Abstract
In biometric identification systems, the identity corresponding to the query image is determined by comparing it against all images in the database. This exhaustive matching process increases the response time and the number of false positives of the system. This chapter presents an efficient indexing algorithm for fingerprint databases to improve the search speed and accuracy of identification. A variant of Delaunay triangulation called extended triangulation is used to make the system robust against distortions. Then the triangles are partitioned into groups such that the retrieval algorithm searches in reduced space of the database. Experiments are conducted on different fingerprint databases, and the results show that while maintaining high hit rate the proposed method achieves lower penetration rate than what existing methods achieve.
Access provided by CONRICYT-eBooks. Download chapter PDF
Similar content being viewed by others
Keywords
2.1 Introduction
Nowadays, the increasing use of biometrics for personal identification in various applications has lead to increase of some large-scale biometric databases in real time [1,2,3,4,5,6,7,8,9]. However, identifying a user on such huge databases using a linear matching process makes the system extremely slow. Boro et al. [10] extracted the minutiae points of the fingerprints and mapped them into a hash table using geometric hashing [11]. Similarly, Hunny et al. [12] extracted the key features of iris using scale invariant feature transform [13, 14] and mapped them with the help of geometric hashing. However, the above methods require high computational and memory costs as each feature is inserted multiple times into the hash table to handle the intra-class natural variations. The triplets have been successfully used to index biometric databases [15, 16]. The triplet-based techniques have proven more powerful than point-based techniques, as the uncertainty of feature points and intra-class natural variations do not affect the angles of a triangle. In this chapter, we propose an efficient triangulation-based approach for indexing fingerprint databases. This work enhances the Delaunay triangulation to make the system robust against biometric distortions.
2.2 Indexing Framework
The proposed indexing approach follows these steps: extraction of minutiae features from fingerprint images. Then, for each fingerprint, its Delaunay triangulation is computed using the extracted minutiae features. Next, a robust representation is defined for the fingerprints known as extended triangulation which is a enhanced model of Delaunay triangulation [17]. Finally, the computed extended triangulation is classified such that the retrieval algorithm searches in reduced space of the database. The overview of the indexing framework is shown in Fig. 2.1. Various steps involved in the indexing process are discussed in the following:
2.2.1 Minutiae Extraction
In this work, the minutiae are considered as the key features for the fingerprints. The minutiae points considered are (i) bifurcation points and (ii) end points. A bifurcation point is a point where the ridge forks or diverges into branch ridges. An end point is a point where a ridge ends abruptly. To extract the minutiae features from the fingerprint images, we used the Nuerotechnology VeriFinger SDK [18]. A sample fingerprint and its extracted minutiae are shown in Fig. 2.2 (bifurcation points are represented with circle symbol and end points are represented with square symbol).
Let \(p = (x,y,t,\theta )\) be a minutiae feature point of a fingerprint, where (x, y) is its position in the fingerprint, t is its type (fork or end), and \(\theta \) is its orientation or angle with respect to x-axis. The process of computing the minutiae orientation is shown in Fig. 2.3. The orientation of a minutiae point (either bifurcation or end) is measured by calculating the angle between the tangent to the ridge line at the minutiae position and the x-axis.
2.2.2 Computation of Delaunay Triangulation
Once the minutiae features have been extracted, their Delaunay triangulation is computed. Let \(P = \{p_1, p_2, ...,p_n\}\) be the set of extracted minutiae points from a fingerprint. Then the Delaunay triangulation T of minutiae set P is a maximal planar subdivision in which no edge connecting two vertices can be included to it without destroying its planarity. Delaunay triangle contains no other point of P in its circumcircle. Figure 2.4 shows the Delaunay triangulation of the minutiae for one of the fingerprints. The motivation of using Delaunay triangulation in this work is that the Delaunay triplets possess certain unique properties compared to other topological structures [19,20,21], including the following:
-
1.
Delaunay triangulation partitions a whole region into many smaller pieces and exactly describes the closest neighbor structures of minutiae.
-
2.
Insertion of a new point in a Delaunay triangulation affects only the triangles whose circum circles contain that point. As a result, noise affects the Delaunay triangulation only locally [20];
-
3.
The Delaunay triplets are not skinny which is desirable as the skinny triangles lead to instabilities and errors.
-
4.
The Delaunay triangulation creates only O(n) triangles when compared to the approaches in Germain et al. [15] and Bhanu et al. [16] which uses all possible triangles of minutiae set in the fingerprint, and therefore O(\(n^3\)) triangles have to be compared during indexing. Hence, computing cost greatly decreases using Delaunay triangulation.
-
5.
Compared to other topological structures, the Delaunay triangulation is less sensitive to distortion.
However, the noise seriously affects the Delaunay triangulation structure which is a common problem in image processing. Figure 2.4a, b shows one such example with spurious minutiae for two fingerprints of the same user. So, to minimize this, the Delaunay triangulation is enhanced to form a new structure called extended triangulation [17].
2.2.3 Retrieval of Extended Triplet Set
Let T be the Delaunay triangulation of a fingerprint with minutiae set \(P = \{p_1, p_2,...,p_n\}\), and \(G = \{P,E\}\) is its Delaunay graph; where E is its edge set. Before defining the extended triangulation of P, let we first explore the triangular hull of a point \(p_i \in P\). Let \(N_i = \{p_j | (p_i, p_j) \in E\}\) be the set of neighborhood minutiae of \(p_i\) in the Delaunay graph G. Then the triangular hull of \(p_i\) denoted by \(H_i\) is the Delaunay triangulation of \(N_i\). Now, the extended Delaunay triangulation \(S = \{T \cup H_1 \cup H_2 \cup .. \cup H_n\}\) [17]. The extended triangulation for a fingerprint is shown in Fig. 2.4c. It can be seen that the extended triangulation is more robust against distortions. For example, Fig. 2.4a shows the Delaunay triangulation of a fingerprint. Figure 2.4b shows the changes in structure of the triangulation due to missing of a minutiae point. This results in false rejection. However, the extended triangulation (Fig. 2.4c) contains the triangles of both Fig. 2.4a, b. In other words Fig. 2.4c shows T and the triangular hull \(H_x\) that is formed when feature x is missed, i.e., \(T \cup H_x\). From this example, we can say that, even when the system fails to extract feature x (i.e., missing minutiae) at the time of identification, the corresponding triangles can be found in the extended set and increases the accuracy. Note that this is not possible with Delaunay triangulation. Further, this is also true for fake minutiae [22].
The extended triangulation contains more triangles than Delaunay triangulation, i.e., \(|S| \ge |T|\) (Fig. 2.4). But \(|S| \in O(n)\) like Delaunay triangulation [17]. The following theorem proves this.
Theorem 1
The number of triangles in S is O(n) [17].
Proof
The number of triangles in S can be given as follows:
The number of triangles in a Delaunay triangulation T of n points can be bounded by \(2n-1\), i.e., \(|T|=2n-1\) [17, 19]. This is also true with the case of each triangular hull \(H_i\). So, \(|H_i| = 2d_i-1\), where \(d_i\) is degree of the \(p_i\). Hence, Eq. 2.1 can be transformed as follows:
According to handshaking lemma of graph theory, the sum of the degrees of all the vertices of a graph is equal to twice the number of edges, i.e., \(\sum \limits _{i=1}^{n} d_i = 2|E|\) [23]. So, Eq. 2.2 can be transformed as follows:
Further, according to Euler’s formula, the number of edges (E) for a planar graph with vertices \((n) \ge 3\) is less than or equal to \(3n-6\), i.e., \(|E| \le 3n-6\) [23]. Thus, Eq. 2.3 can be transformed to Eq. 2.4:
From Eq. 2.4, we have \(|S| \le 13n-25\), proving that \(|S| \in O(n)\).\(\square \)
2.2.4 Hierarchical Decomposition of Extended Set
In the next step, the extended triangles of the fingerprint are classified based on the combination of type of minutiae at the vertices of each triangle. Figure 2.5 shows an example of an extended triangle. Let \(\alpha _1\), \(\alpha _2\), and \(\alpha _3\) are the minimal, medial, and maximal angles in the triangle, respectively. The vertices of the triangle are labeled as \(V_1, V_2,\) and \(V_3\) corresponding to the angles \(\alpha _1\), \(\alpha _2\), and \(\alpha _3\). For example, the vertex with \(\alpha _1\) is labeled as \(V_1\). The remaining vertices are labeled accordingly. Then, based on the combination of types of minutiae at the vertices \(V_1, V_2,\) and \(V_3\) of the triangle, it is classified into one of eight types as depicted in Table 2.1.
