We present DeepPrint, a deep network, which learns to extract fixed-length fingerprint representations of only 200 bytes. DeepPrint incorporates fingerprint domain knowledge …
Z Jin, MH Lim, ABJ Teoh, BM Goi… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
The ISO/IEC 19794-2-compliant fingerprint minutiae template is an unordered and variable- sized point set data. Such a characteristic leads to a restriction for the applications that can …
E Liu, AK Jain, J Tian - IEEE Transactions on Pattern Analysis …, 2013 - ieeexplore.ieee.org
With the availability of live-scan palmprint technology, high resolution palmprint recognition has started to receive significant attention in forensics and law enforcement. In forensic …
W Go, K Lee, J Kwak - Journal of Intelligent Manufacturing, 2014 - Springer
User authentication is highly necessary technology in a variety of services. Many researchers have proposed a two-factor authentication scheme using certificate and OTP …
Z WU, Y WANG, J ZHANG - 电子与信息学报, 2017 - jeit.ac.cn
With the development of information technology and the increasing demanding of information security, people are urgently in need of more reliable identification techniques …
R Dwivedi, S Dey - arXiv preprint arXiv:1805.10853, 2018 - arxiv.org
In a biometric verification system, leakage of biometric data leads to permanent identity loss since original biometric data is inherently linked to a user. Further, various types of attacks …
C Chi, F Gao - Journal of Applied Mathematics, 2014 - Wiley Online Library
Algorithm based on fractional difference was used for the edge extraction of thenar palm print image. Based on fractional order difference function which was deduced from classical …
EU Sehar, A Selwal, D Sharma - 2021 fourth international …, 2021 - ieeexplore.ieee.org
Recent years have revealed a rapid expansion in the use of various biometric technologies for authentication management systems. Although biometric systems have innumerable …