SlideShare ist ein Scribd-Unternehmen logo
1 von 59
    features of fingerprint
    enhancement
    binarization
    thinning
    minutaie detection
   A fingerprint is the pattern of ridges and valleys on the
    surface of a fingerprint. Minutiae are local discontinuities
    in the fingerprint pattern. Ex-ridge ending and ridge
    bifurcation.
   Ridges and valleys in a local neighborhood form a
    sinusoidal-shaped plane wave, which has a well-defined
    frequency and orientation.
   In many cases, fingerprints are with numerous
    discontinuous ridges (dry, wet, damped, scars and
    smudges).
   the main difficulty for feature extraction is that fingerprint
    quality is often too low, thus noise and contrast deficiency
    can produce false minutiae or hide valid ones.
   Ex- when the person has cuts or scars in his/her fingers.
Fingerprint recognition is one of the oldest and most
researched fields of biometrics.

Some biological principles (Moenssens 1971)
      related
to fingerprint recognition are as follows:

•    Individual epidermal ridges and furrows have
     different characteristics for different fingerprints.
     This forms the foundation of fingerprint
     recognition
•    The configuration types are individually variable;
     but they vary within limits that allow for a
     systematic classification.
     Herein lies the basis for fingerprint
     classification.
•    The configuration and minute details of furrows
     are permanent and unchanging.
Diagram of AFMS
•   The human fingerprint is comprised of various types of ridge patterns.
•   Traditionally classified according to the decades-old Henry system: left
    loop, right loop, arch, whorl, and tented arch.
•   Loops make up nearly 2/3 of all fingerprints, whorls are nearly 1/3, and
    perhaps 5-10% are arches.
•   These classifications are relevant in many large-scale forensic applications,
    but are rarely used in biometric authentication.
Bifurcation: It is the intersection of two or more line-types which converge or diverge.

Arch: They are found in most patterns, fingerprints made up primarily of them are called “Arch Prints”.

Loop: A recursive line-type that enters and leaves from the same side of the fingerprint.


Island: A line-type that stands alone.( i.e. does not touch another line-type)


Ellipse: A circular or oval shaped line-type which is generally found in the center of the fingerprint, it is
generally found in the Whorl print pattern.

Tented Arch: It quickly rises and falls at a steep angle. They are associated with “Tented Arch Prints”.


Spiral: They spiral out from the center and are generally associated with “Whorl Prints”.

Rod: It generally forms a straight line. It has little or no recurve feature. They are gennerally found in the
center.
Sweat Gland: The moisture and oils they produce actually allow the fingerprint to be electronically imaged.
Arch   Left Loop   Right Loop   Whorl   undecided
   Reliable minutiae extraction is extremely
    important
   Enhancement
   Binarization
   Thinning
   many algorithms and techniques proposed and applied to
    fingerprint image enhancement: using Fourier transform,
    Gabor filters, Wavelet transform and minutiae filtering,
    applied to binary or gray-scale images.
   The main of an enhancement algorithm is to improve the
    clarity of ridge structures of fingerprint images in recoverable
    regions and to remove the unrecoverable regions.
   the pattern is related to the ridge direction. the enhancement
    can help visualizing the ridges.
   In this work, a directional wavelet transform is applied to
    decompose the image into its orientation representation.
   Directional filtering is applied to each direction before image
    reconstruction.
   Performance depends on quality of images
   Ideal fingerprint
   Degradation types – ridges are not continuous, parallel
    ridges are not well separated, cuts/creases/bruises
   Leads to problems in minutiae extraction
For each fingerprint image, the fingerprint areas
 resulting from segmentation can be divided into:
 Well-defined region

