SlideShare a Scribd company logo
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34
32 | P a g e
A NEW CODING METHOD IN PATTERN
RECOGNITION FINGERPRINT IMAGE USING
VECTOR QUANTIZATION
NAGHAM J. SHUKUR
M.Sc in Space technologies and Communicatinon
Unit of Applied Sciences Researchs, School of Applied Sciences, University of Technology,
Baghdad, Iraq
Abstract— Fingerprints are imprints formed by friction
ridges of the skin and thumbs. They have long been used for
identification because of their immutability and individuality.
Immutability refers to the permanent and unchanging character
of the pattern on each finger. Individuality refers to the
uniqueness of ridge details across individuals; the probability
that two fingerprints are alike is about 1 in 1.9x1015. In despite of
this improvement which is adopted by the Federal Bureau of
Investigation (FBI), the fact still is “The larger the fingerprint
files became, the harder it was to identify somebody from their
fingerprints alone. Moreover, the fingerprint requires one of the
largest data templates in the biometric field”. The finger data
template can range anywhere from several hundred bytes to over
1,000 bytes depending upon the level of security that is required
and the method that is used to scan one's fingerprint. For these
reasons this work is motivated to present another way to tackle
the problem that is relies on the properties of Vector
Quantization coding algorithm.
Key words— Vector Quantization, Fingerprint, Vector
Quantization coding algorithm
I. INTRODUCTION
Nowadays, fingerprint recognition is one of the most
important biometric technologies based on fingerprint
distinctiveness, persistence and ease of acquisition. Although
there are many real applications using this technology, its
problems are still not fully solved, especially in poor quality
fingerprint images and when low-cost acquisition devices with
a small area are adopted.
Fig.1 Fingerprint Recognition process
In fingerprint recognition process, the important step which
affects on system accuracy is matching between template and
query fingerprint. Many solutions are
designed to increase this step’s accuracy ([1], [2], [3], [4],
[5], [6]). Fingerprint imaging technology looks to capture or
read the unique pattern of lines on the tip of one's finger. These
unique patterns of lines can either be in a loop, whorl, or arch
pattern [7]. There are several methods in accomplishing the
process of identifying one's fingerprint [8]. The two major
applications of fingerprint recognition are
fingerprint verification and fingerprint identification.
Verification is known as one-to-one fingerprint matching,
whereas, fingerprint identification is known as one-to-many
matching. Verification is used for access applications and
identification is used for investigation purposes. Many
successful approaches have been presented for verification
applications, where the identification field is still open
challenging area because of many problems. The main
common problem that the verification faces is the huge
database. This problem can be classified into two categories:
first is
establishing identify based on single print i.e. comparing a
latent print from the scene of a crime with prints from a file.
Second is establishing identify based on a set of ten fingerprint
records i.e. record [9]. After arrest or employment are
requirements. For reasons discussed in [10], the problem of the
first category is extremely difficult, whereas the second one has
greater quantity of information available from ten-print file
searching. The traditional systems have sequential structure
which suffers from a problem that the error propagates and
information is blocked which means that the second stage can
not use the information available at the first stage but it may
suffer from the errors caused by the first stage. Moreover,
conventionally, the matching process may use the following
features: ridges or valleys (or both), minutia i.e. its type,
location and direction, and global matching. Common Features
are shown in Table 1 and Figure 1 respectively.
Table 1. Common Features for Matching Process
Ridges Various patterns across
fingerprint
Valleys Spaces between ridges
Minutia Type (ending,
bifurcation)Location
(x,y)
Direction
Global
Patterns
Arch LoopWhorl
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34
33 | P a g e
Figure 2. Common global Patterns (above), common
Minutia
This work proposes new feature that can be used for
matching. The proposed feature is a vector generated after the
fingerprint image is compressed by Vector Quantization
Coding approach. This vector is uniquely representing the
entire image. Thus, it can
be effectively used for matching purposes. The proposed
algorithm is illustrated in section 3 and tested in section 4.
Section 5 concludes this work and gives some
recommendations. Before all, brief introduction to Vector
Quantization coding is given in next section.
2. Vector Quantization Coding Algorithm:
It uses a codebook that contains the pixel patterns with
the corresponding index on each of them. The main idea of VQ
in image coding is then to represent arrays of pixels by an
index in the codebook. In this way, compression is achieved
