A Fast and Distortion Tolerant Hashing for Fingerprint Image Authentication

نویسندگان

  • Thi Hoi Le
  • The Duy Bui
چکیده

Biometrics such as fingerprint, face, eye retina, and voice offers means of reliable personal authentication is now a widely used technology both in forensic and civilian domains. Reality, however, makes it difficult to design an accurate and fast biometric recognition due to large biometric database and complicated biometric measures. In particular, fast fingerprint indexing is one of the most challenging problems faced in fingerprint authentication system. In this paper, we present a specific contribution to advance the state of the art in this field by introducing a new robust indexing scheme that is able to fasten the fingerprint recognition process.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Image authentication using LBP-based perceptual image hashing

Feature extraction is a main step in all perceptual image hashing schemes in which robust features will led to better results in perceptual robustness. Simplicity, discriminative power, computational efficiency and robustness to illumination changes are counted as distinguished properties of Local Binary Pattern features. In this paper, we investigate the use of local binary patterns for percep...

متن کامل

Online fingerprint identification with a fast and distortion tolerant hashing

National ID card, electronic commerce, and access to computer networks are some scenarios where reliable identification is a must. Existing authentication systems relying on knowledge-based approaches like passwords or token-based such as magnetic cards and passports contain serious security risks due to the vulnerability to engineering-social attacks and the easiness of sharing or compromising...

متن کامل

Compressed Image Hashing using Minimum Magnitude CSLBP

Image hashing allows compression, enhancement or other signal processing operations on digital images which are usually acceptable manipulations. Whereas, cryptographic hash functions are very sensitive to even single bit changes in image. Image hashing is a sum of important quality features in quantized form. In this paper, we proposed a novel image hashing algorithm for authentication which i...

متن کامل

Anti-Forensics of Photo Response Non-Uniformity of Digital Images

The digital image processing is to be used in Antiforensics of photo response non-uniformity of digital images. Fingerprints are one of those irregular twists of nature. The fingerprints are used for authentication and identification processes in forensic tasks such as detection of digital forgeries. Forensic tasks can to be performed in device identification problem, device linking problem, fi...

متن کامل

Speech Authentication Based on Perceptual Fingerprint Hashing

A perceptual fingerprint hashing method is proposed for audio authentication in this paper. First, the biologic fingerprint image is divided into overlapping rectangle blocks by randomly using a chaotic sequence, and then the gravity center of each block is calculated. Finally, the perceptual Hashing value is generated based on the gravity center of each block. To authenticate the speech identi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008