Tesi sul tema "Fingerprint Verification"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-39 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Fingerprint Verification".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Yager, Neil Gordon Computer Science & Engineering Faculty of Engineering UNSW. "Hierarchical fingerprint verification". Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/27008.
Testo completoDeng, Huimin. "Robust minutia-based fingerprint verification". Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B37036427.
Testo completoDeng, Huimin, e 鄧惠民. "Robust minutia-based fingerprint verification". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37036427.
Testo completoYan, Weiwei. "Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66677.
Testo completoSandström, Marie. "Liveness Detection in Fingerprint Recognition Systems". Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2397.
Testo completoBiometrics deals with identifying individuals with help of their biological data. Fingerprint scanning is the most common method of the biometric methods available today. The security of fingerprint scanners has however been questioned and previous studies have shown that fingerprint scanners can be fooled with artificial fingerprints, i.e. copies of real fingerprints. The fingerprint recognition systems are evolving and this study will discuss the situation of today.
Two approaches have been used to find out how good fingerprint recognition systems are in distinguishing between live fingers and artificial clones. The first approach is a literature study, while the second consists of experiments.
A literature study of liveness detection in fingerprint recognition systems has been performed. A description of different liveness detection methods is presented and discussed. Methods requiring extra hardware use temperature, pulse, blood pressure, electric resistance, etc., and methods using already existent information in the system use skin deformation, pores, perspiration, etc.
The experiments focus on making artificial fingerprints in gelatin from a latent fingerprint. Nine different systems were tested at the CeBIT trade fair in Germany and all were deceived. Three other different systems were put up against more extensive tests with three different subjects. All systems werecircumvented with all subjects'artificial fingerprints, but with varying results. The results are analyzed and discussed, partly with help of the A/R value defined in this report.
Fransson, Linda, e Therese Jeansson. "Biometric methods and mobile access control". Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5023.
Testo completoSun, Wei [Verfasser], Thomas [Akademischer Betreuer] Sikora, Thomas [Gutachter] Sikora, Atta [Gutachter] Badii e Ivo [Gutachter] Keller. "Low complexity embedded fingerprint verification and identification system / Wei Sun ; Gutachter: Thomas Sikora, Atta Badii, Ivo Keller ; Betreuer: Thomas Sikora". Berlin : Technische Universität Berlin, 2016. http://d-nb.info/1156181704/34.
Testo completoDimitrov, Emanuil. "Fingerprints recognition". Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-5522.
Testo completoNowadays biometric identification is used in a variety of applications-administration, business and even home. Although there are a lot of biometric identifiers, fingerprints are the most widely spread due to their acceptance from the people and the cheap price of the hardware equipment. Fingerprint recognition is a complex image recognition problem and includes algorithms and procedures for image enhancement and binarization, extracting and matching features and sometimes classification. In this work the main approaches in the research area are discussed, demonstrated and tested in a sample application. The demonstration software application is developed by using Verifinger SDK and Microsoft Visual Studio platform. The fingerprint sensor for testing the application is AuthenTec AES2501.
Falade, Joannes Chiderlos. "Identification rapide d'empreintes digitales, robuste à la dissimulation d'identité". Thesis, Normandie, 2020. http://www.theses.fr/2020NORMC231.
Testo completoBiometrics are increasingly used for identification purposes due to the close relationship between the person and their identifier (such as fingerprint). We focus this thesis on the issue of identifying individuals from their fingerprints. The fingerprint is a biometric data widely used for its efficiency, simplicity and low cost of acquisition. The fingerprint comparison algorithms are mature and it is possible to obtain in less than 500 ms a similarity score between a reference template (enrolled on an electronic passport or database) and an acquired template. However, it becomes very important to check the identity of an individual against an entire population in a very short time (a few seconds). This is an important issue due to the size of the biometric database (containing a set of individuals of the order of a country). Thus, the first part of the subject of this thesis concerns the identification of individuals using fingerprints. Our topic focuses on the identification with N being at the scale of a million and representing the population of a country for example. Then, we use classification and indexing methods to structure the biometric database and speed up the identification process. We have implemented four identification methods selected from the state of the art. A comparative study and improvements were proposed on these methods. We also proposed a new fingerprint indexing solution to perform the identification task which improves existing results. A second aspect of this thesis concerns security. A person may want to conceal their identity and therefore do everything possible to defeat the identification. With this in mind, an individual may provide a poor quality fingerprint (fingerprint portion, low contrast by lightly pressing the sensor...) or provide an altered fingerprint (impression intentionally damaged, removal of the impression with acid, scarification...). It is therefore in the second part of this thesis to detect dead fingers and spoof fingers (silicone, 3D fingerprint, latent fingerprint) used by malicious people to attack the system. In general, these methods use machine learning techniques and deep learning. Secondly, we proposed a new presentation attack detection solution based on the use of statistical descriptors on the fingerprint. Thirdly, we have also build three presentation attacks detection workflow for fake fingerprint using deep learning. Among these three deep solutions implemented, two come from the state of the art; then the third an improvement that we propose. Our solutions are tested on the LivDet competition databases for presentation attack detection
Bartoň, Jaroslav. "Podpora pro autentizaci pomocí otisků prstu". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-235492.
Testo completoWales, Chris. "Identifying digital fingerprints in source code for authorship verification /". Leeds : University of Leeds, School of Computer Studies, 2008. http://www.comp.leeds.ac.uk/fyproj/reports/0708/Wales.pdf.
Testo completoKazík, Martin. "Zpracování otisků prstů". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218978.
Testo completoKovář, Martin. "Snímač otisku prstu". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221330.
Testo completoWu, Di. "A Global Spatial Model for Loop Pattern Fingerprints and Its Spectral Analysis". Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538788/.
Testo completoChikkerur, Sharat S. "Online fingerprint verification system". 2005. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:1426769.
Testo completoTitle from PDF title page (viewed on Feb. 2, 2006) Available through UMI ProQuest Digital Dissertations. Thesis adviser: Alexander N. Cartwright.
Ding, Chian-Chuang, e 丁鎮權. "Fingerprint Verification System Design". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/61180923557915950456.
Testo completo淡江大學
電機工程學系
91
With the advance of new technologies some biological features, such as pupil, face, fingerprint, have been employed for developing personal identification systems. Among all, fingerprint identification is one of the most commonly used. Beside to the uniqueness and the time invariance properties of fingerprints necessary for identification, the costs and the performance of fingerprint identification methods are quite comparable with the methods using other biological features. Fingerprint identification also plays an important role in law’s identity. Therefore how to correctly differentiate two fingerprints is very important on the issue of personal identification. Conventionally, a series of preprocessing are required in order to facilitate the extraction of fingerprint features for identification. Then further steps will be taken based on the locations as well as the number of the features points. Very often, noisy spots were generated during the acquisition process of the fingerprint image. This significantly alters the number of endpoints and bifurcation points. Therefore it often leads to wrong conclusions when the subsequent matching test is performed. In this paper, we use 8×8 masks to search for the local directions of the fingerprint, based on which we can locate the position of the core point. Then gray-level normalization is performed on the fan-shaped regions around the core point. Finally, we perform image enhancement on eight fixed directions using Gabor filters. The variances of the fan-shaped regions are taken as the feature values of the fingerprint. In the phase of identification, Euclidean distance is adopted to measure the difference between the fingerprints under consideration in order to determine whether they are identical. Finally, we will integrate the proposed procedures and establish a PC-based environment for simulating the real fingerprint identification processes, which consists of the fingerprint data recording and the matching test, in order to illustrate its efficiency and effectiveness in practice.
Chang, Chia-Yung, e 張嘉勇. "Automatic Fingerprint Verification System". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/09665079293715705261.
Testo completo國立清華大學
資訊工程學系
91
Fingerprints are considered as an efficient and viable means of biometrics. An automatic fingerprint verification system (AFVS) can automatically verify an individual based on minutiae matching. The fingerprint verification contains two main stages, fingerprint classification and fingerprint matching. In the stage of fingerprint classification, fingerprints are classified into four classes to reduce the following fingerprint matching. The four classes are arch, left loop, right loop and whorl. In the stage of fingerprint matching, fingerprint minutiae must be detected for matching. A minutiae pattern consists of ridge endings and bifurcations. Based on the differences of distance and direction of minutiae, we compute matching scores of all pair of fingerprints. If one of the matching scores with the other 3 fingerprints acquired from the same individual is among the top 3 places, the fingerprint is accepted for the verification. The error rate of our AFVS tested on the database DBLI101 is 17.08% (69/404) and the other database of 28 individuals gains the error rate of 0.98% (1/112)
"Fast fingerprint verification using sub-regions of fingerprint images". 2004. http://library.cuhk.edu.hk/record=b5892013.
Testo completoThesis (M.Phil.)--Chinese University of Hong Kong, 2004.
Includes bibliographical references (leaves 77-85).
Abstracts in English and Chinese.