since the size of the index is usually a small fraction of that of
the block of pixels [11].
3. PROPOSED APPROCH:
A. Mechanism Of The proposed system :
In Figure 3. depicts the general mechanism of the
proposed system. After the fingerprint image is fed to the
system, it will be converted to binary image as a preprocessing
stage. Then the binary image is compressed using Vector
Quantization coding approach. The first stage in image vector
quantization is the image formation. The image data are first
partitioned into a set of vectors. A large number of vectors
from various images are then used to form a training set. The
training set is used to generate a codebook, normally using an
iterative clustering algorithm. The quantization or coding step
involves searching each input vector for the closest codeword
in the codebook. Then the corresponding index of the selected
codeword is coded and transmitted to the decoder. At the
decoder, the index is decoded and converted to the
corresponding vector with the same codebook as at the encoder
by look-up table. Thus, the design decisions in implementing
image vector quantization include [12]:
1. vector formation;
2. training set generation;
3. code book generation; and
4. quantization.
Figure 3. Flowchart for the proposed algorithm
the distance between the entire vector and the
corresponding vector in codebook is equal to zero, but because
of the entire image has not always the exact appearance to the
image that captured during the stage of building the codebook,
the distance may be greater. However, the shortest distance can
be used to point to the corresponding vector and then
fingerprint is identified.
Procedure Of Applying Proposed System:
The two important components for the system shown above
are the Vector Quantization coding compression stage and the
codebook. At compression stage the entire image which is
binary matrix is compressed using Vector Quantization coding
algorithm to produce a vector of almost 1/16 image size. For
instance, for the fingerprint image of size 256x256 or 65536
which uses 65536 bytes, the generated vector length is 4096
that is using 8192 bytes. Therefore, the memory size is
decreased by 1/8, from 65536bytes for original image to
8192bytes for corresponding vector. To build the codebook,
same procedure can be followed, by converting the database
(fingerprint images) to code vectors and assigning each one to
its corresponding owner. Thus the codebook contains vectors
rather than images. For instance, if we have 1 million finger
images for 1 million persons, this database is traditionally using
256x256x1000000 = 655360000000 bytes ~ = 154
Gigabytes, their corresponding vectors use only
20720x1000000 bytes ~= 19 Gigabytes. These simple
calculations lead to conclude that the identification rate has
gained many benefits such as high speed as well as low False
Acceptance Rate (FAR) / False Rejection Rate (FRR).
REFERENCES
[1] A. Jain, L. Hong, and R. Bolle, “On-line fingerprint
verification,” IEEE Trans. Pattern Anal. Machine Intell, vol.
19, pp 302–314, 1997. X. Jiang, W. Y. Yau, "Fingerprint
minutiae matching based on the local and global structures",
ICPR2000, vol. 2, 2000, pp 1042-1045.
International Journal of Technical Research and Applications e-ISSN: 2320-8163,
www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34
34 | P a g e
[2] A.K. Jain, S. Prabhakar, L. Hong, S. Pankanti, "Filterbank-
Based Fingerprint Matching", Image Processing, vol. 9, 2000, pp
846-859.
[3] K. Ito, A. Morita, T. Aoki, H. Nakajima, K. Kobayashi, T.
Higuch, "A Fingerprint Recognition Algorithm Combining
Phase-Based Image Matching and Feature-Based Matching",
International Conference on Biometrics, vol. 3832, 2006, pp
316–325.
[4] 4. L. Sha, F. Zhao, X. Tang, "Minutiae-based Fingerprint
Matching Using Subset Combination", The 18th
International
Conference on Pattern Recognition -ICPR'06, vol. 4, 2006, pp
566-569.
[5] X. Jiang, W. Y. Yau, "Fingerprint minutiae matching based on
the local and global structures", ICPR2000, vol. 2, 2000, pp.
1042-1045
[6] Xuejun Tan, Bir Bhanu, "Fingerprint matching by genetic
algorithms", Pattern Recognition, vol. 39, 2006, pp. 465 –477.
[7] Randell, N., Biometric basics, PC Magazine, April 1999, pp.
193-202.
[8] The Center for Unified Biometrics and Sensors
(CUBS), Fingerprint recognition, retrieved August 13, 2007:
http://www.cubs.buffalo.edu/fingerrecog.sht ml. Accessed
January 2008
[9] Abdurazzag Ali Aburas and Salem Ali Reheil, “New Promising
Tool for Off Line Arabic Handwritten Character Recognition
Based On JPEG2000 Image Compression”, IEEE-3rd
International Conference on Information & Communication
Technologies: From theory to Applications (ICTTA’08),
Damascus-Syria, April 47-11 2008
[10] McMahon, D.H.; Johnson, G.L.; Teeter, S.L.; Whitney, C.G.
(April 1975) A Hybrid Optical Computer Processing Technique
for Fingerprint Identification, IEEE Transactions on Computers
Volume C-24, Issue 4, Page(s):358 – 369
[11] Loben, C.: Introduction to Image Compression,
http://www/image.cityu.edu.hkl~/thesis/node9.html; 1998.
[12] Shi, Y.Q. and Sun, H.: Image and Video Compression for
Multimedia Engineering: Fundamentals, Algorithms and
Standards (1st ed.). CRC Press LLC, New York; 2000

