Handbook of Fingerprint Recognition Springer New York Berlin Heidelberg Hong Kong London Milan Paris Tokyo Davide Maltoni Dario Maio Anil K. Jain Salil Prabhakar Handbook of Fingerprint Recognition With 178 Illustrations DavideMaltoni DarioMaio BiometricSystemsLaboratory DEIS-CSITE UniversityofBologna UniversityofBologna Cesena,47023 Bologna,40136 Italy Italy [email protected] [email protected] AnilK.Jain SalilPrabhakar DepartmentofComputerScience DigitalPersona.Inc. andEngineering RedwoodCity,CA94063 MichiganStateUniversity USA EastLansing,MI48824 [email protected] USA [email protected] LibraryofCongressCataloging-in-PublicationData Handbookoffingerprintrecognition/DavideMaltoni...[etal.] p. cm. Includesbibliographicalreferencesandindex. ISBN0-387-95431-7(alk.paper) 1.Fingerprints—Identification. 2.Fingerprints—Classification I.Maltoni,Davide HV6074.H252003 363.25′8—dc21 2003042439 ISBN0-387-95431-7 Printedonacid-freepaper. ©2003Springer-VerlagNewYork,Inc. Allrightsreserved.Thisworkmaynotbetranslatedorcopiedinwholeorinpartwithoutthewrittenpermission of the publisher (Springer-Verlag New York, Inc., 175 Fifth Avenue, New York, NY 10010, USA), except for briefexcerptsinconnectionwithreviewsorscholarlyanalysis.Useinconnectionwithanyformofinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynowknown orhereafterdevelopedisforbidden. The use in this publication of trade names, trademarks, service marks, and similar terms, even if they are not identifiedassuch,isnottobetakenasanexpressionofopinionastowhetherornottheyaresubjecttoproprietary rights. PrintedintheUnitedStatesofAmerica. 9 8 7 6 5 4 3 2 1 SPIN10864422 www.springer-ny.com Springer-Verlag NewYork Berlin Heidelberg AmemberofBertelsmannSpringerScience+BusinessMediaGmbH Disclaimer: This eBook does not include the ancillary media that was packaged with the original printed version of the book. Contents Preface................................................................................................................................ix 1 Introduction....................................................................................................................1 1.1 Introduction...............................................................................................................1 1.2 Biometric Systems.....................................................................................................3 1.3 A Comparison of Various Biometrics.......................................................................7 1.4 Biometric System Errors.........................................................................................13 1.5 Evaluating Biometric Systems................................................................................19 1.6 History of Fingerprints............................................................................................21 1.7 Formation of Fingerprints.......................................................................................24 1.8 Individuality of Fingerprints...................................................................................25 1.9 Fingerprint Sensing and Storage.............................................................................26 1.10 Fingerprint Representation and Feature Extraction...............................................28 1.11 Fingerprint Matching.............................................................................................31 1.12 Fingerprint Classification and Indexing................................................................33 1.13 Synthetic Fingerprints...........................................................................................35 1.14 Multimodal Biometric Systems.............................................................................36 1.15 Designing Fingerprint Recognition Systems.........................................................38 1.16 Securing Fingerprint Recognition Systems...........................................................40 1.17 Applications of Fingerprint Recognition Systems.................................................43 1.18 Privacy Issues........................................................................................................45 1.19 Summary...............................................................................................................48 1.20 Image-processing and Pattern Recognition Background.......................................50 2 Fingerprint Sensing......................................................................................................53 2.1 Introduction.............................................................................................................53 2.2 Fingerprint Images..................................................................................................55 2.3 Off-line Fingerprint Acquisition..............................................................................57 2.4 Live-scan Fingerprint Sensing.................................................................................59 2.5 Touch versus Sweep................................................................................................65 2.6 Fingerprint Scanners and their Features..................................................................69 2.7 Sensing Area versus Accuracy Tradeoff.................................................................75 2.8 Storing and Compressing Fingerprint Images.........................................................79 2.9 Summary.................................................................................................................81 3 Fingerprint Analysis and Representation..................................................................83 vi Contents 3.1 Introduction.............................................................................................................83 3.2 Fingerprint Image Processing and Feature Extraction.............................................86 3.3 Estimation of Local Ridge Orientation....................................................................87 3.4 Estimation of Local Ridge Frequency.....................................................................91 3.5 Segmentation...........................................................................................................94 3.6 Singularity and Core Detection...............................................................................96 3.7 Enhancement.........................................................................................................104 3.8 Minutiae Detection................................................................................................113 3.9 Minutiae Filtering..................................................................................................124 3.10 Estimation of Ridge Count..................................................................................128 3.11 Summary..............................................................................................................129 