SlideShare una empresa de Scribd logo
1 de 35
Fingerprint High Level
    Classification
    Reza. Rahimi, E. Pakbaznia,
   Sharif University of Technology,
            Tehran, Iran.



                                      1
Outline
   1. Introduction
    1.1 Problem Statement
    1.2 Common Classification Methods
   2. Proposed Algorithms
    2.1 Proposed Algorithm (1)
        2.1.1 Directional Image Space
        2.1.2 Directional Masks
        2.1.3 Detection of Singular Points Neighborhood
        2.1.4 Detection of Singular Points
    2.2 Proposed Algorithm (2)
        2.2.1 Detection of Singular Points
        2.2.2 Classification
   3. Experimental Results
   4. Discussion
                                                          2
1.1 Problem Statement
   Fingerprint (FPs) have been used as a unique identifier of
    individuals for a very long time.
   FPs of a person are unique and features used in matching
    remain invariant with age.
   Fingerprint database are characterized by their large size, so
    we must find a way to narrow the search area.
   In high level classification FPs are classified into five main
    groups: arch, tented arch, left loop, right loop, and whorl.
   In high level classification singular points (SPs) namely core
    and delta points are used.


                                                                     3
(a)   (b)         (c)

                   Fig. 1: Typical FP images:
                   (a) arch, (b) tented arch,
                   (c) left loop, (d) right loop,
                   (e) whorl.



(d)         (e)
                                           4
1.2 Common Classification Methods
 There are four main approaches to allocate SPs:

 Methods based on mathematical representation of FPs.
  Because of the complexity of FP images the representation
of FPs is a difficult task. Almost all of these methods
use”Poincare” index to extract SPs.

 Methods based on statistical approaches.
   In these methods using directional histogram reduces noise
effect.



                                                                5
 Methods based on Fourier transform.
  These methods are not very efficient because they work in
  frequency-domain.

 Methods based on intellectual computation.
  These methods use neural networks, fuzzy logic, and genetic
  algorithm.
  Combination of these tools with first three methods results in
  Powerful algorithms.




                                                                   6
2.1 Proposed Algorithm (1)




Fig. 2: Overall block diagram of the first proposed algorithm.
                                                                 7
2.1.1 Directional Image Space
   Each elements of directional image is a vector.
    Exp.: D(i,j):=(d1(i,j),d2(i,j)) 0 < i,j <n-1.

   Directional images make a linear space.

   The inner product in this vector space is defined as:
    <F,G>:=ΣΣ F(i,j).G(i,j).

   The correlation function between two directional images is
    defined as:
    C(m,n):=<F(i,j),G(i-m,j-n)>.
                                                                 8
2.1.2 Directional Masks
   Directional masks are use to extract special features from
    directional images.

   For extracting core points a mask which can extract rotational
    region, in directional image, must be designed.

   For extracting delta points we must find a mask which can extract
    triangular region, in directional image.

   By sliding these masks over directional image and computing the
    correlation function a factor is founded which represents the
    amount of similarity between that area and core/delta mask.
                                                                     9
w1    w2    w3    w4    w5    45    0     0     0     135   60   60   90    120   120
 w6    w7    w8    w9    w10   90    45    0     135   90    50   50   90    130   130
 w11   w12   w13   w14   w15   90    90    0     90    90    40   40   90    140   140
 w16   w17   w18   w19   w20   90    135   0     45    90    30   30   90    150   150
 w21   w22   w23   w24   w25   135   0     0     0     45    0    0    0     0     0


             (a)                           (b)                         (c)


Fig. 3: Different masks: ( a ) directional masks, ( b ) core mask, ( c )
delta    mask.



                                                                                   10
2.1.3 Detection of Neighborhood of Singular Points
   After finding core/delta correlation results, neighborhood of SPs
    must be founded.

   Detection of SPs neighborhood efficiently reduces the
    computational load of exact SP allocation process.

   The point is assigned as a core point if core correlation factor is
    greater than T=mc+γσ c (mc: mean, σc: variance,γ: experimental
    factor).

   The point is assigned as a delta point if delta correlation factor is
    greater than T=md+γσ d ( md: mean, σd: variance,γ: experimental
    factor).
                                                                    11
(a)                  (b)                  (c)                  (d)

Fig. 4: First stage of allocation of SPs neighborhoods: ( a ) typical left loop
   fingerprint image, ( b ) directional image, ( c ) core point neighborhoods
after soft thresholding, ( d ) delta point neighborhoods after soft
thresholding.

                                                                           12
2.1.4 Detection of Singular Points
   After finding most similar points to delta/core points the exact
    location of core/delta points must be extracted.

   Directional histogram is used to extract the exact location of SPs.




                 (a)                           (b)
    Fig. 5: Core/ Delta histogram: (a) neighborhood of core points,
    (b) neighborhood of delta points.
                                                                       13
   For each region the mean and variance is computed.

   The Point is assigned as a core point if one of the following
    conditions are satisfied:
   m1>90, m2<90, m1-m2<θ( i), {σ1 , σ2 } < σ( i ),
   m3<90, m4>90, m4-m3<θ( i), {σ3 , σ4 } < σ( i ),
   m1>90, m3<90, m1-m2<θ( i), {σ1 , σ3 } < σ( i ),
   m2<90, m4>90, m4-m2<θ( i), {σ2 , σ4 } < σ( i ).

   The point is assigned as a delta point if both of the following
    conditions is satisfied:

                                                                      14
 m1<90, m1-m3<θ( i), {σ1 , σ3 } < σ( i ),
 m2>90, 180-( m2+ m3)< θ( i), {σ2 , σ3 } < σ( i ).
 θ( i) and σ( i) are chosen from a look-up-table (experimentally
  assigned look-up table).

 Algorithm is iterated until coverage to 2 points.




                                                                    15
(a                                         (b)
           )

Fig. 6: Core/ Delta allocation final results: ( a ) a typical left loop
image, ( b ) core and delta points detected by the proposed algorithm.


                                                                          16
2.2 Proposed Algorithm (2)




Fig. 7: Block diagram of the second proposed algorithm.
                                                          17
2.2.1 Detection of Singular Points
 Fingerprint(FP) images can be classified into different groups
  based on their SPs.
 First of all it is better to detect SP neighborhood in FP images.

 Neighborhood Detection of SPs

      Core Point


 Tangent slope changes faster in Fig.8(b) than Fig.8(a),
 The absolute value of second order derivative of y with
                 2
  respect to x( d y ) is larger in (b) than (a).
                   2
                dx
                                                                  18
Fig. 8: Tangent slope changes faster in (b) than (a).


                                                        19
    Ridges and valleys are the constant contours of gray level
     function.
    Gradient vector of a function is perpendicular to the constant
     contours in each point of domain.
                                                    d2y
    With above points it is possible to calculate: dx 2
         dy    (∇ I ) x
    m=      =−
         dx    (∇ I ) y

           ∂I    
    d y d  ∂x 
     2
         =−
    dx2 dx ∂I
              ∂y 
                  
                                                                20
 Areas with larger curvature are extracted by applying an
  appropriate threshold.




     (a)                      (b)                         (c)


Fig. 9: Result of the first stage of the algorithm: (a) query image,
(b) Related directional image, (c) neighborhood detected for core.
                                                                       21
 Delta Point

 We can always find an area around delta points which
   contains two perpendicular directions.
 It can be recognized by scanning the whole directions
  with a m×n mask.
 Results of applying this stage on a FP image is shown
  in Fig. 10.




                                                          22
(a)                     (b)                      (c)

Fig. 10: Results of the neighborhood detection for delta points: (a) query image,
(b) Related directional image, (c) neighborhood detected for delta points.

                                                                          23
1.2 Poincare Index Computation for Candid Points

 PI is defined as summation of direction differences between
 neighbor blocks in block-directional image on a closed
 curve, when the curve is traveled counterclockwise.

          PI ( x, y) = 1 ∫do f ( x′ y ′
                                  , )
                      2π C

 If C is a circle with radius:

                   1   ∂
  PI (x, y) = lim    ∫   Of (x +ε cosθ, y +ε sinθ)dθ.
             ε →0 2π ∂θ

                                                                24
(a)                          (b)                        (c)


Fig. 11: Different cases for PI: (a) ordinary point, (b) core point,
(c) delta point.

