scispace - formally typeset
Open AccessJournal ArticleDOI

An Efficient Reconfigurable Architecture for Fingerprint Recognition

Reads0
Chats0
TLDR
An efficient Finite State Machine FSM based reconfigurable architecture for fingerprint recognition using fusion scores with correlation matching technique for FVC2004 DB3 Database is proposed and performance parameters such as TSR Total Success Rate, FAR False Acceptance Rate, and FRR False Rejection Rate are computed.
Abstract:ย 
The fingerprint identification is an efficient biometric technique to authenticate human beings in real-time Big Data Analytics. In this paper, we propose an efficient Finite State Machine FSM based reconfigurable architecture for fingerprint recognition. The fingerprint image is resized, and Compound Linear Binary Pattern CLBP is applied on fingerprint, followed by histogram to obtain histogram CLBP features. Discrete Wavelet Transform DWT Level 2 features are obtained by the same methodology. The novel matching score of CLBP is computed using histogram CLBP features of test image and fingerprint images in the database. Similarly, the DWT matching score is computed using DWT features of test image and fingerprint images in the database. Further, the matching scores of CLBP and DWT are fused with arithmetic equation using improvement factor. The performance parameters such as TSR Total Success Rate, FAR False Acceptance Rate, and FRR False Rejection Rate are computed using fusion scores with correlation matching technique for FVC2004 DB3 Database. The proposed fusion based VLSI architecture is synthesized on Virtex xc5vlx30T-3 FPGA board using Finite State Machine resulting in optimized parameters.

read more

Content maybe subject toย copyrightย ย ย  Report

Research A rticle
An Efficient Reconfigurable Architecture for
Fingerprint Recognition
Satish S. Bhairannawar,
1
K. B. Raja,
2
andK.R.Venugopal
3
1
Department of Electronics and Communication, SDMCET, Dharwad 580002, India
2
Department of Electronics and Comm un ica tion, UVCE, Bangalore 560001, India
3
UVCE, Bangalore University, Bangalore, India
Correspondence should be addressed to Satish S. Bhairannawar; satishbhairannawar@gmail.com
Received ๎˜‚ December ๎˜ƒ๎˜„๎˜…๎˜†; Revised ๎˜ƒ๎˜‡ April ๎˜ƒ๎˜„๎˜…๎˜‡; Accepted ๎˜ˆ May ๎˜ƒ๎˜„๎˜…๎˜‡
Academic Editor: Lazhar Khriji
Copyright ยฉ ๎˜ƒ๎˜„๎˜…๎˜‡ Satish S. Bhairannawar et al. ๎˜‰is is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly
cited.
๎˜‰e ๎˜Šngerprint identi๎˜Šcation is an e๎˜‹cient biometric technique to authenticate human beings in real-time Big Data Analytics. In
this paper, we propose an e๎˜‹cient Finite State Machine (FSM) based recon๎˜Šgurable architecture for ๎˜Šngerprint recognition. ๎˜‰e
๎˜Šngerprint image is resized, and Compound Linear Binary Pattern (CLBP) is applied on ๎˜Šngerprint, followed by histogram to
obtain histogram CLBP features. Discrete Wavelet Transform (DWT) Level ๎˜ƒ features are obtained by the same methodology. ๎˜‰e
novel matching score of CLBP is computed using histogram CLBP features of test image and ๎˜Šngerprint images in the database.
Similarly, the DWT matching score is computed using DWT features of test image and ๎˜Šngerprint images in the database. Further,
the matching scores of CLBP and DWT are fused with arithmetic equation using improvement factor. ๎˜‰e performance parameters
such as TSR (Total Success Rate), FAR (False Acceptance Rate), and FRR (False Rejection Rate) are computed using fusion scores
with correlation matching technique for FVC๎˜ƒ๎˜„๎˜„๎˜Œ DB๎˜ Database. ๎˜‰e proposed fusion based VLSI architecture is synthesized on
Virtex xc๎˜†vlx๎˜๎˜„T-๎˜ FPGA board using Finite State Machine resulting in optimized parameters.
1. Introduction
๎˜‰e reliable personnel authentication [๎˜…, ๎˜ƒ] based on bio-
metrics has signi๎˜Šcant importance in the present digital
worldandcanbeachievedbyhumanandcomputerinterface
activities. ๎˜‰e evolution of biometrics in recent years from
single mode to multiple mode closed systems has made
it possible to consider for Big Data processing [๎˜, ๎˜Œ]. ๎˜‰e
development of new algorithms and parallel processing archi-
tectureshasanimpactforBigDataprocessingresponsetime.
๎˜‰e interoperable feature and many sources and avenues for
collection of biometric samples have made the biometric
evolution of Big Data possible. ๎˜‰e biometric physiologi-
cal or b ehavioural samples are captured using sensors or
devices, which are further processed in the next level of
vetting through O๎˜‹ce for Personal Management (OPM)
which can be either veri๎˜Šcation or identi๎˜Šcation. Fingerprint
based identi๎˜Šcation is one of the most important biometric
technologies, which have drawn a substantial amount of
attention recently since the process of acquiring ๎˜Šngerprint
samples are easy and simple. A ๎˜Šngerprint is seen as a set of
interleavedridgesandvalleysonthesurfaceofthe๎˜Šnger.๎˜‰e
most ๎˜Šngerprint matching approach relies on the fact that the
uniqueness of a ๎˜Šngerprint can be determined by minutiae,
which are represented by either bifurcation or termination
ofridges.๎˜‰equalityandenhancedminutiae[๎˜†โ€“๎˜‚],which
in๎˜Žuence recognition rates are discussed in literature.
๎˜‰e features of a ๎˜Šngerprint can be derived using the
following: (i) Spatial domain:thefeaturesofanimageare
carried out directly on pixel value. Examples are L ocal Binary
Pattern [๎˜], Complete Linear Binary Pattern [๎˜ˆ], and Singular
Value Decomposition [๎˜…๎˜„]. (ii) Transform domain:inthisany
transform is applied to an original image to get a t ransformed
imageonwhichfurtherprocessingisdone.Examplesare
Fast Fourier Transform [๎˜…๎˜…], Discrete Cosine Transform [๎˜…๎˜ƒ],
Discrete Wavelet Transform [๎˜…๎˜], and Dual Tree Complex
Hindawi Publishing Corporation
VLSI Design
Volume 2016, Article ID 9532762, 22 pages
http://dx.doi.org/10.1155/2016/9532762

๎˜ƒ VLSI Design
Wavelet Transform [๎˜…๎˜Œ]. (iii) Fusion: in this technique [๎˜…๎˜†, ๎˜…๎˜‡]
it combines the advantages of both spatial and transform
domain.
๎˜‰e automated ๎˜Šngerprint recognition system is used
for both identi๎˜Šcation and veri๎˜Šcation against standard
database law enforcement agencies to identify the suspect
for committing cr i me or for attendance veri๎˜Šcation process
to verify t he claimed identity. ๎˜‰e performance speed of
๎˜Šngerprint system is a critical factor to be addressed while
dealing with large databases. ๎˜‰e real-time processing of a
๎˜Šngerprintrecognitionsystemisitsabilitytoprocessthelarge
data and produce the results within certain time constraints
in the order of milliseconds and sometimes microseconds
depending on the application and the user requirements.
In this category, Field Programmable Gate Array (FPGA)
outperforms other processors. ๎˜‰e FPGAs are specially built
hardware optimized for speed and are suitable for real-time
biometric data processing. Multicores and HPC clusters have
reasonable real-time processing capabilities, but not e๎˜‹cient
as FPGA with many processing cores and high bandwidth
memory.
In real time, speed of the algorithm becomes crucial
which in turn de๎˜Šnes the throughput. ๎˜‰e e๎˜‹cient FPGA
architectures [๎˜…๎˜‚โ€“๎˜ƒ๎˜„] for ๎˜Šngerprint processing and existing
algorithms to identify a ๎˜Šngerprint based on minutiae [๎˜ƒ๎˜…],
ridge, multiresolution features, and Hough transform were
discussed.
Vatsaetal.[๎˜ƒ๎˜ƒ]proposedRedundantDiscreteWavelet
Transform based on local image quality assessment algorithm
followed by extraction algorithm using Level ๎˜ features.
๎˜‰ese features are combined with Level ๎˜… and Level ๎˜ƒ in
the ๎˜Šngerprint identi๎˜Šcation scheme. Finally, the matching
performance was improved by using quality based likelihood
ratios. Govan and Buggy [๎˜ƒ๎˜] proposed e๎˜ective matching
solution that addresses security and privacy issues. ๎˜‰is tech-
nique eliminates t he requirement to release biometric tem-
plate data into an open environment which uses embedded
applications such as smart cards. ๎˜‰e e๎˜ective disturbance
rejection methodology which is able to di๎˜erentiate between
equivalent and insigni๎˜Šcant structure models was discussed.
Nain et al. [๎˜ƒ๎˜Œ] proposed an algorithm to classify ๎˜Šn-
gerprint images into four di๎˜erent classes using High Ridge
Cur vature (HRC) algorithm involving two stages. In the ๎˜Šrst
stage, HRC region was extracted, which avoids core point
detection. In the second stage, ridges inside HRC region were
considered for matching. ๎˜‰e global distribution structure
and the local matching similarities [๎˜ƒ ๎˜†] between ๎˜Šngerprints
were considered for matching using Hidden Markov Model
(HMM) [๎˜ƒ๎˜‡]. Nikam and Agarwal [๎˜ƒ๎˜‚] proposed spoof ๎˜Šn-
gerprint detection using ridge let transform. ๎˜‰e comparisons
of individual ridgelet energy and cooccurrence signatures
were analysed and also testing was done using diverse
classi๎˜Šers. Masmoudi et al. [๎˜ƒ๎˜] proposed an algorithm which
used the rotation invariant measured as local phase and was
combined with Linear Binary Pattern Features to improve
