Академический Документы
Профессиональный Документы
Культура Документы
(a) (b) 2 3 2 3
(a) (b)
1 1
1 1
55 55
44 44
(c) (d)
22 3 22 3
3 3
Figure 2. Examples of ridge count pairs. (a-b)
(c) (d)
matched, (c-d) nonmatched. 11 11 1
Query Template 5
Alignment Module 55 55
Minutiae Set Minutiae Set 44 4 44 5
4
22 33 22 33 2 33
Alignment 1 Alignment 2 Alignment k (e) (f) (g)
Figure 5. (a) The ROC curves illustrating the Figure 7. Distribution of the imposturous and
performance of ridge count features using genuine matching scores with (solid lines),
different models, (b) The distribution of the without (dotted lines) subset combination.
imposturous and genuine matching scores The ridge counts between every two minutiae are estimated
with (solid lines) and without (dotted lines) and the reliable ones are used to enhance the relationship
integrating the ridge count features. among minutiae, which increase the overall matching accu-
racy. Finally the matched minutiae subsets corresponding
to different alignments are selectively combined to further
Subsets Combination Subsets Combination improve the matching performance by alleviating the non-
2D Warping 2D Warping
No Distortion Removal No Distortion Removal
linear distortion problem in fingerprints.
References
(a) without ridge count (b) with ridge count
Figure 6. The ROC curves of the subset com- [1] A. M. Bazen and S. H. Gerez. Fingerprint matching by
bination, 2D warping, and original method. thin-plate spline modeling of elastic deformations. Pattern
scores before and after integrating the ridge count features. Recognition, 36(8):1859–1867, 2003.
[2] Z. Chen and C. H. Kuo. A topology-based matching algo-
In the experiment, three ridge count models are constructed:
rithm for fingerprint authentication. In Proc. IEEE 25th An-
(1) reliable ridge count as described in Section 2, (2) un- nual Int’l Carnahan Conf. Security Technology, pages 84–
reliable ridge count where all the ridge counts are utilized 87, 1991.
without evaluation, and (3) local ridge count where the ridge [3] A. K. Hrechak and J. A. Mchugh. Automated fingerprint
count are not evaluated and only those ridge count connect- recognition using structural matching. Pattern Recognition,
ing the minutia and its three nearest neighbors are utilized. 23(8):893–904, 1990.
It can be seen that the proposed ridge count mechanism out- [4] A. K. Jain, L. Hong, and R. Bolle. On-line fingerprint veri-
performs the other methods. Without evaluating the relia- fication. IEEE Trans. Pattern Analysis and Machine Intelli-
gence, 19(4):302–314, 1997.
bility of the ridge count features, the matching performance
[5] X. Jiang and W. Y. Yau. Fingerprint minutiae matching
will drop drastically. In addition, the reliable ridge count based on local and global structures. In Proc. 15th Int’l Conf.
features greatly enlarge the genuine matching score while Pattern Recognition, volume 2, pages 1038–1041, 2000.
slightly change the imposturous matching score, which re- [6] D. Lee, K. Choi, and J. Kim. A robust fingerprint matching
sults in an obvious decrease of the equal error rate (EER). algorithm using local alignment. In Proc. 16th Int’l Conf.
The results indicate that the reliable ridge count features are Pattern Recognition, volume 3, pages 803–806, 2002.
capable of enhancing the global spatial relationship among [7] D. Maio and D. Maltoni. Direct gray-scale minutiae detec-
minutiae and hence improving the matching performance. tion in fingerprints. IEEE Trans. Pattern Analysis and Ma-
chine Intelligence, 19(1):27–40, 1997.
Fig. 6 illustrates the ROC curves of the subset combina-
[8] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar. Hand-
tion compared with the 2D warping algorithm and the origi- book of Fingerprint Recognition. Springer-Verlag, New
nal method without distortion removal. As can be seen from York, 2003.
the results, our subset combination scheme shows good ca- [9] N. Ratha, S. Chen, K. Karu, and A. K. Jain. A
pability of distortion removal and performs better than the real-time matching system for large fingerprint databases.
2D warping method. Furthermore, the subset combination IEEE Trans. Pattern Analysis and Machine Intelligence,
can effectively decrease the EER with almost no change to 18(8):799–813, 1996.
the imposturous matching score, as shown in Fig. 7. [10] N. K. Ratha, V. D. Pandit, R. M. Bolle, and V. Vaish. Robust
fingerprint authentication using local structural similarity. In
5. Conclusion Fifth IEEE Workshop on Applications of Computer Vision,
pages 29–34, 2000.
In this paper, we develop an effective fingerprint match-
[11] D. Rutovitz. Pattern recognition. J. Roy. Statist. Soc.,
ing algorithm based on ridge count matching and minutiae 129:504–530, 1966.
subset combination. In our algorithm, the orientation-based [12] L. Sha and X. Tang. Orientation-improved minutiae for fin-
ridge patterns are utilized to improve the minutiae local fea- gerprint matching. In Proc. 17th Int’l Conf. Pattern Recog-
tures for the removal of spuriously matched minutiae pairs. nition, volume 4, pages 432–435, 2004.