Image Processing
Image Processing
SESSION 2017-2018
Supervisor: Submitted By
Prakhar Saxena
Pratiksha Khatarkar
SGSITS INDORE
Indore – M.P.
Department of Electrical Engineering
Indore – M.P.
November 2017
STATEMENT OF ORIGINALITY
In accordance with the requirement for the degree of bachelor of engineering in department of
electrical engineering. We present this project report of phase I entitled “Image Processing
Applications For Biometric Recognition And Security Issues”. This report/project (phase I)
was completed under the supervision of Prof. M.P.S. CHAWLA, Associate Prof. EED, SGSITS INDORE
(M.P.).
We declare that the work presented in the report is our own original work and all references
taken are duly acknowledged in the text and to the best of our knowledge. This material has
not been submitted either a whole or in part for a degree either at this institute or at any other
institution or elsewhere.
Name of the student Signature
Bhavya Verma
Neha Bisen
Piyusha Agrawal
Prakhar Saxena
Prartiksha Khatarkar
Date:
Department of Electrical Engineering
Indore – M.P.
SESSION 2017-2018
RECOMMENDATION
The Major Project Phase I Entitled “Image Processing Applications For
Biometric Recognition And Security Issues” Submitted By “Bhavya Verma,
Neha Bisen, Piyusha Agrawal, Prakhar Saxena, Pratiksha Khatarkar”, Towards
The Fulfillment Of Bachelors Of Engineering(Electrical) Of Rajiv Gandhi
Prodhyogiki Vishvavidhyalaya, Bhopal –M.P. Is Satisfactory Account Of The
Progress Made By Them In The Dissertation Work
SGSITS INDORE
Department of Electrical Engineering
Indore – M.P
CERTIFICATE
This is to certify that “, Bhavya Verma, Neha Bisen, Piyusha Agrawal, Prakhar
Saxena Pratiksha Khatarkar” students of final year B.E.(electrical engineering
department ) in the year 2017of this institute have completed the project work
entitled “Image Processing Applications For Biometric Recognition And
Security Issues” based on syllabus and have submitted a satisfactory account of
their work in this project.
SIGNATURE SIGNATURE
ACKNOWLEDGEMENT
First and foremost, we would like to express our sincere gratitude to our project
guide, of PROF. M.P.S. CHAWLA, ASSO. PROF. EED, SGSITS INDORE (MP). We all
are privileged to experience a sustained enthusiastic and involved interest from
his side. This fuelled our enthusiasm even further and encouraged us to boldly
step into what was a totally dark and unexplored expanse before us.
It gives the pleasure to offer thank to all the teachers & laboratory
assistants & peons for their kind help and suggestion. We like to thank our friend
and colleagues for their help and co-operation without which this project would
have not been possible.
Bhavya Verma
Neha Bisen
Piyusha Agrawal
Prakhar Saxena
Pratiksha khatarkar
Overview of the Project
1.4 Conclusion 3
2.4 Types 7
2.5 Application 8
2.12 Conclusion 14
CHAPTERS -3 BIOMETRICS 17
3.1 What are biometrics 17
3.5 Performance 20
3.9 Minutiae 23
3.11 Conclusion 27
CHAPTER-5 CONCLUSION 30
REFERENCES 32
CHAPTER 1
INTRODUCTION
1.1 OVERVIEW:
Image processing is the application of signal processing techniques to the
domain of images-two-dimensional signals such as photographs or video.
Image processing does typically involve filtering or enhancing an image
using various types of functions in addition to other techniques to extract
information from the images [4]. Thus Image processing and computer
vision are basically concerned with developing algorithms for analyzing the
contents of an image for various purposes like automated identification or
verification of human identity.
Thus our primary focus in this report will be on understanding the various
jargons involved in image processing and comprehend the basics of the
biometric systems which could be used for security purposes. Together the
combination of the two will lead to developing an algorithm which can serve
the greater purpose of image processing application to biometric
recognition and security concept.
Security is a trade off, a balancing act between attacker and defender.
Unfortunately, that balance is never static. Changes in technology affect
both sides. Society uses new technologies to decrease what is called the
scope of defection- what attackers can get away with-and attackers use
new technologies to increase it. What’s interesting is the difference
between how the two groups incorporate new technologies.
In the ever changing world of global data communications, inexpensive
Internet connections, and fast-paced software development, security is
becoming more and more of an issue. Security is now a basic requirement
because global computing is inherently insecure. As our data goes from
point A to point B on the Internet, for example, it may pass through several
other points along the way, giving other users the opportunity to intercept,
and even alter it. With the growing technology security systems are getting
evolved to face the growing threats. These security systems are designed
very carefully to provide the user with a safe and a reliable environment.
Biometrics is one such method which has proven to be very effective and
reliable.
Page|1
1.2 CONVENTIONAL METHODS USED FOR SECURITY PURPOSE
In most cases, the security mechanism provided are easy to crack, the use
of PIN codes and passwords suffers from numerous usability and security
problems. The drawbacks of passwords are mostly due to authorized users
selecting simple or guessable combinations (e.g. their birth date), sharing
the password, using the same password for multiple purposes and
accounts or even writing it down. Furthermore, users tend to activate their
device and keep it active for long periods of time (more than 10 hours a
day). Thus in many cases devices are left unprotected and unsecured for
long periods of time. The small size and the high cost of the devices make
them susceptible to loss or theft. The large amount of mostly unprotected
data stored on the device puts the user at risk. This risk is amplified by lack
of awareness and the appropriate security mechanisms to mitigate it.
1.4 Conclusion
It is very important for banking, companies to provide high security system
to their valuable .In this chapter by using image processing and verification
more security will be provided than any other system .the image processing
technique uses colour processing which use the primary image
filtering to eliminate the unaltered colour or object in the image. It is more
secured system which is cost effective. It compares the whether the image
is same and at the same place as that of initially recorded. to increase the
security of system ,it is recommended for future work to add recognition,
which will increase the system authentication and reliability that mean
increasing the efficiency of security work.
Page|3
CHAPTER 2
IMAGE PROCESSING
2.) Analyzing and manipulating the image which includes data compression
and image enhancement and spotting patterns that are not to human eyes
like satellite photographs.
3.) Output is the last stage in which result can be altered image or report
that is based on image analysis.
Page|4
2.2 Different Types of Tasks involved
Page|5
2.3 Purpose of Image processing
The purpose of image processing is divided into 5 groups [4]. They are:
1. Visualization - Observe the objects that are not visible.
2. Image sharpening and restoration - To create a better image.
3. Image retrieval - Seek for the image of interest.
4. Measurement of pattern – Measures various objects in an image.
5. Image Recognition – Distinguish the objects in an image.
2.4 Types
The two types of methods used for Image Processing are Analog and
Digital Image Processing. Analog or visual techniques of image processing
can be used for the hard copies like printouts and photographs. Image
analysts use various fundamentals of interpretation while using these visual
techniques. The image processing is not just confined to area that has to
be studied but on knowledge of analyst. Association is another important
tool in image processing through visual techniques. So analysts apply a
combination of personal knowledge and collateral data to image
processing.
Page|6
2. Space image processing (e.g., Hubble space telescope images,
interplanetary probe images)
3. Medical/Biological image processing (e.g., interpretation of X-ray
images, blood/cellular microscope images).
4. Automatic character recognition (zip code, license plate recognition)
5. Finger print/face/iris recognition
6. Remote sensing: aerial and satellite image interpretations
7. Reconnaissance
8. Industrial applications (e.g., product inspection/sorting)
Page|7
2.6 IMAGE PROCESSING TOOLBOX
>> f= imread('C:\Users\Bhavya\Desktop\index.jpeg');
Page|8
2.7.2 whos function
The whos function displays the additional information about an array.
Example-
>> whos f
RESULT-
Name Size Bytes Class Attributes
Page|10
DATA CLASSES
NAME DESCRIPTION
Page|11
2.9 IMAGE TYPES
Page|12
2.10 CONVERTING BETWEEN DATA CLASSES AND TYPES
g = im2uint8(f)
After performing conversion, we get a matrix g
g=
0 128
191 255
Page|13
Name Converts Input to Valid Input Image Data Classes
im2uint8 uint8 logical,uint8,uint16 and double
im2uint16 uint16 logical,uint8,uint16 and double
mat2gray double(in range[0,1]) Double
im2double double logical,uint8,uint16 and double
im2bw Logical uint8,uint16 and double
Table 2.3: Conversion Between Data Types
Now, we can observe the from the histogram that the tonal distribution is
concentrated to the left hand side which represent the dark and grey areas
which is evident from the given photo.
The image contrast of the given image can be improve using histogram
Page|15
equalization in which tonal distribution is spread over the full range
horizontal axis. This equalization is achieved using histeq function.
I = histeq(f);
>> imhist(I)
Page|16
2.12 CONCLUSION
Thus we see that Digital image processing is the use of computer
algorithms to perform image processing on digital images. As a
subcategory or field of digital signal processing, digital image processing
has many advantages over analog image processing. It allows a much
wider range of algorithms to be applied to the input data and can avoid
problems such as the build-up of noise and signal distortion during
processing. Since images are defined over two dimensions (perhaps more)
digital image processing may be modelled in the form of multidimensional
systems.
Page|17
CHAPTER 3
BIOMETRICS
The block diagram illustrates the two basic modes of a biometric system.
First, in verification (or authentication) mode the system performs a one-to-
one comparison of a captured biometric with a specific template stored in a
biometric database in order to verify the individual is the person they claim
to be. Three steps are involved in the verification of a person. In the first
step, reference models for all the users are generated and stored in the
model database. In the second step, some samples are matched with
reference models to generate the genuine and impostor scores and
calculate the threshold. Third step is the testing step. This process may use
a smart card, username or ID number (e.g. PIN) to indicate which template
should be used for comparison. 'Positive recognition' is a common use of
the verification mode, "where the aim is to prevent multiple people from
using the same identity".
Page|19
Second, in identification mode the system performs a one-to-many
comparison against a biometric database in an attempt to establish the
identity of an unknown individual. The system will succeed in identifying the
individual if the comparison of the biometric sample to a template in
the database falls within a previously set threshold. Identification mode can
be used either for 'positive recognition' (so that the user does not have to
provide any information about the template to be used) or for 'negative
recognition' of the person "where the system establishes whether the
person is who she (implicitly or explicitly) denies to be". The latter function
can only be achieved through biometrics since other methods of personal
recognition such as passwords, PINs or keys are ineffective.
Page|20
3.5 Performance:
1. False match rate (FMR, also called FAR = False Accept Rate): the
probability that the system incorrectly matches the input pattern to a
non-matching template in the database. It measures the percent of
invalid inputs that are incorrectly accepted. In case of similarity scale,
if the person is an imposter in reality, but the matching score is higher
than the threshold, then he is treated as genuine. This increases the
FMR, which thus also depends upon the threshold value.
2. False non-match rate (FNMR, also called FRR = False Reject Rate):
the probability that the system fails to detect a match between the
input pattern and a matching template in the database. It measures
the percent of valid inputs that are incorrectly rejected.
3. Relative operating characteristic (ROC): The ROC plot is a visual
characterization of the trade-off between the FMR and the FNMR. In
general, the matching algorithm performs a decision based on a
threshold that determines how close to a template the input needs to
be for it to be considered a match. If the threshold is reduced, there
will be fewer false non-matches but more false accepts. Conversely,
a higher threshold will reduce the FMR but increase the FNMR. A
common variation is the Detection error trade-off (DET), which is
obtained using normal deviation scales on both axes. This more
linear graph illuminates the differences for higher performances (rarer
errors).
4. Equal error rate or crossover error rate (EER or CER): the rate at
which both acceptance and rejection errors are equal. The value of
the EER can be easily obtained from the ROC curve. The EER is a
quick way to compare the accuracy of devices with different ROC
curves. In general, the device with the lowest EER is the most
accurate.
5. Failure to enroll rate (FTE or FER): the rate at which attempts to
create a template from an input is unsuccessful. This is most
commonly caused by low quality inputs.
6. Failure to capture rate (FTC): Within automatic systems, the
probability that the system fails to detect a biometric input when
presented correctly.
7. Template capacity: the maximum number of sets of data that can be
stored in the system.
Page|21
3.6 Recent advances in emerging biometrics:
Page|22
3.8 Fingerprint Representation
The uniqueness of a fingerprint is determined by the topographic relief of its
ridge structure and the presence of certain ridge anomalies termed as
minutiae points[7]. Typically, the global configuration defined by the ridge
structure is used to determine the class of the fingerprint, while the
distribution of minutiae points is used to match and establish the similarity
between two fingerprints. Automatic fingerprint identification systems, that
match a query print against a large database of prints (which can consist of
millions of prints), rely on the pattern of ridges in the query image to narrow
their search in the database(fingerprint indexing), and on the minutiae
points to determine an exact match(fingerprint matching). The ridge flow
pattern itself is rarely used for matching fingerprints.
The main ingredients of any fingerprint that are useful during pattern
recognition and matching tasks are the features it possesses.
The features are defined by type, position, orientation and so on and they
exhibit uniqueness from fingerprint to fingerprint. Fingerprint features are
classified into two categories; namely local and global features. The local
features are the tiny, unique characteristics of fingerprint ridges that are
used for identification. They are found in the local area only and are
invariant with respect to global transformation. Two or more impressions of
same finger may have identical features but still differ because they have
minutia points that are different .
3.9 Minutiae
Minutiae, in fingerprinting terms, are the points of interest in a fingerprint,
such as bifurcations (a ridge splitting into two) and ridge endings[7].
Examples are:
a.) ridge endings - a ridge that ends abruptly
b.) ridge bifurcation - a single ridge that divides into two ridges
c.) short ridges, island or independent ridge - a ridge that commences,
travels a short distance and then ends.
d.) ridge enclosures - a single ridge that bifurcates and reunites shortly
afterward to continue as a single ridge
e.)spur - a bifurcation with a short ridge branching off a longer ridge
Page|23
f.) crossover or bridge - a short ridge that runs between two parallel ridges
Page|24
The ridges form pattern of left loop, right loop, whorl, arch and tented
arch as shown in Figure 3. In the loop pattern, the ridges enter from
either side, re-curve and pass out or tend to pass out the same side
they entered. In the right loop pattern, the ridges enter from the right
side while the ridges enter from the left side in the left loop. In a whorl
pattern, the ridges are usually circular while in the arch pattern, the
ridges enter from one side, make a rise in the centre and exit
generally on the opposite side.
Page|25
3.10 Pattern Area
The pattern area is the part of the fingerprint where the global
features are found. Fingerprints can be read and classified based on
the information in this area. The following are the information
available in the pattern area of a fingerprint [2-4]:
a. Type Lines and Ridge Count: Type Lines are the two innermost
ridges that start parallel, diverge, and surround or tend to surround
the pattern area. When there is a definite break in a type line, the
ridge immediately outside that line is considered to be its
continuation. The Ridge Count is most commonly the number of
ridges between the Delta and the Core. To establish the ridge
count, an imaginary line is drawn from the Delta to the Core and
each ridge that touches this line is counted. The ridge count
between the core and delta shown in Figure 4 is the number of
ridges crossed by the imaginary lines drawn across the ridges.
Page|26
5. Curvature: The curvature refers to the rate of change of ridge
orientation. The curvature, c of one of the two ridge endings of Figure
6 is obtained from the absolute difference between 2 of Figure 6(b)
and 1 of Figure 6(a). It is the displacement angle resulting from the
change in orientation of the ridge pattern.
6. Core and Delta Areas: The core area is located at the approximate
center of the finger impression as shown in Figure 7 and it is used as
a reference point for reading and classifying the print. The Delta area
is the region in the ridge pattern where there is triangulation or a
dividing of the ridges as shown in Figure 7. It is also the point of the
first bifurcation, abrupt ridge ending, meeting point of two ridges, dot,
fragmentary ridge, or any point upon a ridge at or nearest to the
center of divergence of two type lines, located at or directly in front of
their point of divergence. It is a definite fixed point used to facilitate
ridge counting and tracing.
Page|27
3.11 CONCLUSION
Biometrics (or biometric authentication) consists of methods for uniquely
recognizing humans based upon one or more intrinsic, physical or
behavioral In traits computer science, in particular, biometrics is used as
access control. It is also used to identify individuals in groups that are
under surveillance. Biometric characteristics can be divided in two main
classes: Physiological (fingerprint, face recognition, iris recognition etc) and
Behavioral (voice, vocal tract etc).
Page|28
CHAPTER-4
PROBLEM FORMULATION
Our Project will deal with the acquiring of fingerprints samples taken from
the crime scene/the sample which is to be analyzed. The image of the
same will be enhanced and processed through numerous stages and filters
using MATLAB functions such as Histogram Equalization, Neighbourhood
Operations, Linear and Non Linear Filtering, Spatial Image Transformation,
Image restoration, Deblurring, Binarization in the Region of Interest where
the enhancement is required.
Then, after the pre-processing stage termination and the bifurcation is
done and thinning and minutiae will be extracted. The next and last
stage is the post processing stage in which orientation is calculated ,
lines are drawn at minutiae points. Then, these minutiae and the
orientation are stored which will be further cross-matched with the entire
set of fingerprints stored in the database using Minutiae Based
Techniques.
Page|29
CHAPTER-5
CONCLUSION
Page|30
CHAPTER-6
SCOPE OF FUTURE WORK
Page|31
References
[1]R. Gonzalez, R. Woods and S. Eddins, Digital image processing using MATLAB®. Chennai
[etc.]: McGraw Hill Education (India) Private Limited, 2016.
[5]M. Brezinski, A. Press and M. Beck, "An Introduction To Digital Image Processing With
Matlab | Rgb Color Model | Integer (Computer Science)", Scribd, 2017. [Online]. Available:
http://www.scribd.com/doc/53194495/34/Non-linear-%EF%AC%81lters#page=15. [Accessed:
01- Dec- 2017].
[6]A. Randhawa, "Review Paper on Image Enhancement and Its Techniques", International
Journal Of Engineering And Computer Science, 2017.
Page|32