Segui questo link per vedere altri tipi di pubblicazioni sul tema: Fingerprint Verification.

Articoli di riviste sul tema "Fingerprint Verification"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Fingerprint Verification".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Bercelin, Rose Mary W., N. Subbulakshmi, and Tofflin R. Bini. "Fingerprint Combination of Privacy Preservation is Improved by Delaunay Triangulation Method." Applied Mechanics and Materials 573 (June 2014): 437–41. http://dx.doi.org/10.4028/www.scientific.net/amm.573.437.

Testo completo
Abstract (sommario):
Fingerprints are graphical ridge and valley patterns on the tips of human fingers. Owing to their uniqueness and permanence, the use of fingerprints is considered to be one of the most reliable methods of personal verification. Fingerprints are today among the most popularly used biometric modalities in automatic verification systems. At the same time, Protecting the privacy of Fingerprint is an important one, here a novel system propose protecting fingerprint by combining two different fingerprints. In the enrolment stage, fingerprints will be captured from two different fingers. Minutiae pos
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Melyani Melyani. "Test Data Algoritma Kromosom Pada Sidik Jari Menggunakan Jaringan Syaraf." JURNAL PENELITIAN SISTEM INFORMASI (JPSI) 2, no. 1 (2024): 138–62. http://dx.doi.org/10.54066/jpsi.v2i1.1550.

Testo completo
Abstract (sommario):
Biometric features that can be used for identification include iris, voice, DNA and fingerprints. Fingerprints are the most widely used biometric feature because of their uniqueness, universality and stability. Fingerprint recognition can be grouped into two different forms of problems, namely verification and identification. Verification is comparing one fingerprint with another fingerprint. Meanwhile, identification is matching an input fingerprint with fingerprint data in the database. Thus, identification can be interpreted as an extension of verification carried out by comparing one finge
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Hemanth, Gannamani, Maddipati Vikas, Sai Nisarg D. Mehta, and Gaurav Varshney. "Fingerprint Voting System." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem43165.

Testo completo
Abstract (sommario):
Fingerprint voting systems offer a robust mechanism for ensuring secure and reliable electoral processes. This paper proposes a comprehensive approach to government verification and voter authentication within fingerprint voting systems. Beginning with the initial voter registration process, government authorities authenticate individuals by capturing their fingerprints and verifying their identities against national databases. Upon successful verification, voters are enrolled in the system and provided with unique biometric identifiers. During elections, voters undergo authentication using th
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Priati, Assiroj, L. H. S. Warnars H., Abdurrachman E., I. Kistijantoro A., and Doucet A. "Measuring memetic algorithm performance on image fingerprints dataset." TELKOMNIKA Telecommunication, Computing, Electronics and Control 19, no. 1 (2021): pp. 96~104. https://doi.org/10.12928/TELKOMNIKA.v19i1.16418.

Testo completo
Abstract (sommario):
Personal identification has become one of the most important terms in our society regarding access control, crime and forensic identification, banking and also computer system. The fingerprint is the most used biometric feature caused by its unique, universality and stability. The fingerprint is widely used as a security feature for forensic recognition, building access, automatic teller machine (ATM) authentication or payment. Fingerprint recognition could be grouped in two various forms, verification and identification. Verification compares one on one fingerprint data. Identification is mat
Gli stili APA, Harvard, Vancouver, ISO e altri
5

QIN, WEI, and YILONG YIN. "A NOVEL METHOD USING VIDEOS FOR FINGERPRINT VERIFICATION." International Journal of Pattern Recognition and Artificial Intelligence 26, no. 01 (2012): 1256002. http://dx.doi.org/10.1142/s0218001412560022.

Testo completo
Abstract (sommario):
Traditional fingerprint verifications use single image for matching. However, the verification accuracy cannot meet the need of some application domains. In this paper, we propose to use videos for fingerprint verification. To take full use of the information contained in fingerprint videos, we present a novel method to use the dynamic as well as the static information in fingerprint videos. After preprocessing and aligning processes, the Inclusion Ratio of two matching fingerprint videos is calculated and used to represent the similarity between these two videos. Experimental results show tha
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Djara, Tahirou, Marc Kokou Assogba, and Antoine Vianou. "A Contactless Fingerprint Verification Method using a Minutiae Matching Technique." International Journal of Computer Vision and Image Processing 6, no. 1 (2016): 12–27. http://dx.doi.org/10.4018/ijcvip.2016010102.

Testo completo
Abstract (sommario):
Most of matching or verification phases of fingerprint systems use minutiae types and orientation angle to find matched minutiae pairs from the input and template fingerprints. Unfortunately, due to some non-linear distortions, like excessive pressure and fingers twisting during enrollment, this process can cause the minutiae features to be distorted from the original. The authors are then interested in a fingerprint matching method using contactless images for fingerprint verification. After features extraction, they compute Euclidean distances between template minutiae (bifurcation and endin
Gli stili APA, Harvard, Vancouver, ISO e altri
7

J, Nandhakumar. "IoT Based Voting Machine with Fingerprint Verification." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (2022): 1490–96. http://dx.doi.org/10.22214/ijraset.2022.42573.

Testo completo
Abstract (sommario):
Abstract: In a democratic country, like India voting is an important way where the citizen can cast their vote. Usually voting is done by casting their vote in polling booth. As the technology increases, nowadays electronic voting machine is used for casting vote. This paper is about an IoT based voting machine with fingerprint verification. The main aim of this project is to make voting secure using fingerprint verification and also to reduce malpractices. The details of the voter along with their fingerprint in stored in database. If the fingerprint matches with the stored fingerprint, the s
Gli stili APA, Harvard, Vancouver, ISO e altri
8

G. Nancharaiah, G. Sai Teja Kumari, K. Lakshmi, J. Harika, and B. Srinu. "Fingerprint Recognition and Verification using Fourier Domain Filtering and Histogram Equalization Techniques." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 2 (2024): 698–704. http://dx.doi.org/10.32628/cseit24102100.

Testo completo
Abstract (sommario):
Fingerprint Recognition is a vital method in biometric identification and verification of human beings in various domains like Security, Digital Forensics, Internet of Things (IoT), and many more. Each individual human is having distinct fingerprint pattern than others, hence it is one of the most prominent and widely used method to distinguish individuals. Many research studies and solutions have been developed in biometric domain since a decade, which influences now in making the process of fingerprint recognition more optimized, faster and efficient. However, present fingerprint acquisition
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Pan, Ming-Sie, Chao-Hsing Fan, Ching-Chao Yang, et al. "Fingerprint preprocessing using FCN and U-net methods." Journal of Information and Optimization Sciences 45, no. 5 (2024): 1421–34. http://dx.doi.org/10.47974/jios-1731.

Testo completo
Abstract (sommario):
This paper analyzes the importance of optimizing fingerprint images from the perspective of front-line forensics personnel. Due to defects such as fingerprint ridge blurring and fingerprint image overlap, it may cause delays in fingerprint identification and lead to misjudgments (false positives, false negatives) and other consequences. This paper simulated common fingerprint images (fuzzy feature points) at criminal cases, and captured, segmented, and reconstructed fingerprints. Two deep learning model architectures, U-net [1] and FCN [2], were applied to realize image segmentation and image
Gli stili APA, Harvard, Vancouver, ISO e altri
10

‘Aisyah Sa’dan, Siti, Rajeswari Raju, Nursuriati Jamil, and . "Clonal Selection Algorithm for Low Quality Fingerprint Image Verification." International Journal of Engineering & Technology 7, no. 4.42 (2018): 157–60. http://dx.doi.org/10.14419/ijet.v7i4.42.25702.

