Jin et al., 2007 - Google Patents
Liveness detection of fingerprint based on band-selective Fourier spectrumJin et al., 2007
View PDF- Document ID
- 8685065553122183895
- Author
- Jin C
- Kim H
- Elliott S
- Publication year
- Publication venue
- International Conference on Information Security and Cryptology
External Links
Snippet
This paper proposes a novel method for fingerprint liveness detection based on band- selective Fourier spectrum. The 2D spectrum of a fingerprint image reflects the distribution and strength in spatial frequencies of ridge lines. The ridge-valley texture of the fingerprint …
- 238000001514 detection method 0 title abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/0008—Extracting features related to ridge properties; determining the fingerprint type, e.g. whorl, loop
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jin et al. | Liveness detection of fingerprint based on band-selective Fourier spectrum | |
Yuan et al. | Fingerprint liveness detection based on multi-scale LPQ and PCA | |
Dubey et al. | Fingerprint liveness detection from single image using low-level features and shape analysis | |
Woodard et al. | Finger surface as a biometric identifier | |
Chen et al. | Iris recognition based on bidimensional empirical mode decomposition and fractal dimension | |
Sequeira et al. | Iris liveness detection methods in mobile applications | |
Krishnasamy et al. | Wet fingerprint recognition: Challenges and opportunities | |
Ghiani et al. | Experimental results on fingerprint liveness detection | |
Nikam et al. | Local binary pattern and wavelet-based spoof fingerprint detection | |
Xia et al. | Combining Wavelet Transform and LBP Related Features for Fingerprint Liveness Detection. | |
Marasco et al. | An anti-spoofing technique using multiple textural features in fingerprint scanners | |
Appati et al. | Implementation of a Transform‐Minutiae Fusion‐Based Model for Fingerprint Recognition | |
Aftab et al. | Hand-based multibiometric systems: state-of-the-art and future challenges | |
El-Naggar et al. | Which dataset is this iris image from? | |
Galbally et al. | Introduction to presentation attack detection in fingerprint biometrics | |
Hegde et al. | Human authentication using finger knuckle print | |
Lee et al. | Fake finger detection using the fractional Fourier transform | |
Lu et al. | Fingerprint liveness detection based on pore analysis | |
Abdulla et al. | Exploring human biometrics: A focus on security concerns and deep neural networks | |
Sahmoud | Enhancing iris recognition | |
Choudhary et al. | Multi-instance finger vein-based authentication with secured templates | |
Wang et al. | Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks | |
Hegde et al. | Human authentication based on ECG waves using radon transform | |
Rawat | A hierarchical fingerprint matching system | |
Ahmed et al. | Intelligent Technique for Human Authentication using Fusion of Finger and Dorsal Hand Veins |