+ All Categories
Home > Documents > Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive...

Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive...

Date post: 01-Sep-2018
Category:
Upload: ngolien
View: 224 times
Download: 0 times
Share this document with a friend
26
Entracer - Entropy sensitive fingerprint feature extraction. Preda Mih˘ ailescu, Krzysztof Mieloch and Axel Munk Abstract We give a top - down description of a system of algorithms for fingerprint data extraction, to be denoted as the entracer. The purpose of these algorithms is to optimally take advantage of the inner structure of the ridge flow of a fingerprint. Aiming to develop new methods for matching and classification, we train the entracer to extract a maximal amount of information present in a finger image. This is done in an adaptive way, which leads to good information and even performance gains with respect to classical image processing strategies used in fingerprint recognition. The time gained can be used for the improvement of the accuracy of the recognition, using feedback. Tracing is not sensitive to warping and, in general, to connectivity preserving deformations due to pressure, torsion, etc. As a practical example, we will report about extended tests on identification of minutiae using the entracer on the FVC database. Index Terms Fingerprint recognition, minutiae extraction, feature extraction, ridge tracing, minutiae duality. P. Mih˘ ailescu is with the Mathematical Institute, University of G¨ ottingen. K. Mieloch and A. Munk are with the Institute for Mathematical Stochastics, University of G¨ ottingen. November 2, 2007 DRAFT
Transcript
Page 1: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

Entracer - Entropy sensitive fingerprint feature

extraction.

Preda Mihailescu, Krzysztof Mieloch and Axel Munk

Abstract

We give a top - down description of a system of algorithms for fingerprint data extraction, to

be denoted as theentracer. The purpose of these algorithms is to optimally take advantage of the

inner structure of the ridge flow of a fingerprint. Aiming to develop new methods for matching and

classification, we train theentracer to extract a maximal amount of information present in a finger

image.

This is done in an adaptive way, which leads to good information and even performance gains with

respect to classical image processing strategies used in fingerprint recognition. The time gained can be

used for the improvement of the accuracy of the recognition,using feedback. Tracing is not sensitive

to warping and, in general, to connectivity preserving deformations due to pressure, torsion, etc.

As a practical example, we will report about extended tests on identification of minutiae using the

entraceron the FVC database.

Index Terms

Fingerprint recognition, minutiae extraction, feature extraction, ridge tracing, minutiae duality.

P. Mihailescu is with the Mathematical Institute, University of Gottingen.

K. Mieloch and A. Munk are with the Institute for Mathematical Stochastics, University of Gottingen.

November 2, 2007 DRAFT

Page 2: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 1

Entracer - Entropy sensitive fingerprint feature

extraction.

I. INTRODUCTION

Fingerprints have been used since more than one century for human identification. Prior

to computers, this was done exclusively for forensic use andthe matching of fingerprints was

performed by trained experts, following quite elaborate guidelines forvisual fingerprint matching

[1]. Experience lead to the choice ofminutiaeas the main identification items. Roughly, minutiae

arebifurcations and endings of fingerprint ridge lines. Specialized guidelines feature more than

a dozen additional types of minutiae, but in general a sufficient amount (between12 and18, in

various national legislations) of well identified endings and bifurcations are accepted as evidence

of identity. Although the minutiae are the primary criterion for identification, human experts take

all features of a fingerprint into account. Achieving such a performance with the aid of computers

is an open target and we attempt through this research to makea step in this direction.

In the last two decades, automated fingerprint recognition grew to a young discipline, reaching

maturity. A large amount of papers have been published and the state of the art is covered by

surveys and books ( [2], [3], [4], [?], among others). The reader interested in reviews of the state

of the art in fingerprint recognition may consult these publications and the secondary literature

of these sources.

The applications of fingerprinting go way beyond traditional forensics and a whole line of

products using fingerprints for various authentication requirements are already on the market. A

common limitation of the current methods is related to the fact that theAutomated Fingerprint

Identification Systems(AFIS) are strongly focusing upon the minutiae location, and as a con-

sequence hardly any of the additional information contained in a finger image is actively used

(see e.g. [2]). As already mentioned, this information is actively taken into consideration by

the human expert in the visual process of matching. The limitation is correlated with a lack of

image processing techniques designed specifically for the task of extracting complex information

features from fingerprint images. On the one hand, AFIS allows quick searches in large databases

resulting in small lists of matching proposal. On the other hand, the algorithms currently used

November 2, 2007 DRAFT

Page 3: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 2

in AFIS cannot reach the accuracy of human experts and that iswhy the final decisions are still

taken by experts. Extending the set of informations actively used by AFIS may improve this

situation, even if human experts cannot be replaced.

Some of the reasons leading to the above - mentioned limitations of AFIS are:

A. The use of pattern recognition techniques unspecific to the problem. Reinventing and adapt-

ing these techniques for the particular application of fingerprinting may result in several

improvements.

B. The focus on minutiae recognition. With image processing it is possible to identify most

of the passive information is used by human expert. This may be a lengthy process and

there is little experience concerning means by which this passive information may be used

for improving the performance of AFIS. In fact, recently, the necessity to take additional

informations, as for instance thelevel 3 fingerprint data– curvature, length, connectivity

and other topological properties – has become a concern in the biometrics community [5].

C. The fact that main partial problems of fingerprint recognition, like image enhancement,

orientation field extraction, skeletonizing, minutiae identification, etc.are mostly solved

independently of each other. These operations however have a deep correlation and treating

them as a sequence of independent processing steps may not beoptimal. The increasing of

the interdependency of tools used to address these various problems can lead to algorithmic

improvements and to a reduction of error rates.

The main purpose of our approach is to extract metric and topological information available

in a fingerprint and used by human experts in their identification work. The data is accessible

in simpledata structureswhich can be used for ulterior purposes, like classification, matching,

indexing or biometric security. Starting from the state of the art techniques used in fingerprint

recognition, we develop some new image processing approaches dedicated to the specific area

of application.

