A Secured Contactless Fingerprint Verification Method Using a Minutiae Matching Technique

A Secured Contactless Fingerprint Verification Method Using a Minutiae Matching Technique

Tahirou Djara, Marc Kokou Assogba, Antoine Vianou
Copyright: © 2018 |Pages: 25
DOI: 10.4018/978-1-5225-5628-2.ch009
(Individual Chapters)
No Current Special Offers


Most matching or verification phases of fingerprint systems use minutiae types and orientation angle to find matched minutiae pairs from the input and template fingerprints. Unfortunately, due to some non-linear distortions, like excessive pressure and fingers twisting during enrollment, this process can cause the minutiae features to be distorted from the original. The authors are interested in a fingerprint matching method using contactless images for fingerprint verification. After features extraction, they compute Euclidean distances between template minutiae (bifurcation and ending points) and input image minutiae. They compute then after bifurcation ridges orientation angles and ending point orientations. In the decision stage, they analyze the similarity between templates. The proposed algorithm has been tested on a set of 420 fingerprint images. The verification accuracy is found to be acceptable and the experimental results are promising. Future work will enhance the proposed verification method by a new template protection technique.
Chapter Preview


Biometric authentication has received extensive attention over the past decade with increasing demands in automated personal identification as fingerprints are assumed to be unique across individuals, and fingers of the same individual (Pankanti et al., 2002). However, contact based fingerprint systems have some drawbacks due to skin elasticity, inconsistent finger placement, contact pressure, small sensing area, environment conditions and sensor noise. Additionally, problems like skin conditions (e.g. dirty or wet) and contagious diseases spreading make the use of contact based scanners not very safe (Yin et al., 2016). Another major risk in the contact-based systems is the possibility of chemical or bacteriological attacks. This risk is increasingly increased with the development of international terrorism nowadays. We are then interested in a fingerprint matching method using contactless images for fingerprint verification.

Depending on the application context, a biometric system may be called either a verification system or an identification system (Maltoni et al., 2003; AlMahafzah et al., 2012). A verification system authenticates a person’s identity by comparing the captured biometric reference template pre-stored in the system. It conducts one-to-one comparison to confirm whether the claim of identity by the individual is true. An identification system recognizes an individual by searching the entire enrollment template database for a match. It conducts one-to-many comparisons to establish if the individual is present in the database and if so, returns the identifier of the enrollment reference that matched.

Fingerprint matching techniques can be coarsely classified into three categories, namely minutiae-based matching (Jain et al., 1997; Medina-pérez et al., 2012), image-based matching (A. Qader et al.,2006; Ito et al., 2009; Jain et al., 2000, Sha et al., 2003) and hybrid matching technique (Khalila et al., 2010; Kumar et al., 2012). Minutiae-based matching essentially consists of finding the alignment between the template and the input minutiae feature sets that result in the maximum number of minutiae pairings.

In this paper, we present a contactless fingerprint verification method using a minutiae matching technique, based on the alignment between template images acquired by a contactless system and input images acquired by the same way. Contactless images have been acquired and stored in a database during an enrollment step. The first stage in an Automatic Fingerprint Verification procedure is to extract minutiae from fingerprints. In our contactless fingerprint verification system, we have implemented a minutia extraction algorithm which has been presented in (Djara et al., 2010). The extracted features are ridge bifurcation, ridge ending and ridges orientations. Authors in (Kumar et al., 2012;He et al., 2002; Virk&Maini, 2012) determine orientations using horizontal axis.

Complete Chapter List

Search this Book: