1995
DOI: 10.6028/nist.ir.5647
|View full text |Cite
|
Sign up to set email alerts
|

PCASYS - a pattern-level classification automation system for fingerprints

Abstract: This report describes a system we have developed

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
116
0

Year Published

2005
2005
2017
2017

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 142 publications
(117 citation statements)
references
References 3 publications
1
116
0
Order By: Relevance
“…In order to verify that a nonlinear discriminant analysis works efficiently in fingerprint classification, we utilized a NIST fingerprint image software PCASYS [6]. images were constructed by using Å in (7), and then KDA/GSVD was applied to the constructed directional images.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to verify that a nonlinear discriminant analysis works efficiently in fingerprint classification, we utilized a NIST fingerprint image software PCASYS [6]. images were constructed by using Å in (7), and then KDA/GSVD was applied to the constructed directional images.…”
Section: Resultsmentioning
confidence: 99%
“…The local dominant directions are detected as Ñ Ü given in (4). The obtained dominant direction is represented as a vector Ó×´¾ µ × Ò´¾ µ℄ where ¼ ½ ¼ to avoid the discontinuity between ¼ and ½ ¼ as in [6]. Let …”
Section: Computation Of Directional Vectorsmentioning
confidence: 99%
See 1 more Smart Citation
“…By appropriately labeling the nodes and arcs of the graph, the authors obtained a structure which summarizes the topological features of the fingerprint and is invariant with respect to displacement and rotation. The PCASYS approach (Pattern-level Classification Automation SYStem) proposed by (Candela & Chellappa, 1993) and (Candela et al, 1995) assigns fingerprints to six nonoverlapping classes. Before computing the directional images, the ridge-line area is separated from the background and an enhancement is performed in the frequency domain.…”
Section: Structural Approachmentioning
confidence: 99%
“…However, these systems are subject to failure when his characters do not show or cannot be extracted. Wang [6] has presented one of these ways to take advantage of the orientation information. Chong [7] for the same purpose ridges represented by splined curves were employed.…”
Section: Introductionmentioning
confidence: 99%