9
Faculty of Automation and Computer Science Eng. Radu-Florin Miron PhD THESIS Distributed Fingerprint Identification System ABSTRACT Scientific Coordinator, PhD. Prof. Eng. Tiberiu Ștefan Leția

PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

Embed Size (px)

Citation preview

Page 1: PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

Faculty of Automation and Computer Science

Eng. Radu-Florin Miron

PhD THESIS

Distributed Fingerprint Identification System

ABSTRACT

Scientific Coordinator,

PhD. Prof. Eng. Tiberiu Ștefan Leția

Page 2: PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

PhD Thesis – Distributed Fingerprint Identification System

i

Table of Contents

Chapter 1. Introduction

1.1 The biometry

1.2 The history of fingerprint recognition

1.3 General aspects of biometric systems

1.4 Thesis objectives

1.5 Thesis content

Chapter 2. Conceptual models for fingerprint recognition

2.1 The steps required for the recognition process

2.2 Fingerprint image acquisition

2.3 Feature extraction

2.4 Image segmentation

2.5 Local ridge orientation and frequency

2.6 Singularity detection

2.7 Image enhancement

2.8 Image binarization and thinning

2.9 Minutiae detection

2.10 False minutiae rejection

2.11 Fingerprint matching

2.12 Experimental results

2.13 Conclusions

Chapter 3. Fuzzy Logic Method for Partial Fingerprint Recognition

3.1 Introduction

3.2 Software architecture

3.3 Method presentation

3.4 Conclusions

Chapter 4. The design of a distributed fingerprint identification system

4.1 Introduction

4.2 State of the art

4.3 Requirements and specifications

4.4 Use cases

4.5 General hardware architecture

4.6 Communication protocol

4.7 Hardware configuration of the servers

4.8 Server application design

4.9 Client application design

4.10 Mixt node application design

4.11 Conclusions

Page 3: PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

PhD Thesis – Distributed Fingerprint Identification System

ii

Chapter 5. Implementation Aspects for the Proposed System

5.1 Server implementation

5.2 Fixed client implementation

5.3 Mobile client implementation

5.4 Mixt node implementation

5.5 Experimental results

5.6 Conclusions

Chapter 6. Extension Modules for the Proposed System

6.1 Security module

6.2 Mobile terminal tracking using GPS

6.3 Secured communication system and method between fixed and mobile terminals

6.4 Conclusions

Chapter 7. Conclusions

7.1 Remarks

7.2 Original contribution of the author

7.3 Design and implementation contribution

7.4 General conclusions. Future work

Page 4: PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

PhD Thesis – Distributed Fingerprint Identification System

1

Thesis Outline

This paper presents the main aspects involved in fingerprint recognition systems.

Biometric recognition refers to a number of methods for uniquely recognizing a person based on

one or more physical or behavioral characteristics. The most common biometric characteristics

or traits used by identification and verification (authentication) applications are: iris, hand

geometry, face, veins, voice, retina, handwriting, fingerprints etc. Among all the pos-sible

biometric traits, fingerprint is the most widely used. According to [1], fingerprint based

technology is the undisputed biometric leader, considering its market share of almost 67% in

2009. The same report forecasts that the annual biometric industry revenues will almost triple by

2014.

The main objectives of the thesis are presented in Chapter 1:

� the evaluation of the main algorithms involved in fingerprint recognition and image

processing;

� the design and the implementation of a partial fingerprint recognition application;

� the design and the implementation of a distributed fingerprint recognition system;

� the design and the implementation of a communication security module for the

proposed system;

� the design and the implementation of a mobile clients’ tracking using GPS.

Chapter 2 represents the state of the art of the main algorithms and methods involved in

fingerprint recognition process. A fingerprint image is a reproduction of the fingertip epi-dermis,

produced by pressing the finger against a solid surface. The most obvious structural feature of a

fingerprint is the pat-tern of alternative ridges and furrows (or valleys) [2]. Ridges’ width can

vary between 100 and 300 µm and the ridge/valley period is about 500 µm [3].

Fingerprint ridges begin to develop during the third to fourth month of fetal development.

They are fully developed by the seventh month and the probability of two fingerprints being

alike is 1 in 1.9 × 1015 [4]. Ridges and furrows are usually parallel, but they can also come to an

end or split, thus creating the two most widely used types of minutiae (small details):

terminations and bifurcations, respectively. There are other

types of minutiae such as: pores, short ridges (dots or islands),

cores, deltas etc. Although these other types of minutiae can

be considered, the FBI minutiae-coordinate model uses only

terminations and bifurcations [5]. Usually a minutia is defined

by the triplet {xi, yi, θi}, where xi and yi are the minutia

coordinates and θi is the angle between the tangent to the

ridge line at the minutia location and the horizontal axis (refer

to Fig. 1).