In Section II we give a general overview of the method denotedas theentracer; Section

III treats in more detail the concepts of entropy and recursion or feed-back which support our

approach and expand upon the relationship between orientation fields and tracing. Section IV

and V describe in more detail the building blocks – tools and primitives – of the tracing system.

In Section VI we give an overview of related work and Section VII presents results for the FVC

database on the accuracy of minutiae extraction, in comparison with other algorithms. The paper

November 2, 2007 DRAFT

Page 4: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 3

concludes in Section VIII with an overview of further applications of the tracing algorithm and

the data it extracts.

II. DESCRIPTION OF THE METHOD

The primary aim of our approach is to extract amaximal amount of relevant information

from a fingerprint. The typical data which we extract from a fingerprint includes for instance

currently less features, such as ridge connection information, data ridge curvature, connectivity

and neighboring relations of ridge segments.

Our data extraction approachmay differ from current ones in more than one aspect. Thus, we

attack the problems of orientation flow extraction, ridge and minutiae recognitionsimultaneously,

taking advantage of their interdependence. In doing this, we use a simple adaptive - orentropy

sensitive- approach.

Here the term of entropy is used in the intuitive understanding of density of information: thus

an area of good image quality, situated outside the zone between deltas and core has typically

smooth, clear ridge flow and, in our sense, low entropy. The algorithms are designed to be

particularly fast and efficient in such areas. Conversely, in areas with higher information density,

due either to particularities of the fingerprint or to noise,the algorithms may use iterations and

additional decision resources in order to complete the dataextraction. The mechanism invests

thus more effort in data extraction in zones of high information density: entropy sensitivity can

thus be considered as a form of data adaptive process. The idea of adaptive algorithmshas been

common for decades in pattern recognition, numerical analysis and statistical image analysis.

See for instance [?], where locally adaptive weights are used to improve the quality of noisy

images. It is also used in some other fields of pattern recognition such as OCR; it is, however,

with very few exceptions, not used in fingerprint recognition.

Extraction quality can be improved byrecursivity . In this way a first round of extraction

only treats theeasy(low entropy) areas, and the gathered information can be recursively used

as a guide for extraction indifficult zones. Designing robust image enhancement and extraction

techniques using feed-back is a topic which we shall treat indetail in later publications.

We give next some details about the method, which will allow abetter discussion of our use

of the notions of entropy and recursion.

November 2, 2007 DRAFT

Page 5: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 4

The information which we currently extract in addition to the relevant minutiae locations are

data such as:

• Complete ridge lines - based upon sufficiently dense interpolation points.

• Ridge curvatures.

• Graph connectivity of ridges.

• Neighboring relations of ridge segments.

• The same information for thenegative image(“valleys”).

The purpose of theredundant informationis obvious when considering the fact that data extrac-

tion as adecision process: the algorithm has to decide whether an encountered artefact is genuine

or generated by noise. Redundancy allows tovalidate features such as minutiae, connections,

etc., on base of several complementary data. Non - validatedfeatures are treated as uncertain,

but may be validated in the process of recursion.

Informations such as line connectivity can help in the latermatching process for deciding about

minutiae which, due to image distortions, cannot be identified by their geometric location data.

This adds to the metric matching process, such as currently used, and which is highly sensitive

to nonlinear distortions of the fingerprint images, the possibility of topological verifications, by

nature independent of metric data.

We envision the performer of the decision process of data extraction as a (software-based)

robot, which we denote byentracer. The data are extracted by the robot by following ridge lines

and using itsdecision toolsand the previously extracted data. As an example of the advantage of

parallel data extraction, one may consider the fact that many fingerprinting algorithmsskeletonize

the ridges (in the binary image) before actually searching for minutiae. Our experience shows

that these operations may be completed simultaneously withgain in timeand accuracy; for our

purpose, the skeleton is a side information of ridge tracingand minutiae localization which have

not been used so far.

The entracer receives a fingerprint image as input. It may write to one or more auxiliary images

in order to keep track of its state and it outputs the relevantextracted data in some linked lists

of labeled graphs. The vertices of these graphs are minutiaeand the lines are ridges connecting

the minutiae. The ridges are labeled with information allowing to recover their geometric shape,

length, curvature and neighboring ridge segments.

The reader should, however, bewarned not to identifythe fingerprint information with a labeled

November 2, 2007 DRAFT

Page 6: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 5

graph and then to deduce that matching may draw upon the experience of matching algorithms

in graph theory. The reason why this restriction to a labeledgraph is too information destructive

has to do with geometric properties such as adjacency of ridges and connected components or

ridge distanceof two points, that is the number of ridges crossed by the lineconnecting two

points. This information is of great importance for imprintmatching and it is not easily concealed

in a labeled graph.

Ideally, theentracerstarts scanning an image in an arbitrary point on a ridge and can follow a

ridge line while writing data to the auxiliary images and theoutput graph. The process isiterated

until the full image is marked as analyzed. Theentraceruses abag of toolsfor following the

ridge lines, making decisions about minutiae or local imageenhancements, etc. We shall discuss

below in more detail some typical tools which are implemented.

The ridge and thevalley line - images, or simply the white and black lines in a binarized

fingerprint, are naturally dual to each other. Ideally, bifurcations of the first correspond bijectively

to endings of the latter. Natural exceptions are encountered only at deltas; further exceptions are

consequences of noise and thus the location of dual minutiaecan be used as quality measure

for the extraction. This certainly not novel ( [3], p. 86) observation of theduality of ridge and

valley images becomes a fruitful resource for validating minutiae locations.

In image zones with moderate noise usually at least one of theridge or valley line flow

remains quite accurate. When thus a traced, e.g. ridge, lineis distorted by noise, it is possible

to use duality and proceed the tracing locally in the valley image. Tracing is herewith a data

extraction approach which takes advantage of duality. We shall give below several instances of

the current use of duality in early and advanced stages of thetracing process.

In highly blurred image parts, even using duality, a single tracing run is not sufficient for

deciding the correct ridge flow and eventual location of minutiae. More involvederror correcting

methods are called for in such situations.

Tracing relays on connectivity and is thus robust with respect to connectivity preserving

distortions. In particular, deformations arising in contact sensors are of less importance for

tracing.

November 2, 2007 DRAFT

Page 7: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 6

III. F INGERPRINT ENTROPY AND RECURSION

We shall now relate the intuitive notion of information density or entropy which we use to

the information theoretical one.

It is useful to consider the notion of anideal imprint which is blurred by a series of factors,

leading to the final scanned fingerprint image. The ideal imprint can be envisioned, for instance,

as one of the synthetical fingerprint images produced by programs like Cappelli’s [6]. The

possible blurring factors include scars, either natural oractivity related (mechanical, chemical,

etc.) skin degradation, as well as image capturing effects produced by grease, dirt, sweat, dryness

and further causes. Finally, one considers the image sum

Σ = I + B,

whereΣ is the scanned image,I is the ideal imprint of the finger andB is the sum of all the

distortions.

Accordingly, thefingerprint entropyin a neighborhood of one locationσ ∈ Σ is H(σ) =

H(i)+H(b), wherei ∈ I andb ∈ B are the corresponding locations inI, B, respectively. Since

B is essentially noise, the entropyH(b) is the classical entropy. The local entropy in the ideal

image is aridge entropy: it is a measure of the torsion and continuity of ridges.

The principle of recursion corresponds technically to the fact that conditional entropy is

always less than unconditional one; thus accumulated information is used to improve decisions

on uncertain events. We illustrate this principle with someaspects which have been already

implemented and lead to useful results.

• Recursive binarisation.A very powerful method of binarisation [7] uses a priori knowledge

about the orientation field; this is of course not available at the time of the first binarization.

In poor quality images we may improve binarisation, with very interesting consequences

for the quality of the overall data extraction, as follows: start with a simple binarization

followed by a stripped version of tracing which yields a robust orientation field.

The orientation field can be smoothened in the areas of poor image quality, by extrapolation

of the values in surrounding stable areas. Classical low pass filters can be used for instance

to this purpose, see e.g. [8]. The resulting orientation field can then be fed back into the

advanced binarization and the obtained image is then input to theentracer.

November 2, 2007 DRAFT

Page 8: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 7

Fig. 1. An example of scars. Left: Original grey level image.Middle: identification of scars by theentracer. Right: after

recursive bridging

• Concentrated use of duality and recursion. Accurate minutiae location and validation may

be difficult. In a first run of the tracer, one locates individually minutiae in valleys and

ridges. In a second analysis (recursion), one matches pairsof corresponding minutiae in

ridges and valleys, thus obtaining also their precise location. Minutiae matched in this way

are calledvalidated. Invalid minutiae are reanalyzed in a third recursion: theycan either be

discarded asspurious minutiaeor yield some useful additional information.

• Recursion and bridging.Bridging is the process by which two close endings with opposed

directions are under certain circumstances joined in the assumption that the line is interrupted

by noise. Note that in our definition, the noise is related to the ideal print, so it may well

be that the endings exits on the actual finger, but they do not correspond to assumptions

we make about the ideal image and are therefore discarded. The bridging is an a posteriori

decision, i.e. it is taken in presence of a full pair of finger graphs for ridges and valleys.

Thus, it is a particular instance of recursion. It also illustrates how invalid minutiae may

carry some additional information, for instance about

• Scars. A posteriori analysis (recursion) allows the identification of clearscars: these appear

as several pairs of opposed endings along the same ridge direction and are aligned in a

transversal direction to the local tangent field. See Fig. 1

While recursion refers here to the repetition of some data extraction process, we use in this

paper the related term ofiteration to describe a far simpler mechanism, occurring in the process

of tracing: the repeated positioning and orientation of theentracer.

November 2, 2007 DRAFT

Page 9: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 8

A. From orientation fields to the entracer.

We shall review below the relatively few tracing - related methods to be found in literature.

They may have different purposes from ours. Yet they are distinguished from the majority of

algorithms for fingerprinting by the fact that they are not bound to isotropic,window related

operations, but use directly the natural flow pattern of the finger. The visual impression of

fingerprints suggests that the effort for detecting the sametype of data - e.g., ridge orientation

- varies over the image: this is the effect of theridge entropyas introduced in the last section.

This suggest an adaptive, entropy sensitive tracing.

IV. TRACING PRIMITIVES

In our approach theentracer is defined in a top-down functional specification. Thus, at more

than one level of the specification, the tools designed for achieving given functionalities can be

instantiated in various ways. A learning by doing research reveals optimal methods for solving the

tasks of these tools. The description of theentraceris therefore made in some generality, while

following the lines of an existing implementation. The implementation confirms the realizability

and usefulness of the concepts and shall be illustrated below by its capacity to localize minutiae

correctly.

The entracer interacts with one of

1. The input image (Input).

2. The auxiliary files and images (Input/Output).

3. The extracted data structures (Output).

The images are all of the same size, represented by Cartesiancoordinates1 ≤ X ≤ n; 1 ≤

Y ≤ m. The entracer itself keeps track of its own current locationT (X, Y ) and uses thetools

for tracing ridge lines and extracting data. The tools are built upon tracing primitives. We shall

consistently consider the tracing of ridge lines; the operations for valley lines are identical. When

performed in parallel, they may influence each other, providing mutual information; this fact is

omitted in this paper. We sort the tracing primitives according to the files and structures with

which they interact.

November 2, 2007 DRAFT

Page 10: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 9

Fig. 2. Image from the FVC2002 [9] database (databaseDb2 a, image15 1). On the left the original, in the middle is presented

the image after binarization and border determination, on the right: graph with minutiae as the result of tracing the valleys

A. The finger image and its tracing primitives

The input image I = P (X, Y ) : 1 ≤ X ≤ n; 1 ≤ Y ≤ m represents a fingerprint and we

assume that the border of the actual finger has been previously determined, in such a way that

the pixels outside of the fingerprint are marked by unique values, which are distinct from pixel

values of the fingerprint (see Fig. 2).

Tracing is possible for grey level images using essentiallythe same primitives we shall

describe. This has some relevance in particular for emerging touchless sensors, [10]. We restrict

our attention in this paper to binarized input images and primitive instantiations will be described

based on this assumption1. Our experience shows that grey level tracing poses in general more

problems then binarization followed by binary tracing; thegrey level information can be stored

for additional processing only in the areas which could not be ”solved” in the binary image.

The pointsP (X, Y ) may have one of the valuesR, V, B, U , whereR andV stand for ridge

and valley,B for border and the additional possibilityU - undecided - is reserved for unclearly

binarized points.

1We shall, however, mention a binarization method, which uses theentracer.

November 2, 2007 DRAFT

Page 11: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 10

The major primitives for reading an input image are thelocation, direction and ending

primitives. The location primitive decides whether a pointP (X, Y ) ∈ I belongs to a ridge

or valley. Ideally, this decision may be taken by solely considering the value of the pixel under

consideration; this is the simplest realization of this primitive. In presence of noise such a

decision is mostly inaccurate; the primitive has to optimally use context information for giving

a good decision with a minimal amount of work.

A first practical specialization distinguishes betweeninitial location - andborder detection -

primitives. The first is used for choosing a starting point for the tracing of a ridge line. In some

cases it may draw back upon some reliable information about already traced adjacent lines. It

must also give reliable decisions in absence of such information and is thus the more delicate

localization primitive: it will decide by analyzing a larger neighborhood of the pointP (X, Y ).

Since it is easiest to perform tracing when following the median line of a ridge, acentering

primitive will be used for positioning a localized ridge point in the center of a ridge for subsequent

tracing. Centering is a tool of initial location and for relocation.

The border detectionis a simpler form of initial ridge point location. It is used in the context

of tracing as follows: starting in a centered ridge point, one follows a line and needs to decide

when this line exits the traced ridge (thus entering a valleyarea). The contextual information is

higher in this case, and thus the primitive simpler - and alsomore often used. We note however,

that a border detection based only on one change of pixel values along a line is often inaccurate

and more environment data have to be taken into consideration.

The direction primitive decides between a fixed set of discrete angles, thedirection in which

the traced ridge proceeds. Thus, starting from theentracerpositionT (X, Y ), the discrete lines

with prescribed discrete angles are followed using the border location primitive for establishing

the point where they leave the traced ridge. The angle corresponding to the maximal line within

the traced ridge will then be chosen as current direction of the tracing. This leads to repositioning

of the entracer followed by its centering. Direction choice can also use contextual information

- either from the current direction of the ridge line in theentracer’s positionT (X, Y ), or, when

starting the tracing of a new ridge, from adjacent tangent field information gathered in auxiliary

files from previously traced ridges.

Finally, theending- primitive decides where a ridge ends. This may be a border point, or a

proper ridge end. In these cases the decision is made by interacting only with the input image.

November 2, 2007 DRAFT

Page 12: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 11

A scanned ridge line may also end when hitting an already analyzed ridge line; in this case

one finds a ridgebifurcation and the decision results by interacting also with the auxiliary files

in which scanned areas are marked. Note that ridge scanning may start in any point of a ridge

and follows then one initial direction. Theentracerhas to keep track of the starting point and

direction and after hitting an end it will reposition in the starting point and complete the ridge

scanning in the direction opposite to the starting direction until hitting a new end.

B. The auxiliary images and their primitives

Thetrack - image is an auxiliary image, in which the tracer marks the scanned areas. One may

additionally use atangent field - image for storing scanning directions identified by the direction

primitives. Thestarting point grid is a two dimensional array of equally spaced points, with

relative distance approximately equal to the ridge width. This grid is used for testing possible

start points for entracing and marking all used points.

C. Thefinger data structure

The finger data structure is a linked list - a graph - ofridge segments. Conceptually, a ridge

segment is the section of a ridge between two endings, bifurcations or border points. The ridge

segment itself carries additional detail. Such are the intermediate center points located at small

distance - typically a ridge width - from one another, together with their local direction. Segment

length and maximal curvature are additional informations which are stored in a segment. The

nodesor ridge endingsare the dual to segments. Thus segments point to nodes and nodes point

to all segments ending there (more than one segment is ending in a node, exactly when the node

is a bifurcation). The tracer writes data to local segments and inserts the results in the finger

data structure at completion of a segment tracing. In a postprocessing step, the adjancence of

ridge segments is marked in both dual images, in view of ulterior applicaitons to matching and

security.

V. TOOLS AND ERROR CORRECTION

The design of theentraceris illustrated by the metaphor of a flat robot tracing the borders of

a discontinuous track – the ridge lines. The tracks borders may be interrupted by pebbles spread

along the track (noise).

November 2, 2007 DRAFT

Page 13: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 12

Fig. 3. Aura in a starting point (on the right) and in a following point (on the left)

A human operator (initial location primitive) places the robot on the track. The robot cannot

look much ahead, but the trained one quickly identifies the road direction and proceeds along

the way, keeping close to the middle of the road; it can pass over isolated pebbles but recognizes

when the pebble density is such that he probably crossed the road edge, and then corrects his

direction. The entracer’s way of “looking ahead” consists in stretching out “feelers”; anentracer’s

feeler Φα is a directed line segment with direction

Φα(X, Y ) = (X, Y ) + ⌊m · (cos α, sin α)⌋ : m ∈ N ,

starting at theentracer’s current position. Theangle α of the feeler is the angle between this

segment and the positive axes of the abscissae and in this context, the brackets(X, Y ) denote

the unique anglemod 2π, determined by the vector from the origin to the point of Cartesian

coordinates(X, Y ) and thex - axes. Aborder locationprimitive glides along the segment and

identifies the next border position. The border locator is thus part of the feeler’s mechanism,

the setΦα is its support. The feeler’s action can be described by a function which associates to

a givenentracer - point T (X, Y ) on a ridge the next border crossingBα(X, Y ) in the feeler’s

directionα. This also determines the angular border distance

lα(X, Y ) =| (X, Y ) − Bα(X, Y ) |,

which is of subsequent relevance.

