DOI: 10.14529/ctcr190303
USING DELAUNAY TRIANGULATION FOR FINGERPRINT TEMPLATE GENERATION
V.Yu. Gudkov1, diana@sonda.ru, D.N. Lepikhova2, lepikhova@sonda.ru, M.L. Gavrilova3, marina@cpsc.ucalgary.ca, M.L. Zymbler1, mzym@susu.ru
1 South Ural State University, Chelyabinsk, Russian Federation,
2 Sonda PRO Ltd, Miass, Russian Federation,
3 University of Calgary, Calgary, Canada
Today, fingerprint identification is the most common method of biometric identification. Existing fingerprint identification models have some defects that reduce the speed and quality of identification. So most of the models do not take into account the topological characteristics of images, for example, the classical method of measuring the ridge count value may produce incorrect results in areas of significant curvature of the ridge lines. This paper presents a new mathematical model for fingerprint identification, taking into account their topological characteristics. Identification is performed on the basis of templates. The templates contain a list of minutiae detected on the image and a list of ridge lines. For the ridge lines and minutiae, sets of topological vectors are constructed. The result of building topological vectors does not depend on the location of minutiae and takes into account their possible mutations, which increases the stability of the proposed mathematical model. Additionally, the stability of the model is ensured by combining the base topological vectors constructed for all minutiae and ridge lines into an expanded topological vector. This view allows you to significantly reduce the size of the template and optimize the use of memory. To compare the fingerprints the Delaunay triangulation is used based on the list of constructed topological vectors. 112 possible classes for topological vectors are defined. This approach allows you to increase the speed of identification up to 10 times while maintaining its accuracy. The proposed classification is resistant to rotation and displacement of images.
Keywords: fingerprint template, Delaunay triangulation, minutiae, topology vector model.
Introduction
Fingerprint images (FI) themselves are not used to identify fingerprints, but templates created on the basis of them using mathematical functions. The bases for the formation of the pattern are minutiae in the form of points of the beginning and ending, merging and bifurcation of the ridge lines [1-3]. They can be detected on the grayscale image, although in the process of creating a pattern, they are more often detected along the skeleton of the ridge lines [4-7] (Fig. 1).
For the reliability of the mathematical model of FI, it must contain the necessary and sufficient number of features [5]. Minutiae, ridge count between them, and also ridge lines in some cases are considered the main informative features [5, 6]. However, most of the models used to prove the uniqueness of the biometric pattern and identification do not contain this in majority [5, 8].
Existing models are focused on improving the accuracy and speed of identification; however, due to the fact that they do not contain sufficiently complete topological information about the image, they all have some drawbacks [9, 10]. For example, the classic method of measuring ridge counting along a straight line can lead to errors
in the region of deltas, loops and whorls due to the large Fig. 1. Skeleton and minutiae
curvature of the lines in these sections [5]. Thus, the task of forming a FI template, taking into account the topological characteristics of the imprint, remains relevant. The article proposes a new model of representation of the FI pattern, using topological vectors of the ridge lines and calculations based on De-launay triangulation.
The paper is organized as follows. In the introduction, the basic concepts of the subject area are given, relevance is determined, goals and objectives of the research are set. Section 1 provides an overview of the existing research papers. Section 2 describes the proposed methodology. In the conclusion the results are summarized, the directions of further research are determined.
1. Preliminaries
Delaunay triangulation and Voronoi diagrams are widely used in various fields of science, including the field of biometric identification. Compared to earlier work on the use of computational geometry to improve the results of recognition of biometric information [1, 2], the number of attempts to use the topological and geometric characteristics in the identification process has increased significantly [11].
There have been works on the use of Voronoi diagrams for recognition in biometric systems and the implementation of different approaches to comparing FI [2, 10, 12]. Matching fingerprints based on minutiae is used most often. To do this, a set of minutiae is extracted from the fingerprint image and saved as a set of points on the plane [2, 3, 11]. During correlation matching, the images are directly superimposed on each other, aligned and scaled. For each variant of mutual alignment, the correlation value is calculated [13]. Other methods for matching FI (according to the characteristics of ridge lines based on maps and dictionaries of ridge lines and their geometry [14, 15]) are used much less frequently due to the high complexity of implementation [3]. There have been attempts to apply Voronoi diagrams for other areas of biometrics. For example, to recognize facial features in [12]
Voronoi diagrams can be used to reduce the noise level [14]. The Delaunay triangulation constructed on the basis of a set of minutiae was proposed to be used as a comparative index when comparing fingerprints [1]. To do this, there must be at least one matching pair of triangles for two prints. However, due to the poor quality of images of prints or the low efficiency of algorithms for extracting signs, this condition is not satisfied, and a matching pair is not always detected [16, 17]. This is confirmed by other work, proving that even a small local deformation can lead to significant distortions of the pattern [7].
There were also attempts to use not only two-dimensional (2D) Delaunay triangulation, but also three-dimensional (3D) Delaunay tetrahedron [18]. However these structures are more sensitive to the missing and spurious minutiae, and have a negative impact on the effectiveness of the identification.
It is also possible to use triangulation in hierarchical mode and in combination with other approaches to describing minutiae, for example, in conjunction with constructing a local neighborhood for each minutia by the MCC method [19] or computing of common barycenter for all triangles [20].
The research presented in this paper takes advantage of additional information, which is ignored by fingerprint matching algorithms. It is based on ridge line representation as a clever utilization of Delau-nay triangulation [21] and topological vectors [22], which results in increased speed and high recognition capability of the system. The method was fully integrated in a commercial software system [22].
2. Proposed Methodology
The representation of a pattern as a set of FI features may vary in implementations of different developers. In some templates, there is a limit on the number of stored minutiae [5]. Some features of templates are irrelevant, but it is possible to indicate their common property: the templates have features, being some metrics for minutiae points. These metrics are ridge counts between minutiae and topological vector for minutiae [5, 22].
In this paper, an image template is constructed in the form of
r: F^m) ^{Lm, L, La}, (1)
where F0 (m) = f0( m) ( x,y) - image skeleton (Fig. 1); Lm - minutiae list; Lt - list of topological vectors for lines; La - list of accelerator vectors for lines. Let's introduce some definitions.
Definition 1. The skeleton of FI is a graph (u,v) with nodes u and v . The nodes u and v are lo-
cated near the geometric center of the line. For each node p1 e (u,v) there are two nodes p2 andp3 that
are not adjacent to each other.
Definition 2. The skeleton node pi, for which there is only one adjacent node p2, is called the ending.
Definition 3. If for a skeleton node p1 there are three adjacent nodes p2, p3 and p4 such that any two nodes from the multitude {p2, p3, p4} are pairwise non-adjacent, then the nodep1 is called bifurcation.
Minutiae as the nodes of the skeleton represent the nodes of the graph, and based on which the topological characteristics of the FI are determined and a list of accelerator vectors is compiled. All these vectors do not characterize a separate minutia, but the general properties of the ridge lines. Although the Ll and La lists store different characteristics of the FI, in general they are very similar, since they are descriptions of all lines of the pattern. This property allows you to keep the small size of templates for quick matching.
2.1. Minutiae List
The list of minutiae for the subsequent recognition and matching of fingerprints is formed as follows. Let Mi be the minutia with number i. Then the list of all FI minutiae can be written as
Lm = {M ={( x, y ), «, ti, v,, e,, Pi, hi }|/e1..«1}, (2)
where (xi, yi), «, ti, vi, ei, pi, hi - coordinates, direction and type of minutiae, as well as value and direction of curvature, probability and density of lines about minutiae; | Lm | = n1 - cardinal number. For reliability of identification, only minutiae from informative areas are taken into account for the template. On Fig. 1 the informative area is highlighted in gray, the skeleton of the image is shown in black.
Coordinates (x; ,yi) of minutiae Mi are determined by the location of minutia [5, 6]. Direction « as an angle is determined based on a simple chain of skeleton vertices for the ending and three simple chains for bifurcation [6]. Type ti e {0; 1} where 0 is bifurcation and 1 is the ending, is determined by the vertex valence of the graph representing the image skeleton [22]. Coordinates e^, direction « and type tt are the basic parameters Mt [23].
