Automated Fingerprint Recognition Using Structural Matching
Automated Fingerprint Recognition Using Structural Matching
00
Printed in Great Britain Pergamon Press pie
© 1990 Pattern Recognition Society
(Received 7 June 1989; in revised form 1 November 1989; received for publication 20 November 1989)
Abstract--Automated fingerprint recognition has received considerable attention over the past decade.
Progress has been made on models of the structure of fingerprints, techniques for the acquisition of prints,
and the development of commercial automated fingerprint recognition systems. Despite these advances,
there remain considerable opportunities for improvement. The speed of retrieval, and the ability to
recognize partial or distorted prints are prominent among those areas that require improvement. This
study will describe a structural model of fingerprints, based on local structural relations among features,
and an associated automated recognition system which addresses the limitations of existing fingerprint
models.
i. SHORT RIDGE
2.&
3. BIFURCATION
4.&
5. BIFURCATION
6. RIDGE
7. ENDING RIDGE
8.&
9. BIFURCATION
i0. RIDGE
12. RIDGE
14.&
15. BIFURCATION
16.&
17. ISLAND
18.&
19. BIFURCATION
21. DOT
22. RIDGE
23.&
LOOP 24. ISLAND
Current fingerprint recognition systems suffer from and type of features in the neighborhood are identified
several disadvantages. Their retrieval abilities are and counted, determining a feature vector. The model
weak if the prints are of poor quality, or are partial, for the print consists of a list of such feature vectors.
stretched or twisted, or contain falsely reported or A naive matching algorithm would be to identify a pair
missing features. The systems are sensitive to errors of prints if their collection of feature neighborhoods
in the positioning of prints at acquisition, and hence coincided. We show instead that a small number of
basically require complete prints in order to position distinctive neighborhoods can be found which can be
the prints correctly for subsequent coordinate calcu- used to uniquely characterize each print in a database.
lation or reference line placement. The structure of Furthermore, the characterizations remain relatively
the current data models for fingerprints leads to effective even when only part of a print is available.
computationally costly print comparisons at match- This structural data model directly addresses cer-
ing time (that is, when a test print is compared with tain critical drawbacks of existing systems:
the successive prints in the database in search of a (1) The model is positionally invariant. This means
closest match). The models generally entail brute- that the feature vectors obtained are the same inde-
force sequential searches and are incompatible with pendently of how the print is positioned. This property
a successive partitioning approach to the search space. indirectly improves processing speeds because the
This study will introduce techniques that are applic- matching algorithm does not have to account for
able to the recognition of clear partial prints even positionally caused errors.
when only part of the print is available, and that are (2) The model is robust in the presence of incomplete
robust with respect to translation, rotation, and data because even a fragmentary print may still
distortions. The methodology is based on a data contain the critical set of defining neighborhoods.
model for fingerprints that is structural, rather than Furthermore, even if it contains only a subset of its
coordinate. critical neighborhoods, the list of possible matching
The model uses local configurations of features to prints may be able to be significantly narrowed.
recognize and retrieve prints, and appears to support (3) The model supports more efficient search strateg-
more rapid and robust search and retrieval strategies ies since the feature vectors are relatively short; require
than current models. The model uses eight classical only trivial computations to compare; and can even
types of features. A small neighborhood is specified be searched on subvectors to allow fast elimination
around each feature on a print. Then, the number of poor candidates.
Automated fingerprint recognition 895
2. F I N G E R P R I N T CONVERSION
o," y.&... •
Fig. 6. 5. cleaned print. Fig. 7. 6. select print region ready for feature extraction.
The features needed to test different matching for identification of fingerprints. Eight features were
algorithms were then extracted from the resulting selected, including the four types established by Gal-
image. Regions of the image which were very noisy ton, ta) and four others generally accepted by finger-
were deleted, while the remaining noisy areas were print experts and which appear on fingerprints with
handled by allowing a limited number of false patterns. non-negligible frequencies.
