
A fingerprint is the unique, complex pattern of ridges and valleys on the surface of an individual's fingertip. Fingerprinting is one of the most popular and widely used biometric authentication methods for personal identification because of its reliability, acceptability, high level of security, and low cost. When using fingerprints as a biometric, restoring poor-quality or damaged fingerprints is an essential process for accurate verification. In this study, we present a semi-automatic fingerprint image restoration method using a partial differential equation to repair damaged fingerprint images. The proposed algorithm is based on the Cahn-Hilliard (CH) equation with a source term, which was developed for simulating pattern formation during the phase separation of diblock copolymers in chemical engineering applications. In previous work, in order to find an optimal model and numerical parameter values in the governing equation, we had to make several trial and error preliminary attempts. To overcome these problems, the proposed novel algorithm minimizes user input and automatically computes the necessary model and numerical parameter values of the governing equation. Computational simulations on various damaged fingerprint samples are presented to demonstrate the superior performance of the proposed method.
Citation: Chaeyoung Lee, Sangkwon Kim, Soobin Kwak, Youngjin Hwang, Seokjun Ham, Seungyoon Kang, Junseok Kim. Semi-automatic fingerprint image restoration algorithm using a partial differential equation[J]. AIMS Mathematics, 2023, 8(11): 27528-27541. doi: 10.3934/math.20231408
[1] | Saulo Orizaga, Maurice Fabien, Michael Millard . Efficient numerical approaches with accelerated graphics processing unit (GPU) computations for Poisson problems and Cahn-Hilliard equations. AIMS Mathematics, 2024, 9(10): 27471-27496. doi: 10.3934/math.20241334 |
[2] | Mingliang Liao, Danxia Wang, Chenhui Zhang, Hongen Jia . The error analysis for the Cahn-Hilliard phase field model of two-phase incompressible flows with variable density. AIMS Mathematics, 2023, 8(12): 31158-31185. doi: 10.3934/math.20231595 |
[3] | Martin Stoll, Hamdullah Yücel . Symmetric interior penalty Galerkin method for fractional-in-space phase-field equations. AIMS Mathematics, 2018, 3(1): 66-95. doi: 10.3934/Math.2018.1.66 |
[4] | Pierluigi Colli, Gianni Gilardi, Jürgen Sprekels . Distributed optimal control of a nonstandard nonlocal phase field system. AIMS Mathematics, 2016, 1(3): 225-260. doi: 10.3934/Math.2016.3.225 |
[5] | Saulo Orizaga, Ogochukwu Ifeacho, Sampson Owusu . On an efficient numerical procedure for the Functionalized Cahn-Hilliard equation. AIMS Mathematics, 2024, 9(8): 20773-20792. doi: 10.3934/math.20241010 |
[6] | Alain Miranville . The Cahn–Hilliard equation and some of its variants. AIMS Mathematics, 2017, 2(3): 479-544. doi: 10.3934/Math.2017.2.479 |
[7] | Joseph L. Shomberg . Well-posedness and global attractors for a non-isothermal viscous relaxationof nonlocal Cahn-Hilliard equations. AIMS Mathematics, 2016, 1(2): 102-136. doi: 10.3934/Math.2016.2.102 |
[8] | Jean De Dieu Mangoubi, Mayeul Evrard Isseret Goyaud, Daniel Moukoko . Pullback attractor for a nonautonomous parabolic Cahn-Hilliard phase-field system. AIMS Mathematics, 2023, 8(9): 22037-22066. doi: 10.3934/math.20231123 |
[9] | Paola F. Antonietti, Benoît Merlet, Morgan Pierre, Marco Verani . Convergence to equilibrium for a second-order time semi-discretization ofthe Cahn-Hilliard equation. AIMS Mathematics, 2016, 1(3): 178-194. doi: 10.3934/Math.2016.3.178 |
[10] | Areerat Arunchai, Thidaporn Seangwattana, Kanokwan Sitthithakerngkiet, Kamonrat Sombut . Image restoration by using a modified proximal point algorithm. AIMS Mathematics, 2023, 8(4): 9557-9575. doi: 10.3934/math.2023482 |
A fingerprint is the unique, complex pattern of ridges and valleys on the surface of an individual's fingertip. Fingerprinting is one of the most popular and widely used biometric authentication methods for personal identification because of its reliability, acceptability, high level of security, and low cost. When using fingerprints as a biometric, restoring poor-quality or damaged fingerprints is an essential process for accurate verification. In this study, we present a semi-automatic fingerprint image restoration method using a partial differential equation to repair damaged fingerprint images. The proposed algorithm is based on the Cahn-Hilliard (CH) equation with a source term, which was developed for simulating pattern formation during the phase separation of diblock copolymers in chemical engineering applications. In previous work, in order to find an optimal model and numerical parameter values in the governing equation, we had to make several trial and error preliminary attempts. To overcome these problems, the proposed novel algorithm minimizes user input and automatically computes the necessary model and numerical parameter values of the governing equation. Computational simulations on various damaged fingerprint samples are presented to demonstrate the superior performance of the proposed method.
Biometrics refers to an automated method of identifying individuals by analyzing their distinct behavioral and biological traits [1]. In the past decade, humans have developed various biometric techniques, including fingerprint recognition, face and facial feature analysis, personal ID numbers, signatures and more. In this era of abundant information, there has always been an urgent need for a more accurate method of identity verification. Fingerprint usage stands out as one of the leading and widely adopted verification methods due to its low cost, high resistance to spoofing and the availability of extensive data. Numerous studies have proposed more precise and efficient fingerprint recognition algorithms. However, a significant challenge in fingerprint recognition lies in handling poor and low-quality fingerprints, which may exhibit issues such as missing data, unclear boundaries and low-contrast images [2,3,4]. Therefore, when we recognize the information of the fingerprint image, it can be recognized using a model such as a transform-minutiae fusion-based model in [5]. If the image is damaged, the damaged fingerprint image can be restored using the proposed method.
Including fingerprint restoration, image inpainting has been a popular topic in image processing due to its applications in real life. There are several algorithms for inpainting, and the use of partial differential equations is one of the major areas. Halim and Kumar [6] proposed a fourth-order anisotropic partial differential equation (PDE) for grayscale image inpainting. A modified Cahn-Hilliard (CH) equation with a fidelity term is used for the proposed method, and the authors showed that the numerical scheme is unconditionally stable, consistent and convergent. The authors [7] proposed a coupled system with a nonlinear time-delay structure tensor. Through several experiments, it was confirmed that the coupled anisotropic nonlinear diffusion system is effective in image enhancement. Instead of attempting to directly authenticate the damaged fingerprint, another approach is to restore the damaged image as a preprocessing step. Fingerprint restoration falls under the category of image restoration, and specific methods suitable for restoring fingerprint images have been proposed. Shams et al. [8] proposed a fingerprint enhancement filter with normalization; segmentation; coherence diffusion filter; estimating orientation and frequency; log-Gabor filter and binarization steps. One major approach to fingerprint restoration is adaptive filtering, which involves progressive enhancement and feedback. In [9], Tu et al. illustrated a new fingerprint representation method that fits ridges using cubic Bézier curves and curve fitting after Gabor enhancement and thinning the ridges as preprocessing. Claesson et al. [10] proposed an improved adaptive fingerprint enhancement technique using contextual filtering. They achieved enhanced results by updating four processing blocks: Preprocessing, global analysis, local analysis and matched filtering. In their study, they compared their method with the NIST fingerprint matching method. Sutthiwichaiporn and Areekul [11] proposed a method that applies different schemes for regions with high and low quality. They utilized a Gaussian filter for the high-quality regions and iteratively propagated good spectra from the enhanced ridges to the low-quality regions. In their evaluation, out of 15 fingerprint verification tests, their method demonstrated the best average equal error rate in 8 tests. Neural network-based fingerprint restoration is also a widely used method. Convolutional neural networks (CNNs) are deep learning models that can learn filters and characteristics to differentiate various input images. Joshi et al. [12] proposed a context-aware fingerprint restoration model, and Figure 1 illustrates an example of this fingerprint restoration.
Gao et al. [13] proposed a fingerprint preprocessing method using CNN for fingerprint recognition. Their approach was applied to grayscale noisy fingerprints, and the enhanced fingerprints retained most of the characteristics of the original fingerprint. Another machine learning architecture used for fingerprint restoration is the generative adversarial network (GAN), which consists of two neural networks engaged in a zero-sum game. Zhang et al. [14] introduced a lightweight and fully convolutional GAN architecture called FCGAN. Experimental results demonstrated over 99 training accuracy when using FCGAN-augmented samples, whereas classical augmentation techniques achieved 96.34 accuracy. In [15], the authors presented a GAN-type fingerprint enhancement model for restoring poor ridge structure.
In this paper, we present an automatic fingerprint image restoration technique using a partial differential equation. Many of the state-of-the-art studies have focused on image quality improvement, such as noise removal, while we develop the efficient algorithm for restoration in the case that some parts of the image are completely damaged. Specifically, we focus on the CH equation with a source term, which effectively models the phase separation in diblock copolymers. The use of diblock copolymers in this context has been studied by Ohta and Kawasaki [16]. Previous work by Li et al. [17] has explored the idea of employing the nonlocal CH equation and diblock copolymers for fingerprint restoration. However, a drawback of their approach is that the parameter values of the CH equation with a source term had to be manually adjusted for different fingerprints. This required a trial and error process for successful restoration, resulting in slow and less intuitive restoration procedures. To resolve this limitation, we propose an upgraded and improved fingerprint restoration method by introducing a step that solves a partial differential equation. By specifying the discrete boundary and wave period, the rest of the restoration process becomes automatic, as we can fix the parameter values for the CH equation with a source term. This enhancement improves the efficiency, intuitiveness, and convenience of the restoration process.
This paper is structured as follows. In Section 2, we present a computational approach for implementing the fingerprint restoration method. Section 3 consists of several numerical experiments conducted to demonstrate the effectiveness of the proposed method. Lastly, in Section 4, we offer concluding remarks.
In this section, we present the proposed automatic fingerprint restoration method. Let us denote by f(x,y) a given damaged fingerprint image on an entire domain Ω as shown in Figure 2(a). Here, Ωin⊂Ω is a local damaged fingerprint domain and ∂Ωin is the boundary of Ωin.
Let us consider the following PDE [16,18,19]:
∂ϕ(x,y,t)∂t=Δ[F′(ϕ(x,y,t))−ε2Δϕ(x,y,t)]−α(ϕ(x,y,t)−ˉϕ),(x,y)∈Ωin, | (2.1) |
which is obtained by adding a source term to the original CH equation [20,21]. Here, ϕ(x,y,t) is a phase-field function at space (x,y) and time t, F(ϕ)=(ϕ2−1)2/4, ϵ is an interfacial transition layer thickness related parameter, α represents a long-range repulsive interaction parameter, and ˉϕ is the spatial average value of the initial ϕ(x,y,0) values, which are defined as follows:
ϕ(x,y,0)=2f(x,y)−fmin−fmaxfmax−fmin, | (2.2) |
where fmax is the maximum and fmin is the minimum of f(x,y). From this definition, ˉϕ is zero.
