Man Against Machine

Sep 02, 2005
Man Against Machine

Computer-generated method outperforms human-designed program for fingerprint improvement

It sounds like a plot for a science fiction movie, but it's not. Computers now create programs that solve complex problems better than programs designed by people. University of Texas at Austin researchers Uli Grasemann and Risto Miikkulainen, for example, recently reported that a computer-generated algorithm can digitally improve images of fingerprints better than the FBI's human-designed program currently can.

The increasing quality of a fingerprint image after compression is shown through subsequent generations of genetic algorithm evolution. By generation 50, the quality of the image surpasses the quality of the same image compressed by the current world-standard program designed by humans. Credit: Grasemann and Mikkulainen, Effective Image Compression using Evolved Wavelets, GECCO '05, (c) 2005 ACM, Inc. Used by permission.

An "algorithm" is a computer program designed to systematically solve a problem. Image compression algorithms try to minimize the number of bytes in graphics files while preserving image quality as much as possible. Fewer bytes mean less storage space and faster file transfer times. JPEG, for example, is a common compression format used for photographs.

The FBI has nearly 50 million sets of fingerprints from criminals on file and adds approximately 5,000 new ones per day, making fingerprint image compression paramount. In addition, the bureau makes 50,000-60,000 digital fingerprint image transactions per day--half related to civil matters and half related to criminal activity.

"Genetic algorithms" are created when computers evaluate and improve a population of possible solutions to a problem in a stepwise fashion. The new program evolves by letting good solutions produce offspring as bad solutions die out. Over time, the individual solutions in the population become better and better, producing a final, best solution. The method uses terms derived from biology, such as generation, inheritance and mutation, to describe the particular program manipulation the computer uses at each step of improvement, hence the name genetic algorithm.

A program used to compress fingerprint images--images that may prove guilt or innocence--must not introduce distortion that limits its usefulness. The FBI and its collaborators designed the current world-standard program for fingerprint image compression, known as WSQ, in the early 1990s to compress images to about one-fifteenth of their original byte size. By comparison, JPEG compresses fingerprint images to one-fifth of the original size without distortion.

Grasemann and Miikkulainen applied genetic algorithms to solve the fingerprint compression puzzle in work supported by the National Science Foundation's Computer and Information Science and Engineering directorate. They provided their computer with the basic programming instructions needed to compress graphic images and then waited for a better algorithm to be born. The progress of the evolving program was tested at each generation. After 50 generations, the genetic algorithm consistently outperformed the human-derived WSQ.

Grasemann pointed out that other human-designed, modern image compression programs also surpass WSQ, but the computer-generated nature of their method is unique.

As Grasemann said, "It is fascinating and a little ironic that computers can come up with new and creative solutions that human experts miss. There is definitely tremendous potential to increase the quality of work in many areas of science and engineering using genetic algorithms."

Grasemann and Miikkulainen, as well as researchers from two other NSF-funded projects, received awards at the 7th Annual Genetic and Evolutionary Computation Conference (GECCO) held in Washington, D.C. earlier this year. The competition pits man against machine in tasks ranging from how to design improved ventilation systems for commercial buildings, to improving synthetic anti-bacterial compounds. Results of the conference are presented in the Proceedings of GECCO 2005, published by the Association for Computing Machinery.

Source: NSF

Explore further: The state of shale

add to favorites email to friend print save as pdf

Related Stories

Crops help to drive greater seasonal change in CO2 cycle

Nov 19, 2014

Each year in the Northern Hemisphere, levels of atmospheric carbon dioxide (CO2) drop in the summer as plants inhale, and then climb again as they exhale and decompose after their growing season. Over the ...

Recommended for you

Impoverished North Korea falls back on cyber weapons

11 hours ago

As one of the world's most impoverished powers, North Korea would struggle to match America's military or economic might, but appears to have settled on a relatively cheap method to torment its foe.

Five ways to make your email safer in case of a hack attack

11 hours ago

The Sony hack, the latest in a wave of company security breaches, exposed months of employee emails. Other hacks have given attackers access to sensitive information about a company and its customers, such as credit-card ...

2012 movie massacre hung over 'Interview' decision

12 hours ago

When a group claiming credit for the hacking of Sony Pictures Entertainment threated violence against theaters showing "The Interview" earlier this week, the fate of the movie's big-screen life was all but ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.