throbber
An Identity-Authentication System
`Using Fingerprints
`
`ANIL K. JAIN, FELLOW, IEEE, LIN HONG, SHARATH PANKANTI, ASSOCIATE MEMBER, IEEE,
`AND RUUD BOLLE, FELLOW, IEEE
`
`Fingerprint verification is an important biometric technique for
`personal identification. In this paper, we describe the design and
`implementation of a prototype automatic identity-authentication
`system that uses fingerprints to authenticate the identity of an
`individual. We have developed an improved minutiae-extraction al-
`gorithm that is faster and more accurate than our earlier algorithm
`[58]. An alignment-based minutiae-matching algorithm has been
`proposed. This algorithm is capable of finding the correspondences
`between input minutiae and the stored template without resorting to
`exhaustive search and has the ability to compensate adaptively for
`the nonlinear deformations and inexact transformations between
`an input and a template. To establish an objective assessment of
`our system, both the Michigan State University and the National
`Institute of Standards and Technology NIST 9 fingerprint data
`bases have been used to estimate the performance numbers. The
`experimental results reveal that our system can achieve a good
`performance on these data bases. We also have demonstrated that
`our system satisfies the response-time requirement. A complete
`authentication procedure, on average, takes about 1.4 seconds on
`a Sun ULTRA 1 workstation (it is expected to run as fast or faster
`on a 200 HMz Pentium [7]).
`Keywords—Biometrics, dynamic programming, fingerprint iden-
`tification, matching, minutiae, orientation field, ridge extraction,
`string matching, verification.
`
`I.
`
`INTRODUCTION
`There are two types of systems that help automatically
`establish the identity of a person: 1) authentication (verifica-
`tion) systems and 2) identification systems. In a verification
`system, a person desired to be identified submits an identity
`claim to the system, usually via a magnetic stripe card,
`login name, smart card, etc., and the system either rejects
`or accepts the submitted claim of identity (Am I who I claim
`I am?). In an identification system, the system establishes
`a subject’s identity (or fails if the subject is not enrolled
`in the system data base) without the subject’s having to
`claim an identity (Who am I?). The topic of this paper is
`
`Manuscript received October 31, 1996; revised April 26, 1997.
`A. K. Jain and L. Hong are with the Department of Computer Sci-
`ence, Michigan State University, East Lansing, MI 48824 USA (e-mail:
`jain@cps.msu.edu; honglin@cps.msu.edu).
`S. Pankanti and R. Bolle are with the Exploratory Computer Vision
`Group, IBM T. J. Watson Research Center, Yorktown Heights, NY 10598
`USA (e-mail: sharat@watson.ibm.com; bolle@watson.ibm.com).
`Publisher Item Identifier S 0018-9219(97)06635-8.
`
`a verification system based on fingerprints, and the terms
`verification, authentication, and identification are used in a
`loose sense and synonymously.
`Accurate automatic personal identification is becoming
`more and more important to the operation of our increas-
`ingly electronically interconnected information society [13],
`[20], [53]. Traditional automatic personal
`identification
`technologies to verify the identity of a person, which use
`“something that you know,” such as a personal identifica-
`tion number (PIN), or “something that you have,” such as an
`identification (ID) card, key, etc., are no longer considered
`reliable enough to satisfy the security requirements of
`electronic transactions. All of these techniques suffer from
`a common problem of inability to differentiate between
`an authorized person and an impostor who fraudulently
`acquires the access privilege of the authorized person [53].
`Biometrics is a technology that (uniquely) identifies a per-
`son based on his physiological or behavioral characteristics.
`It relies on “something that you are” to make personal
`identification and therefore can inherently differentiate be-
`tween an authorized person and a fraudulent
`impostor
`[13], [20], [53]. Although biometrics cannot be used to
`establish an absolute “yes/no” personal identification like
`some of the traditional technologies, it can be used to
`achieve a “positive identification” with a very high level
`of confidence, such as an error rate of 0.001% [53].
`
`A. Overview of Biometrics
`Theoretically, any human physiological or behavioral
`characteristic can be used to make a personal identification
`as long as it satisfies the following requirements [13]:
`
`1) universality, which means that every person should
`have the characteristic;
`2) uniqueness, which indicates that no two persons
`should be the same in terms of the characteristic;
`3) permanence, which means that
`the characteristic
`should be invariant with time;
`4) collectability, which indicates that the characteristic
`can be measured quantitatively.
`
`1365
`PROCEEDINGS OF THE IEEE, VOL. 85, NO. 9, SEPTEMBER 1997
`Authorized licensed use limited to: UNIV OF SOUTH ALABAMA. Downloaded on May 09,2023 at 01:04:37 UTC from IEEE Xplore. Restrictions apply.
`
`0018–9219/97$10.00 ª
`
`1997 IEEE
`
`CPC EX 2044 - Page 001 ASSA ABLOY AB v. CPC Patent Technologies Pty Ltd.
`IPR2022-01093
`
`

