UNIVERSITI PUTRA MALAYSIA FINGERPRINT IMAGE COMPRESSION USING WAVELET TRANSFORM ABDALLA MUSBAH HANASHI FK

Similar documents
PERCEIVED IMAGE OF CHINESE TOURIST ON MALACCA WORLD HERITAGE SITES LIEW JAN FUI UNIVERSITI TEKNOLOGI MALAYSIA

DETERMINISTIC AUTOMATIC TEST PATTERN GENERATION FOR BUILT-IN SELF TEST SYSTEM

8-BITS X 8-BITS MODIFIED BOOTH 1 S COMPLEMENT MULTIPLIER NORAFIZA SALEHAN

THE APPLICATION OF FINITE ELEMENT METHOD IN BURGERS EQUATION NURUL AKIDAH BINTI ADNAN

AN IMPROVEMENT OF VOLTAGE QUALITY IN LOW VOLTAGE DISTRIBUTION SYSTEM USING DYNAMIC VOLTAGE RESTORER ABBA LAWAN BUKAR UNIVERSTI TEKNOLOGI MALAYSIA

ENHANCED ASPECT LEVEL OPINION MINING KNOWLEDGE EXTRACTION AND REPRESENTATION MAQBOOL RAMDHAN IBRAHIM AL-MAIMANI UNIVERSITI TEKNOLOGI MALAYSIA

Comparative Analysis of Wavelet Transform and Wavelet Packet Transform for Image Compression at Decomposition Level 2

THE INFLUENCE OF THE DISCORD IN BUILDING DISTINCTIVNESS ON THE PERCEPTION OF TEHRAN S CITY IDENTITY

EMBEDDED ZEROTREE WAVELET CODING WITH JOINT HUFFMAN AND ARITHMETIC CODING

DEVELOPMENT OF LCD DISPLAY DATA CAPTURING SYSTEM FOR INDUSTRIAL PURPOSE OOI YI FONG

UNIVERSITI PUTRA MALAYSIA MEANING AND VALUE OF HUMOR IN THE LIVES OF ELDERLY MALAYS IN PUTRAJAYA, MALAYSIA

UNIVERSITI PUTRA MALAYSIA NEW TUNABLE ALL-FIBER OPTICAL COMB FILTER BASED ON MACHZEHNDER INTERFEROMETER

UNIVERSITI PUTRA MALAYSIA TOWARD A PRAGMATIC CONCEPTION OF METAPHOR CHARBATI YOUSSEF FBMK

THE TRANSLATION OF FIGURATIVE LANGUAGE IN KAZI NAZRUL ISLAM S POEMS SHAFIA AKHTER

UNIVERSITI PUTRA MALAYSIA DEPTH FRAME LOSS CONCEALMENT FOR WIRELESS TRANSMISSION UTILISING MOTION DETECTION INFORMATION MOHAMADREZA RANJBARI

PERSEPSI PELAJAR TERHADAP KUALITI PERSEKITARAN DALAMAN (IEQ) PERPUSTAKAAN RABIYATUL AKMA BINTI DAUT

INTRODUCTION OF INDEXED PUBLICATION SEMAKAN PENERBITAN RADIS KATEGORI INDEXED PUBLICATION

2-Dimensional Image Compression using DCT and DWT Techniques

MODELING AND CONTROLLER DESIGN OF A HOT AIR BLOWER SYSTEM KHAIRUL NIZAR SYAZWAN BIN WAN SALIHIN WONG

ISMAEEL OTUOZE AUDU. A thesis submitted in fulfilment of the requirements for the award of the degree of Master of Architecture

UNIVERSITI PUTRA MALAYSIA THE EFFECT OF TEXTUAL INPUT VERSUS ICONIC INPUT IN COMPUTER ASSISTED INSTRUCTION ON INTERVAL RECOGNITION

UNIVERSITI PUTRA MALAYSIA COPYRIGHT UPM OPTICAL AND ELECTRICAL PROPERTIES OF ORGANIC AND POLYMER LAYERS OF LIGHT EMITTING DIODE STRUCTURE

3D MR Image Compression Techniques based on Decimated Wavelet Thresholding Scheme

Image Compression Techniques Using Discrete Wavelet Decomposition with Its Thresholding Approaches

O/144 - c Tankh DEVELOP SEPARATION. E FOR IN-VEI-nuLb lnr V AINIVthNi s Y STEM (IVIS) LEE HOW CHEH

Signal Processing with Wavelets.

INSTRUCTION: This section consists of FOUR (4) structured questions. Answer ALL questions.

Taklimat Penerbitan Buku Penyelidikan 24 Mac 2014

CONVOLUTION ENCODER FOR FORWARD ERROR CORRECTION AHMAD TERMIZI BIN MOHD AZMI

ABSTRAK. Modeling Language (UML) yang terdiri dar i use cases, gambaraj ah aktiviti,

CULTURAL UNTRANSLATABILITY IN TO KILL A MOCKINGBIRD TRANSLATED INTO INDONESIAN BY FEMMY SYAHRANI

COLOR SORTING SYSTEM WITH ROBOT ARM YEOW KHANG YUNG

DWT Based-Video Compression Using (4SS) Matching Algorithm

UNIVERSITI PUTRA MALAYSIA MUSICAL AND TEXTUAL ANALYSES OF LULLABIES AND FOLKTALES OF DUSUN LABUK AT EASTERN SABAH, MALAYSIA

SOCIETY A PAPER UNIVERSIT. Universitas Sumatera Utara

Visual And Verbal Communication In Michael Jackson s Video Clip Entitled Black Or White. Abstrak

MULTI WAVELETS WITH INTEGER MULTI WAVELETS TRANSFORM ALGORITHM FOR IMAGE COMPRESSION. Pondicherry Engineering College, Puducherry.

INTRA-FRAME WAVELET VIDEO CODING

Reduction of Noise from Speech Signal using Haar and Biorthogonal Wavelet

Digital Video Telemetry System

AN IMPROVISED THREE-DIMENSIONAL SLOPE STABILITY ANALYSIS BASED ON LIMIT EQUILIBRIUM METHOD BY USING PARTICLE SWARM OPTIMIZATION ROOHOLLAH KALATEHJARI

MODEL SENI BINA PENYIMPANAN KUERI DI JABATAN PERKHIDMATAN AWAM MALAYSIA HERRNIWATI NGATIMAN KAMSURIAH AHMAD

SUBORDINATIONS IN PAULO COELHO S NOVEL BRIDA

SITUATION TYPES IN THE NOVEL HARRY POTTER AND THE PRISONER OF AZKABAN A THESIS BY: MASYITA RISMADI REG. NO

UNIVERSITI PUTRA MALAYSIA CLASSIFICATION OF THE AESTHETICS FORMULA AND GENERATING THE SCREEN DESIGNS FOR BALANCE PRINCIPLE

UNIVERSITI PUTRA MALAYSIA MULTIPLE WAVELENGTH LASER UTILIZING HYBRID ERBUIM AND BRILLOUIN GAINS IN DISPERSION COMPENSATING FIBER MOHAMMED AJIYA

Steganographic Technique for Hiding Secret Audio in an Image

A Novel Approach towards Video Compression for Mobile Internet using Transform Domain Technique

AGH University of Science and Technology Measurement & Instrumentation Department Kraków, Poland

NATIONAL INSTITUTE OF TECHNOLOGY CALICUT ACADEMIC SECTION. GUIDELINES FOR PREPARATION AND SUBMISSION OF PhD THESIS

DICOM medical image watermarking of ECG signals using EZW algorithm. A. Kannammal* and S. Subha Rani

New Efficient Technique for Compression of ECG Signal

From Fourier Series to Analysis of Non-stationary Signals - X

Comparative survey of ultrasound images compression methods dedicated to a tele-echography robotic system

APLIKASI MUDAH ALIH PEMANTAUAN PESAKIT DI ZON KRITIKAL DAN SEPARA KRITIKAL JABATAN KECEMASAN PUSAT PERUBATAN UNIVERSITI KEBANGSAAN Malaysia

UNIVERSITI PUTRA MALAYSIA TV GHOST CANCELLATION SYSTEM USING SWITCHED CAPACITOR CIRCUITS SEEDAHMED SHARIF MAHMOUD FK

Research Topic. Error Concealment Techniques in H.264/AVC for Wireless Video Transmission in Mobile Networks

Comparative Study on Fingerprint Recognition Systems Project BioFinger

Research Article. ISSN (Print) *Corresponding author Shireen Fathima

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

UNIVERSITI TEKNOLOGI MARA KAMPUS PUNCAK PERDANA SHAH ALAM SELANGOR

UNIVERSITI PUTRA MALAYSIA A NEW-HISTORICIST READING OF RAYMOND CARVER'S REPRESENTATION OF THE WORKING CLASS AND MASCULINITY

UNIVERSITI SAINS MALAYSIA. First Semester Examination. 2014/2015 Academic Session. December 2014/January 2015

Contents. xv xxi xxiii xxiv. 1 Introduction 1 References 4

ESCAPISM IN TENNESSEE WILLIAMS PLAY THE GLASS MENAGERIE

UNIVERSITI PUTRA MALAYSIA

UNIVERSITI PUTRA MALAYSIA TIME-VARYING SPECTRAL MODELLING O F THE SOLO VIOLIN TONE ONG BEE SUAN FEM

OBJECT-BASED IMAGE COMPRESSION WITH SIMULTANEOUS SPATIAL AND SNR SCALABILITY SUPPORT FOR MULTICASTING OVER HETEROGENEOUS NETWORKS

Color Image Compression Using Colorization Based On Coding Technique

Understanding Compression Technologies for HD and Megapixel Surveillance

FIGURATIVE EXPRESSIONS IN JOHN STEINBECK S THE PEARL A THESIS BY: ENY NOVEYONA PURBA REG. NO

ANALYSIS OF SENTENCE STRUCTURE ON KINNEY S DIARY OF A WIMPY KID: THE LAST STRAW

Comparative Study of JPEG2000 and H.264/AVC FRExt I Frame Coding on High-Definition Video Sequences

CHAPTER 8 CONCLUSION AND FUTURE SCOPE

MULTIMEDIA SIGNALS AND SYSTEMS

INF5080 Multimedia Coding and Transmission Vårsemester 2005, Ifi, UiO. Wavelet Coding & JPEG Wolfgang Leister.

DELTA MODULATION AND DPCM CODING OF COLOR SIGNALS

AUTOMATIC CABLE STRIPPER

COMPRESSION OF DICOM IMAGES BASED ON WAVELETS AND SPIHT FOR TELEMEDICINE APPLICATIONS

An Introduction to Image Compression

THE ANALYSIS OF INDIRECT COMMANDS IN THE FILM ENTITLED THE SECRET LIFE OF WALTER MITTY

An Efficient Low Bit-Rate Video-Coding Algorithm Focusing on Moving Regions

EEU 202 ELEKTRONIK UNTUK JURUTERA

THE ANALYSIS OF METAPHORS FOUND IN WESTLIFE S SONG LYRICS

UNIVERSITI MALAYSIA PERLIS. PLT106 Digital Electronics [Elektronik Digital]

ANALYSIS OF PERFORMANCE PRACTICE THROUGH COMPARISON OF MULTIPLE RECORDINGS: THE SONATA NO.1 IN C (OP.1) BY JOHANNES BRAHMS ( ) LEE SEOW PHING

Video coding standards

UNIVERSITI PUTRA MALAYSIA THE INFLUENCE OF HUMOUR ON CREATIVE THINKING WONG HONG CHENG FPP

UNIVERSITI PUTRA MALAYSIA THE GROTESQUE IN SELECTED MODERN PERSIAN AND POST-WAR BRITISH SHORT STORIES NAHID SHAHBAZI MOGHADAM

DESIGN VISION SYSTEM TO RECOGNIZE THE SCRIBED NUMBER ON THE WAFER LIAW GEOK PHENG

A Digital Hologram Encryption Method Using Data Scrambling of Frequency Coefficients

THE INTERPRETATION OF JOHN DONNE POEMS

A SVD BASED SCHEME FOR POST PROCESSING OF DCT CODED IMAGES

Identification of Motion Artifact in Ambulatory ECG Signal Using Wavelet Techniques

Image Resolution and Contrast Enhancement of Satellite Geographical Images with Removal of Noise using Wavelet Transforms

DEVELOP A LINEAR MEASUREMENT SENSOR SYSTEM ANG SEI QI

AN ANALYSIS OF TRANSLATION TECHNIQUES AND QUALITY OF CLOSED COMPOUND WORDS IN THE NOVEL PAPER TOWNS BY JOHN GREEN

SUGGESTING EXPRESSION UTTERED BY THE CHARACTERS IN THE FILM ENTITLED THE BANK JOB (A Pragmatics Approach)

Surface Contents Author Index

AN ANALYSIS OF INTRINSIC ELEMENTS IN CHARLES DICKENS

Transcription:

UNIVERSITI PUTRA MALAYSIA FINGERPRINT IMAGE COMPRESSION USING WAVELET TRANSFORM ABDALLA MUSBAH HANASHI FK 2003 20

FINGERPRINT IMAGE COMPRESSION USING WAVELET TRANSFORM By ABDALLA MUSBAH HANASHI Thesis submitted to School of Graduate Studies, Universiti Putra Malaysia, in Partial Fulfillment of tbe Requirement for tbe Degree of Master of Science June 2003

