Advertisement

Biometric Template Selection: A Case Study in Fingerprints

  • Anil Jain
  • Umut Uludag
  • Arun Ross
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2688)

Abstract

A biometric authentication system operates by acquiring biometric data from a user and comparing it against the template data stored in a database in order to identify a person or to verify a claimed identity. Most systems store multiple templates per user to account for variations in a person’s biometric data. In this paper we propose two techniques to automatically select prototype fingerprint templates for a finger from a given set of fingerprint impressions. The first method, called DEND, performs clustering in order to choose a template set that best represents the intra-class variations, while the second method, called MDIST, selects templates that have maximum similarity with the rest of the impressions and, therefore, represent typical measurements of biometric data. Matching results on a database of 50 different fingers, with 100 impressions per finger, indicate that a systematic template selection procedure as presented here results in better performance than random template selection.

Keywords

Equal Error Rate Biometric Data Biometric System Distance Score Biometric Trait 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    J. L. Wayman, “Fundamentals of biometric authentication technologies,” International Journal of Image and Graphics, vol. 1, no. 1, pp. 93–113, 2001.CrossRefGoogle Scholar
  2. [2]
    X. Jiang and W. Ser, “Online fingerprint template improvement,” IEEE Transactions on PAMI, vol. 24, pp. 1121–1126, August 2002.Google Scholar
  3. [3]
    K.A. Toh, W.Y. Yau, X.D. Jiang, T. P. Chen, J. Lu, and E. Lim, “Minutiae data synthesis for fingerprint identification application,” in Proc. International Conference on Image Processing (ICIP), vol. 3, pp. 262–265, 2001.Google Scholar
  4. [4]
    A.K. Jain and A. Ross, “Fingerprint mosaicking,” in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), (Orlando, Florida), May 2002.Google Scholar
  5. [5]
    X. Liu, T. Chen, and S.M. Thornton, “Eigenspace updating for non-stationary process and its application to face recognition,” To appear in Pattern Recognition, Special issue on Kernel and Subspace Methods for Computer Vision, 2003.Google Scholar
  6. [6]
    A.K. Jain, L. Hong, and R. Bolle, “On-line fingerprint verification,” IEEE Transactions on PAMI, vol. 19, pp. 302–314, April 1997.Google Scholar
  7. [7]
    A.K. Jain and R. C. Dubes, Algorithms for Clustering Data. Englewood Cliffs, New Jersey: Prentice Hall, 1988.Google Scholar
  8. [8]
    D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A.K. Jain, “FVC2002: Fingerprint verification competition,” in Proceedings of the International Conference on Pattern Recognition (ICPR), (Quebec City, Canada), pp. 744–747, August 2002.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Anil Jain
    • 1
  • Umut Uludag
    • 1
  • Arun Ross
    • 1
  1. 1.Michigan State UniversityEast LansingUSA

Personalised recommendations