Recall that, while we have paid some attention to the The features were broadly classified into two
occurrence of noisy areas on the prints, our underlying classes: primitives, and compound features, which are
supposition is that the prints in the database are to combinations of primitives. The features used, in
be interpreted as clear prints, such as might be the order of their extraction by the recognition
obtained using a better acquisition system than we algorithms, are:
have used, such as laser-based input techniques, or Primitives
by definitively isolating clear areas of noisy prints. (I) Dot
(2) Ridge Ending
(3) Bifurcation
3. FEATURE EXTRACTION Using the primitives as a base, it was possible to
define the compound features.
The next phase involved the extraction of finger- Compound features
print features from the digital images produced by (4) Island
the conversion phase. There were many possible (5) Spur
choices for a set of basic individual features in a (6) Crossover
fingerprint, so we first established a standard inven- (7) Bridge
tory of features and methods for their automated (8) Short Ridge
recognition. A subset of the approximately 31 features Islands are defined as two bifurcations with two
currently recognized in the literature was selec- connecting paths. Spurs are formed by a combination
ted. {4'12'22'26) The selection was designed to ensure of a bifurcation and a ridge ending. Crossovers
both that the features had fundamental support in are defined as two or more neighboring connected
the fingerprint literature and appeared to be useful bifurcations. Bridges are defined as two bifurcations
PHYSICAL
PRINT
200>I 256
CAMERA
FORM
199
PRINT
....
199
STORAGE
FORM
STORAGE
...... >
COMPACT
PHYSICAL
MAP> MAPPING FORM
with one connecting path. Short ridges are defined as FEATURE AVERAGE FREQUENCY
two neighboring connected ridge endings. The fea- % OF TOTAL FEATURES # PER PRINT
tures were defined in a manner which permitted well- DOT 4.3 18
defined identification for automated recognition. See
RIDGE ENDING 60.6 258
Fig. 9 for an illustration and Fig. 10 for the frequency
distribution of the features in the sample population. BIFURCATION 17.9 76
/
RIDGE ENDING
BIFURCATION
/IT, ." I
ISLAND " ; ' < 'L",,
SPUR
CROSSOVER
BRIDGE
SHORT RIDGE
Fig. 11. Sample island window determination:
Fig. 9. Sample ~ature variations. 1--standard window; 2--expanded window.
898 ANDREW K. HRECHAK and JAMES A. McHuoH
classified and iteratively adapting the recognition feature neighborhoods (only feature frequencies arc
algorithms until the recognition was verified to be recorded, not feature positions) makes the scheme,
robust, as we have indicated previously. The accurate like the morphological approach of the Henry System,
recognition of features was again tested via the color relatively robust against geometric distortions, and
feature indicator scheme described earlier. applicable even if only partial prints arc available.
The structural data model emulates in a sense the
conceptual model of a fingerprint expert. An expert
4. FINGERPRINT MATCHING recognizes prints by looking for tell-talccorrespon-
dences of features and may well bc able to match a
The structural model for fingerprints is defined as database print against a test print even if only a
follows. F o r each feature on the fingerprint, we define fragment of the test print is available. The expert can
a neighborhood of some specified radius R about the use global properties of the print to eliminate potential
center of the feature. If we denote the allowed types matching candidates or to position and orient a
of features by T~... T8 each occurring with frequency fragment of a print against a more complete database
f(TO...f(Ts) in the neighborhood, and the type of print. Hc can then correlate features by using their
the central feature for the neighborhood by T, then type, position, orientation, and location relative to
we associate with the central feature a vector other features. Our data model implicitly captures
(T,f(TO...fiTs)) as a characterization of the neigh- much of this expert behavior, since our feature vectors
borhood. Figure 12 gives a hypothetical example of define an associative mechanism which effectively
a feature and its neighborhood, where the central simultaneously locates and correlates features.
feature is of type 1 and the feature vector is (1, 0, 1, The specific approach used was to identify a small
0, 1, 1, 0, 0, 0). With a suitable choice of R, we can set of feature vectors V~ ...Vk, whose occurrence on
obtain a list of such feature vectors for each print, a print uniquely identifiedthe print, in the context of
containing information similar to that useful in a our 150 print database. Initially,wc identified a set
manual search; namely, distinctive local patterns of of 9 feature vectors which uniquely identifiedany one
feature distribution, which can serve as the basis for of a test set of 60 prints, from a given set of 60
search and identification. fingerprints in our database. W e then extended this
This model represents a synthesis of the global set of feature vectors to 15 vectors which together
partitioning approach, typified by the Henry class- uniquely identified any one of the 150 prints in our
ification, and the local identification approach, typ- database.
ified by feature based models such as the FBI system. Our basic procedure was as follows: determine the
We will experimentally determine a set of vector feature vectors for each print; condense the list of
patterns which effectively define a partition of much feature vectors to eliminate duplicates; then perform
finer granularity than the limited number of partition a data analysis to determine vectors that appear to
types provided under a Henry scheme. The feature bc useful for identification.It was eventually decided
based nature of the classifcation makes it more that a set of feature vectors with a mix of frequencies
amenable to automation than the Henry system since of occurrence across all prints ranging from 15-75%
the features are both local in character and relatively provided a useful basis for identification.The results
sharply defined in nature. The relational nature of the of the vector selection process for five 30 print test
sets,individually and combined, are shown in Fig. 13.
The table illustrates that as the number of prints
Central Feature increases, the required number of identifying vectors
to support unique identificationappears to also slowly
increase, as suggested by the following discussion.
For example, using II vectors, three 30 print test
sets have uniquely identified prints, with only one
duplicate ID in set three and two duplicate ID's in
set four. Combining the sets, wc have eight duplicate
ID's and three ID's which identify three prints each.
Overall, the vectors used appeared on average in
approximately 4 2 % of the prints. A group of vectors
(in this case 15) which allows unique print identifi-
cation is shown in Fig. 14. Some distribution statistics
for these vectors arc shown in Fig. 15. The table
illustrates the number of prints with a given vector,
including a breakdown of those prints with the vector
occurring one, two, or three times per print. O n
average, 8 1 % of the vectors fallinto these breakdown
categories, with the less frequent vectors almost com-
Fig. 12. Hypothetical neighborhood. pletely accounted for.
Automated fingerprint recognition 899
# TIMES/PRINT TOTAL
VECTOR # # PRINTS 1 2 3 ~ OF # PRINTS
1 80 24 19 17 75
2 54 33 14 4 94
3 96 18 23 18 59
4 75 30 16 i0 56
5 84 44 27 6 92
6 63 36 18 6 95
7 46 41 3 i 98
8 28 18 9 0 96
9 76 42 17 II 92
10 58 17 23 6 79
11 21 17 4 0 i00
12 115 25 15 18 50
13 31 20 I0 0 97
14 89 22 13 ii 52
15 53 23 20 3 87
Fig. 15. ID vector list distribution statistics: ~ prints - =M:of prints from 150 database with vector;
¢e times - =M=of prints with given vector count.
..,... ~,~,<
3 . _..H
8 1
~ •
1 - DOTS = 18
3 - BIFURCATIONS 53
4 - ISLANDS = 2
5 - SPURS 17
6 - CROSSOVERS 12
7 - BRIDGES 3
8 - SHORT RIDGES = 30
M i I00 66 34
M2 76 56
M 3 60
M4 82 66
M5 84
M6 86 68
M 7 90 76
M8 80
M9 84
MI0
MII 86
MI2 90
MI3 92
MI4 94
MI5
1/4 PARTIAL
PRINT RANDOM TOP MIDDLE BOTTOM
MI 20 12 i0 14
M2 28 16 12 18
M3 32 24 14 24
M4 42 32 16 32
M5 46 36 20 34
M6 . . . . 24 "
M7 50 44 28 36
M8
M9 58 50 36 42
MIO " 52 38 46
MI2 60 58 44 "
MI3 . . . . 48 "
M~O 64 70 62 50
M39 82 80 78 74
M73 92 90 88 84
TYPE OF PRINT RANDOM DISTRIBUTED 1/4 PARTIAL boundary effects. By allowing one false vector (that
MATCH RANK OF TEST PRINTS is, using an active search bit/non-active database bit),
the missed prints were ranked in the top 3 4 0 (that
M1 12 is, the top 51 positions) of the database. At most 2%
M2 16 (currently, one print) of all the test prints were not
M3 22 recognized using one false bit.
M4 24
M5 26
6. C O N C L U S I O N
M6 30
extraction algorithms were developed which permit- 8. C. H. Lin, J. H. Liu, J. W. Osterberg and J. D. Nicol,
ted the automated recognition of eight classic finger- Fingerprint comparison. I: Similarity of fingerprints, J.
print features useful for discriminating among prints. Forensic Sci. 27, 290-304 (1982).
9. J. H. Liu, C. H. Lin, J. W. Osterberg and J. D. Nicol,
Feature tables were developed for each print, which Fingerprint Comparison. II: On the development of a
made it possible to examine various alternative struc- single fingerprint filing and searching system, J.
tural models based on local relations among features. Forensic Sci. 27, 305-317 (1982).
A digitized database of 150 representative finger- 10. B. Moayer and K. S. Fu, A syntactic approach to
fingerprint pattern recognition, Pattern Recognition 7,
prints was used to test the model under a variety of
1-23 (1975).
scenarios based on the nature of the search prints. 11. K. Rao and K. Balck, Type classification of fingerprints:
Despite the limited nature of this database, this testing a syntactic approach, IEEE Trans. Pattern Anal. Mach.
environment was comparable to or superior to the lntell. PAMI-2, 223-231 (1980).
test environments used for most other published 12. K. D. Saviers, Friction Skin Characteristics: A Study
and Comparison of Proposed Standards, Garden Grove
research efforts in automated fingerprint recognition. California Police Department, July (1987).
The experimental results substantiated the usefulness 13. D. A. Stoney and J. I. Thornton, A critical analysis of
of this technique for automating fingerprint recogni- quantitative fingerprint individuality models, J. Forensic
tion. For example, the experiments included testing Sci. 31, 1187-1216 (1986).
the ability to retrieve a print when two disjoint parts 14. Fingerprint Identification-Data Format for Information
Interchange. American National Standards Institute,
of the print, together covering only 25% of the area New York (1986).
of the complete print, were available. 15. The Science of Fingerprints: Classification and Uses.
The system described herein addresses some notable Federal Bureau of Investigation, U.S. Government Print-
difficulties in the area of automated fingerprint recog- ing Office, Washington, D.C. (1984).
16. Application briefs: Computer graphics in the detective
nition, including the limited ability to recognize business, I E EE Comput. Graphics Appl., pp. 14-17, (April
partial or distorted prints, and the considerable com- 1985).
putational cost required to attain a reasonable rate 17. D. K. Isenor and S.G. Zaky, Fingerprint identification
of retrieval even when good prints are available, using graph matching, Pattern Recognition 19, 113-122
(1986).
caused by the computationally intensive nature of
18. B. Reed, Automated fingerprint identification:from Will
existing fingerprint models. The structural model West to Minnesota Nine-Fingers and beyond, J. Police
of fingerprints we have defined and its associated Sci. Admin. 9, 317-326 (1981).
automated recognition system address these limi- 19. The state of development of the FBI's automatic finger-
tations. Significantly, our model allows prints to be print identification system: Part I, FBI Law Enforcement
Bull., pp. 8-13, (June 1973).
compared even when only partial prints are available 20. The state of development of the FBI's automatic finger-
because the model representation of a partial print is print identification system: Part II, FBI Law Enforcement
a subset of the model representation of the whole Bull., pp. 8-13, (June 1973).
print. The comparison of a pair of prints on this 21. J. H. Wegstein, An Automated Fingerprint Identification
system involves a negligible a m o u n t of time, since it System. National Bureau of Standards Special Publi-
cation 500-89, U.S. Government Printing Office, Wash-
entails only a simple bit vector comparison. The cost ington, D.C. (1982).
of processing is basically subsumed in the (one-time 22. J. A. Ratkovic, Increasing Efficiency in the Criminal
only) cost of preprocessing each print to extract its Justice System: The Use of New Technology for Criminal
select neighborhood structure, while the comparisons Identification and Latent Print Processing. The Rand
Corporation, California, (September 1980).
entailed during run-time searches are relatively trivial. 23. M. K. Sparrow and P. J. Sparrow, A Topological
Notable elements of the system include automated Approach to the Matching of Single Fingerprints: Devel-
recognition of c o m p o u n d features, and the identifi- opment of Algorithms for Use on Latent Fingermarks.
cation of local feature patterns with significant National Bureau of Standards Special Publication 500-
retrieval power. 126, U.S. Government Printing Office, Washington, D.C.
(1985).
24. M. K. Sparrow and P. J. Sparrow, A Topological
REFERENCES Approach to the Matching of Single Fingerprints: Devel-
opment of Algorithms for Use on Rolled Impressions.
1. C. E. Chapel, Fingerprinting---A Manual of Identifi- National Bureau of Standards Special Publication 500-
cation. Coward McCann, New York (1941). 124, U.S. Government Printing Office, Washington, D.C.
2. J. F. Cowger, Friction Ridge Skin: Comparison and (1985).
Identification of Fingerprints. Elsevier, New York (1983). 25, T. F. Wilson and P. L. Woodard, Automated Fingerprint
3. Fingerprint Identification. Federal Bureau of Investi- Identification Systems: Technology and Policy Issues.
gation, U.S. Government Printing Office, Washington, Bureau of Justice Statistics, U.S. Government Printing
D.C. (1977). Office, Washington, D.C. (1987).
4. F. Galton, Finger Prints. Macmillan, London (1892). 26. J. W. Osterberg, T. Parthasarathy, T. E. S. Raghaven
5. E. R. Henry, Classification and Uses of Finger Prints. and S. L. Sclove. Development of a mathematical formula
Routledge, London (1900). for the calculation of fingerprint probabilities based on
6. W. J. Herschel, Skin furrows of the hand, Nature 23, 76 individual characteristics, d. Amer. Statis. Assoc. 72, 772-
(1880). 778 (1977).
7. w. R. Scott, Fingerprint Mechanics A Handbook. 27. T. Pavlidis, Algorithms for Graphics and Image Process-
Charles C. Thomas, Springfield, Illinois (1951). ing. Computer Science Press, Rockville, MD (1982).
904 ANDREW K. HRECHAK and JAMES A. MCHUGH
About the Author--ANDREW K. HRECHAK received the B.S. and M.S. degrees in Computer Science from
New Jersey Institute of Technology in 1980 and 1982, respectively. He obtained the M.B.A. and Ph.D.
degrees from Rutgers University in 1988. His research interests lie in the application of computer
technology in criminology. Currently he is associated with the New Jersey Institute of Technology.
Dr Hrechak is a member of ACM, IEEE, Alpha Iota Delta, Beta Gamma Sigma, Phi Eta Sigma, Tau
Beta Pi, and Upsilon Pi Epsilon.
About the Author--JAMES A. MCHUGH received the B.S. degree in Mathematics from Fordham College
in 1965, and a Ph.D. in Mathematics from the Courant Institute of Mathematical Sciences in 1970.
At present, he is a Professor in the Department of Computer and Information Science at the New
Jersey Institute of Technology. His current research interests are algorithmic graph theory, analysis of
algorithms, and image processing.