`

`Table 1 Comparison of Biometric Technologies
`
`In practice, there are some other important requirements
`[13], [53]:
`
`1) performance, which refers to the achievable identifi-
`cation accuracy, the resource requirements to achieve
`an acceptable identification accuracy, and the working
`or environmental factors that affect the identification
`accuracy;
`2) acceptability, which indicates to what extent people
`are willing to accept the biometric system;
`3) circumvention, which refers to how easy it is to fool
`the system by fraudulent techniques.
`
`Biometrics is a rapidly evolving technology that has been
`widely used in forensics, such as criminal identification and
`prison security, and has the potential to be widely adopted
`in a very broad range of civilian applications:
`
`1) banking security, such as electronic fund transfers,
`ATM security, check cashing, and credit card trans-
`actions;
`2) physical access control, such as airport access control;
`3) information system security, such as access to data
`bases via login privileges;
`4) government benefits distribution, such as welfare dis-
`bursement programs [49];
`5) customs and immigration, such as the Immigration
`and Naturalization Service Passenger Accelerated
`Service System (INSPASS) which permits faster
`immigration procedures based on hand geometry
`[35];
`6) national ID systems, which provide a unique ID to the
`citizens and integrate different government services
`[31];
`7) voter and driver registration, providing registration
`facilities for voters and drivers.
`
`Currently, there are mainly nine different biometric tech-
`niques that are either widely used or under investigation,
`
`including face, fingerprint, hand geometry, hand vein, iris,
`retinal pattern, signature, voice print, and facial thermo-
`grams [13], [18], [20], [53], [68]. A brief comparison of
`these nine biometric techniques is provided in Table 1.
`Although each of these techniques, to a certain extent,
`satisfies the above requirements and has been used in
`practical systems [13], [18], [20], [53] or has the potential
`to become a valid biometric technique [53], not many of
`them are acceptable (in a court of law) as indisputable
`evidence of identity. For example, despite the fact that
`extensive studies have been conducted on automatic face
`recognition and that a number of face-recognition systems
`are available [3], [62], [70], it has not yet been proven that
`1) face can be used reliably to establish/verify identity and
`2) a biometric system that uses only face can achieve an
`acceptable identification accuracy in a practical environ-
`ment. Without any other information about the people in
`Fig. 1, it will be extremely difficult for both a human and a
`face-recognition system to conclude that the different faces
`shown in Fig. 1 are disguised versions of the same person.
`So far, the only legally acceptable, readily automated, and
`mature biometric technique is the automatic fingerprint-
`identification technique, which has been used and accepted
`in forensics since the early 1970’s [42]. Although signatures
`also are legally acceptable biometrics, they rank a distant
`second to fingerprints due to issues involved with accuracy,
`forgery, and behavioral variability. Currently, the world
`market for biometric systems is estimated at approximately
`$112 million. Automatic fingerprint-identification systems
`intended mainly for forensic applications account for ap-
`proximately $100 million. The biometric systems intended
`for civilian applications are growing rapidly. For example,
`by the year 1999, the world market for biometric systems
`used for physical access control alone is expected to expand
`to $100 million [53].
`The biometrics community is slow in establishing bench-
`marks for biometric systems [20]. Although benchmark
`results on standard data bases in themselves are useful only
`to a limited extent and may result in excessive tuning of the
`
`1366
`
`PROCEEDINGS OF THE IEEE, VOL. 85, NO. 9, SEPTEMBER 1997
`Authorized licensed use limited to: UNIV OF SOUTH ALABAMA. Downloaded on May 09,2023 at 01:04:37 UTC from IEEE Xplore. Restrictions apply.
`
`CPC EX 2044 - Page 002 ASSA ABLOY AB v. CPC Patent Technologies Pty Ltd.
`IPR2022-01093
`
`

`

`Fig. 1. Multiple personalities: all of the people in this image are the same person. (From The New
`York Times Magazine, Sept. 1, 1996, sect. 6, pp. 48–49. Reproduced with permission of Robert
`Trachtenberg.)
`
`system parameters to “improve” the system performance,1
`they constitute a good starting point for comparison of the
`gross performance characteristics of the systems.
`No metric is sufficiently adequate to give a reliable and
`convincing indication of the identification accuracy of a
`biometric system. A decision made by a biometric system
`is either a “genuine individual” type of decision or an
`“impostor” type of decision, which can be represented
`by two statistical distributions, called genuine distribution
`and impostor distribution, respectively. For each type of
`decision, there are two possible decision outcomes, true or
`false. Therefore, there are a total of four possible outcomes:
`1) a genuine individual is accepted, 2) a genuine individual
`is rejected, 3) an impostor is rejected, and 4) an impostor is
`accepted. Outcomes 1) and 3) are correct, whereas 2) and 4)
`are incorrect. In principle, we can use the false (impostor)
`acceptance rate (FAR), the false (genuine individual) reject
`rate (FRR), and the equal error rate (EER)2 to indicate the
`identification accuracy of a biometric system [18], [19],
`[53]. In practice, these performance metrics can only be
`estimated from empirical data, and the estimates of the
`performance are very data dependent. Therefore, they are
`meaningful only for a specific data base in a specific test
`environment. For example, the performance of a biometric
`system claimed by its manufacturer had an FRR of 0.3%
`and an FAR of 0.1%. An independent test by the Sandia
`National Laboratory found that the same system had an
`FRR of 25% with an unknown FAR [10]. To provide a
`more reliable assessment of a biometric system, some more
`descriptive performance measures are necessary. Receiver
`operating curve (ROC) and
`are the two other commonly
`used measures. An ROC provides an empirical assessment
`
`1 Several additional techniques, like data sequestering [51] and third-
`party benchmarking [9], may also help in obtaining fairer performance
`results.
`2 Equal error rate is defined as the value where FAR and FRR are equal.
`
`of the system performance at different operating points,
`which is more informative than FAR and FRR. The statis-
`tical metric
`gives an indication of the separation between
`the genuine distribution and impostor distribution [19]. It is
`defined as the difference between the means of the genuine
`distribution and impostor distribution divided by a conjoint
`measure of their standard deviations [19]
`
`(1)
`
`where
`and
`are the means and standard deviations of the genuine
`distribution and impostor distribution, respectively. Like
`FAR, FRR, and EER, both ROC and
`also depend heavily
`on test data and test environments. For such performance
`metrics to be able to generalize precisely to the entire pop-
`ulation of interest, the test data should 1) be large enough
`to represent the population and 2) contain enough samples
`from each category of the population [19]. To obtain fair
`and honest test results, enough samples should be available,
`and the samples should be representative of the population
`and adequately represent all the categories (impostor and
`genuine). Further, irrespective of the performance measure,
`error bounds that indicate the confidence of the estimates
`are valuable for understanding the significance of the test
`results.
`
`B. History of Fingerprints
`Fingerprints are graphical flow-like ridges present on
`human fingers (see Fig. 2). Their formations depend on
`the initial conditions of the embryonic mesoderm from
`which they develop. Humans have used fingerprints as a
`means of identification for a very long time [42]. Modern
`fingerprint techniques were initiated in the late sixteenth
`century [25], [53]. In 1684, English plant morphologist N.
`
`1367
`JAIN et al.: IDENTITY-AUTHENTICATION SYSTEM
`Authorized licensed use limited to: UNIV OF SOUTH ALABAMA. Downloaded on May 09,2023 at 01:04:37 UTC from IEEE Xplore. Restrictions apply.
`
`CPC EX 2044 - Page 003 ASSA ABLOY AB v. CPC Patent Technologies Pty Ltd.
`IPR2022-01093
`
`