the performance accuracy. Stewart et al. [๎˜ƒ๎˜ˆ] proposed the
test technique to determine the e๎˜ects of outdoor and cold
weathere๎˜ectsonchipversusoptical๎˜Šngerprintscanner,
๎˜Šngerprint recognition quality, and device interaction. ๎˜‰e
results suggested that performance has no dependence on
temperature and humidity. Cao and Dai [๎˜๎˜„] proposed ๎˜Šnger-
print segmentation for online process using frame di๎˜erence
technique. Further the segmented foreground was used for
identi๎˜Šcation.
Umamaheswari et al. [๎˜๎˜…] proposed ๎˜Šngerprint classi๎˜Šca-
tion and recognition using neuro-nearest neighbour based
method which improves classi๎˜Šcation rate. ๎˜‰is consists of
di๎˜erent stages such as image enhancement, line detector
base feature extraction, and neural network classi๎˜Šcation
using back propagation networks. ๎˜‰e results have shown
the accurate estimation of orientation and ridge frequency
which helps in better recognition. C onti et al. [๎˜๎˜ƒ] proposed
pseudo-singularity points based ๎˜Šngerprint recognition. ๎˜‰is
technique uses additional parameters such as their relative
distance and orientation around standard singularity points
(core and delta) which enhances the matching performance.
Ahmed et al. [๎˜๎˜] proposed Compound Local Binary Pattern
(CLBP) for rotation invariant texture classi๎˜Šcation. ๎˜‰is com-
bines magnitude information of the di๎˜erence b etween two
grey values with original LBP pattern and provides robust-
ness. Paulino et al. [๎˜๎˜Œ] proposed an alignment algorithm
(descriptor-based Hough t r ansform) for latent ๎˜Šngerprint
matching. ๎˜‰is technique measures similarity between ๎˜Šn-
gerprints by considering both minutiae and orientation ๎˜Šeld
information. ๎˜‰e comparison was done between proposed
and generalized Hough transform for large database.
Feng et al. [๎˜๎˜†] proposed a technique using orientation
๎˜Šeld estimation base d on prior knowledge of ๎˜Šngerprint
structure. ๎˜‰e dictionary of reference for orientation patches
was constructed using a true set of orientation ๎˜Šelds. ๎˜‰e
approach was applied to the overlapped latent ๎˜Šngerprint
database to achieve better performance compared to conven-
tional algorithms.
Contribution. ๎˜‰e contribution and novel aspects of the
proposed techniques are listed as follows: (i) the computation
of the novel matching score for CLBP and DWT features; (ii)
thematchingscorevalueswhicharevariedbasedonchar-
acteristics of images, that is, the values which are computed
adaptively based on characteristics of the images; (iii) the
fusion of matching scores with improvement factor; (iv) the
implementation of FSM based VLSI architecture to improve
the hardware performance.
2. Proposed Fingerprint Recognition System
An e๎˜‹cient ๎˜Šngerprint recognition model using histogram of
CLBPscores,DWTfeaturescores,andfusionofbothscores
is given in Figure ๎˜….
2.1. Fingerprint Database. ๎˜‰e DB๎˜ of FVC๎˜ƒ๎˜„๎˜„๎˜Œ ๎˜Šngerprint
database [๎˜๎˜‡] is considered for performance analysis. ๎˜‰e
size of each ๎˜Šngerprint image is ๎˜๎˜„๎˜„ ร—๎˜Œ๎˜๎˜„ with ๎˜†๎˜…๎˜ƒ dpi. ๎˜‰e
๎˜Šngerprint samples of ten di๎˜erent persons are shown in
Figure ๎˜ƒ.

VLSI Design ๎˜
CLBP
CLBP
Histogram
Histogram
DWT
DWT
DWT
features
DWT
features
DWT
matching
CLBP
matching
Fusion
Match score
DWT
Match score
CLBP
Match/
mismatch
Training samples
Test samples
Recognition stage
Training stage
Image
resizer
(256 ร— 256 )
Image
resizer
(256 ร— 256 )
F๎˜‘๎˜’๎˜“๎˜”๎˜• ๎˜…: Block diagram of the proposed ๎˜Šngerprint recognition system.
2.2. Preprocessing. ๎˜‰e original ๎˜Šngerprint image of size ๎˜๎˜„๎˜„
ร—๎˜Œ๎˜๎˜„ is resized to ๎˜ƒ๎˜†๎˜‡ ร—๎˜ƒ๎˜†๎˜‡, which is suitable for hardware
implementation.
2.3. Complete Local Binary Pattern (CLBP). It is an extension
of the Local Binary Pattern (LBP) [๎˜๎˜‚] texture operator.
๎˜‰e CLBP operator gives both sign CLBP
๎˜‚and magnitude
components CLBP
๎˜ƒ for each pixel from its neighbouring
pixels. If ๎˜„isthenumberofneighboursofacentrepixel,then
CLBP operator uses 2๎˜„bits to code centre pixel. ๎˜‰e ๎˜Šrst ๎˜„
MSB bits represent sign and the next ๎˜„ LSB bits represent
magnitude.
๎˜‰e binary bit patterns are generated for sign and mag-
nitude components for each pixel. ๎˜‰e ๎˜Šngerprint image is
scanned from le๎˜– to right and top to bottom and considering
each pixel which is surrounded by ๎˜ neighbouring pixels, that
is, ๎˜ ร— ๎˜ matrix. ๎˜‰e centre pixel intensity value is ๎˜…
๐‘
and
surrounded neighbouring pixel intensity values, say, ๎˜…
๐‘
.๎˜‰e
sign bit patterns for ๎˜ ร—๎˜ matrices are generated using
๎˜‚
(
๎˜…
)
=
๎˜†
๎˜‡
๎˜ˆ
0, ๎˜…
๐‘
โˆ’๎˜…
๐‘
โ‰ค0
1, ๎˜…
๐‘
โˆ’๎˜…
๐‘
>0.
(๎˜…)
๎˜‰e magnitude bit pattern is generated using
๎˜ƒ
(
๎˜…
)
=
๎˜†
๎˜‡
๎˜ˆ
0, ๎˜…
๐‘
โˆ’๎˜…
๐‘
โ‰ค๎˜ƒ
avg
1, ๎˜…
๐‘
โˆ’๎˜…
๐‘
>๎˜ƒ
avg
,
(๎˜ƒ)
where ๎˜ƒ
avg
= |๎˜Š1|+|๎˜Š2|โ‹…โ‹…โ‹…|๎˜Š8|/8 and ๎˜Š1to ๎˜Š8are the
magnitude values of the di๎˜erence between respective ๎˜…
๐‘
and
๎˜…
๐‘
.
Each neighbourhood pixel is represented by two bits;
that is, MSB bit represents sign and the LSB bit represents
magnitude. Each centre pixel is represented by eight sign
bits and eight magnitude bits. ๎˜‰e example for CLBP is as
shown in Figure ๎˜. ๎˜‰e arbitrary values for ๎˜ ร— ๎˜matrix
are considered in Figure ๎˜(a). ๎˜‰e values of neig hbouring
pixels are subtracted from centre pixel value and are given
in Figure ๎˜(b). ๎˜‰e sign of each co e๎˜‹cient in Figure ๎˜(b) is
representedinFigure๎˜(c)assigncomponentofCLBP.๎˜‰e
magnitudecomponentsofCLBPareshowninFigure๎˜(d)
by considering only magnitude of Figure ๎˜(b). ๎˜‰e average
value of the CLBP magnitude component is computed and
is compared with neighbouring CLBP magnitude coe๎˜‹cient
values and assigns binary values using (๎˜ƒ) to generate CLBP
magnitude p attern given in Figure ๎˜(f). ๎˜‰e numbers of
centrepixelsavailableforimagesize๎˜ƒ๎˜†๎˜‡ร— ๎˜ƒ๎˜†๎˜‡ are ๎˜‡๎˜Œ๎˜†๎˜…๎˜‡
using ๎˜ ร—๎˜ window matrix. ๎˜‰e binary eight bits of sign and
magnitude of each pixel are converted into decimal values for
feature extraction. If the CLBP sign and magnitude coe๎˜‹cient
features are considered directly for an image size of ๎˜ƒ๎˜†๎˜‡ ร—
๎˜ƒ๎˜†๎˜‡, the algorithm requires ๎˜‡๎˜Œ๎˜†๎˜…๎˜‡ for sign and ๎˜‡๎˜Œ๎˜†๎˜…๎˜‡ for
magnitude; that is, total number of features are ๎˜…๎˜ƒ๎˜ˆ๎˜„๎˜๎˜ƒ.
2.3.1. Histogram of CLBP Features. ๎˜‰e features obtained
directly from CLBP are large in number and hence increase in