In order to determine the optimal direction for continuing along the track, various directions

must be scattered. The tool for choosing the optimal direction is called anAura :

Ω(X, Y ) = Φα : α ∈ A(Ω) ∪ α0.

Here,α0 is the previous direction of movement by which the point(X, Y ) was reached by the

tracer. It is thus undefined in a starting point and defined otherwise. If α0 is undefined, the

direction setA(Ω) is simply a discrete set of equidistant angles in the circle.Otherwise,A(Ω) is

November 2, 2007 DRAFT

Page 14: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 13

Fig. 4. Set of angular border distances

a smaller subset of the circle angles, which defines a sufficiently large cone symmetric around the

directionα0: even at narrow cores, ridges do not take abrupt turns, but rather change smoothly

their direction, while the current border distances along the movement direction decrease. An

example of direction restricting is shown on Fig. 3.

In a cynetic view of the tracing process, this would correspond to the fact that theentracer

can drive fast along close-to-straight ridge sections (long maximal border distances), while it

must slow down at turns. The informationλΩ gathered by an aura is a set of distances to the

border along the aura directions (angular border distances, see Fig. 4):

λΩ(X, Y ) = lα(X, Y ) : α ∈ A(Ω).

For the convenience of ulterior decisions, the angles inA(Ω) come reordered according to

decreasing values oflα; thus lαi, i ≥ 1 is the i−th largest border length. Together with this set

of distances, the aura also outputs the related set ofcentered remote points:

ΓΩ(X, Y ) = Cα(X, Y ) : α ∈ A(Ω).

If Bα(X, Y ) is the angular border point found by the feelerΦα(X, Y ), then the corresponding

centered point is determined by a centering primitive whichfinds a close ridge point situated at

the center of the ridge. Centering has multiple advantages:the most immediate is that it makes

it easy to decide whether the target point hits an already traced region. This would indicate a

closebifurcation. The aura output must be processed by theentracer in order to proceed the

tracing. For this it must decide about one from a set of possible events. For each event there

is a dedicatedevent analyzer: a tool which sorts out the odds that the given event occurs. We

describe next the simpler events and their analyzers.

November 2, 2007 DRAFT

Page 15: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 14

Fig. 5. An example of bridging with use of neighborhood information.

The continuation event is merely the case in which the ridge continues in a direction α1. In

this case the tracer is moved from(X, Y ) to the remote centered pointCα1(X, Y ), the current

directionα0 is set toα1 and the tracing process is iterated. Continuation is clear when the angular

border distancelα(X, Y ) is large enough (typically more than two ridge widths) and a small

environment ofCα1(X, Y ) does not belong to an already traced region. If all angular border

distances are small (of the order of magnitude of one ridge width, say), we have the indication

of a probableending event. Since endings are the most common false artefacts, the analyzer

must perform a series ofconfirmation testsbefore declaring the tracer position as ending. If the

ending is confirmed, the center of the ending line is added to the minutiae list of the finger data

structure. Theentraceris repositioned to the starting location of the current segment, and tracing

is continued in the opposite direction. If this task had already been completed, the segment is

closed. Confirmation/validation tests are performed byerror correctors.

A simple example is thebridge corrector. This tool verifies whether it is possible or not to

continue the ridge across a small interruption due to noise.It says whether building abridge

beyond the supposed ending is consistent with the larger environment data. Given duality, a good

indication for the possibility of bridging is the absence ofa bifurcation of the valley around the

supposed ending. Another necessary condition is the presence of a ridge of equal direction

beyond the bridged interruption (See Fig. 5). Bridging can be decided on line (i.e. at tracing

time) and a posteriori, in recursion: the first case occurs inevident situations, for instance at

very short interruptions of a clear ridge. Recursion allowsusing more information in the case

of larger gaps to bridge.

If the possibility of bridging is confirmed, then the bridgedposition is stored to a separate data

structure which shall be used for a posteriori identification of scars. Then tracing is continued

across the bridge.

November 2, 2007 DRAFT

Page 16: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 15

Fig. 6. Traced line and the bifurcation event

Fig. 7. Bifurcation before and after validation

If the border locator reports meeting of another trace line,this indicates abifurcation (Fig.

6). The context is passed on to a bifurcation confirmation tool. By duality, error correctors for

valley endings can be used in this case. However, when closing confirmed bifurcations, some

extra points have to be considered. First, the multiplicityof the bifurcation has to be determined

separately. Further, in the case of an a priori bifurcation,(at least) two new segments start at the

bifurcation. They must be marked open for ulterior tracing.In the a posteriori case, an existing

segment – which is encountered by the currently traced one, yielding the bifurcation – is split

in two by the minutia found. This fact has to be reflected in thefinger structure, too. With the

exception of singular points, to each bifurcation corresponds an ending in the dual area. That

fact is used forvalidation of minutiae. A minutia is said to be validated if its dual counterpart

is found, see Fig. 7.

The iteration works based upon theStart point grid Γ, as follows: a first starting point

S1(X, Y ) ∈ Γ is searched, for instance on the medial line of the finger image, possibly far

away from the core zone of the finger. The initial location primitive decides whether this is a

valid starting point2. Subsequently, the ridge to whichS1 belongs is traced in both directions

until endings or border points are reached. After that, the image is scanned in the orthogonal

direction to the ridge throughS1 for a new valid starting pointS2. Invalid starting points are

2In the first iteration, invalid starting points may occur outside of the finger area. In later iterations, one also checks that the

start point is not in a traced area

November 2, 2007 DRAFT

Page 17: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 16

marked inΓ; valid starting points are also marked, after completion ofthe tracing cycle starting

in those points. The process is iterated in both directions until the image border is hit. Normally,

when this process is closed, the whole image may have been scanned. However, the termination

decision is made on the base of the marked points in the starting point grid. Termination is

confirmed by the fact that the number of marked points inΓ grows at each iteration.

VI. RELATED RESEARCH

We shall give a brief review of the papers which use tracing orrelated ideas. These do not

exploit the full potential of the approach and have mostly the target of extracting minutiae and

the reported results may be related to images which are not inthe public domain. The next

section will reflect our results in the particular application of the entracer to minutiae extraction

and provide some partial base of comparison.

In the seminal paper of Maio and Maltoni [11] and several follow up papers [12], [13], ridge

tracing in grey value images is proposed. The tracing is performed by investigating data along

segments normal to the ridge flow. The papers of Maio and Maltoni are a reference in the domain

of tracing and no later attempt to use this method for incorporating additional fingerprint features

in the matching process is known to us.

There are fine differences between various approaches to tracing. The tangential ridge tracing

which we perform in binary images allows adaptivity. Thus, few decisions are necessary in

areas with stable ridge flow. In the normal approach of Maio et. al., the ridge lines are scanned

equidistantly, without using preexisting information. Chang and Fan [13] have considered a

variant of normal tracing, in which a some adaptivity is usedin the sense that the ridge is

scanned only every few pixels rather than every pixel like inthe original method. Interestingly,

in [13] the quality of extracted minutiae is referred to a setof data extracted by using the same

method with scanning step1, thus essentially the results of Maio and Maltoni – and not bya

human expert, as common in the context. The authors use then the same method, dropping the

scanning distance gradually from 2 to 10 pixel, with sensible loss of accuracy. In comparison,

the entracer has a scanning step which may vary between1 − 2 ridge widths (10 − 20 pixels)

in the core zone to4− 6 ridge widths in external zone of smooth ridge flow. The quality is not

decreased by the large scanning step, which is determined interactively at every position from

the quality of the data. Jiang, Ser and Yau [14] use an improved adaptive gray level tracing

November 2, 2007 DRAFT

Page 18: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 17

10 1 47 1 11 8

Fig. 8. Sample fingerprint impressions from the database [18], with good quality on the left and bad on the right.

method and show that its matching performance is comparableto the results of single step gray

level tracing. They do not consider the quality of minutiae extraction. Liu, Huang and Chang

[15] make also use of the surrounding furrows in their gray level tracing algorithm.

We believe that these concrete figures suggest the fact that the simple word “adaptivity” or

“entropy sensitive” cannot sufficiently describe a method or process. A further decision concerns

the use of grey level or binary images for tracing. Grey levelwas traditionally chosen for the

reason it contains more information. This may make tangential tracing and thus high scale

adaptivity difficult, while the normal scanning involves some operations which are common also

for binarization. There appears to be evidence that binary level tracing together with the storage

of grey level data is an efficient compromise.

An idea related to tracing and which followsbordersof ridge lines has been proposed recently

in the literature [16], [17]), as an alternative to skeletonizing. The authors use chain codes and

run length codes. The performance for minutiae extraction is given explicitely in [17], yet it lays

below the methods based on grey-level tracing discussed above.

VII. PRACTICAL EXAMPLES

The entracer algorithm has been tested on fingerprint images from FVC 2002[18]. The

segmentation of the images was done as in [19] and smoothing and binarization are based on

ideas from [19].

In order to examine the quality of the algorithm, the qualityof the extracted minutiae is being

tested. The tracer was run on a database containing 123 fingerprint images. The true minutiae

November 2, 2007 DRAFT

Page 19: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 18

10 1 47 1 11 8

Fig. 9. Minutiae extracted by theentracer, for fingerprint images from Fig. 8.

positions, directions and types were manually marked. Fromthe FVC2002 Db2a database we

took three first impressions from fingers with indexes from 10upto 50. Three examples with

different quality are shown in Fig. 8. The quality of the images is variable and for images in the

lower quarter of quality, the placing of minutiae is not an obvious decision, even for a human

expert. Image 118 is a ponderate example from this range.

The Fig. 9 presents results of minutiae extraction and the Fig. 10 and 11 display samples of

ridge extraction by theentracer.

In order to evaluate the quality of extracted minutiae features, the following concepts are

defined [20] [21]:

Matched minutia A true (marked) minutia that was matched within the given tolerance by

one detected by the algorithm.

Missed minutia A true minutia that was not identified within the given tolerance. The

tolerance is set to|Mp − Np| < tp and cos ∠(Md, Nd) > td, whereMp

is the position of the minutia andMd is a vector pointing along the minutia

direction. The constants were set totp = 10, td = 0.96 (corresponding to

an angle of15 degrees).

Spurious minutia A minutia detected by the algorithm which lays in a region containing no

true minutia.

Flipped minutia Detected minutia type is different from thetrue minutia type.

Given a minutiae setE extracted by our algorithm and a setG of true (expert marked)

minutiae, we consider the following sets:

November 2, 2007 DRAFT

Page 20: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 19

TABLE I

DETAILED RESULTS FOR THE FINGERPRINT IMPRESSIONS FROMFIG. 8

Image |G| |E| |M | |S| |CC| |M |/|G| |S|/|E| |CC|/|C|

10 1 33 31 2 0 29 0.061 0 0.935

47 1 42 38 4 3 30 0.095 0.079 0.882

11 8 20 12 5 3 12 0.25 0.25 0.556

• S = E \ G - set of spurious minutiae

• M = G \ E - set of missed minutiae

We split the setC = E ∩ G of correctly extracted minutiae into two sets:

• FC - set of flipped minutia

• CC - minutiae with correctly extracted type

In order to describe the accuracy of minutiae extraction letus define following quantities [22]:

• |M |/|G| - the proportion of missed minutiae

• |S|/|E| - the proportion of spurious minutiae

• |CC|/|C| - the proportion of correctly classified minutiae.

The performance for images from Fig. 8 is illustrated in the Table I. Here are some comments

about the more frequent sources of error. Spurious minutiaeare naturally connected to regions

with high noise and can hardly be avoided, unless one uses involved smoothing techniques which

would falsify the quality of the results. The loss oftype information of the minutia happens in

the preprocessing and the extraction is consistent with thetype in the binary image.

Note that with very few exceptions, at least18 − 20 minutiae were correctly detected, while

the average is close to30. Assuming that12− 18 minutiae pairs are enough to ensure a legally

positive identification, we see that even the higher values of |M |/|G| are still admissible. The

same holds for the value1 − |CC||C|

, since some AFIS do not use the minutiae type information.

However, most matching methods are very sensitive to the existence of spurious minutiae and

consequently the value|S|/|E| should be low.

We attempted to compare our method to the line following method in the grey fingerprint

November 2, 2007 DRAFT

Page 21: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 20

TABLE II

RESULTS FOR ALL123 FINGERPRINT IMPRESSIONS IN THE DATABASE.

|M |/|G| |S|/|E| |CC|/|C| |CC|

Mean 0.042 0.083 0.815 30.825

Standard deviation 0.058 0.069 0.094 7.38

TABLE III

COMPARISON WITH GREY LEVEL LINE FOLLOWING

missed minutiae spurious minutiae minutiae with swapped type

grey level line tracing 0.07 0.57 0.17

our method 0.042 0.083 0.815

image of Maio and Maltoni, [11]. As mentioned above, this is the leading method up to date.

The set of13 images on which the results of that paper are established is however not public

and a direct comparison was not possible. Hence, we decided to pursue the following strategies:

A. Comparision with an own implementation of the method of Maio and Maltoni on the same

data base we used.

B. Comparing directly to the results of [11], on base of different images.

The results for A. are shown in the Table III. We note a high amount of spurious minutiae,

suggesting that Maio and Maltoni did use some additional filter which is not described in the

paper [11]; the fact that their method is prawn to generatingnumerous spurious minutiae is also

suggested that a follow up [12] uses neural networks for the elimination of such errors. The

tracing in binary has not this problem, and it is conceivablethat the parallel tracing approach we

use (in contrast with the orthogonal one of Maio and Maltoni)might help also in the grey level

images). The comparison B. is also encouraging for our method, since the results are slightly

better, although the data base is larger and the variance relatively big. Certainly the comparison

is not conclusive, since we have no information about the quality of images in the database of

[11].

Finally, we measured the minutiae extraction goodness by evaluating the influence on match-

ing. The fingerprint impressions from a FVC database were matched according to the FVC

November 2, 2007 DRAFT

Page 22: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 21

TABLE IV

EQUAL ERROR RATES

Neurotechnologija Entracer

FVC2002 db2 1.056% 0.953%

FVC2000 db3 7.692% 7.253%

10 1 47 1 11 8

Fig. 10. Ridge graphs of fingerprint impressions from Fig 8. Traced in white.

protocol [9], which results in 2800 genuine and 4950 false matchings. We used for preprocessing

of fingerprints and matching of extracted minutiae the VeriFinger software [19]. The equal error

rates for minutiae extracted with VeriFinger software and our method are presented in Table IV.

VIII. C ONCLUSION AND FUTURE WORK

Theentracerdistinguishes itself from other methods for fingerprint recognition by its adaptive

strategy of data extraction, the possibility to use recursion and the embedding of minutiae in the

finger graph containing ridge information like connectivity, adjacency, cuvature and length. Apart

from that, several basic ideas implemented in the elementary primitives are certainly common

points in the automated fingerprint recognition. For instance, the tracer direction is identical to

the local tangent vector and the idea of finding such a vector as the direction with the least

colour fluctuations (or the normal to the one with the most fluctuations) along a sufficiently

long segment (say of four to six ridge width) is one of the simplest ideas used in the classical

methods for computing the tangent field. This is essentiallywhat the initial location primitive

also does, by using the aura. The way the idea is then used is, however, different. As presented

November 2, 2007 DRAFT

Page 23: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 22

10 1 47 1 11 8

Fig. 11. Ridge graphs of fingerprint impressions from Fig 8. Traced in black.

above, by using the entracing approach one tries to adapt thecomputational effort to the image

- inherent variations of information, which is a classical goal of adaptive algorithms.

In this paper we gave accurate functional specifications of purpose and hierarchy of the

entracerand its parts/primitives.

The extraction process performed by an entracer serves varoious purposes. Comparing to state

of the art is possible for a variety of targets, of course. We have treated in this paper the quality of

minutiae extraction. Subsequent papers shall consider theapplications of theentracerto the key

problems of fingerprinting: matching, indexing, classification and security; the primitives used

are the same. We recently pointed out [23] that the use of fingerprints in connection with the

fuzzy vault scheme of Juels and Sudan [24] is insecure. Additional information such as extracted

by entracing can be used for raising the security of the vaultto cryptographical standards [23].

Some authors consider that new sophisticated models are called for in order to cope with

the problems posed by poor image quality [2]. Furthermore, we believe that fingerprints are an

empirical knowledge item and models need field confirmation.Any field research is dependent

on the interface by which it processes its data, and in the case of field tests on fingerprints such

an interface needs to be automated. Our approach of extracting the maximal possible amount

of significant data from a finger image can be useful also for storing data bases of reusable

information gathered from field tests. In such contexts restricting solely to minutiae data may

be insufficient.

November 2, 2007 DRAFT

Page 24: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 23

ACKNOWLEDGEMENTS

The authors acknowledge the support of the projectExplicite and algorithmic methods in

number theory, cryptology and pattern recognition, by theVolkswagen foundation, for the first

author, and theDFG, Graduiertenkolleg 1023Identification in mathematical models, for the

second.

REFERENCES

[1] A. K. Jain, L. Hong, S. Pankanti, and R. Bolle, “An identity-authentication system using fingerprints,”Proc. IEEE, vol. 85,

no. 9, pp. 1365–1388, Sept. 1997.

[2] A. K. Jain and S. Pankanti,Automated Fingerprint Identification and Imaging Systems, ser. Crc Series in Forensic and

Police Science. CRC Press, 2001, ch. 8, pp. 275–326.

[3] D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar,Handbook of Fingerprint Recognition. New York: Springer, 2003.

[4] N. Ratha and N. Bolle,Automatic Fingerprint Recognition Systems. Springer Verlag, 2004.

