2020
DOI: 10.1109/tifs.2020.2971142
|View full text |Cite
|
Sign up to set email alerts
|

Fractal Coding-Based Robust and Alignment-Free Fingerprint Image Hashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
22
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 55 publications
(22 citation statements)
references
References 43 publications
0
22
0
Order By: Relevance
“…Main techniques [18] Sensitive SIFT + DWT [19] Sensitive SVD + CVA [20] Sensitive LBP + DCT + DWT [21] Sensitive Canny edge + DCT [25] Sensitive QLRBP + mean pooling [27] Within 5°RT + DWT + DFT [28] Within 5°RT + DCT [29] Within 5°ZMs + salient map [30] Within 5°SVD + LBP [31] Within 10°LRSD + CS [33] Within 5°Canny edge + DWT [35] Within 10°Hu moments + DCT [36] Within 10°GLCM + DCT [39] Within 5°QSVD + PCS [40] Within 5°2D PCA + salient map [43] arbitrarily angle Visual model + SIFT [46] arbitrarily angle CVA + DCT [47] arbitrarily angle RP + entropy [48] arbitrarily angle MDS + LPT [51] arbitrarily angle DCT + DNS [52] arbitrarily angle FMT + fractal coding [53] arbitrarily angle KAZE feature + SVD…”
Section: Methods Rotation Robustnessmentioning
confidence: 99%
See 1 more Smart Citation
“…Main techniques [18] Sensitive SIFT + DWT [19] Sensitive SVD + CVA [20] Sensitive LBP + DCT + DWT [21] Sensitive Canny edge + DCT [25] Sensitive QLRBP + mean pooling [27] Within 5°RT + DWT + DFT [28] Within 5°RT + DCT [29] Within 5°ZMs + salient map [30] Within 5°SVD + LBP [31] Within 10°LRSD + CS [33] Within 5°Canny edge + DWT [35] Within 10°Hu moments + DCT [36] Within 10°GLCM + DCT [39] Within 5°QSVD + PCS [40] Within 5°2D PCA + salient map [43] arbitrarily angle Visual model + SIFT [46] arbitrarily angle CVA + DCT [47] arbitrarily angle RP + entropy [48] arbitrarily angle MDS + LPT [51] arbitrarily angle DCT + DNS [52] arbitrarily angle FMT + fractal coding [53] arbitrarily angle KAZE feature + SVD…”
Section: Methods Rotation Robustnessmentioning
confidence: 99%
“…Biswas's method can be used for recognizing Tor domains, but the time complexity is too high. Abdullahi et al [52] combined FMT and fractal coding to devise a novel hashing method. Abdullahi's method is stable to rotation and has low time complexity.…”
Section: Related Workmentioning
confidence: 99%
“…[23] D W T + CVA 2014 [27] S V D + CVA 2017 [30] Canny operator + DCT 2019 [31] R P + visual salient region 2019 [33] F M T + fractal coding 2020 [34] G T E + DNS 2020 [35] V i s u a l m o d e l + Zernike moments + DCT 2020 [36] S V D + KAZE feature 2021 [37] G L C M + DCT 2021 selected robust features by combining the Canny edge operator and DCT coefficients to calculate a hash. This hashing scheme has a good application on industrial surveillance images, but it is only robust to a small number of digital operations.…”
Section: Methodsmentioning
confidence: 99%
“…This scheme is resistant to large angle rotations, but its classification performance needs to be improved. The FMT and fractal coding technology are joined to construct a new scheme in the reference [33]. This hashing scheme has favorable robustness, but there is still room for improving discrimination.…”
Section: Methodsmentioning
confidence: 99%
“…The SC-IoM method extracts the largest and second largest indices of user-specific randomly projected features and uses a large number of hash functions to obtain satisfactory authentication performance. Abdullahi et al [ 18 ] introduced a cancelable fingerprint hash scheme based on the Fourier-Mellin transform and fractal coding. The proposed method performs well over fingerprint databases of reasonably good image quality, but its performance deteriorates when the quality of fingerprint images is poor.…”
Section: Related Workmentioning
confidence: 99%