SlideShare una empresa de Scribd logo
1 de 46
Toward Unconstrained Fingerprint Recognition:
a Fully Touchless 3-D System
Based on Two Views on the Move
By,
Sinisha George
S2 MTech CS
OVERVIEW
• Problem Statement
• Introduction
• Related works
• Proposed method
• Experimental Results
• Conclusion
• References
2
PROBLEM STATEMENT
• Require contact of the finger with any
acquisition surface
• Require constrained and highly cooperative
acquisition methods.
• Low usability, user acceptance and presence of
distortions, less robust to dust and dirt , hygiene
issues.
3
INTRODUCTION
• Fingerprints are one of many forms of biometrics
used to identify individuals and verify their identity.
• fully touchless fingerprint recognition system based
on the computation of three-dimensional models.
• Models from two view image captured during
movement
• less-constrained biometrics aim at using samples
captured
– Contactless, higher distance, Natural light
conditions, On the move
4
RELATED WORKS
A) Two dimensional system
5
Structured light
RELATED WORKS
• Three dimensional system
6
PROPOSED SYSTEM
BIOMETRIC RECOGNITION PROCESS
1) Acquisition
2) Three-dimensional fingerprint reconstruction
3) Computation of touch-compatible images
4) Template computation
5) Matching
7
BIOMETRIC RECOGNITION
PROCESS(cont.)
8
1. CONTACTLESS ACQISITION
9
CONTACTLESS ACQISITION(Cont.)
Fig : Rotations of the finger with respect to the optical centre of Camera A.
10
CONTACTLESS ACQISITION(Cont.)
Examples of images in Dataset B captured with exaggerate finger orientations:
(a) leftward yaw rotation; (b) counter clockwise roll rotation;
(c)downward pitch rotation; (d) rightward yaw rotation;
(e) clockwise roll rotation; (f) upward pitch rotation. 11
2. THREE-DIMENSIONAL FINGERPRINT
RECONSTRUCTION
1) Image pre-processing;
2) Segmentation;
3) Extraction and matching of the reference points;
4) Refinement of the pairs of corresponding points;
5) Three-dimensional surface computation and
image wrapping.
12
2.1 IMAGE PREPROCESSING
• Details of the ridge pattern are Particularly visible in
the green channel of the RGB color Space of the
captured images
13
2.2 SEGMENTATION
14
2.3 EXTRACTION AND MATCHING OF THE
REFERENCE POINTS
15
2.3 EXTRACTION AND MATCHING OF THE
REFERENCE POINTS(CONT.)
16
2.4 REFINEMENT OF THE PAIRS OF
CORRESPONDING POINTS
• To obtain smooth and accurate representation
of the finger surface
• Applying thin plate spline to the set of
corresponding points.
17
2.5 THREE-DIMENSIONAL SURFACE
COMPUTATION AND IMAGE WRAPPING.
• Creates a three-dimensional model MA as the depth
map corresponding to the view of Camera A.
• Triangulation
• Linear interpolation
– Mp, Mz
Fig: dense three-dimensional model with a
superimposed texture image obtained by
the proposed method
18
3. COMPUTATION OF TOUCH-COMPATIBLE
IMAGES
• Enhancement
o background subtraction
o Nonlinear equalization(logarithm)
o Butterworth low-pass filter
• Two dimensional mapping
– Enrolment
oCompensate for rotations
oComputation of NR rotations
19
3. COMPUTATION OF TOUCH-COMPATIBLE
IMAGES(cont.)
20
4.TEMPLATE COMPUTATION
• Neurotechnology veriFinger
– Commercial feature extractor
– Compute template T
– Properly identifies the coordinates
– Designed for touch-based images.
Fig: a binary image and minutia coordinates obtained using the
proposed system and the software Verifinger
21
5. MATCHING