The value vi and the direction of curvature e^ of the ridge lines are determined within a certain neighborhood of minutia Mt [4-6]. The probability is equal to the ratio of the average value of the image quality rating in the neighborhood s to the best quality rating in the informative area of FI [23]. The density of the lines ht is calculated as the average number of lines located in the neighborhood of s that the perpendicular crosses to the ridge lines [5, 22]. Typically, a neighborhood s corresponds to 3-5 periods of lines.
2.2. Topological Vectors List
Consider the procedure for building a list of topological vectors for the ridge lines. The list of topological vectors for the lines Lj is constructed on
the basis of the list of the minutiae L , the F
(m)
matrix representing the FI skeleton, and other auxiliary matrices that store information about other signs of the FI. Matrices are combined into a pyramid, shown in Fig. 2, and represent the information levels, distributed according to their hierarchical structure [4, 5].
The list of topological vectors for the ridge lines of FI is formed from all the skeleton nodes excluding the minutiae and is written as
L = {V =
V={(
ej ' nj 'l] )} 1' e1-n2. j e1-mf
}, (3)
where Vt - topological vector for skeleton nodes cluster; = n2 - cardinal number and n2 > n1; i - index of topological vector; j - number of link
Fig. 2. Layers of the pyramid in the form of a hierarchical structure
in topological vector; ej - event, and lj - length of link, formed with minutiae with number nj; mt - quantity of links in the intersection with central line, equal to
mt = 4m + 2. (4)
All lists of FI characteristics are based on a similar principle. In the informative area of FI, ridge lines are highlighted and a skeleton is formed. On the skeleton, two types of minutiae are detected: the bifurcations and the endings (Fig. 1) so that the direction of each minutia indicates the area where the number of lines increases [9]. The direction vector of the minutia is parallel to the tangent to the ridge line in some neighborhood of the minutia Mt. Each minutia is characterized not only by the number, coordinates and direction, but also by the type, value, direction and density (2) of lines in the neighborhood and other parameters.
Then, for each minutia, perpendiculars to the direction vector to adjacent lines are constructed and points of projections are fixed. In Fig. 3 perpendiculars are shown by a dotted line, and projections are shown with a filled circle.
Fig. 3. Projections for ending and bifurcation
The skeleton node pt is selected (but not the minutia), and the section through this node is constructed to the right and left to a depth of m lines perpendicular to the tangents to the intersected lines. The obtained points of intersection are called "links" and are numbered, for example, in a spiral, starting from the point pi, in the clockwise direction [22]. The depth of the intersection m can vary from one to eight lines and is the same on the left and on the right. One line forms two links in the intersection. The total number of links is calculated by the formula (4)
The topological vector is formed on the basis of the constructed intersection. For this purpose, all the links, starting from the section and before the meeting with another minutia or its projection on the link, are consistently viewed along the lines. In this case, the following events may be detected (Fig. 4). They are represented in binary code.
1011 Fig. 4. Events
With the event as a number (there are 14 of them) detected on the link, the number of the minutia that initiates this event is associated. The event is tied to the link number. For events 0000 and 1100, there are no numbers of minutiae, because the line either ends in an uninformative area, or it closes and there is neither a minutia nor a projection on the line. The event and the number of the minutia form an ordered pair (e f, n) which is a topological vector corresponding to the link with number j. Then
the information about the event is supplemented with the value of the link length from the section to the point at which this event is detected.
To construct an extended topological vector, use an ordered triplet (ej, nj, lj) from the event, the number of the minute initiating the event, and the length of the link. The lengths of links, broken on FI edge, are stable in the meaning that they are not shortened in case of fool rolling of the finger.
By the location of the bits in the event, you can determine the type of minutia, its direction and location relative to the course of link. Events allow on-the-fly compare the basic topological vectors and speed up the identification procedure.
Topological vectors are built for all nodes of the skeleton pi (but not for the minutiae). In this case, the ridge lines of FI are divided into links numbered in a spiral in a clockwise direction. Fig. 5 shows the section for the skeleton node A, which ends with ending 19. The resulting cross-section links are numbered 0-17. The result of constructing a topological vector for node A is shown in Table 1.