`

`(a)
`
`(b)
`
`(c)
`
`(d)
`
`(e)
`
`(f)
`
`Fig. 2. Fingerprints and a fingerprint classification schema of six categories: (a) arch, (b) tented
`arch, (c) right loop, (d) left loop, (e) whorl, and (f) twinloop. Critical points in a fingerprint, called
`core and delta, are marked on (c).
`
`Grew published a paper reporting his systematic study on
`the ridge, furrow, and pore structure in fingerprints, which is
`believed to be the first scientific paper on fingerprints [42].
`Since then, a number of researchers have invested a huge
`amount of effort in studying fingerprints. In 1788, a detailed
`description of the anatomical formations of fingerprints was
`made by Mayer [16], in which a number of fingerprint
`ridge characteristics were identified. Starting from 1809, T.
`Bewick began to use his fingerprint as his trademark, which
`is believed to be one of the most important contributions in
`the early scientific study of fingerprint identification [42].
`Purkinje proposed the first fingerprint classification scheme
`in 1823, which classified fingerprints into nine categories
`according to the ridge configurations [42]. H. Fauld, in
`1880, first scientifically suggested the individuality and
`uniqueness of fingerprints. At
`the same time, Herschel
`asserted that he had practiced fingerprint identification for
`approximately 20 years [42]. This discovery established the
`foundation of modern fingerprint identification. In the late
`nineteenth century, Sir F. Galton conducted an extensive
`study of fingerprints [42]. He introduced the minutiae
`features for single fingerprint classification in 1888. An
`important advance in fingerprint identification was made
`in 1899 by E. Henry, who (actually his two assistants from
`India) established the famous “Henry system” of fingerprint
`classification [25], [42], an elaborate method of indexing
`fingerprints very much tuned to facilitating the human
`experts in performing (manual) fingerprint identification.
`By the early twentieth century, the formations of finger-
`
`prints were well understood. The biological principles of
`fingerprints are summarized below.
`• Individual epidermal ridges and furrows (valleys) have
`different characteristics for different fingers.
`• The configuration types are individually variable but
`they vary within limits that allow for systematic clas-
`sification.
`• The configurations and minute details of individual
`ridges and furrows are permanent and unchanging for
`a given finger.
`In the early twentieth century, fingerprint identification was
`formally accepted as a valid personal-identification method
`by law-enforcement agencies and became a standard routine
`in forensics [42]. Fingerprint-identification agencies were
`set up worldwide, and criminal fingerprint data bases were
`established [42].
`Starting in the early 1960’s, the Federal Bureau of Inves-
`tigation (FBI) home office in the United Kingdom and the
`Paris Police Department invested a large amount of effort
`in developing automatic fingerprint-identification systems
`(AFIS’s) [25]. Their efforts were so successful that a large
`number of AFIS’s are currently installed and in operation
`at
`law-enforcement agencies worldwide. These systems
`have greatly improved the operational productivity of these
`agencies and reduced the cost of hiring and training human
`fingerprint experts for manual fingerprint
`identification.
`Encouraged by the success achieved by AFIS’s in law-
`enforcement agencies, automatic fingerprint identification
`
`1368
`
`PROCEEDINGS OF THE IEEE, VOL. 85, NO. 9, SEPTEMBER 1997
`Authorized licensed use limited to: UNIV OF SOUTH ALABAMA. Downloaded on May 09,2023 at 01:04:37 UTC from IEEE Xplore. Restrictions apply.
`
`CPC EX 2044 - Page 004 ASSA ABLOY AB v. CPC Patent Technologies Pty Ltd.
`IPR2022-01093
`
`

`

`rapidly grew beyond law enforcement into civilian applica-
`tions [25], [53]. In fact, fingerprint-based biometric systems
`are so popular that they have almost become the synonym
`of biometric systems [20]. Although significant progress has
`been made in designing automatic fingerprint-authentication
`systems over the past 30 years, a number of design factors
`(lack of reliable minutiae-extraction algorithms [48], [54],
`difficulty in quantitatively defining a reliable match between
`fingerprint images [43], [45], poor fingerprint classification
`algorithms [12], [14] [39], [46], [57], [74], etc.) create
`bottlenecks in achieving the desired performance [25], [42].
`
`C. Design of a Fingerprint-Verification System
`An automatic fingerprint identity authentication system
`has four main design components: acquisition, representa-
`tion (template), feature extraction, and matching.
`1) Acquisition: There are two primary methods of cap-
`turing a fingerprint image: inked (off-line) and live scan
`(ink-less). An inked fingerprint image is typically acquired
`in the following way: a trained professional3 obtains an
`impression of an inked finger on a paper, and the impression
`is then scanned using a flat-bed document scanner. The live-
`scan fingerprint is a collective term for a fingerprint image
`directly obtained from the finger without the intermediate
`step of getting an impression on a paper. Acquisition of
`inked fingerprints is cumbersome; in the context of an
`identity-authentication system,
`it
`is both infeasible and
`socially unacceptable for identity verification.4 The most
`popular technology to obtain a live-scan fingerprint image
`is based on the optical frustrated total internal reflection
`(FTIR) concept [28]. When a finger is placed on one side
`of a glass platen (prism), ridges of the finger are in contact
`with the platen while the valleys of the finger are not.
`The rest of the imaging system essentially consists of an
`assembly of a light emitting diode (LED) light source and
`a charge-couple device (CCD) placed on the other side of
`the glass platen. The laser light source illuminates the glass
`at a certain angle, and the camera is placed such that it can
`capture the laser light reflected from the glass. The light
`that is incident on the plate at the glass surface touched by
`the ridges is randomly scattered, while the light incident
`at the glass surface corresponding to valleys suffers total
`internal reflection, resulting in a corresponding fingerprint
`image on the imaging plane of the CCD.
`A number of other live-scan imaging methods are now
`available, based on ultrasound total internal reflection [61],
`optical total internal reflection of edge-lit holograms [21],
`thermal sensing of the temperature differential (across the
`ridges and valleys) [41], sensing of differential capaci-
`tance [47], and noncontact three-dimensional scanning [44].
`These alternate methods are primarily concerned with either
`reducing the size/price of the optical scanning system or
`improving the quality/resolution/consistency of the image
`
`3 For reasons of expediency, MasterCard sends fingerprint kits to its
`credit card customers. The kits are used by the customers themselves to
`create an inked fingerprint impression to be used for enrollment.
`4 Again, MasterCard relies on inked impressions for enrollment.
`
`live-scan
`
`capture. Typical specifications for the optical
`fingerprints are specified in [60].
`2) Representation (Template): Which machine-readable
`representation completely captures
`the invariant and
`discriminatory information in a fingerprint image? This
`representation issue constitutes the essence of fingerprint-
`verification design and has far-reaching implications on the
`design of the rest of the system. The unprocessed gray-
`scale values of the fingerprint images are not invariant over
`the time of capture.
`Representations based on the entire gray-scale profile of
`a fingerprint image are prevalent among the verification
`systems using optical matching [4], [50]. The utility of
`the systems using such representation schemes, however,
`may be limited due to factors like brightness variations,
`image-quality variations, scars, and large global distortions
`present in the fingerprint image because these systems are
`essentially resorting to template-matching strategies for ver-
`ification. Further, in many verification applications, terser
`representations are desirable, which preclude representa-
`tions that involve the entire gray-scale profile fingerprint
`images. Some system designers attempt to circumvent this
`problem by restricting that the representation is derived
`from a small (but consistent) part of the finger [50]. If this
`same representation is also being used for identification
`applications, however, then the resulting systems might
`stand a risk of restricting the number of unique identities
`that could be handled simply because of the fact that the
`number of distinguishable templates is limited. On the
`other hand, an image-based representation makes fewer
`assumptions about the application domain (fingerprints) and
`therefore has the potential to be robust to wider varieties of
`fingerprint images. For instance, it is extremely difficult to
`extract a landmark-based representation from a (degenerate)
`finger devoid of any ridge structure.
`Representations that rely on the entire ridge structure
`(ridge-based representations) are largely invariant to the
`brightness variations but are significantly more sensitive to
`the quality of the fingerprint image than the landmark-based
`representations described below. This is because the pres-
`ence of the landmarks is, in principle, easier to verify [75].
`An alternative to gray-scale-based representation is to ex-
`tract landmark features from a binarized fingerprint image.
`Landmark-based representations are also used for privacy
`reasons—one cannot reconstruct the entire fingerprint im-
`age from the fingerprint landmark information alone. The
`common hypothesis underlying such representations is the
`belief that the individuality of fingerprints is captured by
`the local ridge structures (minute details) and their spatial
`distributions [25], [42]. Therefore, automatic fingerprint
`verification is usually achieved with minute-detail matching
`instead of a pixel-wise matching or a ridge-pattern matching
`of fingerprint images. In total, there are approximately 150
`different types of local ridge structures that have been iden-
`tified [42]. It would be extremely difficult to automatically,
`quickly, and reliably extract these different representations
`from the fingerprint
`images because 1) some of them
`are so similar to each other and 2) their characterization
`
`1369
`JAIN et al.: IDENTITY-AUTHENTICATION SYSTEM
`Authorized licensed use limited to: UNIV OF SOUTH ALABAMA. Downloaded on May 09,2023 at 01:04:37 UTC from IEEE Xplore. Restrictions apply.
`
`CPC EX 2044 - Page 005 ASSA ABLOY AB v. CPC Patent Technologies Pty Ltd.
`IPR2022-01093
`
`

`

`(a)
`
`(b)
`
`Fig. 3. Ridge ending and ridge bifurcation.
`
`depends upon the fine details of the ridge structure, which
`are notoriously difficult to obtain from fingerprint images
`of a variety of quality. Typically, automatic fingerprint
`identification and authentication systems rely on repre-
`senting the two most prominent structures5: ridge endings
`and ridge bifurcations. Fig. 3 shows examples of ridge
`endings and ridge bifurcations. These two structures are
`background-foreground duals of each other, and pressure
`variations could convert one type of structure into the
`other. Therefore, many common representation schemes
`do not distinguish between ridge endings and bifurca-
`tions. Both the structures are treated equivalently and are
`collectively called minutiae. The simplest of the minutiae-
`based representations constitute a list of points defined by
`their spatial coordinates with respect to a fixed image-
`centric coordinate system. Typically, though, these minimal
`minutiae-based representations are further enhanced by tag-
`ging each minutiae (or each combination of minutiae subset,
`e.g., pairs, triplets) with additional features. For instance,
`each minutiae could be associated with the orientation of the
`ridge at that minutiae; or each pair of the minutiae could be
`associated with the ridge count: the number of ridges visited
`during the linear traversal between the two minutiae. The
`American National Standards Institute–National Institute of
`Standards and Technology (NIST) standard representation
`of a fingerprint is based on minutiae and includes minutiae
`location and orientation [2]. The minutiae-based represen-
`tation might also include one or more global attributes like
`orientation of the finger, locations of core or delta,6 and
`fingerprint class.
`Our representation is minutiae based, and each minutia
`is described by its location (
`coordinates) and the
`orientation. We also store a short segment of the ridge
`associated with each minutia.
`3) Feature Extraction: A feature extractor finds the ridge
`endings and ridge bifurcations from the input fingerprint
`images. If ridges can be perfectly located in an input
`
`5 Many of the other ridge structures could be described as a combination
`of ridge endings and bifurcations [42].
`6 Core and delta are the two distinctive global structures in a fingerprint
`[25]; see Fig. 2(c).
`
`fingerprint image, then minutiae extraction is just a triv-
`ial task of extracting singular points in a thinned ridge
`map. In practice, however, it is not always possible to
`obtain a perfect ridge map. The performance of currently
`available minutiae-extraction algorithms depends heavily
`on the quality of input fingerprint images. Due to a number
`of factors (aberrant formations of epidermal ridges of
`fingerprints, postnatal marks, occupational marks, problems
`with acquisition devices, etc.), fingerprint
`images may
`not always have well-defined ridge structures. Reliable
`minutiae-extraction algorithms should not assume perfect
`ridge structures and should degrade gracefully with the
`quality of fingerprint images. We have developed a modified
`version of the minutiae-extraction algorithm proposed in
`[58] that is faster and more reliable. Our minutiae-extraction
`scheme is described in the Section II.
`4) Matching: Given two (test and reference) representa-
`tions, the matching module determines whether the prints
`are impressions of the same finger. The matching phase
`typically defines a metric of the similarity between two
`fingerprint representations. The matching stage also defines
`a threshold to decide whether a given pair of representations
`are of the same finger (mated pair) or not.
`In the case of the minutiae-based representations, the
`fingerprint-verification problem may be reduced to a point
`pattern matching (minutiae pattern matching) problem. In
`the ideal case, if 1) the correspondence between the tem-
`plate minutiae pattern and input minutiae pattern is known,
`2) there are no deformations such as translation, rota-
`tion, and deformations between them, and 3) each minutia
`present in a fingerprint image is exactly localized, then
`fingerprint verification is only a trivial task of counting the
`number of spatially matching pairs between the two im-
`ages. Determining whether two representations of a finger
`extracted from its two impressions, possibly separated by
`a long duration of time, are indeed representing the same
`finger is an extremely difficult problem. Fig. 4 illustrates
`the difficulty with an example of two images of the same
`finger. The difficulty can be attributed to two primary
`reasons. First, if the test and reference representations are
`indeed mated pairs, the correspondence between the test and
`reference minutiae in the two representations is not known.
`Second, the imaging system presents a number of peculiar
`and challenging situations, some of which are unique to a
`fingerprint image capture scenario.
`
`1) Inconsistent contact: the act of sensing distorts the
`finger. Determined by the pressure and contact of the
`finger on the glass platen, the three-dimensional shape
`of the finger gets mapped onto the two-dimensional
`surface of the glass platen. Typically, this mapping
`function is uncontrolled and results in different in-
`consistently mapped fingerprint
`images across the
`impressions.
`2) Nonuniform contact: The ridge structure of a finger
`would be completely captured if ridges of the part
`of the finger being imaged are in complete optical
`contact with the glass platen. However, the dryness of
`
`1370
`
`PROCEEDINGS OF THE IEEE, VOL. 85, NO. 9, SEPTEMBER 1997
`Authorized licensed use limited to: UNIV OF SOUTH ALABAMA. Downloaded on May 09,2023 at 01:04:37 UTC from IEEE Xplore. Restrictions apply.
`
`CPC EX 2044 - Page 006 ASSA ABLOY AB v. CPC Patent Technologies Pty Ltd.
`IPR2022-01093
`
`