                                                                       25
(a)                                    (b)



Fig. 12: results of applying Poincare index: (a) core points, (b) delta points.

                                                                           26
    Adaptive Noise Cancellation

        Adaptive Noisy Core Cancellation

  Make an 5×5 neighborhood around each detected core point.
  Consider if it has any of below shapes around itself.




        (a)              (b)            (c)         (d)

Fig. 13: different acceptable neighborhoods around core points.

                                                            continued
                                                               27
 Cancel each point which has not any of above shapes around it.


 Adaptive Noisy Delta Cancellation

 Make a 3×5 neighborhood around each detected delta point.
 Consider if it has any of below shapes around it.




                      (a)                (b)

   Fig. 14: different acceptable neighborhoods around delta points.
                                                                 continued
                                                                    28
 Cancel each point which has not any of above shapes
  around it.




           (a)                               (b)

 Fig. 15: final results for core and delta detection after applying
 noise cancellation step: (a) core point, (b) delta point.
                                                                      29
2. Classification
 Distinguishing Whorl and Arch Class from Other Classes
     Knowing that a whorl has 2 pairs of SPs and an arch has no SPs,
      we can distinguish them from other classes.
     Distinguishing Between Loops and Tented Arch

     Make an m×n neighborhood around SPs of FP image.
     Compute the average of directions (ave_dir) in this
      neighborhood.




                                                               30
   Compute slope of the core/delta (slope) line in image.
   Make a decision as below:


      if     ave _ dir −slope ≤ TLth
                  Finger Class = Tented Arch
      else
                 Finger Class = Loop




                                                             31
 Distinguish Between Left Loop and Right Loop

 Compute the average of directions in a special rectangular
  in the block-directional image.
 In a left loop this average is smaller than the core/delta line
  slope and in a right loop it is larger.




             (a)                           (b)
  Fig. 17: The average is smaller than the core/delta line slope:
            (a) left loop, (b) right loop.
                                                                    32
3. Experimental Results
 Proposed algorithms were tested on several fingerprint images
  with different qualities.
 The first stage of the proposed algorithm reduces the No.
of
   core/delta probable points to 1/10~1/5 (of FP size).
               Table 1: Results of the First proposed algorithm.
  FP-Type       Arch      T-Arch    R-Loop    L-Loop    Whorl      Multiple
                                                                   Group
  Arch(5)       5                                                  Yes

  T-Arch(5)               5                                        Yes

  R-Loop(10)                        8                              Yes

  L-Loop(10)                                  10                   Yes

  Whorl(10)                                             10         Yes

                                                                              33
 The second proposed algorithm was tested on 40 different FP images
  and led to successfully classification of almost 90% of images.

           Table 2: Results of the Second proposed algorithm.




                                                                    34
4. Discussion
 In this talk two different algorithms for fingerprint classification
  were discussed.

 In the first algorithm, using the new proposed tool (directional mask)
  speeds up the the process and in the second stage using an adaptive
  directional histogram increases the accuracy of the algorithm.

 In the second proposed algorithm, detection of the SPs neighborhood
  speeds up the process and also increases the accuracy of the
  second stage, the noisy detected SPs were cancelled in the third
  stage.



                                                                     35

Más contenido relacionado

La actualidad más candente

Image Texture Analysis
Image Texture AnalysisImage Texture Analysis
Image Texture Analysislalitxp
 
Image segmentation 3 morphology
Image segmentation 3 morphologyImage segmentation 3 morphology
Image segmentation 3 morphologyRumah Belajar
 
COM2304: Morphological Image Processing
COM2304: Morphological Image ProcessingCOM2304: Morphological Image Processing
COM2304: Morphological Image ProcessingHemantha Kulathilake
 
morphological image processing
morphological image processingmorphological image processing
morphological image processingJohn Williams
 
Notes on image processing
Notes on image processingNotes on image processing
Notes on image processingMohammed Kamel
 
Boundary Extraction
Boundary ExtractionBoundary Extraction
Boundary ExtractionMaria Akther
 
Chapter 9 morphological image processing
Chapter 9 morphological image processingChapter 9 morphological image processing
Chapter 9 morphological image processingasodariyabhavesh
 
Point Cloud Segmentation for 3D Reconstruction
Point Cloud Segmentation for 3D ReconstructionPoint Cloud Segmentation for 3D Reconstruction
Point Cloud Segmentation for 3D ReconstructionPirouz Nourian
 
Morphological Image Processing
Morphological Image ProcessingMorphological Image Processing
Morphological Image Processingkumari36
 
Structure and Motion - 3D Reconstruction of Cameras and Structure
Structure and Motion - 3D Reconstruction of Cameras and StructureStructure and Motion - 3D Reconstruction of Cameras and Structure
Structure and Motion - 3D Reconstruction of Cameras and StructureGiovanni Murru
 
Robots that see like humans
Robots that see like humansRobots that see like humans
Robots that see like humansWalter Lucetti
 
Morphology in graphics and image processing
Morphology in graphics and image processingMorphology in graphics and image processing
Morphology in graphics and image processingDheeban Smart
 
Dilation and erosion
Dilation and erosionDilation and erosion
Dilation and erosionAswin Pv
 
COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I Hemantha Kulathilake
 
Viva3D Stereo Vision user manual en 2016-06
Viva3D Stereo Vision user manual en 2016-06Viva3D Stereo Vision user manual en 2016-06
Viva3D Stereo Vision user manual en 2016-06Robin Colclough
 

La actualidad más candente (20)

Image Texture Analysis
Image Texture AnalysisImage Texture Analysis
Image Texture Analysis
 
Image segmentation 3 morphology
Image segmentation 3 morphologyImage segmentation 3 morphology
Image segmentation 3 morphology
 
COM2304: Morphological Image Processing
COM2304: Morphological Image ProcessingCOM2304: Morphological Image Processing
COM2304: Morphological Image Processing
 
morphological image processing
morphological image processingmorphological image processing
morphological image processing
 
Stereo vision
Stereo visionStereo vision
Stereo vision
 
Notes on image processing
Notes on image processingNotes on image processing
Notes on image processing
 
Morphological operations
Morphological operationsMorphological operations
Morphological operations
 
Boundary Extraction
Boundary ExtractionBoundary Extraction
Boundary Extraction
 
Chapter 9 morphological image processing
Chapter 9 morphological image processingChapter 9 morphological image processing
Chapter 9 morphological image processing
 
Point Cloud Segmentation for 3D Reconstruction
Point Cloud Segmentation for 3D ReconstructionPoint Cloud Segmentation for 3D Reconstruction
Point Cloud Segmentation for 3D Reconstruction
 
Morphological Image Processing
Morphological Image ProcessingMorphological Image Processing
Morphological Image Processing
 
Structure and Motion - 3D Reconstruction of Cameras and Structure
Structure and Motion - 3D Reconstruction of Cameras and StructureStructure and Motion - 3D Reconstruction of Cameras and Structure
Structure and Motion - 3D Reconstruction of Cameras and Structure
 
Robots that see like humans
Robots that see like humansRobots that see like humans
Robots that see like humans
 
Morphology in graphics and image processing
Morphology in graphics and image processingMorphology in graphics and image processing
Morphology in graphics and image processing
 
Dilation and erosion
Dilation and erosionDilation and erosion
Dilation and erosion
 
Defocus magnification
Defocus magnificationDefocus magnification
Defocus magnification
 
COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I COM2304: Digital Image Fundamentals - I
COM2304: Digital Image Fundamentals - I
 
Viva3D Stereo Vision user manual en 2016-06
Viva3D Stereo Vision user manual en 2016-06Viva3D Stereo Vision user manual en 2016-06
Viva3D Stereo Vision user manual en 2016-06
 
Local binary pattern
Local binary patternLocal binary pattern
Local binary pattern
 
Stereo vision
Stereo visionStereo vision
Stereo vision
 

Similar a Fingerprint High Level Classification

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Using Generic Image Processing Operations to Detect a Calibration Grid
Using Generic Image Processing Operations to Detect a Calibration GridUsing Generic Image Processing Operations to Detect a Calibration Grid
Using Generic Image Processing Operations to Detect a Calibration GridJan Wedekind
 
Data-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial AdaptationData-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial AdaptationCSCJournals
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUEScscpconf
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABSindhi Madhuri
 