Fig. 5. Section for line with ending
Table 1
Topological vector for A and B
No. Event Index Size
0 1110 22 10
1 1111 19 /1
2 1110 19 12
3 1111 22 /3
4 0001 21 /4
5 1101 19 /5
6 1010 24 /6
7 0010 25 /7
8 0011 21 /8
9 1111 23 /9
10 1010 26 /10
11 0011 25 /11
12 0010 21 /12
13 1010 20 /13
14 1111 27 /14
15 0001 25 /15
16 0000 - -
17 1001 20 /17
No. Event Index Size
0 1110 22 /0
1 1011 19 /1
2 0111 19 /2
3 1111 22 /3
4 0001 21 /4
5 0101 19 /5
6 0110 19 /6
7 0010 25 /7
8 0011 21 /8
9 1111 23 /9
10 1010 26 /10
11 0011 25 /11
12 0010 21 /12
13 1010 20 /13
14 1111 27 /14
15 0001 25 /15
16 0000 - -
17 1001 20 /17
In the section for the skeleton node B, which ends with bifurcation 19, and the links are enumerated as 0-17. For node B the topological vector is also presented in table 1. The section is shown by a dotted line. Also Fig. 6 shows the mutation [22] of the ending 19 to bifurcation 19. One of the variants of the occurrence of such a mutation is the noise of the image of the print. Essentially, the nodes A and B are the same.
The choice of the point from which the numbering of links in the section begins for the nodes A and B (the link with the number 0) does not play a special role, since the cases of mirroring of the numbering are easily recognized and taken into account directly by identification. Matching of the constructed sections is performed by analogy with the game "Puzzle" by connecting the corresponding connectors. For a section with depth m = 4, mt = 18 links are formed according to formula (4).
The number of topological vectors for FI can be estimated. On Fig. 5, the two-forked dotted arrow indicates the zone between the minutiae 19 and 25, within which the displacement of point A along the line of the skeleton does not affect the synthesized vector. The similar zone between the minutiae 19 and 20 for point B is shown in Fig. 6. If the basic topologi-cal vectors coincide, then they are combined into one, in which the minimum bond length is maximum. So, the total number of topological vectors decreases tenfold from n2 < 1000 to n1 < 1000 according to (3). Deformation of the image does not significantly affect the basic vector [22].
The proposed methodology has series of advantages. Firstly, at the events calculation the projection of minutiae is used, that result in prevention of the information loss. Secondly, the links enumerating is turning along the gyrate without links omission. Thirdly, at integration it is possible to choose topological vector with maximum value of minimal length of link [22]. This raises stability and comprehension of the mathematical model.
Fig. 6. Section for line with bifurcation
2.3. Delaunay triangulation
After forming the list of topological vectors for their matching, it is possible to construct the Delaunay triangulation, which is built on the basis of the minutiae list Lm by the formula (2). For the skeleton node A (see Fig. 5), one of the constructed triangles is shown in Fig. 7. The vertices of this triangle are
minutia {Ut | Ut eLm, I e1..3} and {Ut } = {Mj | Mj e Lm, j e{22,21,19}} respectively. By definition,
the circle described around any triangle from the constructed triangulation does not contain other points from Lm.
To select an initial point for triangulation, let node A be inside the circle described around the marked triangle. Then the topological vector for the node A section divides the FI into two areas. The ordinate axis will be directed to the area with a large number of vertices of the marked triangle, the abscissa axis coincides with the section. Then the starting point of the triangulation Us has a positive ordinate and the minimum abscissa value. In Fig. 7 minutia number 22 corresponds to the starting point of Us.
Starting with Us, go round all the vortexes of the triangle clockwise, comparing the lengths of its sides s2 > s3> Si, and form three bits y1; y2, 73, where y e {0; 1} that define the comparison results. 100, 010, 001 and 000, with the latter corresponding to
v
22
<J-^ 12 13 20
"TV1 8 9
j -"4 5
5y A ■--4
2
1 6 24 *-
11 10 26 —
15 14 27
Fig. 7. Delaunay triangulation for node A
101,
The following states are possible: 110, 011 an equilateral triangle.
Based on the events in the topological vector constructed for node A, it can be seen that the direction of the minutia 22 is opposite to the direction of communication. Therefore, the value of the bit is 74 = 1. Going around the vertices of the triangle clockwise, we get y5 = 0 (the direction of the minutia coincides with the direction of the connection) and y6 = 1. For a random distribution of minutiae, eight states are possible for the values of y4, y5, y6.
Node A is on the line starting from minutia 19. If the direction of the node coincides with the direction of the axis of ordinates for the topological vector, then bit y7 = 1, otherwise y7 = 0.
Calculated bits C = \yk | ke 1..7} assume 112 possible states (7x8x8). These bits are not correlating.
There density of distribution is inhomogeneous. The formed 112 descriptors allow for the preliminary classification of topological vectors and sets of minutiae. This classification is resistant to rotations and displacements of images. For the cardinal number of vectors n2 (3), the list of accelerator vectors can be written as
The paper presents a mathematical model for the FI identification using topological vectors for the ridge lines. The constructed topological vectors are combined into a connected graph with a high level of redundancy. This allows to link subgraphs of different informative areas of fingerprints. The list of topological vectors for the ridge lines Ll according (3) can be represented in a short version (without lengths of links). Possible mutations of the minutiae do not violate the numbering of links and the order of consideration of the minutiae (table 1). The base topological vectors can be combined into one extended topological vector with maximum length of the minimum link. This increases the stability of the proposed model.
Delaunay triangulation ensuring the reliability of the proposed model and increase the identification rate about ten times. For testing, we used fingerprints obtained from an optical sensor from FVC2000 DB3, FVC2002 DB1, FVC2004 DB1, FVC2006 DB2.
The main characteristics of FI are presented in the form of lists complement each other. The list of topological vectors can be stored in shorted form (without the link lengths). This allows to optimize the amount of memory and reduce the size of the template.
1. Bebis G., Deaconu T., Georgiopoulos M. Fingerprint Identification Using Delaunay Triangulation. Proc. 1999 Internationa/ Conference on Information Intelligence and Systems (ICIIS99). Washington, DC, 1999, pp. 452-459. DOI: 10.1109/iciis.1999.810315
2. Jain A.K., Hong L., Bolle R. On-line Fingerprint Verification. IEEE Transactions on Pattern Ana/ysis and Machine InteUigence, 1997, vol. 19, no 4, pp. 302-313. DOI: 10.1109/34.587996
3. Jiang X., Yau W.-Y. Fingerprint Minutiae Matching Based on the Local and Global Structures. Proc. 15th Internet Conference Pattern Recognition (ICPR, 2000). Barcelona, Spain, 2000, vol. 2, pp. 1042-1045. DOI: 10.1109/ICPR.2000.906252
4. Gonzalez R., Woods R. Digita/ Image Processing, 2006.
5. Maltoni D., Maio D., Jain A.K. Handbook of Fingerprint Recognition. New York, SpringerVerlag, 2003. 348 p. DOI: 10.1007/978-1-84882-254-2
6. Местецкий Л.М. Непрерывная морфология бинарных изображений. М: Физматлит, 2009. 288 p. [Mestetskiy L.M. Nepreryvnaya morfo/ogiya binarnyh izobrazheniy: figury, ske/ety, tsyrku/yary [Continious Morphology of Binary Images: Figures, Skeletons, Circulars]. Moscow, Fizmatlit, 2009. 288 p.]
7. Ali H.M., Corraya S. Line Profile-Based Fingerprint Matching. Proc. 2016 Internationa/ Workshop on Computationa/ InteUigence (IWCI). Dhaka, Bangladesh, 2016, pp. 115-119. DOI: 10.1109/IWCI.2016.7860350
8. Kamath S.K.M., Rajeev S., Panetta K., Again S.S. Fingerprint Authentication Using Geometric Features. Proc. 2017 IEEE Internationa/ Symposium on Techno/ogies for Home/and Security (HST). Waltham, MA US, 2017, pp. 1-7. DOI: 10.1007/s10044-003-0201-2
9. Kovacs-Vajna Zs., Miklos A. Fingerprint Verification System Based on Triangular Matching and Dynamic Time Warping. IEEE Transactions on Pattern Ana/ysis and Machine InteUigence, 2000, vol. 22, no. 11, pp. 1266-1276. DOI: 10.1109/34.888711
10. Liang X., Asano T., A Linear Time Algorithm for Binary Fingerprint Image Denoising Using Distance Transform. IEICE TRANSACTIONS on Information and Systems, 2006, vol. E89-D, no. 4, pp. 1534-1542. DOI: 10.1093/ietisy/e89-d.4.1534
11. Wayman J., Jain A.K., Maltoni D., Maio D. Biometric Systems: Techno/ogy, Design and Performance Eva/uation. Springer-Verlag, 2006. DOI: 10.1007/b138151
(5)
Conclusion
References
12. Xiao Y., Yan H. Facial Feature Location with Delaunay Triangulation / Voronoi Diagram Calculation. Proc. Selected Papers from 2001 Pan-Sydney Area Workshop on Visual Information Processing (VIP2001), CRPIT, vol. 11. Feng D.D., Jin J., Eades P. and Yan H., Eds. ACS, 2002, pp. 103-108.
13. Ratha N.K., Karu K., Chen S., Jain A.K. A Real-Time Matching System for Large Fingerprint Databases. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1996, vol. 18, no. 8, pp. 799-813. DOI: 10.1109/34.531800
14. Liao C.C., Chiu C.-T. Fingerprint Recognition with Ridge Features and Minutiae on Distortion. Proc. 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). Shanghai, China, 2016, pp. 2109-2113. DOI: 10.1109/ICASSP.2016.7472049
15. Liu E., Cao K. Minutiae Extraction from Level 1 Features of Fingerprint. IEEE Transactions on Information Forensics and Security, 2016, vol. 11, no. 9, pp. 1893-1902. DOI: 10.1109/TIFS.2010.2103940
16. Wang H., Gavrilova M., Luo Y., Rokne J. An Efficient Algorithm for Fingerprint Matching: Proc. International Conference on Pattern Recognition (ICPR 2006), Hong Kong, 2006, pp. 1034-1037. DOI: 10.1109/ICPR.2006.236
17. Wang C., Gavrilova M. Delaunay Triangulation Algorithm for Fingerprint Matching: Proc. 2006 3rd International Symposium on Voronoi Diagrams in Science and Engineering (ISVD 2006), Alberta, Canada, 2006, pp. 208-216. DOI: 10.1109/ISVD.2006.19
18. Macedo M.J., Yang W., Zheng G., Johnstone M.N. A Comparison of 2D and 3D Delaunay Triangulations for Fingerprint Authentication: Proc. 15th Australian Information Security Management Conference. Perth, Australia, 2017, pp. 108-115. DOI: 10.4225/75/5a84f3ca95b4b
19. Dremin A., Khachay M., Leshko A. Fingerprint Identification Algorithm Based on Delaunay Triangulation and Cylinder Codes. Proc. Third International Conference on Analysis of Images, Social Networks and Texts (AIST2014), Yekaterinburg, Russia, 2014, pp. 128-139. DOI: 10.1007/978-3-319-12580-0_13
20. Elmouhtadi M., Elfkihi S., Aboutajdine D. Fingerprint Identification Based on Hierarchical Triangulation. Journal of Information Processing Systems, 2018, vol. 14, no. 2, pp. 435-447. DOI: 10.3745/JIPS.02.0084
21. Ghaddab M.H., Jouini K., Korbaa O. Fast and Accurate Fingerprint Matching Using Expanded Delaunay Triangulation. Proc. IEEE/ACS 14th International Conference on Computer Systems and Applications (AICCSA). Hammamet, Tunisia, 2017, pp. 751-758. DOI: 10.1109/AICCSA.2017.33
22. Sparrow M.K. Vector Based Topological Fingerprint Matching. Patent 5631971 USA, Int. Cl. G 06 K 9/00. Field Jul. 15, 1994; Date of patent May. 20, 1997; U.S.Cl. 382/125.
