博碩士論文 109522606 詳細資訊




以作者查詢圖書館館藏 以作者查詢臺灣博碩士 以作者查詢全國書目 勘誤回報 、線上人數:37 、訪客IP:3.149.249.154
姓名 克安通(Chrisantonius)  查詢紙本館藏   畢業系所 資訊工程學系
論文名稱 結合深度學習和特徵描述子為了局部指紋認出
(Combined Deep Learning and Feature Descriptor for Partial Fingerprint Recognition)
相關論文
★ Single and Multi-Label Environmental Sound Recognition with Gaussian Process★ 波束形成與音訊前處理之嵌入式系統實現
★ 語音合成及語者轉換之應用與設計★ 基於語意之輿情分析系統
★ 高品質口述系統之設計與應用★ 深度學習及加速強健特徵之CT影像跟骨骨折辨識及偵測
★ 基於風格向量空間之個性化協同過濾服裝推薦系統★ RetinaNet應用於人臉偵測
★ 金融商品走勢預測★ 整合深度學習方法預測年齡以及衰老基因之研究
★ 漢語之端到端語音合成研究★ 基於 ARM 架構上的 ORB-SLAM2 的應用與改進
★ 基於深度學習之指數股票型基金趨勢預測★ 探討財經新聞與金融趨勢的相關性
★ 基於卷積神經網路的情緒語音分析★ 運用深度學習方法預測阿茲海默症惡化與腦中風手術存活
檔案 [Endnote RIS 格式]    [Bibtex 格式]    [相關文章]   [文章引用]   [完整記錄]   [館藏目錄]   至系統瀏覽論文 ( 永不開放)
摘要(中) 近年來,為了在使用行動裝置進行交易的情形下驗證使用者身分,局部指紋辨識變得相當重要。局部指紋辨識是以小範圍指紋進行身分驗證的技術,因為在進行局部指紋對局部指紋的比對時,比起完整指紋能辨別身分的特徵數量會有所減少,發展更有效及準確的方法是必要的。因此,本篇論文結合深度學習及特徵描述子進行局部指紋辨識,以提取局部指紋中最細微的特徵。深度學習方法基於使用CNN架構的孿生網路,特徵描述子方法基於SIFT演算法,最後的辨識結果則由兩種方法所得的比對分數加權得出。
本篇論文針對各種情況進行實驗得到結果,像是不同的影像大小、不同的Epoch大小及不同的資料集。在FVC2002資料集上,DB1及DB3所得的EER約為4%,DB1及DB2所得的FRR@FAR 1/50000為6.36%及8.11%,這些結果證實本篇論文所提出的局部指紋辨識方法是準確及有效的。未來的研究可以向更高的影像解析度發展,指紋中細微的毛孔能作為特徵提升局部指紋辨識的效果,也可以使用不同的深度學習方法進一步簡化訓練過程。
摘要(英) Currently, partial fingerprint recognition has been considered and has become very important to identify a user′s authenticity in conducting a transaction through a mobile device. Therefore, developments to be more effective and accurate in identifying the authenticity of a user with a scanner reader that can only capture a small finger image area are needed. However, when applied in partial to partial fingerprint matching, there is a reduction in the features from full fingerprint image to partial fingerprint image. Therefore, we proposed this research using the combined method of deep learning and feature descriptors for partial fingerprint. The deep learning used in this research is based on the Siamese Network using the CNN architecture and the Feature Descriptor based on the SIFT algorithm to get minimal features from partial fingerprint. As the final result, the matching score is obtained by combining the scores from the two methods used (deep learning and feature descriptor). Then in the combination process, there is a weighting on the score obtained from both sides.
The research results have been carried out on several variations of data such as image size, adequate epoch, and the type of dataset used. The results show that the proposed method by combining deep learning and feature descriptors method for the matching score evaluation in the FVC2002 yields an EER value of around 4% for DB1 and DB3. In addition, the result for FRR@FAR 1/50000 validation about 6.36% and 8.11% in the dataset DB1 and DB2. The result shows that the proposed method has good results in the implementation of partial fingerprint recognition. The development in further research can be developed using a dataset with a higher resolution. So that even though the recognition is carried out on a partial image, it still has featured in the form of detailed pores of a fingerprint and can use other deep learning methods to reduce the complexity of the training process.
關鍵字(中) ★ 局部指紋
★ 深度學習
★ 卷積神經網路
★ 特徵描述子
★ 結合比對評估
關鍵字(英) ★ partial fingerprint
★ deep learning
★ convolutional neural network
★ feature descriptor
★ combined matching evaluation
論文目次 摘 要 ............................................................................................................................. i
Abstract ...................................................................................................................... ii
Acknowledgments .................................................................................................... iii
Contents .................................................................................................................... iv
List of Figures ........................................................................................................... vi
List of Tables ........................................................................................................... vii
CHAPTER 1 Introduction .......................................................................................... 1
1.1 Background .................................................................................................... 1
1.2 Problem Formulation ...................................................................................... 2
1.3 Research Objective ........................................................................................ 3
1.4 Research Contributions .................................................................................. 3
1.5 Research Originality ....................................................................................... 4
CHAPTER 2 Literature Review ................................................................................. 5
CHAPTER 3 Theoretical Basis ................................................................................. 9
3.1 Biometric System ........................................................................................... 9
3.2 Fingerprint Recognition ................................................................................ 12
3.3 Deep Learning .............................................................................................. 13
3.4 Artificial Neural Network ............................................................................... 13
3.4.1 Perceptron ................................................................................................ 13
3.4.2 Activation Function .................................................................................... 14
3.4.3 Structure ................................................................................................... 15
3.4.4 Training Method Forward Propagation and Backpropagation ................... 16
3.4.5 Parameter Initialization.............................................................................. 18
3.4.6 Loss Function ............................................................................................ 19
3.4.7 Optimizer ................................................................................................... 20
3.5 Convolutional Neural Network ...................................................................... 20
3.6 Normalization ............................................................................................... 24
3.7 Regularization .............................................................................................. 25
3.7.1 Dropout ..................................................................................................... 26
3.8 Siamese Network ......................................................................................... 27
3.9 Scale-Invariant Actual Transform (SIFT) ...................................................... 27
3.9.1 Detection Keypoint Candidate ................................................................... 28
3.9.2 Selecting Keypoint .................................................................................... 28
3.9.3 Determination of Orientation to Keypoint .................................................. 29
v
3.9.4 Keypoint Descriptor ................................................................................... 29
3.9.5 Keypoint Matching .................................................................................... 30
3.10 Model Evaluation .......................................................................................... 30
3.10.1 False Acceptance Rate (FAR) and False Rejection Rate (FRR) ............. 31
3.10.2 Equal Error Rate (EER) ........................................................................... 31
3.10.3 Receiver Operating Characteristic (ROC) and Detection Error Trade-off Curves (DET) ........................................................................................................ 33
CHAPTER 4 Research Methodology ...................................................................... 34
4.1 Literature Study ............................................................................................ 34
4.2 Tools and Dataset ........................................................................................ 34
4.2.1 Tools ......................................................................................................... 34
4.2.2 Dataset...................................................................................................... 34
4.3 Research Procedure .................................................................................... 35
4.3.1 Research Activities ................................................................................... 35
4.3.2 General Description Model Built ................................................................ 36
4.3.3 Preparation Dataset .................................................................................. 37
4.3.4 Architecture Design Deep Learning .......................................................... 39
4.3.5 Architecture Feature Descriptor ................................................................ 43
4.4 Model Evaluation .......................................................................................... 44
CHAPTER 5 Result and Discussion ....................................................................... 46
5.1 Partial Fingerprint Datasets and Combined Matching Evaluation ................ 46
5.2 Combined Evaluation Matching Experiment with Variant Epoch DB1 on Image Size of 184x184 using Variant Epoch 500, 1000, 2500 ............................... 46
5.3 Combined Evaluation Matching Experiment with variant dataset DB1 compare with DB2 and DB3 on the image size of 184x184 using adequate epoch 48
5.4 Combined Evaluation Matching Experiment with variant resolution 152x152, 160x160, 184x184 on DB1 using adequate epoch ................................................ 50
5.5 Discussion from The Result Experiment ...................................................... 51
CHAPTER 6 Conclusion.......................................................................................... 53
6.1 Result Summary ........................................................................................... 53
6.2 Limitation ...................................................................................................... 54
6.3 Feature Research......................................................................................... 54
BIBLIOGRAPHIES ................................................................................................... 55
參考文獻 [1] M. H. Barkadehi, M. Nilashi, O. Ibrahim, A. Zakeri Fardi, and S. Samad, “Authentication systems: A literature review and classification,” Telemat. Informatics, vol. 35, no. 5, pp. 1491–1511, 2018, doi: https://doi.org/10.1016/j.tele.2018.03.018.
[2] I. Velásquez, A. Caro, and A. Rodríguez, “Authentication schemes and methods: A systematic literature review,” Inf. Softw. Technol., vol. 94, pp. 30–37, 2018, doi: https://doi.org/10.1016/j.infsof.2017.09.012.
[3] J.-P. Delahaye, “The Mathematics of (Hacking) Passwords,” 2019. https://www.scientificamerican.com/article/the-mathematics-of-hacking-passwords/ (accessed May 16, 2021).
[4] S. Minaee, A. Abdolrashidi, H. Su, M. Bennamoun, and D. Zhang, “Biometric Recognition Using Deep Learning: {A} Survey,” CoRR, vol. abs/1912.0, 2019, [Online]. Available: http://arxiv.org/abs/1912.00271.
[5] H. H. Le, N. H. Nguyen, and T.-T. Nguyen, “Automatic Detection of Singular Points in Fingerprint Images Using Convolution Neural Networks,” in Intelligent Information and Database Systems, 2017, pp. 207–216.
[6] M. Wani, F. Bhat, S. Afzal, and A. Khan, “Supervised Deep Learning in Fingerprint Recognition,” 2020, pp. 111–132.
[7] V. Anand and V. Kanhangad, “PoreNet: CNN-Based Pore Descriptor for High-Resolution Fingerprint Recognition,” IEEE Sens. J., vol. 20, no. 16, pp. 9305–9313, 2020, doi: 10.1109/JSEN.2020.2987287.
[8] W. Lee, S. Cho, H. Choi, and J. Kim, “Partial fingerprint matching using minutiae and ridge shape features for small fingerprint scanners,” Expert Syst. Appl., vol. 87, pp. 183–198, 2017, doi: https://doi.org/10.1016/j.eswa.2017.06.019.
[9] T. T. Nguyen, H. Tahir, M. Abdelrazek, and A. Babar, “Deep Learning Methods for Credit Card Fraud Detection,” CoRR, vol. abs/2012.0, 2020, [Online]. Available: https://arxiv.org/abs/2012.03754.
[10] M. Wang and W. Deng, “Deep Face Recognition: {A} Survey,” CoRR, vol. abs/1804.0, 2018, [Online]. Available: http://arxiv.org/abs/1804.06655.
[11] M. Alam, M. D. Samad, L. Vidyaratne, A. Glandon, and K. M. Iftekharuddin, “Survey on Deep Neural Networks in Speech and Vision Systems,” CoRR, vol. abs/1908.0, 2019, [Online]. Available: http://arxiv.org/abs/1908.07656.
56
[12] S. Min, B. Lee, and S. Yoon, “Deep Learning in Bioinformatics,” CoRR, vol. abs/1603.0, 2016, [Online]. Available: http://arxiv.org/abs/1603.06430.
[13] J. Deng, J. Guo, and S. Zafeiriou, “ArcFace: Additive Angular Margin Loss for Deep Face Recognition,” CoRR, vol. abs/1801.0, 2018, [Online]. Available: http://arxiv.org/abs/1801.07698.
[14] L. N. Darlow and B. Rosman, “Fingerprint minutiae extraction using deep learning,” in 2017 IEEE International Joint Conference on Biometrics (IJCB), 2017, pp. 22–30, doi: 10.1109/BTAS.2017.8272678.
[15] B. Stojanović, O. Marques, A. Nešković, and S. Puzović, “Fingerprint ROI segmentation based on deep learning,” in 2016 24th Telecommunications Forum (TELFOR), 2016, pp. 1–4, doi: 10.1109/TELFOR.2016.7818799.
[16] M. Alaslani and L. Elrefaei, “Convolutional Neural Network Based Feature Extraction for IRIS Recognition,” Int. J. Comput. Sci. Inf. Technol., vol. 10, pp. 65–78, 2018, doi: 10.5121/ijcsit.2018.10206.
[17] C. Shorten and T. M. Khoshgoftaar, “A survey on Image Data Augmentation for Deep Learning,” J. Big Data, vol. 6, no. 1, p. 60, 2019, doi: 10.1186/s40537-019-0197-0.