4 Fingerprint Matching................................................................................................131 4.1 Introduction...........................................................................................................131 4.2 Correlation-based Techniques...............................................................................137 4.3 Minutiae-based Methods.......................................................................................141 4.4 Global versus Local Minutiae Matching...............................................................156 4.5 Dealing with Distortion.........................................................................................160 4.6 Ridge Feature-based Matching Techniques..........................................................164 4.7 Comparing the Performance of Matching Algorithms..........................................168 4.8 Summary...............................................................................................................170 5 Fingerprint Classification and Indexing..................................................................173 5.1 Introduction...........................................................................................................173 5.2 Classification Techniques......................................................................................176 5.3 Performance of Fingerprint Classification Techniques.........................................190 5.4 Fingerprint Indexing and Retrieval.......................................................................194 5.5 Summary...............................................................................................................202 6 Synthetic Fingerprint Generation.............................................................................203 6.1 Introduction...........................................................................................................203 6.2 The SFINGE Method............................................................................................205 6.3 Generation of a Master Fingerprint.......................................................................208 6.4 Generation of Synthetic Fingerprint Impressions..................................................216 6.5 Validation of the Synthetic Generator...................................................................224 6.6 The SFINGE Software Tool..................................................................................228 6.7 Summary...............................................................................................................229 7 Multimodal Biometric Systems.................................................................................233 7.1 Introduction...........................................................................................................233 7.2 Performance of a Multimodal Biometric System..................................................235 7.3 Integration Strategies.............................................................................................237 7.4 What to Integrate?.................................................................................................245 Contents vii 7.5 Examples of Multimodal Biometric Systems........................................................247 7.6 Summary...............................................................................................................252 8 Fingerprint Individuality...........................................................................................257 8.1 Introduction...........................................................................................................257 8.2 Background...........................................................................................................260 8.3 A Model for Fingerprint Individuality..................................................................267 8.4 Experimental Evaluation.......................................................................................275 8.5 Summary...............................................................................................................279 9 Securing Fingerprint Systems...................................................................................281 9.1 Introduction...........................................................................................................281 9.2 Points of Attack.....................................................................................................283 9.3 Denial-of-service Attacks at the Scanner..............................................................285 9.4 Fake Finger Attacks..............................................................................................286 9.5 Trojan Horse Attacks.............................................................................................291 9.6 Replay Attacks......................................................................................................296 9.7 Cancelable/private Biometrics...............................................................................301 9.8 Coercion................................................................................................................307 9.9 Summary...............................................................................................................308 Bibliography...................................................................................................................311 Index................................................................................................................................341 Preface Overview Biometric recognition refers to the use of distinctive physiological and behavioral characteris- tics (e.g., fingerprints, face, hang geometry, iris, gait, signature), called biometric identifiers or simply biometrics, for automatically recognizing a person. Questions such as “Is this person authorized to enter the facility?”, “Is this individual entitled to access the privileged informa- tion?”, and “Did this person previously apply for a job?” are routinely asked in a variety of organizations in both public and private sectors. Because biometric identifiers cannot be easily misplaced, forged, or shared, they are considered more reliable for person recognition than traditional token- (e.g., keys) or knowledge- (e.g., password) based methods. Biometric recognition can provide better security, higher efficiency, and increased user convenience. It is for these reasons that biometric systems are being either increasingly deployed or evaluated in a large number of government (e.g., welfare disbursement, national ID card, issuing of driver’s license) and civilian (e.g., computer network logon, automatic teller machine, cellular phone, Web access, smartcard) applications. A number of biometric technologies have been developed and several of them are being used in