The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address the problem of cross-view image geo-localization. Specifically, we aim to estimate the GPS location of a query street view image by finding the matching images in a reference database of geo-tagged birds eye view images, or vice versa. To this end, we present a new framework for cross-view image geo-localization by taking advantage of the tremendous success of deep convolutional...
Latent fingerprints obtained from crime scenes are rarely immediately suitable for identification purposes. Instead, most latent fingerprint images must be preprocessed to enhance the fingerprint information held within the digital image, while suppressing interference arising from noise and otherwise unwanted image features. In the following we present results of our ongoing research to assess this...
Fingerprint is one of the most important biometrics that has been employed for verification systems. Fingerprint is characterized by two fundamental properties; Easy to acquire, and it is unique for each person. This paper presents minutia extraction method based on Neural Network-based. These features can be used in verification systems. The verification process includes four main phases: image acquisition,...
In this paper, we will propose an efficient technique using adaptive dual threshold decision based algorithm for removing of salt and pepper noise in different fingerprint images. In the first step, the recent adaptive dual threshold is applied to detect the pixels which are likely to be corrupted more efficiently. In the second step, only the corrupted pixels are replaced by the decision based algorithm...
Biometrics based authentication systems face the major challenge in securing the template. Although multi-modal biometric techniques and cryptographic techniques offer security but they can be easily compromised. This paper explores the possibility of combining features from the same biometric trait (fingerprints) i.e. keeping it unimodal but still offering the same security as that of the combined...
In any institution or company, managing the records of attendance of the staff and students or employees is a tedious task. This project focuses on automating the attendance process through a biometric scanning technique. As, the finger print is a feature that is peculiar to an individual, it would help in efficiently identifying the person and would help in saving a great deal of paper work and other...
Fingerprint template protection has recently drawn much attention due to public security and privacy awareness. In this paper, we demonstrate an approach for designing a non-invertible fingerprint template by constructing the many-to-many bit-string polar transformations with different minutiae points. We explore the relative relationship of minutiae points in polar system, which is registration-free...
For images taken from very different viewpoints, we propose a new feature matching algorithm that provides accurate matches while preserving high matchability. Our method first synthesizes images by simulating the viewpoint changes. It then learns variation of local feature descriptors induced by the viewpoint changes. Finally, we robustly match feature descriptors by measuring the similarity using...
GAT (Global Affine Transformation) and GPT (Global Projection Transformation) correlation matchings were successively proposed by Wakahara and Yamashita which use affine transformation (AT) and 2D projection transformation (PT), respectively, to maximize the normalized cross-correlation value between a template and a GAT/GPT-superimposed input image. In theory, to maximize the degree of matching via...
This paper presents a novel method for fingerprint ROI (region of interest) segmentation using Deep learning technique — Convolutional Neural Networks. Experimental results, obtained using a publicly available test database of 200 fingerprint images in two variations — with and without Gaussian noise, demonstrate that this method is competitive with Fourier coefficients and NN based method for fingerprint...
Recognizing low quality fingerprints is important while identifying a person in watch-list and fraudulent scams which is equally important to authenticate legitimate user. Flat or dab fingerprints and rolled fingerprints are being acquired from people by many biometric agencies across the world from their respective governments. But at times un-identification of legitimate users and fault recognition...
Security is very important in present day life. In this computer-networked world, most of the activities are computer based, and the data transactions arc protected by passwords. These passwords identify various entities such as bank accounts, mobile phones, etc. People might reuse the same password, or passwords might be related to an individual that can lead to dictionary attacks. Indeed, remembering...
Existing fingerprint classification techniques make use of Level-1 or Level-2 features or their combination for fingerprint classification. On the other hand, Level-3 features have not been explored much for fingerprint classification. Specifically, the use of crease for fingerprint classification does not exist in the literature. In this work, we explore the use of crease features for fingerprint...
We show the first camera based (privacy-preserving) indoor mobile positioning system, CaPSuLe, which does not involve any communication (or data transfer) with any other device or the cloud. The algorithm only needs 78.9MB of memory and can localize a mobile device with 92.11% accuracy. Furthermore this is done in 1.92 seconds of on-device computation consuming 3.77 Joules of energy, as evaluated...
In this paper we introduce a shape descriptor known as Self Similar Affine Invariant (SSAI) descriptor for shape retrieval. The SSAI descriptor is based on the property that two sets of points are transformed by an affine transform, then subsets of each set of points are also related by the same affine transformation. Also, the SSAI descriptor is insensitive to local shape distortions. We use multiple...
The main concern associated with biometric structures which are stored in a database is the security of the template storage system. A new technique which assembles the encryption key and biometric sample using a cryptographic means is the fuzzy vault. Most of the existing algorithms needs query fingerprint image used during vault decoding to be aligned with the enrolment fingerprint image used in...
We present a pre-processing step for minutiae based fingerprint verification to perform distortion correction. We first detect the core-point of the enrollment image, select a Region of Interest (ROI) around it and find its corresponding region in the test image using normalized cross-correlation method. Then using core-point and the lower-right corner point of ROI, we build fixed and moving point...
Biometrics are used for security purpose. It is used to recognize a person based on their unique characteristics. Among several biometrics, Fingerprint is the most widely used and acceptable biometrics. Biometric system has several advantages over traditional methods. But it can be affected by several attacks. The type 1 attack is performed at the sensor level. Differentiating a genuine biometric...
This article is an overview of a current research based on fingerprint recognition system. In this paper we highlighted on the previous studies of fingerprint recognition system. This paper is a brief review in the conceptual and structure of fingerprint recognition. The basic fingerprint recognition system consists of four stages: firstly, the sensor which is used for enrolment & recognition...
In today's life travelling has become a passion. But travelling is not so easy unless we know the place and its details. When we visit a new place in order to know the details of that place, we usually take help of native people at times there might arise a situation where we cannot communicate with them. In other ways we browse about the place this approach may also lead to confusion and does not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.