EP2147394A1 - Verfahren und vorrichtung zur automatisierten authentifizierung einer punktmenge - Google Patents

Verfahren und vorrichtung zur automatisierten authentifizierung einer punktmenge

Info

Publication number
EP2147394A1
EP2147394A1 EP08749554A EP08749554A EP2147394A1 EP 2147394 A1 EP2147394 A1 EP 2147394A1 EP 08749554 A EP08749554 A EP 08749554A EP 08749554 A EP08749554 A EP 08749554A EP 2147394 A1 EP2147394 A1 EP 2147394A1
Authority
EP
European Patent Office
Prior art keywords
characteristic points
points
triplets
anglel
angle2
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP08749554A
Other languages
English (en)
French (fr)
Inventor
Claude Barral
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemalto SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto SA filed Critical Gemalto SA
Priority to EP08749554A priority Critical patent/EP2147394A1/de
Publication of EP2147394A1 publication Critical patent/EP2147394A1/de
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • G06V40/1353Extracting features related to minutiae or pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/757Matching configurations of points or features

Definitions

  • the invention relates generally to techniques related to the automated authentication of a set of characteristic points, with a very high degree of reliability.
  • the invention relates, according to a first aspect, to an authentication method implementing a cloud of points, comprising at least the operation of identifying, in this cloud of points, a set of characteristic points that we will call subsequently minutiae, in number greater than 3.
  • biometrics such as fingerprints
  • a recognition of the celestial bodies makes it possible to position oneself on the globe, as well as to orient oneself.
  • the representation of a cloud of points is sensitive to various transformations and in particular translations, rotations and homotheties. These transformations come from changes in the position of the capture means (fingerprint reader, camera, camera, etc.) during the capture. Indeed, two consecutive catches will never be identical because the capture device will never be perfectly in the same place, the subject or the target of the capture will never be exactly in the same place either, to this we must add the environmental parameters that can alter the catch.
  • the purpose of the present invention is to propose an authentication method that does not require the location of the point cloud in an orthonormal frame, and in which the representation of the point cloud is insensitive to at least one of these transformations, so that it can be implemented on weak computers.
  • These authentication methods are based on a comparison of a candidate to a reference.
  • the first step will therefore always be a so-called enlistment step, consisting of a registration of the value which will serve as a reference thereafter. This particular step must be done, as far as possible, in good security conditions so that it can subsequently be trusted. Enlistment is divided into
  • At least one storage step (usually in non-volatile memory)
  • the second step is the authentication step itself. This step consists of a comparison of a candidate value and the reference value recorded during the enrollment.
  • At least one processing step • At least one storage step (usually in volatile memory)
  • the authentication method according to the invention proposes a solution for automating and embedding the processing and comparison steps in devices that do not have large resources, both in memory and computing power.
  • the authentication method of the invention is essentially characterized in that it further comprises the operations of:
  • non-flat triangle a triangle whose three vertices are not aligned.
  • the scatterplot can be represented by the list of triplets formed from the three information obtained during the two preceding steps, for each selected triangle.
  • the non-flat triangles are selected according to the Delaunay triangulation method.
  • a device according to the present invention further comprises:
  • automatic recognition means for identifying, in the two-dimensional image, a two-dimensional distribution of points, each of which corresponds to the location of a point characteristic of the point cloud;
  • programmed calculation means to select, in this distribution of characteristic points, a plurality of non-flat triangles, each of which has three points of the distribution at its vertices, to associate with each selected triangle information on the diameter of the circumscribed circle, and to store it defining, for each selected triangle ABC, two pieces of information respectively representative of two ratios involving the three angles of the triangle, taken two by two, and one nonvolatile memory for storing, as a representation of said imprint, a list of triplets formed from the three information obtained in the two previous steps, for each selected triangle.
  • the device will also have a volatile memory for temporarily storing triplets or triplet lists during the various calculations.
  • the programmed calculation means are furthermore programmed:
  • NPC candidate point cloud
  • NPR reference point cloud
  • an NPC triplet (Anglel-NPC, Angle2-NPC, Diam-NPC) will be retained only if there is an NPR triplet (Anglel-NPR, Angle2-NPR, Diam-NPR), for which: Anglel-NPC and Anglel-NPR vary in proportions below a threshold Sl Angle2-NPC and Angle2-NPR vary in proportions below an S2 threshold
  • Diam-NPC and Diam-NPR vary in proportions below an S3 threshold to assimilate, or not, the cloud of candidate points to the cloud of reference points, according to whether the number of previously counted triplets of NPC, relative to the first number of triplets, represents or not a proportion at least equal to a threshold Threshold-Acceptance determined.
  • FIG. 1 represents a set of characteristic points (minutiae) coming from a point cloud not shown;
  • FIG. 2 represents an example of a network of non-flat triangles according to the invention applied to the minutiae of FIG. 1;
  • FIG. 4 represents the triangles highlighted in FIG. 4, with their respective circumscribed circles;
  • FIG. 5 reduces the cloud of points from which the minutiae represented in FIG. 1 are drawn, to the three triangles highlighted in FIG. 3, and to their circumscribed circles drawn in FIG. 4;
  • Figure 6 shows an enlarged view of a fingerprint
  • FIG. 7 represents the minutiae resulting from the fingerprint of FIG. 6, these minutiae being connected between they form non-flat triangles, and each of these triangles has its circumscribed circumscribed circle;
  • FIG. 8 shows the list of triplets resulting from the triangular data and circles of FIG. 7. This triplet list forms a signature of the fingerprint of FIG.
  • the invention relates to an authentication method implementing a cloud of points.
  • an authentication method of this type comprises, in its acquisition phase, an identification operation, consisting of identifying, in the cloud of points to be acquired, a set of characteristic points (called minutiae in the present document), generally in the order of a few tens.
  • this acquisition phase which leads to obtaining a representation of the point cloud, further comprises assimilation operations, selection, association, definition, and representation.
  • the assimilation operation consists in assimilating the set of previously identified minutiae in the imprint to a two-dimensional distribution of points such as A to K.
  • Figure 1 illustrates the assimilation of all the characteristic points from a cloud of points, to a two-dimensional representation of these minutiae.
  • the minutiae are conventionally constituted by line crossings.
  • the brightest bodies are often used as characteristic points of a portion of the sky.
  • the characteristic points will be generally isolated points, so as not to confuse them with their neighbors. Some groups of points may be chosen because of a particularly identifiable arrangement. All these point selection methods required that the scatterplot be sufficiently supplied so that the number of characteristic points is sufficient.
  • any points can become characteristic points because the "choice" of points answering quality criteria is replaced by the choice of triangles allowing the calculations.
  • the selection operation consists in selecting, in this distribution of points, a plurality of non-flat triangles, each of which has three points of the two-dimensional distribution of points as vertices.
  • the Delaunay triangulation technique gives very good results, but many other methods can be implemented, as long as they exclude flat triangles.
  • a method can consist of a refusal of any triangle sharing a vertex with a triangle already registered, and flat triangles.
  • Another method may consist of an exclusion of flat triangles, and triangles inscribed partially or in their entirety, in triangles already recorded. Another method may be to exclude flat triangles and triangles containing minutiae in addition to their three vertices.
  • the selection can for example be done by excluding only the flat triangles.
  • Figure 2 illustrates the selection of triangles from the points of Figure 1, according to the Delaunay method.
  • the association operation consists in associating with each selected triangle a DIAM information on the diameter of the circumscribed circle.
  • Figure 4 illustrates the association, with three particular triangles identified in Figure 3 of their respective circumscribed circles.
  • this operation can associate to the triangle ABC, the square of the diameter of the circumscribed circle CCABC, to the triangle CDE, the square of the diameter of the circumscribed circle CCCDE, to the triangle FGH, the square of the diameter of the circumscribed circle CCFGH.
  • the definition operation consists in defining, for each selected triangle ABC, two pieces of information (Anglel and Angle2) respectively representative of two ratios involving the three angles of the triangle, taken two by two.
  • TétaA is the angle inside the triangle, formed in A by the intersection of the segments [BA] and [CA] - TétaB is the internal angle to the triangle, formed in B by the intersection of segments [AB] and [CB ]
  • TétaC is the angle inside the triangle, formed in C by the intersection of segments [BC] and [AC]
  • a particular embodiment of the invention consists of its application to the world of biometrics.
