint Minutiae Matching Using the
Adjacent Feature Vector,” Pattern Recognition
Letters, vol. 26, pp. 1337-1345, 2005.
- 7. International Journal of Research in Advent Technology, Vol.3, No.6, June 2015
E-ISSN: 2321-9637
38
[28] L. Sha, F. Zhao, and X. Tang, “Minutiae-Based
Fingerprint Matching Using Subset
Combination,” Proc. Int’l Conf. Pattern
Recognition, pp. 566-569, 2006.
[29] J. Feng, Z. Ouyang, and A. Cai, “Fingerprint
Matching Using Ridges,” Pattern Recognition,
vol. 39, pp. 2131-2140, 2006.
[30] Y. Zhang, X. Yang, Q. Su, and J. Tian,
“Fingerprint Recognition Based on Combined
Features,” Lecture Notes in Computer Science,
vol. 4642, p. 281, Springer, 2007.
[31] D. Lee, K. Choi, and J. Kim, “A Robust
Fingerprint Matching Algorithm Using Local
Alignment,” Proc. Int’l Conf. Pattern
Recognition, vol. 16, pp. 803-806, 2002.
[32] L. Sha and X. Tang, “Orientation-Improved
Minutiae for Fingerprint Matching,” Proc. Int’l
Conf. Pattern Recognition, vol. 4, pp. 432-435,
2004.
[33] Y. Feng, J. Feng, X. Chen, and Z. Song, “A
Novel Fingerprint Matching Scheme Based on
Local Structure Compatibility,” Proc. Int’l Conf.
Pattern Recognition, pp. 374-377, 2006.