 Recoverable region

 Unrecoverable region
   Goal – to improve the clarity of the ridge structure
    in the recoverable regions and mark
    unrecoverable regions as too noisy for further
    processing
   Input – a gray-scale image
   Output – a gray-scale or binary image depending
    on the algorithm
   Effective initial steps - Contrast stretching,
    Histogram manipulation, Normalization, Wiener
    Filtering
   Most widely cited fingerprint enhancement is by use
    of wavelet transform and Gabor filtering.
   It uses wavelet transform for demising and increases
    the contrast between the ridge and background
    (valley) by using a map function to the wavelet
    coefficient set, and thereafter, the Gabor filter method
    can further enhance the ridge using the orientation
    and frequency information.
   In modified second derivative Gaussian filter ,we
    decompose the fingerprint image before directional
    filtering.
   The second derivative of Gaussian filter is applied
    directly to each sub-image.
    We reconstruct the fingerprint image by using the
A.   Normalization
B.   Ridge Frequency
C.   Wavelet Decomposition
D.   Orientation Field Estimation
   The processing of fingerprint normalization
    can reduce the variance in gray-level values
    along ridges and valleys .
   It adjusts the gray-level values to the
    predefined constant mean and variance.
   Normalization can remove the influences of
    sensor noise and gray-level deformation
   In a gray scale image, repeated ridges and valley
    appearance of fingerprint patterns can be viewed as a
    sinusoidal shape with some particular frequency..
   The inverse of the average distance between the
    numbers of peaks encountered is the local frequency
    of that block.
   In our case, the ridge frequency of 0.10-0.12 was
    measured.
   Different base function convolution with the
    image can have different effect in the
    resolution.
   we can decompose the image into sub-images
    at any level.
   However, too low resolution is not suitable
    because an excessive down sampling of the
    signal can vanish the orientation characteristic
    of the ridge structure.
   We have used only one decomposition level.
   The fundamental unit of data in MATLAB
   Scalars are also treated as arrays by MATLAB (1
    row and 1 column).
   Row & column indices of an array start from 1.
   Arrays can be classified as vectors and matrices.
   Vector: Array with one dimension
   Matrix: Array with more than one dimension.
   Total number of elements in an array=
     number of rows(n) * number of columns(m)
   Size of an array –(n x m )
Initializing Variables in Assignment
     Statements
 column vectors              row vectors
       1 
        
   a = 2                 a = {1 2   3}
       3 
        
>>a=[1;2;3]                >>a=[1,2,3]
>>a                        >>a
a=                         a=
  1                         1 2 3
  2
  3
use semi-colon             use comma
to separate rows           to separate columns
Initializing with Shortcut Expressions

              first: increment: last
• Colon operator:
  a shortcut notation used to initialize arrays with thousands of
  elements
       >> x = 1 : 2 : 10;
       >> angles = (0.01 : 0.01 : 1) * pi;

• Transpose operator: (′)
  swaps the rows and columns of an array      1   1
                                              2   2
      >> g = [1:4];                  h=
                                              3   3
      >> h = [ g′ g′ ];                       4   4
The end function


• The end function: When used in an array subscript, it
  returns the highest value taken on by that subscript.
      arr3 = [1 2 3 4 5 6 7 8];
      arr3(5:end) is the array [5 6 7 8]
      arr4 = [1 2 3 4; 5 6 7 8; 9 10 11 12];
      arr4(2:end, 2:end)
MATLAB supports six relational operators.
    Less Than                  <
    Less Than or Equal          <=
    Greater Than                >
    Greater Than or Equal        >=
    Equal To                   ==
    Not Equal To                 ~=
MATLAB supports three logical operators.
   not          ~     % highest precedence
   and           &     % equal precedence with or
   or            |     % equal precedence with and
Built-in MATLAB Functions

• result = function( input )
   – abs, sign
   – log, log10
   – exp
   – sqrt;
   – sin, cos, tan
   – asin, acos, atan
   – max, min
   – round, floor, ceil, fix
   – mod, rem
• help elfun → help for elementary math functions
Built-in MATLAB Functions

Math representation            Matlab interpretation
  z = yx                       >>z=y^x;
   y = ex                      >>y=exp(x);
   y = ln(x)                   >>y=log(x);
   y = log(x)                  >>y=log10(x)

   y = sin(x) y = sin −1 (x)   >>y=sin(x);     >>y=asin(x);
   y = cos(x) y = cos −1 (x)   >>y=cos(x);     >>y=acos(x);
   y = tan(x) y = tan −1 (x)   >>y=tan(x);     >>y=atan(x);
x = 0:pi/100:2*pi;
y = sin(x);
plot(x,y)
xlabel('x = 0:2pi')
ylabel('Sine of x')
title('Plot of the Sine
    Function')
   A digital image is a representation of a two-dimensional
    image as a finite set of digital values, called picture elements
    or pixels
   Pixel values typically represent gray levels, colours, heights,
    opacities etc
   Remember digitization implies that a digital image is an
    approximation of a real scene
                                                         1 pixel
     Syntax-
      imread(‘filename’)
Ex.
     F=imread(‘chestxray.jpg’);
     F=imread(‘d:myimageschestxray.jpg’);
     F=imread(‘.myimageschestxray.jpg’);
   Syntax
  imwrite(f,’filename’)
Ex-
   Imwrite(f,’patient10_run’,tif);
        or
   Imwrite(f, ’patient10_run.tif’);
For jpeg file
   Imwrite(f,’filename.jpg’,’quality’,q)
 Syntax-
    Imshow(f,g)
Where f=image array
G=no. of intensity level used to display it.
• Imshow(f.[low high])
1.   Intensity type images
a data values whose intensity has been scaled to represent intensities.eg.-
      scaled uint8,scaled uint16
2. Binary type images
Logical arrays of 0s &1s
S=logical(a)
Where a is numerical array
   Uint8     [0    255]
   Uint16    [0    65535]
   Double    -10e308 to10e308
   Int8     [-128 127]
   Int16    [-32768 32767]
   Single   -10e38 to 10e38
   Im2uint8
   Mat2gray
   Im2double
   im2bw
   TIFF
   JPEG
   GIF
   BMP
   PNG
   XWD
   Common image formats include:
     1 sample per point (B&W or Grayscale)
     3 samples per point (Red, Green, and Blue)
     4 samples per point (Red, Green, Blue, and “Alpha”,
      a.k.a. Opacity)
>>%code for vertical flip of image
>> f=imread('finger.png.jpg');
>> imshow(f)
>> fb=f(end:-1:1,:);
>> figure,imshow(fb)
>> f=imread('finger.png.jpg');
>> imshow(f)
>> fc=f(57:168,57:168);
>> figure,imshow(fc)
>> %code for sub sample of image
>> f=imread('finger.png.jpg');
>> imshow(f)
>> fs=f(1:4:end,1:4:end);
>> figure,imshow(fs)
>>
ENHANCEMENT includes 2 steps
 binarization

 thinning
   Based on peak detection in the gray-scale profiles along sections
    orthogonal to the ridge orientation
   A 16x16 oriented window is centered around each pixel [x,y]
   The gray-scale profile is obtained by projection of the pixel
    intensities onto the central section
I= imread(‘image.bmp’)
 imshow(I)
set(gcf,'position',[1 1 600 600]);
J=I(:,:,1)>160;
Imshow(J);
set(gcf,'position',[1 1 600 600]);
Fingerprint is thinned becoz after being thinned,
   it is easier to find minutiae such as bifurcation
   and simple end points.
   Reduces the width of the ridges to one pixel
   Skeletons , spikes
   Filling holes, removing small breaks,
    eliminating bridges between ridges etc.
Bwmorph: applies morphological operation on
  binary image.
Syntax: BW2 = bwmorph(BW,operation,n)
  applies the operation n times. n can be Inf, in
  which case the operation is repeated until the
  image no longer changes
K=bwmorph(~J,'thin','inf');
Imshow(~K);
set(gcf,'position',[1 1 600 600]);
3 cmds can be used to clear out the window
 clear all

 close all

 clc all
Full n final prjct

Weitere ähnliche Inhalte

Was ist angesagt?

Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and SegmentationA B Shinde
 
Image segmentation
Image segmentationImage segmentation
Image segmentationDeepak Kumar
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2Aly Abdelkareem
 
Image segmentation
Image segmentationImage segmentation
Image segmentationMukul Jindal
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...IJECEIAES
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsIAEME Publication
 
COM2304: Morphological Image Processing
COM2304: Morphological Image ProcessingCOM2304: Morphological Image Processing
COM2304: Morphological Image ProcessingHemantha Kulathilake
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGKamana Tripathi
 
Hand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in HardwareHand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in Hardwareijsrd.com
 
Morphological image processing
Morphological image processingMorphological image processing
Morphological image processingRaghu Kumar
 
Morphology in graphics and image processing
Morphology in graphics and image processingMorphology in graphics and image processing
Morphology in graphics and image processingDheeban Smart
 

Was ist angesagt? (20)

1288
12881288
1288
 
FEATURE EXTRACTION USING SURF ALGORITHM FOR OBJECT RECOGNITION
FEATURE EXTRACTION USING SURF ALGORITHM FOR OBJECT RECOGNITIONFEATURE EXTRACTION USING SURF ALGORITHM FOR OBJECT RECOGNITION
FEATURE EXTRACTION USING SURF ALGORITHM FOR OBJECT RECOGNITION
 