2.2.5 Enrollment
This section explains the process of enrolling (or storing) a fingerprint into an index table. Note that the fingerprint is represented with an extended triangle set S. For each triangle in S, an index X and a feature vector f are computed as shown in Eq. 2.5, where \(t_c\) is the triangle class, \(l_1, l_2, l_3\) are the lengths of each side of the triangle such that \(l_1 \ge l_2 \ge l_3\) and \(\phi _1, \phi _2, \phi _3\) are the relative orientations of minutiae points at vertices \(V_1, V_2\), and \(V_3\), respectively:
The process of computing the relative orientation of a triplet minutiae at vertices (\(V_i, V_j, V_k\)) is shown in Fig. 2.6. The relative orientation \(\phi _i\) of minutiae at vertex \(V_i\) is defined in Eq. 2.6, where \(\beta _i^1\) and \(\beta _i^2\) are the angles that the orientation vector \((\theta _i)\) of minutiae at vertex \(V_i\) makes with its incident edges, i.e., \(V_iV_j\) and \(V_iV_k\):
In the next step, the triplet is enrolled into a 3D index table (ISPACE) using its index X. The 3D index table is shown in Fig. 2.7a. The index table size is chosen as \(max(t_c) \times max(\alpha _1) \times max(\alpha _2)\) bins, where \(1 \le t_c \le 8,\, 0 \le \alpha _1 \le 180,\, 0 \le \alpha _2 \le 180\). Further, it can be seen that each bin has two lists:
-
\(I_{id}List\)—This list stores the fingerprint ids of the triplets which are mapped (i.e., indexed) to this particular bin;
-
FVList—This list stores the feature vectors of the mapped triplets.
Enrolling of a triangle into the ISPACE is shown in Eq. 2.7, where X is the index space location (i.e., bin) where the triplet to enroll; \(I_{id}\) represents the image identity to which the triplet belongs; and f is the feature vector of the triplet [22]. Note that the first dimension (say triplet class) partitions the 3D index space into eight classes (2D tables). This is shown in Fig. 2.7a:
The process of enrolling a triplet into the ISPACE is illustrated with an example: Let X = (4, 50, 65) be the index of one of the triplets of an image x and f be its feature vector. Using X, the indexing algorithm access the (4,50,65)th bin of the ISPACE and places x and f at the \(I_{id}List\) and FVList of it respectively. In other words, the algorithm maps to the (50, 65)th location in the 4th partition of the ISPACE and store the triplet’s feature vector f and its image identity x in the lists provided (Fig. 2.7b).
The remaining triangles in extended set are also enrolled into the ISPACE likewise. We repeat this process for other fingerprints in the database. Finally, note that more than one triangle may map to the same bin of ISPACE because different triangles may have same index. In other words, some bins of the ISPACE may receive multiple triangles. Hence, the insertion of image identity \(I_{id}\) along with the feature vector f into the ISPACE helps to eliminate the false matches. The indexing mechanism is given in Algorithm 2.1.
2.3 Query Identification
Query identification is the process of retrieving a small set of candidates C from the ISPACE which are most similar to it. To do this, first, the extended triangle set of the query is computed as discussed in Sect. 2.2.3. Then, the triangles in the retrieved extended set are classified as discussed in Sect. 2.2.4. Let a query fingerprint consist of n triplets in its extended set S. For each triplet in S, its index and feature vector are computed.
Let \(X = (t_c, \alpha _1, \alpha _2)\), \(f = (l_1, l_2, l_3, \phi _1, \phi _2, \phi _3)\), and \(t_c\) be the index, feature vector, and class of a enrolled triplet, respectively. Let \(X' = (t'_c, \alpha '_1, \alpha '_2)\), \(f' = (l'_1, l'_2, l'_3, \phi '_1, \phi '_2, \phi '_3)\) and \(t'_c\) be the index, feature vector, and class of a enrolled triplet, respectively. The index \(X'\) of the query triplet is used to access the ISPACE and retrieve a set of fingerprints from the \(I_{id}List\) of that bin, whose triplet feature vectors satisfy the set of conditions given in Eq. 2.8 as successful correspondences to the query triplet, where \(T_l\) and \(T_\phi \) are predefined thresholds. In other words, two triangles are said to be matched, iff their feature vectors are similar. Let these retrieved image identities are stored into a temporary list L:
Note that the image acquisition and preprocessing is sensitive to noise and distortions, and the features of the two images of same user may be shifted or missed. Therefore, the retrieval systems need to consider the triplets not only from the mapped bin but also from its nearest bins. The image identities in the nearest bins (i.e., predefined neighborhood \(\lambda \)) that satisfy the conditions given in Eq. 2.8 are retrieved and stored into L.
Illustration: Let \(X'\) = (6, 65, 40) be the index of a query triplet and \(f'\) be its feature vector. First, the retrieval algorithm maps to the (65,40)th location in the 6th partition of the ISPACE. Then, it compares the feature vector of the query triplet, i.e., \(f'\) with each feature vector found in the FVList of the bin, and retrieves all the \(I_{id}\)s from \(I_{id}List\) whose triplet feature vectors are similar to query triplet. The retrieval algorithm also retrieves the \(I_{id}\)s from predefined \(\lambda \) which satisfy the conditions in Eq. 2.8. Let \(\lambda \) =1, i.e., window size is \(3 \times 3\) (shown in Fig. 2.8). Hence, the range of locations is from (64, 39) to (66, 41) (shown in Fig. 2.8). All these retrieved image identities (\(I_{id}\)s) are stored into temporary list L.
Similarly, this process is repeated for each query triplet and the selected fingerprint ids \(I_{id}\)s are retrieved into temporary list L. In the next step, the number of occurrences (i.e., Votes) of each fingerprint identity, i.e., \(I_{id}\) in L, is counted and forms the set as \(\{(I_{id}, Votes_{I_{id}})\}\), where \(I_{id}\) is the image identity and \(Votes_{I_{id}}\) is the number of occurrences of \(I_{id}\) in L. Finally, the \(I_{id}\)s whose Votescore greater than a threshold (T) are retrieved as similar fingerprints (i.e., candidate set C) to the query. The vote score of an image identity represented as \(Votescore_{I_{id}}\) is defined in Eq. 2.9, where \(Votes_{I_{id}}\) is the number of corresponding matched triangles between q and \(I_{id}\), and n is the number of query triangles. The retrieval method is given in Algorithm 2.2:
2.4 Experimental Results
To study the effectiveness of the proposed indexing approach, a number of experiments have been conducted on FVC fingerprint databases. This section describes the experiments carried out and the results observed.
2.4.1 Parameter Selection
Selection of appropriate values for different parameters involved in the system is critical for achieving its best performance. One such important parameter is the selection of neighborhood size (\(\lambda \)) (Sect. 3.3). By fixing the matching threshold T, an experiment is conducted with various \(\lambda \) sizes starting from 0 to 6, and the corresponding MR and PR are recorded for every \(\lambda \) (Table 2.2). The relationship between MR, PR, and \(\lambda \) is shown in Figs. 2.9 and 2.10 for FVC 2002 and FVC 2004 fingerprint databases, respectively. It is observed that the PR increases with the \(\lambda \) while MR decreases. But for a real-time application, both MR and PR should be low. Hence, an optimal value for the \(\lambda \) should be chosen such that the system achieves low MR as well as low PR. Therefore, the optimum \(\lambda \) value is chosen as where the two curves intersects, i.e., MR \(=\) PR.
In the experiment, for FVC 2002 DB1 and FVC 2004 DB4 databases, the optimum \(\lambda \) size obtained is in and around 3 (i.e., window size is \(7 \times 7\)). For FVC 2002 DB2, FVC 2002 DB3, FVC 2004 DB1, and FVC 2004 DB2, the optimum \(\lambda \) value is in and around 4 (i.e., window size is \(9 \times 9\)). In case of FVC 2002 DB4, the optimum \(\lambda \) value is 5 (i.e., window size is \(11 \times 11\)). Table 2.3 shows the optimum \(\lambda \) value obtained for different databases.
2.4.2 Results
Once the optimum \(\lambda \) value is chosen, an experiment was conducted to evaluate the performance of the proposed indexing technique for different databases. At various threshold (T) values, we determine the MR and PR of the system. The relationship between MR, PR, and T is plotted in Figs. 2.11 and 2.12 for FVC 2002 and FVC 2004 fingerprint databases, respectively. It is observed that, for small values of T, MR is low and PR is high which is not desirable. On the other hand, increasing the T value decreases the PR but it increases the MR, which is also not desirable. High PR results in more search time, while high MR results in a less secure system. However, as noted earlier, an effective identification system should have low MR as well as PR. Hence, the performance of the system at MR \(=\) PR is recorded (Figs. 2.11 and 2.12).
It is observed that, for FVC 2002 DB1, at \(MR=PR\), the system achieves a PR and MR of 1.28%. In other words, the system searches only 1.28% of the database and genuine image is identified (i.e., HR) with an accuracy of 98.72% (i.e., 100–1.28%). Further, the system achieves a PR and MR of 1.68, 10.65, 4.24, 9.7, 6.55 and 9.47% for FVC 2002 DB2, FVC 2002 DB3, FVC 2002 DB4, FVC 2004 DB1, FVC 2004 DB2, and FVC 2004 DB4 databases, respectively. The PR and HR of the proposed system at \(MR=PR\) are shown in Table 2.4 for different databases.
2.4.3 Comparison with Other Related Approaches
In the next experiment, we compared the performance of the proposed approach with Delaunay triplets [20] and Extended triplet approaches [17]. Figures 2.13 and 2.14 show the results of different approaches on FVC 2002 and FVC 2004, respectively. The PR of the proposed approach is less compared to Delaunay and extended triangulation-based approaches for most of the datasets. This shows that the partitioning of the index space results in reducing the search space during identification.
2.4.4 Retrieval Time
We analyze the retrieval time of the proposed approach with big-O notation. Let n be the number of triplets in the extended set of query image q; and N be the number of images in the database. Note that \(n \ll N\), as seen from Algorithm 2.2, for a given query triplet t:
-
First, we compute its class \(t_c\), its feature vector f, and its index X. Note that each of these takes O(1) time.
-
Next, we retrieve all the \(I_{id}\)s from \(I_{id}List\)s corresponding to the bins from \(X-\lambda \) to \(X+\lambda \) into a set named “Im”. This process takes O(1) time.
-
Then, a set of \(I_{id}\)s are retrieved from the Im into a temporary list L, whose triplet feature vectors are similar to query triplet feature vector. Let m be the size of the Im. This process requires O(m) time. Note that \(m \ll N\).
Hence, the total time required for each query triplet to retrieve the \(I_{id}\)s from the index space into the temporary list L is O(m) time. Note that there are n triplets in the extended set of the query image. So, this retrieval process takes O(nm) time.
Finally, we count the number of occurrences of each \(I_{id}\) in L and select top-ranked ones into a candidate set C. Let the size of L is p, where \(p \ll N\). This process requires O(p) time. Hence, the total retrieval time for a query image can be approximated as \(O(nm)+O(p)\).
2.5 Summary
In this chapter, an efficient indexing algorithm using hierarchical decomposition of extended triplets is proposed. It has been shown that the proposed algorithm performs better for the fingerprint databases. The decomposition of extended triplets provides better classification in the database, and further reduces search space. Without increasing the computing cost, the extended triangulation reduces the search space and increases the response time as it produces only O(n) triplets. Further, this new representation is more robust against distortions compared to all other structures.
