1 / 20

Fingerprint verification

Fingerprint verification. Speaker: Shu-Fen Chiou ( 邱淑芬 ) Date:2005/06/03. Fast Fingerprint Verification Using Subregions of Fingerprint Images. IEEE transactions on circuits and systems for video technology, vol. 14, no.1, 2004, pp.95-101 K.C. Chan, Y.S. Moon, and P.S. Cheng.

danno
Download Presentation

Fingerprint verification

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Fingerprint verification Speaker: Shu-Fen Chiou (邱淑芬) Date:2005/06/03

  2. Fast Fingerprint Verification Using Subregions of Fingerprint Images • IEEE transactions on circuits and systems for video technology, vol. 14, no.1, 2004, pp.95-101 • K.C. Chan, Y.S. Moon, and P.S. Cheng

  3. Acceleration problem from a different perspective—using a smaller fingerprint images region to extract the minutiae.

  4. Fingerprint minutiae matching using the adjacent feature vector • Pattern Recognition Letters, vol.26, 2005, pp.1337-1345 • Xifeng Tong, Janhua Huang, Xianglong Tang, and Daming Shi

  5. Adjacent features of a minutia is very important for matching.

  6. Fingerprint Matching Using anOrientation-Based Minutia Descriptor • IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 8, AUGUST 2003 • Marius Tico, Member, IEEE, and Pauli Kuosmanen, Member, IEEE

  7. A novel fingerprint representation scheme that relies on describing the orientation field of the fingerprint pattern with respect to each minutia detail.

  8. Biohashing: two factor authentication featuring fingerprint data andtokenised random number • Pattern Recognition, vol. 37, 2004, pp.2245 – 2255 • Andrew Teoh Beng Jina, David Ngo Chek Linga and Alwyn Gohb

  9. The discretisation is carried out by iterated inner product between the pseudo-random number and the wavelet Fourier–Mellin transform (FMT)(傅利葉-梅林變換式) fingerprint feature.

More Related