Skip to main content

Performance Benchmarking of Different Binarization Techniques for Fingerprint-Based Biometric Authentication

  • Conference paper
Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 226))

Abstract

Fingerprint analysis is a well-known biometrics for person identification and authentication. Computer vision based fingerprint recognition systems follow different preprocessing steps among which binarization is one of the most important steps. In an attempt towards benchmarking different global and local binarization techniques, it has been found that for a set of sample images two or more techniques show identical performance in terms of successful authentication. However, the accuracy of a fingerprint recognition system varies with different binarization techniques used in the preprocessing step and the same cannot be enumerated in the objective measure of success or failure. This paper proposes a quantitative evaluation measure namely confidence score to be used for benchmarking of different binarization techniques in a more effective manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shaikh, H.S., Maiti, K.A., Chaki, N.: A new image binarization method using iterative partitioning. Springer Journal on Machine Vision and Applications(MVAP) 24(2), 337–350 (2013)

    Article  Google Scholar 

  2. Sezgin, M., Sankur, B.: Survey over image thresholding techniques and quantitative performance evaluation. J. Electr. Imaging 13(1), 146–165 (2004)

    Article  Google Scholar 

  3. Otsu, N.: A threshold selection method from gray-level histogram. IEEE Transaction on Systems Man Cybernetics 9, 62–66 (1979)

    Article  Google Scholar 

  4. Kapur, N.J., Sahoo, K.P., Wong, C.K.A.: A new method for gray-level picture thresholding using the entropy of the histogram. CVGIP 29(3), 273–285 (1985)

    Google Scholar 

  5. Bernsen, J.: Dynamic thresholding of gray level images. In: Proceedings of the International Conference on Pattern Recognition (ICPR), pp. 1251–1255 (1986)

    Google Scholar 

  6. Niblack, W.: An Introduction to Digital Image Processing, pp. 115–116. Prentice Hall, Eaglewood Cliffs (1986)

    Google Scholar 

  7. Sauvola, J., Pietikainen, M.: Adaptive document image binarization. Pattern Recognition 33(2), 225–236 (2000)

    Article  Google Scholar 

  8. Waluś, M., Kosmala, J., Saeed, K.: Finger Vein Pattern Extraction Algorithm. In: Corchado, E., Kurzyński, M., Woźniak, M. (eds.) HAIS 2011, Part I. LNCS, vol. 6678, pp. 404–411. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  9. Kaggwa, F.: Evaluation of Multiple Enrollment for Fingerprint Recognition, M.Sc. Thesis, University of Twente (2011)

    Google Scholar 

  10. Maltoni, D., Maio, D., Jain, K.A., Prabhakar, S.: Springer professional computing. In: Handbook of Fingerprint Recognition. Springer (2009)

    Google Scholar 

  11. Zhili, W.: Fingerprint Recognition, Thesis for BS in Computer Science, Hong Kong Baptist University (2002)

    Google Scholar 

  12. Jain, C.L., Halici, U., Hayashi, I., Lee, B.S., Tsutsui, S.: Intelligent biometric techniques in fingerprint and face recognition. CRC Press (1999)

    Google Scholar 

  13. Hong, L., Wan, Y., Jain, K.A.: Fingerprint Image Enhancement: Algorithms and Performance Evaluation. IEEE Transactions on PAMI 20(8), 777–789 (1998)

    Article  Google Scholar 

  14. Jain, K.A., Hong, L., Pankanti, S., Bolle, R.: An identity authentication system using fingerprints. Proceedings of the IEEE 85(9), 1365–1388 (1997)

    Article  Google Scholar 

  15. Maio, D., Maltoni, D.: Direct Gray-scale Minutiae Detection in Fingerprints. IEEE Transactions on Pattern Analysis and Machine Intelligence 19(1), 27–40 (1997)

    Article  Google Scholar 

  16. Hong, L.: Automatic Personal Identification Using Fingerprints, Ph.D. Thesis (1998)

    Google Scholar 

  17. FVC2000: Fingerprint Verification Competition, http://www.csr.unibo.it/research/biolab (accessed in January 2013)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Soharab Hossain Shaikh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Shaikh, S.H., Saeed, K., Chaki, N. (2013). Performance Benchmarking of Different Binarization Techniques for Fingerprint-Based Biometric Authentication. In: Burduk, R., Jackowski, K., Kurzynski, M., Wozniak, M., Zolnierek, A. (eds) Proceedings of the 8th International Conference on Computer Recognition Systems CORES 2013. Advances in Intelligent Systems and Computing, vol 226. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-00969-8_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-00969-8_23

  • Publisher Name: Springer, Heidelberg

  • Print ISBN: 978-3-319-00968-1

  • Online ISBN: 978-3-319-00969-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics