2001
DOI: 10.1201/9781420041347.ch9
|View full text |Cite
|
Sign up to set email alerts
|

Measurement of Fingerprint Individuality

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
37
1

Year Published

2006
2006
2022
2022

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(38 citation statements)
references
References 0 publications
0
37
1
Order By: Relevance
“…We can see that more minutiae the template and input fingerprint have, higher the PRC is. In experiments conducted on the NIST 4 dataset, the PRC values obtain here are smaller than the results in [22,24]. The differences mainly result from use of differnt ways to evaluate PRC from gererative models which is described in Section 21.5.4.…”
Section: Evaluation With Fingerprint Databasescontrasting
confidence: 44%
“…We can see that more minutiae the template and input fingerprint have, higher the PRC is. In experiments conducted on the NIST 4 dataset, the PRC values obtain here are smaller than the results in [22,24]. The differences mainly result from use of differnt ways to evaluate PRC from gererative models which is described in Section 21.5.4.…”
Section: Evaluation With Fingerprint Databasescontrasting
confidence: 44%
“…The authors in [14] report the value of for fingerprint images containing 12, 26, 36, and 46 minutiae (Table III). While the individuality of the minutiae-based fingerprint representation based on their model is lower than other estimates in the literature (e.g., [61]), their results indicate that the likelihood of an adversary guessing someone's fingerprint pattern (e.g., requiring matching 20 or more minutia from a total of 36) is significantly lower than a hacker being able to guess a six-character alphanumerical case-sensitive (most probably weak) password by social engineering techniques (most common passwords are based on birthday, spouse's name, etc.) or by brute force (the probability of guessing such a password by brute force is ).…”
Section: A Zero-effort Attacksmentioning
confidence: 71%
“…The problem of the uniqueness of fingerprint impressions was earlier addressed [16], and since then, various models have been proposed for establishing this unique identity, a critical analysis of the models proposed has been made by Stoney and Thornton [19], Stoney [20] and Srihari and Srinivasan [21]. These models have been based on very heterogeneous, and generally very small, samples and very disparate approaches (studying different types of minutiae, different fingerprint patterns, different fingers and different finger areas) see [17,18].…”
Section: Introductionmentioning
confidence: 99%