Minutiae extraction from fingerprint images-a review

R Bansal, P Sehgal, P Bedi - arXiv preprint arXiv:1201.1422, 2011 - arxiv.org
Fingerprints are the oldest and most widely used form of biometric identification. Everyone is
known to have unique, immutable fingerprints. As most Automatic Fingerprint Recognition …

Comparative analysis of fingerprint features extraction methods

M Mua'ad, ZA Alqadi, K Aldebei - Journal of Hunan University Natural …, 2021 - jonuns.com
Human fingerprint features extraction is important for building a fingerprint classification
system. The extracted features must be unique and stable by remaining unchanged for the …

Minutiae-based fingerprint extraction and recognition

N Zaeri - Biometrics, 2011 - books.google.com
In our electronically inter-connected society, reliable and user-friendly recognition and
verification system is essential in many sectors of our life. The person's physiological or …

Fdeblur-gan: Fingerprint deblurring using generative adversarial network

AS Joshi, A Dabouei, J Dawson… - … Joint Conference on …, 2021 - ieeexplore.ieee.org
While working with fingerprint images acquired from crime scenes, mobile cameras, or low-
quality sensors, it becomes difficult for automated identification systems to verify the identity …

Fingerprint authentication using Gabor filter based matching algorithm

S Chavan, P Mundada, D Pal - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Person identification and recognition using fingerprints as a biometric authentication is one
of the unique, prominent and reliable method of verification processes. The paper presents …

[PDF][PDF] Smartphone-based biometric authentication scheme for access control management in client-server environment

SA Lone, AH Mir - Int J Inf Technol Comput Sci, 2022 - academia.edu
As the information put together by the blend of smartphones, the cloud, the IOT, and
ubiquitous computing continue to expand at an alarming rate, a data breach increases …

Application perfected wave tracing algorithm

M Nazarkevych, Y Kynash, R Oliarnyk… - 2017 IEEE First …, 2017 - ieeexplore.ieee.org
Vectorization is happened by a wave method. The wave method is to analyze the path of the
way to the spherical wave in the image. At every step is analyzed offset center of point's …

Fusion based multimodal biometric cryptosystem

YH Dandawate, SR Inamdar - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Security is main concern in Automated Teller Machines today. Multimodal Biometrics are
more secure as compared to Unimodal Biometrics as even if one trait fails the other is …

[PDF][PDF] A novel method for fingerprint core point detection

NK Johal, A Kamra - International Journal of Scientific & Engineering …, 2011 - Citeseer
Fingerprint recognition is a method of biometric authentication that uses pattern recognition
techniques based on highresolution fingerprints images of the individual. Fingerprints have …

Fingerprint biometric authentication based point of sale terminal

K Okokpujie, E Noma-Osaghae, O Okesola… - Information Science and …, 2019 - Springer
Retail businesses that are not transacted online still represent a substantial amount of retail
deals that are closed on a daily basis. Retail business owners and customers continue to …