Edge Detection and Segmentation
Edge Detection and SegmentationEdge Detection and Segmentation
Edge Detection and Segmentation
 
Hit and-miss transform
Hit and-miss transformHit and-miss transform
Hit and-miss transform
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Practical Digital Image Processing 2
Practical Digital Image Processing 2Practical Digital Image Processing 2
Practical Digital Image Processing 2
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Image segmentation
Image segmentation Image segmentation
Image segmentation
 
Morphological operations
Morphological operationsMorphological operations
Morphological operations
 
PPT s07-machine vision-s2
PPT s07-machine vision-s2PPT s07-machine vision-s2
PPT s07-machine vision-s2
 
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
A Novel 2D Feature Extraction Method for Fingerprints Using Minutiae Points a...
 
Template matching03
Template matching03Template matching03
Template matching03
 
Separation of overlapping latent fingerprints
Separation of overlapping latent fingerprintsSeparation of overlapping latent fingerprints
Separation of overlapping latent fingerprints
 
COM2304: Morphological Image Processing
COM2304: Morphological Image ProcessingCOM2304: Morphological Image Processing
COM2304: Morphological Image Processing
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSINGTYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
TYBSC (CS) SEM 6- DIGITAL IMAGE PROCESSING
 
Image segmentation
Image segmentationImage segmentation
Image segmentation
 
Hand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in HardwareHand Shape Based Gesture Recognition in Hardware
Hand Shape Based Gesture Recognition in Hardware
 
Morphological image processing
Morphological image processingMorphological image processing
Morphological image processing
 
Morphology in graphics and image processing
Morphology in graphics and image processingMorphology in graphics and image processing
Morphology in graphics and image processing
 

Andere mochten auch

Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementAnkit Nayan
 
A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
A Novel Approach to Fingerprint Identification Using Gabor Filter-BankA Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
A Novel Approach to Fingerprint Identification Using Gabor Filter-BankIDES Editor
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintJayakrishnan U
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptMukta Gupta
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionMesbah Uddin Khan
 
Fingerprint verification using matlab
Fingerprint verification using matlabFingerprint verification using matlab
Fingerprint verification using matlabPraveen Kumar Kushwah
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsCloudTechnologies
 
ARDUINOLIKE BOARDS: A SHORT HARDWARE REFERENCE GUIDE FOR MAKERS
ARDUINOLIKE BOARDS: A SHORT HARDWARE REFERENCE GUIDE FOR MAKERSARDUINOLIKE BOARDS: A SHORT HARDWARE REFERENCE GUIDE FOR MAKERS
ARDUINOLIKE BOARDS: A SHORT HARDWARE REFERENCE GUIDE FOR MAKERSLeandro Agro'
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsRmcauley
 
RFID based Highway Toll Fee Process System
RFID based Highway Toll Fee Process SystemRFID based Highway Toll Fee Process System
RFID based Highway Toll Fee Process SystemAmar Reddy
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-pptMohankumar Ramachandran
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance systemA Jay Vardhan
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Sandeep Kumar Panda
 
tollgate automation
tollgate automationtollgate automation
tollgate automationshafeek070
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filtereSAT Publishing House
 
Rfid based toll tax collection system 3 (repaired)
Rfid based toll tax collection system 3 (repaired)Rfid based toll tax collection system 3 (repaired)
Rfid based toll tax collection system 3 (repaired)KrishNa Patel
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 

Andere mochten auch (20)

Gabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image EnhancementGabor Filtering for Fingerprint Image Enhancement
Gabor Filtering for Fingerprint Image Enhancement
 
A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
A Novel Approach to Fingerprint Identification Using Gabor Filter-BankA Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
A Novel Approach to Fingerprint Identification Using Gabor Filter-Bank
 
Detection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprintDetection and rectification of distorted fingerprint
Detection and rectification of distorted fingerprint
 
Fingerprint Images Enhancement ppt
Fingerprint Images Enhancement pptFingerprint Images Enhancement ppt
Fingerprint Images Enhancement ppt
 
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint RecognitionAn Efficient Approach to Extract Singular Points for Fingerprint Recognition
An Efficient Approach to Extract Singular Points for Fingerprint Recognition
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
Fingerprint verification using matlab
Fingerprint verification using matlabFingerprint verification using matlab
Fingerprint verification using matlab
 
finger prints
finger printsfinger prints
finger prints
 
Detection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprintsDetection and rectification of distorted fingerprints
Detection and rectification of distorted fingerprints
 
ARDUINOLIKE BOARDS: A SHORT HARDWARE REFERENCE GUIDE FOR MAKERS
ARDUINOLIKE BOARDS: A SHORT HARDWARE REFERENCE GUIDE FOR MAKERSARDUINOLIKE BOARDS: A SHORT HARDWARE REFERENCE GUIDE FOR MAKERS
ARDUINOLIKE BOARDS: A SHORT HARDWARE REFERENCE GUIDE FOR MAKERS
 
Automated Fingerprint Identification Systems
Automated Fingerprint Identification SystemsAutomated Fingerprint Identification Systems
Automated Fingerprint Identification Systems
 
RFID based Highway Toll Fee Process System
RFID based Highway Toll Fee Process SystemRFID based Highway Toll Fee Process System
RFID based Highway Toll Fee Process System
 
50409621003 fingerprint recognition system-ppt
50409621003  fingerprint recognition system-ppt50409621003  fingerprint recognition system-ppt
50409621003 fingerprint recognition system-ppt
 
Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
tollgate automation
tollgate automationtollgate automation
tollgate automation
 
Efficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filterEfficient fingerprint image enhancement algorithm based on gabor filter
Efficient fingerprint image enhancement algorithm based on gabor filter
 
Rfid based toll tax collection system 3 (repaired)
Rfid based toll tax collection system 3 (repaired)Rfid based toll tax collection system 3 (repaired)
Rfid based toll tax collection system 3 (repaired)
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 

Ähnlich wie Full n final prjct

Two Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingTwo Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingChamod Mune
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentationasodariyabhavesh
 
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...Institute of Information Systems (HES-SO)
 
3D Math Without Presenter Notes
3D Math Without Presenter Notes3D Math Without Presenter Notes
3D Math Without Presenter NotesJanie Clayton
 
3D Math Primer: CocoaConf Atlanta
3D Math Primer: CocoaConf Atlanta3D Math Primer: CocoaConf Atlanta
3D Math Primer: CocoaConf AtlantaJanie Clayton
 
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGAScientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGAAhmed Gamal Abdel Gawad
 
image segmentation image segmentation.pptx
image segmentation image segmentation.pptximage segmentation image segmentation.pptx
image segmentation image segmentation.pptxNaveenKumar5162
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”Er. Arpit Sharma
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfvikasmittal92
 
Lecture 02 visualization and programming
Lecture 02   visualization and programmingLecture 02   visualization and programming
Lecture 02 visualization and programmingSmee Kaem Chann
 
The Day You Finally Use Algebra: A 3D Math Primer
The Day You Finally Use Algebra: A 3D Math PrimerThe Day You Finally Use Algebra: A 3D Math Primer
The Day You Finally Use Algebra: A 3D Math PrimerJanie Clayton
 
Wavelet Based Image Compression Using FPGA
Wavelet Based Image Compression Using FPGAWavelet Based Image Compression Using FPGA
Wavelet Based Image Compression Using FPGADr. Mohieddin Moradi
 

Ähnlich wie Full n final prjct (20)

Two Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image ProcessingTwo Dimensional Shape and Texture Quantification - Medical Image Processing
Two Dimensional Shape and Texture Quantification - Medical Image Processing
 
Chapter10 image segmentation
Chapter10 image segmentationChapter10 image segmentation
Chapter10 image segmentation
 
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
 
3D Math Without Presenter Notes
3D Math Without Presenter Notes3D Math Without Presenter Notes
3D Math Without Presenter Notes
 
3D Math Primer: CocoaConf Atlanta
3D Math Primer: CocoaConf Atlanta3D Math Primer: CocoaConf Atlanta
3D Math Primer: CocoaConf Atlanta
 
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGAScientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
Scientific Computing II Numerical Tools & Algorithms - CEI40 - AGA
 
Lect14 lines+circles
Lect14 lines+circlesLect14 lines+circles
Lect14 lines+circles
 
image segmentation image segmentation.pptx
image segmentation image segmentation.pptximage segmentation image segmentation.pptx
image segmentation image segmentation.pptx
 