[18] R. Donida Labati, A. Genovese, E. Muñoz, V. Piuri, and F. Scotti, “A novel pore extraction method for heterogeneous fingerprint images using Convolutional Neural Networks,” Pattern Recognit. Lett., vol. 113, pp. 58–66, 2018, doi: https://doi.org/10.1016/j.patrec.2017.04.001.
[19] H. Çevikalp, G. G. Dordinejad, and M. Elmas, “Feature extraction with convolutional neural networks for aerial image retrieval,” in 2017 25th Signal Processing and Communications Applications Conference (SIU), 2017, pp. 1–4, doi: 10.1109/SIU.2017.7960212.
[20] M. Claesen and B. De Moor, “Hyperparameter Search in Machine Learning,” CoRR, vol. abs/1502.0, 2015, [Online]. Available: http://arxiv.org/abs/1502.02127.
[21] S. Reddy, K. T. Reddy, and V. Kumari, “Optimization of Deep Learning using Various Optimizers , Loss Functions and Dropout,” 2019.
[22] R. Jie, J. Gao, A. Vasnev, and M.-N. Tran, “Regularized Flexible Activation Function Combinations for Deep Neural Networks,” CoRR, vol. abs/2007.1, 2020, [Online]. Available: https://arxiv.org/abs/2007.13101.
[23] J. Jeong, J.-H. Cho, and J.-G. Lee, “Filter combination learning for CNN model
57
compression,” ICT Express, vol. 7, no. 1, pp. 5–9, 2021, doi: https://doi.org/10.1016/j.icte.2021.01.001.
[24] Y. Zhang, P. Liang, and M. J. Wainwright, “Convexified Convolutional Neural Networks,” CoRR, vol. abs/1609.0, 2016, [Online]. Available: http://arxiv.org/abs/1609.01000.
[25] R. Tolosana, R. Vera-Rodriguez, J. Fierrez, and J. Ortega-Garcia, “Exploring Recurrent Neural Networks for On-Line Handwritten Signature Biometrics,” IEEE Access, vol. 6, pp. 5128–5138, 2018, doi: 10.1109/ACCESS.2018.2793966.
[26] C. Zhang, W. Liu, H. Ma, and H. Fu, “Siamese neural network based gait recognition for human identification,” 2016 IEEE Int. Conf. Acoust. Speech Signal Process., pp. 2832–2836, 2016.
[27] D. Zhong, Y. Yang, and X. Du, “Palmprint Recognition Using Siamese Network,” 2018.
[28] C. Lin and A. Kumar, “Multi-Siamese networks to accurately match contactless to contact-based fingerprint images,” 2017 IEEE Int. Jt. Conf. Biometrics, pp. 277–285, 2017.
[29] C. Lin and A. Kumar, “Contactless and partial 3D fingerprint recognition using multi-view deep representation,” Pattern Recognit., vol. 83, pp. 314–327, 2018, doi: https://doi.org/10.1016/j.patcog.2018.05.004.
[30] S. Maheshwary and H. Misra, “Matching Resumes to Jobs via Deep Siamese Network,” in Companion Proceedings of the The Web Conference 2018, 2018, pp. 87–88, doi: 10.1145/3184558.3186942.
[31] Y. Tang, F. Gao, J. Feng, and Y. Liu, “FingerNet: An unified deep network for fingerprint minutiae extraction,” in 2017 IEEE International Joint Conference on Biometrics (IJCB), 2017, pp. 108–116, doi: 10.1109/BTAS.2017.8272688.
[32] F. Zeng, S. Hu, and K. Xiao, “Research on partial fingerprint recognition algorithm based on deep learning,” Neural Comput. Appl., vol. 31, no. 9, pp. 4789–4798, 2019, doi: 10.1007/s00521-018-3609-8.
[33] U. Soni and G. Mahesh, “A Survey on State of the Art Methods of Fingerprint Recognition,” 2018.
[34] Y. A. Wang and J. Hu, “Global ridge orientation modeling for partial fingerprint identification.,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 1, pp. 72–87, Jan. 2011, doi: 10.1109/TPAMI.2010.73.
[35] S. Asha and C. Chellappan, “Partial Fingerprint Matching Using Minutiae
58
Subset,” in Intelligent Computing, Networking, and Informatics, 2014, pp. 445–452.
[36] S. Mathur, A. Vjay, J. Shah, S. Das, and A. Malla, “Methodology for partial fingerprint enrollment and authentication on mobile devices,” in 2016 International Conference on Biometrics (ICB), 2016, pp. 1–8, doi: 10.1109/ICB.2016.7550093.
[37] A. Aravindan and S. M. Anzar, “Robust partial fingerprint recognition using wavelet SIFT descriptors,” Pattern Anal. Appl., vol. 20, no. 4, pp. 963–979, 2017, doi: 10.1007/s10044-017-0615-x.
[38] A. Bazen, “Fingerprint Identification - Feature Extraction, Matching and Database Search,” Form. Methods Syst. Des. - FMSD, 2002.
[39] B. Bakhshi and H. Veisi, “End to End Fingerprint Verification Based on Convolutional Neural Network,” in 2019 27th Iranian Conference on Electrical Engineering (ICEE), 2019, pp. 1994–1998, doi: 10.1109/IranianCEE.2019.8786720.
[40] C. Gottschlich, “Skilled Impostor Attacks Against Fingerprint Verification Systems And Its Remedy,” 2015.
[41] F. Zhang, S. Xin, and J. Feng, “Combining global and minutia deep features for partial high-resolution fingerprint matching,” Pattern Recognit. Lett., vol. 119, pp. 139–147, 2019, doi: https://doi.org/10.1016/j.patrec.2017.09.014.
[42] J. dan D. K. Hurwitz, Machine Learning for Dummies. IBM Limited Edition, 2018.
[43] I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning. MIT Press, 2016.
[44] L. Fausett, Fundamentals of Neural Networks: Architectures, Algorithms, and Applications. USA: Prentice-Hall, Inc., 1994.
[45] S. SHARMA, “What the Hell is Perceptron?,” 2017. https://towardsdatascience.com/what-the-hell-is-perceptron-626217814f53 (accessed May 27, 2021).
[46] Y. LeCun, Y. Bengio, and G. Hinton, “Deep Learning,” Nature, vol. 521, no. 7553, pp. 436–444, 2015, doi: 10.1038/nature14539.
[47] H. Kuwajima, “Backpropagation in Convolutional Neural Network,” 2014. https://www.slideshare.net/kuwajima/cnnbp.
[48] A. and Amidi and S. Amidi, “Convolutional Neural Networks cheatsheet,” https://stanford.edu/, 2019. https://stanford.edu/~shervine/teaching/cs-230/.
[49] S. Ioffe and C. Szegedy, “Batch Normalization: Accelerating Deep Network
59
Training by Reducing Internal Covariate Shift,” CoRR, vol. abs/1502.0, 2015, [Online]. Available: http://arxiv.org/abs/1502.03167.
[50] J. L. Ba, J. R. Kiros, and G. E. Hinton, “Layer Normalization.” 2016.
[51] D. Ulyanov, A. Vedaldi, and V. Lempitsky, “Instance Normalization: The Missing Ingredient for Fast Stylization,” Jul. 2016.
[52] Y. Wu and K. He, “Group Normalization,” CoRR, vol. abs/1803.0, 2018, [Online]. Available: http://arxiv.org/abs/1803.08494.
[53] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: A Simple Way to Prevent Neural Networks from Overfitting,” J. Mach. Learn. Res., vol. 15, no. 56, pp. 1929–1958, 2014, [Online]. Available: http://jmlr.org/papers/v15/srivastava14a.html.
[54] D. Lowe, “Distinctive Image Features from Scale-Invariant Keypoints,” Int. J. Comput. Vis., vol. 60, p. 91, Nov. 2004, doi: 10.1023/B:VISI.0000029664.99615.94.
[55] Z. Daixian, “SIFT algorithm analysis and optimization,” in 2010 International Conference on Image Analysis and Signal Processing, 2010, pp. 415–419, doi: 10.1109/IASP.2010.5476084.
[56] D. Maio, D. Maltoni, R. Cappelli, J. Wayman, and A. K. Jain, “FVC2000: Fingerprint verification competition,” Pattern Anal. Mach. Intell. IEEE Trans., vol. 24, pp. 402–412, Apr. 2002, doi: 10.1109/34.990140.
指導教授 王家慶(Jia-Ching Wang) 審核日期 2021-8-16
推文 facebook   plurk   twitter   funp   google   live   udn   HD   myshare   reddit   netvibes   friend   youpush   delicious   baidu   
網路書籤 Google bookmarks   del.icio.us   hemidemi   myshare   

若有論文相關問題,請聯絡國立中央大學圖書館推廣服務組 TEL:(03)422-7151轉57407,或E-mail聯絡  - 隱私權政策聲明