a variety of applications. Among these, fingerprints, face, iris, speech, and hand ge- ometry are the ones that are most commonly used. Each biometric has its strengths and weak- nesses and the choice of a particular biometric typically depends on the requirements of an application. Various biometric identifiers can also be compared on the following factors; uni- versality, distinctiveness, permanence, collectability, performance, acceptability and circum- vention. Because of the well-known distinctiveness (individuality) and persistence properties of fingerprints over time, fingerprints are the most widely used biometric characteristics. In fact, fingerprints and biometrics are often considered synonyms! Fingerprints have been rou- tinely used in the forensics community for over one hundred years and automatic fingerprint identification systems were first installed almost fifty years back. While law enforcement agencies were the earliest adopters of the fingerprint recognition technology, more recently, increasing identity fraud has created a growing need for biometric technology for person rec- ognition in a number of non-forensic applications. Fingerprint recognition is a complex pattern recognition problem; designing algorithms capable of extracting salient features and matching them in a robust way is quite hard, espe- x Preface cially in poor quality fingerprint images. There is a popular misconception that automatic fin- gerprint recognition is a fully solved problem since it was one of the first applications of ma- chine pattern recognition almost fifty years ago. On the contrary, fingerprint recognition is still a challenging and important pattern recognition problem. This book reflects the progress made in automatic techniques for fingerprint recognition over the past four decades. We attempted to organize, classify and present hundreds of exist- ing approaches in a systematic way. We believe this would greatly facilitate both beginners and experts of different application domains who desire to explore not only the general con- cepts but also the intricate details of this fascinating technology. Objectives The aims and objectives of this book are to: • introduce the readers to automatic techniques for fingerprint recognition. Introductory material is provided on all components/modules of a fingerprint recognition system; • provide an in-depth survey of the state-of-the-art in fingerprint recognition; • present in detail recent advances in fingerprint recognition, including sensing, feature extraction, matching and classification techniques, synthetic fingerprint generation, multimodal biometric systems, fingerprint individuality, and design of secure finger- print systems; • serve as the first complete reference book on fingerprint recognition, including an ex- haustive bibliography. Organization and Features After an introductory chapter, the book chapters are organized logically into four parts: finger- print sensing (Chapter 2); fingerprint representation, matching and classification (Chapters 3, 4, and 5); advanced topics, including synthetic fingerprints, multimodal biometric systems, and fingerprint individuality (Chapters 6, 7, and 8); and securing fingerprint systems (Chapter 9). Chapter 1 introduces biometric systems and provides some historical remarks on finger- prints and their adoption in forensic and civilian recognition applications. All the topics that are covered in detail in the successive chapters are introduced here in brief. This will provide the reader an overview of the various book chapters and let her choose a personalized reading path. Other non-technical but important topics such as “applications” and “privacy issues” are also discussed. Some background in image processing and pattern recognition techniques is necessary to fully understand the majority of the book chapters. To facilitate readers who do not have this background, references to basic readings and introductory surveys on various topics are provided at the end of Chapter 1. Preface xi Chapter 2 surveys the existing fingerprint acquisition techniques: from the traditional “ink technique” to recent optical, capacitive, thermal, and ultrasonic on-line scanners, and discusses the factors that determine the quality of a fingerprint image. Chapter 2 also introduces the compression techniques that are used to store the fingerprint image data in a compact form. Chapters 3, 4, and 5 provide an in-depth treatment of fingerprint feature extraction, repre- sentation, matching, classification, and retrieval algorithms. The existing techniques are di- vided into various categories to guide the reader through the large number of ideas proposed in more than 400 technical papers on the subject. The main approaches are explained in detail to help practitioners in the field understand the methodology used in commercial systems. Chapters 6, 7, and 8 are specifically dedicated to the three cutting edge topics: synthetic fingerprint generation, multimodal biometric systems, and fingerprint individuality, respec- tively. Synthetic fingerprints have proven to be a valid substitute for real fingerprints for the design and benchmarking of fingerprint-based recognition systems. Multimodal biometric systems, that is, systems based on a combination of fingerprints with other biometrics (e.g., face) or a combination of different fingerprint feature extraction or matching algorithms, ap- pear to be a promising research direction to overcome the intrinsic limitations of the existing solutions. Scientific evidence supporting fingerprint individuality is being increasingly de- manded in forensic, civil and commercial applications, and this has generated interest in de- signing accurate fingerprint individuality models. Finally, Chapter 9 discusses the design, implementation and administration of secure fin- gerprint-based biometric systems, whose building blocks (basic algorithms) have been pre- sented in the previous chapters. Experience and care is necessary to design and develop secure systems. Techniques for securing biometric systems against attacks (to sensor, feature extrac- tion and matching modules, template, and communication channels) are also discussed. Contents of the DVD The book includes a DVD that contains the four fingerprint databases used in the 2002 Finger- print Verification Competition (FVC2002) and the four databases used in 2000 Fingerprint Verification Competition (FVC2000). The DVD also contains a demonstration version of the SFINGE software that can be used to generate synthetic fingerprint images. These real and synthetic fingerprint images will allow interested readers to evaluate various modules of their fingerprint recognition system and to compare their developments with the state-of-the-art algorithms. Intended Audience This book will be useful to researchers, practicing engineers, and students who wish to un- derstand and/or develop fingerprint-based recognition systems. It would also be useful as a
Description: