Fingerprint is one of the most well-known biometrics that has been used for personal recognition. However, faked fingerprints have become the major enemy where they threat the security of this biometric. This paper proposes an efficient deep fingerprint classification network (DFCN) model to achieve accurate performances of classifying between real and fake fingerprints. This model has extensively evaluated or examined parameters. Total of 512 images from the ATVS-FFp_DB dataset are employed. The proposed DFCN achieved high classification performance of 99.22%, where fingerprint images are successfully classified into their two categories. Moreover, comparisons with state-of-art approaches are provided
Fingerprint classification is one of the most common approaches to accelerate the identification in...
This paper introduces an intelligent computational approach to automatically authenticate fingerprin...
Fingerprint identification systems are vulnerable to attempted authentication fraud by creating fake...
Fingerprint is one of the most well-known biometrics that has been used for personal recognition. Ho...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Summary Biometric recognition is a typical means to identify individuals or to verify claimed identi...
Fingerprints play a significant role in many sectors. Nowadays, fingerprints are used for identifica...
Fingerprints play a significant role in many sectors. Nowadays, fingerprints are used for identifica...
Biometric systems aim to reliably identify and authenticate an individual using physiological or beh...
Biometric identification has been widely used in identifying a genuine person from an impostor. Fing...
Fingerprint classification is one of the most common approaches to accelerate the identification in...
This paper introduces an intelligent computational approach to automatically authenticate fingerprin...
Fingerprint identification systems are vulnerable to attempted authentication fraud by creating fake...
Fingerprint is one of the most well-known biometrics that has been used for personal recognition. Ho...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Biometric classification plays a key role in fingerprint characterization, especially in the identif...
Summary Biometric recognition is a typical means to identify individuals or to verify claimed identi...
Fingerprints play a significant role in many sectors. Nowadays, fingerprints are used for identifica...
Fingerprints play a significant role in many sectors. Nowadays, fingerprints are used for identifica...
Biometric systems aim to reliably identify and authenticate an individual using physiological or beh...
Biometric identification has been widely used in identifying a genuine person from an impostor. Fing...
Fingerprint classification is one of the most common approaches to accelerate the identification in...
This paper introduces an intelligent computational approach to automatically authenticate fingerprin...
Fingerprint identification systems are vulnerable to attempted authentication fraud by creating fake...