2004
DOI: 10.1117/12.542338
|View full text |Cite
|
Sign up to set email alerts
|

<title>Security and matching of partial fingerprint recognition systems</title>

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
15
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
5
1
1

Relationship

5
2

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 0 publications
1
15
0
Order By: Relevance
“…this hash function would be to find out the actual minutia point locations given these triangle centers. We compared performance with fingerprint matching algorithm developed in [16] and using same set of fingerprints with identically extracted minutiae points. Also, since in configurations 1 and 2 we simply get another set of minutia points, we used matching algorithm of [16] to perform matching.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…this hash function would be to find out the actual minutia point locations given these triangle centers. We compared performance with fingerprint matching algorithm developed in [16] and using same set of fingerprints with identically extracted minutiae points. Also, since in configurations 1 and 2 we simply get another set of minutia points, we used matching algorithm of [16] to perform matching.…”
Section: Methodsmentioning
confidence: 99%
“…After alignment, the number of matching minutiae points determine how good the match is. In our work we use ideas similar to [15] and [16] to combine results of localized matchings into the whole fingerprint recognition algorithm. Localized matching consists of matching minutia triplets using such features as angles and lengths between minutia points.…”
Section: Minutiae Based Matchingmentioning
confidence: 99%
See 1 more Smart Citation
“…The baseline matching results and the reference alignment information were obtained using a minutia based fingerprint matching algorithm utilizing secondary features from the triplets of neighboring minutia. 19 This is a simulation that can be replaced by techniques outlined in section 3.3. However, as we are primarily concerned with the security of the vault within a reasonable matching scheme, this simulation fits our needs.…”
Section: Unlocking the Vaultmentioning
confidence: 99%
“…Image size is 374 × 388 and the resolution is 500dpi. To evaluate the methodology of adapting a gaussian kernel to the local ridge curvature of a fingerprint image, we modified Gabor-based fingerprint enhancement algorithm [15,16] with two kernel sizes: the smaller one in high-curvature regions and the larger one in pseudo-parallel ridge regions, minutiae are detected using chaincode-based contour tracing [17], the fingerprint matcher developed by Jea et al [18] is used for performance evaluation. Our methodology has been tested on low quality images from FVC2002.…”
Section: Resultsmentioning
confidence: 99%