More Related Content

What's hot (18)

PDF
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
IJMER
 
PDF
Segmentation and recognition of handwritten digit numeral string using a mult...
ijfcstjournal
 
PDF
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET Journal
 
PDF
Ijarcet vol-2-issue-4-1383-1388
Editor IJARCET
 
PDF
Paper id 252014130
IJRAT
 
PDF
IRJET- A Review on Fake Biometry Detection
IRJET Journal
 
PDF
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
PDF
ANN Based Handwritten Signature Recognition System
ijtsrd
 
PDF
Handwriting identification using deep convolutional neural network method
TELKOMNIKA JOURNAL
 
PDF
Cc4301455457
IJERA Editor
 
PPTX
Correlation Based Fingerprint Liveness Detection
Ashish Pawar
 
PDF
Measuring memetic algorithm performance on image fingerprints dataset
TELKOMNIKA JOURNAL
 
PDF
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
IDES Editor
 
PDF
Fingerprint Feature Extraction, Identification and Authentication: A Review
paperpublications3
 
PDF
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
IJCI JOURNAL
 
PDF
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
International Journal of Engineering Inventions www.ijeijournal.com
 
PDF
An interactive image segmentation using multiple user input’s
eSAT Publishing House
 
PDF
Review of three categories of fingerprint recognition 2
prjpublications
 
Feature Level Fusion of Multibiometric Cryptosystem in Distributed System
IJMER
 
Segmentation and recognition of handwritten digit numeral string using a mult...
ijfcstjournal
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET Journal
 
Ijarcet vol-2-issue-4-1383-1388
Editor IJARCET
 
Paper id 252014130
IJRAT
 
IRJET- A Review on Fake Biometry Detection
IRJET Journal
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
ANN Based Handwritten Signature Recognition System
ijtsrd
 
Handwriting identification using deep convolutional neural network method
TELKOMNIKA JOURNAL
 
Cc4301455457
IJERA Editor
 
Correlation Based Fingerprint Liveness Detection
Ashish Pawar
 
Measuring memetic algorithm performance on image fingerprints dataset
TELKOMNIKA JOURNAL
 
An Indexing Technique Based on Feature Level Fusion of Fingerprint Features
IDES Editor
 
