1991
DOI: 10.1117/12.25401
|View full text |Cite
|
Sign up to set email alerts
|

<title>Personal verification system with high tolerance of poor-quality fingerprints</title>

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

1991
1991
2007
2007

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 5 publications
0
7
0
Order By: Relevance
“…Noting this kind of the division of roles, the study of a two-stage verification method, in which positional deviation is compensated in the first stage on the basis of the global directional distribution of the fingerprint ridges, and minutiae matching is performed in the second stage, has been proposed [11]. The framework of two-stage verification is used in this study.…”
Section: Conventional Methods and Characterization Of Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Noting this kind of the division of roles, the study of a two-stage verification method, in which positional deviation is compensated in the first stage on the basis of the global directional distribution of the fingerprint ridges, and minutiae matching is performed in the second stage, has been proposed [11]. The framework of two-stage verification is used in this study.…”
Section: Conventional Methods and Characterization Of Proposed Methodsmentioning
confidence: 99%
“…(7)] and the minutiae matching rate κ [Eq. (11)] obtained in Section 3.2. The acceptance is judged by the logical product of these conditions.…”
Section: Judgment Of Acceptance or Rejectionmentioning
confidence: 99%
“…The major difference is that the proposed approach separates the non-linear scale-selection and shape-adaptation procedure from the linear anisotropic diffusion scheme, thus bearing closer relationships to the open-ended suggestion in [21] 2 ∇ 2 µ. Algorithmic structure. The general structure of the proposed method resembles the classical structure presented in section I, and used by most classical works on fingerprint image enhancement [3], [8], [9], [10], [11], consisting of an estimation of local image parameters, followed by the application of contextual filters. In this respect, a major difference of the proposed algorithm consists of its iterative coarse to fine structure, where initial coarse estimates lead to a coarsely enhanced image, which is later used to produce more refined estimates and enhanced images, until convergence criteria are achieved.…”
Section: Relations To Previous Workmentioning
confidence: 99%
“…Traditional works on fingerprint enhancement [3], [8], [9], [10], [11] performed local estimates as well as contextual filtering in a highly discretized manner. These methods often resulted in blocky artifacts in the output as well as in poor estimates of the local image characteristics.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, biometric data is protected by using the cryptology, and there is a method of correcting swinging of the input image by using helper data [2]. Now we use fingerprint authentication scheme using features extracted from fingerprint images [3]. We propose a method of fingerprint matching based on matching scores with other data [4].…”
Section: Introductionmentioning
confidence: 99%