๎˜Œ VLSI Design
F๎˜‘๎˜’๎˜“๎˜”๎˜• ๎˜ƒ: Sample images of ten di๎˜erent persons of FVC๎˜ƒ๎˜„๎˜„๎˜Œ database.
matching processing time and are a disadvantage in hardware
implementation. ๎˜‰e histogram on CLBP produces only ๎˜ƒ๎˜†๎˜‡
features for each sign and magnitude. Hence the number of
features is reduced from ๎˜…๎˜ƒ๎˜ˆ๎˜„๎˜๎˜ƒ to ๎˜†๎˜…๎˜ƒ, that is, approximately
๎˜„.๎˜Œ% features compared to CLBP. ๎˜‰e advantage of histogram
on CLBP is that the number of features reduces and also
features are more unique. ๎˜‰e histograms of original ๎˜Šnger-
print, sign, and magnitude components of CLBP are shown
in Figure ๎˜Œ.
2.3.2. Proposed CLBP Matching Score. ๎˜‰e CLBP histograms
oftestanddatabaseimagesarecomparedcomponentwiseto
compute CLBP match score ๎˜Œ.๎˜‰eabsolutesigncomponent
di๎˜erence CLBP
๎˜‚ ๎˜
๐‘–
betweensigncomponentCLBP ๎˜‚ ๎˜Ž
๐‘–
of
test ๎˜Šngerprint and sign component CLBP
๎˜‚ ๎˜
๐‘—๐‘–
of ๎˜Šnger-
print images in the database is computed using
CLBP
๎˜‚ ๎˜
๐‘–
=
๎˜
๎˜
๎˜
๎˜
๎˜
CLBP
๎˜‚ ๎˜Ž
๐‘–
โˆ’CLBP ๎˜‚ ๎˜
๐‘—๐‘–
๎˜
๎˜
๎˜
๎˜
๎˜
, (๎˜)
where ๎˜is intensity values (๎˜„ to ๎˜ƒ๎˜†๎˜†); ๎˜‘=numberofpersons
in the database ร—number of images per person.
๎˜‰e CLBP sign histogram coe๎˜‹cients match ๎˜’
๐‘–
is com-
puted based on threshold sign di๎˜erence value (๎˜…๎˜Œ for best
match) given in
๎˜’
๐‘–
=
๎˜†
๎˜‡
๎˜ˆ
1, CLBP
๎˜‚ ๎˜
๐‘–
<14
0, otherwise.
(๎˜Œ)
๎˜‰e absolute magnitude component di๎˜erence
CLBP
๎˜ƒ ๎˜
๐‘–
between magnitude component CLBP ๎˜ƒ ๎˜Ž
๐‘–
of
test ๎˜Šngerprint and magnitude component CLBP
๎˜ƒ ๎˜
๐‘—๐‘–
of
๎˜Šngerprint images in the database is computed using
CLBP
๎˜ƒ ๎˜
๐‘–
=
๎˜
๎˜
๎˜
๎˜
๎˜
CLBP
๎˜ƒ ๎˜Ž
๐‘–
โˆ’CLBP ๎˜ƒ ๎˜
๐‘—๐‘–
๎˜
๎˜
๎˜
๎˜
๎˜
, (๎˜†)
where ๎˜is intensity values (๎˜„ to ๎˜ƒ๎˜†๎˜†); ๎˜‘=numberofpersons
in the database ร—number of images per person.
๎˜‰e CLBP magnitude histogram coe๎˜‹cient match ๎˜“
๐‘–
is
computed based on threshold magnitude di๎˜erence value (๎˜…๎˜
for best match) given in
๎˜“
๐‘–
=
๎˜†
๎˜‡
๎˜ˆ
1, CLBP
๎˜ƒ
๐ท
๐‘–
<18
0, otherwise.
(๎˜‡)

VLSI Design ๎˜†
912 34
10 25 28
99 64 56
โˆ’1 โˆ’11
1
โˆ’1
111
16 13 9
15 3
313974
74 39 31
3
โˆ’15
โˆ’16 โˆ’13
00 00 11
00 11
11 11 11
9
91234
10 25 28
99 64 56
(e) (f)
(d)(c)
(a) (b)
CLBP
operator
F๎˜‘๎˜’๎˜“๎˜”๎˜• ๎˜: CLBP operator: (a) ๎˜ ร—๎˜ sample block; (b) local di๎˜erence; (c) sign components; (d) magnitude components; (e) original matrix;
(f) CLBP matrix.
๎˜‰e overall CLBP match count by considering both sign and
magnitude histogram coe๎˜‹cients is
CLBP
Match count
=
๎˜†
๎˜‡
๎˜ˆ
Match count +1, if ๎˜’
๐‘–
โ‹…๎˜“
๐‘–
=1
Match count, otherwise.
(๎˜‚)
๎˜‰e CLBP match score is computed using CLBP match count
and number of histogram levels using
%CLBP
Match score ๎˜Œ
=
CLBP
Match count โˆ—100
Number of Histogram Levels
.
(๎˜)
๎˜‰e ๎˜‰rst and eighth samples of same person are considered
as database and test image. ๎˜‰e original ๎˜Šngerprint, CLBP
magnitude component, and CLBP sign component images of
database and test image are shown in Figures ๎˜†(a)โ€“๎˜†(c) and
๎˜†(d)โ€“๎˜†(f) respectively. ๎˜‰e CLBP
Match score is computed
betweendatabaseimageandtestimageofthesameperson,
which yields high value, that is, ๎˜‡๎˜‚.๎˜ˆ%.
๎˜‰e ๎˜‰rst and eighth samples of di๎˜erent person are con-
sidered as database and test image. ๎˜‰e original ๎˜Šngerprint,
CLBP magnitude component and CLBP sign component
imagesofthedatabaseandtestimageareshowninFigures
๎˜‡(a)โ€“๎˜‡(c) and ๎˜‡(d)โ€“๎˜‡(f) respectively. ๎˜‰e CLBP
Match score
is computed between t he database image and test image of the
di๎˜erent person, which yields low value, that is, ๎˜†๎˜….๎˜ˆ๎˜†๎˜๎˜…%.
2.4. DWT Algorithm. ๎˜‰e DWT [๎˜๎˜] provides spatial and
frequency characteristics of an image. It has an advantage
over Fourier transform in terms of temporal resolution where
it captures both frequency and location information. ๎˜‰e
signal is translated into shi๎˜–ed and scaled versions of the
mother wavelet to generate DWT bands. ๎˜‰e ๎˜Šngerprint
image is decomposed into multiresolution representation
using DWT. ๎˜‰e LL subband gives overall information of
the original ๎˜Šngerprint image, the LH subband represents
horizontal information of the ๎˜Šngerprint image, HL gives
vertical characteristics of the ๎˜Šngerprint image, and HH gives
diagonal details.
๎˜‰e Haar wavelets are orthogonal and have simplest
useful energy compression process. ๎˜‰e Haar transformation
on one-dimension inputs leads to a ๎˜ƒ-element vector using
๎˜•
๎˜“
(
1
)
,๎˜“
(
2
)
๎˜–
=๎˜Ž
(
๎˜’
(
1
)
,๎˜’
(
2
))
,
(๎˜ˆ)
where ๎˜Ž = (1/
๎˜—
2)๎˜•
11
1โˆ’1
๎˜– is the Haar operato r and ๎˜“(1)
and ๎˜“(2)are the sum and di๎˜erence of ๎˜’(1)and ๎˜’(2)which
producelowpassandhighpass๎˜Šltering,respectively,scaled
by 1/
๎˜—
2 to preserve energy. ๎˜‰e Haar operator ๎˜Ž is an
orthonormal matrix since its rows are orthogonal to each
other(theirdotproductsarezero)andhaveunitlengths;
therefore ๎˜Ž
โˆ’1
=๎˜Ž
๐‘‡
. Hence we may recover ๎˜’from ๎˜“using
(
๎˜’
(
1
)
,๎˜’
(
2
))
=๎˜Ž
๐‘‡
๎˜•๎˜“
(
1
)
,๎˜“
(
2
)
๎˜–.
(๎˜…๎˜„)
For ๎˜ƒD image, Let ๎˜’ be ๎˜ƒ ร— ๎˜ƒmatrixofanimage;the
transformation ๎˜“is obtained by multiplying columns of ๎˜’by

Citations
More filters
Proceedings ArticleDOI

Effective fingerprint recognition approach based on double fingerprint thumb

TL;DR: The implemented approach concentrated on the feature extraction part in which many levels of two dimensional discrete wavelet transform (2D-DWT) are used to generate high performance feature.
Journal ArticleDOI

Efficient FPGA architecture of optimized Haar wavelet transform for image and video processing applications

TL;DR: In this paper, an efficient hardware architecture of Optimized Haar Wavelet Transform (DWT) is proposed which is modeled using Optimized Kogge-Stone Adder/Subtractor, Optimized Controller, Buffer, Shifter and D_FF blocks.
Journal ArticleDOI

A Systematic Review of Fingerprint Recognition System Development

TL;DR: This study shows the direction of currently performed empirical research on fingerprint recognition by comparing the selected published work to the classification criteria and evaluating them.
References
More filters
Journal ArticleDOI

On combining classifiers

TL;DR: A common theoretical framework for combining classifiers which use distinct pattern representations is developed and it is shown that many existing schemes can be considered as special cases of compound classification where all the pattern representations are used jointly to make a decision.
Journal ArticleDOI

A Completed Modeling of Local Binary Pattern Operator for Texture Classification

TL;DR: It is shown that CLBP_S preserves more information of the local structure thanCLBP_M, which explains why the simple LBP operator can extract the texture features reasonably well and can be made for rotation invariant texture classification.
Book

Biometrics: Personal Identification in Networked Society

TL;DR: This book covers the general principles and ideas of designing biometric-based systems and their underlying tradeoffs, and the exploration of some of the numerous privacy and security implications of biometrics.
Journal ArticleDOI

A survey on platforms for big data analytics

TL;DR: An in-depth analysis of different hardware platforms available for big data analytics and assesses the advantages and drawbacks of each of these platforms based on various metrics such as scalability, data I/O rate, fault tolerance, real-time processing, data size supported and iterative task support.
Book

Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society

TL;DR: Biometrics: Personal Identification in Networked Society is an invaluable work for scientists, engineers, application developers, systems integrators, and others working in biometrics.