Fingerprint Feature Extraction, Identification and Authentication: A Review
paperpublications3
 
FINGERPRINT MATCHING USING HYBRID SHAPE AND ORIENTATION DESCRIPTOR -AN IMPROV...
IJCI JOURNAL
 
International Journal of Engineering Inventions (IJEI), www.ijeijournal.com,c...
International Journal of Engineering Inventions www.ijeijournal.com
 
An interactive image segmentation using multiple user input’s
eSAT Publishing House
 
Review of three categories of fingerprint recognition 2
prjpublications
 

Viewers also liked (20)

PDF
Untitled Presentation
Dario Fernando Verax Bravoz
 
PPTX
Providing incentives
Joseph Grabel
 
PPTX
Uso de comandos insert, update y delete en bases de datos de sql server
Carlos Flores Glez
 
PPTX
1415650144 chapter10 --- (1)
Siri Siripirom
 
PDF
Furuvik
ohadsan
 
PDF
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
International Journal of Technical Research & Application
 
PDF
Keamanan Jaringan Komputer
Ari Yandi
 
PDF
STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...
International Journal of Technical Research & Application
 
PPTX
Social media mediasharing-monicamcginnis
monicamcg0789
 
PDF
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
International Journal of Technical Research & Application
 
PPT
2015 опис досвіду обдаровані блог
OlgaVladychko
 
PDF
STRUCTURAL AND DIELECTRIC STUDIES OF TERBIUM SUBSTITUTED NICKEL FERRITE NANOP...
International Journal of Technical Research & Application
 
PPTX
Final assignment
cynjac
 
PPTX
APRENDIZAJE AUTONOMO NANCY
UNIVIM
 
PPTX
Social media mediasharing-monicamcginnis
monicamcg0789
 
PDF
COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...
International Journal of Technical Research & Application
 
PDF
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
International Journal of Technical Research & Application
 
PDF
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
International Journal of Technical Research & Application
 
Untitled Presentation
Dario Fernando Verax Bravoz
 
Providing incentives
Joseph Grabel
 
Uso de comandos insert, update y delete en bases de datos de sql server
Carlos Flores Glez
 
1415650144 chapter10 --- (1)
Siri Siripirom
 
Furuvik
ohadsan
 
http://ijtra.com/view/role-of-power-electronics-in-non-renewable-and-renewabl...
International Journal of Technical Research & Application
 
Keamanan Jaringan Komputer
Ari Yandi
 
STUDIES ON PRODUCTION PERFORMANCE IN BROILER CHICKEN SUPPLEMENTING COPPER AND...
International Journal of Technical Research & Application
 
Social media mediasharing-monicamcginnis
monicamcg0789
 
IMPROVEMENT OF SUPPLY CHAIN MANAGEMENT BY MATHEMATICAL PROGRAMMING APPROACH
International Journal of Technical Research & Application
 
2015 опис досвіду обдаровані блог
OlgaVladychko
 
STRUCTURAL AND DIELECTRIC STUDIES OF TERBIUM SUBSTITUTED NICKEL FERRITE NANOP...
International Journal of Technical Research & Application
 
Final assignment
cynjac
 
APRENDIZAJE AUTONOMO NANCY
UNIVIM
 
Social media mediasharing-monicamcginnis
monicamcg0789
 
COMPARISON OF THE EXPERIMENTAL PERFORMANCE OF A THERMOELECTRIC REFRIGERATOR W...
International Journal of Technical Research & Application
 
A SURVEY ON IRIS RECOGNITION FOR AUTHENTICATION
International Journal of Technical Research & Application
 
ASSESSMENT OF HEAVY METALS CONCENTRATION IN INDIAN AND PAKISTANI VEGETABLES
International Journal of Technical Research & Application
 
Ad

Similar to A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUANTIZATION (20)

PDF
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
AM Publications
 
PDF
1834 1840
Editor IJARCET
 
PDF
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
 
PDF
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
KARTHIKEYAN V
 
PDF
System for Fingerprint Image Analysis
vivatechijri
 
PDF
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
PDF
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
ijcsit
 
PDF
Dp34707712
IJERA Editor
 
PDF
Multiple features based fingerprint identification system
eSAT Journals
 
PDF
Review on Fingerprint Recognition
EECJOURNAL
 
PDF
Sign Language Recognition with Gesture Analysis
paperpublications3
 
PDF
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
IJET - International Journal of Engineering and Techniques
 
PDF
Review of three categories of fingerprint recognition
prjpublications
 
PDF
Review of three categories of fingerprint recognition 2
prj_publication
 
PDF
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PDF
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
CSCJournals
 
PDF
A Survey on Fingerprint Identification for Different Orientation Images.
IRJET Journal
 
PDF
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
PDF
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
IJECEIAES
 
PDF
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet Transform
AM Publications
 
1834 1840
Editor IJARCET
 
Enhanced Thinning Based Finger Print Recognition
IJCI JOURNAL
 
V.KARTHIKEYAN PUBLISHED ARTICLE A.A
KARTHIKEYAN V
 
System for Fingerprint Image Analysis
vivatechijri
 
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMS
ijcsit
 
Dp34707712
IJERA Editor
 
Multiple features based fingerprint identification system
eSAT Journals
 
Review on Fingerprint Recognition
EECJOURNAL
 
Sign Language Recognition with Gesture Analysis
paperpublications3
 
[IJET-V2I2P6] Authors:Atul Ganbawle , Prof J.A. Shaikh
IJET - International Journal of Engineering and Techniques
 
Review of three categories of fingerprint recognition
prjpublications
 
Review of three categories of fingerprint recognition 2
prj_publication
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
International Journal of Biometrics and Bioinformatics(IJBB) Volume (3) Issue...
CSCJournals
 
A Survey on Fingerprint Identification for Different Orientation Images.
IRJET Journal
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
IJECEIAES
 
PREPROCESSING ALGORITHM FOR DIGITAL FINGERPRINT IMAGE RECOGNITION
ijcsity
 
Ad

More from International Journal of Technical Research & Application (20)

PDF
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
International Journal of Technical Research & Application
 
PDF
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
International Journal of Technical Research & Application
 
PDF
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
International Journal of Technical Research & Application
 
PDF
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
International Journal of Technical Research & Application
 
PDF
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
International Journal of Technical Research & Application
 
PDF
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
International Journal of Technical Research & Application
 
PDF
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
International Journal of Technical Research & Application
 
PDF
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
International Journal of Technical Research & Application
 
PDF
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
International Journal of Technical Research & Application
 
PDF
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
International Journal of Technical Research & Application
 
PDF
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
International Journal of Technical Research & Application
 
PDF
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
International Journal of Technical Research & Application
 
PDF
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
PDF
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
International Journal of Technical Research & Application
 
PDF
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
International Journal of Technical Research & Application
 
PDF
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
International Journal of Technical Research & Application
 
PDF
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
International Journal of Technical Research & Application
 
PDF
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
International Journal of Technical Research & Application
 
PDF
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
International Journal of Technical Research & Application
 
PDF
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
International Journal of Technical Research & Application
 
STUDY & PERFORMANCE OF METAL ON METAL HIP IMPLANTS: A REVIEW
International Journal of Technical Research & Application
 
EXPONENTIAL SMOOTHING OF POSTPONEMENT RATES IN OPERATION THEATRES OF ADVANCED...
International Journal of Technical Research & Application
 
POSTPONEMENT OF SCHEDULED GENERAL SURGERIES IN A TERTIARY CARE HOSPITAL - A T...
International Journal of Technical Research & Application
 
STUDY OF NANO-SYSTEMS FOR COMPUTER SIMULATIONS
International Journal of Technical Research & Application
 
ENERGY GAP INVESTIGATION AND CHARACTERIZATION OF KESTERITE CU2ZNSNS4 THIN FIL...
International Journal of Technical Research & Application
 
