Abstract
We propose a light-weight fingerprint matching algorithm that can be executed inside the devices with a limited computational power. The algorithm is based on the minutiae local structures (the “neighborhoods”), that are invariant with respect to global transformations like translation and rotation. The match algorithm has been implemented inside a smartcard over the Java CardTM platform, meeting the individual’s need for information privacy and overall authentication procedure security. The main characteristic of the algorithm is to have an asymmetric behavior, in respect to the execution time, between correct positive and negative matches. The performances in terms of authentication reliability and speed were tested on some databases from the Fingerprint Verification Competition 2002 and 2004 editions (FVC2002 and FVC2004). Moreover, our procedure showed better reliability when compared with a related algorithm on the same database. We can achieve a false acceptance rate (FAR) of 0.1%, a false rejection rate of about 6%, and from 0.3 to 8 s to match most of the finger pairs during the FAR tests.
Similar content being viewed by others
References
Bistarelli S, Santini F, Vaccarelli A (2005) An asymmetric fingerprint matching algorithm for java cardTM. In: Proceedings of AVBPA 2005. Springer, Berlin Heidelberg New York, pp 279–289
Jain AK, Maltoni D (2003) Handbook of fingerprint recognition. Springer, Berlin Heidelberg New York, Secaucus, NJ
Lee HC, Gaensslen RE (1991) Advances in fingerprint technology. Elsevier, New York
Pankanti S, Prabhakar S, Jain AK (2002) On the individuality of fingerprints. IEEE Trans Pattern Anal Mach Intell 24(8):1010–1025
Hatano T, Adachi T, Shigematsu S, Morimura H, Onishi S, Okazaki Y, Kyuragi H (2002) A fingerprint verification algorithm using the differential matching rate. In: ICPR ’02: proceedings of the 16th international conference on pattern recognition (ICPR’02), vol 3. IEEE Computer Society, Washington, pp 799–802
Bazen AM, Verwaaijen GTB, Gerez SH, Veelenturf LPJ, van der Zwaag BJ (2000) A correlation-based fingerprint verification system. In: Proceedings of the ProRISC workshop on circuits, systems and signal processing, Veldhoven, The Netherlands. STW Technology Foundation, pp 205–213
Takeda M, Uchida S, Hiramatsu K, Matsunami T (1990) Finger image identification method for personal verification. In: 10th international conference on pattern recognition, vol 1. IEEE Computer Society,Washington, DC, pp 761–766
Kaymaz E, Mitra S (1993) Analysis and matching of degraded and noisy fingerprints. In: Tescher AG (ed) proceedings of SPIE, vol 1771, Applications of digital image processing XV, pp 498–509
Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846–859
Stosz JD, Alyea LA (1994) Automated system for fingerprint authentication using pores and ridge structure. In: David Murley J, Richard J. Mammone (eds) proceedings of automatic systems for the identification and inspection of humans (SPIE), vol 2277. IEEE Computer Society, Washington, DC, pp 210–223
Ratha NK, Karu K, Chen S, Jain AK (1996) A real-time matching system for large fingerprint databases. IEEE Trans Pattern Anal Mach Intell 18(8):799–813
Bistarelli S, Boffi G, Rossi F (2003) Computer algebra for fingerprint matching. In: International conference on computational science ICCS03, vol 2657/2003, pp 811–820
Jain AK, Hong L, Bolle RM (1997) On-line fingerprint verification. IEEE Trans Pattern Anal Mach Intell 19(4):302–314
Luo X, Tian J, Wu Y (2000) A minutiae matching algorithm in fingerprint verification. In: 15th international conference on pattern recognition, vol 4. IEEE Computer Society, Washington, DC, pp 210–223
Jiang X, Yau W-Y (2000) Fingerprint minutiae matching based on the local and global structures. icpr 02:1042–1045
Ratha NK, Bolle RM, Pandit VD, Vaish V (2000) Robust fingerprint authentication using local structural similarity. In: 5th IEEE workshop on applications of computer vision. IEEE Computer Society, Washington, DC, pp 29–34
Hrechak AK, McHugh JA (1990) Automated fingerprint recognition using structural matching. Pattern Recognit 23(8):893–904
Fan K-C, Liu CW, Wang Y-K (2000) A randomized approach with geometric constraints to fingerprint verification. Pattern Recognit 33(11):1793–1803
Willis AJ, Myers L (2001) A cost-effective fingerprint recognition systems for use with low-quality prints and damaged fingerprints. Proc Pattern Recognit 34(2):255–270
Kovacs-Vajna ZM (2000) A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Trans Pattern Anal Mach Intell 22(11):1266–1276
Bhanu B, Tan X (2003) Fingerprint indexing based on novel features of minutiae triplets. IEEE Trans Pattern Anal Mach Intell 25(5):616–622
Jain AK, Ross A, Prabhakar S (2001) Fingerprint matching using minutiae and textures features. In: Proceedings of international conference on image processing (ICIP), Thessaloniki, Greece, pp 282–285
ISO 7816: integrated circuit(s) cards with contacts—part 1, 1998. International Standardization Organization, JTC 1/SC 17
Enrique Ortiz C (2003) An introduction to Java CardTM technology, Parts 1-2-3, Java Developer Web Site
Chen Z (2000) Java Card technology for smart cards: architecture and programmer’s guide. Addison-Wesley, Longman Publishing Co., Inc., Boston
Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In: AVBPA ’01: proceedings of the 3rd international conference on audio- and video-based biometric person authentication. Springer, London, pp 223–228
Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: CRYPTO ’99: proceedings of the 19th annual international cryptology conference on advances in cryptology. Springer, London, pp 388–397
Pan SB, Moon D, Gil Y, Ahn D, Chung Y (2003) An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card. In: IEEE transactions on consumer electronics, vol 49. IEEE Computer Society, Washington, pp 453–459
Moon YS, Ho HC, Ng KL, Wan SF, Wong ST (2000) Collaborative fingerprint authentication by smart card and atrusted host. In: Canadian conference on electrical and computer engineering, vol 1. IEEE Computer Society, Washington, pp 108–112
Reisman J, Uludag U, Ross A (2005) Secure fingerprint matching with external registration. AVBPA 720–729
Ross A, Jain AK, Reisman J (2003) A hybrid fingerprint matcher. Pattern Recognit J 36(7):1661–1673
Ishida S, Mimura M, Seto Y (2001) Development of personal authentication techniques using fingerprint matching embedded in smart cards. In: EICE transactions on information and systems, vol E84-D, pp 812–818
Tang TY, Moon YS, Chan KC (2004) Efficient implementation of fingerprint verification for mobile embedded systems using fixed-point arithmetic. In: SAC ’04: proceedings of the 2004 ACM symposium on applied computing. ACM Press, New York, pp 821–825
Yang S, Verbauwhede I (2003) A secure fingerprint matching technique. In: WBMA ’03: proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications. ACM Press, New York, pp 89–94
Cucinotta T, Brigo R, Di Natale M (2004) Hybrid fingerprint matching on programmable smart cards. TrustBus 232–241
van Wamelen P, Li Z, Iyengar S (2000) A fast algorithm for the point pattern matching problem. Technical report 1999-28, Louisiana State University, Dept. of Mathematics
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2004) Fvc2004: third fingerprint verification competition. ICBA 1–7
Cappelli R, Maio D, Maltoni D, Wayman JL, Jain AK (2006) Performance evaluation of fingerprint verification systems. In: IEEE transactions on pattern analysis machine intelligence, vol 28. IEEE Computer Society, Washington, pp 3–18
National Institute of Standards and Technology. User’s guide to NIST fingerprint image software (NFIS). NISTIR 6813
NIST/Biometric Consortium Interoperability, Assurance, and Performance Working Group 7. Java CardTM Biometric API White Paper (Working Document), August 2002. Version 1.1
Java Card ForumTM official, web site: http://www.javacardforum.org/
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2002: second fingerprint verification competition. ICPR (3):811–814
Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2000: fngerprint verification competition. IEEE Trans Pattern Anal Mach Intell 24(3):402–412
Watson CI, Wilson CL (1992) Nist secial dtabase 4. Fingerprint database
Ortega-Garcia J, Fierrez-Aguilar J, Simon D, Gonzalez J, Faundez-ZanuyM, Espinosa V, Satue A, Hernaez I, Igarza JJ, Vivaracho C, Escudero D, Moro QI (2003) Mcyt baseline corpus: a bimodal biometric database. IEE Proc Vis Image Signal Process 150(6):395–401
Biometrika s.r.l., web site: http://www.biometrika.it
Institute of informatics and telematics (c.n.r.), biometric group web site: http://www.iit.cnr.it/organizzazione/sicurezza_informazione/ biometria/index.htm
Acknowledgments
We would like to thank the organizers of Fingerprint Verification Competition (FVC) [42, 43, 37] who have kindly granted to us the use of all of the fingerprint image databases of the different editions; in particular, we would like to acknowledge Raffaele Cappelli, Dario Maio and Davide Maltoni from the Biometric Systems Lab (University of Bologna). Moreover, we would like to thank Tommaso Cucinotta and Riccardo Brigo from ReTiS Lab of Sant’Anna School of Advanced Studies (Pisa), who have kindly granted to us the use of the fingerprint image database employed to test their algorithm in [35]. Thanks are due also to the anonymous referees that, with their interesting comments, helped to improve the readability and the technical contribution of the paper.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bistarelli, S., Santini, F. & Vaccarelli, A. An asymmetric fingerprint matching algorithm for Java Card TM . Pattern Anal Applic 9, 359–376 (2006). https://doi.org/10.1007/s10044-006-0048-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10044-006-0048-4