DEDICATION In the name of God I dedicate this thesis to my parents And my wife My brothers, sisters and my friends. ii

Abstract of thesis presented to the Senate of the Universiti Putra Malaysia In partial fulfillment of the requirement for the Degree of Master of Science FINGERPRINT IMAGE COMPRESSION USING WAVELET TRANSFORM By ABDALLA MUSBAH HANASHI June 2003 Chairman: Abdul Rahman Ramli, Ph.D. Faculty Engineering The fingerprint is considered to be the most reliable kind of personal identification because it cannot be forgotten, misplaced, or stolen. Fingerprint authorization is potentially the most affordable and convenient method of verifying a person's identity. Storage of fingerprint image databases needs allocation of huge secondary storage devices. To reduce the increasing demand on storage space, efficient data compression techniques are needed. In addition to that, the exchange of fingerprint images between the governmental agencies could be done fast. The compression algorithm must also preserve original information in the original image. Digital image compression based on the ideas of subband decomposition or discrete wavelet transform (DWT) has received much attention in recent years. In iii

fact, wavelet refers to a set of basic function, which is recursively defined fonn, a set of scaling coefficients and scaling function. Discrete Wavelet Transfonn CDWT) represents images as a sum of wavelet function on different resolution level. Essential for wavelet transform can be composed of any function that satisfies requirements of multi-resolution analysis. It means that there exists a large selection of wavelet families depending on choice of wavelet function. The objective of this study is to evaluate a variety of wavelet filters using Wavelet toolbox for selecting the best wavelet filters to be used in compress and decompress of selected fingerprint images. Therefore a two-dimensional wavelet decomposition, quantization and reconstruction using several families of filter banks were applied to a set of fingerprint images. The results show that no specific wavelet filter perfonns unifonnly except for Biorthogonal and Symlets, and that is using the matching technique. The result shows that at a threshold value equal of 160 and decomposition level 3 with a wavelet filter sym4, there is no difference between the original and reconstructed image. This study concludes that using wavelet filters sym4 and bior3.7 can achieve compression ratio 27: 1 with PSNR 20.36 db and 17: 1 with PSNR 21.88 db respectively. These values indicate that using these filters, the quality of the reconstructed fingerprint still exist. iv

Abstrak tesis yang dikemukakan kepada Senat Universiti Putra Malaysia sebagai memenuhi syarat untuh ijazah Master Sains PE PATANlMEJ CAP JARI MENGGUNAKAN PENJELMAAN WAVELET Oleh ABDALLA MUSBAH HANASHI Jun 2003 Pengerusi: Abdul Rahman Ramli, Ph.D Fakulti Kejuruteraan Cap jari adalah kaedah pengenalan diri yang paling boleh dipercayai kerana ialah tidak boleh dilupakan, tersalah letak atau dicuri. Pengesahan menggunakan cap jari juga merupakan cara pengesahan yang paling murah dan mudah untuk mengenalpasti seseorang. Penyimpanan imej cap jari di dalam pengkalan data memerlukan perkakasan penyimpan yang mempunyai ruang penyimpanan yang besar. Justeru itu, pengurangan ruang penyimpanan menggunakan teknik mampatan data yang sesuai amat diperlukan. Tambahan pula, penghantaran imej cap jari di antara organisasi boleh dipercepatkan dengan saiz imej cap jari yang lebih kecil. Algoritma mampatan mesti memastikan maklumat asal di dalam imej asal masih dikekalkan. v

Mampatan imej digital yang berdasarkan kaedah penguraian sub-jalur atau pemindahan wavelet terputus (DWT) telah mendapat banyak perhatian sejak kebelakanagan ini. Wavelet adalah merujuk kepada suatu kumpulan asas fungsi yang telah didefinasi di dalam bentuk berulang, pengkali berskala dan fungsi berskala. DWT mewakili imej-imej sebagai penjumlahan wavelet pad a peringkat resolusi yang berbeza. Asas DWT adalah terdiri daripada sebarang fungsi yang memenuhi keperluan analisis pelbagai resolusi. Bergantung kepada fungsi wavelet, terdapat banyak pilihan diantara keluarga wavelet. Objektif tesis ini adalah berkenaan penilaian pelbagai penapis-penapis wavelet menggunakan peralatan perisian (toolbox) wavelet untuk memilih penapispenapis wavelet yang terbaik untuk digunakan di dalam mampatan dan penyahmampatan imej-imej cap jari yang dipilih. Pemecahan dua-dimensi anak isyarat iaitu menggunakan kaedah kuanta (quantization) dan pembinaan semula (reconstruction) dijalankan ke atas cap-cap jari dengan menggunakan beberapa keluarga penapis-penapis. Keputusan menunjukkan tiada penapis wavelet isyarat yang mempunyai keupayaan yang lebih tinggi daripada yang lain kecuali di dalam kes biorthogonal dan symlets. Keputusan dengan menggunakan teknik pemadanan pada nilai ambang 160 menunjukkan tiada perbezaan di antara imej-imej asal dan imej-imej yang dibina semula untuk pemecahan peringkat ke tiga dan penapis anak isyarat sym4. Tesis ini menyimpulkan bahawa dengan menggunakan penapis-penapis sym4 dan bior3.7 masing-masing boleh memperolehi nisbah mampatan 27:1 dengan PSNR VI

20.36 dan 17: 1 dan PSNR 21.88. Nilai-nilai ini menunjukkan kualiti imej-imej asal cap jari yang dibina semula masih wujud. vii

ACKNOWLEDGEMENTS.)I.)I kl A.1! I 1 II rw! J jij Jc WJ I Y. th I 0-0 u\.a,_-:h. \ \ Lc..ll I' \tl \ 1 'I.<:" 'W <: >'1 I u;:-y' I.T ""6"'".JC..,.. J...r. <..r - J.J:l J. <..r J. J ul 'i J. yll o I wl. J W WI I wi JI.. Iy;; ft JI.".b First of all, I would like to express my utmost thanks and gratitude to Almighty Allah S.W.T for giving me the ability to finish this thesis successfully. As I am nearing my graduation, I am having a mixed feeling of accomplishment excitement about the future, and gratitude to every one who has contributed generously to the realization of this work. My special thanks goes to my supervisor, Dr. Abdul Rahman Bin Ramli, for his continuous support and for providing the research materials. I would like to express my thanks to the members of my supervising committee, Mr. Syed Abdul Rahman and Puan Roslizah Ali for their affectionate guidance, prompt decision and valuable assistance during this period. Also, I would like to seize this opportunity to thank the members and staff of the Department of Computer and Communication System Engineering and Mr. Emhemad Saffor for their assistance. Finally, I wish to have a special thought for my parents and my wife for their understanding, endless patience and encouragement when it was most needed. viii

I certify that an Examination Committee met on 24 th June 2003 to conduct the final examination of Abdalla Musbah Hanashi on his Master of Science thesis entitled "Fingerprint Image Compression Using Wavelet Transform" in accordance with Universiti Pertanian Malaysia (Higher Degree) Act 1980 and Universiti Pertanian Malasia (Higher Degree) Regulation 1981. The Committee recommends that candidate be awarded relevant degree. Member for the Examination Committee are as follows: Mohd Adzir bin Mahdi, Ph.D. Department of Computer and Communication System Engineering Faculty of Engineering Universiti Putra Malaysia. (Chairman) Abdul Rahman Ramli, Ph.D. Department of Computer and Communication System Engineering Faculty of Engineering Universiti Putra Malaysia. (Member) Roslizah Ali, Mrs. Department of Computer and Communication System Engineering Faculty of Engineering Universiti Putra Malaysia. (Member) Syed Abdul Rahman, Mr. Department of Computer and Communication System Engineering Faculty of Engineering Universiti Putra Malaysia. (Member) GULAM RUSU RAHMAT ALI, Ph.D. ProfessorlDeputy Dean School of Graduate Studies Universiti Putra Malaysia Date: 04 SEP 2003 ix

This thesis submitted to the senate of University Putra Malaysia has been accepted as partial fulfillment of the requirement for the degree of Master of Science. The members of the Supervisory Committee are as follows: Abdul Rahman Ramli, Ph.D. Department of Computer and Communication System Engineering Faculty of Engineering Universiti Putra Malaysia. (Chairman) Roslizah Ali, Mrs. Department of Computer and Communication System Engineering Faculty of Engineering Universiti Putra Malaysia. (Member) Syed Abdul Rahman, Mr. Department of Computer and Communication System Engineering Faculty of Engineering Universiti Putra Malaysia. (Member) AINI IDERIS, Ph.D. Professor/ Dean School of Graduate Studies Universiti Putra Malaysia Date: 1 5 SEP 2003 x

