2012
DOI: 10.1007/s00521-012-1113-0
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint image enhancement and recognition algorithms: a survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(21 citation statements)
references
References 18 publications
0
21
0
Order By: Relevance
“…The first approach employs sensors (mechanical or optical) attached 2 The cyborg glove: data glove is constructed with stretch fabric for comfort and a mesh Palm for ventilation [11] to a glove that acts as transducer of finger flexion into electrical signals to determine hand posture, as shown in Fig. 2.…”
Section: Hand Gesture Analysis Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…The first approach employs sensors (mechanical or optical) attached 2 The cyborg glove: data glove is constructed with stretch fabric for comfort and a mesh Palm for ventilation [11] to a glove that acts as transducer of finger flexion into electrical signals to determine hand posture, as shown in Fig. 2.…”
Section: Hand Gesture Analysis Approachesmentioning
confidence: 99%
“…To utilize this new phenomenon efficiently, many studies have examined computer applications and their requirement of increased interaction. Thus, human computer interaction (HCI) has been a lively field of research [2,3].…”
Section: Introductionmentioning
confidence: 99%
“…The pattern of the ridges and furrows of the fingers are unique for each individual. Therefore, based on the pattern of the ridges, furrows and minutiae points a person is identified or verified (Hasan et al 2013). The advantage of fingerprint biometric is that it is socially acceptable, easy to collect the fingerprint and even the fingerprint of each finger on the same hand are different from each other.…”
Section: Fingerprintmentioning
confidence: 99%
“…Thus, an ANN has been a lively field of research [16,17]. A key can be thought of as some piece of confidential user information in relation to an application such that the latter will perform as intended only after the former is input correctly [18].…”
Section: Key Securitymentioning
confidence: 99%