Matching Performance-Based Comparative Study of Fingerprint Sample Quality Measures

Vol. 19, No. 3, pp. 11-26, Jun. 2009
10.13089/JKIISC.2009.19.3.11, Full Text:
Keywords: Fingerprint sample quality, Quality measure, Matching Performance, Equal error rate
Abstract

Fingerprint sample quality is one of major factors influencing the matching performance of fingerprint recognition systems. The error rates of fingerprint recognition systems can be decreased significantly by removing poor quality fingerprints. The purpose of this paper is to assess the effectiveness of individual sample quality measures on the performance of minutiae-based fingerprint recognition algorithms. Initially, the authors examined the various factors that influenced the matching performance of the minutiae-based fingerprint recognition algorithms. Then, the existing measures for fingerprint sample quality were studied and the more effective quality measures were selected and compared with two image quality software packages, (NFIQ from NIST, and QualityCheck from Aware Inc.) in terms of matching performance of a commercial fingerprint matcher (Verifinger 5.0 from Neurotechnologija). The experimental results over various Fingerprint Verification Competition (FVC) datasets show that even a single sample quality measure can enhance the matching performance effectively.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
C. Jin and H. Kim, "Matching Performance-Based Comparative Study of Fingerprint Sample Quality Measures," Journal of The Korea Institute of Information Security and Cryptology, vol. 19, no. 3, pp. 11-26, 2009. DOI: 10.13089/JKIISC.2009.19.3.11.

[ACM Style]
Chang-Long Jin and Hak-Il Kim. 2009. Matching Performance-Based Comparative Study of Fingerprint Sample Quality Measures. Journal of The Korea Institute of Information Security and Cryptology, 19, 3, (2009), 11-26. DOI: 10.13089/JKIISC.2009.19.3.11.