WO2020187098A1 - 一种指纹图像增强、指纹识别和应用程序启动方法 - Google Patents
一种指纹图像增强、指纹识别和应用程序启动方法 Download PDFInfo
- Publication number
- WO2020187098A1 WO2020187098A1 PCT/CN2020/078648 CN2020078648W WO2020187098A1 WO 2020187098 A1 WO2020187098 A1 WO 2020187098A1 CN 2020078648 W CN2020078648 W CN 2020078648W WO 2020187098 A1 WO2020187098 A1 WO 2020187098A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- fingerprint
- image
- fingerprint image
- present application
- current frame
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 100
- 238000007781 pre-processing Methods 0.000 claims abstract description 29
- 238000012937 correction Methods 0.000 claims abstract description 24
- 238000004422 calculation algorithm Methods 0.000 claims description 30
- 238000012545 processing Methods 0.000 claims description 30
- 238000012795 verification Methods 0.000 claims description 14
- 230000011218 segmentation Effects 0.000 claims description 11
- 238000000605 extraction Methods 0.000 claims description 10
- 230000009466 transformation Effects 0.000 claims description 10
- 238000001514 detection method Methods 0.000 claims description 8
- 238000003384 imaging method Methods 0.000 claims description 8
- 230000003287 optical effect Effects 0.000 claims description 8
- 238000012546 transfer Methods 0.000 claims description 6
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 238000001914 filtration Methods 0.000 description 9
- 230000003044 adaptive effect Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 8
- 230000008030 elimination Effects 0.000 description 8
- 238000003379 elimination reaction Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 238000012549 training Methods 0.000 description 6
- 238000003825 pressing Methods 0.000 description 5
- 238000012935 Averaging Methods 0.000 description 4
- 230000002146 bilateral effect Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000003709 image segmentation Methods 0.000 description 4
- 239000000203 mixture Substances 0.000 description 4
- 238000010606 normalization Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000009792 diffusion process Methods 0.000 description 2
- 230000005284 excitation Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 238000013179 statistical model Methods 0.000 description 2
- PXFBZOLANLWPMH-UHFFFAOYSA-N 16-Epiaffinine Natural products C1C(C2=CC=CC=C2N2)=C2C(=O)CC2C(=CC)CN(C)C1C2CO PXFBZOLANLWPMH-UHFFFAOYSA-N 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000001174 ascending effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 229910044991 metal oxide Inorganic materials 0.000 description 1
- 150000004706 metal oxides Chemical class 0.000 description 1
- 230000000149 penetrating effect Effects 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 229910052594 sapphire Inorganic materials 0.000 description 1
- 239000010980 sapphire Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000010409 thin film Substances 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/13—Sensors therefor
- G06V40/1318—Sensors therefor using electro-optical elements or layers, e.g. electroluminescent sensing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/70—Denoising; Smoothing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/80—Geometric correction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/90—Dynamic range modification of images or parts thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
- G06T7/10—Segmentation; Edge detection
- G06T7/194—Segmentation; Edge detection involving foreground-background segmentation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/20—Image preprocessing
- G06V10/30—Noise filtering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/40—Extraction of image or video features
- G06V10/54—Extraction of image or video features relating to texture
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1347—Preprocessing; Feature extraction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
- G06V40/1376—Matching features related to ridge properties or fingerprint texture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/20—Special algorithmic details
- G06T2207/20024—Filtering details
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/30—Subject of image; Context of image processing
- G06T2207/30196—Human being; Person
Definitions
- the embodiments of the present application relate to image processing and terminal application technologies, in particular to a method for fingerprint image enhancement, fingerprint recognition, and application startup.
- the under-screen fingerprint unlocking solution has the advantages of beautiful, convenient, fast unlocking speed, and conforming to user habits, and has become one of the mainstream ways of unlocking mobile phones.
- the current under-screen fingerprint unlocking solutions due to unclear, incomplete or deformed fingerprint images, users need to repeatedly place their fingers in the fingerprint collection area during registration and collect multiple local fingerprints. It is more cumbersome, and because of the quality of the fingerprint image when unlocking, the unlocking efficiency is also low, which seriously affects the user experience.
- the embodiments of the present application provide a method for fingerprint image enhancement, fingerprint identification, and application startup, which can reduce the number of fingerprint collections, reduce the cumbersomeness of fingerprint collection, improve the quality of fingerprint images, improve fingerprint unlocking efficiency, and improve user experience.
- the embodiments of the present application provide a fingerprint image enhancement method, and the method may include:
- the second preprocessing is performed on the effective area corrected by the direction field to obtain a fingerprint enhanced image.
- the background texture is the average pixel value of N frames of fingerprint images before the current frame of fingerprint image, where N is a positive integer.
- the removing the background texture of the fingerprint image to obtain a pure fingerprint image includes:
- the first preprocessing includes performing contrast enhancement and/or denoising on the pure fingerprint image.
- the acquisition of the effective area of the first preprocessed image adopts a preset fingerprint foreground segmentation algorithm.
- the second preprocessing includes:
- the fingerprint ridges in the binary image are refined to obtain the fingerprint enhanced image.
- the embodiment of the present application also provides a fingerprint identification method, and the method may include:
- the enhancement processing includes: eliminating the background texture of the fingerprint image of the current frame to obtain a pure fingerprint image;
- the fingerprint identification is completed according to the comparison between the characteristic data and the characteristic data of the fingerprint template.
- the enhancement processing may further include:
- the second preprocessing is performed on the effective area corrected by the direction field to obtain a fingerprint enhanced image.
- the background texture is the average pixel value of N frames of fingerprint images before the current frame of fingerprint image, where N is a positive integer.
- the removing the background texture of the fingerprint image to obtain a pure fingerprint image may include:
- the method may further include:
- performing fingerprint distortion detection on the fingerprint enhanced image may include:
- the fingerprint enhanced image is input into a classifier for classification, and the classification result includes a normal fingerprint image and a distorted fingerprint image.
- performing distortion correction on the distorted fingerprint image may include:
- the feature data may include minutiae feature and/or ridge feature of the fingerprint ridge.
- completing fingerprint identification according to the comparison of the characteristic data and the characteristic data of the fingerprint template may include:
- fingerprint recognition is completed.
- the embodiment of the present application also provides a method for starting an application program based on fingerprint recognition, and the method for starting an application program may include:
- the application startup method may further include: detecting whether the touch operation of the finger on the touch screen satisfies a preset condition for starting the fingerprint image collection step.
- the method for starting an application program based on fingerprint recognition may further include: completing identity verification while starting the application program.
- the embodiment of the present application also provides a fingerprint sensing system, which may include:
- the display screen includes a light-emitting display unit for displaying pictures
- the fingerprint collection module is set at least in a partial area below the display screen for collecting fingerprint images
- the fingerprint identification module is configured to receive the fingerprint image and use the fingerprint identification method of any one of claims 8 to 17 to perform fingerprint identification on the fingerprint image.
- the fingerprint collection module may include:
- the imaging unit is arranged under the lens and used to directly obtain the fingerprint image on the display screen.
- the fingerprint collection module is used to obtain a fingerprint image by detecting light emitted from the display screen and reflected on the surface of the finger back to the display screen.
- the fingerprint collection module obtains a fingerprint image by detecting light that penetrates the display screen from a finger; wherein, when a light whose refraction angle is greater than a first threshold is detected, it is determined as the fingerprint ridge When a light with a refraction angle less than or equal to the first threshold is detected, it is determined to be a fingerprint valley line, and the fingerprint image is obtained according to the fingerprint ridge line and the fingerprint valley line.
- the first threshold may be the refraction angle at the valley line of the fingerprint.
- the fingerprint collection module may further include an optical path guide module, which may be used to guide light with a refraction angle greater than the first threshold.
- the fingerprint collection module may further include a photoelectric sensor, which may be used to determine that the light is a fingerprint ridge when the light with a refraction angle greater than the first threshold is detected. When a light whose refraction angle is less than or equal to the first threshold is detected, it is determined that the light is a fingerprint valley line, thereby obtaining a fingerprint pattern.
- the embodiment of the application also proposes an electronic device, which may include:
- a memory for storing executable instructions of the processor
- the processor is configured to execute the fingerprint identification method of any one of the foregoing by executing the executable instruction.
- the electronic device may further include the fingerprint sensing system described in any one of the above.
- the embodiment of the present application also proposes a storage medium, the storage medium may include a stored program, wherein when the program is running, the device where the storage medium is located is controlled to execute any one of the fingerprint identification methods described above.
- the number of fingerprint collections is reduced, the cumbersomeness of fingerprint collection is reduced, the quality of fingerprint images is improved, the efficiency of fingerprint unlocking is improved, and the user experience is improved. Therefore, at least the following beneficial effects are included:
- Fingerprint recognition can be performed at any position on the mobile phone screen, which is flexible and free.
- Fig. 1 is a flowchart of a fingerprint image enhancement method according to an embodiment of the application
- FIG. 2 is a flow chart of a method for correcting the wrong part in the initial direction field of the effective area by using the method of the direction field dictionary in an embodiment of the application;
- FIG. 3 is a flowchart of a second preprocessing method according to an embodiment of the application.
- FIG. 4 is a flowchart of a fingerprint identification method according to an embodiment of the application.
- Fig. 5 is a flowchart of an enhancement processing method after performing background texture elimination on the fingerprint image of the current frame to obtain a pure fingerprint image according to an embodiment of the application;
- FIG. 6 is a flow chart of a specific method for performing second preprocessing on the effective area corrected by the direction field according to an embodiment of the application;
- FIG. 7 is a flowchart of a method before feature extraction on a fingerprint enhanced image according to an embodiment of the application.
- FIG. 8 is a flowchart of a method for performing distortion correction on the distorted fingerprint image according to an embodiment of the application
- FIG. 9-a is a first schematic diagram of ridges, minutiae points, and sub-ridges in an embodiment of the application
- FIG. 9-b is a second schematic diagram of ridge lines, minutiae points, and sub-ridge lines according to an embodiment of the application.
- FIG. 9-c is a schematic diagram of the label relationship of the sub-ridges in an embodiment of the application.
- FIG. 10 is a flowchart of a method for starting an application program based on fingerprint recognition according to an embodiment of the application
- FIG. 11 is a structural block diagram of a fingerprint sensing system according to an embodiment of the application.
- FIG. 12 is a schematic structural diagram of the fingerprint sensing system of an embodiment of the application including a touch panel;
- FIG. 13 is a schematic diagram of a method for obtaining a fingerprint image by detecting light emitted from the display screen and reflected on the surface of the finger back to the display screen according to an embodiment of the application;
- FIG. 14 is a schematic diagram of a method for obtaining a fingerprint image by detecting light penetrating into a display screen from a finger according to an embodiment of the application;
- FIG. 15 is a block diagram of the structure of an electronic device according to an embodiment of the application.
- the embodiments of the present application provide a fingerprint image enhancement method. As shown in FIG. 1, the method may include S101-S105:
- the solution of the embodiment of the present application may first perform enhancement processing on the collected fingerprint image.
- the enhancement processing may include: performing background texture elimination on the fingerprint image of the current frame to obtain a pure fingerprint image.
- the generally collected image not only contains fingerprints, but also contains the background texture of the fingerprint image (for example, the texture of the screen itself, the residual fingerprint image, etc.), so the enhancement processing can be performed first. Separate fingerprints from background texture.
- the removing the background texture of the fingerprint image to obtain a pure fingerprint image may include:
- the background texture may be characterized by the average value of pixels of N frames of fingerprint images before the fingerprint image of the current frame, where N is a positive integer.
- the method of averaging the pixels of multiple frames of images can be used to obtain the background texture, that is, the pixel average is calculated using the sequence of N frames of fingerprint images before the fingerprint image of the current frame, and the result obtained can be approximated as Background texture.
- the background texture is relatively fixed and the intensity is relatively strong, while the fingerprint changes greatly and the intensity is weak.
- the averaging of multiple frames can further weaken the accidental fingerprints and retain a relatively stable background texture.
- the current frame fingerprint image and the background texture can be used to perform pixel corresponding subtraction to obtain a pure fingerprint image after removing the background texture.
- performing pixel corresponding subtraction on the background texture in the fingerprint image of the current frame may include: subtracting the pixels of the fingerprint image of the current frame from the pixels of the previous N frames of the fingerprint image of the current frame The average value is obtained, and then the background texture in the fingerprint image of the current frame is reduced according to a specific algorithm (for example, multiplying by a preset coefficient and adding to a preset value).
- the fingerprint image enhancement method may further include: before eliminating the background texture of the current frame fingerprint image, performing local color transfer on the current frame fingerprint image and the background texture to Keep the brightness of the current frame fingerprint image and the background texture consistent.
- the possible problem of performing background texture elimination on the fingerprint image of the current frame is that the brightness of the fingerprint image of the current frame is inconsistent with the background texture, and direct subtraction may produce wrong results. Therefore, the fingerprint image and the background texture can be transferred locally to keep the brightness of the background texture consistent with the fingerprint image, and then corresponding pixel-by-pixel reduction can be performed to obtain a relatively pure fingerprint image, that is, the above-mentioned pure fingerprint image.
- the first preprocessing may include performing contrast enhancement and/or denoising on the pure fingerprint image.
- performing contrast enhancement and denoising on the pure fingerprint image may include:
- a preset denoising algorithm is used to perform the first filtering on the pure fingerprint image after the contrast is enhanced.
- the fingerprint image obtained after the background texture is reduced usually has a low contrast, and sometimes the overall contrast is uneven. Therefore, local contrast normalization (LCN) or local adaptive histogram equalization processing can be applied to the pure fingerprint image after the background texture is reduced to enhance the contrast of the image and make the overall contrast of the image relatively uniform.
- LN local contrast normalization
- the preset denoising algorithm can be used to take additional denoising processing to suppress the noise of the fingerprint image after the contrast is enhanced. So far, a relatively clear first preprocessed image is obtained.
- the preset denoising algorithm may include: Fast Non-Local Means Denoising (Fast Non-Local Means Denoising).
- the quality of the obtained fingerprint image is already relatively good, but further processing can be done.
- the effective area in the pure fingerprint image after the first filtering can be obtained; the effective area is obtained by calculating the pure fingerprint image according to a preset fingerprint foreground segmentation algorithm .
- the effective area in a pure fingerprint image refers to the middle part of the fingerprint image, and the surrounding area of the fingerprint image is often an invalid background part. Processing the invalid part will not only increase time overhead, but also It may cause additional interference. Therefore, the fingerprint image can be segmented, the effective fingerprint foreground can be extracted, and the invalid background part can be removed.
- the acquisition of the effective area of the first preprocessed image may adopt a preset fingerprint foreground segmentation algorithm.