• In the verification phase computes a single minutiae
template Tf .
• Matching score represents the similarity of the fresh
template with a multi-template.
• Te score is computed as,
• Match(.) – matching function ,performed using
nuerotechnology verifinger software
22
EXPERIMENTAL RESULTS
a) Data sets description
b) Accuracy of 3D reconstruction
c) Recognition performance
d) User acceptability
e) Interoperability
23
EXPERIMENTAL SETUP
24
A) DATA SETS DESCRIPTION
 Touchless - one session.
2368 samples.
10 fingers, 30 volunteers, 8 acquisitions per finger.
 Touchless - two sessions
2368 samples
10 fingers, 15 volunteers, 16 acquisitions per finger.
- 8acquisitions one year, 8 acquisition subsequent year .
 Touchless - misplaced fingers
1200 samples
2 fingers (index), 30 volunteers, 20 acquisitions per finger
 Touch-based
One session
Two sessions
25
B) ACCURACY OF 3D RECONSTRUCTION
• point clouds describing the three-dimensional shape of the finger and
the corresponding dense three-dimensional models with superimposed
texture images
• Average error 0.03mm 26
C) RECOGNITION PERFORMANCE
• ROC curves representing the accuracy of the
proposed touchless system under standard
operating conditions (Dataset).
•The results represent different numbers of
three-dimensional rotations NR performed
during the enrolment step.
• Every test included 5, 605, 056 identity
comparisons.
•The configuration that yielded the best
accuracy was NR = 9, with EER = 0.03%.
Table: Accuracy of the proposed biometric
system using samples acquired under
standard operating conditions (dataset A).27
D) USER ACCEPTABILITY
• Survey performed using questionnaires.
• Results show preference towards contactless
recognition.
28
G) OVERVIEW OF THE DIFFERENT
TECHNOLOGIES
29
Aspect Touch -based Touchless
accuracy EER=0.06% EER=0.03%
Usability medium High
User acceptance Medium High
Privacy Data protection techniques Data protection techniques
Speed Template extraction +
matching
3D reconstruction +
template extraction +
matching
Cost 10$ to 5000$ 10$ to 5000$
CONCLUSIONS
– Systems based on two-dimensional samples can be used
in low-cost applications, but the samples present
distortions.
– Systems based on three-dimensional samples can obtain
comparable accuracy with respect to traditional systems
– Touchless systems are characterized by higher usability,
user acceptance, less constrained.
– Robust to uncontrolled environmental illumination.
– Tolerate wide range of finger orientations.
30
REFERENCES
[[1] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of
Fingerprint Recognition, 2nd ed. Springer Publishing Company,
Incorporated, 2009.
[2] R. Donida Labati and F. Scotti, “Fingerprint,” in Encyclopedia of
Cryptography and Security (2nd ed.), H. van Tilborg and S. Jajodia,
Eds. Springer, 2011, pp. 460 – 465.
[3] R. Donida Labati, V. Piuri, and F. Scotti, Touchless Fingerprint
Biometrics, ser. Series in Security, Privacy and Trust. CRC Press,
2015.
[4] G. Parziale, “Touchless fingerprinting technology,” in Advances in
Biometrics, N. K. Ratha and V. Govindaraju, Eds. Springer London,
2008, pp. 25–48.
31
Verifinger S/W
32
33
Minutiae
35
36
Charge-coupled devices
37
Morphological opening operator
Morphological filling
Epipolar lines
Unconstrained fingerprint recognition  fully touchless 3 d system ieee
Unconstrained fingerprint recognition  fully touchless 3 d system ieee

