Skip to content
BY 4.0 license Open Access Published by De Gruyter Open Access February 17, 2023

Application of fingerprint image fuzzy edge recognition algorithm in criminal technology

  • Xinhua Lv EMAIL logo
From the journal Open Computer Science

Abstract

In the context of the rapid development of science and technology and the modernization of the legal system, criminal activities are becoming more and more intelligent and technological, which also puts forward higher requirements for criminal technology. The current criminal technology equipment is relatively backward, and the technical level is not high enough, resulting in a low utilization rate of trace material evidence extraction, which directly affects the role of criminal technology in the investigation and solving of cases. In recent years, fingerprint recognition algorithms and image edge detection algorithms have been widely used in various fields. This work studied the application of fingerprint image fuzzy edge recognition algorithm in criminal technology, in order to improve the level of criminal technology and the utilization rate of physical evidence extraction. The criminal technology system is upgraded and optimized by combining fingerprint recognition algorithm and image edge detection algorithm. And fuzzy theory is added to ensure the feasibility of the research. The experimental results show that the fuzzy edge recognition algorithm of fingerprint image can improve the level of criminal technology and the utilization rate of material evidence to a certain extent. The utilization rate is increased by 7.04%. The recognition accuracy of the fuzzy recognition method is also 13.2% higher than that of the methods in the literature.

1 Introduction

In the field of criminal investigation, the use of criminal technology is very extensive and its role is also very huge. Criminal technology can provide an important scientific basis for determining the nature of a case and provide relevant evidence for determining criminal facts. With the increase in international exchange opportunities and the adjustment of the knowledge structure and way of thinking of criminal technicians, the intensity of criminal science and technology research has been strengthened. In addition, the technology and changing types of criminal activities have put forward higher requirements on the science and legitimacy of trace investigation techniques and inspection and identification techniques. Emphasizing evidence rather than credulous confessions has become the general trend of criminal work. In recent years, the increasingly mature fingerprint recognition technology has also provided an opportunity for the development of criminal technology. Fingerprint recognition is an important technology in criminal work. Applying fuzzy edge recognition algorithm to fingerprint image recognition can improve the recognition effect and anti-noise performance.

In recent years, the application of fingerprint identification technology has become more and more mature, and many scholars have achieved good research results in the field of fingerprint identification. Wang et al. proposed a fingerprint segmentation enhancement method based on Gabor filter response, and the research results demonstrated the stability of the proposed method [1]. Zhendong et al. proposed a new method of fingerprint reference point location based on directional coherence analysis, and the test results confirmed that this method can provide high-precision reference points for all types of fingerprint location [2]. Zhou proposed a fingerprint feature priority matching method based on the structural features of fingerprint features, and further applied the genetic algorithm to the point matching stage, and finally found that the method achieved good results in automatic fingerprint recognition systems [3]. Xie proposed a histogram partitioning and median filtering fingerprint identification algorithm in his paper, and then confirmed that the algorithm is suitable for different fingerprints with different backgrounds, resolutions, and sizes through the ensemble averaging of mean square errors [4]. Lee et al. discussed a fingerprint recognition algorithm combined with filters, and the study found that the method showed good performance in both the accuracy and efficiency of fingerprint extraction [5]. Mao et al. designed a fingerprint recognition algorithm using the wavelet transform principle, and achieved a fingerprint recognition rate of 91.4% in the test [6]. Yan and Song proposed a novel fingerprint alignment and matching scheme based on geometric minutiae structure. Finally, the scheme achieved faster performance and higher accuracy of fingerprint recognition system [7]. The above research work on fingerprint identification technology is relatively specific, but the fingerprint identification algorithm has not been applied to criminal technology. With the increasing maturity of criminal technology, it has become a key factor for solving cases. Zazulin investigated the use of CI Solvent Black 3 dye for fingerprint localization in criminal technology. The results have showed that CI Solvent Black 3 can be successfully applied to localize and visualize recent and non-recent latent fingerprints on porous surfaces [8]. Vatsenko discussed the application prospects and theoretical methods of artificial intelligence in the field of criminal technology. Research showed that artificial intelligence is conducive to the upgrading and optimization of criminal investigation intelligence systems [9]. Corda and Lageson discussed the importance of data mining technology in criminal investigation and confirmed that data mining technology has a good effect in preventing criminal crimes [10]. Hadjimatheou discussed the application of DNA technology in criminal technology. Studies showed that DNA technology plays an important role in catching criminals and solving crimes [11]. Tani analyzed the use of neuroimaging technology in criminal work and found that the technology can avoid wrongful convictions for wrongful punishment of innocent parties and prevent dangerous criminals from being released back into the society [12]. Vardanyan and Andreev discussed the application of VoIP technology in criminal technology forensics, and finally confirmed that VoIP-based criminal forensics methods can provide a useful reference for relevant evidence investigations [13]. Kocak and Dandin proposed a method of criminal identification based on neural network technology. The results showed that the method can identify individuals who belong to the same gang or drug-trafficking circle [14]. These studies on criminal technology are relatively detailed, but they do not involve the application of fingerprint image fuzzy edge recognition algorithm in criminal technology.