[5] A. Jain, Y. Chen, and M. D. Demirkus, “Pores and ridges: High-resolution fingerprint matching using level 3 features,”

vol. 29, no. 1, 2007, pp. 15–27.

[6] R. Cappelli, A. Erol, D. Maio, and D. Maltoni, “Syntheticfingerprint-image generation,” inProc. of 15th International

Conference on Pattern Recognition (ICPR2000), vol. 3, 2000, pp. 475–478.

[7] Y. He, J. Tian, X. Luo, and T. Zhang, “Image enhancement and minutiae matching in fingerprint verification,”Pattern

Recognition Letters, vol. 24, pp. 1349–1360, 2003.

[8] L. Hong, Y. Wan, and A. Jain, “Fingerprint image enhancement: Algorithms and performance evaluation,”IEEE

Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, pp. 777–789, 1998.

[9] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, “FVC2000: Fingerprint verification competition,”IEEE

Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 3, pp. 402–412, 2002.

[10] G. Parziale, “Touchless fingerprinting tehcnology,” in Advances in Biometrics: Sensors, Algorithms and Systems, N. K.

Ratha and V. Govindaraju, Eds.

[11] D. Maio and D. Maltion, “Direct gray-scale minutiae detection in fingerprints,”IEEE Transactions on Pattern Analysis

and Machine Intelligence, vol. 19, no. 1, pp. 27–40, 1997.

[12] D. Maio and D. Maltoni, “Direct gray-scale minutiae detection in fingerprints,”IEEE Transactions on Pattern Analysis

and Machine Intelligence, vol. 19, no. 1, pp. 27–40, 1999.

[13] J. Chang and K. Fan, “Fingerprint ridge allocation in direct grey-scale domain,”Pattern Recognition, vol. 34, pp. 1907–

1925, 2001.

[14] J. X., Y. W., and S. W, “Detecting the fingerprint minutiae by adaptive tracing the gray-level ridge,”Pattern Recognition,

vol. 34, pp. 999–1013, 2001.

[15] H. Liu and Chang, “Direct minutiae extraction from gray-level fingerprint image byrelationship examination,” in

International Conference on Image Processing, vol. 2, 2000, pp. 427–430.

[16] Z. Shi and V. Govindaraj, “A chaincode bsaed scheme for fingerprint feature extraction,”Pattern Recognition Letters,

vol. 27, no. 5, pp. 262–268, 2006.

November 2, 2007 DRAFT

Page 25: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 24

[17] J. Shin, H. Hwang, and S. Chien, “Detecting fingerprint minutiae by run length encoding scheme,” vol. 29, pp. 1140–1154,

2006.

[18] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, “FVC2002: Second fingerprint verification competition,”

in Proc. Int. Conf. on Pattern Recognition (16th), vol. 3, 2002, pp. 811–814.

[19] Verifinger, “Neurotechnologija.”

[20] C. Wu, Z. Shi, and V. Govindaraju, “Fingerprint image enhancement method using directional median filter,” inBiometric

Technology for Human Identification, Proceedings of the SPIE, A. K. Jain and N. K. Ratha, Eds., vol. 5404, 2004.

[21] N. Ratha, S. Chen, and A. Jain, “Adaptive flow orientation-based feature extraction in fingerprint images,”Pattern

Recognition, vol. 28, no. 11, pp. 1657–1672, 1995.

[22] J. Cheng and J. Tian, “Fingerprint enhancement with dyadic scale-space,”Pattern Recognition, vol. 25, pp. 1273–1284,

2004.

[23] P. Mihailescu, “The fuzzy vault for fingerprints is vulnerable to brute force attack.” [Online]. Available:

http://arxiv.org/abs/0708.2974v1

[24] A. Juels and M. Sudan, “A fuzzy vault scheme,” inProc. of the IEEE International Symposium on Information Theory,

2002, p. 408.

PLACE

PHOTO

HERE

Preda Mihailescu (Prof. Dr. Math.) is professor for Explicite Methods in Number Theory and Pattern

Recognition financed by the Volkswagen Stiftung at the University of Gottingen. He received his Masters

Degrees in Mathematics and in Computer Science from the polytechnic Institute ETH in Zurich, 1981,

resp. 1986 and his PhD in mathematics in 1997, also in Zurich. He worked from 1985 to 2000 in the

industry in the domains of numerical analysis and IT - security and cryptography. He is a professor since

the year 2003, with interests ranging from diophantine equations and computational number theory to

biometry and applications to IT - security.

PLACE

PHOTO

HERE

Krzysztof Mieloch (M. Sc.) received his degree in computer science from the University of Wroclaw,

Poland in 2002 and the degree in mathematics from the University of Gottingen, Germany in 2003. Since

2003 he is pursuing research towards a PhD at the Institute for Mathematical Stochastics, University

of Gottingen, Germany. He is a member of the Graduiertenkolleg 1023. His research interests comprise

mathematical methods in image analysis, particularly in the analysis of fingerprints.

November 2, 2007 DRAFT

Page 26: Entracer - Entropy sensitive fingerprint feature extraction. · Entracer - Entropy sensitive fingerprint feature ... ridge tracing, minutiae duality. P. Miha˘ilescu is with the

IEEE TRANSACTIONS ON 25

PLACE

PHOTO

HERE

Axel Munk (Prof. Dr. rer. nat.) is director of the Institute for Mathematical Stochastics, University of

Gottingen, Germany. He received his degree in mathematicsand his PhD from the University in Gottingen

in 1992 and 1994, respectively. His current research interests include non-parametric statistics and statis-

tical inverse problems. In 1992 Axel Munk received the Gustav Adolf Lienert Award of the International

Biometric Society, German Section. From 1992 to 1994 he was supported by the ”Studienstiftung des

Deutschen Volkes”, and afterwards by the German Research Foundation (DFG) until 1995. He recently

(2005/06) was awarded a research semester on ”Inverse Statistical Problems under Qualitative Prior Information” by the German

Research Foundation (DFG). Axel Munk is guest editor of Statistica Neerlandica, Drug Information Journal, and Biometrical

Journal.

November 2, 2007 DRAFT


Recommended