Faultless authentication of individuals by fingerprints results in high false rejections rate for rigorously built systems. Indeed, the authors prefer that the system erroneously reject a pattern when it does not meet a number of predetermined correspondence criteria. In this work, after discussing existing techniques, we propose a new algorithm to reduce the false rejection rate during the authentication-using fingerprint. This algorithm extracts the minutiae of the fingerprint with their relative orientations and classifies them according to the different classes already established; then, make the correspondence between two templates by simple probabilities calculations from a deep neural network. The merging of these operations provides very promising results both on the NIST4 international data reference and on the SOCFing database.
References
[1]
Jiang, J. (1998) Image Compression with Neural Networks: A Survey. Signal Processing: Image Communication, 14, 737-760.
https://doi.org/10.1016/S0923-5965(98)00041-1
[2]
Kouamo, S. and Tangha, C. (2012) Handwritten Character Recognition with Artificial Neural Network. In: Distributed Computing and Artificial Intelligence, Advances in Intelligent and Soft Computing, Vol. 151, Springer Verlag, Berlin, 535-543.
https://doi.org/10.1007/978-3-642-28765-7_64
[3]
Kouamo, S. and Tangha, C. (2016) Fingerprint Recognition with Artificial Neural Networks: Application to E-Learning. Journal of Intelligent Learning Systems and Applications, 8, 39-49.
[4]
Viger, F.P., Nandar, K.W., Li, K. and Chen, J. (2019) Fingerprint Classification and Identification Algorithms for Criminal Investigation: A Survey. Future Generation Computer Systems.
[5]
Rupali, S.P., Sonali, D.P. and Sudeep, D.T. (2018) Performance Evaluation of Fingerprint Trait Authentication System. Advances in Intelligent Systems and Computing, Vol. 632, Springer-Verlag, Berlin, 143-151.
https://doi.org/10.1007/978-981-10-5520-1_14
[6]
Watson, C.I. and Wilson, C.L. (1992) NIST Special Database 4 Fingerprint Database. National Institute of Standards, Technology, Advanced Systems Division, Image Recognition Group.
[7]
LeCun, Y., Chopra, S., Hadsell, R., Marc’Aurelio, R. and Huang, F. (2006) A Tutorial on Energy-Based Learning. In: Bakir, G., Hofman, T., Schlkopf, B., Smola, A. and Taskar, B., Eds., Predicting Structured Data, MIT Press, Cambridge, 10-21.
[8]
Maio, D. and Maltoni, D. (1998) Neural Network Based Minutiae Filtering in Fingerprints.
[9]
LeCun, Y., Bengio, Y. and Hinton, G. (2015) Deep Learning. Nature, 521, 436-444.
https://doi.org/10.1038/nature14539
[10]
Bengio, Y. and Delalleau, O. (2011) Shallow vs. Deep Sum-Product Networks. Neural Information Processing Systems, Sierra Nevada, 16-17 December 2011, 1.
https://doi.org/10.1007/978-3-642-24477-3_1
[11]
Capelli, R., Lumini, A., Maio, D. and Maltoni, D. (2002) Synthetic Fingerprint-Database Generation. Proceeding of the 16th International Conference on Pattern Recognition, Quebec City, August 2002, Vol. 3, 744-747.
[12]
International Biometric Group (2011) The Henry Classification.
http://www.biometricgroup.com
[13]
Kouamo, S. and Tangha, C. (2013) Images Compression with Artificial Neural Network. Advances in Intelligent and Systems and Computing, Vol. 189, Springer Verlag, Berlin, 515-524. https://doi.org/10.1007/978-3-642-33018-6_53
[14]
Kouamo, O. and Gouy-Pailler, C. (2013) Multi-Scale Test Procedure for Non-Stationarity in Short and Long Memory Time Series. IEEE, ICASSP, Vancouver, 26-30 May 2013, 5368-5372. https://doi.org/10.1109/ICASSP.2013.6638688
[15]
Maltoni, D., Maio, D., Jain, A.K. and Prabhakar, S. (2003) Handbook of Fingerprint Recognition. Springer, New York.
[16]
Baldi, P. and Chauvin, Y. (1993) Neural Networks for Fingerprint Recognition. Neural Computation, 5, 402-418. https://doi.org/10.1162/neco.1993.5.3.402
Thomas, T.J. (2000) Locally-Connected Neural Network for Fingerprint Recognition. Proceedings of the IASTED International Conference, Intelligent Systems and Control, Honolulu, 2000, 431-441.
[19]
Qian, Y., Dong, J., Wang, W. and Tan, T. (2015) Deep Learning for Steganalysis via Convolutional Neural Networks. Media Watermarking, Security, and Forensics, Vol. 9409, 1-10. https://doi.org/10.1117/12.2083479
[20]
Jagtap, V.N. and Mishra, S.K. (2014) Fast Efficient Artificial Neural Network for Handwritten Digit Recognition. International Journal of Computer Science and Information Technologies, 5, 2302-2306.
[21]
Yunsick, S. (2016) Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators. Entropy, 18, 366.
https://doi.org/10.3390/e18100366
[22]
Galton, F. (1892) Fingerprint. McMillan, London.
[23]
Simo, J.C. and Tarnow, N. (1994) A New Energy and Momentum Conserving Algorithm for the Non-Linear Dynamics of Shells. International Journal for Numerical Methods in Engineering, 37, 2527-2549. https://doi.org/10.1002/nme.1620371503
[24]
Skeel, R.D. (1998) Integration Schemes for Molecular Dynamics and Related Applications. Department of Computer Science (and Beckman Institute), University of Illinois, Urbana.
[25]
Yoshida, H. (2001) Non-Existence of the Modified First Integral by Symplectic Integration Methods. Physics Letters A, 282, 276-283.
https://doi.org/10.1016/S0375-9601(01)00186-4
[26]
Hamayun, A.K. (2017) Feature Fusion and Classifier Ensemble Technique for Robust Face Recognition. Signal Processing: An International Journal, 11, 1-15.