• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Fingerprint Classification and Matching using a Filterbank,” Thesis, (2000)

by S Prabhakar
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 18
Next 10 →

Recent advances in biometric person authentication

by J. -l. Dugelay, J. -c. Junqua, C. Kotropoulos, R. Kuhn, F. Perronnin, I. Pitas - In: Proc. Internat. Conf. Acoustics, Speech Signal Processing , 2002
"... Biometrics is an emerging topic in the field of signal processing. While enabling technologies (e.g. audio, video) for biometrics have mostly used separately, ultimately, biometric technologies could find their strongest role as interwined and complementary pieces of a multi-modal authentication sys ..."
Abstract - Cited by 22 (0 self) - Add to MetaCart
Biometrics is an emerging topic in the field of signal processing. While enabling technologies (e.g. audio, video) for biometrics have mostly used separately, ultimately, biometric technologies could find their strongest role as interwined and complementary pieces of a multi-modal authentication system. In this paper, a short overview of voice, fingerprint, and face authentication algorithms is provided. 1.
(Show Context)

Citation Context

...]. 3. FINGERPRINT AUTHENTICATION A fingerprint is the pattern of ridges and furrows on the surface of a fingertip. These patterns are unique and permanent. Identical twins have different fingerprints =-=[11]-=- and for the same person, fingerprints are different from hand to hand and finger to finger. Fingerprint recognition is one of the most mature biometrics and has been used since the beginning of the 2...

A probabilistic model of face mapping with local transformations and its application to person recognition

by Florent Perronnin, Jean-luc Dugelay, Senior Member, Kenneth Rose - IEEE TPAMI , 2005
"... Abstract—This paper proposes a new measure of “distance ” between faces. This measure involves the estimation of the set of possible transformations between face images of the same person. The global transformation, which is assumed to be too complex for direct modeling, is approximated by a patchwo ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
Abstract—This paper proposes a new measure of “distance ” between faces. This measure involves the estimation of the set of possible transformations between face images of the same person. The global transformation, which is assumed to be too complex for direct modeling, is approximated by a patchwork of local transformations, under a constraint imposing consistency between neighboring local transformations. The proposed system of local transformations and neighboring constraints is embedded within the probabilistic framework of a two-dimensional hidden Markov model. More specifically, we model two types of intraclass variabilities involving variations in facial expressions and illumination, respectively. The performance of the resulting method is assessed on a large data set consisting of four face databases. In particular, it is shown to outperform a leading approach to face recognition, namely, the Bayesian intra/extrapersonal classifier. Index Terms—Biometrics, face recognition, image processing, hidden Markov model, distance. 1
(Show Context)

Citation Context

...d consider the pattern of ridges and furrows as a texture image and that Gabor features, which are particularly relevant for the analysis of textures, could be used to characterize fingerprint images =-=[57]-=-. Then, it is crucial to understand which variabilities have to be modeled and to choose our local transformations accordingly. Indeed, as outlined in Section 2, the measure of similarity primarily de...

Noisy Fingerprint Image Enhancement Technique for Image Analysis: A Structure Similarity Measure Approach

by Raju Sonavane, Dr. B. S. Sawant , 2007
"... Fingerprint images vary in quality. In order to ensure that the performance of an automatic fingerprint identification system (AFIS) will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement module in the AFIS system. In this pap ..."
Abstract - Cited by 10 (0 self) - Add to MetaCart
Fingerprint images vary in quality. In order to ensure that the performance of an automatic fingerprint identification system (AFIS) will be robust with respect to the quality of input fingerprint images, it is essential to incorporate a fingerprint enhancement module in the AFIS system. In this paper, we introduce a special domain fingerprint enhancement methods which decomposes the input fingerprint image into a set of filtered images. From the filtered images, the orientation field is estimated and a quality mask which distinguishes the recoverable and unrecoverable corrupted regions in the input image is generated. Using the estimated orientation field, the input fingerprint image is adaptively enhanced in the recoverable regions A technology for recognizing fingerprints for security purposes is proving as regards as reliable but efficient recognition is depending on the quality of input fingerprint image. Recognition of the fingerprint becomes a complex computer problem while dealing with noisy and low quality images. In this Paper work we are focusing the special domainn biometric System of noisy and low quality images, which will be beneficial for recognition system. Experimental results show that our enhancement Methods improves the performance of the fingerprint Images makes it more robust with respect to the quality of input.
(Show Context)

Citation Context

...istence: The basic characteristics of fingerprint do not change with time i.e. preserve its characteristics and shape form birth to death. 2) Individuality: The fingerprint is unique to an individual =-=[3]-=-. This area of studies comes under biometric systems. Apart from the fingerprint sign of a human being there are various approaches to develop the biometrics system for above-mentioned applications us...

Model-based Design for Selecting Fingerprint Recognition Algorithms for Embedded Systems

by Rosario Arjona , Iluminada Baturone - in Proceedings of the 19th IEEE International Conference on Electronics, Circuits and Systems (ICECS , 2012
"... Abstract-Most of contributions for biometric recognition solutions (and specifically for fingerprint recognition) are implemented in software on PC or similar platforms. However, the wide spread of embedded systems means that fingerprint embedded systems will be progressively demanded and, hence, h ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract-Most of contributions for biometric recognition solutions (and specifically for fingerprint recognition) are implemented in software on PC or similar platforms. However, the wide spread of embedded systems means that fingerprint embedded systems will be progressively demanded and, hence, hardware dedicated solutions are needed to satisfy their constraints. CAD tools from Matlab-Simulink ease hardware design for embedded systems because automatize the design process from high-level descriptions to device implementation. Verification of results is set at different abstraction levels (highlevel description, hardware code simulation, and device implementation). This paper shows how a design flow based on models facilitates the selection of algorithms for fingerprint embedded systems. In particular, the search of a solution for directional image extraction suitable for its application to singular point extraction is detailed. Implementation results in terms of area occupation and timing are presented for different Xilinx FPGAs.
(Show Context)

Citation Context

...). Directional image gives global information of a fingerprint and plays an important role in fingerprint recognition. It is used in several authentication stages, from fingerprint acquisition to matching stage. Direction values offer information for enhancement and segmentation of fingerprint images [3] before feature extraction; singular points extraction [4], which are significant points in fingerprints; alignment process [5] necessary to correct placement when fingerprint is captured with different translation and rotation; and matching stage using directional features such as Fingercodes [6]. Depending on the application, the algorithm to extract the directional image has to be more or less accurate. Most popular approaches for computation of directional image are gradient-based or mask-based algorithms [7]. Since gradients are the most natural and accurate technique, let us take into account gradient-based algorithms. Gradient operators (Gaussian, Sobel, or Prewitt) are usually employed to compute gradients. Once convolutions with the operator windows are applied, horizontal and vertical gradients (Gx and Gy) are obtained. The ridge edge for the pixel (i, j) is orthogonal to the...

An Investigation of Predictive Profiling from Handwritten Signature Data

by Michael Fairhurst, Márjory Abreu - 10TH INTERNATIONAL CONFERENCE ON DOCUMENT ANALYSIS AND RECOGNITION , 2009
"... Although it has long been recognised that non-biometric factors (for example, general demographic characteristics) can have an impact on the performance of automated person identification systems, such information is not routinely adopted in most practical biometric processing. In forensic applicati ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Although it has long been recognised that non-biometric factors (for example, general demographic characteristics) can have an impact on the performance of automated person identification systems, such information is not routinely adopted in most practical biometric processing. In forensic applications, however, such additional information may be exploited most productively, since typical scenarios require the prediction of a wide range of individual characteristics from a range of available samples, biometric and non-biometric. In many such situations, it may be very useful to predict characteristics short of actual identity, since this type of prediction can significantly increase the amount of evidence available. In this paper we provide some benchmarking data to demonstrate the extent to which typical non-biometric information might be effective in practice in this context, and illustrate the differential effects depending on the classifier adopted. In particular, however, we investigate experimentally how traditionally measured handwritten signature data might be used to predict non-biometric categories in a way which can be exploited a variety of practical application scenarios.

Fingerprint Recognition System Based on Mapping Approach

by Dayashankar Singh
"... Fingerprint identification system is mainly consisted of fingerprint achieving, fingerprint classification and fingerprint matching. Fingerprint matching is the key to the system and effects on the precision and efficiency of the whole system directly. Fingerprints are matched mainly based on their ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Fingerprint identification system is mainly consisted of fingerprint achieving, fingerprint classification and fingerprint matching. Fingerprint matching is the key to the system and effects on the precision and efficiency of the whole system directly. Fingerprints are matched mainly based on their fingerprint texture pattern which can be described with the orientation field of fingerprints. A fingerprint, which has the different orientation angle structure in different local area of the fingerprint and has a texture pattern correlation among the neighboring local areas of the fingerprint, can be viewed as a Markov stochastic field. A novel method of fingerprint matching, which is based on embedded Hidden Markov Model (HMM) that is used for modeling the fingerprint’s orientation field, is described in this paper. The accurate and robust fingerprint matching can be achieved by matching embedded Hidden Markov Model parameters which were built after the processing of extracting features from a fingerprint, forming the samples of observation vectors and training the embedded Hidden Markov Model parameters.
(Show Context)

Citation Context

...print matching can be roughly divided into two categories: (1) the conventional approach based on minutiae of fingerprints [1], and (2) the statistical approach based on fingerprint texture structure =-=[2]-=-. The approaches based on minutiae of fingerprints, which includes ends and bifurcations of fingerprint ridges, represent fingerprints with the properties and relative positions of minutiae of a finge...

Converting Fingerprint Local Features to Public Key Using Fuzzy Extractor

by Mohammed S. Khalil, Dzulkifli Muhammad, M. Masroor Ahmed
"... Biometric security systems are being widely used for ensuring maximum level of safety. In Biometric system, neither the data is uniformly distributed, nor can it be reproduced precisely. Each time it is processed. However, this processed data cannot be used as a password or as a cryptography secret. ..."
Abstract - Add to MetaCart
Biometric security systems are being widely used for ensuring maximum level of safety. In Biometric system, neither the data is uniformly distributed, nor can it be reproduced precisely. Each time it is processed. However, this processed data cannot be used as a password or as a cryptography secret. This paper proposes a novel method to extract fingerprint minutiae features and converting it to a public key using the fuzzy extractor. The public key can be used as a key in a cryptographic application
(Show Context)

Citation Context

...ations, trifurcations, and undetermined. Consistent extraction of these features is essential for fingerprint recognition. There are many approaches in the literature about locating the local feature =-=[25; 26; 27; 2; 28; 29; 30; 31]-=-. In this paper Normalization, Thinning, Feature Filtering, and Feature Extraction are used for extracting the fingerprint feature as vectors which are used as input for the fuzzy extractor. 3.1 Norma...

Efficient Fingerprint Recognition System using Pseudo 2D Hidden Markov Model

by Parvathi R, Shanthi Saravanan D
"... Abstract- Fingerprint can only uniquely identify a person when compared to other types of biometric features. The existing system used the combination of bayes classifier and Henry classifier to increase the speed of authentication process and to provide accurate classification system respectively. ..."
Abstract - Add to MetaCart
Abstract- Fingerprint can only uniquely identify a person when compared to other types of biometric features. The existing system used the combination of bayes classifier and Henry classifier to increase the speed of authentication process and to provide accurate classification system respectively. But, the combination of those classifiers in real time systems becomes difficult to implement. This fingerprint recognition system uses the pseudo 2D hidden markov model which considers each types of fingerprint as separate states with different levels of markov chain. During the recognition process, the markov model verifies each super states to identify which types of fingerprint, then it can match the given fingerprint image with the image which are kept in database. The proposed work will improve the speed and recognition rate by using the pseudo 2D hidden markov model. In global pattern matching, the global pattern [4] of Fingerprint consists of six patterns: arch, tented arch, right loop, left loop, whorl, and twin loop. But the enhanced fingerprint recognition process consider the four major categories like arch, right loop, left loop and whorl (as shown in Fig.2.) as the super states of pseudo 2D hidden markov chain[5]. The tended arch and twin loop categories of fingerprint are considered as sub states of arch and whorl super sates respectively. Each pattern can be compared by the flow of ridges between two fingerprint images. Keyword- fingerprint recognition, hidden markov model, viterbi algorithm, fingerprint classification. I.
(Show Context)

Citation Context

...int image with the help of bayes classifier. Even though it overcomes the problem of one to one matching and slow retrieval of image, it does not have the Henry classes to improve consistency problem =-=[18]-=- and used only one sample per finger which degrades accuracy of the system. Jinwei Gu [4] proposed a method for fingerprint verification which includes both minutiae and model based orientation field ...

ACKNOWLEDGMENTS

by Geoff Scott, Kim Johnston , 2005
"... This work is copyright. It may be reproduced in whole or in part for study or training purposes subject to the inclusion of an acknowledgment of the source and no commercial usage or sale. Reproduction for purposes other than those indicated above, requires the prior written permission from the Comm ..."
Abstract - Add to MetaCart
This work is copyright. It may be reproduced in whole or in part for study or training purposes subject to the inclusion of an acknowledgment of the source and no commercial usage or sale. Reproduction for purposes other than those indicated above, requires the prior written permission from the Commonwealth. Requests and inquiries concerning reproduction and rights should be addressed to Commonwealth Copyright

Web site: www.itgi.org and www.isaca.org

by unknown authors
"... The IT Governance Institute (ITGI) strives to assist enterprise leaders in their responsibility to make IT successful in supporting the enterprise’s mission and goals. Its goals are to raise awareness and understanding among and provide guidance and tools to boards of directors, executive management ..."
Abstract - Add to MetaCart
The IT Governance Institute (ITGI) strives to assist enterprise leaders in their responsibility to make IT successful in supporting the enterprise’s mission and goals. Its goals are to raise awareness and understanding among and provide guidance and tools to boards of directors, executive management and chief information officers (CIOs) such that they are able to ensure within their enterprises that IT meets and exceeds expectations, and its risks are mitigated. Information Systems Audit and Control Association ® The Information Systems Audit and Control Association (ISACA ® ) is an international professional, technical and educational organization dedicated to being a recognized global leader in IT governance, security, control and assurance. With members in more than 100 countries, ISACA is uniquely positioned to fulfill the role of a central, harmonizing source of IT control practice standards the world over. Its strategic alliances with other organizations in the financial, accounting, auditing and IT professions ensure an unparalleled level of integration and commitment by business process owners. Disclaimer The IT Governance Institute, Information Systems Audit and Control Association and the author of Risk and Control of Biometric Technologies have designed the publication primarily as an educational resource for control professionals. ISACA makes no claim that use of this product will assure a successful outcome. The publication should not be considered inclusive of any proper procedures and tests or exclusive of other procedures and tests that are reasonably directed to obtaining the same
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University