Chapter 1. --- Introduction --- p.1
Chapter 1.1 --- Introduction to Fingerprint Verification --- p.1
Chapter 1.1.1 --- Biometrics --- p.1
Chapter 1.1.2 --- Fingerprint History --- p.2
Chapter 1.1.3 --- Fingerprint characteristics --- p.4
Chapter 1.1.4 --- A Generic Fingerprint Matching System Architecture --- p.6
Chapter 1.1.5 --- Fingerprint Verification and Identification --- p.8
Chapter 1.1.7 --- Biometric metrics --- p.10
Chapter 1.2 --- Embedded system --- p.12
Chapter 1.2.1 --- Introduction to embedded systems --- p.12
Chapter 1.2.2 --- Embedded systems characteristics --- p.12
Chapter 1.2.3 --- Performance evaluation of a StrongARM processor --- p.13
Chapter 1.3 --- Objective -An embedded fingerprint verification system --- p.16
Chapter 1.4 --- Organization of the Thesis --- p.17
Chapter 2 --- Literature Reviews --- p.18
Chapter 2.1 --- Fingerprint matching overviews --- p.18
Chapter 2.1.1 --- Minutiae-based fingerprint matching --- p.20
Chapter 2.2 --- Fingerprint image enhancement --- p.21
Chapter 2.3 --- Orientation field Computation --- p.22
Chapter 2.4 --- Fingerprint Segmentation --- p.24
Chapter 2.5 --- Singularity Detection --- p.25
Chapter 2.6 --- Fingerprint Classification --- p.27
Chapter 2.7 --- Minutia extraction --- p.30
Chapter 2.7.1 --- Binarization and thinning --- p.30
Chapter 2.7.2 --- Direct gray scale approach --- p.32
Chapter 2.7.3 --- Comparison of the minutiae extraction approaches --- p.35
Chapter 2.8 --- Minutiae matching --- p.37
Chapter 2.8.1 --- Point matching --- p.37
Chapter 2.8.2 --- Structural matching technique --- p.38
Chapter 2.9 --- Summary --- p.40
Chapter 3. --- Implementation --- p.41
Chapter 3.1 --- Fast Fingerprint Matching System Overview --- p.41
Chapter 3.1.1 --- Typical Fingerprint Matching System --- p.41
Chapter 3.1.2. --- Fast Fingerprint Matching System Overview --- p.41
Chapter 3.2 --- Orientation computation --- p.43
Chapter 3.21 --- Orientation computation --- p.43
Chapter 3.22 --- Smooth orientation field --- p.43
Chapter 3.3 --- Fingerprint image segmentation --- p.45
Chapter 3.4 --- Reference Point Extraction --- p.46
Chapter 3.5 --- A Classification Scheme --- p.51
Chapter 3.6 --- Finding A Small Fingerprint Matching Area --- p.54
Chapter 3.7 --- Fingerprint Matching --- p.57
Chapter 3.8 --- Minutiae extraction --- p.59
Chapter 3.8.1 --- Ridge tracing --- p.59
Chapter 3.8.2 --- cross sectioning --- p.60
Chapter 3.8.3 --- local maximum determination --- p.61
Chapter 3.8.4 --- Ridge tracing marking --- p.62
Chapter 3.8.5 --- Ridge tracing stop criteria --- p.63
Chapter 3.9 --- Optimization technique --- p.65
Chapter 3.10 --- Summary --- p.66
Chapter 4. --- Experimental results --- p.67
Chapter 4.1 --- Experimental setup --- p.67
Chapter 4.2 --- Fingerprint database --- p.67
Chapter 4.3 --- Reference point accuracy --- p.67
Chapter 4.4 --- Variable number of matching minutiae results --- p.68
Chapter 4.5 --- Contribution of the verification prototype --- p.72
Chapter 5. --- Conclusion and Future Research --- p.74
Chapter 5.1 --- Conclusion --- p.74
Chapter 5.2 --- Future Research --- p.74
Bibliography --- p.77
Chen, Ming-Zong, e 陳銘宗. "Feature Points Fingerprint Verification System". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/62070343839797608189.
Testo completo清雲科技大學
電機工程所
99
Biometrics is using biological features to verify the user''s own identity, and these features include voice, face, fingerprint, iris ... and so on. The fingerprint feature is the most commonly used research method in personal verification. In addition to the fingerprint keeps the same during a long period of time, the implementation of the function is more convenience and more practical than other verification methods. In this study, we modify the existing algorithms to designed a verification system using C + + programming language. We use the capacitive or optical fingerprint capture devices to capture fingerprint image. The captured fingerprint image first will do pre-processing, and then find the core point of the image. Using this core point center the image is divided into blocks, the size of each block is 7 x 7 pixels. Identify features in each block and locate all features in the image by using the core point as the reference points. Use this information as a basis for the implementation of ID verification can improve the drawback that feature points are too close together or the fingerprint image is incomplete to avoid verification errors.
yu, yang shih, e 楊詩郁. "A Study of Fingerprint Verification". Thesis, 2000. http://ndltd.ncl.edu.tw/handle/21144669747974241067.
Testo completo淡江大學
資訊工程學系
88
Various technological approaches for the identification of individuals have been proposed and fingerprint identification is one of the most reliable approaches. In the past, several organizations have used fingerprint identification successfully for not only the investigation of criminals but also to control access to restricted data or areas. Recently, the demand for automatic identification is increasing in the business world for transactions and individual''s security. The advantage of the fingerprint identification is that it contains two convenient secure characteristics can not be forged and always with the individual. The reason is no two people have the same fingerprints and the fingerprint is easier to carry than an identification card. Because computer techniques are becoming more and more convenient. There is more and more important data that must maintained computers and exchanged by networks. Therefore, a fingerprint identification system can play an important role in system security and identification verification, and this can prove the importance of the fingerprint identification. Most automatic systems for fingerprint comparison are based on minutiae matching .Minutiae are essentially terminations and bifurcations of the ridge lines that constitute a fingerprint pattern. Automatic minutiae detection is an extremely critical process, especially in low_quality fingerprints where noise and contract deficiency can originate pixel configuration similar to minutiae or hide real minutiae. Several approaches have been proposed in the literature; although rather different from each other, all the methods are based on a lot of preprocessing, however , it consumes time. In this work we propose an original technique, based on ridge line following, where the minutiae are extracted directly from gray scale images without a series of preprocessing.In spite of a greater conceptual complexity, the method proposed performs better both in terms of efficiency and robustness.
"Towards more robust fingerprint verification". 2005. http://library.cuhk.edu.hk/record=b5892379.
Testo completoThesis (M.Phil.)--Chinese University of Hong Kong, 2005.
Includes bibliographical references (leaves 81-88).
Abstracts in English and Chinese.
Chapter 1. --- Introduction --- p.10
Chapter 1.1 --- Biometric Systems --- p.1
Chapter 1.2 --- Comparison of Biometrics --- p.2
Chapter 1.3 --- Introduction of Fingerprint --- p.6
Chapter 1.3.1 --- History of Fingerprint --- p.6
Chapter 1.3.2 --- Fingerprint Analysis --- p.8
Chapter 1.4 --- Fingerprint Verification --- p.13
Chapter 1.4.1 --- Correlation Based Verification: --- p.13
Chapter 1.4.2 --- Minutiae Based Verification: --- p.15
Chapter 1.4.3 --- Ridge Feature-Based Verification: --- p.16
Chapter 1.5 --- Evaluation of Verification Systems --- p.17
Chapter 1.6 --- Difficulties of Fingerprint Verification --- p.22
Chapter 1.7 --- Contributions --- p.25
Chapter 1.8 --- Organization of the Thesis --- p.26
Chapter 2. --- Two-Pass Direct Gray-Scale for Minutiae Detection --- p.28
Chapter 2.1 --- Introduction --- p.28
Chapter 2.2 --- Background Information --- p.29
Chapter 2.3 --- Two-Pass Direct Gray Scale --- p.34
Chapter 2.3.1 --- First Pass of TPD --- p.38
Chapter 2.3.2 --- Second Pass of TPD --- p.41
Chapter 2.4 --- Other Implementation Details --- p.44
Chapter 2.4.1 --- Foreground Detection --- p.45
Chapter 2.4.2 --- Region of Interest Detection --- p.48
Chapter 2.4.3 --- Matching Methodology --- p.52
Chapter 2.5 --- Experimental Results --- p.58
Chapter 2.6 --- Summary --- p.62
Chapter 3. --- Image Mosaicking and Template Synthesis --- p.63
Chapter 3.1 --- Introduction --- p.63
Chapter 3.2 --- Background Information --- p.65
Chapter 3.3 --- Template Synthesis and Image Mosaicking --- p.66
Chapter 3.3.1 --- Template Alignment --- p.66
Chapter 3.3.2 --- Template Synthesis --- p.68
Chapter 3.3.3 --- Image Mosaicking --- p.70
Chapter 3.4 --- Experiments --- p.72
Chapter 3.5 --- Summary --- p.75
Chapter 4. --- Conclusion and Future Investigations --- p.77
References --- p.81
Chia-Chi, Wu, e 吳家頎. "Fingerprint Verification System on SoC". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/01575945899273418139.
Testo completo國立臺灣科技大學
資訊工程系
91
Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is so tedious, time-consuming, and inefficiency. Therefore, an automatic fingerprint identification system (AFIS) is widely needed. It plays a very important role in forensic and civilian applications such as criminal identification, access control. This paper describes the design and implementation of a fingerprint verification system on System on a Chip (SoC). Our fingerprint verification system operates in four stages: fingerprint acquisition, image pre-processing, minutiae extraction and minutiae matching. Image pre-processing consists of segmentation, smoothing and thinning, which help for extract significant minutiae more accurately. The minutiae extraction algorithm is implemented for extracting features from an input fingerprint image captured with the sensor. For our fingerprint verification system in this paper, we use ridge endings and ridge bifurcations for fingerprint matching. We use Altera’s Nios SoC development kit to implement fingerprint verification system. We build hardware core, including CPU and peripheral modules, with System On a Programmable Chip (SOPC) Builder, and implement fingerprint verification algorithm using C programming language. We also use Programming Language Interface (PLI) routine to proceed hardware & software co-verification in high-level language. To make sure the system be correct, we use UART which communicates PC with the Nios development board to verify the accuracy of SoC.
