Filters








6 Hits in 8.2 sec

A score-level fusion fingerprint indexing approach based on minutiae vicinity and minutia cylinder-code

Guoqiang Li, Bian Yang, Christoph Busch
2014 2nd International Workshop on Biometrics and Forensics  
method Design a new indexing method using this feature vector; A score-level fusion approach by by combing the Minutiae Vicinity (MV) indexing method with the minutiae cylinder-code (MCC) indexing  ...  this new method with minutia cylinder-code (MCC) indexing method; • Future works: • Improve the performance of indexing method based on the minutiae vicinity; • Consider to set-up the fusion on feature  ... 
doi:10.1109/iwbf.2014.6914238 dblp:conf/iwbf/LiYB14 fatcat:jsfudu72rbhhhlwyuhx36r7qo4

Fingerprint Indexing Approaches for Biometric Database: A Review

Pooja A., Sheshang D.
2015 International Journal of Computer Applications  
Fingerprint indexing is based on the local ridge line orientation, global feature, minutiae and other features.  ...  This paper presents a survey on the fingerprint indexing methods that are currently available and some of them are presented.  ...  ., proposed a score-level fusion fingerprint indexing method by combing a new indexing method and minutia cylinder-code indexing method.  ... 
doi:10.5120/ijca2015907150 fatcat:jbqyxtqycjenffgyvn42y4mkom

Biometric template security

Abhishek Nagar
2009 SPIE Newsroom  
system security and integrity.  ...  Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure  ...  2.4 graphically depicts a minutia cylinder and the corresponding minutia cylinder code.  ... 
doi:10.1117/2.1200911.001590 fatcat:3uykbccxwnfcpcodymfook557y

Biometric Template Security

Anil K Jain, Karthik Nandakumar, Abhishek Nagar
2008 EURASIP Journal on Advances in Signal Processing  
system security and integrity.  ...  Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure  ...  2.4 graphically depicts a minutia cylinder and the corresponding minutia cylinder code.  ... 
doi:10.1155/2008/579416 fatcat:rrogtu2eh5d3dpyftnwm5dd2m4

Biometric Feature-Type Transformation: Making templates compatible for secret protection

MengHui Lim, Andrew Beng Jin Teoh, Jaihie Kim
2015 IEEE Signal Processing Magazine  
., face, fingerprint, hand geometry, etc.) and behavioral (i.e., speech, signature, keystroke, etc.) traits of a human identity.  ...  For applications that demand greater security, biometrics can be used in complement with passwords and security tokens to offer a multifactor authentication.  ...  His research, for which he has received government and industry funding, focuses on biometric security, specifically in biometric template protection and biocrypto key computation.  ... 
doi:10.1109/msp.2015.2423693 fatcat:jbr3m7g5tjh6pby6brhyu64ffm

An Alignment-free Approach for Image Matching Applications

Komal Komal
2018
For higher accuracy and efficiency, this thesis has proposed a new transform based alignment approach for registering images and an alignment-free approach the can match images without explicitly extracting  ...  Furthermore, the proposed method is application independent and applicable to both full and partial images.  ...  A hybrid approach based on minutiae and texture information is given in [176] . The results show that fusion of texture and minutiae based algorithms improve the matching score significantly.  ... 
doi:10.26180/5b4412fa75f1e fatcat:lfe6cc33rbeldnttwscf5hqq6a