[PDF][PDF] A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation.

D Valdes-Ramirez, MA Medina-Pérez, R Monroy… - IEEE Access, 2019 - academia.edu
Latent fingerprint identification is attracting increasing interest because of its important role
in law enforcement. Although the use of various fingerprint features might be required for …

A survey of fingerprint classification Part I: Taxonomies on feature extraction methods and learning models

M Galar, J Derrac, D Peralta, I Triguero… - Knowledge-based …, 2015 - Elsevier
This paper reviews the fingerprint classification literature looking at the problem from a
double perspective. We first deal with feature extraction methods, including the different …

Learning a fixed-length fingerprint representation

JJ Engelsma, K Cao, AK Jain - IEEE transactions on pattern …, 2019 - ieeexplore.ieee.org
We present DeepPrint, a deep network, which learns to extract fixed-length fingerprint
representations of only 200 bytes. DeepPrint incorporates fingerprint domain knowledge …

A fast and accurate palmprint recognition system based on minutiae

R Cappelli, M Ferrara, D Maio - IEEE Transactions on Systems …, 2012 - ieeexplore.ieee.org
Palmprint recognition is a challenging problem, mainly due to low quality of the pattern,
large nonlinear distortion between different impressions of the same palm and large image …

Improving automated latent fingerprint identification using extended minutia types

RP Krish, J Fierrez, D Ramos, F Alonso-Fernandez… - Information …, 2019 - Elsevier
Latent fingerprints are usually processed with Automated Fingerprint Identification Systems
(AFIS) by law enforcement agencies to narrow down possible suspects from a criminal …

A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement

W Yang, J Hu, S Wang - IEEE transactions on Information …, 2014 - ieeexplore.ieee.org
Although some nice properties of the Delaunay triangle-based structure have been
exploited in many fingerprint authentication systems and satisfactory outcomes have been …

Finger-to-heart (F2H): Authentication for wireless implantable medical devices

G Zheng, W Yang, C Valli, L Qiao… - IEEE journal of …, 2018 - ieeexplore.ieee.org
Any proposal to provide security for implantable medical devices (IMDs), such as cardiac
pacemakers and defibrillators, has to achieve a trade-off between security and accessibility …

Detecting locally, patching globally: An end-to-end framework for high speed and accurate detection of fingerprint minutiae

Y Feng, A Kumar - IEEE Transactions on Information Forensics …, 2023 - ieeexplore.ieee.org
Billions of fingerprint images are acquired and matched to protect the national borders and
in a range of egovernance applications. Fast and accurate minutiae detection from …

VENICE: A compact vector processor for FPGA applications

A Severance, G Lemieux - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
This paper presents VENICE, a new soft vector processor (SVP) for FPGA applications.
VENICE differs from previous SVPs in that it was designed for maximum throughput with a …

Latent fingerprint enhancement using generative adversarial networks

I Joshi, A Anand, M Vatsa, R Singh… - 2019 IEEE winter …, 2019 - ieeexplore.ieee.org
Latent fingerprints recognition is very useful in law enforcement and forensics applications.
However, automated matching of latent fingerprints with a gallery of live scan images is very …