Chen, Po-Jui. "Development of Automatic Fingerprint Verification Systems". 2004. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2707200402425600.
Testo completoChen, Po-Jui, e 陳柏睿. "Development of Automatic Fingerprint Verification Systems". Thesis, 2004. http://ndltd.ncl.edu.tw/handle/21074703439603445585.
Testo completo國立臺灣大學
機械工程學研究所
92
Most fingerprint verification systems take advantage of fingerprint minutiae as matching features. Since the classification rate of the minutia-based method is determined by the quality of input fingerprint images, the minutia-based method usually demands a large amount of image preprocessing to remove signal noise. Obviously, this not only increases system computation complexity, but also reduces matching speed. In order to avoid these drawbacks, this thesis combines the automatic threshold selection with differential pulse transform algorithm and adopts the wavelet transform to transfer a fingerprint signal from the spatial domain to the frequency domain. The magnitudes of the fingerprint energies, which distribute over different frequencies, are taken as fingerprint features for identification or verification, to reduce the computation load in the system. As for low quality fingerprint images, we join the wavelet transform and Gabor filter to enhance and restore crumbling segments. In addition, we use the registration point and rotation point as auxiliary reference to solve for the problem of frequency characteristic variations induced by fingerprint translation or rotation. With back propagation neural network as classifier, experiment shows that the classification rate can achieve 93% above in our system. The same result can be obtained for the fingerprint images in varied position or with poor quality.
Hsiao, Chih-Hao, e 蕭志豪. "Fingerprint Recognition Chip Design via the Improved Multi-level Fingerprint Verification Algorithm". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/s93sb7.
Testo completo淡江大學
電機工程學系碩士班
94
Nowadays, the importance of the information protection and the entrance guard control system have be attached importance to the people. Traditional secret maintaining methods like setting up passwords are eliminated gradually, and the biometric verification technique is to take it over. Biometric verification technique is applied on enhancing the system of maintaining secrecy gradually. Biometric verification techniques which are available now are mainly as follows : iris, voice, appearance, and fingerprint. On account of its precision and convenience, fingerprint is the most wildly-used technique; whereas iris verification may cause transmitted disease because of the contact with eyes, voice may inflect for emotion, appearance maybe changed as weight. What’s more, fingerprints possess exclusive character, therefore, fingerprints have been using on information security system generally. Most of the fingerprint verification systems would including normalization, noise filter, calculate fingerprint flow direction, flow filter, thinning, detect the positions of the singular points and minutiae, as a basis for the later verification. However, the verification efficiency of a huge recognition database is often censorable when encountering. Therefore, this thesis brings up a new verification process to promote the efficiency of verification. After a series of valid image preprocessing procedure, we detect the minutiae without Thinning, and use the flow nearing the core point to classify the fingerprints speedily. As for the verification unit, the new verification process would verify the fingerprints of its classified database first, which will improve the verification efficiency of the whole verification unit. After the confirmation of algorithm and the success of simulation, we try to realize the procedure of fingerprint image verification by hardware, using DSP to achieve personal identity verification system.
Lin, Jeng-Je, e 林正哲. "Fingerprint Verification System using Phase Correlation Technique". Thesis, 2000. http://ndltd.ncl.edu.tw/handle/61344414746658609742.
Testo completo國立臺灣師範大學
工業教育研究所
88
Abstract The technique of digital fingerprint matching has been used for more than thirty years. Two main traditional approaches to do fingerprint matching are minutiae-based matching and filter-based matching. They were proposed to extract the features of ridges and valleys pattern and verify the incoming fingerprint with stored fingerprint database fast and accurately. But the widely used minutiae-based matching has difficulty in quickly matching two fingerprint images containing different number of unregistered minutiae points. And the filter-based matching suffered much in false acceptance rate when dealt with defective fingerprints. The proposed phase-based matching algorithm uses phase difference to do fingerprint verification instead of traditional Euclidean distance. The amplitude value is normalized into unitary value. This robust phase-matching algorithm speeds up the fingerprint matching and reduces false acceptance rate after several experiments.
Li-Ming, Lee. "Development of an Anti-Forgery Fingerprint Verification System". 2005. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2307200519203300.
Testo completoGwo-Cheng, Chao, e 趙國成. "A Fingerprint Verification System based on Minutiae Matching". Thesis, 2004. http://ndltd.ncl.edu.tw/handle/69420330587510232317.
Testo completo國立臺灣科技大學
資訊工程系
93
Fingerprint based identification has been known and used for a long time. Owing to the uniqueness and immutability, fingerprints are today the most widely used biometric features. Fingerprint verification is based on the minutiae of the fingerprints. Extracting minutiae from fingerprint patterns is one of the most important steps in automatic system for fingerprint identification. This model, adopted in most automatic systems, is based on a two-class minutiae classification: endpoint and bifurcation .The accuracy of the minutiae will affect the correctness of the fingerprint matching; therefore the fingerprint enhancement will be done to reduce the false minutiae. In this thesis, an effective fingerprint verification system is implemented by passing the image pre/post-processing, feature extraction and matching processes. We describe an improved method on fingerprint enhancement and post-processing. We directly enhance the fingerprint on gray-scale image and reduce the most false minutiae in the post-processing step. For minutiae matching, an alignment-based elastic matching algorithm has been developed. This algorithm is capable of finding the corresponding point pairs between input and template minutiae. It also has the ability to adaptively compensate for the nonlinear deformations between fingerprints.
Lee, Li-Ming, e 李立明. "Development of an Anti-Forgery Fingerprint Verification System". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/86092650347705322132.
Testo completo國立臺灣大學
機械工程學研究所
93
In general, the fingerprint verification systems are good enough for daily secure life. But if the biometric technology of duplicating fingerprints has a significant improvement, or a bandit cuts off the authorizer’s finger, the only fingerprint verification procedure is not safe any more. Therefore, we have to develop an Anti-Forgery Fingerprint Verification System to ensure the fingerprint pattern directly extracting from one’s finger but not a duplicated fingerprint mask. An AFFVS (Anti-Forgery Fingerprint Verifications System) is a verification system combined with the biometric indicators of both fingerprint and finger-vein patterns. When a user places his finger on the sensor, the system will first check the primal feature, fingerprint pattern, to ensure that the input fingerprint pattern belongs to a authorized user, and then AFFVS will compare the input finger-vein pattern with the authorized user’s finger-vein pattern to guarantee the captured fingerprint is really acquired from the authorized person rather than the forgery fingerprint mask. But if the AFFVS decides the input fingerprint pattern as an invader, it will directly reject the user and will not do any vein-comparing procedure.
Tseng, Chun-Chieh, e 曾俊傑. "Design Methodology of An Intelligent Fingerprint Verification System". Thesis, 2001. http://ndltd.ncl.edu.tw/handle/90582948099717557897.
Testo completo義守大學
電機工程學系
89
This thesis advances a complete methodology of an intelligent fingerprint verification system. It applies circular auto-correlation to perform the features transformed from fingerprint images. SOM-BK neural network is used for extracting fingerprint minutia. An intelligent minutia point matching method based on particle swarm optimization is also applied. Circular auto-correlation produces a set of rotation-invariant feature vectors by transforming each local pattern on the fingerprint. We establish a mixed neural networks which combine SOM and MFNN neural networks to detect minutia from fingerprint images. In verification stage, we use PSO to optimize minutia point matching distortions including displacement and rotation. To compare with other methods, the searching of PSO is faster with higher adaptability. When PSO finds the optimal solution on the finite solution space, we can easily identify the target fingerprint image. According to this methodology, we design a fingerprint verification system that integrates software and hardware. This system is consisted of four main software modules which are circular auto-correlation module, SOM-BK feature extraction module, particle swarm optimization module, and decision maker module. Finally we test and adjust this system with real world data. The results reveal the expected performance and applicability of the system. They prove as well the availability of design methodology proposed in this thesis.
"The statistical evaluation of minutiae-based automatic fingerprint verification systems". Thesis, 2006. http://library.cuhk.edu.hk/record=b6074180.
Testo completoChen, Jiansheng.
"November 2006."
Adviser: Yiu-Sang Moon.
Source: Dissertation Abstracts International, Volume: 68-08, Section: B, page: 5343.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2006.
Includes bibliographical references (p. 110-122).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
Hsieh, Fang-Ling, e 謝芳伶. "The Application of Fingerprint Verification based on Support Vector Machines". Thesis, 2004. http://ndltd.ncl.edu.tw/handle/49dsxu.
