版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、fingerprint recognition systemabstractfingerprint recognition system consist of image preprocessing, features extraction and features matching that runs effectively and accurately on personal computer. the image preprocessing includes noise removal, histogram equalization, global thresholding and ri
2、dgeline thinning which are necessary for the features extraction. extracted features are then stored in a file for fingerprint matching. matching algorithm presented here is a simple, fast and accurate. experimental results for matching are accurate, reliable and fast for implementation using a pers
3、onal computer and fingerprint reader. the proposed fingerprint algorithm can provide an effective way of automated identification and can be extended to other security or identification applications. further the algorithm can be implanted on a fpga platform for a real time personal automated identif
4、ication system.keywords:biometric recognition;histogram equalization;ridge thinning;ridge ending;ridge bifurcation.1. introductionfingerprint recognition systems are termed under the umbrella of biometrics. biometric recognition refers to the distinctive physiological (e.g. fingerprint, face, iris,
5、retina) and behavioral(e.g. signature, gait) characteristics, called biometric identifiers or simply biometrics, for automatically recognizing individuals. in 1893, it was discovered that no two individuals have same fingerprints. after this discovery fingerprints were used in criminal identificatio
6、n and till now fingerprints are extensively used in various identification applications in various fields of life. fingerprints are graphical flow-like ridges present on human fingers. they are fully formed at about seventh month of fetus development and fingerprint configuration do not change throu
7、ghoutthe life except due to accidents such as bruises or cut on fingertips.because of immutability and uniqueness, the use of fingerprints for identification has always been of great interest to pattern recognition researchers and law enforcement agencies. conventionally, fingerprint recognition has
8、 been conducted via either statistical or syntactic approaches. in statistical approach a fingerprints features are extracted and stored in an n-dimensional feature vector and decision making process is determined by some similarity measures. in syntactic approach, a pattern is represented as a stri
9、ng, tree 1, or graph 2 of fingerprint features or pattern primitives and their relations. the decision making process is then simply a syntax analysis or parsing process.this paper suggests the statistical approach. experimental results prove the effectiveness of this method on a computer platform,
10、hence making it suitable for security applications with a relatively small database. the preprocessing of fingerprints is carried out using modified basic filtering methods which are substantially good enough for the purpose of our applications with reasonable computational time. block diagram for t
11、he complete process is shown in figure.1.2. image preprocessingfor the proper and true extraction of minutiae, image quality is improved and image preprocessing is necessary for the features extraction because we cannot extract the required points from the original image. first of all, any sort of n
12、oise present in the image is removed. order statistics filters are used to remove the type of noise which occurs normally at image acquisition. afterwards the following image preprocessing techniques are applied to enhance the fingerprint images for matching.2.1 histogram equalizationthis method is
13、used where the unwanted part of the image is made lighter in intensity so as toemphasize the desired the desired part. figure 2(a) shows the original image and figure 2(b) histogram equalization in which the discontinuities in the small areas are removed. for the histogram equalization, let the inpu
14、t and the output level for an arbitrary pixel be i and l, respectively. then the accumulation of histogram from 0 to i ( 0 i 255,0 k 255) is given bywhere h(k) is the number of pixel with gray level k, i.e. histogram of an area, and c(i) is alsoknown as cumulative frequency. 2.2 dynamic thresholding
15、basic purpose of thresholding is to extract the required object form the background. thresholding is simply the mapping of all data points having gray level more that average gray level. the results of thresholding are shown in figure 3.2.3 ridgeline thinningbefore the features can be extracted, the
16、 fingerprints have to be thinned or skeletonised so that all ridges are one pixel thick. when a pixel is decided as a boundary pixel, it is deleted directly form the image 3-5 or flagged and not deleted until the entire image been scanned 6-7. there are deficiencies in both cases. in the former, del
17、etion of each boundary pixel will change the object in the image and hence affect the object symmetrically. to overcome this problem, some thinning algorithms use several passes in one thinning iteration. each pass is an operation to remove boundary pixels from a given direction. pavlidis 8 and fieg
18、in and ben-yosef 9 have developed effective algorithms using this method. however, both the time complexity and memory requirement will increase. in the latter, as the pixels are only flagged, the state of the bitmap at the end of the last iteration will used when deciding which pixel to delete. how
19、ever, if this flag map is not used to decide whether a current pixel is to be deleted, the information generated from processing the previous pixels in current iteration will be lost. in certain situations the final skeleton may be badly distorted. for example, a line with two pixels may be complete
20、ly deleted. recently, zhou, quek and ng 10 have proposed an algorithm that solves the problem described earlier and is found to perform satisfactorily while providing a reasonable computational time. the thinning effect is illustrated in figure 43. features extractionthe two basic features extracted
21、 from the image are ridge endings and ridge bifurcation. forfingerprint images used in automated identification, ridge endings and bifurcation are referred to as minutiae. to determine the location of these features in the fingerprint image, a 3x3 window mask is used (figure 5). m is the detected po
22、int and x1 x8 are its neighboring points in a clockwise direction. if xn is a black pixel, then its response r (n) will be 1 or otherwise it will be 0. if m is an ending, the response of the matrix will bewhere r(9)=r(1). for m to be a bifurcation,for example, if a bifurcation is encountered during
23、extraction, mask will contain the pixelinformation such as r(1) = r(3)= r(4) = r(6) = r(7) = 0, r(2) = r(5) = r(8) = r(9) = 1, andfor all the minutiae detected in the interpolated thinned image, the coordinates and their minutiae type is save as feature file. at the end of feature extraction, a feat