References
AADHAAR. Unique Identification Authority of India. http://uidai.gov.in/, July 2014.
Singapore Immigration and Checkpoint authority. http://www.ica.gov.sg/page.aspx?pageid=407, september 2014.
Crossing U.S. borders. http://www.dhs.gov/crossing-us-borders, July 2014.
Find Biometrics. Mobile Biometrics, PDAs & Laptop Fingerprint Readers. http://findbiometrics.com/applications/mobile-biometrics/, september 2014.
Planet Biometrics. Physical Access and Attendence. http://www.planetbiometrics.com/physical-access/, september 2014.
Iris Scans at Amsterdam Airport Schiphol. http://www.schiphol.nl/Travellers/AtSchiphol/Privium/Privium/IrisScans.htm, september 2014.
United Arab Emirates Deployment of Iris Recognition:. http://www.cl.cam.ac.uk/jgd1000/deployments.html, July 2014.
TSA. Transportation Security Administration. http://www.tsa.gov/, september 2014.
J. Hammond. Biometric traveler screening introduced in Orlando, Denver next. http://www.examiner.com/article/biometric-traveler-screening-introduced-orlando-denver-next/, september 2014.
R. Boro and S.D. Roy. Fast and Robust Projective Matching for Fingerprints Using Geometric Hashing. In Indian Conference on Computer Vision, Graphics and Image Processing, pages 681–688, 2004.
Y. Lamdan and H.J. Wolfson. Geometric hashing: A general and efficient model-based recognition scheme. In ICCV, 88, pages 238–249, 1988.
H. Mehrotra, B. Majhi, and P. Gupta. Robust iris indexing scheme using geometric hashing of SIFT keypoints. Journal of Network and Computer Applications, 33(3):300–313, 2010.
D.G. Lowe. Distinctive Image Features from Scale-Invariant Keypoints. International Journal of Computer Vision, 60(2):91–110, 2004.
SIFT. SIFT for matlab:. http://www.vlfeat.org/ vedaldi/code/sift.html.
R.S. Germain, A. Califano, and S. Colville. Fingerprint Matching Using Transformation Parameter Clustering. IEEE Computing in Science and Engineering, 4(4):42–49, 1997.
B. Bhanu and X. Tan. Fingerprint indexing based on novel features of minutiae triplets. IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(5):616–622, 2003.
A.G. Alonso, J.H. Palancar, E.R. Reina, and A.M. Briseño. Indexing and retrieving in fingerprint databases under structural distortions. Expert Systems with Applications, 40(8):2858–2871, 2013.
“NeuroTechnology”. VeriFinger SDK. http://www.neurotechnology.com/verifinger.html, January 2014.
M.D. Berg, M.V. Kreveld, M. Overmars, and O.C. Schwarzkopf. Computational geometry. Springer, 2000.
G. Bebis, T. Deaconu, and M. Georgiopoulos. Fingerprint Identification Using Delaunay Triangulation. In International Conference on Information, Intelligence, and Systems, pages 452–452, 1999.
Ilaiah Kavati, Munaga VNK Prasad, and Chakravarthy Bhagvati. Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation. Security in Computing and Communications, pages 213–222, 2013.
Ilaiah Kavati, VamshiKrishna Chenna, Munaga VNK Prasad, and Chakravarthy Bhagvati. Classification of extended delaunay triangulation for fingerprint indexing. In Modelling Symposium (AMS), 2014 8th Asia, pages 153–158. IEEE, 2014.
N. Biggs, E.K. Lloyd, and R.J. Wilson. Graph Theory, 1736-1936. Clarendon Press, 1986.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Kavati, I., Prasad, M.V.N.K., Bhagvati, C. (2017). Hierarchical Decomposition of Extended Triangulation for Fingerprint Indexing . In: Efficient Biometric Indexing and Retrieval Techniques for Large-Scale Systems. SpringerBriefs in Computer Science. Springer, Cham. https://doi.org/10.1007/978-3-319-57660-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-57660-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57659-6
Online ISBN: 978-3-319-57660-2
eBook Packages: Computer ScienceComputer Science (R0)