A New Approach for Fingerprint Authentication in Biometric Systems Using BRISK Algorithm

Elaf J. Al Taee, Zainalabideen Abdulsamad

Abstract


Now a day, Authentication process in biometric system become most critical task with the expansive of individual information in the world. Where in many current applications, devices and commercial treatments required fingerprint identification process in order to verify the requested services. Most technologies also motivate to this direction. With the increasing of fingerprints uses, there is a need to provide a technique that able to handle the issues that exist in fingerprint acquisition and verification processes. Typically, fingerprint authenticated based on pick small amount of information from some points called Minutiae points. This approach suffers from many issues and provide poor results when the samples of fingerprints are degraded (scale, illumination, direction) changes. However, BRISK algorithm used to handle the previous issues and to extract the significant information from corner points in fingerprint. BRISK is invariant to scale, illumination, and direction changes and its able to pick large number of information when compared with minutiae points. In this paper, BRISK algorithm used based on image based approach, where current recognition matrices are developed and proposed new metrics without need for human interaction. UPEK dataset used to test the performance of proposed system, where the results show high accuracy rate in this dataset. Proposed system evaluated using FAR, FRR, EER and Accuracy and based on selected metrics the proposed system and methodology achieve high accuracy rate than others, and gives a novel modification in authentication task in biometric systems

Keywords


fingerprint matching; fingerprint retrieving; UPEK; BRISK algorithm; FAST detector; biometric system.

Full Text:

PDF

References


Yoichi Seto, “Development of Personal Authentication Systems using Fingerprint with Smart Cards and Digital Signature Technologies", Seventh International Conference on Control Automation Robotics and Vision (ICARCV’OZ), Singapore, pp: 996-1001, 2002.

A. C. Leniski, R. C. Skinner, S. F. McGann, and S. J. Elliott, "Securing the Biometric Model," presented at Security Technology, in proceedings of the 37th IEEE Annual 2003 International Carnahan Conference, 2003.

Karthik Nandakumar, " Multi-biometric Systems: Fusion Strategies and Template Security", PhD Thesis, Department of Computer Science and Engineering, Michigan State University, USA, pp: 1-202, 2008.

Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K. Jain, "Biometric Cryptosystems: Issues and Challenges", in proceeding of IEEE, Vol.92, No.6, pp: 948-960, 2004.

C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V.K.V Kumar, "Biometric Encryption", in R.K. Nichols, editor ICSA Guide to cryptography, McGraw Hill New York, pp: 42-46, 1999.

Umma Hany, Lutfa Akter, "Speeded Up Robust Feature Extraction and Matching for Fingerprint Recognition", 2nd International Conference on Electrical Engineering, Information and Communication Technology, IEEE, 2015.

Ami M Patel, Rikin Thakkar,†Object Based Image Retrieval from Database using Local and Global Featuresâ€, IJIRT, Vol.1, No.12, 2015.

Guesmi, H., Trichili, H., Alimi, A.M., Solaiman, B, “Curvelet Transform-Based Features Extraction for Fingerprint Identificationâ€, in Biometrics Special Interest Group (BIOSIG), BIOSIG-Proceedings of the International Conference of the IEEE, pp. 1-5, 2012.

R. Shakthi Pooja, S. Swetha,S., K. Alice, “Robust Fingerprint Matching Using Ring Based ZERNIKE Moments: A Survey.†International Journal of Engineering Science and Research Technology, Vol. 6, No. 3, pp. 329-340, 2017.

R. Kumar, P. Chandra, M. Hanmandlu: "Rotation Invariant Fingerprint Matching Using Local Directional Descriptors", International Journal of Computational Intelligent Studies, Vol. 3, No. 4, PP. 292-319, 2014.

P.H. Saini, Rakesh S., “Perspective of Fingerprint Recognition Using Robust Local Feature.†International of Science and Research, Vol. 4, No. 6, pp. 2428-2433, 2015.

Sheng Li, A. C. Kot, “Fingerprint Combination for Privacy Protection", IEEE Transactions on Information Forensics and Security, Vol.8, No.2, PP. 350-360, 2012.

Karthik Nandakumar, " Multi-biometric Systems: Fusion Strategies and Template Security", PhD Thesis, Department of Computer Science and Engineering, Michigan State University, USA, pp: 1-202, 2012.

David G. Lowe, "Distinctive Image Features from Scale-Invariant Key points", International Journal of Computer Vision, Vol.60, No.2, pp 91-110, 2004.

H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool, 2008. "Speeded-Up Robust Features (SURF)" Journal of Computer Vision and Image Understanding, Vol.110, No.3, PP.346-359.

Leutenegger S. Chli M., Siegwart R. Y, "Binary Robust Invariant Scalable Key-Points", Journal of Computer Vision, (ICCV), IEEE, pp 2548-2555, 2011.

Rublee, Ethan; Rabaud, Vincent; Konolige, Kurt; Bradski, Gary, "ORB: an efficient alternative to SIFT or SURF", Journal of Computer Vision, (ICCV), IEEE International Conference on Computer Vision (ICCV), 2011.

J. Matas, O. Chum, M. Urban, T. Pajdla, "Robust Wide Baseline Stereo from Maximally Stable Extremal Regions.†Proc. of British Machine Vision Conference, pp 384-396, 2002.

Meenu, Surender Singh, " Enhanced the Fingerprint Matching using BRISK, SURF & MSER†International Journal of Advance Research in Computer Science and Management Studies, Vol.4, No.7, pp 78-83, 2016.

Leutenegger, Stefan, Margarita Chli, and Roland Y. Siegwart. “BRISK: Binary robust invariant scalable keypoints.†Computer Vision (ICCV), 2011 IEEE International Conference on. IEEE, 2011.

L. Najman and M. Couprie: "Building the component tree in quasi-linear time" Archived 2011-04-09 at the Wayback Machine.; IEEE Transaction on Image Processing, Volume 15, Numbers 11, pp 3531-3539, 2006.

Kant C., Nath R., “Reducing Process-Time for Fingerprint Identification Systemâ€, International Journals of Biometric and Bioinformatics, Vol.3, No. 1, pp. 1-9, 2009.

P. S. Sanjekar, P. S., Dhabe, “Fingerprint Verification Using Haar Waveletâ€, 2nd International Conference on Computer Engineering and Technology, IEEE, Vol.3, pp. 361-365, 2010.

Yunfei Zhong, Xiaoqi Peng, “SIFT Based Low Quality Fingerprint LSH Retrieving and Recognition Method.†International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 8, No. 8, pp. 263-272, 2015.

P.H. Saini, Rakesh S., “Perspective of Fingerprint Recognition Using Robust Local Feature.†International of Science and Research, Vol. 4, No. 6, pp. 2428-2433, 2015.

Rohit K. Dubey, Jonathan, V. L.L. Thing, “Fingerprint Liveliness Detectionâ€, Information Forensics and Security, Vol.11, No.7, 2016.

Martin A. Fischler, Robert C. Bolles, “"Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography", Comm. ACM., Vol.24, No.6, pp: 381-395, 1981.

Tawfiq A. AL-asadi, Ahmed J.Obaid, “Object detection and Recognition by Using Enhanced Speeded Up Robust Feature†International Journal of Computer Science and Network Security, Vol.16 , No. 4, pp. 66-71, 2016.

UPEK fingerprint Database, BERKELEY, Calif.--(BUSINESS WIRE) --May 3, 2006, UPEK, Inc. Steve Hahm, downloaded from http://www.advancedsourcecode.com/fingerprintdatabase.asp, last updated 2012.

Ertugrul Bayraktar, Pinar Boyraz, “Analysis of Feature Detector and Descriptor Combinations with a Localization Experiment for Various Performance Metrics†Turkish Journal of Electrical Engineering & Computer Sciences, pp. 2444 - 2454, 2017.




DOI: http://dx.doi.org/10.18517/ijaseit.8.5.6239

Refbacks

  • There are currently no refbacks.



Published by INSIGHT - Indonesian Society for Knowledge and Human Development