Consistency penalized graph matching for image-based identification of dendritic patterns

Z Chi, A Valehi, H Peng, M Kozicki, A Razi - IEEE Access, 2020 - ieeexplore.ieee.org
Recently, physically unclonable functions (PUFs) have received considerable attention from
the research community due to their potential use in security mechanisms for applications …

Minutiae based automatic fingerprint recognition: Machine learning approaches

A Ali, R Khan, I Ullah, AD Khan… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Personnel identification has become a mandatory requirement in a large number of
applications extending from security to commercial nature in recent years. Identification …

Workflow modeling: exception and failure handling representation

N Edelweiss, M Nicolao - … Conference of the Chilean Society of …, 1998 - ieeexplore.ieee.org
The representation of the activities that compose the workflow processes, their execution
sequence and relationships, the agents responsible for their execution, and the resources …

Statistical descriptors-based automatic fingerprint identification: machine learning approaches

H Jan, A Ali, S Mahmood, G Srivastava - arxiv preprint arxiv:1907.12741, 2019 - arxiv.org
Identification of a person from fingerprints of good quality has been used by commercial
applications and law enforcement agencies for many years, however identification of a …

Challenging USB fingerprint scanner security protocol: a methodology using casting agents to capture digit and latent ridge detail to enable access

S McKenna, M Butler - International Journal of Biometrics, 2016 - inderscienceonline.com
Fingerprint scanners are used as a form of control with access limited to the beholder of the
ridge detail. However, to what extent these devices are capable of providing that control has …

A Cryptographic Algorithm Using Location-Based Service and Biometrics

R Pal, O Bhartia, M Sen - … and Innovation: Proceedings of ICDMAI 2018 …, 2019 - Springer
Modern advancement of different technologies led to the increasing computational power of
each individual component of digital computers that threatens to crack many secure …

A Fingerprint Registration Method Based on Image Field and Mean Square Error

S Lan, Z Guo - Intelligence Science and Big Data Engineering: 7th …, 2017 - Springer
Fingerprint registration is an important step in the technology of fingerprint identification.
Image field is often used for feature extraction in fingerprint registration, however, the …

A Graphical User Interface-Based Fingerprint Recognition

R Khokher, RC Singh - Mathematical Modelling, Optimization, Analytic …, 2020 - Springer
Biometric authentication is a process of establishing an individual's identity through
measurable characteristics of their behavior, anatomy, or physiology. Fingerprint recognition …

[PDF][PDF] Novel Method of Identifying Fingerprint Using Minutiae Matching in Biometric Security System

S Ghosh, MA Yousuf - … Journal of Advanced Engineering, Management and … - academia.edu
Fingerprint is one of the best apparatus to identify human because of its uniqueness, details
information, hard to change and long-term indicators of human identity where there are …

[PDF][PDF] Comparison of Classic Algorithm for Orientation Estimation

D Li - 2016 - pdf.hanspub.org
Orientation estimation aims to compute the orientation angles of multi-dimensional signals
and can be applied to many basic tasks in image processing and computer vision. In this …