POD-PWM BASED CAPACITOR CLAMPED MULTILEVEL INVERTER
International Journal of Technical Research & Application
 
DIGITAL COMPRESSING OF A BPCM SIGNAL ACCORDING TO BARKER CODE USING FPGA
International Journal of Technical Research & Application
 
MODELLING THE IMPACT OF FLOODING USING GEOGRAPHIC INFORMATION SYSTEM AND REMO...
International Journal of Technical Research & Application
 
AN EXPERIMENTAL STUDY ON SEPARATION OF WATER FROM THE ATMOSPHERIC AIR
International Journal of Technical Research & Application
 
LI-ION BATTERY TESTING FROM MANUFACTURING TO OPERATION PROCESS
International Journal of Technical Research & Application
 
QUALITATIVE RISK ASSESSMENT AND MITIGATION MEASURES FOR REAL ESTATE PROJECTS ...
International Journal of Technical Research & Application
 
SCOPE OF REPLACING FINE AGGREGATE WITH COPPER SLAG IN CONCRETE- A REVIEW
International Journal of Technical Research & Application
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
International Journal of Technical Research & Application
 
EFFECT OF TRANS-SEPTAL SUTURE TECHNIQUE VERSUS NASAL PACKING AFTER SEPTOPLASTY
International Journal of Technical Research & Application
 
EVALUATION OF DRAINAGE WATER QUALITY FOR IRRIGATION BY INTEGRATION BETWEEN IR...
International Journal of Technical Research & Application
 
THE CONSTRUCTION PROCEDURE AND ADVANTAGE OF THE RAIL CABLE-LIFTING CONSTRUCTI...
International Journal of Technical Research & Application
 
TIME EFFICIENT BAYLIS-HILLMAN REACTION ON STEROIDAL NUCLEUS OF WITHAFERIN-A T...
International Journal of Technical Research & Application
 
A STUDY ON THE FRESH PROPERTIES OF SCC WITH FLY ASH
International Journal of Technical Research & Application
 
AN INSIDE LOOK IN THE ELECTRICAL STRUCTURE OF THE BATTERY MANAGEMENT SYSTEM T...
International Journal of Technical Research & Application
 
OPEN LOOP ANALYSIS OF CASCADED HBRIDGE MULTILEVEL INVERTER USING PDPWM FOR PH...
International Journal of Technical Research & Application
 

Recently uploaded (20)

PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PDF
July Patch Tuesday
Ivanti
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
The Rise of AI and IoT in Mobile App Tech.pdf
IMG Global Infotech
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
July Patch Tuesday
Ivanti
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
POV_ Why Enterprises Need to Find Value in ZERO.pdf
darshakparmar
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 