Image formation
Image formationImage formation
Image formationpotaters
 
ImageSegmentation (1).ppt
ImageSegmentation (1).pptImageSegmentation (1).ppt
ImageSegmentation (1).pptNoorUlHaq47
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.pptAVUDAI1
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.pptDEEPUKUMARR
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images ijcga
 
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
3D Face Recognition Method Using 2DPCAEuclidean Distance ClassificationIDES Editor
 
Standardizing inter-element distances in repertory grids
Standardizing inter-element distances in repertory gridsStandardizing inter-element distances in repertory grids
Standardizing inter-element distances in repertory gridsMark Heckmann
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...IDES Editor
 

Similar a Fingerprint High Level Classification (20)

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
3DSensing.ppt
3DSensing.ppt3DSensing.ppt
3DSensing.ppt
 
Using Generic Image Processing Operations to Detect a Calibration Grid
Using Generic Image Processing Operations to Detect a Calibration GridUsing Generic Image Processing Operations to Detect a Calibration Grid
Using Generic Image Processing Operations to Detect a Calibration Grid
 
Data-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial AdaptationData-Driven Motion Estimation With Spatial Adaptation
Data-Driven Motion Estimation With Spatial Adaptation
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUESA STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
A STUDY AND ANALYSIS OF DIFFERENT EDGE DETECTION TECHNIQUES
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Face Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLABFace Recognition using PCA-Principal Component Analysis using MATLAB
Face Recognition using PCA-Principal Component Analysis using MATLAB
 
SolidModeling.ppt
SolidModeling.pptSolidModeling.ppt
SolidModeling.ppt
 
Image formation
Image formationImage formation
Image formation
 
ImageSegmentation (1).ppt
ImageSegmentation (1).pptImageSegmentation (1).ppt
ImageSegmentation (1).ppt
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.ppt
 
ImageSegmentation.ppt
ImageSegmentation.pptImageSegmentation.ppt
ImageSegmentation.ppt
 
Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images  Image Quality Feature Based Detection Algorithm for Forgery in Images
Image Quality Feature Based Detection Algorithm for Forgery in Images
 
Ijcatr04041016
Ijcatr04041016Ijcatr04041016
Ijcatr04041016
 
CVGIP_Chia-Pin Tseng
CVGIP_Chia-Pin TsengCVGIP_Chia-Pin Tseng
CVGIP_Chia-Pin Tseng
 
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
3D Face Recognition Method Using 2DPCAEuclidean Distance Classification
 
Standardizing inter-element distances in repertory grids
Standardizing inter-element distances in repertory gridsStandardizing inter-element distances in repertory grids
Standardizing inter-element distances in repertory grids
 
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...Image Splicing Detection involving Moment-based Feature Extraction and Classi...
Image Splicing Detection involving Moment-based Feature Extraction and Classi...
 

Más de Reza Rahimi

Boosting Personalization In SaaS Using Machine Learning.pdf
Boosting Personalization  In SaaS Using Machine Learning.pdfBoosting Personalization  In SaaS Using Machine Learning.pdf
Boosting Personalization In SaaS Using Machine Learning.pdfReza Rahimi
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing ServicesReza Rahimi
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsReza Rahimi
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart ConnectivityReza Rahimi
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data CentersReza Rahimi
 
The Next Big Thing in IT
The Next Big Thing in ITThe Next Big Thing in IT
The Next Big Thing in ITReza Rahimi
 
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingQoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingReza Rahimi
 
On Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud ComputingOn Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud ComputingReza Rahimi
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachReza Rahimi
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureReza Rahimi
 
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsExploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsReza Rahimi
 
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Reza Rahimi
 
Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkReza Rahimi
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemReza Rahimi
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureReza Rahimi
 
Network Information Processing
Network Information ProcessingNetwork Information Processing
Network Information ProcessingReza Rahimi
 
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
Pervasive Image Computation: A Mobile  Phone Application for getting Informat...Pervasive Image Computation: A Mobile  Phone Application for getting Informat...
Pervasive Image Computation: A Mobile Phone Application for getting Informat...Reza Rahimi
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian IntegrationReza Rahimi
 