Testo completo
Abstract (sommario):
Fingerprint verification has drawn a lot of attention to its approach in biometric since it is one of the most important biometric technologies nowadays and is widely used in several different applications and areas. It is applied in the forensic science area in order to identify people who were involved in criminal scenes such as the victims and the suspects. A human’s fingerprint is unique and usually has its own patterns and ridges, which differs them from other’s fingerprints. However, there are some drawbacks that can cause low accuracy and low performance of the verification. This oc
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Upendra, K., S. Singh, V. Kumar, and H. K. Verma. "Online fingerprint verification." Journal of Medical Engineering & Technology 31, no. 1 (2007): 36–45. http://dx.doi.org/10.1080/03091900500324194.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Sravani, P. S. L. "Robust Fingerprint Verification-Using Real Time Security Alerts." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 1753–59. https://doi.org/10.22214/ijraset.2025.67644.

Testo completo
Abstract (sommario):
This work presents Robust Fingerprint Authentication with Real-Time Security Alerts, a biometric authentication system that integrates Aadhaar-based identity verification, liveness detection, and real-time SMS notifications. Traditional fingerprint authentication systems store biometric data persistently, increasing the risk of breaches and unauthorized access. To address this, the proposed system ensures immediate deletion of fingerprint data after verification, enhancing security and user privacy. Advanced image processing techniques and deep learning models are employed for liveness detecti
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Almehmadi, Abdulaziz. "A Behavioral-Based Fingerprint Liveness and Willingness Detection System." Applied Sciences 12, no. 22 (2022): 11460. http://dx.doi.org/10.3390/app122211460.

Testo completo
Abstract (sommario):
Fingerprints have been used for decades to verify the identity of an individual for various security reasons. Attackers have developed many approaches to deceive a fingerprint verification system, ranging from the sensor level, where gummy fingers are created, to gaining access to the decision-maker level, where the decision is made based on low matching criteria. Even though fingerprint sensor-level countermeasures have developed advanced metrics to detect any attempt to dupe the system, attackers still manage to outwit a fingerprint verification system. In this paper, we present the Micro-be
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Khan, Sajid, Dong-Ho Lee, Asif Khan, Ahmad Waqas, Abdul Rehman Gilal, and Zahid Hussain Khand. "A Digital Camera-Based Rotation-Invariant Fingerprint Verification Method." Scientific Programming 2020 (May 15, 2020): 1–10. http://dx.doi.org/10.1155/2020/9758049.

Testo completo
Abstract (sommario):
Fingerprint registration and verification is an active area of research in the field of image processing. Usually, fingerprints are obtained from sensors; however, there is recent interest in using images of fingers obtained from digital cameras instead of scanners. An unaddressed issue in the processing of fingerprints extracted from digital images is the angle of the finger during image capture. To match a fingerprint with 100% accuracy, the angles of the matching features should be similar. This paper proposes a rotation and scale-invariant decision-making method for the intelligent registr
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Yogita, Verma* Prof. Bhagwati Charan Patel. "FINGERPRINT DETECTION AND RECOGNIZATION TECHNIQUES USING GABOR FILTER." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 5 (2017): 722–29. https://doi.org/10.5281/zenodo.801293.

Testo completo
Abstract (sommario):
Fingerprints are most extensively and effectively appropriate for the proof of identity in present days. Mostly because of their uniqueness among the people, public acceptance, originality, stability through life, and their least risk of invasion. Fingerprint technology, which is basically a biometric system, is utilized to identify an individual based on their physical qualities. Fingerprint matching is the trendiest biometric method appropriate to provide authentication. Fingerprint verification is one of the most trustable biometric security system in the world of computers. In this paper w
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Odu, Tiwalade O., Moses O. Olaniyan, Tokunbo Ogunfunmi, Isaac A. Samuel, Joke A. Badejo, and Aderemi A. Atayero. "Multi-Instance Contingent Fusion for the Verification of Infant Fingerprints." Journal of Electrical and Computer Engineering 2024 (January 2, 2024): 1–10. http://dx.doi.org/10.1155/2024/7728707.

Testo completo
Abstract (sommario):
It is imperative to establish an automated system for the identification of neonates (1–28 days old) and infants (29 days–12 months old) through the utilisation of the readily accessible 500 ppi fingerprint reader. This measure is crucial in addressing the issue of newborn swapping, facilitating the identification of missing children, monitoring immunisation records, maintaining comprehensive medical history, and other related purposes. The objective of this study is to demonstrate the potential for future identification of infants using fingerprints obtained from a 500 ppi fingerprint reader
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Wang, Feng. "Fusion Fingerprint and Face Multi-Biometrics Recognition Based on D-S Evidence Theory." Advanced Materials Research 459 (January 2012): 644–48. http://dx.doi.org/10.4028/www.scientific.net/amr.459.644.

Testo completo
Abstract (sommario):
Single biometric feature has not meet people's needs. After analyzing fingerprints and face recognition technology, a fused theory is proposed which comprise fingerprints and face multi-biometrics features recognition based on D-S evidence theory. This article first analysis main part of the Face and Fingerprint Identification System, then gives a decision-making on integration in the face and fingerprint recognition method. In this paper we divide minutia features of fingerprint into certain and uncertain region which could make the performance of verification in certain region better than th
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Kumar, Ravinder, Pravin Chandra, and M. Hanmandlu. "Fingerprint Matching Based on Orientation Feature." Advanced Materials Research 403-408 (November 2011): 888–94. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.888.

Testo completo
Abstract (sommario):
This paper presents a fast and reliable algorithm for fingerprint verification. Our proposed fingerprint verification algorithm is based on image-based fingerprint matching. The improved orientation feature vector of two fingerprints has been compared to compute the similarities at a given threshold. Fingerprint image has been aligned by rotating through an angle before feature vector is computed and matched. Row and Column variance feature vector of orientation image will be employed. The algorithm has been tested on the FVC2002 Databases. The performance of algorithm is measured in terms of
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Kirvel, Vitali. "Fingerprint analysis (AFIS) and biometric system of identification by fingerprints: issue of artificial papillary pictures." Общество и инновации 1, no. 3 (2021): 129–45. http://dx.doi.org/10.47689/2181-1415-vol1-iss3-pp129-145.

Testo completo
Abstract (sommario):
The article discusses the theoretical and applied aspects, as well as prospects for the development of fingerprint examination, fingerprint records (automated fingerprint identification systems-AFIS) in the disclosure and uncovering of crimes, as well as biometric identification systems by fingerprints to protect personal data, control access to corporate and personal information, time tracking in the information sector of the economy.
 The paper presents methods form an ufacturing models with artificial papillary patterns (falsification of papillary patterns of fingerprints), the results
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Jiang, Yujia, and Xin Liu. "Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid." Journal of Electrical and Computer Engineering 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/1539298.

Testo completo
Abstract (sommario):
Fingerprint recognition schemas are widely used in our daily life, such as Door Security, Identification, and Phone Verification. However, the existing problem is that fingerprint recognition systems are easily tricked by fake fingerprints for collaboration. Therefore, designing a fingerprint liveness detection module in fingerprint recognition systems is necessary. To solve the above problem and discriminate true fingerprint from fake ones, a novel software-based liveness detection approach using uniform local binary pattern (ULBP) in spatial pyramid is applied to recognize fingerprint livene
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Praseetha, V. M., Saad Bayezeed, and S. Vadivel. "Secure Fingerprint Authentication Using Deep Learning and Minutiae Verification." Journal of Intelligent Systems 29, no. 1 (2019): 1379–87. http://dx.doi.org/10.1515/jisys-2018-0289.

Testo completo
Abstract (sommario):
Abstract Nowadays, there has been an increase in security concerns regarding fingerprint biometrics. This problem arises due to technological advancements in bypassing and hacking methodologies. This has sparked the need for a more secure platform for identification. In this paper, we have used a deep Convolutional Neural Network as a pre-verification filter to filter out bad or malicious fingerprints. As deep learning allows the system to be more accurate at detecting and reducing false identification by training itself again and again with test samples, the proposed method improves the secur
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Hebaishy, Mohamed A., and Fathy A. Syam. "Fast Fingerprint Identification based on the DoG Filter." WSEAS TRANSACTIONS ON SIGNAL PROCESSING 21 (March 31, 2025): 19–24. https://doi.org/10.37394/232014.2025.21.3.

Testo completo
Abstract (sommario):
Biometric recognition is the study of recognizing individuals through their distinct physiological or behavioral traits, which encompass iris, facial features, fingerprints, retina patterns, vein structures, hand geometry, handwriting, human gait, signatures, keystrokes, and vocal characteristics. Fingerprint images comprise various whorls, arches, loops, ridge ends, and ridge bifurcations on each digit. The extraction of these features with some transformations can uniquely identify an individual. Fingerprints are extensively utilized in numerous biometric identification systems; finger scann
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Jain, A., Lin Hong, and R. Bolle. "On-line fingerprint verification." IEEE Transactions on Pattern Analysis and Machine Intelligence 19, no. 4 (1997): 302–14. http://dx.doi.org/10.1109/34.587996.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Maio, D., D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain. "FVC2000: fingerprint verification competition." IEEE Transactions on Pattern Analysis and Machine Intelligence 24, no. 3 (2002): 402–12. http://dx.doi.org/10.1109/34.990140.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Cappelli, Raffaele, Matteo Ferrara, Annalisa Franco, and Davide Maltoni. "Fingerprint verification competition 2006." Biometric Technology Today 15, no. 7-8 (2007): 7–9. http://dx.doi.org/10.1016/s0969-4765(07)70140-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Mesec, Chip. "Fingerprint identification versus verification." Biometric Technology Today 15, no. 9 (2007): 7. http://dx.doi.org/10.1016/s0969-4765(07)70157-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Qin, Wei, Yilong Yin, and Lili Liu. "Video-Based Fingerprint Verification." Sensors 13, no. 9 (2013): 11660–86. http://dx.doi.org/10.3390/s130911660.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Ziyatbekova, G. Z., and M. A. Shaikhy. "Biometric technology for personal identification and authentication: fingerprint." Bulletin of the National Engineering Academy of the Republic of Kazakhstan 86, no. 4 (2022): 62–70. http://dx.doi.org/10.47533/2020.1606-146x.196.

Testo completo
Abstract (sommario):
This paper presents an efficient fingerprint verification algorithm that improves matching accuracy. Algorithms for image processing for biometric technologies of identification and authentication of a person using fingerprints are considered. They are essential tools for improving performance across a wide range of industries. The recognition system is designed for storing data, further processing it, identifying and displaying fingerprints. In forensics, modern image processing algorithms are used and provide a significant improvement in work results. Fingerprint images are degraded and dama
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Akinribido, C.T. "Cryptographic Security Approach for Biometric Verification System." Indian Journal of Cryptography and Network Security (IJCNS) 3, no. 2 (2023): 7–13. https://doi.org/10.54105/ijcns.C7854.113223.

Testo completo
Abstract (sommario):
<strong>Abstract: </strong>This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curv
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Chan, K. C., Y. S. Moon, and P. S. Cheng. "Fast Fingerprint Verification Using Subregions of Fingerprint Images." IEEE Transactions on Circuits and Systems for Video Technology 14, no. 1 (2004): 95–101. http://dx.doi.org/10.1109/tcsvt.2003.818358.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
31

GONZÁLEZ, MARIO, DAVID DOMINGUEZ, FRANCISCO B. RODRÍGUEZ, and ÁNGEL SÁNCHEZ. "RETRIEVAL OF NOISY FINGERPRINT PATTERNS USING METRIC ATTRACTOR NETWORKS." International Journal of Neural Systems 24, no. 07 (2014): 1450025. http://dx.doi.org/10.1142/s0129065714500257.

Testo completo
Abstract (sommario):
This work experimentally analyzes the learning and retrieval capabilities of the diluted metric attractor neural network when applied to collections of fingerprint images. The computational cost of the network decreases with the dilution, so we can increase the region of interest to cover almost the complete fingerprint. The network retrieval was successfully tested for different noisy configurations of the fingerprints, and proved to be robust with a large basin of attraction. We showed that network topologies with a 2D-Grid arrangement adapt better to the fingerprints spatial structure, outp
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Nwe, Ni Kyaw, Kyaw Naing Kyaw, and Myo Nwe Wai Myat. "Identification of Persons by Fingerprint using Huffman Coding Algorithm." International Journal of Trend in Scientific Research and Development 3, no. 5 (2019): 1208–11. https://doi.org/10.5281/zenodo.3590611.

Testo completo
Abstract (sommario):
Fingerprint system is one of the most common biometric features used for personal identification and verification. There are many techniques used for finding the features of fingerprint when it matches the other images of fingerprint. This system must input the fingerprint for the corresponding profile. It converts the binary image. This image will convert the Huffman code approach and to generate codes for input fingerprint. The system has the profile information along with their associated fingerprints. When the system identified the fingerprint, the system will display the associated profil
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Bhatti, Kamran Ali, Dr Sajida Parveen, Nadeem Naeem Bhatti, Kamran Ali Larik, and Qurat-ul-ain Soomro. "Fingerprint liveness detection using dynamic local ternary pattern (DLTP)." VFAST Transactions on Software Engineering 12, no. 2 (2024): 123–31. http://dx.doi.org/10.21015/vtse.v12i2.1842.

Testo completo
Abstract (sommario):
Nowadays, biometric confirmation systems are utilized for security applications such as verification and identification. There are various biometric modalities such as fingerprints, face recognition, and iris scans. Biometric systems are superior to PIN and password-based systems because the latter can be easily stolen or forgotten, whereas biometric traits are unique and difficult to replicate or forget. Among biometric modalities, fingerprint recognition is widely employed for security purposes due to the distinctiveness of each individual's fingerprint. However, fingerprint biometric system
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Le, Ngoc Tuyen, Duc Huy Le, Jing-Wein Wang, and Chih-Chiang Wang. "Entropy-Based Clustering Algorithm for Fingerprint Singular Point Detection." Entropy 21, no. 8 (2019): 786. http://dx.doi.org/10.3390/e21080786.

Testo completo
Abstract (sommario):
Fingerprints have long been used in automated fingerprint identification or verification systems. Singular points (SPs), namely the core and delta point, are the basic features widely used for fingerprint registration, orientation field estimation, and fingerprint classification. In this study, we propose an adaptive method to detect SPs in a fingerprint image. The algorithm consists of three stages. First, an innovative enhancement method based on singular value decomposition is applied to remove the background of the fingerprint image. Second, a blurring detection and boundary segmentation a
Gli stili APA, Harvard, Vancouver, ISO e altri
35

C.T, Akinribido, Olabode O.O, Adetunmbi O.A, and Adewumi Moradeke Grace. "Cryptographic Security Approach for Biometric Verification System." Indian Journal of Cryptography and Network Security 3, no. 2 (2023): 7–13. http://dx.doi.org/10.54105/ijcns.c7854.113223.

Testo completo
Abstract (sommario):
This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curve Cryptography and Hill Cip
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Lalovic, Komlen, Milan Milosavljevic, Ivan Tot, and Nemanja Macek. "Device for biometric verification of maternity." Serbian Journal of Electrical Engineering 12, no. 3 (2015): 293–302. http://dx.doi.org/10.2298/sjee1503293l.

Testo completo
Abstract (sommario):
Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that reference. Technical issue that is solved with this work and the proposed device is scanning, processing, and storing encrypted biometric templat
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Jo, Young-Hoo, Seong-Yun Jeon, Jong-Hyuk Im, and Mun-Kyu Lee. "Security Analysis and Improvement of Fingerprint Authentication for Smartphones." Mobile Information Systems 2016 (2016): 1–11. http://dx.doi.org/10.1155/2016/8973828.

Testo completo
Abstract (sommario):
Currently, an increasing number of smartphones are adopting fingerprint verification as a method to authenticate their users. Fingerprint verification is not only used to unlock these smartphones, but also used in financial applications such as online payment. Therefore, it is very crucial to secure the fingerprint verification mechanism for reliable services. In this paper, however, we identify a few vulnerabilities in one of the currently deployed smartphones equipped with fingerprint verification service by analyzing the service application. We demonstrate actual attacks via two proof-of-co
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Raysa, Muhammad, Atthariq Atthariq, Muhammad Nasir, and Taufik Taufik. "Sistem Absensi Mahasiswa Menggunakan Fingerprint Dan Raspberry Pi Dengan Notifikasi." Jurnal Teknologi Rekayasa Informasi dan Komputer 7, no. 1 (2023): 68. https://doi.org/10.30811/jtrik.v7i1.4738.

Testo completo
Abstract (sommario):
Fingerprint is an application designed to meet the needs of fast data using fingerprint verification. Fingerprint attendance machine is a type of biometric attendance machine that uses the student attendance/attendance method by detecting fingers. This fingerprint attendance is designed with Fingerprint Sensor, LCD and notification components. The purpose of this final project is to design an attendance device with fingerprints and a web database as a means of attendance. This system uses a Raspberry Pi as the controller. The study used fingerprints that had previously been verified in the dat
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Madhav, Yagnasri, Dr S. China Venkateshwarlu, and Dr V. Siva Nagaraju. "Advanced Fingerprint Alteration Detection: A Comparative Analysis of Real and Synthetic Modifications Using InceptionV3 on the SOCOFing Dataset." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 07 (2025): 1–9. https://doi.org/10.55041/ijsrem51223.

Testo completo
Abstract (sommario):
This study investigates the efficacy of fingerprint alteration detection using advanced deep learning techniques, specifically focusing on both real and synthetically altered fingerprint images. Utilizing the Sokoto Coventry Fingerprint Dataset (SOCOFing), which comprises over 55,000 fingerprint images from 600 African subjects, we employed the Google InceptionV3 model to classify real and altered images under varying degrees of alteration complexity. Our experimental results demonstrate a robust performance of the model, achieving an accuracy of 91.04% for detecting alterations with easy alte
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Ramírez Flores, Manuel, Gualberto Aguilar Torres, Gina Gallegos García, and Miguel Ángel García Licona. "Fingerprint verification using computational geometry." DYNA 83, no. 195 (2016): 128–37. http://dx.doi.org/10.15446/dyna.v83n195.46323.

Testo completo
Abstract (sommario):
This paper presents a robust minutiae based method for fingerprint verification. The proposed method uses Delaunay Triangulation to represent minutiae as nodes of a connected graph composed of triangles. The minimum angle over all triangulations is maximized, which gives local stability to the constructed structures against rotation and translation variations. Geometric thresholds and minutiae data were used to characterize the triangulations created from input and template fingerprint images. The effectiveness of the proposed method is confirmed through calculations of false acceptance rate (
Gli stili APA, Harvard, Vancouver, ISO e altri
41

KIM, Bongil, Jaeyeon LEE, Chungkyue KIM, Kiyonari FUKUE, Haruhisa SHIMODA, and Toshifumi SAKATA. "Development of fingerprint verification system." Journal of the Japan society of photogrammetry and remote sensing 28, no. 1 (1989): 4–18. http://dx.doi.org/10.4287/jsprs.28.4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Gamble, F. T., L. M. Frye, and D. R. Grieser. "Real-time fingerprint verification system." Applied Optics 31, no. 5 (1992): 652. http://dx.doi.org/10.1364/ao.31.000652.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Khalil, Mohammed S., Dzulkifli Mohamad, Muhammad Khurram Khan, and Qais Al-Nuzaili. "Fingerprint verification using statistical descriptors." Digital Signal Processing 20, no. 4 (2010): 1264–73. http://dx.doi.org/10.1016/j.dsp.2009.12.002.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Bakheet, Samy, Shtwai Alsubai, Abdullah Alqahtani, and Adel Binbusayyis. "Robust Fingerprint Minutiae Extraction and Matching Based on Improved SIFT Features." Applied Sciences 12, no. 12 (2022): 6122. http://dx.doi.org/10.3390/app12126122.

Testo completo
Abstract (sommario):
Minutiae feature extraction and matching are not only two crucial tasks for identifying fingerprints, but also play an eminent role as core components of automated fingerprint recognition (AFR) systems, which first focus primarily on the identification and description of the salient minutiae points that impart individuality to each fingerprint and differentiate one fingerprint from another, and then matching their relative placement in a candidate fingerprint and previously stored fingerprint templates. In this paper, an automated minutiae extraction and matching framework is presented for ide
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Srinivasa Raghavan, S., and G. Sivakumar. "Use of Fingerprint Recognition Systems in Libraries." Indian Journal of Information Sources and Services 2, no. 1 (2012): 34–37. http://dx.doi.org/10.51983/ijiss.2012.2.1.348.

Testo completo
Abstract (sommario):
This paper describes a comparative study on fingerprint recognition systems. The use of fingerprints for identification has been employed in law enforcement for about a century. A much broader application of fingerprints is for personal authentication, for instance to access a computer, a network, a bank-machine, a car, or a home. The following topics are covered: history, minutia types, image processing and methods, minutia extraction, enrollment and verification procedures, recognition rate, combination with other biometrics, and the future of fingerprint recognition system. AFIS is dramatic
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Yassin, Ali A. "Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing." International Scholarly Research Notices 2014 (September 24, 2014): 1–13. http://dx.doi.org/10.1155/2014/351696.

Testo completo
Abstract (sommario):
Now, the security of digital images is considered more and more essential and fingerprint plays the main role in the world of image. Furthermore, fingerprint recognition is a scheme of biometric verification that applies pattern recognition techniques depending on image of fingerprint individually. In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Chandrakant P. Divate. "Design of Fingerprint-Based Gender Clustering Using Fuzzy C-Means Algorithm." Journal of Electrical Systems 20, no. 3s (2024): 1046–62. http://dx.doi.org/10.52783/jes.1419.

Testo completo
Abstract (sommario):
Biometric systems, with fingerprint recognition as a cornerstone, play a crucial role in identity verification and access control. This paper introduces an innovative approach to gender clustering based on fingerprint data, leveraging the Fuzzy C-Means (FCM) algorithm. The proposed design aims to enhance the precision of gender classification by incorporating the inherent uncertainty in fingerprint features. Through the integration of FCM, which allows soft assignment of fingerprints to gender clusters, the system achieves a nuanced and adaptable classification. The study meticulously explores
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Maiti, Diptadip, Madhuchhanda Basak, and Debashis Das. "Quality and Feature Analysis of Parent and Child Fingerprints in West Bengal, India." International Journal for Research in Applied Science and Engineering Technology 11, no. 10 (2023): 127–41. http://dx.doi.org/10.22214/ijraset.2023.55946.

Testo completo
Abstract (sommario):
Abstract: Fingerprint image of father, mother and child in ink paper method are collected from the region of West Bengal, India. One Hundred family without having kinship relation are involved in the data collection process. The paper is scanned with a HP scanner with 1200 ppi resolution and pre-processed with different technique to form a dataset of 1500 fingerprint images. Different non reference and reference image quality assessment technique are applied to test the quality of the image dataset. Minutiae based feature are extracted from the images to find a correlation between child and pa
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Tilak B and Vaishnavi N. M.Sc., M.Phil. (Ph.D.). "Online Fingerprint Authentication Scheme over Outsourced Data." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1288–93. https://doi.org/10.32628/cseit25112444.

Testo completo
Abstract (sommario):
With the rifeness of mobile plans and the growth of biometric technology, biometric credentials, which can realize separate verification trusts on individual life or social physiognomies, has involved widely substantial interest. Though, confidentiality subjects of biometric data bring out increasing worries due to the extremely compassion of biometric data. Aiming at this test, in this project, we current a novel privacy-preserving online fingerprint verification arrangement, named e-Finga, over encoded subcontracted data. In the proposed e-Finga scheme, the user’s fingerprint registered in t
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Takeuchi, Hideyo, Taizo Umezaki, Noriyuki Matsumoto, and Katsumi Hirabayashi. "Speed-up of Fingerprint Verification Using Similarity of Fingerprint Spectrums." IEEJ Transactions on Electronics, Information and Systems 124, no. 3 (2004): 812–13. http://dx.doi.org/10.1541/ieejeiss.124.812.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!