Testo completo靜宜大學
資訊管理學系研究所
92
The issues of security are broadly discussed nowadays. Without effective security protection, even the most excellent information system is still useless. So far there have been a variety of biological features for personal identification, including appearance, hand geometry, voice print, iris, retina, signature, facial thermogram, hand vein, gait, odor, keystroke, and so on . Of these various methods of protection, fingerprinting is one of the most common approaches. In this thesis, the mechanism of a novel fingerprint verification will be studied. The algorithm consists three parts, namely, the first part acquisition of fingerprint image, the acquest of features and the comparison of features. The contains the acquirement of image ridge. To detect the direction of fingerprint area, this study adopts the methods developed by Stock and Swonger to search for the whole picture of fingerprint’s flowing direction, and then present it with eight directions. The second part is based on the location of the central point. Then, the features are found according to the central points. This study uses one-class support vector machines(SVM) to distinguish fingerprints in the third part. Experiment results show that one-class SVM can apply to fingerprint recognition problem efficiently.
Lin, tun-hua, e 林敦華. "Fingerprint verification system apply to finance corporation-for customer relationship example". Thesis, 2004. http://ndltd.ncl.edu.tw/handle/97410444926018213413.
Testo completo國立臺北大學
企業管理學系碩士在職專班
92
By consumer psychology theory, scholars study and predict customer’s behavior based on “ cognition-attitude ” model. (Here in this research is about feasibility of consumer acceptation on fingerprint Verification system by Finance Corporations) In this research, is based on survey research to analyze consumer “ cognition-attitude ” and estimate feasibility of consumer acceptation on fingerprint Verification system by Finance Corporations. In a word, (1)Gender, age and career are all significantly connected with customer cognition based on statistic. (2) Gender, age and career are all significantly connected with customer attitude based on statistic. (3)Customer cognition is significantly connected with customer aggregative attitude based on statistic.(4)Customer attitude is significantly connected with customer aggregative attitude based on statistic.(5)Race attribute variability is significantly connected with customer aggregative attitude based on statistic. This research includes all dependent variability and influenced independent variability. Only eight variables is significantly influenced based on statistic: aware fingerprint could be recognized by computer scan(cognition)、not aware fingerprint could be recognized by computer scan(cognition)、Middle grounders towards privacy or/and corporation advantage(attitude)、privacy is more important(attitude)、extremely agreeable on fingerprint verification(attitude)、disapproval on fingerprint verification(attitude) 、extremely disapprove on fingerprint verification(attitude)、female(Race attribute)。 Above shows customer cognition, attitude and race attribute variability are all significantly connected with customer general attitude, which needs special attention while used on fingerprint verification system by finance corporations.
Lee, Chih-Jen, e 李志仁. "Applications of Gabor Functions on Fingerprint Representation, Enhancement, Verification, and Identification". Thesis, 2001. http://ndltd.ncl.edu.tw/handle/78227525989803394566.
Testo completo國立臺灣大學
電機工程學研究所
89
This thesis describes how to take advantage of Gabor filters to the applications of fingerprint, such as enhancement, singular point detection, pattern extraction, verification, and identification. Based on the global and local information, we develop two kinds of Gabor filter-based approaches to extract the fingerprint features. To entirely analyze the influence of the parameters of Gabor filters for the global approach, we transform a local fingerprint image into a complete Gabor basis functions (GBFs) and find that the radial frequency is the most important parameter for fingerprint recognition. Moreover, we also find that the principal GBF, which has the maximum response over the complete GBFs, is sufficient to represent the ridge orientation and frequency of a local fingerprint image and the corresponding response can be used as an index of both the clearness of ridge structures and the area of fingerprint pattern. According to the ridge structures of the core region or those of whole fingerprint, we extract a set of principal GBFs to form a template. Then the core point detection and fingerprint matching can be performed directly from gray-scale image based on the largest responses. We also develop a fingerprint enhancement algorithm with adaptive Gabor filters to obtain very clear ridge structures. At last, we evaluate the performances of the global and the local Gabor filter-based features by various experiments of various system designs, such as verification and identification. Through various comparisons, in conclusion, the local approach is superior to the global from all situations, including accuracy, speed, and memory space.
Huang, Yi-Hong, e 黃逸泓. "A Rotation Invariance Singular Point Detection Algorithm on a Fingerprint Verification System". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/95355181004209072891.
Testo completo清雲科技大學
電機工程研究所
95
A robust fingerprint singular point detection algorithm with rotation-invariant ability is proposed. Two 7x7 templates of core and delta are constructed from the orientation map of a fingerprint that is formed by using Sobel operators. The differences between the value of central element and those of the outer ring’s 24 elements of the template are calculated. Since the variations of the orientations around the singular point are greater than those of others, singular point can be correctly detected by comparing the 24 database . The algorithm has the merit to detect rotated fingerprint images that cannot be done by using traditional sample-matching method with only two templates. Experimental results show the correctness of our algorithm. Comparisons with the traditional sample-matching method are studied. Analyzing of detection performance by using different sample sizes is also performed.
Yu, Hsin-Wei, e 余信緯. "The Low Cost and Small Size Fingerprint Verification System Base on Line Sensor". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/72467p.