Interactive Proof Systems and An Introduction to PCP
Interactive Proof Systems and An Introduction to PCPInteractive Proof Systems and An Introduction to PCP
Interactive Proof Systems and An Introduction to PCPReza Rahimi
 
Quantum Computation and Algorithms
Quantum Computation and Algorithms Quantum Computation and Algorithms
Quantum Computation and Algorithms Reza Rahimi
 

Más de Reza Rahimi (20)

Boosting Personalization In SaaS Using Machine Learning.pdf
Boosting Personalization  In SaaS Using Machine Learning.pdfBoosting Personalization  In SaaS Using Machine Learning.pdf
Boosting Personalization In SaaS Using Machine Learning.pdf
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing Services
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart Connectivity
 
Self-Tuning Data Centers
Self-Tuning Data CentersSelf-Tuning Data Centers
Self-Tuning Data Centers
 
The Next Big Thing in IT
The Next Big Thing in ITThe Next Big Thing in IT
The Next Big Thing in IT
 
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud ComputingQoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
QoS-Aware Middleware for Optimal Service Allocation in Mobile Cloud Computing
 
On Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud ComputingOn Optimal and Fair Service Allocation in Mobile Cloud Computing
On Optimal and Fair Service Allocation in Mobile Cloud Computing
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning Approach
 
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud ArchitectureMobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture
 
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsExploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
 
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
 
Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP Network
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management System
 
Mobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big PictureMobile Cloud Computing: Big Picture
Mobile Cloud Computing: Big Picture
 
Network Information Processing
Network Information ProcessingNetwork Information Processing
Network Information Processing
 
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
Pervasive Image Computation: A Mobile  Phone Application for getting Informat...Pervasive Image Computation: A Mobile  Phone Application for getting Informat...
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian Integration
 
Interactive Proof Systems and An Introduction to PCP
Interactive Proof Systems and An Introduction to PCPInteractive Proof Systems and An Introduction to PCP
Interactive Proof Systems and An Introduction to PCP
 
Quantum Computation and Algorithms
Quantum Computation and Algorithms Quantum Computation and Algorithms
Quantum Computation and Algorithms
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Fingerprint High Level Classification

