A fast and light fingerprint-matching model based on deep learning approaches

H Shafaghi, M Kiani, A Amirany, K Jafari… - Journal of Signal …, 2023 - Springer
Nowadays, biometric identification has become very important due to the need to identify
people in different places and devices. Among these features, the fingerprint has received …

Fingerprint authentication using shark smell optimization algorithm

BT Ahmed, OY Abdulhameed - UHD Journal of Science and …, 2020 - journals.uhd.edu.iq
Recognition of people relying on biometric characteristics is a common phenomenon in our
society. It has increased in recent years in most areas of life such as government …

New approach for fingerprint recognition based on stylometric features with blockchain and cancellable biometric aspects

A Elsadai, S Adamović, M Šarac, M Saračević… - Multimedia Tools and …, 2022 - Springer
Applying machine learning techniques and methods in biometric recognition has gained
significant attention in recent years as it can provide a better performance, high accuracy …

Contactless palm vein authentication security technique for better adoption of e-commerce in developing countries

S Alabi, M White, N Beloff - Intelligent Computing: Proceedings of the 2020 …, 2020 - Springer
Abstract e-Commerce has contributed immensely to the economies of developed countries
and a factor in its success can be attributed to the adoption of e-commerce by their citizens …

[PDF][PDF] Fingerprint recognition based on shark smell optimization and genetic algorithm

BT Ahmed, OY Abdulhameed - International Journal of Advances in …, 2020 - core.ac.uk
The rapid enhancement of technology and electronically life raised the need for an extra
level of security. Security is an increasing necessity throughout the globe because a lack of …

Fingerprint Recognition Scheme Based on Deep Learning and Homomorphic Encryption

J Zhang, H Su, Y Li, H Yang - 2022 3rd International …, 2022 - ieeexplore.ieee.org
In fingerprint identification, fingerprint features, as a kind of biological feature, are unique,
universal, and irrevocable. If it is maliciously attacked, leaked, and tamperedwith, the …

[PDF][PDF] 基于SEAL 库的同态密文指纹识别系统设计与实现

杨亚涛, 张奇林, 张艳硕, 左珮良 - Journal of Cryptologic …, 2021 - jcr.cacrnet.org.cn
将指纹信息直接以明文形式存储在云端数据库会对个人隐私信息造成一定的威胁,
同态加密技术和指纹识别的结合, 可以在对个人信息提供隐私保护的同时享有云服务提供的强大 …

Noise attenuation and ridge processing technique for fingerprint bit minimization

GB Iwasokun, A Aladesaye - Iran Journal of Computer Science, 2022 - Springer
This paper presents a model for the optimal reduction of the bit size of a fingerprint towards
plummeting its storage requirement and raising the performance index of fingerprint-based …

Multi approach for finger print recognition based on transformation methods

MM Salih, SAM Ramadhan, MA Al-Abaji - AIP Conference …, 2019 - pubs.aip.org
The aim of this work is to present methods for identification Biometrics. Which are one of the
most important standards used in user identification, through a series of sequential steps …

The Principle and Design of Separate Fingerprint Identification System

M Liu - Machine Learning and Intelligent Communications: 4th …, 2019 - Springer
Separate fingerprint identification system (SFIS) is composed of high-speed DSP (digital
signal processor), SRAM and Flash chip, whose modules include fingerprint entry, image …