[PDF][PDF] Biometric authentication: A review

D Bhattacharyya, R Ranjan… - … Journal of u-and e …, 2009 - biometrie-online.net
Advances in the field of Information Technology also make Information Security an
inseparable part of it. In order to deal with security, Authentication plays an important role …

Minutiae extraction from fingerprint images-a review

R Bansal, P Sehgal, P Bedi - arXiv preprint arXiv:1201.1422, 2011 - arxiv.org
Fingerprints are the oldest and most widely used form of biometric identification. Everyone is
known to have unique, immutable fingerprints. As most Automatic Fingerprint Recognition …

Biometrics recognition using deep learning: A survey

S Minaee, A Abdolrashidi, H Su, M Bennamoun… - Artificial Intelligence …, 2023 - Springer
In the past few years, deep learning-based models have been very successful in achieving
state-of-the-art results in many tasks in computer vision, speech recognition, and natural …

[PDF][PDF] 自动指纹识别中的图像增强和细节匹配算法

罗希平, 田捷 - 软件学报, 2002 - jos.org.cn
对自动指纹识别系统(automated fingerprint identification system, 简称AFIS) 的两个重要问题——
指纹图像增强和细节匹配进行研究, 给出了一种基于方向场的指纹图像增强算法, 对Anil Jain …

[图书][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Fingerprint image enhancement: algorithm and performance evaluation

L Hong, Y Wan, A Jain - IEEE transactions on pattern analysis …, 1998 - ieeexplore.ieee.org
In order to ensure that the performance of an automatic fingerprint identification/verification
system will be robust with respect to the quality of input fingerprint images, it is essential to …

Deep representation-based feature extraction and recovering for finger-vein verification

H Qin, MA El-Yacoubi - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Finger-vein biometrics has been extensively investigated for personal verification. Despite
recent advances in finger-vein verification, current solutions completely depend on domain …

Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …

Online palmprint identification

D Zhang, WK Kong, J You… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
Biometrics-based personal identification is regarded as an effective method for automatically
recognizing, with a high confidence, a person's identity. This paper presents a new biometric …

FingerNet: An unified deep network for fingerprint minutiae extraction

Y Tang, F Gao, J Feng, Y Liu - 2017 IEEE International Joint …, 2017 - ieeexplore.ieee.org
Minutiae extraction is of critical importance in automated fingerprint recognition. Previous
works on rolled/slap fingerprints failed on latent fingerprints due to noisy ridge patterns and …