Use of ridge points in partial fingerprint matching

被引:11
|
作者
Fang, Gang [1 ]
Srihari, Sargur N. [1 ]
Srinivasan, Harish [1 ]
Phatak, Prasad [1 ]
机构
[1] SUNY Buffalo, CEDAR, Buffalo, NY 14428 USA
关键词
fingerprint verification; forensics; biometrics; partial fingerprint matching;
D O I
10.1117/12.718941
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Matching of partial fingerprints has important applications in both biometrics and forensics. It is well-known that the accuracy of minutiae-based matching algorithms dramatically decrease as the number of available minutiae decreases. 14,hen singular structures such as core and delta are unavailable, general ridges can be utilized. Some existing highly accurate minutiae matchers do use local ridge similarity for fingerprint alignment. However, ridges cover relatively larger regions, and therefore ridge similarity models are sensitive to non-linear deformation. An algorithm is proposed here to utilize ridges more effectively- by utilizing representative ridge points. These points are represented similar to minutiae and used together with minutiae in existing minutiae matchers with simple modification. Algorithm effectiveness is demonstrated using both full and partial fingerprints. The performance is compared against two minutiae-only matchers (Bozorth and k-minutiae). Effectiveness with full fingerprint matching is demonstrated using the four databases of FVC2002- where the error rate decreases by 0.2-0.7% using the best matching algorithm. The effectiveness is more significant in the case of partial fingerprint matching which is demonstrated with sixty partial fingerprint databases generated from FVC2002 (with five levels of numbers of minutiae available). When only 15 minutiae are available the error rate decreases 5-7.5%. Thus the method, which involves selecting representative ridge points, minutiae matcher modification, and a group of minutiae matchers, demonstrates improved performance on full and especially partial fingerprint matching.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Latent Fingerprint Matching Using Distinctive Ridge Points
    Castillo-Rosado, Katy
    Hernandez-Palancar, Jose
    [J]. INFORMATICA, 2019, 30 (03) : 431 - 454
  • [2] Ridge directional singular points for fingerprint recognition and matching
    Dagher, I
    Badawi, M
    Beyrouti, B
    [J]. APPLIED STOCHASTIC MODELS IN BUSINESS AND INDUSTRY, 2006, 22 (01) : 73 - 91
  • [3] Partial fingerprint matching using minutiae and ridge shape features for small fingerprint scanners
    Lee, Wonjune
    Cho, Sungchul
    Choi, Heeseung
    Kim, Jaihie
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2017, 87 : 183 - 198
  • [4] Fingerprint minutiae matching with orientation and ridge
    Cheng, JG
    Tian, J
    Chen, H
    [J]. BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 351 - 358
  • [5] Fingerprint matching based on ridge similarity
    Zheng, Xiaolong
    Wang, Yangsheng
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 1701 - 1704
  • [6] Fingerprint Matching Incorporating Ridge Features With Minutiae
    Choi, Heeseung
    Choi, Kyoungtaek
    Kim, Jaihie
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) : 338 - 345
  • [7] Fingerprint representation and matching in ridge coordinate system
    Feng, Jianjiang
    Cai, Anni
    [J]. 18TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 4, PROCEEDINGS, 2006, : 485 - +
  • [8] An exact ridge matching algorithm for fingerprint verification
    Feng, JJ
    Ouyang, ZY
    Su, F
    Cai, AN
    [J]. ADVANCES IN BIOMETRIC PERSON AUTHENTICATION, PROCEEDINGS, 2005, 3781 : 103 - 110
  • [9] Fingerprint identification based on ridge lines and graph matching
    Wei, Honglei
    Ou, Zongying
    Zhang, Jianxin
    [J]. WCICA 2006: SIXTH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-12, CONFERENCE PROCEEDINGS, 2006, : 585 - 585
  • [10] Coarse fingerprint matching based on singular points
    Luo, Y
    Gavrilova, ML
    [J]. SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 425 - 433