DECLARATION I hereby declare that the thesis is based on my original work except for quotations and citations that have been duly acknowledged. I also declare that it has not en previously or concurrently submitted for any other degree at UPM or other institutions Date: Z5-08 - Lao) xi

TABLE OF CONTENTS Page DEDICATION ABSTRACT ABSTRAK ACKNOWLEDGEMENTS APPROVALS DECLARA TION LIST OF FIGURES LIST OF ABBREVIATIONS ii 1Il v viii IX Xl xiv xv CHAPTER I INTRODUCTION 1.1 Introduction 1.2 Objective of Thesis 1.3 Organization of Thesis 1 1 2 3 II LITERATURE REVIEW 2.1 Introduction 2.2 Fingerprint: A Historical Overview 2.3 The Fundamental Principles of Fingerprint 2.4 Fingerprint Representation 2.5 Review of Fingerprint Compression 2.6 WSQ Gray Scale Fingerprint Image Compression 2.7 Digital Image File Format 2.7.1 Bitmap File Format 2.7.2 GIF File Format 2.7.3 The JPEG File Format 2.7.4 PCX File Format 2.7.5 TGA File Format 2.7.6 TIF File Format 2.8 Image Compression Theory 2.9 Image Compression Technique 2.9.1 Lossless Technique 2.9.1.1 Huffman Coding 2.9.1.2 Run-Length Coding 2.9.1.3 Arithmetic Coding 2.9.1.4 LZW Coding 2.9.2 Lossy Technique 2.9.2.1 Gray-Level Run-Length Coding 2.9.2.2 Differential Predictive code 4 4 5 6 9 10 14 17 17 17 18 18 19 19 19 22 22 22 23 23 24 24 25 26 xii

2.9.2.3 Vector Qauntization 26 2.l0 Transform Coding 27 2.l0.l Fourier Transform 28 2.10.2 Discrete Cosine Transform 29 2.10.3 Wavelet Transform 30 2.l1 Wavelet Filters 37 2.12 Fidelity Criteria 42 2.12.l Objective Fidelity Criteria 42 2.l2.2 Subjective Fidelity Criteria 2.l3 Fingerprint Matching Technique 44 2.14 Conclusion 43 47 III METHODOLOGY 3.l Introduction 3.2 Program Implementation 50 3.2.l Selecting Wavelet Filters 52 3.2.2 Wavelet Transform 53 3.2.3 Compression Method Implementation 56 3.2.4 Description of user Interface for Compression Technique 57 49 49 3.3 Evaluation of The Compressed Image 58 3.3.l Objective Evaluation 58 3.3.2 Matching Evaluation 58 IV RESULT AND DISCUSSION 62 4.l Introduction 62 4.2 Compression at Decomposition Level one 62 4.3 Compression at Decomposition Level two 65 4.4 Compression at Decomposition Level three 67 4.5 Figure of Merit Result 69 4.6 Matching Result 70 V CONCLUSION AND RECOMMENDATION 73 5.1 Conclusion 5.2 Further Works and Recommendations 74 REFERENCES 76 APPENDIX 79 73 xiii

LIST OF FIGURES Figure Page 2.1 Arch fingerprint pattern 7 2.2 Loop fingerprint pattern 8 2.3 Whorl fingerprint pattern 8 2.4 Ridge ending and ridge bifurcation 9 2.5 Mallat and WSQ Wavelet Decompositions 15 2.6 Comparison of a wave and a wavelet 31 2.7 Mother Wavelet 33 2.8 Image decomposition into 1 level 2.9 Image reconstrected from one level 36 2.10 Haar scaling function 2.11 Daubechies scaling and wavelet functions 2.12 Coiflets scaling and wavelet functions 40 2.13 biorthogonal wavelets 41 3.1 Flowchart for compression 51 3.2 Location of frequency bands 53 3.3 Original Image (fingerprint) 54 3.4 Wavelet transform at decomposition level 1 54 3.5 Wavelet transform at decomposition level 2 3.6 Wavelet transform at decomposition level 3 3.7 User Interface of compression technique 57 3.8 Flowchart of matching technique 3.9 Fingerprint image after thinning step 60 3.10 Minutia end points 61 4.1 PSNR versus the threshold values 63 4.2 Compression ratio versus threshold values 64 4.3 PSNR against threshold values for each filter 65 4.4 Compression ratio versus the threshold values 66 4.5 PSNR against threshold values for each filter 67 4.6 Compression ratio versus the threshold values 68 35 37 39 55 55 59 4.7 Matching result 70 XIV

