The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In many real life situations end results and basic starting data are known. To deduce conclusive evidence or to build holistic picture one needs to find out hidden information and missing text. This research paper delivers a novel algorithm (Probabilistic Intent-Action Ontology and Tone Matching Algorithm) to map multiple events on time line by determining their interdependency to predict the most...
Fingerprint is one of the most important biometrics that has been employed for verification systems. Fingerprint is characterized by two fundamental properties; Easy to acquire, and it is unique for each person. This paper presents minutia extraction method based on Neural Network-based. These features can be used in verification systems. The verification process includes four main phases: image acquisition,...
Recognizing low quality fingerprints is important while identifying a person in watch-list and fraudulent scams which is equally important to authenticate legitimate user. Flat or dab fingerprints and rolled fingerprints are being acquired from people by many biometric agencies across the world from their respective governments. But at times un-identification of legitimate users and fault recognition...
Singular point is the location of high curvature area of a fingerprint. It represents the global characteristic and is quite useful for fingerprint classification and matching. Despite being a very important feature, the localization of the singular point is still not perfect. This paper proposes a novel algorithm to locate prominent singular points from a fingerprint image by devising the concept...
We present a pre-processing step for minutiae based fingerprint verification to perform distortion correction. We first detect the core-point of the enrollment image, select a Region of Interest (ROI) around it and find its corresponding region in the test image using normalized cross-correlation method. Then using core-point and the lower-right corner point of ROI, we build fixed and moving point...
This article is an overview of a current research based on fingerprint recognition system. In this paper we highlighted on the previous studies of fingerprint recognition system. This paper is a brief review in the conceptual and structure of fingerprint recognition. The basic fingerprint recognition system consists of four stages: firstly, the sensor which is used for enrolment & recognition...
The online fingerprints by biometric system is not widely used now a days and there is less scope as user is friendly with the system. This paper represents a framework and applying the latent fingerprints obtained from the crime scene. These prints would be matched with our database and we identify the criminal. For this process we have to get the fingerprints of all the citizens. This technique...
There are various types of applications for fingerprint recognition which is used for different purposes. Fingerprint is one of the challenging pattern Recognition problem. The Fingerprint Recognition system is divided into four stages. First is Acquisition stage to capture the fingerprint image, The second is Pre-processing stage to enhancement, binarization, thinning fingerprint image. The Third...
Automated Fingerprint Identification Systems (AFIS) are commonly used by law enforcement agencies to narrow down the possible suspects from a criminal database. AFIS do not use all discriminatory features available in fingerprints but typically use only some types of features automatically extracted by a feature extraction algorithm. Latent fingerprints obtained from crime scenes are usually partial...
Security issues related to fake passports etc., used in various situations like air travel etc., protecting the identity of a person is an essential task. To prevent someone's identity from being misused, they need to be protected by one of the most reliable sources of the user authentication process. This paper proposes an approach for achieving security using a novel technique for personal authentication...
Fingerprints are unique, permanent and universal. The minutiae of fingerprints of a human have sufficient details. We can use these non-trivial details as identification marks to verify the fingerprints. The purpose of this paper is to investigate and implement the working of minutiae based fingerprint matching system. Minutiae based fingerprint matching is widely used for fingerprint verification...
Biometrics is a way that identifies people with the help of physical human features. There are many ways of bio-metric identification and recognition systems such as fingerprints, face, iris and veins etc. However, these conventional methods have some problems with respect of performance and convenience. Every human hand has unique veins patterns. Hand veins based recognition is most feasible than...
Biometric recognition systems are rapidly evolving technologies and their use in embedded devices for accessing and managing data and resources is a very challenging issue. Usually, they are composed of three main modules: Acquisition, Features Extraction and Matching. In this paper the hardware design and implementation of an efficient fingerprint features extractor for embedded devices is described...
The fingerprint ridge structure can be directly generated from its following features: the position of minutiae, the orientation field and the ridge frequency map. It was once believed that minutiae template does not reveal sufficient information of the orientation field and ridge frequency map to allow the reconstruction of the original fingerprint image. This belief has now been shown to be false;...
This paper is concerned with novel features for fingerprint classification based on the Euclidian distance between the center point and their nearest neighbor bifurcation minutia's. The main advantage of the new method is the dimension reduction of the features vectors used to characterize fingerprint, compared with the classic characterization method based on the relative position of bifurcation...
Fingerprint analysis has been performed on static images since the establishment of friction-ridge patterns as a reliable human trait for identification. The image of a fingerprint can vary considerably, however, as a result of such factors as skin elasticity and pressure on the imaging surface. With today's live-scan imaging devices, changes in appearance are notable as a finger presses against the...
This paper deals with the identification of the left main coronary bifurcation (LMB) in 2D angiograms. We resort to a generic 3D model of the LMB that is projected in the proper angulation to retrieve the expected 2D skeleton of the LMB in the considered image. We derive from it an efficient discriminating filter that allows detecting the LMB, while being robust to anatomical variations. We demonstrate...
Fingerprint matching is currently the subject of intense research by both private and academic institutions. So fingerprints are emerging as the most common and trusted biometric for personal identification. For the fingerprint matching problem, the input is some fingerprint images and the output is the probability that the fingerprints were captured from the same finger. This paper presents an improved...
In this paper, we propose an automatic tracking method to extract blood vessels in retinal images. Seed points are firstly picked out on a retinal image for initialization. Our algorithm detects vessel edge points iteratively based on a statistical sampling model using a Bayesian method. At a given step, local vessel's sectional intensity profile is approximated by a Gaussian model. New vessel edge...
Point-pattern matching of minutiae is the most common method used in fingerprint biometrics, but it is generally insufficient by itself. It has particular limitations in matching partial prints or in secure (biocryptographic) matching. Here, we add structure with a new spatial graph represention of a fingerprint, with minutiae as nodes. Using a sample of fingerprint graphs extracted from the FVC2002...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.