`

`semipermanently. This may introduce additional spu-
`rious minutiae.
`4) Feature extraction artifacts: The feature extraction
`algorithm is imperfect and introduces measurement
`errors. Various image-processing operations might
`introduce inconsistent biases to perturb the location
`and orientation estimates of the reported minutiae
`from their gray-scale counterparts.
`5) Sensing act: the act of sensing itself adds noise to the
`image. For example, residues are leftover from the
`previous fingerprint capture. A typical finger-imaging
`system distorts the image of the object being sensed
`due to imperfect imaging conditions. In the FTIR
`sensing scheme, for example, there is a geometric
`distortion because the image plane is not parallel to
`the glass platen.
`
`In light of the operational environments mentioned above,
`the design of the matching algorithms needs to establish and
`characterize a realistic model of the variations among the
`representations of mated pairs. This model should include
`the properties of interest listed below.
`
`a) The finger may be placed at different locations on the
`glass platen, resulting in a (global) translation of the
`minutiae from the test representation from those in
`the reference representation.
`b) The finger may be placed in different orientations on
`the glass platen, resulting in a (global) rotation of the
`minutiae from the test representation from that of the
`reference representation.
`c) The finger may exert a different (average) downward
`normal pressure on the glass platen, resulting in a
`(global) spatial scaling of the minutiae from the test
`representation from those in the reference represen-
`tation.
`d) The finger may exert a different (average) shear force
`on the glass platen, resulting in a (global) shear
`transformation (characterized by a shear direction and
`magnitude) of the minutiae from the test representa-
`tion from those in the reference representation.
`e) Spurious minutiae may be present in both the refer-
`ence and the test representations.
`f) Genuine minutiae may be absent in the reference or
`test representations.
`g) Minutiae may be locally perturbed from their “true”
`location, and the perturbation may be different for
`each individual minutiae. (Further, the magnitude of
`such perturbation is assumed to be small and within
`a fixed number of pixels.)
`h) The individual perturbations among the correspond-
`ing minutiae could be relatively large (with respect
`to ridge spacings), but the perturbations among pairs
`of the minutiae are spatially linear.
`i) The individual perturbations among the corresponding
`minutiae could be relatively large (with respect to
`
`(a)
`
`(b)
`
`Fig. 4. Two different fingerprint impressions of the same finger.
`To know the correspondence between the minutiae of these two
`fingerprint images, all of the minutiae must be precisely localized
`and the deformations must be recovered.
`
`the skin, skin dise

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket