A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
method Design a new indexing method using this feature vector; A score-level fusion approach by by combing the Minutiae Vicinity (MV) indexing method with the minutiae cylinder-code (MCC) indexing ... this new method with minutia cylinder-code (MCC) indexing method; • Future works: • Improve the performance of indexing method based on the minutiae vicinity; • Consider to set-up the fusion on feature ...doi:10.1109/iwbf.2014.6914238 dblp:conf/iwbf/LiYB14 fatcat:jsfudu72rbhhhlwyuhx36r7qo4
Fingerprint indexing is based on the local ridge line orientation, global feature, minutiae and other features. ... This paper presents a survey on the fingerprint indexing methods that are currently available and some of them are presented. ... ., proposed a score-level fusion fingerprint indexing method by combing a new indexing method and minutia cylinder-code indexing method. ...doi:10.5120/ijca2015907150 fatcat:jbqyxtqycjenffgyvn42y4mkom
system security and integrity. ... Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure ... 2.4 graphically depicts a minutia cylinder and the corresponding minutia cylinder code. ...doi:10.1117/2.1200911.001590 fatcat:3uykbccxwnfcpcodymfook557y
system security and integrity. ... Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure ... 2.4 graphically depicts a minutia cylinder and the corresponding minutia cylinder code. ...doi:10.1155/2008/579416 fatcat:rrogtu2eh5d3dpyftnwm5dd2m4
., face, fingerprint, hand geometry, etc.) and behavioral (i.e., speech, signature, keystroke, etc.) traits of a human identity. ... For applications that demand greater security, biometrics can be used in complement with passwords and security tokens to offer a multifactor authentication. ... His research, for which he has received government and industry funding, focuses on biometric security, specifically in biometric template protection and biocrypto key computation. ...doi:10.1109/msp.2015.2423693 fatcat:jbr3m7g5tjh6pby6brhyu64ffm
For higher accuracy and efficiency, this thesis has proposed a new transform based alignment approach for registering images and an alignment-free approach the can match images without explicitly extracting ... Furthermore, the proposed method is application independent and applicable to both full and partial images. ... A hybrid approach based on minutiae and texture information is given in  . The results show that fusion of texture and minutiae based algorithms improve the matching score significantly. ...doi:10.26180/5b4412fa75f1e fatcat:lfe6cc33rbeldnttwscf5hqq6a