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”"FingerPrint Recognition Using Principle Component Analysis(PCA)”
"FingerPrint Recognition Using Principle Component Analysis(PCA)”
 
Module-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdfModule-5-1_230523_171754 (1).pdf
Module-5-1_230523_171754 (1).pdf
 
Lecture 02 visualization and programming
Lecture 02   visualization and programmingLecture 02   visualization and programming
Lecture 02 visualization and programming
 
matlab_tutorial.ppt
matlab_tutorial.pptmatlab_tutorial.ppt
matlab_tutorial.ppt
 
matlab_tutorial.ppt
matlab_tutorial.pptmatlab_tutorial.ppt
matlab_tutorial.ppt
 
matlab_tutorial.ppt
matlab_tutorial.pptmatlab_tutorial.ppt
matlab_tutorial.ppt
 
Introduction to matlab
Introduction to matlabIntroduction to matlab
Introduction to matlab
 
The Day You Finally Use Algebra: A 3D Math Primer
The Day You Finally Use Algebra: A 3D Math PrimerThe Day You Finally Use Algebra: A 3D Math Primer
The Day You Finally Use Algebra: A 3D Math Primer
 
Mit6 094 iap10_lec03
Mit6 094 iap10_lec03Mit6 094 iap10_lec03
Mit6 094 iap10_lec03
 
Wavelet Based Image Compression Using FPGA
Wavelet Based Image Compression Using FPGAWavelet Based Image Compression Using FPGA
Wavelet Based Image Compression Using FPGA
 
Mat lab
Mat labMat lab
Mat lab
 
2. filtering basics
2. filtering basics2. filtering basics
2. filtering basics
 

Full n final prjct

  • 1.
  • 2. features of fingerprint  enhancement binarization thinning  minutaie detection
  • 3. A fingerprint is the pattern of ridges and valleys on the surface of a fingerprint. Minutiae are local discontinuities in the fingerprint pattern. Ex-ridge ending and ridge bifurcation.  Ridges and valleys in a local neighborhood form a sinusoidal-shaped plane wave, which has a well-defined frequency and orientation.  In many cases, fingerprints are with numerous discontinuous ridges (dry, wet, damped, scars and smudges).  the main difficulty for feature extraction is that fingerprint quality is often too low, thus noise and contrast deficiency can produce false minutiae or hide valid ones.  Ex- when the person has cuts or scars in his/her fingers.
  • 4. Fingerprint recognition is one of the oldest and most researched fields of biometrics. Some biological principles (Moenssens 1971) related to fingerprint recognition are as follows: • Individual epidermal ridges and furrows have different characteristics for different fingerprints. This forms the foundation of fingerprint recognition • The configuration types are individually variable; but they vary within limits that allow for a systematic classification. Herein lies the basis for fingerprint classification. • The configuration and minute details of furrows are permanent and unchanging.
  • 5.
  • 7. The human fingerprint is comprised of various types of ridge patterns. • Traditionally classified according to the decades-old Henry system: left loop, right loop, arch, whorl, and tented arch. • Loops make up nearly 2/3 of all fingerprints, whorls are nearly 1/3, and perhaps 5-10% are arches. • These classifications are relevant in many large-scale forensic applications, but are rarely used in biometric authentication.
  • 8. Bifurcation: It is the intersection of two or more line-types which converge or diverge. Arch: They are found in most patterns, fingerprints made up primarily of them are called “Arch Prints”. Loop: A recursive line-type that enters and leaves from the same side of the fingerprint. Island: A line-type that stands alone.( i.e. does not touch another line-type) Ellipse: A circular or oval shaped line-type which is generally found in the center of the fingerprint, it is generally found in the Whorl print pattern. Tented Arch: It quickly rises and falls at a steep angle. They are associated with “Tented Arch Prints”. Spiral: They spiral out from the center and are generally associated with “Whorl Prints”. Rod: It generally forms a straight line. It has little or no recurve feature. They are gennerally found in the center. Sweat Gland: The moisture and oils they produce actually allow the fingerprint to be electronically imaged.
  • 9. Arch Left Loop Right Loop Whorl undecided
  • 10. Reliable minutiae extraction is extremely important  Enhancement  Binarization  Thinning
  • 11. many algorithms and techniques proposed and applied to fingerprint image enhancement: using Fourier transform, Gabor filters, Wavelet transform and minutiae filtering, applied to binary or gray-scale images.  The main of an enhancement algorithm is to improve the clarity of ridge structures of fingerprint images in recoverable regions and to remove the unrecoverable regions.  the pattern is related to the ridge direction. the enhancement can help visualizing the ridges.  In this work, a directional wavelet transform is applied to decompose the image into its orientation representation.  Directional filtering is applied to each direction before image reconstruction.
  • 12. Performance depends on quality of images  Ideal fingerprint  Degradation types – ridges are not continuous, parallel ridges are not well separated, cuts/creases/bruises  Leads to problems in minutiae extraction
  • 13. For each fingerprint image, the fingerprint areas resulting from segmentation can be divided into:  Well-defined region  Recoverable region  Unrecoverable region
  • 14. Goal – to improve the clarity of the ridge structure in the recoverable regions and mark unrecoverable regions as too noisy for further processing  Input – a gray-scale image  Output – a gray-scale or binary image depending on the algorithm  Effective initial steps - Contrast stretching, Histogram manipulation, Normalization, Wiener Filtering
  • 15.
  • 16. Most widely cited fingerprint enhancement is by use of wavelet transform and Gabor filtering.  It uses wavelet transform for demising and increases the contrast between the ridge and background (valley) by using a map function to the wavelet coefficient set, and thereafter, the Gabor filter method can further enhance the ridge using the orientation and frequency information.  In modified second derivative Gaussian filter ,we decompose the fingerprint image before directional filtering.  The second derivative of Gaussian filter is applied directly to each sub-image.  We reconstruct the fingerprint image by using the
  • 17. A. Normalization B. Ridge Frequency C. Wavelet Decomposition D. Orientation Field Estimation
  • 18. The processing of fingerprint normalization can reduce the variance in gray-level values along ridges and valleys .  It adjusts the gray-level values to the predefined constant mean and variance.  Normalization can remove the influences of sensor noise and gray-level deformation
  • 19. In a gray scale image, repeated ridges and valley appearance of fingerprint patterns can be viewed as a sinusoidal shape with some particular frequency..  The inverse of the average distance between the numbers of peaks encountered is the local frequency of that block.  In our case, the ridge frequency of 0.10-0.12 was measured.