LIST OF ABBREVIATIONS FBI NIST HVS DCT DFT WT AFIS WSQ RLC MSE RMSE PSNR DWT WVQ Federal Bureau Investigation National Institute of Standard and Technology The human Visual System Discrete Cosine Transform Discrete Fourier Transform Wavelet Transform Automated Fingerprint Identification System Wavelet Scalar Quantization Run-length coding Mean-Square Error Root-mean-square error Peak Signal-to-Noise ratio Discrete Wavelet Transform Wavelet Vector Quantization xv

CHAPTER I INTRODUCTION 1.1 Introduction With the continuing growth of modem communication technology, demand for image compression and storage is increasing rapidly. Advance in computer technology for mass storage and digital processing have emphasized the need for implementing advanced image compression technique to improve the efficiency of image compression. The objective of image compression is to represent an image with as few bits as possible while preserving the level of quality and intelligibility required for the given application. There are many applications, which involves image compression, such as broadcast television, computer communication etc. The Federal Bureau Investigation (FBI) identification division collected 25 millions fingerprint cards in 1992 (Jang, 1997). Each fingerprint card required 9.8 MB of storage (39 square inches scanning size with 500 DPI resolutions and 8 bpp) according to the image capture standard established by the National Institute of Standard and Technology (NIST). Thus, 25 million fingerprint cards required 245,000 GB of storage. To reduce the storage requirements, the captured data must

be compressed. The minutia and their relation in fingerprint are the key feature for identification. That means any reconstructed image must preserve these feature. The Human Visual System (HVS) indicate that a transform coding based on generalized entropy reduction can reach the goal of the best-reconstructed quality with the highest compression ratio. There are many transform coding techniques. In this thesis we use wavelet coding, because every function in wavelet basis is dilated and translated version of one mother wavelet that allows local transformation to be carried out more successfully than other technique such as Discrete Cosine Transform (DCT), and Discrete Fourier Transform (OFT) for image compression. 1.2 Objective of Thesis The aim of this thesis is to study and investigate the effect of wavelet transform (WT) in the application of fingerprint image compression. The tasks of this thesis are: I. Applying different wavelet filters namely: Daubechies, Coiflets, Biorthogonal and Symlets to select the best one for fingerprint images. 2. The best wavelet filter will be applied to compress and decompress fingerprint images. 3. Evaluate compressed images using Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Matching Technique. 2

1.3 Organization of Thesis The thesis is to study the suitability of wavelet transform (WT) in the application of fingerprint image compression techniques, using MA TLAB codes as platform. This thesis is divided into five chapters. Each chapter has a specific approach. The chapters are classified into introduction, literature review, methodology, result and discussion and the last is conclusion and future work. Chapter II introduces the historical overview of fingerprint. The fundamental and principles of fingerprint, review of fingerprint compression and fingerprint characteristics. Image representation, the fidelity criteria normally used in determining the quality of a decompressed image and the several of image compression techniques are discussed here. Chapter III discusses the fingerprint image compression technique. First stage is preprocessing, which describe the fingerprint image enhancement, selecting the type of wavelet filters and perform the discrete wavelet transform and compression are explained in detail. Chapter IV discusses the result of compression technique and discussion of the result, Finally, Chapter V is concerned with the concluding remarks (conclusion) and proposal for future work (recommendations). 3

CHAPTER II LITERA TURE REVIEW 2.1 Introduction If we studied our own body, we will realize that our palm and the inner skin of our foot, will be different from the rest of the skin, because of the this characteristic, people are getting interested to find it's advantages and usefulness. When a person touches something, they will leave a thin layer of sweat on the surface of the thing. Sweat is produced from the continuous burning process in our body, which consists mostly of water (H20) and some mixture of salt (NaCl) and fat. After a while the water from the sweat will evaporate, leaving the salt and fat behind. The layer that is left produces fingerprint (Saferstein, 1981). Fingerprint pattern is different for each person in the world even for a twin. Every person's fingerprint is unique and is a feature that stays with the person throughout hislher life. It also never changes since is person born until the person is dead. It will change only if burned or cut. The fingerprint is the most reliable kind of personal identification because it cannot be forgotten, misplaced, or stolen. Fingerprint authorization is potentially the most affordable and convenient method of verifying a person's identity. The uniqueness of a fingerprint can be determined by the pattern of ridges and valleys as well as the minutiae points (Zeena, 2001). 4

