[[abstract]]Abstract The technique of digital fingerprint matching has been used for more than thirty years. Two main traditional approaches to do fingerprint matching are minutiae-based matching and filter-based matching. They were proposed to extract the features of ridges and valleys pattern and verify the incoming fingerprint with stored fingerprint database fast and accurately. But the widely used minutiae-based matching has difficulty in quickly matching two fingerprint images containing different number of unregistered minutiae points. And the filter-based matching suffered much in false acceptance rate when dealt with defective fingerprints. The proposed phase-based matching algorithm uses phase difference to do fingerprint verifica...
The diploma thesis presents an upgrade of the FingerIdent fingerprint verification system. The curre...
In this paper we tend to propose a high-speed technique for fingerprint recognition supported minuti...
Fingerprints have long been used for person authentication. However, there is not enough scientific ...
[[abstract]]The technique of digital fingerprint matching has been used for morethan thirty years. T...
Fingerprint consists of connected ridges with furrows between the space of the ridges. These pattern...
Minutiae-based method is the most popular approach in fingerprint matching. However, most existing m...
Abstract — A major approach for fingerprint recognition today is to extract minutiae from fingerprin...
In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditio...
In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditio...
In this paper, we introduce a novel minutiae-based matching algorithm for fingerprint recognition. T...
In this paper, we introduce a novel minutiae-based matching algorithm for fingerprint recognition. T...
A major approach for palmprint recognition today is to extract feature vectors corresponding to indi...
In fingerprint verification or identification systems, most minutiae-based matching algorithms suffe...
Abstract: In this paper fingerprints are identified with the help of minutiae detection and phase sp...
Fingerprints are considered as a unique identification of a person and due to easy access its the be...
The diploma thesis presents an upgrade of the FingerIdent fingerprint verification system. The curre...
In this paper we tend to propose a high-speed technique for fingerprint recognition supported minuti...
Fingerprints have long been used for person authentication. However, there is not enough scientific ...
[[abstract]]The technique of digital fingerprint matching has been used for morethan thirty years. T...
Fingerprint consists of connected ridges with furrows between the space of the ridges. These pattern...
Minutiae-based method is the most popular approach in fingerprint matching. However, most existing m...
Abstract — A major approach for fingerprint recognition today is to extract minutiae from fingerprin...
In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditio...
In this paper, a correlation-based fingerprint verification system is presented. Unlike the traditio...
In this paper, we introduce a novel minutiae-based matching algorithm for fingerprint recognition. T...
In this paper, we introduce a novel minutiae-based matching algorithm for fingerprint recognition. T...
A major approach for palmprint recognition today is to extract feature vectors corresponding to indi...
In fingerprint verification or identification systems, most minutiae-based matching algorithms suffe...
Abstract: In this paper fingerprints are identified with the help of minutiae detection and phase sp...
Fingerprints are considered as a unique identification of a person and due to easy access its the be...
The diploma thesis presents an upgrade of the FingerIdent fingerprint verification system. The curre...
In this paper we tend to propose a high-speed technique for fingerprint recognition supported minuti...
Fingerprints have long been used for person authentication. However, there is not enough scientific ...