776 R. IWAI ET AL.

Table 3. MERs for various damage ratios.

Damage ratio 0.780% 3.87% 7.66% 10.6% 14.3%

MER (%) 1.47 × 10–19 2.04 × 10–9 2.03 × 10–6 1.69 × 10–4 1.09 × 10–3

Threshold 0.745 0.606 0.552 0.511 0.492

Table 4. Specifications of the marketed products based on

the frequency analysis method.

Security level FAR FRR

Low <0.01% N/A

Normal <0.001% <0.1%

High <0.0001% N/A

As a result, we found that clearer impostor authentication

can be achieved in the case that they are changed to each

fingerprint identifier. Moreover, the effects of damage of

the 2D real fingerprints on the genuine authentication

accuracy were analyzed. As a result, it was found that

higher genuine authentication can be achieved in our

method in comparison with that in the conventional fin-

gerprint authentication device based on the frequency

analysis method, even if the damage ratio is 14.3% and

the image correction is not conducted.

As a further study, we would analyze the effects of the

misalignment of the scanned fingerprint image with that

used in generating the fingerprint template on the au-

thentication accuracy.

6. References

[1] R. Iwai and H. Yoshimura, “A New Method for Improv-

ing Robustness of Registered Fingerprint Data Using the

Fractional Fourier Transform,” International Journal of

Communications, Network and System Sciences, Vol. 3,

No. 9, 2010, pp. 722-729. doi:10.4236/ijcns.2010.39096

[2] R. Iwai and H. Yoshimura, “Matching Accuracy Analysis

of Fingerprint Templates Generated by Data Processing

Method Using the Fractional Fourier Transform,” Inter-

national Journal of Communications, Network and Sys-

tem Sciences, Vol. 4, No. 1, 2011, pp. 24-32.

doi:10.4236/ijcns.2011.41003

[3] R. Iwai and H. Yoshimura, “New Method for Increasing

Matching Accuracy and Reducing Process Time of Fin-

gerprint Data by the Fractional Fourier Transform,” Pro-

ceedings of 2010 IEEE 17th International Conference on

Image Processing, Vol. 3, Hong Kong, 26-29 September

2010, pp. 3061-3064.

[4] R. Iwai and H. Yoshimura, “High-Accuracy and High-

Security Individual Authentication by the Fingerprint Tem-

plate Generated Using the Fractional Fourier Transform,”

In: G. Nikolic, Ed., Fourier Transforms—Approach to Sci-

entific Principles, InTech, Croatia, 2011, pp. 281-294.

[5] D. Mendlovic and H. M. Ozatkas, “Fractional Fourier Trans-

forms and Their Optical Implementation: I,” Journal of

the Optical Society of America A, Vol. 10, No. 9, 1993,

pp. 1875-1881. doi:10.1364/JOSAA.10.001875

[6] H. M. Ozatkas and D. Mendlovic, “Fractional Fourier Trans-

forms and Their Optical Implementation: II,” Journal of

the Optical Society of America A, Vol. 10, No. 12, 1993,

pp. 2522-2531. doi:10.1364/JOSAA.10.001875

[7] F. J. Marinho and L. M. Bernardo, “Numerical Calculation

of Fractional Fourier Transforms with a Single Fast-Fou-

rier-Transform Algorithm,” Journal of the Optical Soci-

ety of America A, Vol. 15, No. 8, 1998, pp. 2111-2116.

doi:10.1364/JOSAA.15.002111

[8] H. M. Ozaktas, Z. Zalevsky and M. A. Kutay, “The Frac-

tional Fourier Transform,” John Wiley & Sons, Hoboken,

2001.

[9] X. Yang, Q. Tan, X. Wei, Y. Xiang, Y. Yan and G. Jin, “Im-

proved Fast Fractional-Fourier-Transforms Algorithm,”

Journal of the Optical Society of America A, Vol. 21, No.

9, 2004, pp. 1677-1681. doi:10.1364/JOSAA.21.001677

[10] H. M. Lee, H. Maeng and Y. Bae, “Fake Finger Detection

Using the Fractional Fourier Transform,” Proceedings of

International Conference on Biometric ID Managemen

and Multimodal Communication, Madrid, 16-18 Septem-

ber 2009, pp. 318-324.

[11] D. Cui, “A Novel Fingerprint Encryption Algorithm Ba-

sed on Chaotic System and Fractional Fourier Trans-

form,” Proceedings of International Conference on Ma-

chine Vision and Human-machine Interface, Kaifeng, 24-

25 April 2010, pp. 168-171. doi:10.1109/MVHI.2010.38

[12] M. Juan, O. Vilardy, O. Cesar, M. Torres and M. V. Lo-

renzo, “Images Encryption via Discrete Fractional Fou-

rier Transform and Jigsaw Transform. Case Study: Fin-

gerprints,” Proceedings of the International Conference

on Ultra Modern Telecommunications & Workshops, St.

Petersburg, 12-14 October 2009, pp. 1-5.

[13] D. Maltoni, D. Maio, A. K. Jain and S. Prabhakar, “Hand-

book of Fingerprint Recognition,” Springer, New York,

2003.

[14] D. Maltoni and D. Maio, “Handbook of Fingerprint Rec-

ognition,” University of Bologna, Bologna, 2004.

http://bias.csr.unibo.it/fvc2004/download.asp

[15] H. M. Ozaktas, O. Arikan and M. A. Kutay, “Digital Com-

putation of the Fractional Fourier Transform,” IEEE

Transactions on Signal Processing, Vol. 44, No. 9, 1996,

pp. 2141-2150. doi:10.1109/78.536672

[16] A. Bultheel and H. E. M. Sulbaran, “Computation of the

Fractional Fourier Transform,” Applied Computational

Harmonic Analysis, Vol. 16, No. 3, 2004, pp. 182-202.

doi:10.1016/j.acha.2004.02.001

Copyright © 2011 SciRes. IJCNS