The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address the problem of cross-view image geo-localization. Specifically, we aim to estimate the GPS location of a query street view image by finding the matching images in a reference database of geo-tagged birds eye view images, or vice versa. To this end, we present a new framework for cross-view image geo-localization by taking advantage of the tremendous success of deep convolutional...
Fingerprint is one of the most important biometrics that has been employed for verification systems. Fingerprint is characterized by two fundamental properties; Easy to acquire, and it is unique for each person. This paper presents minutia extraction method based on Neural Network-based. These features can be used in verification systems. The verification process includes four main phases: image acquisition,...
Biometrics based authentication systems face the major challenge in securing the template. Although multi-modal biometric techniques and cryptographic techniques offer security but they can be easily compromised. This paper explores the possibility of combining features from the same biometric trait (fingerprints) i.e. keeping it unimodal but still offering the same security as that of the combined...
For images taken from very different viewpoints, we propose a new feature matching algorithm that provides accurate matches while preserving high matchability. Our method first synthesizes images by simulating the viewpoint changes. It then learns variation of local feature descriptors induced by the viewpoint changes. Finally, we robustly match feature descriptors by measuring the similarity using...
GAT (Global Affine Transformation) and GPT (Global Projection Transformation) correlation matchings were successively proposed by Wakahara and Yamashita which use affine transformation (AT) and 2D projection transformation (PT), respectively, to maximize the normalized cross-correlation value between a template and a GAT/GPT-superimposed input image. In theory, to maximize the degree of matching via...
Existing fingerprint classification techniques make use of Level-1 or Level-2 features or their combination for fingerprint classification. On the other hand, Level-3 features have not been explored much for fingerprint classification. Specifically, the use of crease for fingerprint classification does not exist in the literature. In this work, we explore the use of crease features for fingerprint...
We show the first camera based (privacy-preserving) indoor mobile positioning system, CaPSuLe, which does not involve any communication (or data transfer) with any other device or the cloud. The algorithm only needs 78.9MB of memory and can localize a mobile device with 92.11% accuracy. Furthermore this is done in 1.92 seconds of on-device computation consuming 3.77 Joules of energy, as evaluated...
The main concern associated with biometric structures which are stored in a database is the security of the template storage system. A new technique which assembles the encryption key and biometric sample using a cryptographic means is the fuzzy vault. Most of the existing algorithms needs query fingerprint image used during vault decoding to be aligned with the enrolment fingerprint image used in...
Biometrics are used for security purpose. It is used to recognize a person based on their unique characteristics. Among several biometrics, Fingerprint is the most widely used and acceptable biometrics. Biometric system has several advantages over traditional methods. But it can be affected by several attacks. The type 1 attack is performed at the sensor level. Differentiating a genuine biometric...
This article is an overview of a current research based on fingerprint recognition system. In this paper we highlighted on the previous studies of fingerprint recognition system. This paper is a brief review in the conceptual and structure of fingerprint recognition. The basic fingerprint recognition system consists of four stages: firstly, the sensor which is used for enrolment & recognition...
In today's life travelling has become a passion. But travelling is not so easy unless we know the place and its details. When we visit a new place in order to know the details of that place, we usually take help of native people at times there might arise a situation where we cannot communicate with them. In other ways we browse about the place this approach may also lead to confusion and does not...
There are various types of applications for fingerprint recognition which is used for different purposes. Fingerprint is one of the challenging pattern Recognition problem. The Fingerprint Recognition system is divided into four stages. First is Acquisition stage to capture the fingerprint image, The second is Pre-processing stage to enhancement, binarization, thinning fingerprint image. The Third...
Biometrics are used for authentication. It is used to recognize a person based on their unique characteristics. Among several biometrics, Fingerprint is the most widely used and acceptable biometrics. Biometric system has several advantages over traditional methods. But It can be affected by several attacks. In this paper the type 1 attack is discussed which is performed at the sensor level. Differentiating...
In this paper, the Quaternion Zernike Moments (QZMs) are addressed for digital fingerprints matching. First, we realize a triplets' representation which will be input to the M3gl algorithm in order to obtain the matched triplets' pairs. Then, the neighborhood of each of these triplets is characterized by QZMs descriptor. Finally, we perform a global matching step and compute the similarity score for...
Vehicle ego-localization is a critical task not only for in-car navigation systems, but also for emerging intelligent and autonomous vehicle technologies. Visual localization methods that determine current location by performing image matching against a pre-constructed database have an accuracy limited by the spatial distance between database images. In this paper we propose a method that uses the...
Fingerprint scanners usually suffer from spoofing attack of fake fingerprints. To address this issue, a pore based liveness detection method has been proposed in this paper. The method first extracts the sweat pores from the grayscale fingerprint image. This is achieved by processing the fingerprint image using the Gaussian filters, whose parameters are adaptively adjusted according to the local ridge...
Personnel identification has become a mandatory requirement in a large number of applications extending from security to commercial nature in recent years. Identification mechanism using Biometric-based solutions has shown to overcome several drawbacks of traditional security measures. Among different biometric traits, fingerprint is one of the most universal, permanent and easy to acquire trait for...
Multiple enrollment based fingerprint recognition systems have for long been known for good recognition accuracies. They however suffer poor matching speeds, a lot of memory consumption and the recognition accuracies are still very low; making implementation in real-world applications difficult. This paper presents a novel approach that performs prior selection of good fingerprint image samples of...
Identity verification is very important in the world today and it is used in our everyday life. Systems like smart card identity verification has its weakness and it can be easily abused. The integration between fingerprint verification and National Registration Identity Card (MyKad) verification elevates the security in identification to the highest level as fingerprints are unique from one another...
In recent decades, the classification of fake fingerprints and real fingerprint images has become an attractive research topic because of the most advanced threats. A number of research works have been carried out to classify fake and real fingerprints. But, most of the existing techniques did not utilize swarm intelligence techniques in their fingerprint classification system. Swarm intelligence...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.