2005
DOI: 10.1007/11596356_110
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Method of Fingerprint Classification Combined with AFIS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…The persistence and degradation rate of fingerprints depends on many factors, such as sex, BMI (body mass index), and environmental conditions, as confirmed in previous research by Czech et al [18,19]. The subject of the persistence and degradation rate of fingerprints consisting of sweat and sebum can also be found in numerous publications, which indicates that it has already been well researched [20,21] There is little information, however, about the persistence of bloody fingerprints. Blood left at the scene of a crime constitutes extremely useful evidence in criminal investigations.…”
Section: Introductionmentioning
confidence: 85%
“…The persistence and degradation rate of fingerprints depends on many factors, such as sex, BMI (body mass index), and environmental conditions, as confirmed in previous research by Czech et al [18,19]. The subject of the persistence and degradation rate of fingerprints consisting of sweat and sebum can also be found in numerous publications, which indicates that it has already been well researched [20,21] There is little information, however, about the persistence of bloody fingerprints. Blood left at the scene of a crime constitutes extremely useful evidence in criminal investigations.…”
Section: Introductionmentioning
confidence: 85%
“…Fingerprints are the unique characteristic of humanity. Fingerprint classification restores computational complexity by reducing the number of candidate campaigns to be preceded [8]. Fingerprint images are widely used in different systems, such as personal empathy, access control, Internet authentication and the generation of encryption keys due to their durability, uniqueness and distinctive character.…”
Section: Introductionmentioning
confidence: 99%