[go: up one dir, main page]

Jin et al., 2007 - Google Patents

Liveness detection of fingerprint based on band-selective Fourier spectrum

Jin et al., 2007

View PDF
Document ID
8685065553122183895
Author
Jin C
Kim H
Elliott S
Publication year
Publication venue
International Conference on Information Security and Cryptology

External Links

Snippet

This paper proposes a novel method for fingerprint liveness detection based on band- selective Fourier spectrum. The 2D spectrum of a fingerprint image reflects the distribution and strength in spatial frequencies of ridge lines. The ridge-valley texture of the fingerprint …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/0008Extracting features related to ridge properties; determining the fingerprint type, e.g. whorl, loop
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/52Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image

Similar Documents

Publication Publication Date Title
Jin et al. Liveness detection of fingerprint based on band-selective Fourier spectrum
Yuan et al. Fingerprint liveness detection based on multi-scale LPQ and PCA
Dubey et al. Fingerprint liveness detection from single image using low-level features and shape analysis
Woodard et al. Finger surface as a biometric identifier
Chen et al. Iris recognition based on bidimensional empirical mode decomposition and fractal dimension
Sequeira et al. Iris liveness detection methods in mobile applications
Krishnasamy et al. Wet fingerprint recognition: Challenges and opportunities
Ghiani et al. Experimental results on fingerprint liveness detection
Nikam et al. Local binary pattern and wavelet-based spoof fingerprint detection
Xia et al. Combining Wavelet Transform and LBP Related Features for Fingerprint Liveness Detection.
Marasco et al. An anti-spoofing technique using multiple textural features in fingerprint scanners
Appati et al. Implementation of a Transform‐Minutiae Fusion‐Based Model for Fingerprint Recognition
Aftab et al. Hand-based multibiometric systems: state-of-the-art and future challenges
El-Naggar et al. Which dataset is this iris image from?
Galbally et al. Introduction to presentation attack detection in fingerprint biometrics
Hegde et al. Human authentication using finger knuckle print
Lee et al. Fake finger detection using the fractional Fourier transform
Lu et al. Fingerprint liveness detection based on pore analysis
Abdulla et al. Exploring human biometrics: A focus on security concerns and deep neural networks
Sahmoud Enhancing iris recognition
Choudhary et al. Multi-instance finger vein-based authentication with secured templates
Wang et al. Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks
Hegde et al. Human authentication based on ECG waves using radon transform
Rawat A hierarchical fingerprint matching system
Ahmed et al. Intelligent Technique for Human Authentication using Fusion of Finger and Dorsal Hand Veins