- the preset fingerprint foreground segmentation algorithm may include: an improved gradient-based fingerprint image segmentation algorithm (Fingerprint Image Segmentation Based on Boundary Values), or based on the average gray value of the image block Or the segmentation method of gray variance.
- the preset fingerprint foreground segmentation algorithm can improve the performance of subsequent processing while eliminating unnecessary interference. After obtaining the fingerprint foreground area (that is, the above-mentioned effective area), normalizing the area is performed to remove the difference in image intensity caused by different pressing forces during fingerprint collection.
- S104 Perform direction field estimation and direction field correction on the effective area.
- the direction field estimation can be performed on the effective area in the pure fingerprint image.
- the direction field is an inherent attribute of the fingerprint image, which defines the invariant coordinates of the ridge and valley of the fingerprint in the local neighborhood.
- the direction field estimation may use Fourier transform, gradient method, etc. to estimate the initial direction field of the fingerprint image; the direction field correction may include: Correct the wrong part in the initial direction field of the effective area to obtain more accurate direction field results.
- the method of adopting the direction field dictionary to correct the erroneous part in the initial direction field of the effective area may include S201-S203:
- the preset direction field dictionary is obtained by training sample fingerprint images meeting preset quality requirements, extracting the direction distribution characteristics of all blocks in the sample fingerprint image and performing clustering.
- the fingerprint image can be divided into multiple blocks, and the direction distribution characteristics in each block can be calculated, so that each block is called a word in the direction field dictionary.
- the fingerprint image with better quality can be used for training in advance, and the direction distribution characteristics in all blocks can be extracted and clustered to obtain a complete direction field dictionary.
- the direction distribution of each block in the dictionary is relatively continuous and smooth.
- the blocks are divided in the same way and compared with the direction field dictionary obtained by training.
- the most similar block in the direction field dictionary is used to correct the direction distribution of the current block to make the current fingerprint
- the direction field in the image is more accurate.
- the second preprocessing may include S301-S303:
- a Gabor filter may be used to perform the second filtering on the effective area corrected by the direction field to remove noise in the image and preserve the sinusoidal ridges and valleys.
- an adaptive image binarization algorithm may be used to calculate optimal thresholds for different regions in the effective region after the second filtering, to obtain a complete binary image of the fingerprint information in the effective region. Valued image.
- the ridge line in the binarized image can be thinned to the width of one pixel, and the original topological structure of the fingerprint is retained without adding additional noise.
- a Gabor filter can be used to filter the fingerprint foreground, which can remove part of the noise in the image and retain sinusoidal ridges and valleys. Then perform the binarization operation on the filtered fingerprint image. During this period, it is very important to select the appropriate threshold. You can use the adaptive image binarization algorithm to calculate the optimal threshold for different regions to obtain a binarized image with complete fingerprint information. .
- the last step of fingerprint image preprocessing can be refinement. This step can refine the ridges in the binary image to the width of one pixel while preserving the original topological structure of the fingerprint without adding additional noise to facilitate subsequent steps. Feature extraction.
- the embodiments of the present application provide a fingerprint identification method, as shown in FIG. 4, the method may include S401-S403:
- S401 Perform enhancement processing on the captured fingerprint image of the current frame; the enhancement processing includes: performing background texture elimination on the fingerprint image of the current frame to obtain a pure fingerprint image.
- the solution of the embodiment of the present application may first perform enhancement processing on the collected fingerprint image.
- the enhancement processing may include: performing background texture elimination on the fingerprint image of the current frame to obtain a pure fingerprint image.
- the generally collected image not only contains fingerprints, but also contains the background texture of the fingerprint image (for example, the texture of the screen itself, the residual fingerprint image, etc.), so the enhancement processing can be performed first. Separate fingerprints from background texture.
- the performing background texture elimination on the fingerprint image of the current frame to obtain a pure fingerprint image may include:
- N is a positive integer
- the method of averaging the pixels of multiple frames of images can be used to obtain the background texture, that is, the pixel average is calculated using the sequence of N frames of fingerprint images before the fingerprint image of the current frame, and the result obtained can be approximated as Background texture.
- the background texture is relatively fixed and the intensity is relatively strong, while the fingerprint changes greatly and the intensity is weak.
- the averaging of multiple frames can further weaken the accidental fingerprints and retain a relatively stable background texture.
- the current frame fingerprint image and the background texture can be used to perform pixel corresponding subtraction to obtain a pure fingerprint image after removing the background texture.
- performing pixel corresponding subtraction on the background texture in the fingerprint image of the current frame may include: subtracting the pixels of the fingerprint image of the current frame from the pixels of the previous N frames of the fingerprint image of the current frame The average value is obtained, and then the background texture in the fingerprint image of the current frame is reduced according to a specific algorithm (for example, multiplying by a preset coefficient and adding to a preset value).
- the method may further include:
- the possible problem of performing background texture elimination on the fingerprint image of the current frame is that the brightness of the fingerprint image of the current frame is inconsistent with the background texture, and direct subtraction may produce wrong results. Therefore, the fingerprint image and the background texture can be transferred locally to keep the brightness of the background texture consistent with the fingerprint image, and then corresponding pixel-by-pixel reduction can be performed to obtain a relatively pure fingerprint image, that is, the above-mentioned pure fingerprint image.
- the enhancement processing may further include S501-S504:
- S501 Perform first preprocessing on the pure fingerprint image to obtain a first preprocessed image.
- the first preprocessing may include:
- a preset denoising algorithm is used to perform the first filtering on the pure fingerprint image after the contrast is enhanced.
- the fingerprint image obtained after the background texture is reduced usually has a low contrast, and sometimes the overall contrast is uneven. Therefore, local contrast normalization (LCN) or local adaptive histogram equalization processing can be applied to the pure fingerprint image after the background texture is reduced to enhance the contrast of the image and make the overall contrast of the image relatively uniform.
- LN local contrast normalization
- the preset denoising algorithm can be used to take additional denoising processing to suppress the noise of the fingerprint image after the contrast is enhanced. So far, a relatively clear first preprocessed image is obtained.
- the preset denoising algorithm may include: Fast Non-Local Means Denoising (Fast Non-Local Means Denoising).
- the quality of the fingerprint image obtained is relatively good, but further processing can be performed, for example, obtaining the pure fingerprint after the first filtering.
- the effective area in the image; the effective area is obtained by calculating the pure fingerprint image according to a preset fingerprint foreground segmentation algorithm.
- the effective area in a pure fingerprint image refers to the middle part of the fingerprint image, and the surrounding area of the fingerprint image is often an invalid background part. Processing the invalid part will not only increase time overhead, but also It may cause additional interference. Therefore, the fingerprint image can be segmented, the effective fingerprint foreground can be extracted, and the invalid background part can be removed.
- the preset fingerprint foreground segmentation algorithm may include: an improved gradient-based fingerprint image segmentation algorithm (Fingerprint Image Segmentation Based on Boundary Values), or based on the average gray value of the image block Or the segmentation method of gray variance.
- the preset fingerprint foreground segmentation algorithm can improve the performance of subsequent processing while eliminating unnecessary interference. After obtaining the fingerprint foreground area (that is, the above-mentioned effective area), normalizing the area is performed to remove the difference in image intensity caused by different pressing forces during fingerprint collection.
- S503 Perform direction field estimation and direction field correction on the effective area.
- the direction field estimation can be performed on the effective area in the pure fingerprint image.
- the direction field is an inherent attribute of the fingerprint image, which defines the invariant coordinates of the ridge and valley of the fingerprint in the local neighborhood.
- the direction field estimation may use Fourier transform, gradient method, etc. to estimate the initial direction field of the fingerprint image; the direction field correction may include: Correct the wrong part in the initial direction field of the effective area to obtain more accurate direction field results.
- the method of adopting a direction field dictionary to correct an erroneous part in the initial direction field of the effective area may include:
- the preset direction field dictionary is obtained by training sample fingerprint images that meet preset quality requirements, extracting the directional distribution characteristics of all blocks in the sample fingerprint image and performing clustering.
- the fingerprint image can be divided into multiple blocks, and the direction distribution characteristics in each block can be calculated, so that each block is called a word in the direction field dictionary.
- the fingerprint image with better quality can be used for training in advance, and the direction distribution characteristics in all blocks can be extracted and clustered to obtain a complete direction field dictionary.
- the direction distribution of each block in the dictionary is relatively continuous and smooth.
- the blocks are divided in the same way and compared with the direction field dictionary obtained by training.
- the most similar block in the direction field dictionary is used to correct the direction distribution of the current block to make the current fingerprint
- the direction field in the image is more accurate.
- S504 Perform a second preprocessing on the effective region corrected by the direction field to obtain a fingerprint enhanced image.
- the second preprocessing may include: second filtering, binarization processing, and refinement.
- the performing the second preprocessing on the effective area corrected by the direction field may specifically include S601-S603:
- S601 Use a Gabor filter to perform the second filtering on the effective area corrected by the direction field, so as to remove noise in the image and retain sinusoidal ridges and valleys;
- S603 Refine the ridge line in the binarized image to the width of one pixel, and retain the original topological structure of the fingerprint without adding additional noise.
- a Gabor filter can be used to filter the fingerprint foreground, which can remove part of the noise in the image and retain sinusoidal ridges and valleys. Then perform the binarization operation on the filtered fingerprint image. During this period, it is very important to select the appropriate threshold. You can use the adaptive image binarization algorithm to calculate the optimal threshold for different regions to obtain a binarized image with complete fingerprint information. .
- the last step of fingerprint image preprocessing can be refinement. This step can refine the ridges in the binary image to the width of one pixel while preserving the original topological structure of the fingerprint without adding additional noise to facilitate subsequent steps. Feature extraction.
- S701-S702 may be further included:
- S702 Perform distortion correction on the distorted fingerprint image.
- the problem of fingerprint distortion and deformation is usually encountered during the fingerprint identification process. This is caused by the different force and direction of the finger pressing during the collection process, which will cause the same finger to produce different Feature data affect the final recognition result. Therefore, fingerprint distortion detection and correction algorithms can be used to correct the distorted fingerprint image to an undistorted state, thereby ensuring the consistency of the final feature data.
- the performing fingerprint distortion detection on the fingerprint enhanced image may include:
- the fingerprint enhanced image is input into a classifier for classification, and the classification result includes a normal fingerprint image and a distorted fingerprint image.
- the distortion of the fingerprint may cause the final extracted feature data to be different from the normal state, which greatly reduces the matching score and causes an incorrect recognition result. Therefore, the fingerprint image can be detected for distortion first, and if the distortion is detected, the fingerprint image is corrected to restore the fingerprint image to a normal state.
- a large number of normal fingerprint images and distorted fingerprint images collected in advance can be used to train a classifier, and the enhanced fingerprint image can be input into the trained classifier, and the currently input fingerprint image can be divided into two categories. If the classification result is distorted, distortion correction is performed on the fingerprint image.
- the performing distortion correction on the distorted fingerprint image may include S801-S803:
- S803 Perform inverse transformation correction on the twisted fingerprint image according to the reference twisted fingerprint.
- the distortion correction may be completed by estimating the distortion field of the distorted fingerprint image and inversely transforming it.
- a database set which contains the distortion field corresponding to various distortion fingerprints (distortion field refers to the transformation relationship between a fingerprint from a normal undistorted state to a distorted state), direction field and periodogram (period The graph refers to the ridge period or frequency (representing the density of ridges) at each position in the fingerprint image.
- Specific methods can include: collecting common image pairs of normal fingerprints and distorted fingerprints, so as to obtain statistical models of common distorted fields through these image pairs, and use these statistical models to synthesize a large number of distorted fields and act on the normal fingerprint images to obtain normal fingerprints.
- the set of twisted fingerprint images corresponding to the images and their direction fields and periodograms is used as the aforementioned database set.
- the distortion correction of the fingerprint image may include: for the currently detected distortion fingerprint image, its direction field and periodogram may be extracted first, and then the characteristics of the current distortion fingerprint image may be searched in the database. According to the closest reference twisted fingerprint, the current twisted fingerprint image is inversely transformed and corrected according to the twisted field corresponding to the twisted fingerprint to restore the current twisted fingerprint image to a normal state.
- S402 Perform feature extraction on the fingerprint enhanced image to obtain feature data.
- the feature data may include, but is not limited to: minutiae point features and ridge line features of fingerprint ridges.
- the fingerprint image enhancement processing can be completed after the above steps, and the distortion of the fingerprint can be corrected, thereby obtaining a high-quality fingerprint image.
- features can be extracted from the refined fingerprint ridges to obtain feature data.
- minutiae features may be extracted, and the minutiae features may include end points and bifurcation points of ridges and the like.
- the feature data of the current fingerprint image can be obtained.
- S403 Perform fingerprint identification according to the comparison between the characteristic data and the characteristic data of the fingerprint template.
- the completion of fingerprint identification based on the comparison of the characteristic data with the characteristic data of the fingerprint template may include:
- fingerprint recognition is completed.
- the similarity between different fingerprints can be calculated, and the similarity can be calculated according to the similarity.
- the internally stored fingerprint template that is, the preset feature data of different fingerprints
- the internally stored fingerprint template that is, the preset feature data of different fingerprints
- the adopted sub-structure can be minutiae points and multiple related ridge lines, specifically: minutiae points, minutiae points A substructure formed by the ridge line and the ridge lines adjacent to both sides of the ridge line.
- the minutia points (the end points or bifurcation points inside the ridge line represent minutiae points, as shown by the black dots in Figure 9-a and 9-b), and then draw a line along the vertical ridge line through the minutia points
- the two intersection points of a straight line, a straight line and adjacent ridges are called projection points.
- the ridges in the substructure are split through the minutiae points and projection points, and they are labeled according to their relative positions and directions, as shown in Figure 9-a , As shown in Figure 9-b.
- the original complete black line in the figure represents the ridge line (2+3, 4+5, 1 in Figure 9-a and 4+5, 3+1, 3+2, 6+7 in Figure 9-b),
- the end points or bifurcation points inside the ridge line represent the detail points (shown as the black dots in Figure 9-a and 9-b).
- the white points in the figure are the projection points.
- the ridge line is split by the detail points or projection points to obtain sub-ridges Lines (as shown in 2, 3, 1, 4, 5 in 9-a and 4, 5, 3, 1, 2, 6, 7 in Figure 9-b).
- the originally matched pair of minutiae points and sub-structure pairs should be completely overlapped after the alignment transformation, but in fact, due to the error of the minutiae extraction process and the alignment transformation and the real physics The error of the transformation results in the incomplete matching between the pair of minutiae points and the pair of substructures. Therefore, a more stable matching scheme can be used to calculate the similarity between fingerprints.
- the following two aspects can be mainly considered: 1.
- Minutiae pair aspect You can first select a reference minutiae point and convert all other minutiae points into The reference minutiae point is the polar coordinate of the origin; then all minutiae points can be connected in an ascending order of angle to form a feature string; finally, the edit distance between the fingerprint template feature string and the current fingerprint feature string can be calculated, according to the edit distance Determine the matching score between pairs of minutiae points.
- Sub-structure pair aspect It can traverse the first N pairs of sub-structures that are most matched when fingerprints are aligned.
- the corresponding ridges in each pair of sub-structures form the initial matching ridge pair, and the matching ridge pairs are adjacent
- the ridge pair constitutes a new matching ridge pair, thus obtaining the matching ridge pair set of the two fingerprints.
- the matching score between the substructure pairs can be obtained by the proportion of matching points on the matching ridge pair and the proportion of matching minutiae points in the matching substructure pairs.
- the minutiae pair matching score and the substructure pair matching score can be integrated to obtain the final similarity between two fingerprint images. By comparing the seeded similarity with the preset similarity threshold, the current two can be confirmed Whether the fingerprint is matched successfully.
- a method for starting an application program based on fingerprint recognition is also provided.
- the method for starting an application program may further include S1001-S1003:
- the application startup method may further include, before the fingerprint image is collected, detecting whether the touch operation of the finger on the touch screen satisfies a preset condition for initiating the fingerprint image collection step.
- the application program may be a computer program that allows only authorized personnel to access to protect user privacy, personal information, or confidential information of enterprises and institutions.
- the application startup method can also complete identity verification while starting the application.
- the user identity information corresponding to the application and the fingerprint can be collected when the application is successfully opened by fingerprint recognition, and used for big data analysis.
- the user's preferences and habits can be analyzed by collecting information such as the frequency and time of use of the application by the user, which can help application developers to make market planning.
- the application is first opened by tapping or touching with a finger, and then when the application prompts for fingerprint verification, pressing the finger on the specific fingerprint recognition area again can complete the identity verification. It can be seen that in this traditional method, at least two steps are required to start the application and complete the identity verification. The operation is cumbersome and time-consuming, which reduces the user experience to a certain extent.
- the identity verification can be completed at the same time as the application is started, so as to confirm that the user has the authority to perform corresponding operations on the application and provide access to the application. Secure access to programs (for example, secure financial transactions).
- a fingerprint sensing system 1 is also provided. As shown in FIG. 11, the fingerprint sensing system may include: a display screen 11, a fingerprint acquisition module 12, and a fingerprint recognition module 13. .
- the display screen 11 includes a light-emitting display unit for displaying pictures.
- the light-emitting display unit may be a self-luminous display unit, such as a light-emitting diode (Light-Emitting Diode, LED), an organic light-emitting diode (Organic Light-Emitting Diode, OLED), or a micro light-emitting diode (Micro LED). -LED) etc.
- the light-emitting display unit may also be a passive light-emitting display unit, such as a liquid crystal display (LCD) or the like.
- the fingerprint collection module 12 is arranged at least in a partial area below the display screen for collecting fingerprint images.
- the fingerprint collection module can be arranged at least in a partial area below the display screen to Reduce the occupation of the display area.
- the fingerprint recognition module 13 is used to receive the fingerprint image of the current frame, and use the above fingerprint recognition method to perform fingerprint recognition on the fingerprint image.
- the display screen 11 may be a touch display screen, which can not only perform screen display, but also detect the operation of the user's finger (such as touching, pressing, or approaching the display screen), thereby providing the user with a person Computer interactive interface.
- the fingerprint sensing system may further include a touch panel (Touch Panel, TP).
- the touch panel may be provided on the surface of the display screen, or may be partially or wholly integrated in The display screen constitutes a touch screen.
- the fingerprint sensing system 1 may further include a cover plate, which is arranged above the display screen as an interface for the user to touch and display the screen, so as to protect the display screen.
- the cover plate can be glass or sapphire, and is not limited thereto.
- the fingerprint collection module 12 may include an optical collimator and a photodetector (Photo Detector). Through the optical collimator, only the light whose incident angle is smaller than the preset angle can reach the photodetector.
- the fingerprint acquisition module may include a lens and an imaging unit, wherein the imaging unit may be arranged under the lens, and the lens imaging principle is used to directly obtain Fingerprint image on the display.
- the lens can be a convex lens.
- one or more lenses and imaging units can be respectively arranged under the display, so as to realize fingerprint collection and recognition in a partial area of the screen, half screen or full screen.
- the lens and the imaging unit may be independent components or an integrated component. When the lens and the imaging unit are independent of each other, the numbers of the two may not necessarily correspond to one another.
- the fingerprint acquisition module is used to obtain fingerprints by detecting light emitted from the display screen and reflected on the surface of the finger back to the display screen.
- the fingerprint acquisition module may include a first photoelectric sensor, and the first photoelectric sensor may obtain a fingerprint image by detecting light emitted from the display screen and reflected on the surface of the finger back to the display screen.
- the refractive index at the ridge line of the fingerprint is greater than the refractive index at the valley line of the fingerprint, so the fingerprint valley line will form Total reflection, there is no total reflection at the fingerprint ridge line, but a part of the light will be transmitted to the inside of the finger, which will cause the intensity of the reflected light at the fingerprint valley line to be greater than the reflected light at the fingerprint ridge line.
- the intensity of the light reflected back to the display screen can determine the fingerprint ridgeline and fingerprint valley line to obtain a fingerprint image.
- the excitation light is a built-in luminous display unit and the intensity of the reflected light needs to be detected, the ambient light has a greater impact on the effect.
- the difference in the intensity of the reflected light is small, the fingerprint image will be reduced. Clarity.
- the fingerprint collection module 12 can also obtain a fingerprint by detecting light that penetrates into the display screen from a finger. An image, wherein when a light with a refraction angle greater than the first threshold is detected, the light can be determined as a fingerprint ridge, otherwise the light is determined as a fingerprint valley, and the fingerprint image is obtained according to the fingerprint ridge and fingerprint valley .
- the first threshold may be the refraction angle at the valley line of the fingerprint.
- the fingerprint collection module 12 may include an optical path guiding module for guiding light with a refraction angle greater than the first threshold.
- the fingerprint collection module 12 may also include a photoelectric sensor (a second photoelectric sensor).
- the second photoelectric sensor can be used to determine the fingerprint ridge line when the light whose refraction angle is greater than the first threshold is detected, otherwise it is the fingerprint valley line. , Thereby obtaining fingerprint patterns.
- the second photosensor may be a complementary metal oxide semiconductor CMOS sensor, a thin film transistor TFT sensor, or other customized sensors.
- CMOS complementary metal oxide semiconductor
- TFT thin film transistor
- the excitation light itself is ambient light
- the acquisition of the fingerprint image is not affected by ambient light.
- the stronger the ambient light the better the collection effect.
- the light-emitting display unit built into the display screen around the finger can be illuminated or the external light source can be illuminated to enhance the intensity of the light.
- the display area of the display screen can be extended to the entire surface of the electronic device.
- the fingerprint sensing system can be installed in a partial area or the entire area below the display screen, thereby realizing partial area, half-screen or full-screen fingerprint recognition.
- the fingerprint sensing system is usually set in the area outside the display screen and the contact surface with the finger is small, such as the Apple iPhone 6, which has great restrictions on the identification object and identification method, and is not suitable for collecting and identifying large patterns. (For example, palm prints), it is not suitable for simultaneous identification and verification of multiple identification objects.
- one or more independent or integral fingerprint sensing systems can be set in the partial area, half-screen area, or full-screen area under the display screen, it is possible to realize the detection of large patterns (for example, Palmprints) are collected and identified to expand the application scenarios; and multiple identification objects can be identified and verified at the same time to enhance the security of the application.
- a financial payment application can be set to verify the fingerprints of two people at the same time. In order to start and complete the payment, you can set the full-screen fingerprint recognition, so that the fingers of two people can touch any area of the display at the same time.
- the technical solutions of the embodiments of the present application can be applied to various electronic devices with display screens, such as smart phones, notebook computers, tablet computers, digital cameras, game consoles, smart bracelets, and smart phones.
- Portable or wearable electronic devices such as watches, and other electronic devices such as automated teller machines (ATM), information management systems, electronic door locks, etc.
- ATM automated teller machines
- the technical solutions of the embodiments of the present application can also perform other biometric identifications other than fingerprints, which are not limited in the embodiments of the present application.
- an electronic device A is also provided. As shown in FIG. 15, the electronic device may include:
- the memory 3 is configured to store executable instructions of the processor 2;
- the processor 2 is configured to execute the fingerprint identification method of any one of the foregoing by executing the executable instruction.
- the electronic device A may further include the fingerprint sensing system 1 described in any one of the above.
- the storage medium includes a stored program, wherein when the program runs, the device where the storage medium is located is controlled to execute any one of the foregoing contents.
- Fingerprint recognition can be performed at any position on the mobile phone screen, which is flexible and free.
- Such software may be distributed on a computer-readable medium
- the computer-readable medium may include a computer storage medium (or non-transitory medium) and a communication medium (or transitory medium).
- the term computer storage medium includes volatile and non-volatile memory implemented in any method or technology for storing information (such as computer-readable instructions, data structures, program modules, or other data).
- Computer storage media include but are not limited to RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassette, tape, magnetic disk storage or other magnetic storage device, or Any other medium used to store desired information and that can be accessed by a computer.
- communication media usually contain computer-readable instructions, data structures, program modules, or other data in a modulated data signal such as carrier waves or other transmission mechanisms, and may include any information delivery media .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Biomedical Technology (AREA)
- Collating Specific Patterns (AREA)
- Geometry (AREA)
- Image Input (AREA)
- Image Processing (AREA)
- Image Analysis (AREA)
Abstract
Description
Claims (30)
- 一种指纹图像增强方法,所述方法包括:消除当前帧指纹图像的背景纹理,获取纯指纹图像;对所述纯指纹图像进行第一预处理,获得第一预处理图像;获取所述第一预处理图像的有效区域;对所述有效区域进行方向场估计和方向场校正;对经过方向场校正的所述有效区域进行第二预处理,获得指纹增强图像。
- 根据权利要求1所述的指纹图像增强方法,其中,所述背景纹理为所述当前帧指纹图像之前N帧指纹图像的像素均值,其中,N为正整数。
- 根据权利要求1所述的指纹图像增强方法,其中,所述消除指纹图像的背景纹理,获得纯指纹图像包括:在所述当前帧指纹图像中对所述背景纹理进行像素对应消减,获取所述纯指纹图像。
- 根据权利要求1所述的指纹图像增强方法,其中,在消除当前帧指纹图像的背景纹理之前,对所述当前帧指纹图像和所述背景纹理进行局部颜色传递。
- 根据权利要求1所述的指纹图像增强方法,其中,所述第一预处理包括对所述纯指纹图像进行对比度增强和/或去噪。
- 根据权利要求1所述的指纹图像增强方法,其中,所述获取所述第一预处理图像的有效区域采用预设的指纹前景分割算法。
- 根据权利要求1所述的指纹图像增强方法,其中,所述第二预处理包括:对所述有效区域去噪;获取二值化图像;将所述二值化图像中的指纹脊线进行细化,获得所述指纹增强图像。
- 一种指纹识别方法,所述方法包括:对采集的当前帧指纹图像进行增强处理,获得指纹增强图像;所述增强处理包括:消除当前帧指纹图像的背景纹理,获得纯指纹图像;对所述指纹增强图像进行特征提取,获取特征数据;根据所述特征数据与指纹模板的特征数据的比对完成指纹识别。
- 根据权利要求8所述的指纹识别方法,其中,所述增强处理还包括:对所述纯指纹图像进行第一预处理,获得第一预处理图像;获取所述第一预处理图像的有效区域;对所述有效区域进行方向场估计和方向场校正;对经过方向场校正的所述有效区域进行第二预处理,获得指纹增强图像。
- 根据权利要求8所述的指纹识别方法,其中,所述背景纹理为所述当前帧指纹图像之前N帧指纹图像的像素均值,其中,N为正整数。
- 根据权利要求8所述的指纹识别方法,其中,所述消除指纹图像的背景纹理,获得纯指纹图像包括:在所述当前帧指纹图像中对所述背景纹理进行像素对应消减,获取所述纯指纹图像。
- 根据权利要求8所述的指纹识别方法,其中,在消除当前帧指纹图像的背景纹理之前,对所述当前帧指纹图像和所述背景纹理进行局部颜色传递。
- 根据权利要求8所述的指纹识别方法,其中,在对所述指纹增强图像进行特征提取之前还包括:对所述指纹增强图像进行指纹扭曲检测,确定所述指纹增强图像为正常指纹图像或扭曲指纹图像;对所述扭曲指纹图像进行扭曲校正。
- 根据权利要求13所述的指纹识别方法,其中,对所述指纹增强图像进行指纹扭曲检测包括:将所述指纹增强图像输入分类器进行分类,分类结果包括正常指纹图像和扭曲指纹图像。
- 根据权利要求13所述的指纹识别方法,其中,对所述扭曲指纹图像进行扭曲校正包括:提取所述扭曲指纹图像的方向场和周期图;根据所述方向场和周期图在数据库集中查找与所述扭曲指纹图像最接近的参考扭曲指纹;根据所述参考扭曲指纹对所述扭曲指纹图像进行逆变换校正。
- 根据权利要求8所述的指纹识别方法,其中,所述特征数据包括指纹脊线的细节点特征和/或脊线特征。
- 根据权利要求8所述的指纹识别方法,其中,根据所述特征数据与指纹模板的特征数据的比对完成指纹识别包括:计算所述特征数据与所述指纹模板的特征数据的特征相似度;当所述特征相似度大于或等于特征相似度阈值时,完成指纹识别。
- 一种基于指纹识别的应用程序启动方法,所述应用程序启动方法包括:采集指纹图像;采用权利要求8至17中任意一项所述的指纹识别方法,对所述指纹图像进行指纹识别;当指纹识别成功时开启所述应用程序。
- 根据权利要求18所述的应用程序启动方法,其中,在所述采集指纹图像之前,检测触控屏上手指的触控操作是否满足启动采集指纹图像步骤的预设条件。
- 根据权利要求18所述的应用程序启动方法,其中,所述方法还包括:在开启所述应用程序的同时完成身份验证。
- 一种指纹感测系统,包括:显示屏,包括发光显示单元,设置为显示画面;指纹采集模组,至少设置在所述显示屏下方的局部区域,设置为采集指纹图像;指纹识别模组,设置为接收所述指纹图像,并采用权利要求8至17中任意一项所述的指纹识别方法,对所述指纹图像进行指纹识别。
- 根据权利要求21所述的指纹感测系统,其中,所述指纹采集模组包括:透镜;成像单元,设置于所述透镜下方,设置为直接获取所述显示屏上的指纹图像。
- 根据权利要求21所述的指纹感测系统,其中,所述指纹采集模组用于通过检测自显示屏发出并在手指表面反射回显示屏的光线来获得指纹图像。
- 根据权利要求21所述的指纹感测系统,其中,所述指纹采集模组通过检测从手指透入显示屏的光线获得指纹图像;其中,当检测到折射角大于第一阈值的光线时,确定为指纹脊线,当检测到折射角小于或等于所述第一阈值的光线时,确定为指纹谷线,根据所述指纹脊线和所述指纹谷线获得所述指纹图像。
- 根据权利要求24所述的指纹感测系统,其中,所述第一阈值为所述指纹谷线处的折射角。
- 根据权利要求24所述的指纹感测系统,其中,所述指纹采集模组还包括光路引导模组,设置为引导折射角大于所述第一阈值的光线。
- 根据权利要求24所述的指纹感测系统,其中,所述指纹采集模组还包括光电传感器,设置为在检测到折射角大于所述第一阈值的光线时,确定所述光线为指纹脊线,在检测到折射角小于或等于所述第一阈值的光线时,确定所述光线为指纹谷线,从而获得指纹图案。
- 一种电子设备,包括:处理器;以及存储器,用于存储所述处理器的可执行指令;其中,所述处理器配置为经由执行所述可执行指令来执行权利要求8至17中任意一项所述的指纹识别方法。
- 根据权利要求28所述的电子设备,其中,还包括权利要求20-27任意一项所述的指纹感测系统。
- 一种存储介质,所述存储介质包括存储的程序,其中,在所述程序运行时控制所述存储介质所在设备执行权利要求8至17中任意一项所述的指纹识别方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP20774228.9A EP3940583A4 (en) | 2019-03-15 | 2020-03-10 | PROCEDURE FOR FINGERPRINT IMAGE ENHANCEMENT, FINGERPRINT RECOGNITION AND LAUNCHING AN APPLICATION |
KR1020217033357A KR20210136127A (ko) | 2019-03-15 | 2020-03-10 | 지문 이미지 강조, 지문 인식, 애플리케이션 프로그램 기동 방법, 지문 감지 시스템, 전자기기 및 저장 매체 |
US17/041,465 US11874907B2 (en) | 2019-03-15 | 2020-03-10 | Method for enhancing fingerprint image, identifying fingerprint and starting-up application program |
JP2021555011A JP7377879B2 (ja) | 2019-03-15 | 2020-03-10 | 指紋画像強調、指紋認識、アプリケーションプログラム起動方法、指紋検知システム、電子機器及び記憶媒体 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910198302.7A CN111695386B (zh) | 2019-03-15 | 2019-03-15 | 一种指纹图像增强、指纹识别和应用程序启动方法 |
CN201910198302.7 | 2019-03-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2020187098A1 true WO2020187098A1 (zh) | 2020-09-24 |
Family
ID=72475347
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/078648 WO2020187098A1 (zh) | 2019-03-15 | 2020-03-10 | 一种指纹图像增强、指纹识别和应用程序启动方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US11874907B2 (zh) |
EP (1) | EP3940583A4 (zh) |
JP (1) | JP7377879B2 (zh) |
KR (1) | KR20210136127A (zh) |
CN (1) | CN111695386B (zh) |
WO (1) | WO2020187098A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112884756A (zh) * | 2021-03-12 | 2021-06-01 | 敦泰电子(深圳)有限公司 | 一种指纹图像处理方法、指纹芯片及电子设备 |
CN113570699A (zh) * | 2021-06-24 | 2021-10-29 | 清华大学 | 三维指纹重建的方法和装置 |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112668399B (zh) * | 2020-12-07 | 2022-05-17 | 北京极豪科技有限公司 | 图像处理方法、指纹信息提取方法、装置、设备及介质 |
CN114648548A (zh) * | 2020-12-17 | 2022-06-21 | 虹软科技股份有限公司 | 图像处理方法、描述子提取方法及其装置、电子设备 |
TWI785443B (zh) * | 2020-12-25 | 2022-12-01 | 大陸商北京集創北方科技股份有限公司 | 大面積屏下光學指紋採集方法、指紋辨識裝置、及資訊處理裝置 |
CN113408416B (zh) * | 2021-06-18 | 2023-04-07 | 展讯通信(上海)有限公司 | 指纹频率估计方法及装置、指纹信息提取方法及装置 |
CN114356103A (zh) * | 2022-01-30 | 2022-04-15 | 清华大学 | 基于指纹图像的三维位姿增量控制方法及装置 |
CN114368692B (zh) * | 2022-03-21 | 2022-06-14 | 杭州杰牌传动科技有限公司 | 智能塔吊物联网协同方法和系统 |
CN114913555A (zh) * | 2022-05-30 | 2022-08-16 | 深圳芯启航科技有限公司 | 指纹特征点获取方法、装置、电子设备及存储介质 |
US11972632B1 (en) * | 2023-03-31 | 2024-04-30 | Republic Of Korea (National Service Director Ministry Of The Interior And Safety) | Apparatus and method of digital enhancement of fingerprint ridges |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1480898A (zh) * | 2003-07-21 | 2004-03-10 | 上海海运学院 | 指纹识别系统 |
CN101609499A (zh) * | 2008-06-20 | 2009-12-23 | 南京理工大学 | 快速指纹识别方法 |
CN102999750A (zh) * | 2012-12-31 | 2013-03-27 | 清华大学 | 一种去除背景干扰的现场指纹增强方法 |
CN103065134A (zh) * | 2013-01-22 | 2013-04-24 | 江苏超创信息软件发展股份有限公司 | 一种具有提示信息的指纹识别装置和方法 |
CN106342325B (zh) * | 2009-12-23 | 2013-08-14 | 凯迈(洛阳)电子有限公司 | 一种指纹图像的区域分割方法 |
CN103996026A (zh) * | 2014-05-15 | 2014-08-20 | 清华大学 | 指纹特征提取方法、装置及系统 |
CN105205442A (zh) * | 2015-08-07 | 2015-12-30 | 北京天诚盛业科技有限公司 | 指纹采集的方法和装置 |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5963656A (en) * | 1996-09-30 | 1999-10-05 | International Business Machines Corporation | System and method for determining the quality of fingerprint images |
US5995642A (en) * | 1997-06-30 | 1999-11-30 | Aetex Biometric Corporation | Method for automatic fingerprint classification |
US7054470B2 (en) * | 1999-12-02 | 2006-05-30 | International Business Machines Corporation | System and method for distortion characterization in fingerprint and palm-print image sequences and using this distortion as a behavioral biometrics |
US6876757B2 (en) | 2001-05-25 | 2005-04-05 | Geometric Informatics, Inc. | Fingerprint recognition system |
US20040175023A1 (en) * | 2001-07-05 | 2004-09-09 | Ola Svedin | Method and apparatus for checking a person's identity, where a system of coordinates, constant to the fingerprint, is the reference |
JP2003051012A (ja) * | 2001-08-03 | 2003-02-21 | Nec Corp | ユーザ認証方法及びユーザ認証装置 |
US7680354B2 (en) * | 2006-03-22 | 2010-03-16 | Arcsoft, Inc. | Image deblur based on two images |
CN100412883C (zh) * | 2006-03-23 | 2008-08-20 | 北京中控科技发展有限公司 | 指纹识别方法与系统 |
US20080016371A1 (en) * | 2006-07-14 | 2008-01-17 | Arachnoid Biometrics Identification Group Corp. | System and Method for Registering a Fingerprint, for Setting a Login Method of an Application, and for Logining in the Application |
JP2008276758A (ja) | 2007-03-31 | 2008-11-13 | Univ Waseda | 指紋特異点抽出装置及び指紋特異点抽出方法 |
GB2450479A (en) * | 2007-06-22 | 2008-12-31 | Warwick Warp Ltd | Fingerprint recognition including preprocessing an image by justification and segmentation before plotting ridge characteristics in feature space |
CN101079102A (zh) * | 2007-06-28 | 2007-11-28 | 中南大学 | 基于统计方法的指纹识别方法 |
US20120127179A1 (en) * | 2010-11-19 | 2012-05-24 | Nokia Corporation | Method, apparatus and computer program product for user interface |
CN102270297B (zh) * | 2011-07-21 | 2012-12-19 | 中国人民解放军国防科学技术大学 | 一种指纹图像增强方法 |
CN102609705A (zh) * | 2012-01-20 | 2012-07-25 | 西安电子科技大学 | 一种基于扩散方程的低质量指纹图像方向场提取方法 |
CN102682428B (zh) * | 2012-04-18 | 2014-11-05 | 浙江大学城市学院 | 一种基于方向场的指纹图像计算机自动化修补方法 |
KR101432011B1 (ko) * | 2013-03-22 | 2014-08-21 | 주식회사 슈프리마 | 지문 영상 처리 장치 및 방법 |
CN104156707B (zh) * | 2014-08-14 | 2017-09-22 | 深圳市汇顶科技股份有限公司 | 指纹识别方法及其指纹识别装置 |
CN104765994A (zh) * | 2015-04-17 | 2015-07-08 | 努比亚技术有限公司 | 用户身份识别方法及装置 |
US10067229B2 (en) * | 2015-09-24 | 2018-09-04 | Qualcomm Incorporated | Receive-side beam forming for an ultrasonic image sensor |
JP2017138858A (ja) | 2016-02-04 | 2017-08-10 | 富士通株式会社 | 生体認証装置、生体認証方法および生体認証プログラム |
CN106709450A (zh) * | 2016-12-23 | 2017-05-24 | 上海斐讯数据通信技术有限公司 | 一种指纹图像识别方法及系统 |
CN108664177B (zh) | 2017-03-29 | 2021-11-12 | 上海耕岩智能科技有限公司 | 一种基于指纹识别开启应用的方法和装置 |
JP6948146B2 (ja) | 2017-04-18 | 2021-10-13 | サンデン・オートモーティブクライメイトシステム株式会社 | 車両用空気調和装置 |
CN107239737A (zh) * | 2017-05-03 | 2017-10-10 | 广东欧珀移动通信有限公司 | 一种光学指纹识别方法及相关产品 |
CN107454963B (zh) * | 2017-06-16 | 2021-11-30 | 深圳市汇顶科技股份有限公司 | 指纹图像处理方法及光学指纹辨识系统 |
-
2019
- 2019-03-15 CN CN201910198302.7A patent/CN111695386B/zh active Active
-
2020
- 2020-03-10 EP EP20774228.9A patent/EP3940583A4/en active Pending
- 2020-03-10 US US17/041,465 patent/US11874907B2/en active Active
- 2020-03-10 JP JP2021555011A patent/JP7377879B2/ja active Active
- 2020-03-10 KR KR1020217033357A patent/KR20210136127A/ko not_active Application Discontinuation
- 2020-03-10 WO PCT/CN2020/078648 patent/WO2020187098A1/zh unknown
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1480898A (zh) * | 2003-07-21 | 2004-03-10 | 上海海运学院 | 指纹识别系统 |
CN101609499A (zh) * | 2008-06-20 | 2009-12-23 | 南京理工大学 | 快速指纹识别方法 |
CN106342325B (zh) * | 2009-12-23 | 2013-08-14 | 凯迈(洛阳)电子有限公司 | 一种指纹图像的区域分割方法 |
CN102999750A (zh) * | 2012-12-31 | 2013-03-27 | 清华大学 | 一种去除背景干扰的现场指纹增强方法 |
CN103065134A (zh) * | 2013-01-22 | 2013-04-24 | 江苏超创信息软件发展股份有限公司 | 一种具有提示信息的指纹识别装置和方法 |
CN103996026A (zh) * | 2014-05-15 | 2014-08-20 | 清华大学 | 指纹特征提取方法、装置及系统 |
CN105205442A (zh) * | 2015-08-07 | 2015-12-30 | 北京天诚盛业科技有限公司 | 指纹采集的方法和装置 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112884756A (zh) * | 2021-03-12 | 2021-06-01 | 敦泰电子(深圳)有限公司 | 一种指纹图像处理方法、指纹芯片及电子设备 |
CN113570699A (zh) * | 2021-06-24 | 2021-10-29 | 清华大学 | 三维指纹重建的方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
US20220084319A1 (en) | 2022-03-17 |
JP2022524833A (ja) | 2022-05-10 |
CN111695386A (zh) | 2020-09-22 |
CN111695386B (zh) | 2024-04-26 |
US11874907B2 (en) | 2024-01-16 |
EP3940583A1 (en) | 2022-01-19 |
EP3940583A4 (en) | 2022-09-07 |
KR20210136127A (ko) | 2021-11-16 |
JP7377879B2 (ja) | 2023-11-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020187098A1 (zh) | 一种指纹图像增强、指纹识别和应用程序启动方法 | |
US10339362B2 (en) | Systems and methods for performing fingerprint based user authentication using imagery captured using mobile devices | |
US20220165087A1 (en) | Systems and methods for performing fingerprint based user authentication using imagery captured using mobile devices | |
US11263432B2 (en) | Systems and methods for performing fingerprint based user authentication using imagery captured using mobile devices | |
AU2017370720B2 (en) | Systems and methods for performing fingerprint based user authentication using imagery captured using mobile devices | |
US10558841B2 (en) | Method and apparatus for recognizing fingerprint ridge point | |
US9710691B1 (en) | Touchless fingerprint matching systems and methods | |
US20170154202A1 (en) | Feature extraction and matching for biometric authentication | |
US20160379042A1 (en) | Apparatuses, systems, and methods for confirming identity | |
CN113614731A (zh) | 使用软生物特征的认证验证 | |
Ravi et al. | A novel method for touch-less finger print authentication | |
WO2018107574A1 (zh) | 一种对印防伪特征的检测方法及装置 | |
CN111259757A (zh) | 一种基于图像的活体识别方法、装置及设备 | |
WO2023028947A1 (zh) | 掌静脉非接触式三维建模方法、装置及认证方法 | |
US11120285B2 (en) | Intelligent terminal | |
US11120284B2 (en) | Startup authentication method for intelligent terminal | |
CN112801034A (zh) | 一种指静脉识别装置 | |
CN115841684A (zh) | 指纹滑动录入方法、电子设备和计算机可读介质 | |
CN112861756A (zh) | 一种指静脉识别方法及系统 | |
Galdi | Design and development of multi-biometric systems | |
Chiara | Design and Development of multi-biometric systems | |
Jagtap Dipali et al. | IRIS Biometrics for Embedded Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20774228 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021555011 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20217033357 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2020774228 Country of ref document: EP Effective date: 20211015 |