Fingerprint Verification Using Perturbation Method
نویسندگان
چکیده
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs local FFT band-pass filtering to enhance the cyclic ridge structure in respective local areas. The second part is optimal block-wise shift for preliminary matching. Then, the third part is application of GAT correlation to realize affine-invariant shape matching. Finally, the fourth part is detail matching by perturbation. The key ideas of our perturbation method are in three ways: extraction of core points from enrolled fingerprint images, setting local windows around the core point, and asynchronous perturbation of local windows for optimal detail matching between input and each enrolled fingerprint images. How to design the size of local windows, the range and direction of perturbation, and the matching criteria is crucial to the success of the proposed method. Experimental results using the public FVC2000 fingerprint image database demonstrate a sufficiently low equal error rate (EER) of 5.55% for false rejection and false acceptance comparable to those obtained by competing works.
منابع مشابه
Quality-based Fingerprint Verification
The performance of an automatic fingerprint verification system relies heavily on the quality of the captured fingerprint images. In this paper, we propose a new method using fingerprint image quality to improve the accuracy of fingerprint verification. Comparison to conventional fingerprint verification that only use the matching score, a final score is calculated by the matching score and qua...
متن کاملFingerprint matching based on weighting method and SVM
Fingerprint verification is an important biometric technology. In this paper, an improved fingerprint matching approach that uses weighting method and support vector machine (SVM) is presented. The traditional minutiae-based matching task is transformed to a classification task in the proposed approach using SVM. Furthermore, a new weight feature is introduced based on the distance between minu...
متن کاملAccess Control System with High Level Security Using Fingerprints
Biometric based applications guarantee for resolving numerous security hazards. As a method of preserving of privacy and the security of sensitive information, biometrics has been studied and used for the past few decades. Fingerprint is one of the most widely used biometrics. A number of fingerprint verification approaches have been proposed until now. However, fingerprint images acquired usin...
متن کاملSecure Fingerprint Verification Based on Image Processing Segmentation Using Computational Geometry Algorithms
In this paper, fingerprint segmentation for secure Internet verification purposes is investigated. The novel application of computational geometry algorithms in the fingerprint segmentation stage showed that the extracted feature (characteristic polygon) may be used as a secure and accurate method for fingerprint-based verification over the Internet. On the other hand the proposed method promis...
متن کاملA Solution of Riccati Nonlinear Differential Equation using Enhanced Homotopy Perturbation Method (EHPM)
Homotopy Perturbation Method is an effective method to find a solution of a nonlinear differential equation, subjected to a set of boundary condition. In this method a nonlinear and complex differential equation is transformed to series of linear and nonlinear and almost simpler differential equations. These set of equations are then solved secularly. Finally a linear combination of the solutio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007