Testo completo國立臺北科技大學
電腦與通訊研究所
94
While the diversity of the technology has been presented and advanced nowadays, it is time to enjoy the convenience from the progress of technology. Thus, the way to secure the personal data has been a more and more important issue. Traditionally, products related to electronics adopt the password inputting as the protection lock. But, the password is inconvenient since it acquires the user to memorize and it can easily be stolen. In the present study, a fingerprint verification system is the main focus in which the line sensor has been adopted to be the protection lock. The line sensor used here, requiring lower power, smaller area, and lower price, is different from the traditional block sensor, for the current system of science and technology on the market. This kind of sensor will be much suited for the product development. Because of the line sensor, the way to detect is to sweep and pick up the fingerprint, and, thus, the image that have already picked can be further reorganized to become as a full fingerprint image. Because the head fingerprint sweep on the sensor, having problems such as sweep speed, pressure differences, and work environment variables. The algorithm of backend expiation has to be applied to take for a further revision and for the adjustment of processing, to avoid problems that influence the recognized result. First, this present study adopts the Normalized Cross Correlation reorganization algorithm to recognize the complete fingerprint. Then, in order to enhance the function of a complete fingerprint image establishment, as the Histogram equalization, Gaussian smoothing, and image scaling, it is convenient to take its minutiae. We use the group delay spectrum algorithm to extract the fingerprint spectrum minutiae after the image has been enhanced. Finally, we use the dynamic programming algorithm to match and verify between fingerprint spectrum minutiae and the registered fingerprint, to complete the recognition. Because this system uses the spectrum minutiae of the group delay spectrum to be as the sample, it can be used to compare with the traditional endpoint and bifurcation minutiae. Since this system contains the advantage with lower calculation quantity and less memory, it requires much less calculation for the quantity of image front processing and image enhancement function. This system is based on a line sensor and group delay spectrum in which the relevant advantages have been mentioned above. Therefore, through the experiment, our recognition rate is up 93.82%.
Huang, Yi-Che, e 黃一哲. "Fingerprint Recognition Chip Design via the Fast Minutiae Extraction and Multi-level Verification Algorithm". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/56436125310223209108.
Testo completo淡江大學
電機工程學系碩士班
95
Nowadays, the importance of the information protection and the entrance guard control system are quite important lessons. Today, biometric verification technique is applied on enhancing the system of maintaining secrecy and recognized identifications. Biometric verification techniques which are available now are mainly as follows: voice, appearance, iris, fingerprint. Fingerprint is so authentic adopted for people constantly because of its singularity and constancy. Most identification methods would including normalization, noise filter, calculate fingerprint flow direction, flow filter, thinning, detect the positions of the singular points and minutiae. The primal methods are depend on the locations and numbers of ridge endings and bifurcations. If we can get the fingerprint flow field exactly, it will be easy to find out the minutiae and singular points. In this thesis, we propose a novel improved binarization to replace gabor filter. This method can accelerate the speed of the calculation of fingerprint flow and help us gain the flow more accurately. We also advance a new verification process to promote the efficiency of verification. After a series of valid image preprocessing procedure, we detect the minutiae without Thinning, and use the flow nearing the core point to classify the fingerprints speedily. As for the verification unit, the new verification process would verify the fingerprints of its classified database first, which will improve the verification efficiency of the whole verification unit.
(9183044), Samuel J. Reiff. "Analysis of Fingerprint Recognition Performance on Infants". Thesis, 2020.
Cerca il testo completoIn this study, any change in fingerprint performance, image quality and minutiae count for infants in three different age groups was evaluated (0-6, 7-12, and >12 months). This was done to determine whether there is a difference in performance between infant age groups for a fingerprint recognition system.
The purpose of this research was to determine whether there is a difference in infant fingerprint performance and image quality metrics, between three different age groups (0-6, 7-12, and >12 months old), using the same optical sensor? The data used for this secondary analysis was collected as part of a longitudinal multimodal infant study, using the Digital Persona U.are.U 4500. DET curves, zoo analysis, and image quality metrics were used to evaluate performance and quality factored by infant age group.
This study found that there was a difference in image quality and minutiae count, genuine and impostor match scores, and performance error rates (EER) between the three age groups. Therefore, quality and performance were dependent on age. While there was a difference in performance between age groups, there was generally stability for subjects who overlapped between multiple age groups. Difference in performance was most likely due to the difference in physical characteristics between subjects in each age group, rather than individual instability. The results showed that it could potentially be feasible to use fingerprint recognition for children over the age of 12 months.
Braude, David Adam. "Fingerprinnts: oriantation free minutiae extraction and using distances between minutiae for identification and verification". Thesis, 2011. http://hdl.handle.net/10539/10623.
Testo completo