Video-Based Fingerprint Verification
نویسندگان
چکیده
منابع مشابه
Quality-based Fingerprint Verification
The performance of an automatic fingerprint verification system relies heavily on the quality of the captured fingerprint images. In this paper, we propose a new method using fingerprint image quality to improve the accuracy of fingerprint verification. Comparison to conventional fingerprint verification that only use the matching score, a final score is calculated by the matching score and qua...
متن کاملFingerprint Verification based on Gabor Filter Enhancement
Human fingerprints are reliable characteristics for personnel identification as it is unique and persistence. A fingerprint pattern consists of ridges, valleys and minutiae. In this paper we propose Fingerprint Verification based on Gabor Filter Enhancement (FVGFE) algorithm for minutiae feature extraction and post processing based on 9-pixel neighborhood. A global feature extraction and finger...
متن کاملCorrelation Filter based Fingerprint Verification System
Biometrics is an important security tool which can be used for human identification and authentication to offer a higher level of security than conventional identification methods. Among all available biometrics, Fingerprints are a good choice as they are unique to a person. Fingerprint recognition is a complex pattern recognition problem. This paper proposes fingerprint verification based on c...
متن کاملVideo Based Face Verification
This paper introduces a video based face verification system. Stereo vision and multiple-related template matching method are used to segment facial region from the background. Facial features are extracted for geometrical normalization and followed by illumination normalization. Faces are represented by normalized face images masking out some corner points. A Support Vector Machine classifier ...
متن کاملFingerprint Verification System
Existing security measures rely on knowledge-based approaches like passwords or tokenbased approaches such as swipe cards and passports to control access to physical and virtual spaces. Though ubiquitous, such methods are not very secure. Tokens such as badges and access cards may be shared or stolen. Furthermore, they cannot differentiate between authorized user and a person having access to t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2013
ISSN: 1424-8220
DOI: 10.3390/s130911660