24、ure record of the fingerprint is formed.4. matchingfingerprint matching is the central part of this paper. the proposed technique is based on structural model of fingerprints 11. one of the major breakthroughs of this method is its ability to mach fingerprints that are shifted, rotated and stretched
25、. this is achieved by a different matching approach. as it is clear that this algorithm matches the two fingerprint images captured at different time. this matching is based on the minutiae identification and minutiae type matching. matching procedure is complex due to two main reasons;1) the minuti
26、ae of the fingerprint captured may have different coordinates2) the shape of the fingerprint captured at different time may be different due to stretching.an automated fingerprint identification system that is robust must have following criteria:1) size of features file must be small2) algorithm mus
27、t be fast and robust3) algorithm must be rotationally invariant4) algorithm must be relatively stretch invariantto achieve these criteria, the structural matching method described by hrechak and mchugh 11 is adopted as the basis of our recognition algorithm, with changes made to the algorithm, to pr
28、ovide more reliable and improving overall matching speed. this matching represents the local identification approach, in which local identified features, their type and orientation is saved in features file, is correlated with the other images extracted features file. the model is shown in figure 6.
29、for each extracted features on the fingerprint, a neighborhood of some specified radius r about the central feature is defined and then euclidean distance and relative angles between the central point and the other point is noted with the points type. since the distance among the pointremains the sa
30、me throughout the life. so this technique works well for the rotated and shifted images.5. conclusiona fingerprint recognition algorithm that is fast, accurate and reliable has been successfully implemented. this algorithm can be modified, introducing the ridgeline count, and then could beused in on
31、line and real time automated identification and recognition system.references1 moayer, b., and fu, k.s.: a tree system approach for fingerprint pattern recognition, ieee trans., 1986,pamt-8, (3), pp. 376-3872 isenor, d.k., and zaky, s.g.: fingerprint identification using graph matching, pattern reco
32、gnit., 1986,19, (2) pp. 113-1223 tamura, h.: a comparison of line thinning algorithms from digital geometry viewpoint. proceedings of fourth international joint conference on pattern recognition, kyoto, nov. 1978, pp. 715-7194 hilditch, c.j.: linear skeleton from square cupboards, machine intel., 19
33、69, 4, pp.403-4205 naccache, n.j., and shinchal, r.: an investigation into the skeletonization approach of hilditch,pattern recognit., 1984, 17, (3), pp. 279-2846 jang, b.k., and chin, p.t.: analysis of thinning algorithms using mathematical morphology, ieee trans.,pattern anal. machine intel., 1990
34、, 12, (6), pp. 541-5517 xu, w., and wang, c.: cgt: a fast thinning algorithm implemented on sequential computer, ieee trans.,1987, smc-17, (5), pp. 847-8518 pavlidis, t.: algorithm for graphical and image processing, comput. graph. image process., 1982, 20,pp133-1579 feigin, g., and ben yosef, n.: l
35、ine thinning algorithm, proc. spie int. soc. opt. eng., 1984, 397, pp.108-11210zhou, r.w., quek, c., and ng, g.s.: novel single-pass thinning algorithm, pattern recognit. lett., 1995,16, (12), pp.1267-127511hrechak, a.k., and mchugh, j.a.: automated fingerprint recognition using structural matching,
