6,240 research outputs found

    Fingerprint Identification - New Directions

    Get PDF
    In most of the algorithms that have been suggested in this report, the fingerprint image is reduced to a relatively short sequence of integers. This reduces the memory size required by the database. Each algorithm is intended to exploit specific properties and features of the fingerprint that vary from finger to finger, and that can be localized relatively fast using digital techniques, thus also reducing the computational time requirements to a minimum. In each case, the sensitivity of the algorithm to small variations in the image was also discussed, with the aim of reducing the False Rejection Rate, and of increasing the general robustness of the algorithm

    Robust Minutiae Extractor: Integrating Deep Networks and Fingerprint Domain Knowledge

    Full text link
    We propose a fully automatic minutiae extractor, called MinutiaeNet, based on deep neural networks with compact feature representation for fast comparison of minutiae sets. Specifically, first a network, called CoarseNet, estimates the minutiae score map and minutiae orientation based on convolutional neural network and fingerprint domain knowledge (enhanced image, orientation field, and segmentation map). Subsequently, another network, called FineNet, refines the candidate minutiae locations based on score map. We demonstrate the effectiveness of using the fingerprint domain knowledge together with the deep networks. Experimental results on both latent (NIST SD27) and plain (FVC 2004) public domain fingerprint datasets provide comprehensive empirical support for the merits of our method. Further, our method finds minutiae sets that are better in terms of precision and recall in comparison with state-of-the-art on these two datasets. Given the lack of annotated fingerprint datasets with minutiae ground truth, the proposed approach to robust minutiae detection will be useful to train network-based fingerprint matching algorithms as well as for evaluating fingerprint individuality at scale. MinutiaeNet is implemented in Tensorflow: https://github.com/luannd/MinutiaeNetComment: Accepted to International Conference on Biometrics (ICB 2018

    A New Technique to Fingerprint Recognition Based on Partial Window

    Get PDF
    Fingerprint verification is a well-researched problem, and automatic fingerprint verification techniques have been successfully adapted to both civilian and forensic applications for many years. This paper present a new technique to fingerprint recognition based a window that contain  core point this window will be input ANN system to be model we can recognize another fingerprint , so we will firstly,  A recognition algorithm needs to recover fingerprints pose transformation between the input reduce time computation. Our detection algorithm works in the field orientation of the adaptive smoothed with a varying area. The adaptive window is used to attenuate the noise effectively orientation field while maintaining the information of the detailed guidance in the area of ??high curvature. A new approach to the core point location that is proposed is based on hierarchical analysis orientation consistency. The proposed adaptation singular point detection method increases the accuracy of the algorithm. Experiments show that our algorithm developed consistently locates a reference point with high precision only for all fingerprints. And very faster for recognition process. Keywords: Fingerprint recognition; field orientation; neural networks; core point, neural networks

    Scale Invariant Feature Transform Based Fingerprint Corepoint Detection

    Get PDF
    The detection of singular points (core and delta) accurately and reliably is very important for classification and matching of fingerprints. This paper presents a new approach for core point detection based on scale invariant feature transform (SIFT). Firstly, SIFT points are extracted ,then reliability and ridge frequency criteria are applied to reduce the candidate points required to make a decision on the core point. Finally a suitable mask is applied to detect an accurate core point. Experiments on FVC2002 and FVC2004 databases show that our approach locates a unique reference point with high accuracy. Results of our approach are compared with those of the existing methods in terms of accuracy of core point detection.Defence Science Journal, 2013, 63(4), pp.402-407, DOI:http://dx.doi.org/10.14429/dsj.63.270

    Wireless and Physical Security via Embedded Sensor Networks

    Full text link
    Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of "cyber space" and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (Sensor Network workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.National Science Foundation (CISE/CSR 0720604, ENG/EFRI 0735974, CIES/CNS 0520166, CNS/ITR 0205294, CISE/ERA RI 0202067

    Analysis of extracted fingerprint texture features

    Full text link
    This paper describes an approach for electronic feature extraction from fingerprint images for identification purposes. Statistical analysis of the features extracted from the fingerprint provides the advantage of real-time analysis of the fingerprint information, providing a method to remove unwanted information prior to the matching stage required in electronic fingerprint verification. This method can also detect of noise within the fingerprint image and location of critical data in the fingerprint. In order to demonstrate the effectiveness of this work, experiments have been developed and conducted with the results and analysis provided at the end of this paper for discussion.<br /

    Poor Quality Fingerprint Recognition Based on Wave Atom Transform

    Get PDF
    Fingerprint is considered the most practical biometrics due to some specific features which make them widely accepted. Reliable feature extraction from poor quality fingerprint images is still the most challenging problem in fingerprint recognition system. Extracting features from poor fingerprint images is not an easy task. Recently, Multi-resolution transforms techniques have been widely used as a feature extractor in the field of biometric recognition. In this paper we develop a complete and an efficient fingerprint recognition system that can deal with poor quality fingerprint images. Identification of poor quality fingerprint images needs reliable preprocessing stage, in which an image alignment, segmentation, and enhancement processes are performed. We improve a popular enhancement technique by replacing the segmentation algorithm with another new one. We use Waveatom transforms in extracting distinctive features from the enhanced fingerprint images. The selected features are matched throw K-Nearest neighbor classifier techniques. We test our methodology in 114 subjects selected from a very challenges database; CASIA; and we achieve a high recognition rate of about 99.5%
    • …
    corecore