23. ISO/IEC Information Technologies. Biometrics. Biometric Data Interchange Formats. Part 2. Finger Minutiae Data, 2011.
Received 20 March 2019
УДК 004.93 DOI: 10.14529/^190303
ПРИМЕНЕНИЕ ТРИАНГУЛЯЦИИ ДЕЛОНЕ ДЛЯ ФОРМИРОВАНИЯ ШАБЛОНА ДАКТИЛОСКОПИЧЕСКОГО ИЗОБРАЖЕНИЯ
В.Ю. Гудков1, Д.Н. Лепихова2, М.Л. Гаврилова3, М.Л. Цымблер1
1 Южно-Уральский государственный университет, г. Челябинск, Россия,
2 ООО «Сонда ПРО», г. Миасс, Россия,
3 Университет Калгари, г. Калгари, Канада
На сегодняшний день идентификация по отпечаткам пальцев - наиболее распространенный метод биометрической идентификации. Существующие модели идентификации отпечатков пальцев имеют ряд недостатков, влияющих на скорость и качество идентификации. Так большинство моделей не учитывают топологические характеристики изображений, в частно-
сти, классический метод измерения гребневого счета может выдавать неправильные значения в областях значительной кривизны гребневых линий. В статье представлена новая математическая модель для идентификации изображений отпечатков пальцев с учетом их топологических характеристик. Идентификация в рамках предложенной модели выполняется на базе шаблонов. Шаблоны содержат список всех контрольных точек, детектированных на изображении либо на его скелете, и список гребневых линий. Для гребневых линий и контрольных точек строятся наборы топологических векторов. Результат построения топологических векторов не зависит от расположения контрольных точек и учитывает их возможные мутации, что увеличивает стабильность предлагаемой математической модели. Дополнительно стабильность модели обеспечивается путем объединения базовых топологических векторов, построенных для всех контрольных точек и гребневых линий, в расширенный топологический вектор. Такое представление позволяет значительно уменьшить размер шаблона и оптимизировать использование памяти. Для сопоставления отпечатков в предлагаемой модели применяется триангуляция Делоне, которая строится на базе списка построенных топологических векторов. С помощью триангуляции определяются 112 возможных классов для топологических векторов. Такой подход позволяет увеличить скорость идентификации до 10 раз при сохранении ее точности. Предложенная классификация на основе триангуляции Делоне устойчива к поворотам и смещению изображений.
Ключевые слова: шаблон отпечатка пальца, триангуляция Делоне, контрольная точка, модель топологических векторов.
Гудков Владимир Юльевич, д-р физ.-мат. наук, профессор кафедры электронных вычислительных машин, Южно-Уральский государственный университет, г. Челябинск; diana@sonda.ru.
Лепихова Дарья Николаевна, инженер-программист, ООО «Сонда ПРО», г. Миасс; lepikhova@sonda.ru.
Гаврилова Марина Львовна, Ph.D., профессор кафедры компьютерных наук, Университет Калгари, г. Калгари, Канада; marina@cpsc.ucalgary.ca.
Цымблер Михаил Леонидович, канд. физ.-мат. наук, доцент, начальник отдела интеллектуального анализа данных и виртуализации Лаборатории суперкомпьютерного моделирования, Южно-Уральский государственный университет, г. Челябинск; mzym@susu.ru.
Поступила в редакцию 20 марта 2019 г.
ОБРАЗЕЦ ЦИТИРОВАНИЯ
FOR CITATION
Using Delaunay Triangulation for Fingerprint Template Generation / V.Yu. Gudkov, D.N. Lepikhova, M.L. Gavrilova, M.L. Zymbler // Вестник ЮУрГУ. Серия «Компьютерные технологии, управление, радиоэлектроника». - 2019. - Т. 19, № 3. - С. 33-41. DOI: 10.14529/ctcr190303
Gudkov V.Yu., Lepikhova D.N., Gavrilova M.L., Zymbler M.L. Using Delaunay Triangulation for Fingerprint Template Generation. Bulletin of the South Ural State University. Ser. Computer Technologies, Automatic Control, Radio Electronics, 2019, vol. 19, no. 3, pp. 33-41. DOI: 10.14529/ctcr190303