• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,764
Next 10 →

Fingerprint Identification

by Www. Waprogramming. Com, Muzhir Shaban Al-ani, Anbar Iraq, Fingerprint Thinning, Biometric Recognition
"... Years ago, many algorithms are published for fingerprint recognition and these algorithms has different accuracy rate. This paper deals with the study of the existing fingerprint recognition algorithms in order to improve the performance of the proposed fingerprint algorithm to develop an efficient ..."
Abstract - Add to MetaCart
Years ago, many algorithms are published for fingerprint recognition and these algorithms has different accuracy rate. This paper deals with the study of the existing fingerprint recognition algorithms in order to improve the performance of the proposed fingerprint algorithm to develop an efficient

COMPUTATIONAL INTELLIGENCE IN FINGERPRINT IDENTIFICATION

by Asker M. Bazen, Sabih H. Gerez
"... New applications of fingerprint identification necessitate more reliable techniques. This research project aims at the application of computational intelligence techniques to fingerprint recognition. The problem to solve is the extraction of minutiae from fingerprint images. Genetic programming will ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
New applications of fingerprint identification necessitate more reliable techniques. This research project aims at the application of computational intelligence techniques to fingerprint recognition. The problem to solve is the extraction of minutiae from fingerprint images. Genetic programming

Altered Fingerprints: Identification and Analysis

by Reji R, Akhil Mathew Philip
"... Automated Fingerprint Identification Systems (AFIS) is deployed in law authorization and fringe control applications. This has elevated the requirement for guaranteeing that these frameworks are not traded off. A few issues identified with finger print analysis frameworks security have been explored ..."
Abstract - Add to MetaCart
Automated Fingerprint Identification Systems (AFIS) is deployed in law authorization and fringe control applications. This has elevated the requirement for guaranteeing that these frameworks are not traded off. A few issues identified with finger print analysis frameworks security have been

Vitality Detection in Fingerprint Identification

by Mojtaba Sepasian, Cristinel Mares, Wamadeva Balach, Mojtaba Sepasian, Cristinel Mares, Wamadeva Balachandran
"... Abstract:- The fingerprint liveness detection refers to the inspection of the finger characteristics to ensure whether the input finger is live or artificial. A number of fingerprint identification systems are used widely and implemented at various important places such as border and immigration ser ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract:- The fingerprint liveness detection refers to the inspection of the finger characteristics to ensure whether the input finger is live or artificial. A number of fingerprint identification systems are used widely and implemented at various important places such as border and immigration

Expertise in fingerprint identification

by Matthew B. Thompson - Journal of Forensic Sciences , 2013
"... Little is known about the nature and development of fingerprint expertise and, therefore, the best way to turn novices into experts. Little is known about the factors that affect matching accuracy and, therefore, what experts can legitimately testify to in court. This thesis explores the factors tha ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
that affect matching accuracy and the development of expertise in fingerprint identification, in order to inform training, and to provide an empirical basis for expert testimony in the courtroom. The investigation is grounded in exemplar, signal detection, and dual-process theories, and draws from literature

Comment on “Method of Fingerprint Identification”

by Ford Lumban Gaol
"... Abstract: Problem statement:  Paper that written by Surachai Panich reported matching two fingerprints taken from small database of fingerprints. Approach: In this study we used extensive literature review and research publication. We also compare with some best practices that applied in the busines ..."
Abstract - Add to MetaCart
Abstract: Problem statement:  Paper that written by Surachai Panich reported matching two fingerprints taken from small database of fingerprints. Approach: In this study we used extensive literature review and research publication. We also compare with some best practices that applied

FiberFingerprint Identification

by Escher Labs, Paul Yarin
"... We present an identification system based on the naturally occurring inhomogeneities of the surface of paper. We investigate the scaling of its performance for verification and identification through a general and rigorous framework and present a random coding argument that links biometric identific ..."
Abstract - Add to MetaCart
We present an identification system based on the naturally occurring inhomogeneities of the surface of paper. We investigate the scaling of its performance for verification and identification through a general and rigorous framework and present a random coding argument that links biometric

Fingerprint Identification Keyless Entry System

by Chih-neng Liang, Huang-bin Huang, Bo-chiuan Chen
"... Abstract—Nowadays, keyless entry systems are widely adopted for vehicle immobilizer systems due to both advantages of security and convenience. Keyless entry systems could overcome brute-force key guessing attack, statistics attack and masquerade attack, however, they can't prevent from thieves ..."
Abstract - Add to MetaCart
thieves stealing behavior. In this paper, we proposed a new architecture try to improve the existent flaws. The integration of the keyless entry system and the fingerprint identification technology is more suitable to implement on the portable transponder to achieve higher security needs. We also adopt

Fingerprint identification: Classification vs. indexing

by Xuejun Tan, Bir Bhanu, Yingqiang Lin - in Proc. IEEE Conf. Advanced Video and Signal Based Surveillance , 2003
"... In this paper, we present a comparison of two key approaches for fingerprint identification. These approaches are based on (a) classification followed by verification, and (b) indexing followed by verification. The fingerprint classification approach is based on a novel feature-learning algorithm. I ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
In this paper, we present a comparison of two key approaches for fingerprint identification. These approaches are based on (a) classification followed by verification, and (b) indexing followed by verification. The fingerprint classification approach is based on a novel feature-learning algorithm

A Hybrid System for Fingerprint Identification

by Shabana Tadvi
"... Fingerprint-based identification is one of the core methodologies for person identification. It remains a reliable, efficient and commonly accepted biometric. The most popular and extensively used method for fingerprint identification; the minutiae based, show poor performance for real time authenti ..."
Abstract - Add to MetaCart
Fingerprint-based identification is one of the core methodologies for person identification. It remains a reliable, efficient and commonly accepted biometric. The most popular and extensively used method for fingerprint identification; the minutiae based, show poor performance for real time
Next 10 →
Results 1 - 10 of 1,764
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University