Consistency penalized graph matching for image-based identification of dendritic patterns
Recently, physically unclonable functions (PUFs) have received considerable attention from
the research community due to their potential use in security mechanisms for applications …
the research community due to their potential use in security mechanisms for applications …
Minutiae based automatic fingerprint recognition: Machine learning approaches
Personnel identification has become a mandatory requirement in a large number of
applications extending from security to commercial nature in recent years. Identification …
applications extending from security to commercial nature in recent years. Identification …
Workflow modeling: exception and failure handling representation
N Edelweiss, M Nicolao - … Conference of the Chilean Society of …, 1998 - ieeexplore.ieee.org
The representation of the activities that compose the workflow processes, their execution
sequence and relationships, the agents responsible for their execution, and the resources …
sequence and relationships, the agents responsible for their execution, and the resources …
Statistical descriptors-based automatic fingerprint identification: machine learning approaches
Identification of a person from fingerprints of good quality has been used by commercial
applications and law enforcement agencies for many years, however identification of a …
applications and law enforcement agencies for many years, however identification of a …
Challenging USB fingerprint scanner security protocol: a methodology using casting agents to capture digit and latent ridge detail to enable access
S McKenna, M Butler - International Journal of Biometrics, 2016 - inderscienceonline.com
Fingerprint scanners are used as a form of control with access limited to the beholder of the
ridge detail. However, to what extent these devices are capable of providing that control has …
ridge detail. However, to what extent these devices are capable of providing that control has …
A Cryptographic Algorithm Using Location-Based Service and Biometrics
Modern advancement of different technologies led to the increasing computational power of
each individual component of digital computers that threatens to crack many secure …
each individual component of digital computers that threatens to crack many secure …
A Fingerprint Registration Method Based on Image Field and Mean Square Error
S Lan, Z Guo - Intelligence Science and Big Data Engineering: 7th …, 2017 - Springer
Fingerprint registration is an important step in the technology of fingerprint identification.
Image field is often used for feature extraction in fingerprint registration, however, the …
Image field is often used for feature extraction in fingerprint registration, however, the …
A Graphical User Interface-Based Fingerprint Recognition
Biometric authentication is a process of establishing an individual's identity through
measurable characteristics of their behavior, anatomy, or physiology. Fingerprint recognition …
measurable characteristics of their behavior, anatomy, or physiology. Fingerprint recognition …
[PDF][PDF] Novel Method of Identifying Fingerprint Using Minutiae Matching in Biometric Security System
S Ghosh, MA Yousuf - … Journal of Advanced Engineering, Management and … - academia.edu
Fingerprint is one of the best apparatus to identify human because of its uniqueness, details
information, hard to change and long-term indicators of human identity where there are …
information, hard to change and long-term indicators of human identity where there are …
[PDF][PDF] Comparison of Classic Algorithm for Orientation Estimation
D Li - 2016 - pdf.hanspub.org
Orientation estimation aims to compute the orientation angles of multi-dimensional signals
and can be applied to many basic tasks in image processing and computer vision. In this …
and can be applied to many basic tasks in image processing and computer vision. In this …