Besides minutiae, the other major

fingerprint feature class is represented by

the singularities, which are distinctive

patterns that the ridges form in a

fingerprint. Developed by Sir Edward

Henry in the late 1800s, the Henry

Classification System [6] is still used for

fingerprint classification in order to

a)termination b)bifurcation

Figura 1. Minutiae

arch loop whorl

Figure 2. Fingerprint typologies - Henry System

Page 5: PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

PhD Thesis – Distributed Fingerprint Identification System

2

simplify the search and retrieval process in the recognition system’s data base. The main

fingerprint typologies presented in Fig. 2 are: arch, loop and whorl. These typologies are further

divided into subclasses (e.g. right loop and left loop, tented arch and plain arch).

The major steps involved in an automatic fingerprint recognition application are: the

fingerprint acquisition, the fingerprint image pre-processing, the feature extraction, the

fingerprint classification and the fingerprint matching.

There are many methods and technologies for each step involved in fingerprint recognition.

The fingerprint matching is the process of comparing an input fingerprint to preprocessed ones

(or templates) stored in a data base.

According to [7], fingerprint matching can be grouped into three major classes: (i)

correlation-based matching, (ii) minutiae-based matching and (iii) ridge feature-based matching.

Reference [8] states that the fingerprint recognition approaches can be grouped into five

categories: (i) based on singular points, (ii) structure-based, (iii) frequency-based, (iv) syntactic

or grammar-based, and (v) based on mathematical models.

High quality matching of complete fingerprints can be performed by many reasonable

algorithms. Matching of poor quality or partial samples is more difficult. Fingerprint images can

be affected by: high displacement and/or rotation, non-linear distortion (caused by representing a

3D shape in a 2D image), different pressure, skin condition and feature extraction errors [2].

Minutiae based recognition techniques are the most often used methods in fingerprint

recognition commercial applications because of their temporal performance, but they don’t

perform very well on low quality inputs [9] and might not be performed at all for partial

fingerprints. The loss of singular points (core and delta) is making singularity based recognition

and indexing techniques impossible [10].

In Chapter 3 a novel fuzzy logic algorithm based on correlating a minutiae set and the

regions between ridges is proposed for matching partial fingerprints.

The proposed fuzzy logic based algorithm for partial fingerprint matching combines

correlation-based and minutiae-based techniques and it is employed if no singularity is detected

in the fingerprint’s image. Direct application of correlation-based algorithms is computationally

very expensive, due to the large number of rotations and translations needed. In order to reduce

the computational time, the proposed algorithm tries to match two minutiae from the input with

two minutiae from the template. After aligning the two minutiae sets the two images can be

correlated.

In order to compare

the input to the template a

region coloring step is

required for the both image.

First, the fingerprint regions

have to be enclosed from the

background. This is done by

uniting the neighbor ridge

endings with straight lines.

Second, all the regions are

colored. This process is

similarly to the use of Microsoft Paint’s Fill with color Tool and it is performed by a labeling

algorithm [11]. Both the input and the template are colored as presented in Fig. 3.

a) b) c) d)

Figure 3. a)Template region enclosing, b)Input region enclosing,

c) Template region coloring, d)Input region coloring

Page 6: PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

PhD Thesis – Distributed Fingerprint Identification System

3

The correlation degrees of

each input region are fuzzified by

using the well known membership

function presented in Fig. 4. The

regions are grouped according to

their membership degree and the

relative surface of each group is

determined (rshcd, rsmcd and

rslcd). A second fuzzification step

is performed for these 3 variables.

Based on a set of rules presented

in the thesis and on the inference

of rules, a global matching score

is determined (matchf).

Fig. 5 depicts the

defuzzification function of the

fuzzy output matchf. The L, M, H

intervals’ bounds were

experimentally set. Raising the

lower bounds of M and H

intervals means a higher security

level (or higher rejection rate).

The crisp values of the output

variable matchf are calculated by

the centre of gravity for singleton

method as in (1):

A distributed fingerprint

identification system is proposed

in Chapter 4. Here, the

requirements, the specifications

and the design of the system are

presented.

The proposed IDA System

is composed of a number of

mobile devices connected to

centralized processing units

(servers), which are responsible

for the enrollment and

recognition tasks. The mobile

devices are used for collecting

the personal data, for sending

Figure 4. Input membership function

Figure 5. Output membership function

������%� ∑ �� �������� ∗��

∑ ������

, (1)

where si is the strength of the ith

rule and t is the number of

the activated rules for the same input set.

Figure 6. The general architecture of IDA System

Page 7: PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

PhD Thesis – Distributed Fingerprint Identification System

4

them to its assigned server along with the needed request identifier (enroll, verify or identify) and

for receiving the answers to their requests. The servers communicate with each other, being able

to forward unsolved recognition requests. The general architecture of the system is presented in

Fig. 6. For interconnecting the system’s servers, two different technologies were proposed: a

peer-to-peer topology and a MOM-JMS based topology (refer to Fig. 7 and 8, respectively).

The mobile client uses an experimental device to read the fingerprints. A mobile phone

running a Java ME application is used to connect to the device (via Bluetooth) and to retrieve the

fingerprint. See Fig. 9 a), b), c), d). The fixed client application is implemented in Java 2 SE and

it uses an optical fingerprint sensor (Wison Corp OR100) presented in Fig. 9 e).

Figure 9. Mobile and fixed client applications

The distributed applications that compose proposed system was designed with the help of

the following UML diagrams: use-case, sequence, task, activity and class. Before implementing

the proposed applications, a verification of the models is required, in order to avoid deadlocks,

since each distributed application deals with a fairly large number of synchronized threads. The

best suited method for this purpose is the use of Petri Nets.

Figure 7. Peer-to-peer servers’ topology

Figure 8. MOM based servers’ topology

a) b) c)

d) e)

Page 8: PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

PhD Thesis – Distributed Fingerprint Identification System

5

In Chapter 5, the implementation details of the distributed fingerprint identification

system are given. This chapter focuses on presenting the main technologies and protocols used to

implement the system: GSM/GPRS (TCP/IP), Bluetooth (RFCOMM), JNI, MySQL and

VeriFinger SDK. The main aspects of the software implementation in Java SE and ME are also

given.

The proposed distributed fingerprint recognition system was tested from the next points

of view:

- functionality tests,

- error handling tests,

- temporal performances tests.

Chapter 6 proposes two extension modules for enhancing the system’s capabilities. The

first extension module is responsible for ensuring the system’s communication security. The

encryption methods considered (and their temporal performance for encrypting – sending -

decrypting 81KB of data) are presented in Table 1.

Table 1. Temporal performances

Encryption technique Block size Temporal performances

fără criptare 1024 B, 81 KB < 7 ms

RSA (JCE) 64 B 3,5 sec

DES (JCE) 1024 B 285 ms

AES (JCE) 1024 B 310 ms

SSL (JSSE) 1024 B 80 ms

The second extension module needs involves the use of GPS modules, integrated in the

mobile client applications, in order to track the terminals’ position by using a web application

developed on top of Google Maps.

A novel Diffie-Hellman based method is also proposed in this chapter. The method is

used to secure the communication between the terminals of a message exchanger system. The

keys used to encrypt the communication are generated from the information extracted for the

GPS position and from the fingerprint image.

The conclusions of the thesis are presented in Chapter 7. The main original contribution

of this paper can be synthesized as follows:

- A new partial fingerprint recognition method was proposed [12].

- A novel encryption system and method were proposed [13].

- The original architecture and implementation for a distributed fingerprint

identification system were presented.

The proposed IDA System is scalable (especially in the MOM-JMS-based architecture)

and has a modular implementation. Due to its characteristics, IDA System can be easily

customized to meet the requirements of practical applications. Based on the studies presented in

this paper, three commercial products were developed:

- fingerprint-based access code generator;

- radio remote control secured with fingerprint recognition;

- GPS tracking system secured with fingerprint recognition.

Page 9: PhD THESIS - old.utcluj.ro · PhD Thesis – Distributed Fingerprint Identification System 1 Thesis Outline ... for the enrollment and recognition tasks. The mobile

PhD Thesis – Distributed Fingerprint Identification System

6

Selective Bibliography

The thesis contains 140 references from which the next were used in this abstract:

[1] “Biometrics Market Report 2009-2014”. International Biometrics Group, 2009.

[2] D. Maltoni, D. Maio, A. K. Jain, S. Prabhakar, “Handbook of Fingerprint Recognition”,

Springer-Verlag, New York, 2003.

[3] J.D.Stosz, L.A. Alyea, ”Automated System forFingerprint Authentication Using Pores and

Ridge Structure”, Proc. of SPIE (Automatic Systems for the Identification and Inspection of

Human), vol. 2277, 1994, pp. 210-223.

[4] W. F. Leung, S. H. Leung, W.H. Lau, A. Luk, “Fingerprint Recognition Using Neural

Network, Neural Networks For Signal Processing”, Proceedings Of The 1991 IEEE

Workshop.

[5] Wegstein ”An Automated Fingerprint Identification System”, U.S. Government Publication,

Washington, DC: U.S. Dept. of Commerce, National Bureau of Standards, 1982.

[6] E. R. Henry, “Classification and Uses of Fingerprints”, London: Routledge, 1900.

[7] D. Maltoni, “A Tutorial on Fingerprint Recognition”, Biometric Systems Laboratory - DEIS -

University of Bologna, 2005.

[8] S. C. Dass, A. K. Jain, “Fingerprint Classification Using Orientation Field Flow Curves”,

ICVGIP 2004, p. 650-655.

[9] A. N. Marana, A. K. Jain, “Ridge-Based Fingerprint Matching Using Hough Transform”,

Computer Graphics and Image Processing, SIBGRAPI, 2005, p. 112-119.

[10] H. Le, D. Bui, ”Online fingerprint identification with a fast and distortion tolerant hashing”,

Journal of Information Assurance and Security 4, 2009, p. 117-123.

[11] Yang, X. D., “An Improved Algorithm for Labeling Connected Components in a Binary

Image”, TR 89-981, 1989.

[12] Miron, R., Letia, T. OSIM Patent Request for – Partial Fingerprint Recognition Method –

A/10014/2010 from 29.08.2010.

[13] Astilean, A., Folea, S., Avram, C., Hulea, M., Miron, R., Letia, T., OSIM Patent Request

for – Method and System for Ensuring the Communication Security between Fixed and

Mobile Terminals – A/10037/2010 from 08.12.2010.