  • biometrics particularly needs fast and simple means to authenticate a person with a high level of reliability.
  • Authentication based on biometrics begins with a capture step, and an extraction step.
  • Capture is the step that consists of a reading of the biometric data at a given moment. In the case of the majority of the biometrics, this step is done by the capture of an image, this is the case, among others, for the fingerprints, the facial, retinal, iris, and good d 'other.
  • this capture can take a variety of forms, such as recording for voice recognition, video recording for gait recognition, combined motion and pressure recording for fingerprint recognition.
  • the extraction step makes it possible to isolate characteristic points in this capture.
  • these characteristic points are inter alia line crossings, end lines, or islands in a line.
  • the result of the extraction step, applied to the fingerprint capture of FIG. 6, gives a set of points comparable to that of FIG.
  • a candidate fingerprint will for example be sent to a portable computing unit, and processed as previously described to represent it by a series of triplets. ⁇ 143; 62; 68 ⁇ ⁇ 155; 17; 76 ⁇ ⁇ 102; 15; 6 ⁇ ⁇ 210; 54; 88 ⁇ ⁇ 19; 91; 42 ⁇ ⁇ 70; 23; 86 ⁇ ⁇ 85; 82; 27 ⁇ ⁇ 28; 85; 95 ⁇ ⁇ 181; 29; 85 ⁇ ⁇ 394; 27; 50 ⁇ ⁇ 327; 16; 33 ⁇ ⁇ 192; 55; 14 ⁇
  • the set of characteristic points which made it possible to obtain this list of triplets could come, not from the fingerprint directly, but from a representation of it made in any form, provided that it is It is possible for the portable computing unit to make a two-dimensional representation, in order to calculate the triplets.
  • triplets candidates obtained, this list will be stored in volatile memory of the portable computing unit.
  • the authentication system is, for example, set as follows:
  • Acceptance threshold 60%: 60% of the triplets of the reference fingerprint must be found in the candidate fingerprint.
  • Sl 5: the "Anglel” values of the two triplets compared must vary by less than 5.
  • S2 5: the "Angle2" values of the two triplets compared must vary by less than 5.
  • the portable computing unit will compare the triplets ⁇ 81; 84; 29 ⁇ and ⁇ 85; 82; 27 ⁇ : 81 and 85 range from 4, which is much lower than or equal to S3 84 and 82 range from 2, which is well below or equal to S2 29 and 27 range from 2, which is well below or equal to sl
  • the counter contains the value seven, for a reference footprint consisting of 10 triplets, or 70% of the reference footprint was found in the candidate footprint. This threshold is greater than the Threshold-acceptance value set at 60%.
  • the candidate fingerprint is therefore authenticated as belonging to the cardholder.
  • Another particular embodiment of the invention consists in its application to the world of astronomy. Indeed, the invention, once embedded in a mobile phone with a camera, will allow, for example, the following application. It is easy to treat according to the invention, all or part of the map of the stars visible at night, from a particular territory, or a larger area of the globe. Once this information is converted into a triplet list, this map can be considered as reference data.
  • the application would treat this data to obtain a series of triplets considered as candidates.
  • the application would then seek to authenticate the part of the sky of the general reference map to which the "candidate" portion corresponds. This would for example identify where the picture was taken, in case the user is lost.
  • Another use may be to identify the stars or groupings of stars (constellations, ...) that the user has in front of him, if these data have been added to the general reference map.
  • a particular use of the invention consists in its application to point clouds already stored in a form other than that according to the invention.
  • the invention will convert the point cloud into triplets.
  • the solution according to the invention makes it possible to very greatly improve the performance of the comparison step (match in English) compared to the solutions known in the state of the art and the technique.
  • the present invention also makes it possible to authenticate with sets of feature points less provided than in the prior art. Indeed, the fact that the present invention uses triangles from the characteristic points, and not the characteristic points directly, allows, by carefully choosing the triangles selection method, to obtain a number of triangles much higher than the number points. This feature allows the present invention to authenticate sets of points hitherto impossible to authenticate because of their low number of characteristic points.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Multimedia (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Evolutionary Computation (AREA)
  • Databases & Information Systems (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)
EP08749554A 2007-05-11 2008-04-14 Verfahren und vorrichtung zur automatisierten authentifizierung einer punktmenge Ceased EP2147394A1 (de)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP08749554A EP2147394A1 (de) 2007-05-11 2008-04-14 Verfahren und vorrichtung zur automatisierten authentifizierung einer punktmenge

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP07301034A EP1990757A1 (de) 2007-05-11 2007-05-11 Verfahren und Vorrichtung zur automatisierten Authentifizierung einer Gruppe von Punkten
EP08749554A EP2147394A1 (de) 2007-05-11 2008-04-14 Verfahren und vorrichtung zur automatisierten authentifizierung einer punktmenge
PCT/EP2008/054492 WO2008141872A1 (fr) 2007-05-11 2008-04-14 Procede et dispositif d'authentification automatisee d'un ensemble de points

Publications (1)

Publication Number Publication Date
EP2147394A1 true EP2147394A1 (de) 2010-01-27

Family

ID=38441599

Family Applications (2)

Application Number Title Priority Date Filing Date
EP07301034A Withdrawn EP1990757A1 (de) 2007-05-11 2007-05-11 Verfahren und Vorrichtung zur automatisierten Authentifizierung einer Gruppe von Punkten
EP08749554A Ceased EP2147394A1 (de) 2007-05-11 2008-04-14 Verfahren und vorrichtung zur automatisierten authentifizierung einer punktmenge

Family Applications Before (1)

Application Number Title Priority Date Filing Date
EP07301034A Withdrawn EP1990757A1 (de) 2007-05-11 2007-05-11 Verfahren und Vorrichtung zur automatisierten Authentifizierung einer Gruppe von Punkten

Country Status (4)

Country Link
US (1) US20100135538A1 (de)
EP (2) EP1990757A1 (de)
WO (1) WO2008141872A1 (de)
ZA (1) ZA200907648B (de)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI599965B (zh) * 2011-02-01 2017-09-21 許文星 以分類三角形實現之高速指紋特徵比對系統及其方法
JP6375775B2 (ja) * 2014-08-19 2018-08-22 日本電気株式会社 特徴点入力支援装置、特徴点入力支援方法及びプログラム
CN104331847A (zh) * 2014-11-18 2015-02-04 国家电网公司 一种利用Delaunay三角剖分的供电分区方法
JP6981249B2 (ja) * 2017-12-28 2021-12-15 富士通株式会社 生体認証装置、生体認証プログラム、及び生体認証方法
CN108460837A (zh) * 2018-03-01 2018-08-28 国家海洋局第海洋研究所 面向采样不足散乱点集的三角网格曲面重建方法
CN108416844A (zh) * 2018-03-01 2018-08-17 国家海洋局第海洋研究所 一种区域增长法与雕刻法相结合的三角网格曲面重建算法

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711153B2 (en) * 2003-04-14 2010-05-04 Hillhouse Robert D Method and apparatus for searching biometric image data
US7356170B2 (en) * 2004-02-12 2008-04-08 Lenovo (Singapore) Pte. Ltd. Fingerprint matching method and system
EP1800240A1 (de) * 2004-10-14 2007-06-27 Forensic Science Service Ltd Merkmalsextraktion und -vergleich bei finger- und handabdruck-erkennung
US20060104484A1 (en) * 2004-11-16 2006-05-18 Bolle Rudolf M Fingerprint biometric machine representations based on triangles

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
AGAPOV I A ET AL: "Identification of random fields of points", SIGNAL PROCESSING. IMAGE COMMUNICATION, ELSEVIER SCIENCE PUBLISHERS, AMSTERDAM, NL, vol. 13, no. 1, 1 July 1998 (1998-07-01), pages 21 - 43, XP004123808, ISSN: 0923-5965, DOI: 10.1016/S0923-5965(97)00045-3 *
BEBIS G ET AL: "Fingerprint identification using Delaunay triangulation", INFORMATION INTELLIGENCE AND SYSTEMS, 1999. PROCEEDINGS. 1999 INTERNAT IONAL CONFERENCE ON BETHESDA, MD, USA 31 OCT.-3 NOV. 1999, LOS ALAMITOS, CA, USA,IEEE COMPUT. SOC, US, 31 October 1999 (1999-10-31), pages 452 - 459, XP010362283, ISBN: 978-0-7695-0446-9, DOI: 10.1109/ICIIS.1999.810315 *
See also references of WO2008141872A1 *

Also Published As

Publication number Publication date
US20100135538A1 (en) 2010-06-03
EP1990757A1 (de) 2008-11-12
ZA200907648B (en) 2010-08-25
WO2008141872A1 (fr) 2008-11-27

Similar Documents

Publication Publication Date Title
EP2024900B1 (de) Verfahren zum identifizieren einer person und beschaffungseinrichtung
EP2318980A1 (de) Verfahren zur bestimmung einer pseudoidentität auf der grundlage von eigenschaften von minutien und diesbezügliche einrichtung
FR3088467A1 (fr) Procede de classification d'une image d'entree representative d'un trait biometrique au moyen d'un reseau de neurones a convolution
WO2008141872A1 (fr) Procede et dispositif d'authentification automatisee d'un ensemble de points
EP3620970B1 (de) Verfahren zur extraktion von merkmalen eines fingerabdrucks, der durch ein eingangsbild dargestellt wird
EP2356773B1 (de) Identifikations- oder autorisierungsverfahren und diesbezügliches system und sicheres modul
Chokkadi et al. A Study on various state of the art of the Art Face Recognition System using Deep Learning Techniques
EP3901794A1 (de) Verfahren zur authentifizierung oder identifizierung einer person
EP2973210B1 (de) Verfahren zur sicheren datenverarbeitung und verwendung in der biometrie
FR3085217A1 (fr) Procede de determination de pose et d'identification d'une vue tridimensionnelle de visage
FR3102600A1 (fr) Procédé de segmentation d’une image d’entrée représentant au moins une empreinte biométrique au moyen d’un réseau de neurones à convolution
EP2517151B1 (de) Biometrische kodierung
FR3103045A1 (fr) Procédé d’augmentation d’une base d’images d’apprentissage représentant une empreinte sur un arrière-plan au moyen d’un réseau antagoniste génératif
EP3929809A1 (de) Methode zur erkennung von mindestens einem sichtbaren biometrischen merkmal auf einem eingangsbild mittels eines konvolutionales neurales netzwerk
EP3567521B1 (de) Biometrisches erkennungsverfahren anhand der iris
FR3118243A1 (fr) Procede d’extraction d’une signature d’une empreinte digitale et dispositif mettant en oeuvre ledit procede
FR2848699A1 (fr) Identification biometrique par reconnaissance d'empreinte digitale
EP3825915A1 (de) Klassifizierung eines biometrischen drucks, der durch ein eintragsbild vertreten wird
EP2572316B1 (de) Verfahren für anmeldung und biometrische überprüfung sowie entsprechende systeme und vorrichtungen
EP4280542A1 (de) Verfahren und vorrichtung zur biometrischen identifizierung
WO2021156283A1 (fr) Procede et dispositif pour identifier un individu a partir d'une donnee biometrique
EP4396789A1 (de) Verfahren zum abgleich eines kandidatenbildes mit einem referenzbild
WO2023031305A1 (fr) Procédé de mise en relation d'une image candidate avec une image de référence
WO2008139093A2 (fr) Determination d'un modele de categorie d'images
WO2012107696A1 (fr) Procédés, dispositif et programmes d'ordinateur pour la reconnaissance de formes, en temps réel, à l'aide d'un appareil comprenant des ressources limitées

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20091026

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA MK RS

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20100823

REG Reference to a national code

Ref country code: DE

Ref legal event code: R003

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20121212