SlideShare a Scribd company logo
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
DOI: 10.5121/ijcsity.2018.6301 1
PREPROCESSING ALGORITHM FOR DIGITAL
FINGERPRINT IMAGE RECOGNITION
Farah Dhib Tatar1
and Mohsen Machhout2
1
Department of Electrical Engineering
National school of the studies of engineer of Tunis, Tunis, Tunisia
2
Faculty of Sciences of Monastir, Monastir, Tunisia
ABSTRACT
Biometrics is one of the most used technologies in the field of security due to its reliability and
performance. It is based on several physical human characteristics but the most used technology is the
fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in
each fingerprint we propose in this article an image preprocessing procedure in order to improve its
quality before extracting the necessary information for the comparison phase.
KEYWORDS
Fingerprint Recognition Algorithm; Image processing; Image sensor; Image filtering
1. INTRODUCTION
The reliable identification of people is becoming more and more necessary to solve problems of
access and identity theft [1].
Access control is a requirement especially to sensitive places that require a high level of
confidentiality. The identification keys are of three main types: keys based on the knowledge of
passwords or encrypted codes, others based on the possession of access cards badges, keys, etc.,
or we can identify us based on the physical characteristics of person: these are biometric
identification techniques
Unlike the first two methods that can pose serious falsification problems, biometric identification
techniques are directly related to people's physical characters and therefore can not be copied or
desired.
The goals of a biometric security system can be multiple. A security system can, for example, use
the tools that biometrics makes available to manage the security of logical access of a system.
This is probably the most common use of biometrics. But it can also be used to secure the
physical access of a room containing sensitive data, from any place on which we choose to install
a biometric lock*.
------
*: http://www.agent-de-securite.be/biometrie/securite_biometrique.html
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
2
The biometric identification techniques are various: we can analyze the shape of the hand [2], the
design of the iris [3], the voice, the vascularization of the retina and the shape of the face. [4]
Likewise, the dynamic recognition of the signature [5], analyzed in real time (speed, pressure on
the pen, etc).
Given its low cost, ease of operation and reliability of fingerprint recognition results, this
technology occupies more than two-thirds of the biometric market.
Fingerprint recognition algorithms are diverse and are based on different techniques in order to
extract useful information from the input image. Obviously, the clearer and better the image, the
more reliable and fast the system is. An image sensor is composed of many photosites, each
corresponding to a picture element, it is the "pixel".Each pixel of an image sensor records the
amount of light to which it is exposed and converts it into a corresponding number of electrons.
The stronger the light, the higher the number of electrons generated.
Sensors embedded in fingerprint recognition systems are diverse and based on several
technologies, noting for example:
CCD sensors: they have been used in cameras for over 30 years and have many
advantages. In general, they still offer a slightly higher sensitivity to light than CMOS
sensors and produce a little less noise. However, they are more expensive and more
difficult to integrate into a camera.
CMOS sensors: they reduce the overall price of cameras, as they contain all the elements
necessary for the composition of cameras. They offer more integration possibilities and
more functions than CCD sensors. They also offer shorter measurement times, lower
power dissipation at the chip, and reduced footprint.
Megapixel sensors (sensors containing one million pixels or more): They are integrated
with megapixel cameras and are of a size equal to or only slightly larger than VGA sensors
that provide a resolution of 640x480 (307,200) pixels. This means that the size of each
pixel on a megapixel sensor is smaller than that on a VGA sensor. Therefore, although the
megapixel camera provides higher resolution and more detail, it is less sensitive to light
than its VGA counterpart since the pixel size is smaller and the light reflected from an
object is spread over more pixels.
Whatever the technology used, the purpose of a fingerprint recognition system is to have reliable
authentication and fast error rate as small as possible. For this purpose, we present in this paper a
preprocessing procedure of the captured image in order to increase its quality before proceeding
to the extraction step of useful information and consequently increase the overall performance of
the system by minimizing the total processing time as well as the rate of erroneous results.
2. PREPROCESSING PROCEDURE FOR DIGITAL FINGERPRINT
RECOGNITION
Digital fingerprint recognition is the most widely used biometric technique because of its ease of
use and demonstration. The chains of recognition by digital processes are based on image
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
3
processing techniques making it possible to extract the useful information of each image
(fingerprint) in order to be able to identify it and consequently compared it to other fingerprints.
Our fingerprints are unique, at least on certain points: these are called minutiae, that is to say, the
lines, the bifurcations, the "islets", the points, the ending of the peaks. The design formed by
these lines on our fingers never evolves. Depending on the level of security desired, it is
estimated that between 10 and 20 points of correspondence are required to certify a fingerprint.
A. Description of the fingerprint
A fingerprint consists of a set of locally parallel lines forming a single pattern for each individual
(Figure 1), there are streaks (or ridges, these are the lines in contact with a surface to the touch)
and the grooves (this are the hollows between two streaks). **
Fig. 1. Fingerprint characteristic
Each imprint has a set of global (centers and deltas) and local (minutiae) singular points (Figure
2).
Fig. 2. Local and Global singular points in a fingerprint
The centers correspond to places of convergence of the striations while the deltas correspond to
places of divergence.
Fingerprint recognition algorithms use several filtering methods in order to locate the useful
points for each fingerprint. The most used filter is that of Gabor given its proven performance in
this type of treatment.
------
**http://www.orcanthus.com/main/product/product.php?idpr=4
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
4
However, in order to have reliable results, the input image of the filter must be as clear as
possible, for this reason we propose a series of mathematical and morphological operations to
improve the appearance of the image before pass to the filtering step.
When capturing a fingerprint image, several factors affect image quality such as:
Scars in the finger, age of the person.
Parasitic substances (water, grease, dirt, etc.)
Capture environment: temperature (dilation, compression), humidity
These various factors greatly affect the quality of the input image of the system and consequently
increase the error rate and reduce the overall performance of the application; We must therefore
perform a specific treatment in order to reduce the parasitic effects and improve the image quality
used. The different pretreatment phases are presented in Figure 3.
Fig. 3. Preprocessing steps
B. Grayscale transformation
A fingerprint sensor in general returns a color image. For this algorithm, there is no need for color
schemes for processing. We must therefore make a transformation into grayscale. This
transformation allows us to reduce the space used for recording data included in the image; in
fact, the color pixels require 24 bits to be able to represent the different levels of colors, on the
other hand in grayscale we only need 8 bits for each pixel since we have only 256 gray levels. this
operation is performed according to the following formula (1):
I=(R+G+B)/3 (1)
Where I is the value of the pixel in gray and R, G and B are the values of the color components.
C. Image normalization
The normalization operation makes it possible to increase the contrasts in the image by making a
certain adjustment to the gray levels represented in each pixel without affecting the useful
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
5
information included in the fingerprint image.This operation is done locally on each block
according to the following steps:
Calculation of the average:
=	
	×
∑ ∑ , (2)
I (i, j) is the value of the pixel (i, j) and M is the value of the average of the image while m and n
are the dimensions of the image.
Calculation of variance:
= ×
∑ ∑ , − (3)
V is the variance of the image.
Calculation of the standardized gray level value of the pixel (i, j) [6]:
, =
+
× ,
			 	 , > 	
−
× ,
			 	 , <
!																																									(4)
M0 and V0 are the desired values for mean and variance, respectively. We chose _0=100 and
V0=100.
Normalization does not change the structure of the image, but it is used to standardize the variation
of gray levels.
D. Segmentation
This operation aims to minimize the noise present in the image as well as to center the useful
information that will be used in the comparison phase of the different signatures, so we eliminate
the noisy areas as well as the useless edges of the image because they can lead us to make false
comparisons.
The results of this step is a binary image of the same size as the original image and called "Mask",
the block corresponding to the bottom of the image will be filled with 0 in the mask, and the rest
will be filled by 1.This is not all to satisfactorily because many blocks containing no useful
information persist.
To avoid this we decided to eliminate the blocks belonging to the bottom of the image according to
their average value. The local average value of each block Ml is calculated and compared to a
threshold T:
If " < #		then we consider that the block contains no useful information and it is
eliminated.
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
6
If " > #		then the block contains part of the fingerprint and is retained.
The threshold T has been chosen according to the average value M& of the overall image such that
=
'(
)
.
The mask then undergoes two treatments:
Any non-noisy block with at least 3 adjacent blocks defined as noisy is eliminated (this
corresponds to a strongly noisy area or the edge of the fingerprint.
The set of blocks at the edge of the image is deleted.
An example of segmentation is shown in Figure 4 [7].
Fig. 4. Effect of segmentation on the image
E. Spatial estimate of the directional map
To obtain the directional map, we goes through two stages: the estimation of the orientation and
the smoothing of the directional map.
1) Estimation of the orientation:
The directional map present the orientation of each streak contained in the fingerprint.Orientation
estimation is a fundamental step in Gabor's image-based image enhancement process. (Figure 5).
Fig. 5. Local orientation of a pixel
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
7
We present here the optimized calculation of the directional map of the fingerprint [7]. This
measurement must be reliable because, in the case of directional filtering, a poor evaluation of the
direction would cause a degradation of the image. We use here the method based on the least
square approximation ([8], [9]) which is very effective in the case of very noisy images.
To calculate the direction associated with a pixel x, y of the image, we consider its neighborhood
V of size W x W pixels. We calculate the gradients, *+ , in x and *, , in y for each pixel i,
j of neighborhood V. For the calculation of the gradient, the use of Sobel masks proved to be the
most efficient in the case of our images. Thus the local direction in neighborhood V is estimated
by the following relation (the proof of this formula is detailed in the article of M. Bazen and H.
Gerez [10].
- +, , = ./0 1
∑ ∑ . *+ , . *, ,
3
3
∑ ∑ 4*+ , − *, , 5
3
3
6
3 78	*+ = +, , × 9
−
−
−
:
; <	*, = +, , × 9
− − −
:																																																			(5)
It is thus possible to calculate the local direction at each pixel of the image but this is very
expensive in computation time, so it is much more efficient to divide the image into adjacent
blocks and evaluate the local mean direction to the block leaves to interpolate the direction for
each pixel.
2) Refinement of the directional map
In the case where the input image is too noisy we can have false results when detecting the local
directions of the pixels. Thus we can note the presence of vertical lines at the directional map
levels that have no direction.
An example of the presence of vertical lines is illustrated in the figure (6) presenting the case of
estimation of the directional map with an “Arch” type fingerprint.
Fig. 6. Influence of vertical lines
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
8
This then causes a very large angular variation between two adjacent blocks. However, a
fingerprint has some directional continuity, such a variation between two adjacent blocks is then
representative of a poor estimate. To eliminate such discontinuities, a low-pass filter is applied to
the directional map. Applying a low-pass filter requires that the orientation of the image be
converted into a continuous vector field. This vector field has as components x and y respectively
defined by:
=+ , =	>?@ . - , 					; <									=, , = @A0 . - , (6)
With the two components of the vector obtained, one can apply the Gaussian low pass filter of size
W_θ × W_θ defined by:
=+
B
, =	 C C * D, E . =+ − E. 3, − E. 3
3-
E
3-
3-
D
3-
=,
B
, =	∑ ∑ * D, E . =, − E. 3, − E. 3
3-
E
F3-
3-
D
F3-
																										(7)
Where G is the Gaussian low pass filter and w is the block size.
Finally, the local orientation smoothed at the pixel (i,j)is given by:
G , =	 ./0
=,
H ,
=+
H ,
																																																															(8)
The Figure (7) shows the example of the estimation of the directional map for different types of
fingerprint.
Fig. 7. Estimation of the directional map for different types of fingerprint
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
9
A Spatial estimate of the frequency map
The frequency map of the image consists in estimating the local frequency of the striations in each
pixel.
1) Frequencyof each block
The frequency mapis an image of the same size as that of the fingerprint and represents the local
frequency of the streaks. The first thing to do is to divide the image into sub-blocks of size
W	 × W. Then, we have to project each pixel in the block orthogonal to its direction (that is to say
in the direction 4
J
)
− θ5 ), we obtain a vector V presenting a set of extrema (figure 8) [10].
Fig. 8. Extrema obtained after projection
2) Spatial estimation of frequency
In the extrema vector obtained, the maxima represent the centers of the striations and the minima
correspond to the centers of the valleys. The inter-striated local period is then estimated by
calculating the average distance between two consecutive maxima S (i,j):
L , =	
M ,
(9)
The maxima M_i and the minima m_i are determined by detecting the zero crossing of the
derivative of the vector V, which makes it possible to obtain the sequence
{M_1,m_1,……..,M_k,m_k,M_(k+1) }. If the difference between a maximum M_i and a
minimum m_i is less than a threshold T then we consider that M_i corresponds to a noise and it is
eliminated.
If the resultant vector contains at least two maxima then the inter-strikethrough period is calculated
by averaging the distances between two consecutive maxima, otherwise the period takes the value
of zero. When the estimated period is zero this means that the block contains no streaks
(background image) or that it is too noisy to reliably estimate the local frequency.
3. RESULTS AND DISCUSSION
We used Matlab to validate all this steps; the results are shown in the following pictures:
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
10
A. Applying the mask on the image:
Fig. 9. Mask of the image
This step allows us to eliminate the edges of the image as well as the very noisy areas.
B. Extraction of the directional map
Fig. 10. Directional map of the fingerprint
The directional map defines the local orientation of streaks contained in the fingerprint.
C. Extraction of the frequency card
Fig. 11. Frequency map of the fingerprint
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
11
The frequency map estimates the local frequency of the streaks in each pixel.
In order to highlight the importance of image preprocessing we have considered a database based
on a hundred images captured by different types of sensors, in the first place we tried to go
directly to the stage filtering without making any changes to the images, we extracted the useful
information from each fingerprint, and then we passed to the authentication phase.
Second, we went through the preprocessing of images before filtering and the steps that follow;
the different results are displayed in the following table:
Table 1. Result of Preprocessing Application
Image without
pretreatment
Images with
preprocessing
Total number of
images
100 100
Rate of
erroneous
results
46 22
We therefore note that thanks to the various operations carried out to improve the quality of the
images, the rate of the erroneous results is reduced by 24%.
The improvements noted make the system more efficient from a point of view of reliability; the
criterion of speed can not be discussed in this step since the total processing time depends directly
on the type of processor used and therefore it varies according to the hardware platform used to
implement the fingerprint recognition algorithm.
4. CONCLUSION
Some are the type of sensor used or the algorithm principle applied; the image quality to be
processed remains a very important factor that directly affects the overall system performance.
For this fact, we have proposed in this article a set of operations to apply to the image in order to
increase its quality to be able to facilitate the different phases of treatment that follow.
The results obtained are motivating in terms of total error rate reduction, however, the total
processing time remains directly related to the type of hardware platform used.
REFERENCES
[1] Debnath Bhattacharyya, Rahul Ranjan1, Farkhod Alisherov A., and Minkyu Choi, Biometric
Authentication: A Review, International Journal of u- and e- Service, Science and Technology, Vol.
2, No. 3, September, 2009.
[2] Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso and Jesus B. Alonso “Multisampling
approach applied to contactless hand biometrics” International Carnahan Conference on Security
Technology (ICCST) , IEEE 2012.
International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018
12
[3] Aly I. Desoky, Hesham A. Ali and Nahla B. Abdel-Hamid “Enhancing iris recognition system
performance” The International Conference on Computer Engineering & Systems. 2010.
[4] Navaneeth Bodla, Jingxiao Zheng, Hongyu Xu, Jun-Cheng Chen, Carlos Castillo and Rama
Chellappa “Deep Heterogeneous Feature Fusion for Template-Based Face Recognition” IEEE
Winter Conference on Applications of Computer Vision (WACV). 2017.
[5] Gang Li, Rui Zhang, Matthew Ritchie and Hugh Griffiths “Sparsity-based dynamic hand gesture
recognition using micro-Doppler signatures” IEEE Radar Conference (RadarConf).2017.
[6] R. Stefanelli and A. Rosenfeld, Some parallel thinning algorithms for digital pictures , Journal of the
ACM, Vol.18, No2, pp.255-264, April 1971.
[7] P.B. Wamelen, Z. Li and S.S. Iyengar, "A fast expected time algorithm for the 2-D point pattern
matching problem", Pattern Recognition, Vol. 37, No. 8, pp. 1699-1711, August 2004.
[8] N. GALY« Etude d’un système de reconnaissance d’empreintes digitales pour un capteur
microsystème à balayage» : http://tima.imag.fr/publications/files/th/2006/sff_207.pdf, 2005.
[9] G.O. Williams, Iris Recognition Technology , IEEE Aerospace and Electronics Systems Magazine,
Volume 12, Issue 4, pp. 23 -29, April 1997.
[10] A.M. Bazen and S.H. Gerez, "Directional Field Computation for Fingerprints Based on the Principal
Component Analysis of Local Gradients", Veldhoven, Netherland, November 2000
.

More Related Content

PDF
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
PDF
1834 1840
PDF
An embedded finger vein recognition system
PDF
Ingerprint based student attendance system with sms alert to parents
PDF
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
PDF
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
PDF
Design and development of sapling monitoring system
PDF
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
1834 1840
An embedded finger vein recognition system
Ingerprint based student attendance system with sms alert to parents
Performance Enhancement Of Multimodal Biometrics Using Cryptosystem
Attendance Monitoring System of Students Based on Biometric and GPS Tracking ...
Design and development of sapling monitoring system
Fingerprint Registration Using Zernike Moments : An Approach for a Supervised...

What's hot (17)

PDF
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
PDF
Comparative study of various enhancement techniques for finger print images
PDF
A Study on Fingerprint (biometrics) Recognition
PDF
novel method of identifying fingerprint using minutiae matching in biometric ...
PDF
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
PDF
Advanced Authentication Scheme using Multimodal Biometric Scheme
PDF
A04820104
PDF
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
PDF
IRJET- Analysing Wound Area Measurement using Android App
PDF
Review on Fingerprint Recognition
PDF
Security using image processing
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
20120140502012
PDF
A Review on Overview of Image Processing Techniques
PDF
Overlapped Fingerprint Separation for Fingerprint Authentication
PDF
License plate recognition for toll payment application
PDF
License plate recognition for toll payment application
IRJET- Convenience Improvement for Graphical Interface using Gesture Dete...
Comparative study of various enhancement techniques for finger print images
A Study on Fingerprint (biometrics) Recognition
novel method of identifying fingerprint using minutiae matching in biometric ...
Developmentof Image Enhancement and the Feature Extraction Techniques on Rura...
Advanced Authentication Scheme using Multimodal Biometric Scheme
A04820104
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
IRJET- Analysing Wound Area Measurement using Android App
Review on Fingerprint Recognition
Security using image processing
International Journal of Engineering and Science Invention (IJESI)
20120140502012
A Review on Overview of Image Processing Techniques
Overlapped Fingerprint Separation for Fingerprint Authentication
License plate recognition for toll payment application
License plate recognition for toll payment application
Ad

Similar to PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION (20)

PDF
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
PDF
1834 1840
PDF
Gesture Recognition System
PDF
An Enhanced Authentication System Using Face and Fingerprint Technologies
PDF
M017637484
PDF
E0543135
PDF
IRJET- Sign Language Interpreter
PDF
Comparative study of various enhancement techniques for finger print images
PDF
An efficient method for recognizing the low quality fingerprint verification ...
PDF
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
PDF
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
PDF
Frequency Domain Approach of Image Steganography
PDF
A Survey Based on Fingerprint Matching System
PDF
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
PDF
Deep hypersphere embedding for real-time face recognition
PDF
IRJET - Cardless ATM
PDF
A Survey on Fingerprint Protection Techniques
PDF
Criminal Identification using Arm7
PDF
Virtual Yoga System Using Kinect Sensor
PDF
IRJET- Fake Paper Currency Recognition
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
1834 1840
Gesture Recognition System
An Enhanced Authentication System Using Face and Fingerprint Technologies
M017637484
E0543135
IRJET- Sign Language Interpreter
Comparative study of various enhancement techniques for finger print images
An efficient method for recognizing the low quality fingerprint verification ...
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...
Frequency Domain Approach of Image Steganography
A Survey Based on Fingerprint Matching System
IRJET- Digital Image Processing based Vote Polling using Mat Lab and Cryptogr...
Deep hypersphere embedding for real-time face recognition
IRJET - Cardless ATM
A Survey on Fingerprint Protection Techniques
Criminal Identification using Arm7
Virtual Yoga System Using Kinect Sensor
IRJET- Fake Paper Currency Recognition
Ad

More from ijcsity (20)

PDF
High Performance Computing on the Raspberry PI
PDF
15th International Conference on Computer Science and Information Technology ...
PDF
UAV Path Planning using Genetic Algorithm with Parallel Implementation
PDF
13th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
PDF
International Journal of Computational Science and Information Technology (IJ...
PDF
11th International Conference on Computer Science, Engineering and Informatio...
PDF
13th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
PDF
International Journal of Computational Science and Information Technology (IJ...
PDF
14th International Conference on Information Technology Convergence and Servi...
PDF
International Journal of Computational Science and Information Technology (IJ...
PDF
14th International Conference on Advanced Computer Science and Information Te...
PDF
4th International Conference on Artificial Intelligence Advances (AIAD 2025)
PDF
International Journal of Computational Science and Information Technology (IJ...
PDF
International Journal of Computational Science and Information Technology (IJ...
PDF
International Journal of Computational Science and Information Technology (IJ...
PDF
International Journal of Computational Science and Information Technology (IJ...
PDF
4th International Conference on Computer Science and Information Technology (...
PDF
International Journal of Computational Science and Information Technology (IJ...
PDF
6th International Conference on Cloud and Big Data (CLBD 2025)
PDF
Atlantis Protocol Private Succinct Transfers on Public Networks
High Performance Computing on the Raspberry PI
15th International Conference on Computer Science and Information Technology ...
UAV Path Planning using Genetic Algorithm with Parallel Implementation
13th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
International Journal of Computational Science and Information Technology (IJ...
11th International Conference on Computer Science, Engineering and Informatio...
13th International Conference of Artificial Intelligence and Fuzzy Logic (AI ...
International Journal of Computational Science and Information Technology (IJ...
14th International Conference on Information Technology Convergence and Servi...
International Journal of Computational Science and Information Technology (IJ...
14th International Conference on Advanced Computer Science and Information Te...
4th International Conference on Artificial Intelligence Advances (AIAD 2025)
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
International Journal of Computational Science and Information Technology (IJ...
4th International Conference on Computer Science and Information Technology (...
International Journal of Computational Science and Information Technology (IJ...
6th International Conference on Cloud and Big Data (CLBD 2025)
Atlantis Protocol Private Succinct Transfers on Public Networks

Recently uploaded (20)

PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Pre independence Education in Inndia.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
VCE English Exam - Section C Student Revision Booklet
Sports Quiz easy sports quiz sports quiz
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
STATICS OF THE RIGID BODIES Hibbelers.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Microbial disease of the cardiovascular and lymphatic systems
Pre independence Education in Inndia.pdf
Microbial diseases, their pathogenesis and prophylaxis
Final Presentation General Medicine 03-08-2024.pptx
Cell Types and Its function , kingdom of life
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Complications of Minimal Access Surgery at WLH
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Module 4: Burden of Disease Tutorial Slides S2 2025

PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION

  • 1. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 DOI: 10.5121/ijcsity.2018.6301 1 PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION Farah Dhib Tatar1 and Mohsen Machhout2 1 Department of Electrical Engineering National school of the studies of engineer of Tunis, Tunis, Tunisia 2 Faculty of Sciences of Monastir, Monastir, Tunisia ABSTRACT Biometrics is one of the most used technologies in the field of security due to its reliability and performance. It is based on several physical human characteristics but the most used technology is the fingerprint recognition, and since we must carry out an image processing to be able to exploit the data in each fingerprint we propose in this article an image preprocessing procedure in order to improve its quality before extracting the necessary information for the comparison phase. KEYWORDS Fingerprint Recognition Algorithm; Image processing; Image sensor; Image filtering 1. INTRODUCTION The reliable identification of people is becoming more and more necessary to solve problems of access and identity theft [1]. Access control is a requirement especially to sensitive places that require a high level of confidentiality. The identification keys are of three main types: keys based on the knowledge of passwords or encrypted codes, others based on the possession of access cards badges, keys, etc., or we can identify us based on the physical characteristics of person: these are biometric identification techniques Unlike the first two methods that can pose serious falsification problems, biometric identification techniques are directly related to people's physical characters and therefore can not be copied or desired. The goals of a biometric security system can be multiple. A security system can, for example, use the tools that biometrics makes available to manage the security of logical access of a system. This is probably the most common use of biometrics. But it can also be used to secure the physical access of a room containing sensitive data, from any place on which we choose to install a biometric lock*. ------ *: http://www.agent-de-securite.be/biometrie/securite_biometrique.html
  • 2. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 2 The biometric identification techniques are various: we can analyze the shape of the hand [2], the design of the iris [3], the voice, the vascularization of the retina and the shape of the face. [4] Likewise, the dynamic recognition of the signature [5], analyzed in real time (speed, pressure on the pen, etc). Given its low cost, ease of operation and reliability of fingerprint recognition results, this technology occupies more than two-thirds of the biometric market. Fingerprint recognition algorithms are diverse and are based on different techniques in order to extract useful information from the input image. Obviously, the clearer and better the image, the more reliable and fast the system is. An image sensor is composed of many photosites, each corresponding to a picture element, it is the "pixel".Each pixel of an image sensor records the amount of light to which it is exposed and converts it into a corresponding number of electrons. The stronger the light, the higher the number of electrons generated. Sensors embedded in fingerprint recognition systems are diverse and based on several technologies, noting for example: CCD sensors: they have been used in cameras for over 30 years and have many advantages. In general, they still offer a slightly higher sensitivity to light than CMOS sensors and produce a little less noise. However, they are more expensive and more difficult to integrate into a camera. CMOS sensors: they reduce the overall price of cameras, as they contain all the elements necessary for the composition of cameras. They offer more integration possibilities and more functions than CCD sensors. They also offer shorter measurement times, lower power dissipation at the chip, and reduced footprint. Megapixel sensors (sensors containing one million pixels or more): They are integrated with megapixel cameras and are of a size equal to or only slightly larger than VGA sensors that provide a resolution of 640x480 (307,200) pixels. This means that the size of each pixel on a megapixel sensor is smaller than that on a VGA sensor. Therefore, although the megapixel camera provides higher resolution and more detail, it is less sensitive to light than its VGA counterpart since the pixel size is smaller and the light reflected from an object is spread over more pixels. Whatever the technology used, the purpose of a fingerprint recognition system is to have reliable authentication and fast error rate as small as possible. For this purpose, we present in this paper a preprocessing procedure of the captured image in order to increase its quality before proceeding to the extraction step of useful information and consequently increase the overall performance of the system by minimizing the total processing time as well as the rate of erroneous results. 2. PREPROCESSING PROCEDURE FOR DIGITAL FINGERPRINT RECOGNITION Digital fingerprint recognition is the most widely used biometric technique because of its ease of use and demonstration. The chains of recognition by digital processes are based on image
  • 3. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 3 processing techniques making it possible to extract the useful information of each image (fingerprint) in order to be able to identify it and consequently compared it to other fingerprints. Our fingerprints are unique, at least on certain points: these are called minutiae, that is to say, the lines, the bifurcations, the "islets", the points, the ending of the peaks. The design formed by these lines on our fingers never evolves. Depending on the level of security desired, it is estimated that between 10 and 20 points of correspondence are required to certify a fingerprint. A. Description of the fingerprint A fingerprint consists of a set of locally parallel lines forming a single pattern for each individual (Figure 1), there are streaks (or ridges, these are the lines in contact with a surface to the touch) and the grooves (this are the hollows between two streaks). ** Fig. 1. Fingerprint characteristic Each imprint has a set of global (centers and deltas) and local (minutiae) singular points (Figure 2). Fig. 2. Local and Global singular points in a fingerprint The centers correspond to places of convergence of the striations while the deltas correspond to places of divergence. Fingerprint recognition algorithms use several filtering methods in order to locate the useful points for each fingerprint. The most used filter is that of Gabor given its proven performance in this type of treatment. ------ **http://www.orcanthus.com/main/product/product.php?idpr=4
  • 4. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 4 However, in order to have reliable results, the input image of the filter must be as clear as possible, for this reason we propose a series of mathematical and morphological operations to improve the appearance of the image before pass to the filtering step. When capturing a fingerprint image, several factors affect image quality such as: Scars in the finger, age of the person. Parasitic substances (water, grease, dirt, etc.) Capture environment: temperature (dilation, compression), humidity These various factors greatly affect the quality of the input image of the system and consequently increase the error rate and reduce the overall performance of the application; We must therefore perform a specific treatment in order to reduce the parasitic effects and improve the image quality used. The different pretreatment phases are presented in Figure 3. Fig. 3. Preprocessing steps B. Grayscale transformation A fingerprint sensor in general returns a color image. For this algorithm, there is no need for color schemes for processing. We must therefore make a transformation into grayscale. This transformation allows us to reduce the space used for recording data included in the image; in fact, the color pixels require 24 bits to be able to represent the different levels of colors, on the other hand in grayscale we only need 8 bits for each pixel since we have only 256 gray levels. this operation is performed according to the following formula (1): I=(R+G+B)/3 (1) Where I is the value of the pixel in gray and R, G and B are the values of the color components. C. Image normalization The normalization operation makes it possible to increase the contrasts in the image by making a certain adjustment to the gray levels represented in each pixel without affecting the useful
  • 5. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 5 information included in the fingerprint image.This operation is done locally on each block according to the following steps: Calculation of the average: = × ∑ ∑ , (2) I (i, j) is the value of the pixel (i, j) and M is the value of the average of the image while m and n are the dimensions of the image. Calculation of variance: = × ∑ ∑ , − (3) V is the variance of the image. Calculation of the standardized gray level value of the pixel (i, j) [6]: , = + × , , > − × , , < ! (4) M0 and V0 are the desired values for mean and variance, respectively. We chose _0=100 and V0=100. Normalization does not change the structure of the image, but it is used to standardize the variation of gray levels. D. Segmentation This operation aims to minimize the noise present in the image as well as to center the useful information that will be used in the comparison phase of the different signatures, so we eliminate the noisy areas as well as the useless edges of the image because they can lead us to make false comparisons. The results of this step is a binary image of the same size as the original image and called "Mask", the block corresponding to the bottom of the image will be filled with 0 in the mask, and the rest will be filled by 1.This is not all to satisfactorily because many blocks containing no useful information persist. To avoid this we decided to eliminate the blocks belonging to the bottom of the image according to their average value. The local average value of each block Ml is calculated and compared to a threshold T: If " < # then we consider that the block contains no useful information and it is eliminated.
  • 6. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 6 If " > # then the block contains part of the fingerprint and is retained. The threshold T has been chosen according to the average value M& of the overall image such that = '( ) . The mask then undergoes two treatments: Any non-noisy block with at least 3 adjacent blocks defined as noisy is eliminated (this corresponds to a strongly noisy area or the edge of the fingerprint. The set of blocks at the edge of the image is deleted. An example of segmentation is shown in Figure 4 [7]. Fig. 4. Effect of segmentation on the image E. Spatial estimate of the directional map To obtain the directional map, we goes through two stages: the estimation of the orientation and the smoothing of the directional map. 1) Estimation of the orientation: The directional map present the orientation of each streak contained in the fingerprint.Orientation estimation is a fundamental step in Gabor's image-based image enhancement process. (Figure 5). Fig. 5. Local orientation of a pixel
  • 7. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 7 We present here the optimized calculation of the directional map of the fingerprint [7]. This measurement must be reliable because, in the case of directional filtering, a poor evaluation of the direction would cause a degradation of the image. We use here the method based on the least square approximation ([8], [9]) which is very effective in the case of very noisy images. To calculate the direction associated with a pixel x, y of the image, we consider its neighborhood V of size W x W pixels. We calculate the gradients, *+ , in x and *, , in y for each pixel i, j of neighborhood V. For the calculation of the gradient, the use of Sobel masks proved to be the most efficient in the case of our images. Thus the local direction in neighborhood V is estimated by the following relation (the proof of this formula is detailed in the article of M. Bazen and H. Gerez [10]. - +, , = ./0 1 ∑ ∑ . *+ , . *, , 3 3 ∑ ∑ 4*+ , − *, , 5 3 3 6 3 78 *+ = +, , × 9 − − − : ; < *, = +, , × 9 − − − : (5) It is thus possible to calculate the local direction at each pixel of the image but this is very expensive in computation time, so it is much more efficient to divide the image into adjacent blocks and evaluate the local mean direction to the block leaves to interpolate the direction for each pixel. 2) Refinement of the directional map In the case where the input image is too noisy we can have false results when detecting the local directions of the pixels. Thus we can note the presence of vertical lines at the directional map levels that have no direction. An example of the presence of vertical lines is illustrated in the figure (6) presenting the case of estimation of the directional map with an “Arch” type fingerprint. Fig. 6. Influence of vertical lines
  • 8. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 8 This then causes a very large angular variation between two adjacent blocks. However, a fingerprint has some directional continuity, such a variation between two adjacent blocks is then representative of a poor estimate. To eliminate such discontinuities, a low-pass filter is applied to the directional map. Applying a low-pass filter requires that the orientation of the image be converted into a continuous vector field. This vector field has as components x and y respectively defined by: =+ , = >?@ . - , ; < =, , = @A0 . - , (6) With the two components of the vector obtained, one can apply the Gaussian low pass filter of size W_θ × W_θ defined by: =+ B , = C C * D, E . =+ − E. 3, − E. 3 3- E 3- 3- D 3- =, B , = ∑ ∑ * D, E . =, − E. 3, − E. 3 3- E F3- 3- D F3- (7) Where G is the Gaussian low pass filter and w is the block size. Finally, the local orientation smoothed at the pixel (i,j)is given by: G , = ./0 =, H , =+ H , (8) The Figure (7) shows the example of the estimation of the directional map for different types of fingerprint. Fig. 7. Estimation of the directional map for different types of fingerprint
  • 9. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 9 A Spatial estimate of the frequency map The frequency map of the image consists in estimating the local frequency of the striations in each pixel. 1) Frequencyof each block The frequency mapis an image of the same size as that of the fingerprint and represents the local frequency of the streaks. The first thing to do is to divide the image into sub-blocks of size W × W. Then, we have to project each pixel in the block orthogonal to its direction (that is to say in the direction 4 J ) − θ5 ), we obtain a vector V presenting a set of extrema (figure 8) [10]. Fig. 8. Extrema obtained after projection 2) Spatial estimation of frequency In the extrema vector obtained, the maxima represent the centers of the striations and the minima correspond to the centers of the valleys. The inter-striated local period is then estimated by calculating the average distance between two consecutive maxima S (i,j): L , = M , (9) The maxima M_i and the minima m_i are determined by detecting the zero crossing of the derivative of the vector V, which makes it possible to obtain the sequence {M_1,m_1,……..,M_k,m_k,M_(k+1) }. If the difference between a maximum M_i and a minimum m_i is less than a threshold T then we consider that M_i corresponds to a noise and it is eliminated. If the resultant vector contains at least two maxima then the inter-strikethrough period is calculated by averaging the distances between two consecutive maxima, otherwise the period takes the value of zero. When the estimated period is zero this means that the block contains no streaks (background image) or that it is too noisy to reliably estimate the local frequency. 3. RESULTS AND DISCUSSION We used Matlab to validate all this steps; the results are shown in the following pictures:
  • 10. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 10 A. Applying the mask on the image: Fig. 9. Mask of the image This step allows us to eliminate the edges of the image as well as the very noisy areas. B. Extraction of the directional map Fig. 10. Directional map of the fingerprint The directional map defines the local orientation of streaks contained in the fingerprint. C. Extraction of the frequency card Fig. 11. Frequency map of the fingerprint
  • 11. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 11 The frequency map estimates the local frequency of the streaks in each pixel. In order to highlight the importance of image preprocessing we have considered a database based on a hundred images captured by different types of sensors, in the first place we tried to go directly to the stage filtering without making any changes to the images, we extracted the useful information from each fingerprint, and then we passed to the authentication phase. Second, we went through the preprocessing of images before filtering and the steps that follow; the different results are displayed in the following table: Table 1. Result of Preprocessing Application Image without pretreatment Images with preprocessing Total number of images 100 100 Rate of erroneous results 46 22 We therefore note that thanks to the various operations carried out to improve the quality of the images, the rate of the erroneous results is reduced by 24%. The improvements noted make the system more efficient from a point of view of reliability; the criterion of speed can not be discussed in this step since the total processing time depends directly on the type of processor used and therefore it varies according to the hardware platform used to implement the fingerprint recognition algorithm. 4. CONCLUSION Some are the type of sensor used or the algorithm principle applied; the image quality to be processed remains a very important factor that directly affects the overall system performance. For this fact, we have proposed in this article a set of operations to apply to the image in order to increase its quality to be able to facilitate the different phases of treatment that follow. The results obtained are motivating in terms of total error rate reduction, however, the total processing time remains directly related to the type of hardware platform used. REFERENCES [1] Debnath Bhattacharyya, Rahul Ranjan1, Farkhod Alisherov A., and Minkyu Choi, Biometric Authentication: A Review, International Journal of u- and e- Service, Science and Technology, Vol. 2, No. 3, September, 2009. [2] Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso and Jesus B. Alonso “Multisampling approach applied to contactless hand biometrics” International Carnahan Conference on Security Technology (ICCST) , IEEE 2012.
  • 12. International Journal of Computational Science and Information Technology (IJCSITY) Vol.6, No.1/2/3, August 2018 12 [3] Aly I. Desoky, Hesham A. Ali and Nahla B. Abdel-Hamid “Enhancing iris recognition system performance” The International Conference on Computer Engineering & Systems. 2010. [4] Navaneeth Bodla, Jingxiao Zheng, Hongyu Xu, Jun-Cheng Chen, Carlos Castillo and Rama Chellappa “Deep Heterogeneous Feature Fusion for Template-Based Face Recognition” IEEE Winter Conference on Applications of Computer Vision (WACV). 2017. [5] Gang Li, Rui Zhang, Matthew Ritchie and Hugh Griffiths “Sparsity-based dynamic hand gesture recognition using micro-Doppler signatures” IEEE Radar Conference (RadarConf).2017. [6] R. Stefanelli and A. Rosenfeld, Some parallel thinning algorithms for digital pictures , Journal of the ACM, Vol.18, No2, pp.255-264, April 1971. [7] P.B. Wamelen, Z. Li and S.S. Iyengar, "A fast expected time algorithm for the 2-D point pattern matching problem", Pattern Recognition, Vol. 37, No. 8, pp. 1699-1711, August 2004. [8] N. GALY« Etude d’un système de reconnaissance d’empreintes digitales pour un capteur microsystème à balayage» : http://tima.imag.fr/publications/files/th/2006/sff_207.pdf, 2005. [9] G.O. Williams, Iris Recognition Technology , IEEE Aerospace and Electronics Systems Magazine, Volume 12, Issue 4, pp. 23 -29, April 1997. [10] A.M. Bazen and S.H. Gerez, "Directional Field Computation for Fingerprints Based on the Principal Component Analysis of Local Gradients", Veldhoven, Netherland, November 2000 .