A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUANTIZATION

  • 1. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34 32 | P a g e A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUANTIZATION NAGHAM J. SHUKUR M.Sc in Space technologies and Communicatinon Unit of Applied Sciences Researchs, School of Applied Sciences, University of Technology, Baghdad, Iraq Abstract— Fingerprints are imprints formed by friction ridges of the skin and thumbs. They have long been used for identification because of their immutability and individuality. Immutability refers to the permanent and unchanging character of the pattern on each finger. Individuality refers to the uniqueness of ridge details across individuals; the probability that two fingerprints are alike is about 1 in 1.9x1015. In despite of this improvement which is adopted by the Federal Bureau of Investigation (FBI), the fact still is “The larger the fingerprint files became, the harder it was to identify somebody from their fingerprints alone. Moreover, the fingerprint requires one of the largest data templates in the biometric field”. The finger data template can range anywhere from several hundred bytes to over 1,000 bytes depending upon the level of security that is required and the method that is used to scan one's fingerprint. For these reasons this work is motivated to present another way to tackle the problem that is relies on the properties of Vector Quantization coding algorithm. Key words— Vector Quantization, Fingerprint, Vector Quantization coding algorithm I. INTRODUCTION Nowadays, fingerprint recognition is one of the most important biometric technologies based on fingerprint distinctiveness, persistence and ease of acquisition. Although there are many real applications using this technology, its problems are still not fully solved, especially in poor quality fingerprint images and when low-cost acquisition devices with a small area are adopted. Fig.1 Fingerprint Recognition process In fingerprint recognition process, the important step which affects on system accuracy is matching between template and query fingerprint. Many solutions are designed to increase this step’s accuracy ([1], [2], [3], [4], [5], [6]). Fingerprint imaging technology looks to capture or read the unique pattern of lines on the tip of one's finger. These unique patterns of lines can either be in a loop, whorl, or arch pattern [7]. There are several methods in accomplishing the process of identifying one's fingerprint [8]. The two major applications of fingerprint recognition are fingerprint verification and fingerprint identification. Verification is known as one-to-one fingerprint matching, whereas, fingerprint identification is known as one-to-many matching. Verification is used for access applications and identification is used for investigation purposes. Many successful approaches have been presented for verification applications, where the identification field is still open challenging area because of many problems. The main common problem that the verification faces is the huge database. This problem can be classified into two categories: first is establishing identify based on single print i.e. comparing a latent print from the scene of a crime with prints from a file. Second is establishing identify based on a set of ten fingerprint records i.e. record [9]. After arrest or employment are requirements. For reasons discussed in [10], the problem of the first category is extremely difficult, whereas the second one has greater quantity of information available from ten-print file searching. The traditional systems have sequential structure which suffers from a problem that the error propagates and information is blocked which means that the second stage can not use the information available at the first stage but it may suffer from the errors caused by the first stage. Moreover, conventionally, the matching process may use the following features: ridges or valleys (or both), minutia i.e. its type, location and direction, and global matching. Common Features are shown in Table 1 and Figure 1 respectively. Table 1. Common Features for Matching Process Ridges Various patterns across fingerprint Valleys Spaces between ridges Minutia Type (ending, bifurcation)Location (x,y) Direction Global Patterns Arch LoopWhorl
  • 2. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34 33 | P a g e Figure 2. Common global Patterns (above), common Minutia This work proposes new feature that can be used for matching. The proposed feature is a vector generated after the fingerprint image is compressed by Vector Quantization Coding approach. This vector is uniquely representing the entire image. Thus, it can be effectively used for matching purposes. The proposed algorithm is illustrated in section 3 and tested in section 4. Section 5 concludes this work and gives some recommendations. Before all, brief introduction to Vector Quantization coding is given in next section. 2. Vector Quantization Coding Algorithm: It uses a codebook that contains the pixel patterns with the corresponding index on each of them. The main idea of VQ in image coding is then to represent arrays of pixels by an index in the codebook. In this way, compression is achieved since the size of the index is usually a small fraction of that of the block of pixels [11]. 