• Tidak ada hasil yang ditemukan

FINGERPRINT ENHANCEMENT USING FUZZY LOGIC AND DEEP NEURAL

N/A
N/A
Protected

Academic year: 2023

Membagikan "FINGERPRINT ENHANCEMENT USING FUZZY LOGIC AND DEEP NEURAL "

Copied!
103
0
0

Teks penuh

ABSTRACT

INTRODUCTION

  • Fingerprint Sensing
  • Scope of The Thesis

These equipment gadgets must be an indispensable part of the CR scene over a protected channel. The thickness of the tempered glass is one of the main reasons for the accuracy of the generated fingerprint images. Therefore, the more the thickness of the glass, the less the accuracy of the generated images.

A gadget known as a charge-coupled device is responsible for making the photocopy of the image. To really enhance the features of the fingerprint structure, an altered image of the fingerprint is created.

Figure 1 Biometric fingerprint Scanners examples
Figure 1 Biometric fingerprint Scanners examples

FINGERPRINT FEATURES

  • Fingerprints
  • Minutiae

Minutiae characteristics can be characterized as the intersections where the edge lines end or fork. Therefore, the minutiae features are defined as the nearby edge discontinuities and can be of many kinds as described below;. Bifurcation is characterized as the point where an edge branches or wanders into branch edges.

The point is sporadically, a marginal unit may remain isolated resembling a patch between the common margins. The lake is a solitary barrage rim that bifurcates and rejoins after the short course and continues as a single barrage rim.

Figure 4 Example Image of ridges and bifurcations
Figure 4 Example Image of ridges and bifurcations

FINGERPRINT ENHANCEMENT

  • Traditional Method: Gabor Filter and Gaussian

It begins with Normalization, which initializes the image and preprocesses it, but does not make any changes to the features of the fingerprint, such as ridges and bifurcations. Frame Rate calculates the frequency of the frame, which is calculated from the output of the orientation estimate. Gaussian filter is a precise filter used to suppress the noisy image while keeping the edges of the image sharp.

The pixelwise operation is evaluated and data is converted to binarized value depending on the image threshold value. It is noted that when the results are compared from python to MATLAB, it gave a significant difference in the results, including thinning of the image after performing the region mask estimation.

Figure 6 describes the steps of Gabor and Gaussian filter flow chart, as the initial experiments were  carried on the traditional method in Python
Figure 6 describes the steps of Gabor and Gaussian filter flow chart, as the initial experiments were carried on the traditional method in Python

PROPOSED METHOD

  • Feature Extraction GLCM and DWT2
    • GLCM
    • DWT2

Here, the morphological operations are used to thin out the image, as it becomes difficult to assess the true features from the thick binary image. The minimal lowest meaning of the diluted image is easy to calculate the efficiency instead of the original image. While performing the gray scale of the image is converted into binary image with the morphological features.

The initial step after detail extraction if the removal of the false ridge and bifurcation pole in which the remaining operations are performed in order to remove the false part and preserve the true details of the image. This is taken care of by estimating the Euclidean distance across the two centroids of the various fine points to remove most spurious fine points. Each set is a representation of a semantic variable that characterizes the conceivable state of production.

Each tile differentiation is improved with the goal that the yield area histogram coordinates around to the predetermined histogram. In Example 1 in Figure 25, it is noted that the enhanced Fuzzy image from the original input image has enhanced the image, and the features which are hidden and unseen are clearly visible in the final output, and the intensity of the image is also enhanced. In Example 5 in Figure 25, the initial image is much brighter, and most of the parts are unseen and not clear, and in fuzzy, improved image shows a better quality of the image.

It calculates the Euclidean distance to the two centers of the image and evaluates the features. GLCM and DWT are applied in accordance with decomposition components for the purpose of feature classification. Different features extracted from the image are first subjected to the preprocessing part on which it is divided so that there is a division and subdivision of the blocks according to the pixelwise function.

Figure 21 Pre-processing
Figure 21 Pre-processing

DEEP NEURAL NETWORKS CLASSIFICATION

Neural Networks

The outcome of the activation function checks in the event that the particular neuron is activated or not, and at that point neuron transmits information to the neuron of the next layer over the channels. Propagation through channels without looking back is known as forward propagation and ANNs work on the feedforward neural network principle. The backpropagation operation works on the principle where the operation can also go backwards to check the previous steps is called as backpropagation and RNN works on backpropagation principle.

The data moves through several channels known as input nodes in a single direction until it arrives at the final destination where it gets the output. Neural network is an estimation process that tries to see hidden associations of the data set via operation that replicates the way the human intellect works. In this way, NN alludes to the framework of neurons, either natural or spurious in nature.

The system adapts to changing inputs to deliver the most ideal outcome without expecting yield criteria to be updated. A “neuron” in a neural system is a scientific capability that collects and organizes data according to a specific design. Shrouded layers are estimated to extrapolate salient highlights in the information that have prescient power regarding the outcome.

It's not so much the algorithm that's the problem; it is the decidedly clear, well-managed input information on the focused marker that ultimately determines the degree of achievement of a neural system. I RNNs is just like feedforward NN except it does a backpropagation to correct the error, it goes back checks the error and forward propagates to the final node and gives the result. The initial result is similar to that of feedforward, but it restores the data that was calculated at the beginning of the process for future use.

Figure 30 Feed forward NN view
Figure 30 Feed forward NN view

Results

RNN is a set of frameworks where the relationship between the central points structures a graph organized along a transitive course of action. Unlike accelerated neural frameworks, RNNs can use their internal state data to process information sources. It is capriciously used to insinuate two broad classes of frameworks with a similar general structure, one being limited motivation and the other.

An irregular framework with limited drive is a planned non-cyclic graph that can be developed and moved by a carefully forward-directed neural framework, while a relentlessly boring framework of inspiration is an organized cyclic outline that cannot be unwound.

CONCLUSION AND RESULTS

Fingerprint Matching

At that point, the layouts of both the samples and test photos are modified by bringing the centroids of the separated dab and starting into proximity with qualities that include position, the head of the first setup is calculated. To obtain the best execution matcher that is deeply connected, there is no requirement for score standardization. Fingerprint's unique image recognition is one of the first and unique biometric developments freely collected among the digital forensic legal sciences.

For the framework to be compelling, the coordinating database must be as broad and complete as would be prudent. There are many ways to deal with a biometrics-based customer fingerprint verification system, and all require some type of device input device to collect the necessary data for the customer to be confirmed. It is one of the most effective functions used to analyze the performance of any deep learning or machine learning classifier.

The purpose of the roc curve establishes the receiver operating characteristic % deflection, which speaks of the 1 particularity and affectability, of two classes of % information, called class_1 and class_2. The curve is plotted for all the three classifiers and shows the best results in all of them, especially ANN. For each image we test in MATLAB, ROC curve is plotted for all the classifiers.

A good score indicates that a larger value is closer to 1, so if the value is close to 1, more accuracy should be considered. Equal error rate is a biometric security framework algorithm used to evaluate threshold parameters between false acceptance rate and false rejection rate. The value indicates that the volume of false admissions is equivalent to the volume of false discharges.

The lower the equivalent error rate, the higher the accuracy of the biometric framework. Table 2 below describes the EER metrics of all classifiers and again ANN appears to achieve the best results compared to the remaining classifiers.

Figure 31 Shows the dialogue box of fingerprint matched for all the three classifiers  6.2 Results and Graphs
Figure 31 Shows the dialogue box of fingerprint matched for all the three classifiers 6.2 Results and Graphs

Chandra, A Review Study on Fingerprint Classification Algorithm used for Fingerprint Identification and Recognition, International Journal of Computer Science and Technology IJCST Vol.Issue 1, JanMars 2012. Basturk, “ A Detail Preerving type-2 Fuzzy Logic Filter for Impulse Digital Noise Remo Imazhet”, Konferenca e Sistemeve Fuzzy, FUZZ-IEEEEE, 2007. Jha, “An Optimal Fuzzy System for Color Image Enhancement” Transactions IEEE on Image Processing, Vol.

Mendel, "Introduction to Type-2 Fuzzy Logic Systems", 1998 IEEE World Congress on Computational Intelligence, vol.2, p 915-935, pt. Liu, “Interval Type-II Fuzzy Logic Systems Made Simple”, IEEE Transactions on Fuzzy Systems, vol. 2.5] L.A.Zadeh, "Sketch of a New Approach to the Analysis of Complex Systems and Decision Processes" IEEE Trans.

Bedi, “A new framework for enhancing images corrupted by impulse noise using type II fuzzy sets”, IEEE International Conference on Fuzzy Systems and. Dimitrov “Fingerprint Image Enhancement using Filtering Techniques”, Department of Electrical and Computer Engineering, BenGurion University of the Negev, Beer-Sheva, Israel, 2000. Park, “New Fingerprint Image Enhancement Using Directional Filter Bank”, School of Electrical Engineering, Kyungpook National University SEOUL, Daegu, Korea, School of Internet Engineering, Dongseo University SEOUL, Daegu, Korea.

2.15] Yanxia Wang, QiuqiRuan, “An Improved UnsharpMasking method for Palmprint Image Enhancement”, Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC'06), 2006 IEEE. 2.17] SasiGopalan, Madhu S. Nair and Souriar Sebastian Approximate studies on “Image enhancement using fuzzy technique”, International Journal of Advanced Science and Technology, Vol. Venkateswara Rao K Enhancing Low Contrast Images Using Fuzzy Techniques SPACES-2015 Department of ECE, K L University.

ACKNOWLEDGEMENTS

Gambar

Figure 1 Biometric fingerprint Scanners examples
Figure 3 Thickness of the sensing glass
Figure 4 Example Image of ridges and bifurcations
Figure 5 Various Minutiae Features
+7

Referensi

Garis besar

Dokumen terkait

LIST OF FIGURES Figure 2-1 Classification of natural fibers derived from plants 7 Figure 2-2 Structure of natural fibers 8 Figure 2-3 The repeat unit of polyethylene 8 Figure 2-4