Más contenido relacionado

La actualidad más candente

IJARCCE 22
IJARCCE 22IJARCCE 22
IJARCCE 22
Prasad K
 
11 App. Note 3D SEM5
11 App. Note 3D SEM511 App. Note 3D SEM5
11 App. Note 3D SEM5
Lloyd Peto
 
Machine vision systems ppt
Machine vision systems pptMachine vision systems ppt
Machine vision systems ppt
Akash Maurya
 

La actualidad más candente (20)

Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
Design of Gabor Filter for Noise Reduction in Betel Vine leaves Disease Segme...
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
Crack Detection of Wall Using MATLAB
Crack Detection of Wall Using MATLABCrack Detection of Wall Using MATLAB
Crack Detection of Wall Using MATLAB
 
IJARCCE 22
IJARCCE 22IJARCCE 22
IJARCCE 22
 
11 App. Note 3D SEM5
11 App. Note 3D SEM511 App. Note 3D SEM5
11 App. Note 3D SEM5
 
B42020710
B42020710B42020710
B42020710
 
IJRET-V1I1P2 -A Survey Paper On Single Image and Video Dehazing Methods
IJRET-V1I1P2 -A Survey Paper On Single Image and Video Dehazing MethodsIJRET-V1I1P2 -A Survey Paper On Single Image and Video Dehazing Methods
IJRET-V1I1P2 -A Survey Paper On Single Image and Video Dehazing Methods
 
Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...Haze removal for a single remote sensing image based on deformed haze imaging...
Haze removal for a single remote sensing image based on deformed haze imaging...
 
Implementation of multiple 3D scans for error calculation on object digital r...
Implementation of multiple 3D scans for error calculation on object digital r...Implementation of multiple 3D scans for error calculation on object digital r...
Implementation of multiple 3D scans for error calculation on object digital r...
 
EDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGEEDGE DETECTION OF MICROSCOPIC IMAGE
EDGE DETECTION OF MICROSCOPIC IMAGE
 
Machine vision systems ppt
Machine vision systems pptMachine vision systems ppt
Machine vision systems ppt
 
3d Machine Vision Systems Paper Presentation
3d  Machine Vision Systems Paper Presentation3d  Machine Vision Systems Paper Presentation
3d Machine Vision Systems Paper Presentation
 
Dp34707712
Dp34707712Dp34707712
Dp34707712
 
Pcb
PcbPcb
Pcb
 
Bhavya 2nd sem
Bhavya 2nd semBhavya 2nd sem
Bhavya 2nd sem
 
3D PRINTING - REVERSE ENGINEERING
3D PRINTING - REVERSE ENGINEERING 3D PRINTING - REVERSE ENGINEERING
3D PRINTING - REVERSE ENGINEERING
 
Edge detection by using lookup table
Edge detection by using lookup tableEdge detection by using lookup table
Edge detection by using lookup table
 
Introduction to Digital Image Correlation (DIC)
Introduction to Digital Image Correlation (DIC)Introduction to Digital Image Correlation (DIC)
Introduction to Digital Image Correlation (DIC)
 
Digital Image Inpainting: A Review
Digital Image Inpainting: A ReviewDigital Image Inpainting: A Review
Digital Image Inpainting: A Review
 

Destacado

Destacado (9)

Touchless fingerprint
Touchless fingerprintTouchless fingerprint
Touchless fingerprint
 
Touchless and less-constrained 3D fingerprint recognition
Touchless and less-constrained 3D fingerprint recognitionTouchless and less-constrained 3D fingerprint recognition
Touchless and less-constrained 3D fingerprint recognition
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
Cryptography in GSM
Cryptography in GSMCryptography in GSM
Cryptography in GSM
 
Fingerprint Recognition System
Fingerprint Recognition SystemFingerprint Recognition System
Fingerprint Recognition System
 
Touchless Fingerprint Recognition
Touchless Fingerprint RecognitionTouchless Fingerprint Recognition
Touchless Fingerprint Recognition
 
Gsm based home security system
Gsm based home security systemGsm based home security system
Gsm based home security system
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 

Similar a Unconstrained fingerprint recognition fully touchless 3 d system ieee

3d machine-vision-systems-paper-presentation
3d machine-vision-systems-paper-presentation3d machine-vision-systems-paper-presentation
3d machine-vision-systems-paper-presentation
Chidananda M
 
Computed Tomography (ct),CT scan NDT
Computed Tomography (ct),CT scan NDTComputed Tomography (ct),CT scan NDT
Computed Tomography (ct),CT scan NDT
harsh soni
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
IJRAT
 
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
theijes
 
POint data reduction
POint data reductionPOint data reduction
POint data reduction
mbhuiya6
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...
sipij
 

Similar a Unconstrained fingerprint recognition fully touchless 3 d system ieee (20)

Hand geometry recognition
Hand geometry recognitionHand geometry recognition
Hand geometry recognition
 
Seminar on evaluation of CNN using deep residual learning.pptx
Seminar on evaluation of CNN using deep residual learning.pptxSeminar on evaluation of CNN using deep residual learning.pptx
Seminar on evaluation of CNN using deep residual learning.pptx
 
IRJET- Real Time Implementation of Air Writing
IRJET- Real Time Implementation of  Air WritingIRJET- Real Time Implementation of  Air Writing
IRJET- Real Time Implementation of Air Writing
 
IRJET - Change Detection in Satellite Images using Convolutional Neural N...
IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...IRJET -  	  Change Detection in Satellite Images using Convolutional Neural N...
IRJET - Change Detection in Satellite Images using Convolutional Neural N...
 
3d machine-vision-systems-paper-presentation
3d machine-vision-systems-paper-presentation3d machine-vision-systems-paper-presentation
3d machine-vision-systems-paper-presentation
 
Surface generation from point cloud.pdf
Surface generation from point cloud.pdfSurface generation from point cloud.pdf
Surface generation from point cloud.pdf
 
Computed Tomography (ct),CT scan NDT
Computed Tomography (ct),CT scan NDTComputed Tomography (ct),CT scan NDT
Computed Tomography (ct),CT scan NDT
 
RAPID PRODUCT DEVELOPMENT seminar
RAPID PRODUCT DEVELOPMENT seminarRAPID PRODUCT DEVELOPMENT seminar
RAPID PRODUCT DEVELOPMENT seminar
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
PPT 7.4.2015
PPT 7.4.2015PPT 7.4.2015
PPT 7.4.2015
 
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
Smqt Based Fingerprint Enhancement And Encryption For Border Crossing Securit...
 
POint data reduction
POint data reductionPOint data reduction
POint data reduction
 
76832073-3d-Machine-Vision-Systems.doc
76832073-3d-Machine-Vision-Systems.doc76832073-3d-Machine-Vision-Systems.doc
76832073-3d-Machine-Vision-Systems.doc
 
Reverse engineering
Reverse engineeringReverse engineering
Reverse engineering
 
Measurement techniques in micro machining PDF by badebhau4@gmail.com
Measurement techniques in micro machining PDF by badebhau4@gmail.comMeasurement techniques in micro machining PDF by badebhau4@gmail.com
Measurement techniques in micro machining PDF by badebhau4@gmail.com
 
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLABIRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
IRJET - A Systematic Observation in Digital Image Forgery Detection using MATLAB
 
El4301832837
El4301832837El4301832837
El4301832837
 
Introduction
IntroductionIntroduction
Introduction
 
Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...Image processing based girth monitoring and recording system for rubber plant...
Image processing based girth monitoring and recording system for rubber plant...
 
Precision measurement technology and application based on machine vision
Precision measurement technology and application based on machine visionPrecision measurement technology and application based on machine vision
Precision measurement technology and application based on machine vision
 

Último

XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Último (20)

Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Unconstrained fingerprint recognition fully touchless 3 d system ieee

  • 1. Toward Unconstrained Fingerprint Recognition: a Fully Touchless 3-D System Based on Two Views on the Move By, Sinisha George S2 MTech CS
  • 2. OVERVIEW • Problem Statement • Introduction • Related works • Proposed method • Experimental Results • Conclusion • References 2
  • 3. PROBLEM STATEMENT • Require contact of the finger with any acquisition surface • Require constrained and highly cooperative acquisition methods. • Low usability, user acceptance and presence of distortions, less robust to dust and dirt , hygiene issues. 3
  • 4. INTRODUCTION • Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. • fully touchless fingerprint recognition system based on the computation of three-dimensional models. • Models from two view image captured during movement • less-constrained biometrics aim at using samples captured – Contactless, higher distance, Natural light conditions, On the move 4
  • 5. RELATED WORKS A) Two dimensional system 5 Structured light
  • 6. RELATED WORKS • Three dimensional system 6
  • 7. PROPOSED SYSTEM BIOMETRIC RECOGNITION PROCESS 1) Acquisition 2) Three-dimensional fingerprint reconstruction 3) Computation of touch-compatible images 4) Template computation 5) Matching 7
  • 10. CONTACTLESS ACQISITION(Cont.) Fig : Rotations of the finger with respect to the optical centre of Camera A. 10
  • 11. CONTACTLESS ACQISITION(Cont.) Examples of images in Dataset B captured with exaggerate finger orientations: (a) leftward yaw rotation; (b) counter clockwise roll rotation; (c)downward pitch rotation; (d) rightward yaw rotation; (e) clockwise roll rotation; (f) upward pitch rotation. 11
  • 12. 2. THREE-DIMENSIONAL FINGERPRINT RECONSTRUCTION 1) Image pre-processing; 2) Segmentation; 3) Extraction and matching of the reference points; 4) Refinement of the pairs of corresponding points; 5) Three-dimensional surface computation and image wrapping. 12
  • 13. 2.1 IMAGE PREPROCESSING • Details of the ridge pattern are Particularly visible in the green channel of the RGB color Space of the captured images 13
  • 15. 2.3 EXTRACTION AND MATCHING OF THE REFERENCE POINTS 15
  • 16. 2.3 EXTRACTION AND MATCHING OF THE REFERENCE POINTS(CONT.) 16
  • 17. 2.4 REFINEMENT OF THE PAIRS OF CORRESPONDING POINTS • To obtain smooth and accurate representation of the finger surface • Applying thin plate spline to the set of corresponding points. 17
  • 18. 2.5 THREE-DIMENSIONAL SURFACE COMPUTATION AND IMAGE WRAPPING. • Creates a three-dimensional model MA as the depth map corresponding to the view of Camera A. • Triangulation • Linear interpolation – Mp, Mz Fig: dense three-dimensional model with a superimposed texture image obtained by the proposed method 18
  • 19. 3. COMPUTATION OF TOUCH-COMPATIBLE IMAGES • Enhancement o background subtraction o Nonlinear equalization(logarithm) o Butterworth low-pass filter • Two dimensional mapping – Enrolment oCompensate for rotations oComputation of NR rotations 19
  • 20. 3. COMPUTATION OF TOUCH-COMPATIBLE IMAGES(cont.) 20
  • 21. 4.TEMPLATE COMPUTATION • Neurotechnology veriFinger – Commercial feature extractor – Compute template T – Properly identifies the coordinates – Designed for touch-based images. Fig: a binary image and minutia coordinates obtained using the proposed system and the software Verifinger 21
  • 22. 5. MATCHING • In the verification phase computes a single minutiae template Tf . • Matching score represents the similarity of the fresh template with a multi-template. • Te score is computed as, • Match(.) – matching function ,performed using nuerotechnology verifinger software 22
  • 23. EXPERIMENTAL RESULTS a) Data sets description b) Accuracy of 3D reconstruction c) Recognition performance d) User acceptability e) Interoperability 23
  • 25. A) DATA SETS DESCRIPTION  Touchless - one session. 2368 samples. 10 fingers, 30 volunteers, 8 acquisitions per finger.  Touchless - two sessions 2368 samples 10 fingers, 15 volunteers, 16 acquisitions per finger. - 8acquisitions one year, 8 acquisition subsequent year .  Touchless - misplaced fingers 1200 samples 2 fingers (index), 30 volunteers, 20 acquisitions per finger  Touch-based One session Two sessions 25
  • 26. B) ACCURACY OF 3D RECONSTRUCTION • point clouds describing the three-dimensional shape of the finger and the corresponding dense three-dimensional models with superimposed texture images • Average error 0.03mm 26
  • 27. C) RECOGNITION PERFORMANCE • ROC curves representing the accuracy of the proposed touchless system under standard operating conditions (Dataset). •The results represent different numbers of three-dimensional rotations NR performed during the enrolment step. • Every test included 5, 605, 056 identity comparisons. •The configuration that yielded the best accuracy was NR = 9, with EER = 0.03%. Table: Accuracy of the proposed biometric system using samples acquired under standard operating conditions (dataset A).27
  • 28. D) USER ACCEPTABILITY • Survey performed using questionnaires. • Results show preference towards contactless recognition. 28
  • 29. G) OVERVIEW OF THE DIFFERENT TECHNOLOGIES 29 Aspect Touch -based Touchless accuracy EER=0.06% EER=0.03% Usability medium High User acceptance Medium High Privacy Data protection techniques Data protection techniques Speed Template extraction + matching 3D reconstruction + template extraction + matching Cost 10$ to 5000$ 10$ to 5000$
  • 30. CONCLUSIONS – Systems based on two-dimensional samples can be used in low-cost applications, but the samples present distortions. – Systems based on three-dimensional samples can obtain comparable accuracy with respect to traditional systems – Touchless systems are characterized by higher usability, user acceptance, less constrained. – Robust to uncontrolled environmental illumination. – Tolerate wide range of finger orientations. 30
  • 31. REFERENCES [[1] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed. Springer Publishing Company, Incorporated, 2009. [2] R. Donida Labati and F. Scotti, “Fingerprint,” in Encyclopedia of Cryptography and Security (2nd ed.), H. van Tilborg and S. Jajodia, Eds. Springer, 2011, pp. 460 – 465. [3] R. Donida Labati, V. Piuri, and F. Scotti, Touchless Fingerprint Biometrics, ser. Series in Security, Privacy and Trust. CRC Press, 2015. [4] G. Parziale, “Touchless fingerprinting technology,” in Advances in Biometrics, N. K. Ratha and V. Govindaraju, Eds. Springer London, 2008, pp. 25–48. 31
  • 33. 33
  • 34.
  • 36. 36
  • 38.
  • 39.
  • 40.
  • 41.
  • 43.

Notas del editor

  1. 1. Two diamenional systems ::::: Doesn’t compnaste for rotations Presence of distortions Less robust to dust and dirt Less user acceptance hYgine issues Fingerprint recognition or fingerprintauthentication refers to the automated method of verifying a match between two humanfingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) [note 1] is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillanc
  2. Oon movement-so less user coorpration is needed System is less constrained tan 3d systems Fingerprint recognition or fingerprintauthentication refers to the automated method of verifying a match between two humanfingerprints. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) [note 1] is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillanc
  3. This also Touc base system but uses multiple cameras therefor 3d 5 cameras and set lED ligts
  4. The proposed method computes a three-dimensional model of the finger with a superimposed texture representing the ridge pattern. The method uses a correlation-based technique that is more computationally efficient and accurate
  5. Fig. 5. Example of a fingerprint image before and after the preprocessing step: (a) input image I; (b) ridge pattern image P, computed as the green channel of I. Because a green light is used to illuminate the finger. Consequently, we consider the channel G of the captured image I (Fig. 5 a) as the matrix representing the ridge pattern P
  6. 2 task rough estimation of te finger sape Finger nail removal compensation of yaw angle search of finger rermination skin region segmentation
  7. Fig. 9 presents examples of point clouds obtained with and without the refinement step.
  8. f is the focal length of the two cameras, T is the baseline distance between the two cameras, xA and xB are the two matched points.
  9. Fig. 16. Examples of point clouds describing the three-dimensional shape of the finger and the corresponding dense three-dimensional models with superimposed texture images: (a, c, e) point clouds; (b, d, f) dense three-dimensional models. The experiments demonstrated that the proposed method can obtain accurate three-dimensional reconstructions for all 10 fingers.
  10. The EER is the best single description of the Error Rate of an algorithm and as lower be the EER the lower error rate of the algorithm- EQUAL ERROR RATE False match rate (FMR, also called FAR = False Accept Rate): the probability that the system incorrectly matches the input pattern to a non-matching template in the database  It measures the percent of invalid inputs that are incorrectly accepted