Man Against Machine

Sep 02, 2005
Man Against Machine

Computer-generated method outperforms human-designed program for fingerprint improvement

It sounds like a plot for a science fiction movie, but it's not. Computers now create programs that solve complex problems better than programs designed by people. University of Texas at Austin researchers Uli Grasemann and Risto Miikkulainen, for example, recently reported that a computer-generated algorithm can digitally improve images of fingerprints better than the FBI's human-designed program currently can.

The increasing quality of a fingerprint image after compression is shown through subsequent generations of genetic algorithm evolution. By generation 50, the quality of the image surpasses the quality of the same image compressed by the current world-standard program designed by humans. Credit: Grasemann and Mikkulainen, Effective Image Compression using Evolved Wavelets, GECCO '05, (c) 2005 ACM, Inc. Used by permission.

An "algorithm" is a computer program designed to systematically solve a problem. Image compression algorithms try to minimize the number of bytes in graphics files while preserving image quality as much as possible. Fewer bytes mean less storage space and faster file transfer times. JPEG, for example, is a common compression format used for photographs.

The FBI has nearly 50 million sets of fingerprints from criminals on file and adds approximately 5,000 new ones per day, making fingerprint image compression paramount. In addition, the bureau makes 50,000-60,000 digital fingerprint image transactions per day--half related to civil matters and half related to criminal activity.

"Genetic algorithms" are created when computers evaluate and improve a population of possible solutions to a problem in a stepwise fashion. The new program evolves by letting good solutions produce offspring as bad solutions die out. Over time, the individual solutions in the population become better and better, producing a final, best solution. The method uses terms derived from biology, such as generation, inheritance and mutation, to describe the particular program manipulation the computer uses at each step of improvement, hence the name genetic algorithm.

A program used to compress fingerprint images--images that may prove guilt or innocence--must not introduce distortion that limits its usefulness. The FBI and its collaborators designed the current world-standard program for fingerprint image compression, known as WSQ, in the early 1990s to compress images to about one-fifteenth of their original byte size. By comparison, JPEG compresses fingerprint images to one-fifth of the original size without distortion.

Grasemann and Miikkulainen applied genetic algorithms to solve the fingerprint compression puzzle in work supported by the National Science Foundation's Computer and Information Science and Engineering directorate. They provided their computer with the basic programming instructions needed to compress graphic images and then waited for a better algorithm to be born. The progress of the evolving program was tested at each generation. After 50 generations, the genetic algorithm consistently outperformed the human-derived WSQ.

Grasemann pointed out that other human-designed, modern image compression programs also surpass WSQ, but the computer-generated nature of their method is unique.

As Grasemann said, "It is fascinating and a little ironic that computers can come up with new and creative solutions that human experts miss. There is definitely tremendous potential to increase the quality of work in many areas of science and engineering using genetic algorithms."

Grasemann and Miikkulainen, as well as researchers from two other NSF-funded projects, received awards at the 7th Annual Genetic and Evolutionary Computation Conference (GECCO) held in Washington, D.C. earlier this year. The competition pits man against machine in tasks ranging from how to design improved ventilation systems for commercial buildings, to improving synthetic anti-bacterial compounds. Results of the conference are presented in the Proceedings of GECCO 2005, published by the Association for Computing Machinery.

Source: NSF

Explore further: Analyzing gold and steel – rapidly and precisely

add to favorites email to friend print save as pdf

Related Stories

Google defends child porn tip-offs to police

Aug 05, 2014

Google defended its policy of electronically monitoring its users' content for child sexual abuse after it tipped off police in Texas to a child pornography suspect.

Recommended for you

Analyzing gold and steel – rapidly and precisely

33 minutes ago

Optical emission spectrometers are widely used in the steel industry but the instruments currently employed are relatively large and bulky. A novel sensor makes it possible to significantly reduce their size ...

More efficient transformer materials

53 minutes ago

Almost every electronic device contains a transformer. An important material used in their construction is electrical steel. Researchers have found a way to improve the performance of electrical steel and ...

Sensor network tracks down illegal bomb-making

1 hour ago

Terrorists can manufacture bombs with relative ease, few aids and easily accessible materials such as synthetic fertilizer. Not always do security forces succeed in preventing the attacks and tracking down ...

DARPA technology identifies counterfeit microelectronics

1 hour ago

Advanced software and equipment to aid in the fight against counterfeit microelectronics in U.S. weapons and cybersecurity systems has been transitioned to military partners under DARPA's Integrity and Reliability ...

User comments : 0