Biometric Template Selection: A Case Study in Fingerprints

A biometric authentication system operates by acquiring biometric data from a user and comparing it against the template data stored in a database in order to identify a person or to verify a claimed identity. Most systems store multiple templates per user to account for variations in a person's biometric data. In this paper we propose two techniques to automatically select prototype fingerprint templates for a finger from a given set of fingerprint impressions. The first method, called DEND, performs clustering in order to choose a template set that best represents the intra-class variations, while the second method, called MDIST, selects templates that have maximum similarity with the rest of the impressions and, therefore, represent typical measurements of biometric data. Matching results on a database of 50 different fingers, with 100 impressions per finger, indicate that a systematic template selection procedure as presented here results in better performance than random template selection.

[1]  Anil K. Jain,et al.  FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.

[2]  Anil K. Jain,et al.  Algorithms for Clustering Data , 1988 .

[3]  Xudong Jiang,et al.  Minutiae data synthesis for fingerprint identification applications , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[4]  Xudong Jiang,et al.  Online Fingerprint Template Improvement , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[5]  Anil K. Jain,et al.  FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[6]  Anil K. Jain,et al.  On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[7]  Arun Ross,et al.  Fingerprint mosaicking , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[8]  James L. Wayman,et al.  Fundamentals of Biometric Authentication Technologies , 2001, Int. J. Image Graph..

[9]  Tsuhan Chen,et al.  Eigenspace updating for non-stationary process and its application to face recognition , 2003, Pattern Recognit..