  • 20. Different base function convolution with the image can have different effect in the resolution.  we can decompose the image into sub-images at any level.  However, too low resolution is not suitable because an excessive down sampling of the signal can vanish the orientation characteristic of the ridge structure.  We have used only one decomposition level.
  • 21.
  • 22.
  • 23.
  • 24. The fundamental unit of data in MATLAB  Scalars are also treated as arrays by MATLAB (1 row and 1 column).  Row & column indices of an array start from 1.  Arrays can be classified as vectors and matrices.  Vector: Array with one dimension  Matrix: Array with more than one dimension.  Total number of elements in an array= number of rows(n) * number of columns(m)  Size of an array –(n x m )
  • 25. Initializing Variables in Assignment Statements column vectors row vectors 1    a = 2 a = {1 2 3} 3    >>a=[1;2;3] >>a=[1,2,3] >>a >>a a= a= 1 1 2 3 2 3 use semi-colon use comma to separate rows to separate columns
  • 26. Initializing with Shortcut Expressions first: increment: last • Colon operator: a shortcut notation used to initialize arrays with thousands of elements >> x = 1 : 2 : 10; >> angles = (0.01 : 0.01 : 1) * pi; • Transpose operator: (′) swaps the rows and columns of an array 1 1 2 2 >> g = [1:4]; h= 3 3 >> h = [ g′ g′ ]; 4 4
  • 27. The end function • The end function: When used in an array subscript, it returns the highest value taken on by that subscript. arr3 = [1 2 3 4 5 6 7 8]; arr3(5:end) is the array [5 6 7 8] arr4 = [1 2 3 4; 5 6 7 8; 9 10 11 12]; arr4(2:end, 2:end)
  • 28. MATLAB supports six relational operators.  Less Than <  Less Than or Equal <=  Greater Than >  Greater Than or Equal >=  Equal To ==  Not Equal To ~= MATLAB supports three logical operators.  not ~ % highest precedence  and & % equal precedence with or  or | % equal precedence with and
  • 29. Built-in MATLAB Functions • result = function( input ) – abs, sign – log, log10 – exp – sqrt; – sin, cos, tan – asin, acos, atan – max, min – round, floor, ceil, fix – mod, rem • help elfun → help for elementary math functions
  • 30. Built-in MATLAB Functions Math representation Matlab interpretation z = yx >>z=y^x; y = ex >>y=exp(x); y = ln(x) >>y=log(x); y = log(x) >>y=log10(x) y = sin(x) y = sin −1 (x) >>y=sin(x); >>y=asin(x); y = cos(x) y = cos −1 (x) >>y=cos(x); >>y=acos(x); y = tan(x) y = tan −1 (x) >>y=tan(x); >>y=atan(x);
  • 31. x = 0:pi/100:2*pi; y = sin(x); plot(x,y) xlabel('x = 0:2pi') ylabel('Sine of x') title('Plot of the Sine Function')
  • 32. A digital image is a representation of a two-dimensional image as a finite set of digital values, called picture elements or pixels  Pixel values typically represent gray levels, colours, heights, opacities etc  Remember digitization implies that a digital image is an approximation of a real scene 1 pixel
  • 33. Syntax- imread(‘filename’) Ex.  F=imread(‘chestxray.jpg’);  F=imread(‘d:myimageschestxray.jpg’);  F=imread(‘.myimageschestxray.jpg’);
  • 34. Syntax imwrite(f,’filename’) Ex-  Imwrite(f,’patient10_run’,tif); or  Imwrite(f, ’patient10_run.tif’); For jpeg file  Imwrite(f,’filename.jpg’,’quality’,q)
  • 35.  Syntax- Imshow(f,g) Where f=image array G=no. of intensity level used to display it. • Imshow(f.[low high])
  • 36. 1. Intensity type images a data values whose intensity has been scaled to represent intensities.eg.- scaled uint8,scaled uint16 2. Binary type images Logical arrays of 0s &1s S=logical(a) Where a is numerical array
  • 37. Uint8 [0 255]  Uint16 [0 65535]  Double -10e308 to10e308  Int8 [-128 127]  Int16 [-32768 32767]  Single -10e38 to 10e38
  • 38. Im2uint8  Mat2gray  Im2double  im2bw
  • 39. TIFF  JPEG  GIF  BMP  PNG  XWD
  • 40. Common image formats include:  1 sample per point (B&W or Grayscale)  3 samples per point (Red, Green, and Blue)  4 samples per point (Red, Green, Blue, and “Alpha”, a.k.a. Opacity)
  • 41. >>%code for vertical flip of image >> f=imread('finger.png.jpg'); >> imshow(f) >> fb=f(end:-1:1,:); >> figure,imshow(fb)
  • 42.
  • 43. >> f=imread('finger.png.jpg'); >> imshow(f) >> fc=f(57:168,57:168); >> figure,imshow(fc)
  • 44.
  • 45. >> %code for sub sample of image >> f=imread('finger.png.jpg'); >> imshow(f) >> fs=f(1:4:end,1:4:end); >> figure,imshow(fs)
  • 46. >>
  • 47. ENHANCEMENT includes 2 steps  binarization  thinning
  • 48. Based on peak detection in the gray-scale profiles along sections orthogonal to the ridge orientation  A 16x16 oriented window is centered around each pixel [x,y]  The gray-scale profile is obtained by projection of the pixel intensities onto the central section
  • 49. I= imread(‘image.bmp’) imshow(I) set(gcf,'position',[1 1 600 600]); J=I(:,:,1)>160; Imshow(J); set(gcf,'position',[1 1 600 600]);
  • 50.
  • 51.
  • 52. Fingerprint is thinned becoz after being thinned, it is easier to find minutiae such as bifurcation and simple end points.
  • 53. Reduces the width of the ridges to one pixel  Skeletons , spikes  Filling holes, removing small breaks, eliminating bridges between ridges etc.
  • 54. Bwmorph: applies morphological operation on binary image. Syntax: BW2 = bwmorph(BW,operation,n) applies the operation n times. n can be Inf, in which case the operation is repeated until the image no longer changes
  • 56.
  • 57.
  • 58. 3 cmds can be used to clear out the window  clear all  close all  clc all

Hinweis der Redaktion

  1. Why are the classes not frequently used in biometric authentication? What is used for biometric classification?