• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 24
Next 10 →

An Identity Authentication System Using Fingerprints

by Anil Jain, Lin Hong, Sharath Pankanti, Ruud Bolle , 1997
"... Fingerprint verification is an important biometric technique for personal identification. In this paper, we describe the design and implementation of a prototype automatic identity authentication system which uses fingerprints to authenticate the identity of an individual. We have developed an impro ..."
Abstract - Cited by 110 (21 self) - Add to MetaCart
an improved minutiae extraction algorithm which is faster and more accurate than our earlier algorithm [58]. An alignment-based minutiae matching algorithm has been proposed. This algorithm is capable of finding the correspondences between input minutiae and the stored template without resorting to exhaustive

An identity-authentication system using fingerprints

by Anil K. Jain, Lin Hong, Sharath Pankanti, Ruud Bolle - PROCEEDINGS OF THE IEEE , 1997
"... Fingerprint verification is an important biometric technique for personal identification. In this paper, we describe the design and implementation of a prototype automatic identity-authentication system that uses fingerprints to authenticate the identity of an individual. We have developed an improv ..."
Abstract - Cited by 107 (12 self) - Add to MetaCart
an improved minutiae-extraction algorithm that is faster and more accurate than our earlier algorithm [58]. An alignment-based minutiae-matching algorithm has been proposed. This algorithm is capable of finding the correspondences between input minutiae and the stored template without resorting to exhaustive

ON THE SECURITY OF NON-INVERTIBLE FINGERPRINT TEMPLATE TRANSFORMS

by Abhishek Nagar, Anil K. Jain
"... Many transformation functions have been proposed for generating revocable or non-invertible biometric templates. However, their security analysis either ignores the distribution of biometric features or uses inefficient feature matching. This usually leads to unrealistic estimates of security. In th ..."
Abstract - Cited by 11 (5 self) - Add to MetaCart
allows estimation of security against partial recovery of biometric features. We analyze the CE curves obtained using different instances of a mixture of Gaussians based feature transform for fingerprint templates. Our analysis shows that knowledge of the fingerprint minutiae distribution reduces

Minutiae Extraction and Pruning Based Fingerprint Identification with Pattern Classification by Radial Basis Function

by Nisha Negi, Sunil Semwal
"... Minutiae feature extraction is one of the most popular techniques used for fingerprint identification with great degree of success. This paper focuses on the enhancement in the performance of an Automatic Fingerprint Identification System in terms of FMR (false matching ratio) and FNMR (false non ma ..."
Abstract - Add to MetaCart
Minutiae feature extraction is one of the most popular techniques used for fingerprint identification with great degree of success. This paper focuses on the enhancement in the performance of an Automatic Fingerprint Identification System in terms of FMR (false matching ratio) and FNMR (false non

Identity Authentication Using Fingerprints

by Lin Hong, Anil Jain, Sharath Pankanti, Ruud Bolle , 1997
"... We describe the design and implementation of an automatic identity authentication system which uses fingerprint to establish the identity of an individual. An improved minutia extraction algorithm that is much faster and more accurate than our earlier algorithm [12] has been implemented. An alignmen ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
We describe the design and implementation of an automatic identity authentication system which uses fingerprint to establish the identity of an individual. An improved minutia extraction algorithm that is much faster and more accurate than our earlier algorithm [12] has been implemented

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

by Yijun Yang , Jianping Yu , Peng Zhang , Shulan Wang
"... A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users' fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an i ..."
Abstract - Add to MetaCart
an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows

Symmetric hash functions for secure fingerprint biometric systems

by Faisal Farooq, Sergey Tulyakov, Praveer Mansukhani, Venu Govindaraju - Pattern Recognition Letters , 1991
"... Securing biometrics databases from being compromised is one of the most important challenges that must be overcome in order to demonstrate the viability of biometrics based authentication. In this paper we present a novel method of hashing fingerprint minutia and performing fingerprint identificatio ..."
Abstract - Cited by 18 (2 self) - Add to MetaCart
identification in the hash space. Our approach uses a family of symmetric hash functions and does not depend on the location of the (usually unstable) singular points (core and delta). In fact, most approaches of hashing minutia and developing a cancellable system described in the literature assume the location

Fingerprint warping using ridge curve correspondences

by Arun Ross, Sarat C. Dass, Anil K. Jain , 2006
"... The performance of a fingerprint matching system is affected by the nonlinear deformation introduced in the fingerprint impression during image acquisition. This nonlinear deformation causes fingerprint features such as minutiae points and ridge curves to be distorted in a complex manner. A techniq ..."
Abstract - Cited by 16 (3 self) - Add to MetaCart
technique is presented to estimate the nonlinear distortion in fingerprint pairs based on ridge curve correspondences. The nonlinear distortion, represented using the thin-plate spline (TPS) function, aids in the estimation of an “average” deformation model for a specific finger when several impressions

Research Article A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

by Yijun Yang, Jianping Yu, Peng Zhang, Shulan Wang
"... which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users ’ ..."
Abstract - Add to MetaCart
’ fingerprints, the personal authentication can be determined only by the fingerprint features.This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem

BioHashing with Fingerprint Spectral Minutiae

by Berkay Topcu, Hakan Erdogan, Cagatay Karabat, Berrin Yanikoglu
"... Abstract: In recent years, the interest in human authentication has been increasing. Biometrics are one of the easy authentication schemes, however, security and privacy problems limit their widespread usage. Following the interest in privacy protecting biometric authentication, template protection ..."
Abstract - Add to MetaCart
schemes for biometric modalities has in-creased significantly in order to cope with security and privacy issues. BioHashing, which is based on transforming the biometric template using pseudo-random projec-tions that are generated using a user-specified key or token, has received much atten
Next 10 →
Results 1 - 10 of 24
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University