Fingerprint verification
Download
1 / 20

Fingerprint verification - PowerPoint PPT Presentation


  • 170 Views
  • Uploaded on

Fingerprint verification. Speaker: Shu-Fen Chiou ( 邱淑芬 ) Date:2005/06/03. Fast Fingerprint Verification Using Subregions of Fingerprint Images. IEEE transactions on circuits and systems for video technology, vol. 14, no.1, 2004, pp.95-101 K.C. Chan, Y.S. Moon, and P.S. Cheng.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Fingerprint verification' - danno


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Fingerprint verification

Fingerprint verification

Speaker: Shu-Fen Chiou (邱淑芬)

Date:2005/06/03


Fast fingerprint verification using subregions of fingerprint images
Fast Fingerprint Verification Using Subregions of Fingerprint Images

  • IEEE transactions on circuits and systems for video technology, vol. 14, no.1, 2004, pp.95-101

  • K.C. Chan, Y.S. Moon, and P.S. Cheng



Fingerprint minutiae matching using the adjacent feature vector
Fingerprint minutiae matching using the adjacent feature vector

  • Pattern Recognition Letters, vol.26, 2005, pp.1337-1345

  • Xifeng Tong, Janhua Huang, Xianglong Tang, and Daming Shi



Fingerprint matching using an orientation based minutia descriptor
Fingerprint Matching Using an matching.Orientation-Based Minutia Descriptor

  • IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 8, AUGUST 2003

  • Marius Tico, Member, IEEE, and Pauli Kuosmanen, Member, IEEE



Biohashing two factor authentication featuring fingerprint data and tokenised random number
Biohashing: two factor authentication featuring fingerprint data andtokenised random number

  • Pattern Recognition, vol. 37, 2004, pp.2245 – 2255

  • Andrew Teoh Beng Jina, David Ngo Chek Linga and Alwyn Gohb



ad