Skip to main content

Biometric Template Selection: A Case Study in Fingerprints

  • Conference paper
  • First Online:
Audio- and Video-Based Biometric Person Authentication (AVBPA 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2688))

Abstract

A biometric authentication system operates by acquiring biometric data from a user and comparing it against the template data stored in a database in order to identify a person or to verify a claimed identity. Most systems store multiple templates per user to account for variations in a person’s biometric data. In this paper we propose two techniques to automatically select prototype fingerprint templates for a finger from a given set of fingerprint impressions. The first method, called DEND, performs clustering in order to choose a template set that best represents the intra-class variations, while the second method, called MDIST, selects templates that have maximum similarity with the rest of the impressions and, therefore, represent typical measurements of biometric data. Matching results on a database of 50 different fingers, with 100 impressions per finger, indicate that a systematic template selection procedure as presented here results in better performance than random template selection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J. L. Wayman, “Fundamentals of biometric authentication technologies,” International Journal of Image and Graphics, vol. 1, no. 1, pp. 93–113, 2001.

    Article  Google Scholar 

  2. X. Jiang and W. Ser, “Online fingerprint template improvement,” IEEE Transactions on PAMI, vol. 24, pp. 1121–1126, August 2002.

    Google Scholar 

  3. K.A. Toh, W.Y. Yau, X.D. Jiang, T. P. Chen, J. Lu, and E. Lim, “Minutiae data synthesis for fingerprint identification application,” in Proc. International Conference on Image Processing (ICIP), vol. 3, pp. 262–265, 2001.

    Google Scholar 

  4. A.K. Jain and A. Ross, “Fingerprint mosaicking,” in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), (Orlando, Florida), May 2002.

    Google Scholar 

  5. X. Liu, T. Chen, and S.M. Thornton, “Eigenspace updating for non-stationary process and its application to face recognition,” To appear in Pattern Recognition, Special issue on Kernel and Subspace Methods for Computer Vision, 2003.

    Google Scholar 

  6. A.K. Jain, L. Hong, and R. Bolle, “On-line fingerprint verification,” IEEE Transactions on PAMI, vol. 19, pp. 302–314, April 1997.

    Google Scholar 

  7. A.K. Jain and R. C. Dubes, Algorithms for Clustering Data. Englewood Cliffs, New Jersey: Prentice Hall, 1988.

    Google Scholar 

  8. D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A.K. Jain, “FVC2002: Fingerprint verification competition,” in Proceedings of the International Conference on Pattern Recognition (ICPR), (Quebec City, Canada), pp. 744–747, August 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jain, A., Uludag, U., Ross, A. (2003). Biometric Template Selection: A Case Study in Fingerprints. In: Kittler, J., Nixon, M.S. (eds) Audio- and Video-Based Biometric Person Authentication. AVBPA 2003. Lecture Notes in Computer Science, vol 2688. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44887-X_40

Download citation

  • DOI: https://doi.org/10.1007/3-540-44887-X_40

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40302-9

  • Online ISBN: 978-3-540-44887-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics