Skip to main content
Log in

An asymmetric fingerprint matching algorithm for Java Card TM

  • Short Paper
  • Published:
Pattern Analysis and Applications Aims and scope Submit manuscript

Abstract

We propose a light-weight fingerprint matching algorithm that can be executed inside the devices with a limited computational power. The algorithm is based on the minutiae local structures (the “neighborhoods”), that are invariant with respect to global transformations like translation and rotation. The match algorithm has been implemented inside a smartcard over the Java CardTM platform, meeting the individual’s need for information privacy and overall authentication procedure security. The main characteristic of the algorithm is to have an asymmetric behavior, in respect to the execution time, between correct positive and negative matches. The performances in terms of authentication reliability and speed were tested on some databases from the Fingerprint Verification Competition 2002 and 2004 editions (FVC2002 and FVC2004). Moreover, our procedure showed better reliability when compared with a related algorithm on the same database. We can achieve a false acceptance rate (FAR) of 0.1%, a false rejection rate of about 6%, and from 0.3 to 8 s to match most of the finger pairs during the FAR tests.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Bistarelli S, Santini F, Vaccarelli A (2005) An asymmetric fingerprint matching algorithm for java cardTM. In: Proceedings of AVBPA 2005. Springer, Berlin Heidelberg New York, pp 279–289

  2. Jain AK, Maltoni D (2003) Handbook of fingerprint recognition. Springer, Berlin Heidelberg New York, Secaucus, NJ

  3. Lee HC, Gaensslen RE (1991) Advances in fingerprint technology. Elsevier, New York

    Google Scholar 

  4. Pankanti S, Prabhakar S, Jain AK (2002) On the individuality of fingerprints. IEEE Trans Pattern Anal Mach Intell 24(8):1010–1025

    Article  Google Scholar 

  5. Hatano T, Adachi T, Shigematsu S, Morimura H, Onishi S, Okazaki Y, Kyuragi H (2002) A fingerprint verification algorithm using the differential matching rate. In: ICPR ’02: proceedings of the 16th international conference on pattern recognition (ICPR’02), vol 3. IEEE Computer Society, Washington, pp 799–802

  6. Bazen AM, Verwaaijen GTB, Gerez SH, Veelenturf LPJ, van der Zwaag BJ (2000) A correlation-based fingerprint verification system. In: Proceedings of the ProRISC workshop on circuits, systems and signal processing, Veldhoven, The Netherlands. STW Technology Foundation, pp 205–213

  7. Takeda M, Uchida S, Hiramatsu K, Matsunami T (1990) Finger image identification method for personal verification. In: 10th international conference on pattern recognition, vol 1. IEEE Computer Society,Washington, DC, pp 761–766

  8. Kaymaz E, Mitra S (1993) Analysis and matching of degraded and noisy fingerprints. In: Tescher AG (ed) proceedings of SPIE, vol 1771, Applications of digital image processing XV, pp 498–509

  9. Jain AK, Prabhakar S, Hong L, Pankanti S (2000) Filterbank-based fingerprint matching. IEEE Trans Image Process 9(5):846–859

    Article  Google Scholar 

  10. Stosz JD, Alyea LA (1994) Automated system for fingerprint authentication using pores and ridge structure. In: David Murley J, Richard J. Mammone (eds) proceedings of automatic systems for the identification and inspection of humans (SPIE), vol 2277. IEEE Computer Society, Washington, DC, pp 210–223

  11. Ratha NK, Karu K, Chen S, Jain AK (1996) A real-time matching system for large fingerprint databases. IEEE Trans Pattern Anal Mach Intell 18(8):799–813

    Article  Google Scholar 

  12. Bistarelli S, Boffi G, Rossi F (2003) Computer algebra for fingerprint matching. In: International conference on computational science ICCS03, vol 2657/2003, pp 811–820

  13. Jain AK, Hong L, Bolle RM (1997) On-line fingerprint verification. IEEE Trans Pattern Anal Mach Intell 19(4):302–314

    Article  Google Scholar 

  14. Luo X, Tian J, Wu Y (2000) A minutiae matching algorithm in fingerprint verification. In: 15th international conference on pattern recognition, vol 4. IEEE Computer Society, Washington, DC, pp 210–223

  15. Jiang X, Yau W-Y (2000) Fingerprint minutiae matching based on the local and global structures. icpr 02:1042–1045

    Google Scholar 

  16. Ratha NK, Bolle RM, Pandit VD, Vaish V (2000) Robust fingerprint authentication using local structural similarity. In: 5th IEEE workshop on applications of computer vision. IEEE Computer Society, Washington, DC, pp 29–34

  17. Hrechak AK, McHugh JA (1990) Automated fingerprint recognition using structural matching. Pattern Recognit 23(8):893–904

    Article  Google Scholar 

  18. Fan K-C, Liu CW, Wang Y-K (2000) A randomized approach with geometric constraints to fingerprint verification. Pattern Recognit 33(11):1793–1803

    Article  Google Scholar 

  19. Willis AJ, Myers L (2001) A cost-effective fingerprint recognition systems for use with low-quality prints and damaged fingerprints. Proc Pattern Recognit 34(2):255–270

    Article  MATH  Google Scholar 

  20. Kovacs-Vajna ZM (2000) A fingerprint verification system based on triangular matching and dynamic time warping. IEEE Trans Pattern Anal Mach Intell 22(11):1266–1276

    Article  Google Scholar 

  21. Bhanu B, Tan X (2003) Fingerprint indexing based on novel features of minutiae triplets. IEEE Trans Pattern Anal Mach Intell 25(5):616–622

    Article  Google Scholar 

  22. Jain AK, Ross A, Prabhakar S (2001) Fingerprint matching using minutiae and textures features. In: Proceedings of international conference on image processing (ICIP), Thessaloniki, Greece, pp 282–285

  23. ISO 7816: integrated circuit(s) cards with contacts—part 1, 1998. International Standardization Organization, JTC 1/SC 17

  24. Enrique Ortiz C (2003) An introduction to Java CardTM technology, Parts 1-2-3, Java Developer Web Site

  25. Chen Z (2000) Java Card technology for smart cards: architecture and programmer’s guide. Addison-Wesley, Longman Publishing Co., Inc., Boston

    Google Scholar 

  26. Ratha NK, Connell JH, Bolle RM (2001) An analysis of minutiae matching strength. In: AVBPA ’01: proceedings of the 3rd international conference on audio- and video-based biometric person authentication. Springer, London, pp 223–228

  27. Kocher PC, Jaffe J, Jun B (1999) Differential power analysis. In: CRYPTO ’99: proceedings of the 19th annual international cryptology conference on advances in cryptology. Springer, London, pp 388–397

  28. Pan SB, Moon D, Gil Y, Ahn D, Chung Y (2003) An ultra-low memory fingerprint matching algorithm and its implementation on a 32-bit smart card. In: IEEE transactions on consumer electronics, vol 49. IEEE Computer Society, Washington, pp 453–459

  29. Moon YS, Ho HC, Ng KL, Wan SF, Wong ST (2000) Collaborative fingerprint authentication by smart card and atrusted host. In: Canadian conference on electrical and computer engineering, vol 1. IEEE Computer Society, Washington, pp 108–112

  30. Reisman J, Uludag U, Ross A (2005) Secure fingerprint matching with external registration. AVBPA 720–729

  31. Ross A, Jain AK, Reisman J (2003) A hybrid fingerprint matcher. Pattern Recognit J 36(7):1661–1673

    Article  Google Scholar 

  32. Ishida S, Mimura M, Seto Y (2001) Development of personal authentication techniques using fingerprint matching embedded in smart cards. In: EICE transactions on information and systems, vol E84-D, pp 812–818

  33. Tang TY, Moon YS, Chan KC (2004) Efficient implementation of fingerprint verification for mobile embedded systems using fixed-point arithmetic. In: SAC ’04: proceedings of the 2004 ACM symposium on applied computing. ACM Press, New York, pp 821–825

  34. Yang S, Verbauwhede I (2003) A secure fingerprint matching technique. In: WBMA ’03: proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications. ACM Press, New York, pp 89–94

  35. Cucinotta T, Brigo R, Di Natale M (2004) Hybrid fingerprint matching on programmable smart cards. TrustBus 232–241

  36. van Wamelen P, Li Z, Iyengar S (2000) A fast algorithm for the point pattern matching problem. Technical report 1999-28, Louisiana State University, Dept. of Mathematics

  37. Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2004) Fvc2004: third fingerprint verification competition. ICBA 1–7

  38. Cappelli R, Maio D, Maltoni D, Wayman JL, Jain AK (2006) Performance evaluation of fingerprint verification systems. In: IEEE transactions on pattern analysis machine intelligence, vol 28. IEEE Computer Society, Washington, pp 3–18

  39. National Institute of Standards and Technology. User’s guide to NIST fingerprint image software (NFIS). NISTIR 6813

  40. NIST/Biometric Consortium Interoperability, Assurance, and Performance Working Group 7. Java CardTM Biometric API White Paper (Working Document), August 2002. Version 1.1

  41. Java Card ForumTM official, web site: http://www.javacardforum.org/

  42. Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2002: second fingerprint verification competition. ICPR (3):811–814

  43. Maio D, Maltoni D, Cappelli R, Wayman JL, Jain AK (2002) Fvc2000: fngerprint verification competition. IEEE Trans Pattern Anal Mach Intell 24(3):402–412

    Article  Google Scholar 

  44. Watson CI, Wilson CL (1992) Nist secial dtabase 4. Fingerprint database

  45. Ortega-Garcia J, Fierrez-Aguilar J, Simon D, Gonzalez J, Faundez-ZanuyM, Espinosa V, Satue A, Hernaez I, Igarza JJ, Vivaracho C, Escudero D, Moro QI (2003) Mcyt baseline corpus: a bimodal biometric database. IEE Proc Vis Image Signal Process 150(6):395–401

  46. Biometrika s.r.l., web site: http://www.biometrika.it

  47. Institute of informatics and telematics (c.n.r.), biometric group web site: http://www.iit.cnr.it/organizzazione/sicurezza_informazione/ biometria/index.htm

Download references

Acknowledgments

We would like to thank the organizers of Fingerprint Verification Competition (FVC) [42, 43, 37] who have kindly granted to us the use of all of the fingerprint image databases of the different editions; in particular, we would like to acknowledge Raffaele Cappelli, Dario Maio and Davide Maltoni from the Biometric Systems Lab (University of Bologna). Moreover, we would like to thank Tommaso Cucinotta and Riccardo Brigo from ReTiS Lab of Sant’Anna School of Advanced Studies (Pisa), who have kindly granted to us the use of the fingerprint image database employed to test their algorithm in [35]. Thanks are due also to the anonymous referees that, with their interesting comments, helped to improve the readability and the technical contribution of the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Francesco Santini.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Bistarelli, S., Santini, F. & Vaccarelli, A. An asymmetric fingerprint matching algorithm for Java Card TM . Pattern Anal Applic 9, 359–376 (2006). https://doi.org/10.1007/s10044-006-0048-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10044-006-0048-4

Keywords

Navigation