2.2 Fingerprint: A Historical Overview There are two definite periods in the history of fingerprinting. The first period began when human beings became aware of fingerprints and uses them as a mean of individual signature. The second period is much more recent and began with the development of fingerprint coding and filing systems and techniques of searching for the question of who was the first person to recognize fingerprints as a valuable recognizing characteristic will probably remain unanswered. The Chinese and Babylonians (Iraqis) used fingerprints on business contracts. Evidence existed that the Chinese used the fingerprints to sign legal documents as far back as three thousand years ago. The early Egyptians and Chinese were known to have used the fingerprints to identify criminals and to record business transactions. However, whether this use was performed for ceremonial custom or as a mean of personal identity remains a point of conj ecture lost to history. In any case, the examples of fingerprint techniques in ancient history are ambiguous, and the few that do exist certainly did not contribute to the development of fingerprinting techniques as known today (Sharath, 2000). Fingerprints are one of the most mature biometric technologies and are considered legitimate proofs of evidence in courts of law all over the world. Fingerprints are, therefore, used in forensic divisions worldwide for criminal investigations (Sharath, 2000). More recently, an increasing number of civilian and commercial applications are either using or actively considering using fingerprintbased identification because of a better understanding of fingerprints as well as demonstrated matching performance than any other existing biometric technology. 5

2.3 The Fundamental Principles of Fingerprint Three fundamental facts made the fingerprints a superlative method for personal identification and accepted by courts : A fingerprint is an individual characteristic; no two fingerprints have yet been found to possess identical ridge characteristics. Early fingerprint experts consistently referred to Galton's calculation (the probability that two fingerprint are alike is about 1 in 1.9x 10 15) showing the possible existence of 64 billion different fingerprints to support this contention. Later, researchers questioned the validity of Galton's calculation. However, no matter what mathematical model one refers to, the conclusions are always the same: the probability for the existence of two identical fingerprint patterns in the world's population is extremely small (Sharath, 2000). Not only this principle is supported by theoretical calculations, but also just as importantly, it is verified by the millions upon millions of individuals who have had their prints classified over the past 70 years, not two have ever been found to be identical (Jain, 2000). A fingerprint will remain unchanged during an individual's lifetime. The skin is composed of layers of cells. Those nearest the surface make up the outer portion of the skin known as the epidermis. The inner skin is known as the dermis. Looking at across section of the skin, a boundary of cells separating the epidermis and dermis is noted. It is the shape of this boundary, which is made up of dermal papilla that determines the form and pattern of the ridges 6

on the surface of the skin once the dermal papillae developed in the human fetus, the ridge patterns will remain unchanged throughout life except to enlarge during growth. Fingerprints have general ridge patterns that permit them to be systematically classified. Fingerprints are divided into three major classes on the basis of their general patterns: loop, whorl, and arch. Sixty to sixty five percent of the population has loops, thirty to thirty five percent have whorls, and about five percent have arches (Sharath, 2000). The sub classes are: Arch: It is the simplest and the least distinctive pattern. The ridges in this pattern flow from one side rise to form a wave in the center and exit smoothly on the opposite side with no angles of 90 degrees or less. Also, no ridges that recurve and go out the same side from which they entered, and no up thrusting ridges that do not follow the general flow of the ridges. Figure 2.1 shows a typical arch pattern. Figure 2. 1: Arch fingerprint pattern 7

Loop: It is a pattern in which one or more of the ridges enter on the side towards the thumb or the little finger, recurve, and then exit on the same side. Figure 2.2 shows a loop fingerprint pattern. Figure 2.2: Loop fingerprint pattern Whorl: It is a pattern in which one or more ridges form a complete revolution around the center. Figure 2.3 shows a simple whorl pattern. Figure 2.3: Whorl fingerprint pattern 8

2.4 Fingerprint Representation Fingerprint representations are of two types: local and global. Major representations of the local infonnation in fingerprints are based on the entire image, finger ridges, pores on the ridges, or salient features derived from the ridges. Representations predominantly based on ridge endings or bifurcations (collectively known as minutiae (see Figure2.4» are the most common, primarily due to the following reasons: (i) minutiae capture much of the individual infonnation, (ii) minutiae-based representations are storage efficient, and (iii) minutiae detection is relatively robust to various sources of fingerprint degradation. Typically, minutiaebased representations rely on locations of the minutiae and the directions of ridges at the minutiae location. Fingerprint classification identifies the typical global representations of fingerprints. Some global representations include information about locations of critical points (e.g., core and delta) in a fingerprint (Sharath, 2000). Ridge Ending Ridge Bifurcation Figure 2.4: Ridge ending and ridge bifurcation. 9