oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
语言族的L可识性、L半可识性与L强可识性  [PDF]
雷忠学
科学通报 , 1986,
Abstract: 郭聿琦等建立和讨论了语言族的半可识性和强可识性,给出了积分语言族可识的充要条件。本文建立和讨论了语言族的L可识性、L半可识性和L强可识性,给出了L积分语言族的L可识、L半可识和L强可识的充分条件。
Fingerprint recognition using standardized fingerprint model  [PDF]
Le Hoang Thai,Ha Nhat Tam
International Journal of Computer Science Issues , 2010,
Abstract: Fingerprint recognition is one of most popular and accuracy Biometric technologies. Nowadays, it is used in many real applications. However, recognizing fingerprints in poor quality images is still a very complex problem. In recent years, many algorithms, models are given to improve the accuracy of recognition system. This paper discusses on the standardized fingerprint model which is used to synthesize the template of fingerprints. In this model, after pre-processing step, we find the transformation between templates, adjust parameters, synthesize fingerprint, and reduce noises. Then, we use the final fingerprint to match with others in FVC2004 fingerprint database (DB4) to show the capability of the model.
Fingerprint recognition using standardized fingerprint model  [PDF]
Le Hoang Thai,Ha Nhat Tam
Computer Science , 2011,
Abstract: Fingerprint recognition is one of most popular and accuracy Biometric technologies. Nowadays, it is used in many real applications. However, recognizing fingerprints in poor quality images is still a very complex problem. In recent years, many algorithms, models...are given to improve the accuracy of recognition system. This paper discusses on the standardized fingerprint model which is used to synthesize the template of fingerprints. In this model, after pre-processing step, we find the transformation between templates, adjust parameters, synthesize fingerprint, and reduce noises. Then, we use the final fingerprint to match with others in FVC2004 fingerprint database (DB4) to show the capability of the model.
Fingerprint Recognition System
Bhawna Negi,Varun Sharma
International Journal of Electronics and Computer Science Engineering , 2012,
Abstract: The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person’s life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, which scans the image at the boundary to preserves the quality of the image and extract the minutiae from the thinned image. The false matching ratio is better compared to the existing algorithm.
Enhancement of Fingerprint Extraction: Algorithms and Performance Evaluation  [cached]
Priti Jain H. K. Sawant
International Journal of Electronics Communication and Computer Engineering , 2012,
Abstract: The fingerprint recognition problem can be grouped into two sub-domains: one is fingerprint verification and the other is fingerprint identification. In addition, different from the manual approach for fingerprint recognition by experts, the fingerprint recognition here is referred as Fingerprint Recognition System, which is program-based. Fingerprint verification is to verify the authenticity of one person by his fingerprint. The user provides his fingerprint together with his identity information like his ID number. The fingerprint verification system retrieves the fingerprint template according to the ID number and matches the template with the real-time acquired fingerprint from the user. Usually it is the underlying design principle of Fingerprint Authentication System.
Automatic Fingerprint Recognition Using Minutiae Matching Technique for the Large Fingerprint Database  [PDF]
S. M. Mohsen,S. M. Zamshed Farhan,M. M. A. Hashem
Computer Science , 2013,
Abstract: Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification system. Because minutiae matching are certainly the most well-known and widely used method for fingerprint matching, minutiae are local discontinuities in the fingerprint pattern. In this paper a fingerprint matching algorithm is proposed using some specific feature of the minutiae points, also the acquired fingerprint image is considered by minimizing its size by generating a corresponding fingerprint template for a large fingerprint database. The results achieved are compared with those obtained through some other methods also shows some improvement in the minutiae detection process in terms of memory and time required.
Data Integrity in Fingerprint Images
A. Merry Ida,V. Kavitha,K.S. Easwarakumar
International Journal of Soft Computing , 2012,
Abstract: In e-commerce applications Authentication is provided with the combination of user id and password that results in fraud and misuse. Automated biometrics technology in general and fingerprints in particular, provide an accurate and reliable authentication method. However, fingerprint based authentication requires accessing fingerprint images scanned remotely at the user`s workstation, a potentially weak point in the security system. Even though the communication channel is encrypted, stored or synthetic fingerprint images might be fraudulently transmitted. To enhance security, embedding additional information directly in compressed fingerprint images can use data hiding technique. Integrity is incorporated while transmitting fingerprint for authentication. Data Integrity is achieved by hashing the features of fingerprint to that of Unique Person Identification (UPID).
Data Compression of Fingerprint Minutiae
VISHAL SHRIVASTAVA,SUMIT SHARMA
International Journal of Engineering Science and Technology , 2012,
Abstract: Biometric techniques have usual advantages over conventional personal identification technique. Among various commercially available biometric techniques such as face, fingerprint, Iris etc., fingerprint-based techniques are the most accepted recognition system. Fingerprints are trace or impression of patterns created byfriction ridges of the skin in the fingers and thumbs. Steganography usually used in smart card is a safe technique for authenticating a person. In steganography, biometric characteristic similar to fingerprint is hidden in an picture. As the quantity of information that can be stored by means of steganography is extremely restricted, compression mechanisms are essential in order to achieve reasonably little errors when finally checking fingerprints against the encoded templates. To decrease the volume of smart card, compression can beapplied to fingerprint template in order to make it take up fewer space. This paper is presenting the minutiae based inexpensive fingerprint compression technique. In minutiae based systems, the discontinuities in the regular ridge structure of fingerprint images are acknowledged in feature extraction step. During matching, asimilarity value between the features extracted from the template and the enter fingerprint images is calculated. This similarity value is used to appear at an accept / reject decision. We present a new approach based on delta compression for robustly compressing the fingerprint templates.
Distorted Fingerprint Verification System  [PDF]
Divya KARTHIKAESHWARAN,Jeyalatha SIVARAMAKRISHNAN
Informatica Economica Journal , 2011,
Abstract: Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.
An Effective Fingerprint Verification Technique  [PDF]
Minakshi Gogoi,D K Bhattacharyya
Computer Science , 2010,
Abstract: This paper presents an effective method for fingerprint verification based on a data mining technique called minutiae clustering and a graph-theoretic approach to analyze the process of fingerprint comparison to give a feature space representation of minutiae and to produce a lower bound on the number of detectably distinct fingerprints. The method also proving the invariance of each individual fingerprint by using both the topological behavior of the minutiae graph and also using a distance measure called Hausdorff distance.The method provides a graph based index generation mechanism of fingerprint biometric data. The self-organizing map neural network is also used for classifying the fingerprints.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.