For the sake of completeness of the description of the proposed numerical algorithm, we briefly review the explicit numerical solver for the CH equation with the source term [22]. Let Ω=(0,a)×(0,b) and Ωh={(xi,yj)|xi=(i−1/2)h,yj=(j−1/2)h,i=1,…,Nx,j=1,…,Ny} be its discrete domain, where Nx and Ny are the numbers of the pixels in x- and y-directions, respectively; and h=a/Nx=b/Ny is the spatial grid size. Let Ωhin and ∂Ωhin be the discrete domain and boundary, respectively, as shown in Figure 2(b). Open and filled circles represent Ωhin and ∂Ωhin, respectively. Let ϕnij=ϕ(xi,yj,nΔt), where Δt is the time step. We consider a stable numerical method [23,24]:
ϕn+1ij−ϕnijΔt=Δd((ϕnij)3−3ϕnij)+2Δdϕn+1ij−ϵ2Δ2dϕn+1ij−α(ϕn+1ij−ˉϕ), | (2.3) |
where Δdϕij=(ϕi−1,j+ϕi+i,j−4ϕij+ϕi,j−1+ϕi,j+1)/h2. If use a Saul'yev-type method, we have
ϕn+1ij=1r[ϕnijΔt+Δd((ϕnij)3−3ϕnij)+2h2(ϕn+1i−1,j+ϕni+1,j−2ϕni,j+ϕn+1i,j−1+ϕni,j+1)−ϵ2h4[ϕn+1i−2,j+ϕni+2,j+ϕn+1i,j−2+ϕni,j+2+2(ϕn+1i−1,j−1+ϕni−1,j+1+ϕn+1i+1,j−1+ϕni+1,j+1)−8(ϕn+1i−1,j+ϕni+1,j+ϕn+1i,j−1+ϕni,j+1)+10ϕni,j]+αˉϕ], | (2.4) |
where r=1/Δt+4/h2+10ϵ2/h4+α. Here, we use the Dirichlet boundary condition. To compute the solution on the boundary points in Ωhin, we use the value of black-filled circles near the damaged area, which contains the information of the original lamella-type patterns. More details can be found in [22].
We present an automatic fingerprint restoration algorithm for solving Eqs (2.1) and (2.2) under the Dirichlet boundary condition. In [17], parameters such as the interaction parameter α, model parameter ϵ and other parameters h and Δt were manually selected to restore the damaged fingerprint. However, our proposed algorithm automatically determines the appropriate parameter values by analyzing the fingerprint ridges around the damaged area.
The main idea of our proposed algorithm is to find an appropriate scaled spatial step size ˉh, which we call a scaling factor, using the information very close to the damaged area. After we fix values of α, ϵ, and Δt closely related to the period of given patterns, we can resize the damaged fingerprint image with ˉh. For the automatic restoration method, we propose an algorithm for estimating the period of fingerprint patterns in two steps: First, using the governing equation, we find an equilibrium wave with a random perturbation, and call it a reference; second, we estimate the period of the target patterns using the reference.
Let K be the wavelength of the equilibrium wave, L be the length of the random perturbation, and H be the spatial grid size at equilibrium. We set a random perturbation in x-direction with 0.2 amplitude, 0 average, and the total wave length L=100, and then solve the governing equation (2.4) with H=1 to obtain the equilibrium wave. For estimating the target wave of the damaged fingerprint image, a schematic of the algorithm for estimating the period is illustrated in Figure 3. We take a line perpendicular to the pattern around the damaged area, and then interpolate data along the line. The interpolated data is then rescaled from −1 to 1. Using the interpolation method, we obtain a set of points denoted as P={pi=(Xi,Yi)|ϕ(Xi,Yi)=0,i=1,…,m}, where m is the number of points defined as |P|. We define the wavelength as k=m−1, the length (Xm−X1) of the red line as l, and the spatial grid size and scaling factor as ˉh. Therefore, we can obtain the suitable scaling factor as follows:
ˉh=lKHLk. |
It should be noted that we stop the evolution and consider the numerical results as equilibrium solutions when the maximum error ||ϕn+1−ϕn||∞ is smaller than the tolerance tol. Unless otherwise stated, we will use the Dirichlet boundary condition for the boundaries.
We used the following parameters: h=1, Δt=0.2h2, ϵ=1.1, and tol=1.0e-7, with a maximum iteration of 10000. Figure 4 shows an intact fingerprint, a damaged fingerprint, and restorations of a damaged fingerprint with α=0.01,0.1, and 0.5. The restoration image appears coarse when α is small and fine when α is large. The value of α is the parameter that affects the thickness of the fingerprint patterns. In this test, it appears that the restored fingerprint image is the most appropriate when α=0.1 among the three different α values. The best α value is found through trial and error so that the pattern formed by the ridges and valleys around the damaged part of the given image could be smoothly connected to the restored pattern. Therefore, instead of trial and error manually taking parameters, our proposed method is to automatically fit the significant parameter, α, in fingerprint restoration by estimating the period of fingerprint patterns near the damaged area.
In this section, we apply the semi-automatic algorithm to restore damaged fingerprint images. Using the proposed algorithm, we can obtain a suitable spatial grid size h based on the information near the damaged area. Specifically, because there is a close relation among h, ϵ and α, our goal is to obtain the value of h given ϵ and α. In our experiments, we set Δt=0.1, ϵ=1.2, α=0.1, and tol=1.0e-4.
Figure 5 illustrates the process of restoring a damaged fingerprint image. We use the same intact image as shown in Figure 4(a). In Figure 5(a), the damaged area is highlighted by a red circle. To estimate the period of the pattern, we take a line near the damaged area and compare it with the equilibrium wave obtained from random perturbation. The purpose of finding the equilibrium wave is to use it as a reference for estimating the period. In this test, the scaled spatial grid size is h=0.9741 and the scaled domain is ˉΩ=(0,ah)×(0,bh). Using these parameters, we compute Eq (2.4), and the final time is reached at t=7585Δt. The temporal evolution is shown in Figure 5(b)–5(d).
The original CH equation does not satisfy the maximum principle, which means its solution ϕ may become larger than 1 or smaller than −1 at some point (x,y,t). However, we use the CH equation with an added source term that is the α term on the right-hand side in Eq (2.1). It is observed that the α term stabilizes the numerical solution inside the damaged area between −1 and 1 from the bottom row in Figures 5 and 6. On the other hand, When α=0, some solutions could be smaller than −1 as shown in Figure 6.
Figure 7 shows the temporal evolution with different radii of the damaged area in the same image. From top to bottom in Figure 7, the radius of damaged area is 20, 40, and 60, respectively. We fix the final time T=7000Δt to compare the results and their computational costs according to the radii of the damaged area. We finally compare the CPU times (in seconds) of the computations. Here, we use MATLAB R2022b on a computer with an Intel Core i9-12900K CPU at 3.19 GHz with 16 GB RAM.
Total CPU time(s) of numerical tests of Figure 7 (see Table 1).
Radius | Number of Damaged pixels | CPU time (s) |
20 | 1264 | 6.48 |
40 | 5024 | 21.51 |
60 | 11302 | 46.58 |
Figure 8 shows the temporal evolution with the same ϵ and α but different h values. We use a different intact image, and Figure 8(a), (b) illustrate the damaged area of the given image represented as a red circle. We solve the discrete governing equation with the initial image, and Figure 8(c), (d) show the temporal evolution until the final time. In this test, the scaled spatial grid size is h=1.2565.
Figure 9 displays the temporal evolution of damaged fingerprint images whose numbers of damaged pixels are the same, but each location is different. According to the proposed method, the scaling factors are h=1.2710, 1.3199, 1.2648, 1.2382 from top to bottom.
In summary, this research introduced a new approach for restoring damaged fingerprint images using a semi-automatic method based on a partial differential equation derived from the Cahn-Hilliard (CH) equation with a source term. The algorithm reduces user involvement by automatically calculating the required model and numerical parameters, resulting in a streamlined restoration process. Computational simulations on damaged fingerprint samples demonstrated the algorithm's exceptional ability to accurately restore fingerprints. The proposed technique is promising for improving the reliability and security of fingerprint-based biometric authentication systems.
The authors have not used Artificial Intelligence (AI) tools in the creation of this article.
The authors express their gratitude to the reviewers for their valuable and constructive input during the revision of this article.
The first author (C. Lee) was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2022R1C1C2003896).
The authors declare there is no conflicts of interest.
[1] | Biometric recognition: Challenges and opportunities, National Research Council, Whither Biometrics Committee, 2010. https://doi.org/10.17226/12720 |
[2] | Y. Wang, Z. Wu, J. Zhang, Damaged fingerprint classification by Deep Learning with fuzzy feature points, In: 2016 9th international congress on image and signal processing, BioMedical engineering and informatics (CISP-BMEI), IEEE, 2016,280–285. https://doi.org/10.1109/CISP-BMEI.2016.7852722 |
[3] | J. Bigun, E. Grosso, M. Tistarelli, Advanced studies in biometrics, Springer-Verlag Berlin/Heidelberg, 2005. https://doi.org/10.1007/b136906 |
[4] |
M. Drahansky, M. Dolezel, J. Urbanek, E. Brezinova, T. H. Kim, Influence of skin diseases on fingerprint recognition, Biomed Res. Int., 2012 (2012), 626148. https://doi.org/10.1155/2012/626148 doi: 10.1155/2012/626148
![]() |
[5] |
J. K. Appati, P. K. Nartey, E. Owusu, I. W. Denwar, Implementation of a transform-minutiae fusion-based model for fingerprint recognition, Int. J. Math. Math. Sci., 2021 (2021), 5545488. https://doi.org/10.1155/2021/5545488 doi: 10.1155/2021/5545488
![]() |
[6] |
A. Halim, B. R. Kumar, An anisotropic PDE model for image inpainting, Comput. Math. Appl., 79 (2020), 2701–2721. https://doi.org/10.1016/j.camwa.2019.12.002 doi: 10.1016/j.camwa.2019.12.002
![]() |
[7] |
J. Yang, Z. Guo, D. Zhang, B. Wu, S. Du, An anisotropic diffusion system with nonlinear time-delay structure tensor for image enhancement and segmentation, Comput. Math. Appl., 107 (2022), 29–44. https://doi.org/10.1016/j.camwa.2021.12.005 doi: 10.1016/j.camwa.2021.12.005
![]() |
[8] |
H. Shams, T. Jan, A. A. Khalil, N. Ahmad, A. Munir, R. A. Khalil, Fingerprint image enhancement using multiple filters, PeerJ Comput. Sci., 9 (2023), e1183. https://doi.org/10.7717/peerj-cs.1183 doi: 10.7717/peerj-cs.1183
![]() |
[9] |
Y. Tu, Z. Yao, J. Xu, Y. Liu, Z. Zhang, Fingerprint restoration using cubic Bezier curve, BMC Bioinformatics, 21 (2020), 514. https://doi.org/10.1186/s12859-020-03857-z doi: 10.1186/s12859-020-03857-z
![]() |
[10] |
J. S. Bartunek, M. Nilsson, B. Sallberg, I. Claesson, Adaptive fingerprint image enhancement with emphasis on preprocessing of data, IEEE T. Image Process., 22 (2012), 644–656. https://doi.org/10.1109/TIP.2012.2220373 doi: 10.1109/TIP.2012.2220373
![]() |
[11] |
P. Sutthiwichaiporn, V. Areekul, Adaptive boosted spectral filtering for progressive fingerprint enhancement, Pattern Recognit., 46 (2013), 2465–2486. https://doi.org/10.1016/j.patcog.2013.02.002 doi: 10.1016/j.patcog.2013.02.002
![]() |
[12] |
I. Joshi, T. Prakash, B. S. Jaiswal, R. Kumar, A. Dantcheva, S. D. Roy, et al., Context-aware restoration of noisy fingerprints, IEEE Sens. Lett., 6 (2022), 1–4. https://doi.org/10.1109/LSENS.2022.3203787 doi: 10.1109/LSENS.2022.3203787
![]() |
[13] | Q. Gao, P. Forster, K. R. Mobus, G. S. Moschytz, Fingerprint recognition using CNNs: Fingerprint preprocessing, In ISCAS 2001, The 2001 IEEE International Symposium on Circuits and Systems (Cat. No. 01CH37196), IEEE, 3 (2001), 433–436. https://doi.org/10.1109/ISCAS.2001.921340 |
[14] |
J. Zhang, Z. Lu, M. Li, H. Wu, GAN-based image augmentation for finger-vein biometric recognition, IEEE Access, 7 (2019), 183118–183132. https://doi.org/10.1109/ACCESS.2019.2960411 doi: 10.1109/ACCESS.2019.2960411
![]() |
[15] |
I. Joshi, A. Utkarsh, P. Singh, A. Dantcheva, S. D. Roy, P. K. Kalra, On restoration of degraded fingerprints, Multimed. Tools Appl., 81 (2022), 35349–35377. https://doi.org/10.1007/s11042-021-11863-3 doi: 10.1007/s11042-021-11863-3
![]() |
[16] |
T. Ohta, K. Kawasaki, Equilibrium morphology of block copolymer melts, Macromolecules, 19 (1986), 2621–2632. https://doi.org/10.1021/ma00164a028 doi: 10.1021/ma00164a028
![]() |
[17] |
Y. Li, Q. Xia, C. Lee, S. Kim, J. Kim, A robust and efficient fingerprint image restoration method based on a phase-field model, Pattern Recognit., 123 (2022), 108405. https://doi.org/10.1016/j.patcog.2021.108405 doi: 10.1016/j.patcog.2021.108405
![]() |
[18] |
J. Zhang, C. Chen, X. F. Yang, Efficient and energy stable method for the Cahn-Hilliard phase-field model for diblock copolymers, Appl. Numer. Math., 151 (2020), 263–281. https://doi.org/10.1016/j.apnum.2019.12.006 doi: 10.1016/j.apnum.2019.12.006
![]() |
[19] |
Y. Nishiura, I. Ohnishi, Some mathematical aspects of the micro-phase separation in diblock copolymers, Phys. D, 85 (1995), 31–39. https://doi.org/10.1016/0167-2789(95)00005-O doi: 10.1016/0167-2789(95)00005-O
![]() |
[20] |
A. Miranville, The Cahn-Hilliard equation and some of its variants, AIMS Math., 2 (2022), 479–544. https://doi.org/10.3934/Math.2017.2.479 doi: 10.3934/Math.2017.2.479
![]() |
[21] |
R. Scala, G. F. Schimperna, On the viscous Cahn-Hilliard equation with singular potential and inertial term, AIMS Math., 1 (2016), 64–76. https://doi.org/10.3934/Math.2016.1.64 doi: 10.3934/Math.2016.1.64
![]() |
[22] |
J. Yang, C. Lee, D. Jeong, J. Kim, A simple and explicit numerical method for the phase-field model for diblock copolymer melts, Comput. Mater. Sci., 205 (2022), 111192. https://doi.org/10.1016/j.commatsci.2022.111192 doi: 10.1016/j.commatsci.2022.111192
![]() |
[23] |
Q. Du, L. Ju, X. Li, Z. Qiao, Stabilized linear semi-implicit schemes for the nonlocal Cahn-Hilliard equation, J. Comput. Phys., 363 (2018), 39–54. https://doi.org/10.1016/j.jcp.2018.02.023 doi: 10.1016/j.jcp.2018.02.023
![]() |
[24] |
Y. Li, S. Lan, X. Liu, B. Lu, L. Wang, An efficient volume repairing method by using a modified Allen-Cahn equation, Pattern Recognit., 107 (2020), 107478. https://doi.org/10.1016/j.patcog.2020.107478 doi: 10.1016/j.patcog.2020.107478
![]() |
1. | Yuting Sun, Xiaojuan Chen, Yanfeng Tang, Recovery of Incomplete Fingerprints Based on Ridge Texture and Orientation Field, 2024, 13, 2079-9292, 2873, 10.3390/electronics13142873 | |
2. | Seokjun Ham, Jaeyong Choi, Soobin Kwak, Junseok Kim, A structure-preserving explicit numerical scheme for the Allen–Cahn equation with a logarithmic potential, 2024, 538, 0022247X, 128425, 10.1016/j.jmaa.2024.128425 | |
3. | Chaeyoung Lee, Yunjae Nam, Minjoon Bang, Seokjun Ham, Junseok Kim, Numerical investigation of the dynamics for a normalized time-fractional diffusion equation, 2024, 9, 2473-6988, 26671, 10.3934/math.20241297 | |
4. | Jaeyong Choi, Seokjun Ham, Soobin Kwak, Youngjin Hwang, Junseok Kim, Stability analysis of an explicit numerical scheme for the Allen-Cahn equation with high-order polynomial potentials, 2024, 9, 2473-6988, 19332, 10.3934/math.2024941 | |
5. | Yuzi Jin, Soobin Kwak, Seokjun Ham, Junseok Kim, A fast and efficient numerical algorithm for image segmentation and denoising, 2024, 9, 2473-6988, 5015, 10.3934/math.2024243 | |
6. | Azhar Iqbal, Shahbaz Ahmad, Junseok Kim, Two-Level method for blind image deblurring problems, 2025, 485, 00963003, 129008, 10.1016/j.amc.2024.129008 | |
7. | Youngjin Hwang, Soobin Kwak, Hyundong Kim, Junseok Kim, An explicit numerical method for the conservative Allen–Cahn equation on a cubic surface, 2024, 9, 2473-6988, 34447, 10.3934/math.20241641 | |
8. | Yongho Choi, Youngjin Hwang, Soobin Kwak, Seokjun Ham, Hyundong Kim, Junseok Kim, A cell structure implementation of the multigrid method for the two-dimensional diffusion equation, 2025, 15, 2158-3226, 10.1063/5.0247042 | |
9. | Junseok Kim, Maximum principle preserving the unconditionally stable method for the Allen–Cahn equation with a high-order potential, 2025, 33, 2688-1594, 433, 10.3934/era.2025021 | |
10. | Soobin Kwak, Seokjun Ham, Jian Wang, Hyundong Kim, Junseok Kim, Effective perpendicular boundary conditions in phase-field models using Dirichlet boundary conditions, 2025, 0177-0667, 10.1007/s00366-025-02109-z | |
11. | Junseok Kim, Nonlinear dynamic evolution of a novel normalized time-fractional Burgers equation, 2025, 13, 26668181, 101096, 10.1016/j.padiff.2025.101096 | |
12. | Jian Wang, Haixiao Wang, Jialin Chen, Wenjing Jiang, Runqiao Peng, Junseok Kim, An efficient image encryption algorithm based on a time-delay predator–prey model, 2025, 131, 0946-2171, 10.1007/s00340-025-08412-3 | |
13. | Junxiang Yang, Seungyoon Kang, Sangkwon Kim, Youngjin Hwang, Soobin Kwak, Seokjun Ham, Junseok Kim, An efficient computational method for simulating incompressible fluid flows on a virtual cubic surface, 2025, 144, 10075704, 108676, 10.1016/j.cnsns.2025.108676 | |
14. | Mengyu Luo, Chaeyoung Lee, Jian Wang, Soobin Kwak, Hyundong Kim, Junseok Kim, Mengxin Chen, Designing Team Projects for Envy‐Free Group Collaboration to Overcome Free‐Rider Problem, 2025, 2025, 1026-0226, 10.1155/ddns/3370833 | |
15. | Youngjin Hwang, Seungyoon Kang, Junseok Kim, A Review of the Numerical Methods for Diblock Copolymer Melts, 2025, 82, 1546-2226, 1811, 10.32604/cmc.2025.061071 | |
16. | Jian Wang, Keyong Chen, Junseok Kim, Computational analysis of a normalized time-fractional Fokker–Planck equation, 2025, 665, 03784371, 130500, 10.1016/j.physa.2025.130500 | |
17. | Mengxin Chen, Canrong Tian, Seokjun Ham, Hyundong Kim, Junseok Kim, Impact of prey-taxis on a harvested intraguild predation predator–prey model, 2025, 0956-7925, 1, 10.1017/S0956792525000087 | |
18. | Seokjun Ham, Junxiang Yang, Youngjin Hwang, Junseok Kim, A novel multi-component Allen–Cahn system for reducing the vacuum phenomenon at the triple junction, 2025, 15, 2158-3226, 10.1063/5.0261749 |
Radius | Number of Damaged pixels | CPU time (s) |
20 | 1264 | 6.48 |
40 | 5024 | 21.51 |
60 | 11302 | 46.58 |