3. PROPOSED APPROCH: A. Mechanism Of The proposed system : In Figure 3. depicts the general mechanism of the proposed system. After the fingerprint image is fed to the system, it will be converted to binary image as a preprocessing stage. Then the binary image is compressed using Vector Quantization coding approach. The first stage in image vector quantization is the image formation. The image data are first partitioned into a set of vectors. A large number of vectors from various images are then used to form a training set. The training set is used to generate a codebook, normally using an iterative clustering algorithm. The quantization or coding step involves searching each input vector for the closest codeword in the codebook. Then the corresponding index of the selected codeword is coded and transmitted to the decoder. At the decoder, the index is decoded and converted to the corresponding vector with the same codebook as at the encoder by look-up table. Thus, the design decisions in implementing image vector quantization include [12]: 1. vector formation; 2. training set generation; 3. code book generation; and 4. quantization. Figure 3. Flowchart for the proposed algorithm the distance between the entire vector and the corresponding vector in codebook is equal to zero, but because of the entire image has not always the exact appearance to the image that captured during the stage of building the codebook, the distance may be greater. However, the shortest distance can be used to point to the corresponding vector and then fingerprint is identified. Procedure Of Applying Proposed System: The two important components for the system shown above are the Vector Quantization coding compression stage and the codebook. At compression stage the entire image which is binary matrix is compressed using Vector Quantization coding algorithm to produce a vector of almost 1/16 image size. For instance, for the fingerprint image of size 256x256 or 65536 which uses 65536 bytes, the generated vector length is 4096 that is using 8192 bytes. Therefore, the memory size is decreased by 1/8, from 65536bytes for original image to 8192bytes for corresponding vector. To build the codebook, same procedure can be followed, by converting the database (fingerprint images) to code vectors and assigning each one to its corresponding owner. Thus the codebook contains vectors rather than images. For instance, if we have 1 million finger images for 1 million persons, this database is traditionally using 256x256x1000000 = 655360000000 bytes ~ = 154 Gigabytes, their corresponding vectors use only 20720x1000000 bytes ~= 19 Gigabytes. These simple calculations lead to conclude that the identification rate has gained many benefits such as high speed as well as low False Acceptance Rate (FAR) / False Rejection Rate (FRR). REFERENCES [1] A. Jain, L. Hong, and R. Bolle, “On-line fingerprint verification,” IEEE Trans. Pattern Anal. Machine Intell, vol. 19, pp 302–314, 1997. X. Jiang, W. Y. Yau, "Fingerprint minutiae matching based on the local and global structures", ICPR2000, vol. 2, 2000, pp 1042-1045.
  • 3. International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 2, Issue 3 (May-June 2014), PP. 32-34 34 | P a g e [2] A.K. Jain, S. Prabhakar, L. Hong, S. Pankanti, "Filterbank- Based Fingerprint Matching", Image Processing, vol. 9, 2000, pp 846-859. [3] K. Ito, A. Morita, T. Aoki, H. Nakajima, K. Kobayashi, T. Higuch, "A Fingerprint Recognition Algorithm Combining Phase-Based Image Matching and Feature-Based Matching", International Conference on Biometrics, vol. 3832, 2006, pp 316–325. [4] 4. L. Sha, F. Zhao, X. Tang, "Minutiae-based Fingerprint Matching Using Subset Combination", The 18th International Conference on Pattern Recognition -ICPR'06, vol. 4, 2006, pp 566-569. [5] X. Jiang, W. Y. Yau, "Fingerprint minutiae matching based on the local and global structures", ICPR2000, vol. 2, 2000, pp. 1042-1045 [6] Xuejun Tan, Bir Bhanu, "Fingerprint matching by genetic algorithms", Pattern Recognition, vol. 39, 2006, pp. 465 –477. [7] Randell, N., Biometric basics, PC Magazine, April 1999, pp. 193-202. [8] The Center for Unified Biometrics and Sensors (CUBS), Fingerprint recognition, retrieved August 13, 2007: http://www.cubs.buffalo.edu/fingerrecog.sht ml. Accessed January 2008 [9] Abdurazzag Ali Aburas and Salem Ali Reheil, “New Promising Tool for Off Line Arabic Handwritten Character Recognition Based On JPEG2000 Image Compression”, IEEE-3rd International Conference on Information & Communication Technologies: From theory to Applications (ICTTA’08), Damascus-Syria, April 47-11 2008 [10] McMahon, D.H.; Johnson, G.L.; Teeter, S.L.; Whitney, C.G. (April 1975) A Hybrid Optical Computer Processing Technique for Fingerprint Identification, IEEE Transactions on Computers Volume C-24, Issue 4, Page(s):358 – 369 [11] Loben, C.: Introduction to Image Compression, http://www/image.cityu.edu.hkl~/thesis/node9.html; 1998. [12] Shi, Y.Q. and Sun, H.: Image and Video Compression for Multimedia Engineering: Fundamentals, Algorithms and Standards (1st ed.). CRC Press LLC, New York; 2000