36、pattern recognit., 1990, 23, (8), pp. 893-90412gounzalez, r.c., and wood, r.e.: digital image processing (pearson education, 2002) 指纹识别系统摘要指纹识别系统包括图像预处理、特征提取和在个人计算机上进行有效、准确地匹配的功能。图像预处理包括去除噪声、直方图均衡、全局阈值和脊线细化这些必要的特征提取。提取的特征,然后存储在指纹匹配的文件里。这里提出的匹配算法是一种简单、快速、准确的算法。匹配实验结果准确、可靠、快速,使用一台个人电脑和指纹识别器实施。提出的指纹算法可
37、以提供一个有效的自动识别方式,并可以扩展到其他安全或者识别应用。该算法可以进一步植入一个fpga平台上的个人实时自动识别系统。关键词:生物特征识别;直方图均衡化;山脊细化;脊的结局;脊分岔1、引言指纹识别系统被称为处在生物识别技术的保护伞下。生物识别是指独特的生理(如指纹、人脸、虹膜、视网膜)和行为(如签名、步态)特点,被称为生物识别或简单的生物识别技术,自动识别的个人。在1893年,它被发现,任何两个人都不会有相同的指纹。在这个发现之后指纹被应用在刑事鉴定中,直到现在指纹被广泛应用于各种智能识别应用在生活的各个领域。指纹是人类手指上的图形流的山脊。他们在胎儿发育和指纹配置的大约七个月就完全形
38、成,整个生命中都不会改变,除非由于事故,如瘀伤或指伤。由于不变性和唯一性,指纹识别应用一直是模式识别研究人员和执法机构的极大兴趣。传统上,指纹识别已经通过任何统计或句法的方法进行。统计方法的指纹特征是提取并存储在一个n维的特征向量和决策过程中由一些相似的措施决定。在句法方法,一个模式表示为一个字符串,树1,或图2的指纹特征或模式基元及其相互关系。然后决策过程就是简单地句法分析或解析过程。本文提出的统计方法。计算机平台上的实验结果证明该方法的有效性,因此适合安全应用于一个相对娇较小的数据库。指纹的预处理进行了修改基本的过滤方法,足够合理的计算时间与我们的应用程序的目的。完整的过程方框图在图1中表
39、示图像捕捉图像预处理特征提取匹配存储特征点图1 框图2、图像预处理为正确和真实的细节提取,图像质量得到改善,图像预处理,特征提取是必要的,因为我们不能从原始图像中提取所需的点。首先,任何类型的图像中的噪声目前被删除。顺序统计滤波器用于消除噪声的类型,通常发生在图像采集之后,下面的图像预处理技术应用于提高匹配的指纹图像。2、1 直方图均衡化使用这种方法使图像不必要的部分强度轻,以便强调需要所需的部分。图2(a)显示原始图像和图2(b)显示直方图均衡化的图像,其中不连续的小区域被删除。直方图均衡化,让任意像素的输入和输出电平分别是i和i。然后从0到i(0 i 255,0 k 255)直方图的累积由
40、 (1) 求得其中h(k)为k层灰色的像素数,即一个区域的直方图,c(i)也被成为累积概率。 图2(a) 原始图像 图2(b) 直方图均衡的图像2、2 动态阈值阈值的基本目的是提出所需的对象窗体背景。阈值仅仅是灰色的水平,平均灰度水平的所有数据点的映射。阈值的结果如图3所示。图3 动态阈值结果2、3 山脊细化在特征可以被提取之前,指纹必须变薄或镂空,所以,所有的山脊是一个像素厚。当一个像素作为一个边界像素决定,它直接删除图像3-5或标记,但不会删除,直到整个图像被扫描6-7。在这两种情况下是有缺陷的。在前者,每个边界像素的缺失会改变图像中的对象,因而影响对称对象。为了克服这个问题,一些细化算法
41、使用几个通行证在一个细化迭代里。每通是一个操作删除从一个给定方向的边界像素。pavlidis 8 and fiegin and ben-yosef 9已经使用这种方法制定了有效的算法。然而,无论是时间复杂度和内存需求将会增加。在后者,像素只有标记,在最后一次迭代结束时的位图的状态将决定删除哪一个像素时使用。但是,如果不使用这个标志图来决定是否要删除当前图像,从以前的像素在当前迭代处理产生的信息将丢失。在某些情况下,最终的骨架可能会被严重扭曲。例如,有两个像素的线,可以完全删除。最近,zhou, quek and ng 10提出了一种算法,解决了前面所述的问题,并且圆满的执行,同时提供了一个合理
42、的计算时间。细化效果如图4所示 a b 图4 山脊细化a 细化前 b细化后3、特征提取从图像中提取的两个基本特征是脊末梢和脊分岔。对于自动识别所使用的指纹图像,神经末梢和分岔被称为脊的特征点。为了确定这些特征点在指纹图像的位置,使用了一个3x3的矩阵窗口(图 5)。m是监测点,x1 x8是在顺时针方向的临近点。如果xn是一个黑色像素,那么与r (n)对应的就是1,否则就是0。如果m是一个结尾,矩阵响应为 (2)其中r(9)=r(1)。m是一个分支, (3)例如,如果在提取的过程中遇到了一个分支,掩码将包含的像素信息如r(1) = r(3)= r(4) = r(6) = r(7) = 0, r(
43、2) = r(5) = r(8) = r(9) = 1,结果 插值细化图像中检测到的所有细节,坐标和他们的特征点类型被保存为特征文件。在特征提取的最后,指纹特征记录正在形成。x1x2x3x8mx4x7x6x5 图5 3 x 3掩膜特征提取4、匹配指纹匹配时本文的核心内容。提出的技术是基于指纹的结构模型11。这种方法的重大突破之一是它对于移动、旋转和伸展的指纹相匹配的能力。这是通过不同的匹配方法实现的。因为它是清晰的,该算法匹配两个在不同时间捕获的指纹图像。这种匹配是在特征点识别和特征点类型匹配的基础上的。匹配程序是复杂的,由于两个主要原因:1) 捕获指纹的特征点可能有不同坐标2) 在不同的时间
44、捕获的指纹形状由于伸展可能会不同强大的指纹自动识别系统必须具备下列条件:1) 特征文件的尺寸一定要小2) 算法必须快速和强大3) 算法必须是旋转不变的4) 算法必须相对伸展不变为了达到这些条件,由hrechak 和mchugh 11描述的结构匹配方法采用我们书别算法的基础上,通过算法所做的更改,以提供更可靠,提高整体匹配速度。此匹配代表局部的识别方法,它们的类型和方位这些局部标识的特征保存在特征文件,与其他图像的特征文件有关。模型如图6所示。 图6 局部特征的结构模型对于每个提取的指纹特征,临近的一些特定的半径为r的重要特征被定义,然后通过点的类型指出中央点和其他点之间的欧几里得距离和相对角度。由于点之间的距离在整个生命期间保持不变。因此这项技术可以很好的用于转移和旋转的图像。5、结论一个快速、准确和可靠的指纹识别算法已经成功实施。该算法可以修改,引入山脊计数,然后可以应用于网上实时自动识别和识别系统。参考文献1 moayer, b., and fu, k.s.: a tree system approach for fingerprint pattern
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- (新教材)2026人教版三年级下册数学 2.2.2 三位数除以一位数的笔算 教学课件
- 2025 网络基础之人工智能与网络流量预测课件
- 统编版语文三年级下册第一单元 质量评价卷(含答案)
- 年产7万件制冷设备齿轮生产项目可行性研究报告
- 2026年及未来5年市场数据中国民营银行行业市场发展现状及投资前景展望报告
- 信息系统管理的制度和规范
- 2026年及未来5年市场数据中国手机银行行业市场调查研究及投资潜力预测报告
- 三排柱式回转支承深度解析
- 2025 高中信息技术数据与计算之算法的布谷鸟搜索算法课件
- 费尔巴哈与古典哲学终结论
- 智能化系统施工方案
- 电磁屏蔽防护装置采购合同
- (一模)扬州市2026届高三模拟调研测试数学试卷(含答案详解)
- 医疗卫生信息数据安全与隐私保护规范(标准版)
- 2026年合肥职业技术学院单招职业适应性测试题库含答案详解(基础题)
- 2026年装饰装修劳务分包合同(1篇)
- 2026年人教版初二英语语法知识点归纳总结
- 2026福建水投集团沙县水务有限公司招聘4人笔试参考题库及答案解析
- 2026年春节后工地复工复产专项施工方案二
- 2025-2026学年北京市东城区九年级(上)期末英语试卷
- 2026年企业开年电气安全操作培训
评论
0/150
提交评论