In order to improve the level of criminal technology and the utilization rate of physical evidence extraction, this study applied the fingerprint image fuzzy edge recognition algorithm to criminal technology, aiming to innovate and upgrade the criminal technology system. When the fingerprint image is recognized, the fuzzy theory and filter image enhancement methods are used to ensure the accuracy of fingerprint image recognition. The final experimental results showed that the fingerprint image fuzzy edge recognition algorithm has achieved good results in fingerprint image recognition, and the fingerprint recognition rate and matching rate have been improved a lot, which provides important suggestions for the upgrading and optimization of criminal technology.

2 Fingerprint recognition in criminal technology

2.1 Fingerprint identification system

Fingerprint recognition refers to the classification and comparison of the fingerprints of the identified objects. Fingerprint recognition system is a typical pattern recognition system, including fingerprint image acquisition, processing, feature extraction, and comparison modules. With the acceleration of the social information process, the application of fingerprint identification in the criminal field is becoming more and more mature [15]. Figure 1 shows a common fingerprint identification system in criminal work, and its identification process is relatively complicated. Interactive query is an important link between users and fingerprint recognition. On the one hand, the user’s fingerprint should be stored, and on the other hand, the recognition result should be fed back to the user in time. Fingerprint collection is the first step of the whole system. After the fingerprint collector collects the fingerprint from the suspect, it will transmit the fingerprint image to the fingerprint processor. The fingerprint processor needs to perform preprocessing, feature extraction, feature encoding, etc., on the fingerprint. After all these steps are completed, it will send a matching identification request to the fingerprint feature database. After the database successfully matches the fingerprint, the fingerprint identification is officially completed.

Figure 1 
                  Fingerprint identification system.
Figure 1

Fingerprint identification system.

2.2 Fingerprint image recognition preprocessing algorithm

In the fingerprint recognition algorithm, the fingerprint image preprocessing algorithm is the most important part. In criminal work, fingerprint image collection often has problems of low resolution and insufficient smoothness, and the effect of fingerprint collection will be affected by external and human factors such as the incoherent texture and chapped dry and wet fingerprint, which requires preprocessing of collected fingerprint images. The specific function of preprocessing is to try to eliminate the wrong information caused by these factors and keep only the most original fingerprint lines.

There are many ways to collect fingerprints. The fingerprints collected by the police on criminal detention, administrative detention, suspects of committing crimes, drug-related persons, etc., are collectively referred to as fingerprinting. In the process of collecting fingerprints, some fingerprint collection systems will automatically judge the quality and finger position of the collected fingerprints to ensure that the collected fingerprint images meet the three-element requirements of high quality, no dislocation, and no repetition. The specific acquisition quality control functions include fingerprint wet test, fingerprint image quality judgment, fingerprint image automatic centering, fingerprint image angle automatic correction, fingerprint image automatic background removal, repeated fingerprint judgment, plane and scroll corresponding finger position judgment, triangle and center acquisition incomplete judgment, fingerprint collection area judgment, etc. The fingerprints left by the suspect at the crime scene are called scene fingerprints, and are usually abbreviated as LT in English. On-site fingerprints are finger marks left unintentionally by suspects when committing a crime. Usually, there are uneven marks, blurred textures, and cluttered backgrounds. The preprocessing algorithm can improve the quality of the input fingerprint image, remove the noise in the image, and convert the fingerprint trajectory into a clear scatter plot, so as to extract the correct fingerprint features and improve the accuracy of the comparison results. Figure 2 shows the process of fingerprint preprocessing, including input image, normalization, filter enhancement, binarization, and refinement.

Figure 2 
                  Fingerprint preprocessing process.
Figure 2

Fingerprint preprocessing process.

3 Application of fingerprint edge detection algorithm and fuzzy restoration in criminal technology

3.1 Edge detection algorithm

Edge detection is a relatively common phenomenon in image processing and computer vision, and its main purpose is to identify points in digital images with significant changes in brightness [16]. The so-called edge refers to the set of pixels around which the grayscale of the pixels changes sharply. It is the most basic feature of the image. The edge exists between the target, the background, and the region. Therefore, it is the most important basis for image segmentation. Commonly used operators in edge detection algorithms are Canny operator, Prewitt operator, and Sobel operator. The Sobel edge detection algorithm is the most efficient algorithm in edge detection. The edge detection algorithm usually has directionality, which is divided into horizontal edge and vertical edge detection. Figure 3 is an application example of edge detection. Bidirectional slope coefficients in detection must be determined before detection, i.e., k x = 0 ; k y = 1 ; % horizontal , k x = 1 ; k y = 0 ; % vertical . Next the gradient image is calculated. The edge points are actually the points where the grayscale jumps violently into the image. The brightest part of the gradient image can be regarded as part of a simple edge.

Figure 3 
                  Example of edge detection gradient image.
Figure 3

Example of edge detection gradient image.

The Sobel operator usually uses a filter to filter the image to obtain the gradient image. After the filter is defined, the gradient image in the vertical and vertical directions can be obtained by rotating the filter with the image to obtain a gradient image.

3.2 Edge detection algorithm based on fingerprint image

When criminal staff obtain criminal’s fingerprint images, they often use gradient changes to sharpen the image. But this method will enhance the tone and lines at the same time, which brings recognition difficulties. However, the Sobel operator in edge detection does not have such a problem. Due to the introduction of the averaging factor, the Sobel operator can achieve a smoothing effect when processing random noise in the image, and because it has a difference between two rows or two columns, the image elements on both sides of the edge will be enhanced. The edges will appear thicker and brighter. The fingerprint image edge detection process is shown in Figure 4. First, the fingerprint samples of criminal suspects are detected and located, and then the fingerprint image is input for image enhancement, feature extraction, and edge refinement. The subsequent processing is performed by criminal personnel for fingerprint matching.

Figure 4 
                  Fingerprint image edge detection.
Figure 4

Fingerprint image edge detection.

3.3 Fuzzy theory

3.3.1 Common fuzzy structural elements

The fuzzy structure element A is a fuzzy set on the real number field M , and its membership function is marked as A ( x ) ( x M ) , meeting the following properties:

A ( 0 ) = 1 , A ( 1 + 0 ) = A ( 1 0 ) = 0 ;

A ( x ) is a single increasing right continuous function in the interval [ 1 , 0 ] and A ( x ) is a single decreasing left continuous function in the interval [ 0 , 1 ] ;

When < x < 1 or 1 < x < + , A ( x ) = 0 .

If the membership function of a fuzzy structural element has A ( x ) > 0 in the interval ( 1 , 1 ) and is a continuous strict single increasing function in ( 1 , 0 ) , and is a continuous strict single decreasing function in the interval ( 0 , 1 ) , then A is called a regular fuzzy structural element; If A ( x ) = A ( x ) , A is called symmetric fuzzy structural element.

3.3.2 Fuzzy inference system and fuzzy rule table

Taking the fuzzy control rules of the model as an example, assume that the two inputs are M 1 and M 2 , and the fuzzy rules of single output N have the following forms:

if ( M 1 is O 1 ) and ( M 2 is O 2 ) Then N is P , where O i is the label of the input membership function and P is the label of the output membership function, where the label is the language quantity. The overall architecture of the fuzzy inference system is shown in Figure 5. The work of the fuzzy controller is specified by the fuzzy knowledge base, including rules and membership functions. According to the current sampled input signal of the control system, the input is first fuzzified, and the clear value is converted to the fuzzy value, and then the fuzzy approximate reasoning is performed. The reasoning result is converted into the clear value through anti fuzzification and used as the current control output.

Figure 5 
                     Overall architecture of fuzzy reasoning system.
Figure 5

Overall architecture of fuzzy reasoning system.

Table 1 is the rule table of the fuzzy controller. The two input signals are, respectively, the error e and error change rate ce of the measured value of the controlled system, one output signal is the variation cu of control output. The labels NB, NM, NS, ZR, PS, PN, and PB, respectively, indicate that the signal is negative large, negative medium, negative small, zero, positive small, positive medium, and positive large. The single point method is commonly used for input fuzzification, that is, to calculate the membership value of the input membership function according to the current input value.

Table 1

Rules of fuzzy controller

E
NB NM NS ZR PS PM PR
NB NB NB NB NB NM NS ZR
NM NB NR NB NM NS ZR PS
NS NB NS NM NS ZR PS PM
ZR NB NM NS ZB PS PM PD
PS NM NS ZR PS PM PB PB
PM NS ZR PS PM PB PB PB
PB ZR PS PM PD PB PB PB

3.4 Examples of applications in criminal technology

In the practice of fingerprint technology application, the use of automatic fingerprint identification technology in the criminal field is to detect cases. The criminal investigators compare the fingerprints left at the crime scene and the fingerprints of the suspects (sample fingerprints) with the files of each archive to obtain a large number of fingerprints with high similarity (alternative fingerprints), and then the suspect is identified through the fingerprint. By judging and investigating one by one, experts determine whether the sample fingerprint is consistent with the candidate fingerprint, and then find the murderer [17]. Figure 6 is an application frame of the police fingerprint identification system based on fingerprint image fuzzy edge identification algorithm. Criminal officers look for fingerprints at the crime scene, input suspicious fingerprints into the fingerprint system, and then process and compare the fingerprint owners through algorithms. On the other hand, criminal officers collect, fuzzy identify, edge detect the fingerprints of suspicious persons, and after investigation, compare the fingerprints with the fingerprint owners found before, and finally implement arrests.

Figure 6 
                  Framework of police fingerprint recognition system based on fuzzy edge recognition algorithm of fingerprint image.
Figure 6

Framework of police fingerprint recognition system based on fuzzy edge recognition algorithm of fingerprint image.

4 Mathematical model of fingerprint image recognition in criminal technology

4.1 Mathematical modeling

For a grayscale image of Z = f ( x , y ) , the mathematical modeling process of the fingerprint image is as follows.

4.1.1 Calculation of fingerprint image intensity field

Supposing the fingerprint image function is f ( x , y ) and the intensity field is V , the gray field is V = f ( x , y ) , which represents the size of the gray value of the pixel at this point.

4.1.2 Calculation of fingerprint image gradient field

For Z = f ( x , y ) , the partial derivative of ( x , y ) is T = ( z / x , z / y ) , and the gradient vector can be obtained as T = ( z / x , z / y ) .

Let G x ( x , y ) be z / x at the point of ( x , y ) , let G y ( x , y ) be z / y at the point of ( x , y ) , then

(1) G x ( x , y ) = F ( x + 1, y ) F ( x , y ) ,

(2) G y ( x , y ) = F ( x , y + 1 ) F ( x , y ) .

4.1.3 Calculation of fingerprint image orientation field

4.1.3.1 Mathematical modeling of ideal direction field size

If sin θ = G y ( x , y ) i / T , cos θ = G x ( x , y ) j / T , among them, i , j is the unit vector of orthogonal coordinates.

Then, tan 2 θ = sin 2 θ / cos 2 θ = 2 sin θ cos θ / ( cos 2 θ + sin 2 θ ) , The direction field size of O ( x , y ) is θ = tan 1 ( tan 2 θ ) / 2 .

4.1.3.2 Mathematical modeling of actual direction field size

In a fingerprint image, in order to represent the relationship between a particular pixel and the fingerprint image, the memory must be allocated for surrounding pixels. When defining any pixel point, the surrounding information need to be used to add point information. That is to say, add up the surrounding gray points first, then calculate the average, and the authenticity of the image will be higher. Supposing it to be:

(3) V x ( x , y ) = μ = i w 2 i + w 2 v = j w 2 j + w 2 2 G x ( u , v ) G y ( u , v ) ,

(4) V y ( x , y ) = μ = i w 2 i + w 2 v = j w 2 j + w 2 2 G x 2 ( u , v ) G y 2 ( u , v ) .

Then, the size of the direction field is θ ( x , y ) = tan 1 ( V x ( x , y ) / V y ( x , y ) ) / 2 the mathematical model accurately shows the direction field of the real fingerprint image from a statistical point of view. The partial derivative of ( x , y ) in the model is represented by the Sobel operator, which is expressed as:

x direction 1 0 1 2 0 2 1 0 1 , y direction 1 2 1 0 0 0 1 2 1 .

4.2 Field-based fingerprint image enhancement algorithm

Using the modeling of the fingerprint field and the visualization model of the Gabor wavelet function mentioned above, the visualization model of the field-based fingerprint image enhancement can be established, and its mathematical model can be obtained at the same time. Finally, the field-based fingerprint image enhancement algorithm can be realized.

The Gabor wavelet function is obtained by repeating the Gaussian activity and the triangular activity. According to the structure of these two functions, the Gabor wavelet function produces periodic oscillations [18]. The field-based fingerprint enhancement mathematical model derived from the Gabor wavelet enhancement physical model is as follows:

The field-based one-dimensional expression is given as follows:

(5) H ( x ) = exp ( x 2 / 2 σ 2 ) cos ( 2 π f x ) / 2 π σ .

The field-based two-dimensional (2D) expression is given as follows:

(6) H ( x , y ) = G ( x , y ) cos ( 2 π f x i ) ,

and the formula is specified as follows:

Gaussian component

(7) G ( x , y ) = exp ( ( ( x / y ) 2 + y 2 ) / 2 σ 2 ) / 2 π λ σ 2 .

where σ is the Gaussian diffusion factor, the mathematical meaning is the standard deviation; f is the width scale factor, indicating the frequency of the wave; λ is the coordinate axis scale factor, and the mathematical geometric meaning is the ratio of the long and short axes of the ellipse plane at the bottom of the image.

The rotation formula of the coordinate axis is given as follows:

(8) x y = cos ( 90 θ ) sin ( 90 θ ) sin ( 90 θ ) cos ( 90 θ ) x y = sin θ cos θ cos θ sin θ x y .

where θ is the rotation factor, the mathematical geometric meaning represents the angle between the direction vector of the point and the positive direction of the x -axis, and the physical meaning is the direction field of the point.

4.3 Fingerprint image frequency domain enhancement

The frequency domain enhancement method is to modify the transformed coefficients in a certain transform domain of the image, such as the coefficients of Fourier transform, DCT transform, etc., to operate the image, and then inverse transform to obtain the processed image. Generally, the frequency domain enhancement algorithm can be divided into several algorithms according to the different switching methods, including the enhancement algorithms based on wavelet transform, enhancement algorithms based on fast Fourier transform (FFT), and enhancement algorithms based on short time Fourier transform (STFT) [19]. In practical applications, the latter two algorithms are the most commonly used.

The FFT-based image enhancement algorithm first performs FFT transformation on the image to obtain a modified frequency image, then filters the frequency image in different ways, and finally performs Fourier transform on the filtered image to obtain an enhanced image. As shown in equations (9) and (10), H ( ρ ) is a bandpass filter with a bandpass center of ρ 0 and a bandwidth of ρ BW . In the algorithm, the convex cosine function is used as the direction filter, and its width and center are ϕ BW and ϕ C .

(9) H ( ρ , ϕ ) = H ρ ( ρ ) H ϕ ( ϕ ) ,

(10) H ρ ( ρ ) = ( ρ ρ BW ) 2 n ( ρ ρ BW ) 2 n + ( ρ 2 ρ 0 2 ) 2 n .

The algorithm takes into account the curvature characteristics of fingerprint ridges. When a certain point is a singular point, the curvature of the ridge near the point is relatively high, and the change in the direction field at this point is also very sharp. A band pass filter with a fixed orientation angle cannot be used, as false features will be generated. Since then, some people have improved the algorithm, using the linear function of the distance from the ridge to the singular point as a pair filter, which can improve the enhancement effect to a certain extent. However, this algorithm also has some defects. Like the previous algorithm, when the quality of the fingerprint image is low, it is difficult to locate the singular point accurately and quickly.

The implementation method of the STFT method is to truncate the window function in the time domain, perform Fourier transform on the window signal, that is, obtain the Fourier transform at this moment, and constantly move the center of the window. The Fourier transforms at different times can be obtained, and the collection of these Fourier transforms is the short-time Fourier transform. The obtained graph is called a time-frequency graph.

It is found that the effect is better when the fingerprint image is enhanced using the STFT method [20]. For the enhancement of the 2D fingerprint image in the STFT method, the conversion from the spatial domain to the frequency domain is shown in formula (11), among them I ( x , y ) represents the original image, W ( x , y ) represents the 2D window function, and the position of the 2D window W ( x , y ) is represented by τ 1 and τ 2 , and w 1 and w 2 represent the spatial frequency parameters.

(11) X ( τ 1 , τ 2 , w 1 , w 2 ) = + + I ( x , y ) W ( x τ 1 , y τ 2 ) e j ( w 1 x + w 2 y ) .

4.4 Fingerprint image enhancement based on wavelet transform

Wavelet transform is a local time-frequency analysis algorithm, the time window and frequency window can be changed, but the size of these windows will not change [21]. For a 2D fingerprint image, assuming its size is N × M , which is represented by C 0 ( i , j ) 0 , the standard 2D discrete wavelet transform is decomposed as follows:

(12) C 0 , ( i , j ) p + 1 = m n h ( m ) h ( n ) C 0 , ( m + 2 i , n + 2 j ) p ,

(13) C 2 , ( i , j ) p + 1 = m n g ( m ) h ( n ) C 0 , ( m + 2 i , n + 2 j ) p ,

(14) C 1 , ( i , j ) p + 1 = m n h ( m ) h ( n ) C 0 , ( m + 2 i , n + 2 j ) p ,

(15) C 3 , ( i , j ) p + 1 = m n g ( m ) h ( n ) C 0 , ( m + 2 i , n + 2 j ) p .

In the formula, p is the wavelet decomposition stage, h is the low-pass filter, and g is the high-pass filter. It can be seen from the recurrence from equations (12)–(15) that only the low-pass component is decomposed each time, and the low-pass component CP 0 obtained by the previous-level decomposition is decomposed into four dimensions again in the next level decomposition. The exact same image components continue to be decomposed until the required decomposition level p is reached. C 0 p + 1 represents the double low components of the original fingerprint image, that is, the low frequency components in the horizontal and vertical directions. C 3 p + 1 represents the double high component of the original image, that is, the high-frequency components in the horizontal and vertical directions, while C 1 p + 1 and C 2 p + 1 represent the horizontal low-frequency component, the vertical high-frequency component, and the horizontal high-frequency component, and the vertical-low frequency component, respectively.

Image normalization is the most important part of image augmentation. Image normalization is to adjust the grayscale pixel value and variance value of the real fingerprint image to the expected range [22]. The normalization process is as follows:

(16) N ( i , j ) = M 0 + σ 0 2 ( I ( i , j ) M 2 ) σ 2 , I ( i , j ) > M M 0 σ 0 2 ( I ( i , j ) M 2 ) σ 2 , I ( i , j ) M ,

where I ( i , j ) is the average value of pixels, N ( i , j ) is the normalized fingerprint image quality average, M is the grayscale average of each pixel in the original image, and σ 2 is the quality variance of each pixel in the original image. M 0 and σ 0 2 are the pre-set image grayscale mean and image variance values.

The locality principle points out [23] that the position of the fingerprint image represents the direction field, and the direction of the fingerprint ridges is basically consistent within a certain range. The Sobel operator is used to calculate the horizontal gradient value x ( u , v ) and the vertical gradient value y ( u , v ) of the pixel point ( u , v ) of each fingerprint sub-block, and then the local direction of the sub-block centered on point 5 is calculated by using formulas (17)–(19).

(17) V x ( i , j ) = u = i w 2 i + w 2 v = j w 2 j + w 2 2 x ( u , v ) y ( u , v ) ,

(18) V y ( i , j ) = u = i w 2 i + w 2 v = j w 2 j + w 2 ( x 2 ( u , v ) y 2 ( u , v ) ) ,

(19) θ ( i , j ) = 1 2 tan 1 V x ( i , j ) V y ( i , j ) ,

where θ ( i , j ) represents the local ridge line direction of the sub-block whose center point is at ( i , j ) , and w represents the total side length of the sub-block. Because the fingerprint image has a strong gradient feature, this feature can be used to separate the sub-images obtained after wavelet transform decomposition. The method divides each sub-image into w × w sub-blocks first, takes w = 16 , and then uses the formulas (20) and (21) to process.

(20) V E ( i , j ) = u = i w 2 i + w 2 v = j w 2 j + w 2 ( x 2 ( u , v ) y 2 ( u , v ) ) ,

(21) R = V x 2 ( i , j ) + V y 2 ( i , j ) V E 2 ( i , j ) × w × w ,

where x ( u , v ) and y ( u , v ) are the gradient values of the sub-block pixels along the x -axis and y -axis, respectively, and V x 2 ( i , j ) and V y 2 ( i , j ) are the results obtained from the operations of formulas (17) and (18). After calculating the R value of all sub-blocks, it is compared with the preset threshold R 0 . When R < R 0 , this sub-block is the background area, and the area mask M ( i , j ) = 0 is marked, otherwise the sub-block is the foreground area, and the area mask M ( i , j ) = 1 is marked.

5 Application results of fingerprint image fuzzy edge recognition algorithm in criminal technology

First, ten fingerprint samples A, B, C, D, E, F, G, H, I, and J are selected for fingerprint identification accuracy comparison. The identification method is the fuzzy method proposed in this work [6].

It can be seen from Figure 7 that there is still a large difference in fingerprint recognition accuracy between the two methods. By contrast, the recognition accuracy of fuzzy method is 13.2% higher than that of literature [6].

Figure 7 
               Comparison of fingerprint recognition accuracy between fuzzy method and the method reported in literature [6].
Figure 7

Comparison of fingerprint recognition accuracy between fuzzy method and the method reported in literature [6].

This study focuses on the introduction of the Sobel operator when using the fingerprint image fuzzy edge recognition algorithm. In order to confirm that the Sobel operator is the most efficient operator in edge detection, ten fingerprint samples in the criminal system and the Canny operator mentioned above are extracted to compare their efficiency with Prewitt operator. The ten sample numbers are: 001, 002, 003, 004, 005, 006, 007, 008, 009, and 010. The comparison results are shown in Figure 8.

Figure 8 
               Comparison of edge detection efficiency of fingerprint images.
Figure 8

Comparison of edge detection efficiency of fingerprint images.

In order to fully verify the application of fingerprint image fuzzy edge recognition algorithm in criminal technology, four different types of fingerprint images in criminal department fingerprint samples are selected as experimental objects, including bow, skip, bucket, and hybrid.

First, four different types of fingerprint images in the fingerprint samples of criminal departments were selected as the experimental objects, including the arch pattern, the skip pattern, the bucket pattern, and the mixed pattern. In order to ensure the rigor of the experiment, the Linux algorithm, FPGA algorithm and STM32 algorithm commonly used in the field of fingerprint recognition are added to this test, and compared with the algorithm proposed in this study. Using fingerprint image fuzzy edge recognition algorithm and Linux algorithm, FPGA algorithm, STM32 algorithm conducted fingerprint image recognition experiments. Using different types of fingerprint images, the fingerprint image recognition accuracy of several algorithms is compared, and the comparison results are shown in Table 2 .

Table 2

Fingerprint image recognition accuracy under different algorithms

Image/frame Fingerprint image blurred edge recognition/% Linux algorithm/% FPGA algorithm/% STM32 algorithm/%
Bow pattern 98.135 89.254 85.347 79.145
Kei-shaped pattern 97.369 88.367 86.233 78.639
Bucket pattern 99.014 89.057 87.314 78.025
Mixed pattern 98.373 87.635 88.251 77.384

It can be seen from Table 2 that the recognition accuracy based on the fingerprint image fuzzy edge recognition algorithm is significantly higher than that of other algorithms in the four different types of fingerprint image recognition. This also confirms that adding edge detection and blur reduction to the fingerprint recognition algorithm has a good effect.

In the criminal technology department, the fingerprint image processing of criminal suspects is related to the efficiency of the entire criminal work. In order to verify the specific effect of the fingerprint image fuzzy edge recognition algorithm, the Linux algorithm, FPGA algorithm, STM32 algorithm and the algorithm in this study mentioned above were analyzed from the three aspects of fingerprint image recognition speed (recognition amount), recognition accuracy rate, and matching accuracy rate, and experimental comparisons were carried out. Fingerprint samples were provided by criminal departments, and the specific test time is divided into hours and minutes.

Figure 9 shows the number of fingerprint images processed by different algorithms at different times. It can be seen from the histogram that with the increase in time, the number of fingerprints processed by these algorithms is also increasing. The processing quantity of the fingerprint image fuzzy edge recognition algorithm has always been in the leading position, and the other three algorithms fluctuated slightly, but not much.

Figure 9 
               Fingerprint throughput of different algorithms.
Figure 9

Fingerprint throughput of different algorithms.

It can be seen from Figure 10 that the recognition accuracy of several algorithms fluctuates with time. The recognition accuracy of fingerprint image fuzzy edge recognition algorithm has little fluctuation and high accuracy. The accuracy of the other three algorithms is lower than this algorithm, and the fluctuation is large, which shows that the fingerprint recognition effect of the fingerprint image fuzzy edge recognition algorithm is relatively good.

Figure 10 
               Fingerprint recognition accuracy of different algorithms.
Figure 10

Fingerprint recognition accuracy of different algorithms.

Figure 11 shows the accuracy of fingerprint matching after fingerprint identification for different algorithms in different time periods. The fingerprint matching accuracy fluctuates quite a bit, but this is a normal phenomenon. With the increase in time, the workload of fingerprint matching will be larger and larger, and the error will also increase. But in general, the fingerprint matching accuracy of the fingerprint image fuzzy edge recognition algorithm is still good.

Figure 11 
               Fingerprint matching accuracy of different algorithms.
Figure 11

Fingerprint matching accuracy of different algorithms.

The purpose of introducing the fingerprint image fuzzy edge recognition algorithm in criminal technology is to optimize and upgrade the fingerprint recognition system, so as to improve the level of criminal technology and improve the utilization rate of physical evidence. Figure 12 shows the comparison chart of the utilization ratio of physical evidence before and after the introduction of the fingerprint image fuzzy edge recognition algorithm.

Figure 12 
               Evidence utilization in 10 days.
Figure 12

Evidence utilization in 10 days.

It can be seen from Figure 12 that during these 10 days, the utilization of physical evidence in both methods showed a fluctuating trend, which is because the daily criminal workload was different. After the introduction of the fingerprint image fuzzy edge recognition algorithm, the utilization rate of physical evidence has been significantly improved, which is 7.04% higher than that before the introduction.

6 Conclusion

Criminal technology has a very important position in criminal work, which can improve the technical support for criminal investigators and bring convenience to the investigation work. However, with the rapid development of information technology, criminals’ criminal methods are becoming more and more advanced, which brings difficulties to criminal work, which requires innovation, optimization, and upgrading of criminal technology. In this study, the fuzzy edge recognition algorithm of fingerprint image is introduced in criminal technology, aiming to improve the level of criminal technology and improve the utilization rate of physical evidence in criminal work. After relevant experiments, the fuzzy edge recognition algorithm of fingerprint image proposed in this study has achieved good results in fingerprint image recognition, which provides an important reference value for the development of criminal technology.

  1. Funding information: This study was supported by Program for Young Innovative Research Team in Shandong University of Political Science and Law and the popularize Research Project of Shandong University of Political Science and Law [Project No. 201713B].

  2. Conflict of interest: The authors declare that there are no conflicts of interest regarding the publication of this article.

  3. Data availability statement: The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

[1] K. J. Wang, X. L. Xing, and H. T. Cui, “Recognition algorithm research of the touchless fingerprint images,” Acta Electron. Sin., vol. 45, no. 11, pp. 2633–2640, 2017.Search in Google Scholar

[2] W. U. Zhendong, Y. Wang, and J. Zhang, “Fouling and damaged fingerprint recognition based on deep learning,” Dianzi Yu Xinxi Xuebao/J. Electron. Inf. Technol., vol. 39, no. 7, pp. 1585–1591, 2017.Search in Google Scholar

[3] Q. Zhou, “Singular point region enhancement of fingerprint image based on symmetric phase consistency,” J. Intell. Fuzzy Syst., vol. 38, no. 1, pp. 1–9, 2020.10.3233/JIFS-179836Search in Google Scholar

[4] J. Xie, “A study of fingerprint recognition algorithm of networking embedded system,” Agro Food Ind. Hi Tech., vol. 28, no. 1, pp. 60–63, 2017.Search in Google Scholar

[5] K. Lee, J. Na, J. Sohn, S. Sohn, and S. Lee, “Image recognition algorithm for maintenance data digitization: CNN and FCN,” Trans. Korean Soc. Noise Vib. Eng., vol. 30, no. 2, pp. 136–142, 2020.10.5050/KSNVE.2020.30.2.136Search in Google Scholar

[6] C. Mao, W. Meng, and C. Shi, “A crop disease image recognition algorithm based on feature extraction and image segmentation,” Traitement du. Signal, vol. 37, no. 2, pp. 341–346, 2020.10.18280/ts.370221Search in Google Scholar

[7] X. Yan and X. Song, “An image recognition algorithm for defect detection of underground pipelines based on convolutional neural network,” Traitement du. Signal, vol. 37, no. 1, pp. 45–50, 2020.10.18280/ts.370106Search in Google Scholar

[8] A. I. Zazulin, “Functions of digital information and technologies in criminal proceedings,” Siberian Law Rev, vol. 17, no. 1, pp. 75–82, 2020.10.19073/2658-7602-2020-17-1-75-82Search in Google Scholar

[9] A. Vatsenko, “Application of computer technologies in criminalistic identification of personality (by the Example of DNA Analysis),” Bull. Sci. Pract., vol. 6, no. 5, pp. 409–412, 2020.10.33619/2414-2948/54/54Search in Google Scholar

[10] A. Corda and S. E. Lageson, “Disordered punishment: Workaround technologies of criminal records disclosure and the rise of a new penal entrepreneurialism,” Br. J. Criminol., vol. 60, no. 2, pp. 245–264, 2020.10.1093/bjc/azz039Search in Google Scholar

[11] K. Hadjimatheou, “Surveillance technologies, wrongful criminalisation, and the presumption of innocence,” Philos. Technol., vol. 30, no. 1, pp. 1–16, 2017.10.1007/s13347-016-0218-2Search in Google Scholar

[12] M. Tani, “Cyber-physical integrated analysis technology for criminal investigation support,” NEC Tech. J., vol. 12, no. 2, pp. 85–88, 2018.Search in Google Scholar

[13] A. V. Vardanyan and A. S. Andreev, “Unmanned aerial vehicles as a segment of digital technologies in the criminal and post-criminal reality,” Russian J. Criminol., vol. 12, no. 6, pp. 785–794, 2018.10.17150/2500-4255.2018.12(6).785-794Search in Google Scholar

[14] H. Kocak and A. N. Dandin, “The criminal effects of information technologies in social and administrative area,” Afyon Kocatepe Üniversitesi Sos. Bilimler Derg., vol. 19, no. 1, pp. 137–152, 2017.10.5578/jss.57198Search in Google Scholar

[15] M. Neloy, M. Das, and P. Barua, “An intelligent obstacle and edge recognition system using bug algorithm,” Am. Sci. Res. J. Eng. Technol. Sci., vol. 64, no. 1, pp. 133–143, 2020.Search in Google Scholar

[16] M. Kocevar, B. Kotnik, and A. Chowdhury, “Real-time fingerprint image enhancement with a two-stage algorithm and block-local normalization,” J. Real. Time Image Process., vol. 13, no. 4, pp. 773–782, 2017.10.1007/s11554-014-0440-zSearch in Google Scholar

[17] F. G. Hashad, O. Zahran, and E. El-Rabaie, “Fusion-based encryption scheme for cancelable fingerprint recognition,” Multimed. Tools Appl., vol. 78, no. 19, pp. 27351–27381, 2019.10.1007/s11042-019-7580-xSearch in Google Scholar

[18] B. T. Ahmed and O. Younis, “Fingerprint authentication using shark smell optimization algorithm,” UHD J. Sci. Technol., vol. 4, no. 2, pp. 28–39, 2020.10.21928/uhdjst.v4n2y2020.pp28-39Search in Google Scholar

[19] Y. Cao, W. Gong, and B. Zhang, “Two-dimensional compressed sensing using two-dimensional random permutation for image encryption-then-compression applications,” IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. 101, no. 2, pp. 526–530, 2018.10.1587/transfun.E101.A.526Search in Google Scholar

[20] Y. Xu, G. Lu, and Y. Lu, “Fingerprint pore comparison using local features and spatial relations,” IEEE Trans. Circuits Syst. Video Technol., vol. 29, no. 10, pp. 2927–2940, 2019.10.1109/TCSVT.2018.2875147Search in Google Scholar

[21] Z. Liu, A. Basso, and L. Begeja, “Method and apparatus for automated analysis and identification of a person in image and video content,” Langmuir Acs J. Surf. Colloids, vol. 26, no. 10, pp. 6908–6918, 2017.Search in Google Scholar

[22] T. Sabharwal and R. Gupta, “Facial marks for enhancing facial recognition after plastic surgery,” Int. J. Inf. Technol., vol. 13, no. 1, pp. 391–396, 2021.10.1007/s41870-020-00566-xSearch in Google Scholar

[23] C. N. Vanitha, S. Suwathika, and A. Mathura, “Facial recognition processing using uniform pattern histogram with AI in multimedia applications,” Solid. State Technol., vol. 64, no. 2, pp. 788–798, 2021.Search in Google Scholar

Received: 2022-10-14
Revised: 2022-11-29
Accepted: 2022-12-14
Published Online: 2023-02-17

© 2023 the author(s), published by De Gruyter

This work is licensed under the Creative Commons Attribution 4.0 International License.

Downloaded on 29.3.2023 from https://www.degruyter.com/document/doi/10.1515/comp-2022-0263/html
Scroll Up Arrow