State of the art in passive digital image forgery detection: copy-move image forgery
Authenticating digital images is increasingly becoming important because digital images
carry important information and due to their use in different areas such as courts of law as …
carry important information and due to their use in different areas such as courts of law as …
A sift-based forensic method for copy–move attack detection and transformation recovery
One of the principal problems in image forensics is determining if a particular image is
authentic or not. This can be a crucial task when images are used as basic evidence to …
authentic or not. This can be a crucial task when images are used as basic evidence to …
Computational workload in biometric identification systems: An overview
The computational workload is one of the key challenges in biometric identification systems.
The naïve retrieval method based on an exhaustive search becomes impractical with the …
The naïve retrieval method based on an exhaustive search becomes impractical with the …
Fingerprint indexing based on minutia cylinder-code
This paper proposes a new hash-based indexing method to speed up fingerprint
identification in large databases. A Locality-Sensitive Hashing (LSH) scheme has been …
identification in large databases. A Locality-Sensitive Hashing (LSH) scheme has been …
VENICE: A compact vector processor for FPGA applications
A Severance, G Lemieux - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
This paper presents VENICE, a new soft vector processor (SVP) for FPGA applications.
VENICE differs from previous SVPs in that it was designed for maximum throughput with a …
VENICE differs from previous SVPs in that it was designed for maximum throughput with a …
Cancelable permutation-based indexing for secure and efficient biometric identification
Cancelable biometric schemes have been widely studied to protect templates in biometric
authentication over networks. These schemes transform biometric features and perform …
authentication over networks. These schemes transform biometric features and perform …
Duplication forgery detection using improved DAISY descriptor
Copy-move is one of the simple and effective operations to create digital image forgeries
due to the gradually evolved image processing tools. In recent years, SIFT-based approach …
due to the gradually evolved image processing tools. In recent years, SIFT-based approach …
Aggregating minutia-centred deep convolutional features for fingerprint indexing
D Song, Y Tang, J Feng - Pattern Recognition, 2019 - Elsevier
Most current fingerprint indexing systems are based on minutiae-only local structures and
index local features directly. For minutiae local structure, missing and spurious neighboring …
index local features directly. For minutiae local structure, missing and spurious neighboring …
Fingerprint indexing based on expanded Delaunay triangulation
Fingerprint indexing plays a key role in the automatic fingerprint identification systems
(AFISs) which allows us to speed up the search in large databases without missing …
(AFISs) which allows us to speed up the search in large databases without missing …
Fast and accurate fingerprint indexing based on ridge orientation and frequency
R Cappelli - IEEE Transactions on Systems, Man, and …, 2011 - ieeexplore.ieee.org
This paper describes a new fingerprint indexing approach based on vector and scalar
features, obtained from ridge-line orientations and frequencies. A carefully designed set of …
features, obtained from ridge-line orientations and frequencies. A carefully designed set of …