Share This Article:

Improved Authentication Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy

Abstract Full-Text HTML Download Download as PDF (Size:1170KB) PP. 770-777
DOI: 10.4236/ijcns.2011.432095    4,714 Downloads   7,315 Views   Citations

ABSTRACT

Recently, ubiquitous personal devices with a fingerprint authentication function have been increasing. In such devices, there is almost no possibility of the authentication by impostors unless they are lost or stolen. However, for example, in the management of entering and leaving a building, not only the fingerprint authentication device but also the other authentication measures, such as an IC card, a key, etc., are generally used. In our previous studies, we have analyzed the authentication accuracy of the fingerprint authentication devices for personal possessions where other authentication measures are not needed. As a result, we made clear that the authentication accuracy in our method has extremely high compared with that in the marketed compact fingerprint authentication products, even if dirt, sebum, etc., are attached to the fingertip and there are scratches. In this study, we analyze the damage ratio of the fingerprint image where the genuine authentication can be conducted without problems, because the fingertip is easily got large cuts. Moreover, we analyze the impostor authentication of the fingerprint authentication devices for public possessions in the two cases of without and with other authentication measures. As a result, it is found that clearer impostor authentication can be achieved in the case of with other authentication measures. In addition, it is found that the damage ratio of the fingerprint image to conduct clearer genuine authentication without the image correction is less than 14.3%.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

R. Iwai and H. Yoshimura, "Improved Authentication Accuracy by Individually Set Orders of the Fractional Fourier Transform and Effects of Damage of Fingerprint Image on Authentication Accuracy," International Journal of Communications, Network and System Sciences, Vol. 4 No. 12A, 2011, pp. 770-777. doi: 10.4236/ijcns.2011.432095.

References

[1] R. Iwai and H. Yoshimura, “A New Method for Improving Robustness of Registered Fingerprint Data Using the Fractional Fourier Transform,” International Journal of Communications, Network and System Sciences, Vol. 3, No. 9, 2010, pp. 722-729. doi:10.4236/ijcns.2010.39096
[2] R. Iwai and H. Yoshimura, “Matching Accuracy Analysis of Fingerprint Templates Generated by Data Processing Method Using the Fractional Fourier Transform,” International Journal of Communications, Network and System Sciences, Vol. 4, No. 1, 2011, pp. 24-32. doi:10.4236/ijcns.2011.41003
[3] R. Iwai and H. Yoshimura, “New Method for Increasing Matching Accuracy and Reducing Process Time of Fingerprint Data by the Fractional Fourier Transform,” Proceedings of 2010 IEEE 17th International Conference on Image Processing, Vol. 3, Hong Kong, 26-29 September 2010, pp. 3061-3064.
[4] R. Iwai and H. Yoshimura, “High-Accuracy and High-Security Individual Authentication by the Fingerprint Template Generated Using the Fractional Fourier Transform,” In: G. Nikolic, Ed., Fourier Transforms—Approach to Sci- entific Principles, InTech, Croatia, 2011, pp. 281-294.
[5] D. Mendlovic and H. M. Ozatkas, “Fractional Fourier Transforms and Their Optical Implementation: I,” Journal of the Optical Society of America A, Vol. 10, No. 9, 1993, pp. 1875-1881. doi:10.1364/JOSAA.10.001875
[6] H. M. Ozatkas and D. Mendlovic, “Fractional Fourier Transforms and Their Optical Implementation: II,” Journal of the Optical Society of America A, Vol. 10, No. 12, 1993, pp. 2522-2531. doi:10.1364/JOSAA.10.001875
[7] F. J. Marinho and L. M. Bernardo, “Numerical Calculation of Fractional Fourier Transforms with a Single Fast-Fourier-Transform Algorithm,” Journal of the Optical Society of America A, Vol. 15, No. 8, 1998, pp. 2111-2116. doi:10.1364/JOSAA.15.002111
[8] H. M. Ozaktas, Z. Zalevsky and M. A. Kutay, “The Fractional Fourier Transform,” John Wiley & Sons, Hoboken, 2001.
[9] X. Yang, Q. Tan, X. Wei, Y. Xiang, Y. Yan and G. Jin, “Improved Fast Fractional-Fourier-Transforms Algorithm,” Journal of the Optical Society of America A, Vol. 21, No. 9, 2004, pp. 1677-1681. doi:10.1364/JOSAA.21.001677
[10] H. M. Lee, H. Maeng and Y. Bae, “Fake Finger Detection Using the Fractional Fourier Transform,” Proceedings of International Conference on Biometric ID Managemen and Multimodal Communication, Madrid, 16-18 September 2009, pp. 318-324.
[11] D. Cui, “A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform,” Proceedings of International Conference on Machine Vision and Human-machine Interface, Kaifeng, 24-25 April 2010, pp. 168-171. doi:10.1109/MVHI.2010.38
[12] M. Juan, O. Vilardy, O. Cesar, M. Torres and M. V. Lorenzo, “Images Encryption via Discrete Fractional Fourier Transform and Jigsaw Transform. Case Study: Fingerprints,” Proceedings of the International Conference on Ultra Modern Telecommunications & Workshops, St. Petersburg, 12-14 October 2009, pp. 1-5.
[13] D. Maltoni, D. Maio, A. K. Jain and S. Prabhakar, “Handbook of Fingerprint Recognition,” Springer, New York, 2003.
[14] D. Maltoni and D. Maio, “Handbook of Fingerprint Recognition,” University of Bologna, Bologna, 2004. http://bias.csr.unibo.it/fvc2004/download.asp
[15] H. M. Ozaktas, O. Arikan and M. A. Kutay, “Digital Computation of the Fractional Fourier Transform,” IEEE Transactions on Signal Processing, Vol. 44, No. 9, 1996, pp. 2141-2150. doi:10.1109/78.536672
[16] A. Bultheel and H. E. M. Sulbaran, “Computation of the Fractional Fourier Transform,” Applied Computational Harmonic Analysis, Vol. 16, No. 3, 2004, pp. 182-202. doi:10.1016/j.acha.2004.02.001
[17] DDS Co., Ltd., “Hybrid Biometric Authentication Device, Hybrid Biometric Authentication Method, and Computer-Readable Storage Medium Where Computer Program for Hybrid Biometric Authentication Is Stored,” WO 2009/096475 A1, 2009. http://www.freepatentsonline.com/WO2009096475.pdf

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.