Skip to main content
Log in

An efficient fingerprint identification algorithm based on minutiae and invariant moment

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

While we are experiencing many advantages of digital technologies and products, the security issues are also attracting increasing concerns. The secure fingerprint identification has become one of the most important research topics because of these increasing concerns. It has promoted us to propose an efficient fingerprint identification algorithm based on minutiae and invariant moment in this paper. In the proposed algorithm, the raw fingerprint image is first enhanced by the short-time Fourier transform (STFT). After that, the fingerprint minutiae can be extracted, which thereafter are selected as the center of region of interest (ROI), according to morphological transformation. Finally, a metric called cosine similarity among invariant moments is utilized to judge the similarities between fingerprint objects in the procedure of identification. The proposed algorithm is not limited to the fingerprint image with the fingerprint core. Experimental results show that the proposed algorithm provides a better performance in terms of matching accuracy when compared with the related works. The average accuracy is up to 96.67%. Moreover, the use of invariant moment of the ROI can avoid the leakage of fingerprint information and improve the security level of fingerprint recognition. Therefore, the proposed scheme is potentially used in many applications, such as smart fingerprint lock, intelligent community management information system, and automation control of home appliances.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Maltoni D, Maio D, Jain AK, et al (2009) Handbook of fingerprint recognition. Springer Science & Business Media

    Book  MATH  Google Scholar 

  2. Riganati JP, Vitols VA, Griffith ML (1971) Minutia-based fingerprint matching. IEEE Conference on Decision and Control IEEE:217–218

  3. Fleyeh H (2016) Segmentation and enhancement of low quality fingerprint images. In: International Conference on Web Information Systems Engineering. Springer International Publish, pp 371–384

  4. Yang JC, Park DS (2008) A fingerprint verification algorithm using tessellated invariant moment features. Neurocomputing 71(10):1939–1946

    Article  Google Scholar 

  5. Abdullahi SM, Wang HX, Qian Q, et al (2016) Concealing fingerprint-biometric data into audio signals for identify authentication. In: International Workshop on Digital Watermarking, pp 129–144

  6. Tewari K, Kalakoti RL (2014) Fingerprint recognition and feature extraction using transform domain techniques. In: International Conference on Advances in Communication and Computing Technologies. pp 1–5

  7. Yuan C, Xia Z, Sun X (2017) Coverless image steganography based on SIFT and BOF. Journal of Internet Technology 18(2):435–442

  8. Leng L, Zhang J, Xu J, Khan MK, Alghathbar K (2010) Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition. In: International Conference on Information and Communication Technology Convergence, IEEE, Jeju, pp 467–471

  9. Leng L, Zhang J, Khan MK, Chen X, Alghathbar K (2010) Dynamic weighted discrimination power analysis: a novel approach for face and palmprint recognition in DCT domain. International Journal of Physical Sciences 5(17):2543–2554

    Google Scholar 

  10. Benhammadi F, Amirouche MN, Hentous H et al (2007) Fingerprint matching from minutiae texture maps. Pattern Recogn 40(1):189–197

    Article  MATH  Google Scholar 

  11. Jin Z, Zeng YH, Li XJ, Beng A, Teoh J, Leng L (2015) A two-dimensional infinite-to-one transform for generating alignment-free cancelable fingerprint template. In: Proceedings of the 2015 Sixth International Conference on Digital Manufacturing and Automation, IEEE Computer Society, pp 16–21

  12. Maio D, Maltoni D, Cappelli R, et al (2000) FVC2000 Fingerprint Verfication Competiton Web http://bias.csr.unibo.it/fvc2000/download.asp [online available]

  13. Maio D, Maltoni D, Cappelli R, et al (2002) FVC2002 Fingerprint Verfication Competiton Web http://bias.csr.unibo.it/fvc2002/download.asp[online available]

  14. Ali MMH, Mahale V. H, Yannawar P, et al (2016) Fingerprint recognition for person identification and verification based on minutiae matching. In: International Conference on Advanced Computing, pp 332–339

  15. Leng L, Liu G, Li M, Khan MK, AI-Khouri AM (2014) Logical conjunction of triple-perpendicular-directional translation residual for contactless palmprint preprocessing. In: International Conference on Information Technology: New Generations, IEEE, Las Vegas, pp 523–528

    Google Scholar 

  16. Chikkerur S, Cartwright AN, Govindaraju V (2007) Fingerprint enhancement using STFT analysis. Pattern Recogn 40(1):198–211

    Article  MATH  Google Scholar 

  17. Tang Y, Jiang L, Hou Y, Wang R (2017) Contactless fingerprint image enhancement based on retinex and STFT. Comput Eng 43(2):248–251

    Google Scholar 

  18. Jang HU, Choi HY, Kim D, et al (2017) Fingerprint spoof detection using contrast enhancement and convolutional neural networks. In: Internet Conference on Information Science and Applications, pp 331–338

  19. De K, Masilamani V (2017) Image quality assessment for blurred images using no-subsampled contourlet transform features. Journal of Computers 12(2):156–164

    Google Scholar 

  20. Manfed B. http://www.bromba.com/faq/biofaqe.htm#Kurenpaar [online available]

Download references

Funding

This work was supported by the National Natural Science Foundation of China (NSFC) under the grant no. U1536110.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jing Sang or Hongxia Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sang, J., Wang, H., Qian, Q. et al. An efficient fingerprint identification algorithm based on minutiae and invariant moment. Pers Ubiquit Comput 22, 71–80 (2018). https://doi.org/10.1007/s00779-017-1094-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-017-1094-1

Keywords

Navigation