  • 1. Fingerprint High Level Classification Reza. Rahimi, E. Pakbaznia, Sharif University of Technology, Tehran, Iran. 1
  • 2. Outline  1. Introduction 1.1 Problem Statement 1.2 Common Classification Methods  2. Proposed Algorithms 2.1 Proposed Algorithm (1) 2.1.1 Directional Image Space 2.1.2 Directional Masks 2.1.3 Detection of Singular Points Neighborhood 2.1.4 Detection of Singular Points 2.2 Proposed Algorithm (2) 2.2.1 Detection of Singular Points 2.2.2 Classification  3. Experimental Results  4. Discussion 2
  • 3. 1.1 Problem Statement  Fingerprint (FPs) have been used as a unique identifier of individuals for a very long time.  FPs of a person are unique and features used in matching remain invariant with age.  Fingerprint database are characterized by their large size, so we must find a way to narrow the search area.  In high level classification FPs are classified into five main groups: arch, tented arch, left loop, right loop, and whorl.  In high level classification singular points (SPs) namely core and delta points are used. 3
  • 4. (a) (b) (c) Fig. 1: Typical FP images: (a) arch, (b) tented arch, (c) left loop, (d) right loop, (e) whorl. (d) (e) 4
  • 5. 1.2 Common Classification Methods  There are four main approaches to allocate SPs:  Methods based on mathematical representation of FPs. Because of the complexity of FP images the representation of FPs is a difficult task. Almost all of these methods use”Poincare” index to extract SPs.  Methods based on statistical approaches. In these methods using directional histogram reduces noise effect. 5
  • 6.  Methods based on Fourier transform. These methods are not very efficient because they work in frequency-domain.  Methods based on intellectual computation. These methods use neural networks, fuzzy logic, and genetic algorithm. Combination of these tools with first three methods results in Powerful algorithms. 6
  • 7. 2.1 Proposed Algorithm (1) Fig. 2: Overall block diagram of the first proposed algorithm. 7
  • 8. 2.1.1 Directional Image Space  Each elements of directional image is a vector. Exp.: D(i,j):=(d1(i,j),d2(i,j)) 0 < i,j <n-1.  Directional images make a linear space.  The inner product in this vector space is defined as: <F,G>:=ΣΣ F(i,j).G(i,j).  The correlation function between two directional images is defined as: C(m,n):=<F(i,j),G(i-m,j-n)>. 8
  • 9. 2.1.2 Directional Masks  Directional masks are use to extract special features from directional images.  For extracting core points a mask which can extract rotational region, in directional image, must be designed.  For extracting delta points we must find a mask which can extract triangular region, in directional image.  By sliding these masks over directional image and computing the correlation function a factor is founded which represents the amount of similarity between that area and core/delta mask. 9
  • 10. w1 w2 w3 w4 w5 45 0 0 0 135 60 60 90 120 120 w6 w7 w8 w9 w10 90 45 0 135 90 50 50 90 130 130 w11 w12 w13 w14 w15 90 90 0 90 90 40 40 90 140 140 w16 w17 w18 w19 w20 90 135 0 45 90 30 30 90 150 150 w21 w22 w23 w24 w25 135 0 0 0 45 0 0 0 0 0 (a) (b) (c) Fig. 3: Different masks: ( a ) directional masks, ( b ) core mask, ( c ) delta mask. 10
  • 11. 2.1.3 Detection of Neighborhood of Singular Points  After finding core/delta correlation results, neighborhood of SPs must be founded.  Detection of SPs neighborhood efficiently reduces the computational load of exact SP allocation process.  The point is assigned as a core point if core correlation factor is greater than T=mc+γσ c (mc: mean, σc: variance,γ: experimental factor).  The point is assigned as a delta point if delta correlation factor is greater than T=md+γσ d ( md: mean, σd: variance,γ: experimental factor). 11
  • 12. (a) (b) (c) (d) Fig. 4: First stage of allocation of SPs neighborhoods: ( a ) typical left loop fingerprint image, ( b ) directional image, ( c ) core point neighborhoods after soft thresholding, ( d ) delta point neighborhoods after soft thresholding. 12
  • 13. 2.1.4 Detection of Singular Points  After finding most similar points to delta/core points the exact location of core/delta points must be extracted.  Directional histogram is used to extract the exact location of SPs. (a) (b) Fig. 5: Core/ Delta histogram: (a) neighborhood of core points, (b) neighborhood of delta points. 13
  • 14. For each region the mean and variance is computed.  The Point is assigned as a core point if one of the following conditions are satisfied:  m1>90, m2<90, m1-m2<θ( i), {σ1 , σ2 } < σ( i ),  m3<90, m4>90, m4-m3<θ( i), {σ3 , σ4 } < σ( i ),  m1>90, m3<90, m1-m2<θ( i), {σ1 , σ3 } < σ( i ),  m2<90, m4>90, m4-m2<θ( i), {σ2 , σ4 } < σ( i ).  The point is assigned as a delta point if both of the following conditions is satisfied: 14
  • 15.  m1<90, m1-m3<θ( i), {σ1 , σ3 } < σ( i ),  m2>90, 180-( m2+ m3)< θ( i), {σ2 , σ3 } < σ( i ).  θ( i) and σ( i) are chosen from a look-up-table (experimentally assigned look-up table).  Algorithm is iterated until coverage to 2 points. 15
  • 16. (a (b) ) Fig. 6: Core/ Delta allocation final results: ( a ) a typical left loop image, ( b ) core and delta points detected by the proposed algorithm. 16
  • 17. 2.2 Proposed Algorithm (2) Fig. 7: Block diagram of the second proposed algorithm. 17
  • 18. 2.2.1 Detection of Singular Points  Fingerprint(FP) images can be classified into different groups based on their SPs.  First of all it is better to detect SP neighborhood in FP images.  Neighborhood Detection of SPs  Core Point  Tangent slope changes faster in Fig.8(b) than Fig.8(a),  The absolute value of second order derivative of y with 2 respect to x( d y ) is larger in (b) than (a). 2 dx 18
  • 19. Fig. 8: Tangent slope changes faster in (b) than (a). 19
  • 20. Ridges and valleys are the constant contours of gray level function.  Gradient vector of a function is perpendicular to the constant contours in each point of domain. d2y  With above points it is possible to calculate: dx 2 dy (∇ I ) x m= =− dx (∇ I ) y ∂I  d y d  ∂x  2 =− dx2 dx ∂I  ∂y   20
  • 21.  Areas with larger curvature are extracted by applying an appropriate threshold. (a) (b) (c) Fig. 9: Result of the first stage of the algorithm: (a) query image, (b) Related directional image, (c) neighborhood detected for core. 21
  • 22.  Delta Point  We can always find an area around delta points which contains two perpendicular directions.  It can be recognized by scanning the whole directions with a m×n mask.  Results of applying this stage on a FP image is shown in Fig. 10. 22
  • 23. (a) (b) (c) Fig. 10: Results of the neighborhood detection for delta points: (a) query image, (b) Related directional image, (c) neighborhood detected for delta points. 23
  • 24. 1.2 Poincare Index Computation for Candid Points  PI is defined as summation of direction differences between neighbor blocks in block-directional image on a closed curve, when the curve is traveled counterclockwise. PI ( x, y) = 1 ∫do f ( x′ y ′ , ) 2π C  If C is a circle with radius: 1 ∂ PI (x, y) = lim ∫ Of (x +ε cosθ, y +ε sinθ)dθ. ε →0 2π ∂θ 24
  • 25. (a) (b) (c) Fig. 11: Different cases for PI: (a) ordinary point, (b) core point, (c) delta point. 25
  • 26. (a) (b) Fig. 12: results of applying Poincare index: (a) core points, (b) delta points. 26
  • 27. Adaptive Noise Cancellation  Adaptive Noisy Core Cancellation  Make an 5×5 neighborhood around each detected core point.  Consider if it has any of below shapes around itself. (a) (b) (c) (d) Fig. 13: different acceptable neighborhoods around core points. continued 27
  • 28.  Cancel each point which has not any of above shapes around it.  Adaptive Noisy Delta Cancellation  Make a 3×5 neighborhood around each detected delta point.  Consider if it has any of below shapes around it. (a) (b) Fig. 14: different acceptable neighborhoods around delta points. continued 28
  • 29.  Cancel each point which has not any of above shapes around it. (a) (b) Fig. 15: final results for core and delta detection after applying noise cancellation step: (a) core point, (b) delta point. 29
  • 30. 2. Classification  Distinguishing Whorl and Arch Class from Other Classes  Knowing that a whorl has 2 pairs of SPs and an arch has no SPs, we can distinguish them from other classes.  Distinguishing Between Loops and Tented Arch  Make an m×n neighborhood around SPs of FP image.  Compute the average of directions (ave_dir) in this neighborhood. 30
  • 31. Compute slope of the core/delta (slope) line in image.  Make a decision as below: if ave _ dir −slope ≤ TLth Finger Class = Tented Arch else Finger Class = Loop 31
  • 32.  Distinguish Between Left Loop and Right Loop  Compute the average of directions in a special rectangular in the block-directional image.  In a left loop this average is smaller than the core/delta line slope and in a right loop it is larger. (a) (b) Fig. 17: The average is smaller than the core/delta line slope: (a) left loop, (b) right loop. 32
  • 33. 3. Experimental Results  Proposed algorithms were tested on several fingerprint images with different qualities.  The first stage of the proposed algorithm reduces the No. of core/delta probable points to 1/10~1/5 (of FP size). Table 1: Results of the First proposed algorithm. FP-Type Arch T-Arch R-Loop L-Loop Whorl Multiple Group Arch(5) 5 Yes T-Arch(5) 5 Yes R-Loop(10) 8 Yes L-Loop(10) 10 Yes Whorl(10) 10 Yes 33
  • 34.  The second proposed algorithm was tested on 40 different FP images and led to successfully classification of almost 90% of images. Table 2: Results of the Second proposed algorithm. 34
  • 35. 4. Discussion  In this talk two different algorithms for fingerprint classification were discussed.  In the first algorithm, using the new proposed tool (directional mask) speeds up the the process and in the second stage using an adaptive directional histogram increases the accuracy of the algorithm.  In the second proposed algorithm, detection of the SPs neighborhood speeds up the process and also increases the accuracy of the second stage, the noisy detected SPs were cancelled in the third stage. 35