Segui questo link per vedere altri tipi di pubblicazioni sul tema: Fingerprint Verification.

Tesi sul tema "Fingerprint Verification"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-39 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Fingerprint Verification".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.

1

Yager, Neil Gordon Computer Science &amp Engineering Faculty of Engineering UNSW. "Hierarchical fingerprint verification." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/27008.

Testo completo
Abstract (sommario):
Fingerprints have been an invaluable tool for law enforcement and forensics for over a century, motivating research into automated fingerprint based identification in the early 1960's. More recently, fingerprints have found an application in the emerging industry of biometric systems. Biometrics is the automatic identification of an individual based on physiological or behavioral characteristics. Due to its security related applications and the current world political climate, biometrics is presently the subject of intense research by private and academic institutions. Fingerprints are emerg
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Deng, Huimin. "Robust minutia-based fingerprint verification." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B37036427.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Deng, Huimin, and 鄧惠民. "Robust minutia-based fingerprint verification." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37036427.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Yan, Weiwei. "Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66677.

Testo completo
Abstract (sommario):
In order to protect the security of the commercial information, personnel information, military information, governmental information on the Internet, the claimed identity should be authenticated. Now there are three main security authentication methods: first: using user PIN, such as password; second: using physical key, such as USBKey; third: using biological authentication technology, such as fingerprint, iris, voice and palm prints, etc. Because of the uniqueness, invariance, and ubiquity properties of biometric authentication, biometric authentication is becoming popular, especially finge
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Sandström, Marie. "Liveness Detection in Fingerprint Recognition Systems." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2397.

Testo completo
Abstract (sommario):
<p>Biometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today. </p><p>Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Fransson, Linda, and Therese Jeansson. "Biometric methods and mobile access control." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.

Testo completo
Abstract (sommario):
Our purpose with this thesis was to find biometric methods that can be used in access control of mobile access. The access control has two parts. Firstly, to validate the identity of the caller and, secondly, to ensure the validated user is not changed during the session that follows. Any solution to the access control problem is not available today, which means that anyone can get access to the mobile phone and the Internet. Therefore we have researched after a solution that can solve this problem but also on how to secure that no one else can take over an already validated session. We began
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Sun, Wei [Verfasser], Thomas [Akademischer Betreuer] Sikora, Thomas [Gutachter] Sikora, Atta [Gutachter] Badii, and Ivo [Gutachter] Keller. "Low complexity embedded fingerprint verification and identification system / Wei Sun ; Gutachter: Thomas Sikora, Atta Badii, Ivo Keller ; Betreuer: Thomas Sikora." Berlin : Technische Universität Berlin, 2016. http://d-nb.info/1156181704/34.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Dimitrov, Emanuil. "Fingerprints recognition." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.

Testo completo
Abstract (sommario):
<p>Nowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sampl
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Falade, Joannes Chiderlos. "Identification rapide d'empreintes digitales, robuste à la dissimulation d'identité." Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC231.

Testo completo
Abstract (sommario):
La biométrie est de plus en plus utilisée à des fins d’identification compte tenu de la relation étroite entre la personne et son identifiant (comme une empreinte digitale). Nous positionnons cette thèse sur la problématique de l’identification d’individus à partir de ses empreintes digitales. L’empreinte digitale est une donnée biométrique largement utilisée pour son efficacité, sa simplicité et son coût d’acquisition modeste. Les algorithmes de comparaison d’empreintes digitales sont matures et permettent d’obtenir en moins de 500 ms un score de similarité entre un gabarit de référence (stoc
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Bartoň, Jaroslav. "Podpora pro autentizaci pomocí otisků prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-235492.

Testo completo
Abstract (sommario):
The goal of the thesis is the finger-print authentication support within the Linux operating system and the K Desktop Environment (KDE). Theoretical part of the thesis firstly explains main IT security terms and ways to proof the identity. Secondly it describes biometric systems and types of processed biometric characteristics. Lastly the features of finger-prints, their markants as well as types of scanners used in scanning the finger-prints and ways to analyze the scanned material have been elaborated. Practical solution part of the thesis develops and establishes finger-print management app
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Wales, Chris. "Identifying digital fingerprints in source code for authorship verification /." Leeds : University of Leeds, School of Computer Studies, 2008. http://www.comp.leeds.ac.uk/fyproj/reports/0708/Wales.pdf.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Kazík, Martin. "Zpracování otisků prstů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218978.

Testo completo
Abstract (sommario):
This diploma thesis deals with the identification of persons by their fingerprints. In the beginning, there is a brief overview of biometric methods. The issue of fingerprints and their automatic processing is very extensive and addresses a large amount of literature. This work describes the various stages processing fingerprints from receiving a fingerprint scan through the methods of enhancing fingerprint, binarization, the detection of minutiae to compare two fingerprints. After a short introduction of biometric techniques is briefly introduced the history of fingerprints as an instrument f
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Kovář, Martin. "Snímač otisku prstu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221330.

Testo completo
Abstract (sommario):
This master’s thesis deals with the issue of scanning human fingerprints, which is currently very topical and represents the most widespread biometric technology. The theoretical part of the work acquaints the reader with basics of dactyloscopy and biometrics and concerns technologies used for fingerprinting, image preprocessing methods and commercially available contactless optical scanners. The practical part is a realisation of a contactless optical scanner based on a Raspberry Pi minicomputer, implementation of preprocessing algorithms in Python and testing of the device from the perspecti
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Wu, Di. "A Global Spatial Model for Loop Pattern Fingerprints and Its Spectral Analysis." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538788/.

Testo completo
Abstract (sommario):
The use of fingerprints for personal identification has been around for thousands of years (first established in ancient China and India). Fingerprint identification is based on two basic premises that the fingerprint is unique to an individual and the basic characteristics such as ridge pattern do not change over time. Despite extensive research, there are still mathematical challenges in characterization of fingerprints, matching and compression. We develop a new mathematical model in the spatial domain for globally modeling loop pattern fingerprints. Although it is based on the well-known A
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Chikkerur, Sharat S. "Online fingerprint verification system." 2005. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:1426769.

Testo completo
Abstract (sommario):
Thesis (M.S.)--State University of New York at Buffalo, 2005.<br>Title from PDF title page (viewed on Feb. 2, 2006) Available through UMI ProQuest Digital Dissertations. Thesis adviser: Alexander N. Cartwright.
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Ding, Chian-Chuang, and 丁鎮權. "Fingerprint Verification System Design." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/61180923557915950456.

Testo completo
Abstract (sommario):
碩士<br>淡江大學<br>電機工程學系<br>91<br>With the advance of new technologies some biological features, such as pupil, face, fingerprint, have been employed for developing personal identification systems. Among all, fingerprint identification is one of the most commonly used. Beside to the uniqueness and the time invariance properties of fingerprints necessary for identification, the costs and the performance of fingerprint identification methods are quite comparable with the methods using other biological features. Fingerprint identification also plays an important role in law’s identity. Therefore how
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Chang, Chia-Yung, and 張嘉勇. "Automatic Fingerprint Verification System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/09665079293715705261.

Testo completo
Abstract (sommario):
碩士<br>國立清華大學<br>資訊工程學系<br>91<br>Fingerprints are considered as an efficient and viable means of biometrics. An automatic fingerprint verification system (AFVS) can automatically verify an individual based on minutiae matching. The fingerprint verification contains two main stages, fingerprint classification and fingerprint matching. In the stage of fingerprint classification, fingerprints are classified into four classes to reduce the following fingerprint matching. The four classes are arch, left loop, right loop and whorl. In the stage of fingerprint matching, fingerprint minutiae must be de
Gli stili APA, Harvard, Vancouver, ISO e altri
18

"Fast fingerprint verification using sub-regions of fingerprint images." 2004. http://library.cuhk.edu.hk/record=b5892013.

Testo completo
Abstract (sommario):
Chan Ka Cheong.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.<br>Includes bibliographical references (leaves 77-85).<br>Abstracts in English and Chinese.<br>Chapter 1. --- Introduction --- p.1<br>Chapter 1.1 --- Introduction to Fingerprint Verification --- p.1<br>Chapter 1.1.1 --- Biometrics --- p.1<br>Chapter 1.1.2 --- Fingerprint History --- p.2<br>Chapter 1.1.3 --- Fingerprint characteristics --- p.4<br>Chapter 1.1.4 --- A Generic Fingerprint Matching System Architecture --- p.6<br>Chapter 1.1.5 --- Fingerprint Verification and Identification --- p.8<br>Chapter 1.1.7 --
Gli stili APA, Harvard, Vancouver, ISO e altri
19

"Towards more robust fingerprint verification." 2005. http://library.cuhk.edu.hk/record=b5892379.

Testo completo
Abstract (sommario):
Yeung Hoi Wo.<br>Thesis (M.Phil.)--Chinese University of Hong Kong, 2005.<br>Includes bibliographical references (leaves 81-88).<br>Abstracts in English and Chinese.<br>Chapter 1. --- Introduction --- p.10<br>Chapter 1.1 --- Biometric Systems --- p.1<br>Chapter 1.2 --- Comparison of Biometrics --- p.2<br>Chapter 1.3 --- Introduction of Fingerprint --- p.6<br>Chapter 1.3.1 --- History of Fingerprint --- p.6<br>Chapter 1.3.2 --- Fingerprint Analysis --- p.8<br>Chapter 1.4 --- Fingerprint Verification --- p.13<br>Chapter 1.4.1 --- Correlation Based Verification: --- p.13<br>Chapter 1.4.2
Gli stili APA, Harvard, Vancouver, ISO e altri
20

yu, yang shih, and 楊詩郁. "A Study of Fingerprint Verification." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/21144669747974241067.

Testo completo
Abstract (sommario):
碩士<br>淡江大學<br>資訊工程學系<br>88<br>Various technological approaches for the identification of individuals have been proposed and fingerprint identification is one of the most reliable approaches. In the past, several organizations have used fingerprint identification successfully for not only the investigation of criminals but also to control access to restricted data or areas. Recently, the demand for automatic identification is increasing in the business world for transactions and individual''s security. The advantage of the fingerprint identification is that it contains two convenient secure cha
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Chia-Chi, Wu, and 吳家頎. "Fingerprint Verification System on SoC." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/01575945899273418139.

Testo completo
Abstract (sommario):
碩士<br>國立臺灣科技大學<br>資訊工程系<br>91<br>Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is so tedious, time-consuming, and inefficiency. Therefore, an automatic fingerprint identification system (AFIS) is widely needed. It plays a very important role in forensic and civilian applications such as criminal identification, access control. This paper describes the design and implementation of a fingerprint verification system on System on a Chip (SoC). Our fingerprint verification system operates in four stages: fin
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Chen, Ming-Zong, and 陳銘宗. "Feature Points Fingerprint Verification System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/62070343839797608189.

Testo completo
Abstract (sommario):
碩士<br>清雲科技大學<br>電機工程所<br>99<br>Biometrics is using biological features to verify the user&apos;&apos;s own identity, and these features include voice, face, fingerprint, iris ... and so on. The fingerprint feature is the most commonly used research method in personal verification. In addition to the fingerprint keeps the same during a long period of time, the implementation of the function is more convenience and more practical than other verification methods. In this study, we modify the existing algorithms to designed a verification system using C + + programming language. We use the capacit
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Chen, Po-Jui. "Development of Automatic Fingerprint Verification Systems." 2004. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2707200402425600.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Chen, Po-Jui, and 陳柏睿. "Development of Automatic Fingerprint Verification Systems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/21074703439603445585.

Testo completo
Abstract (sommario):
碩士<br>國立臺灣大學<br>機械工程學研究所<br>92<br>Most fingerprint verification systems take advantage of fingerprint minutiae as matching features. Since the classification rate of the minutia-based method is determined by the quality of input fingerprint images, the minutia-based method usually demands a large amount of image preprocessing to remove signal noise. Obviously, this not only increases system computation complexity, but also reduces matching speed. In order to avoid these drawbacks, this thesis combines the automatic threshold selection with differential pulse transform algorithm and adopts the
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Hsiao, Chih-Hao, and 蕭志豪. "Fingerprint Recognition Chip Design via the Improved Multi-level Fingerprint Verification Algorithm." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/s93sb7.

Testo completo
Abstract (sommario):
碩士<br>淡江大學<br>電機工程學系碩士班<br>94<br>Nowadays, the importance of the information protection and the entrance guard control system have be attached importance to the people. Traditional secret maintaining methods like setting up passwords are eliminated gradually, and the biometric verification technique is to take it over. Biometric verification technique is applied on enhancing the system of maintaining secrecy gradually. Biometric verification techniques which are available now are mainly as follows : iris, voice, appearance, and fingerprint. On account of its precision and convenience, fingerpr
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Lin, Jeng-Je, and 林正哲. "Fingerprint Verification System using Phase Correlation Technique." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/61344414746658609742.

Testo completo
Abstract (sommario):
碩士<br>國立臺灣師範大學<br>工業教育研究所<br>88<br>Abstract The technique of digital fingerprint matching has been used for more than thirty years. Two main traditional approaches to do fingerprint matching are minutiae-based matching and filter-based matching. They were proposed to extract the features of ridges and valleys pattern and verify the incoming fingerprint with stored fingerprint database fast and accurately. But the widely used minutiae-based matching has difficulty in quickly matching two fingerprint images containing different number of unregistered minutiae points. And the filter-ba
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Li-Ming, Lee. "Development of an Anti-Forgery Fingerprint Verification System." 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2307200519203300.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Gwo-Cheng, Chao, and 趙國成. "A Fingerprint Verification System based on Minutiae Matching." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/69420330587510232317.

Testo completo
Abstract (sommario):
碩士<br>國立臺灣科技大學<br>資訊工程系<br>93<br>Fingerprint based identification has been known and used for a long time. Owing to the uniqueness and immutability, fingerprints are today the most widely used biometric features. Fingerprint verification is based on the minutiae of the fingerprints. Extracting minutiae from fingerprint patterns is one of the most important steps in automatic system for fingerprint identification. This model, adopted in most automatic systems, is based on a two-class minutiae classification: endpoint and bifurcation .The accuracy of the minutiae will affect the corre
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Lee, Li-Ming, and 李立明. "Development of an Anti-Forgery Fingerprint Verification System." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/86092650347705322132.

Testo completo
Abstract (sommario):
碩士<br>國立臺灣大學<br>機械工程學研究所<br>93<br>In general, the fingerprint verification systems are good enough for daily secure life. But if the biometric technology of duplicating fingerprints has a significant improvement, or a bandit cuts off the authorizer’s finger, the only fingerprint verification procedure is not safe any more. Therefore, we have to develop an Anti-Forgery Fingerprint Verification System to ensure the fingerprint pattern directly extracting from one’s finger but not a duplicated fingerprint mask. An AFFVS (Anti-Forgery Fingerprint Verifications System) is a verification system comb
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Tseng, Chun-Chieh, and 曾俊傑. "Design Methodology of An Intelligent Fingerprint Verification System." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/90582948099717557897.

Testo completo
Abstract (sommario):
碩士<br>義守大學<br>電機工程學系<br>89<br>This thesis advances a complete methodology of an intelligent fingerprint verification system. It applies circular auto-correlation to perform the features transformed from fingerprint images. SOM-BK neural network is used for extracting fingerprint minutia. An intelligent minutia point matching method based on particle swarm optimization is also applied. Circular auto-correlation produces a set of rotation-invariant feature vectors by transforming each local pattern on the fingerprint. We establish a mixed neural networks which combine SOM and MFNN neu
Gli stili APA, Harvard, Vancouver, ISO e altri
31

"The statistical evaluation of minutiae-based automatic fingerprint verification systems." Thesis, 2006. http://library.cuhk.edu.hk/record=b6074180.

Testo completo
Abstract (sommario):
Basic technologies for fingerprint feature extraction and matching have been improved to such a stage that they can be embedded into commercial Automatic Fingerprint Verification Systems (AFVSs). However, the reliability of AFVSs has kept attracting concerns from the society since AFVSs do fail occasionally due to difficulties like problematic fingers, changing environments, and malicious attacks. Furthermore, the absence of a solid theoretical foundation for evaluating AFVSs prevents these failures from been predicted and evaluated. Under the traditional empirical AFVS evaluation framework, r
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Hsieh, Fang-Ling, and 謝芳伶. "The Application of Fingerprint Verification based on Support Vector Machines." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/49dsxu.

Testo completo
Abstract (sommario):
碩士<br>靜宜大學<br>資訊管理學系研究所<br>92<br>The issues of security are broadly discussed nowadays. Without effective security protection, even the most excellent information system is still useless. So far there have been a variety of biological features for personal identification, including appearance, hand geometry, voice print, iris, retina, signature, facial thermogram, hand vein, gait, odor, keystroke, and so on . Of these various methods of protection, fingerprinting is one of the most common approaches. In this thesis, the mechanism of a novel fingerprint verification will be studied. The algorit
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Lin, tun-hua, and 林敦華. "Fingerprint verification system apply to finance corporation-for customer relationship example." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/97410444926018213413.

Testo completo
Abstract (sommario):
碩士<br>國立臺北大學<br>企業管理學系碩士在職專班<br>92<br>By consumer psychology theory, scholars study and predict customer’s behavior based on “ cognition-attitude ” model. (Here in this research is about feasibility of consumer acceptation on fingerprint Verification system by Finance Corporations) In this research, is based on survey research to analyze consumer “ cognition-attitude ” and estimate feasibility of consumer acceptation on fingerprint Verification system by Finance Corporations. In a word, (1)Gender, age and career are all significantly connected with customer cognition based on stati
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Lee, Chih-Jen, and 李志仁. "Applications of Gabor Functions on Fingerprint Representation, Enhancement, Verification, and Identification." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/78227525989803394566.

Testo completo
Abstract (sommario):
博士<br>國立臺灣大學<br>電機工程學研究所<br>89<br>This thesis describes how to take advantage of Gabor filters to the applications of fingerprint, such as enhancement, singular point detection, pattern extraction, verification, and identification. Based on the global and local information, we develop two kinds of Gabor filter-based approaches to extract the fingerprint features. To entirely analyze the influence of the parameters of Gabor filters for the global approach, we transform a local fingerprint image into a complete Gabor basis functions (GBFs) and find that the radial frequency is the most important
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Huang, Yi-Hong, and 黃逸泓. "A Rotation Invariance Singular Point Detection Algorithm on a Fingerprint Verification System." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/95355181004209072891.

Testo completo
Abstract (sommario):
碩士<br>清雲科技大學<br>電機工程研究所<br>95<br>A robust fingerprint singular point detection algorithm with rotation-invariant ability is proposed. Two 7x7 templates of core and delta are constructed from the orientation map of a fingerprint that is formed by using Sobel operators. The differences between the value of central element and those of the outer ring’s 24 elements of the template are calculated. Since the variations of the orientations around the singular point are greater than those of others, singular point can be correctly detected by comparing the 24 database . The algorithm has the merit to
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Yu, Hsin-Wei, and 余信緯. "The Low Cost and Small Size Fingerprint Verification System Base on Line Sensor." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/72467p.

Testo completo
Abstract (sommario):
碩士<br>國立臺北科技大學<br>電腦與通訊研究所<br>94<br>While the diversity of the technology has been presented and advanced nowadays, it is time to enjoy the convenience from the progress of technology. Thus, the way to secure the personal data has been a more and more important issue. Traditionally, products related to electronics adopt the password inputting as the protection lock. But, the password is inconvenient since it acquires the user to memorize and it can easily be stolen. In the present study, a fingerprint verification system is the main focus in which the line sensor has been adopted to be the pro
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Huang, Yi-Che, and 黃一哲. "Fingerprint Recognition Chip Design via the Fast Minutiae Extraction and Multi-level Verification Algorithm." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/56436125310223209108.

Testo completo
Abstract (sommario):
碩士<br>淡江大學<br>電機工程學系碩士班<br>95<br>Nowadays, the importance of the information protection and the entrance guard control system are quite important lessons. Today, biometric verification technique is applied on enhancing the system of maintaining secrecy and recognized identifications. Biometric verification techniques which are available now are mainly as follows: voice, appearance, iris, fingerprint. Fingerprint is so authentic adopted for people constantly because of its singularity and constancy. Most identification methods would including normalization, noise filter, calculate fingerpri
Gli stili APA, Harvard, Vancouver, ISO e altri
38

(9183044), Samuel J. Reiff. "Analysis of Fingerprint Recognition Performance on Infants." Thesis, 2020.

Cerca il testo completo
Abstract (sommario):
<p>In this study, any change in fingerprint performance, image quality and minutiae count for infants in three different age groups was evaluated (0-6, 7-12, and >12 months). This was done to determine whether there is a difference in performance between infant age groups for a fingerprint recognition system.</p> <p>The purpose of this research was to determine whether there is a difference in infant fingerprint performance and image quality metrics, between three different age groups (0-6, 7-12, and >12 months old), using the same optical sensor? The data used for this secondary analysis was
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Braude, David Adam. "Fingerprinnts: oriantation free minutiae extraction and using distances between minutiae for identification and verification." Thesis, 2011. http://hdl.handle.net/10539/10623.

Testo completo
Abstract (sommario):
Fingerprint recognition has become a standard in both access control and forensics. This is because fingerprints are unique to an individual. While there are many ways in which a fingerprint can be recognised one of the most common is to look at the endings and splitting of the ridges. These are called minutiae. This research undertakes to improve upon existing methods used in all parts of a minutiae based fingerprint verification system. This study aims to find a new way to extract these minutiae. It also seeks to use them in a novel way to identify an individual and verify that two fi
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!