Fig 2 - uploaded by Woong-Sik Kim
Content may be subject to copyright.
Introduction Chart for fingerprint recognition system  

Introduction Chart for fingerprint recognition system  

Source publication
Conference Paper
Full-text available
This thesis is on fingerprint recognition method and system, more in detail, the layered fingerprint recognition method and system to compare not only the minutiae or singular point, but also compare the images of detailed area for making prompt and accurate comparison of fingerprint. Since Edward R. Henry established the modern fingerprint approac...

Contexts in source publication

Context 1
... fingerprint matching process of the fingerprint recognition system under this thesis is shown on Fig.2. ...
Context 2
... shown on Fig. 2 and Fig. 3, the core point is shown the direction to the vertical side on the arc to a direction from the vector circle, and the delta point shows the same direction with the vector circle. The minutiae are found by using the 3x3 matrix through ...

Similar publications

Article
Full-text available
ABSRACT Fingerprint identification and verification are one of the well established methods for implementing security aspects. This technique has become mature due to lots of research in this area. One more feature of artificial intelligence is clubbed with image processing for fingerprint that is artificial neural network. ANN is used at different...
Article
Full-text available
Although fingerprint recognition is a mature technology and nowadays commercial state-of-the-art systems can be successfully used in a number of real applications, not all the problems have been solved and the research is still very active in the field. This paper presents a new approach for estimating the shift and rotation parameters between fing...
Article
Full-text available
One of the important stages of fingerprint recognition is the registration of the fingerprints with respect to the original tem-plate. This is not a straightforward task as fingerprint images may have been subject to rotations and translations. Popular techniques for fingerprint registration use a reference point to achieve alignment. The drawback...
Conference Paper
Full-text available
A new method to generate gummy fingers is presented. A medium-size fake fingerprint database is described and two different fingerprint verification systems are evaluated on it. Three different scenarios are considered in the experiments, namely: enrollment and test with real fingerprints, enrollment and test with fake fingerprints, and enrollment...
Conference Paper
Full-text available
This paper describes a new implementation of a mixture of techniques not used before for fingerprint recognition. The implementation consists of three stages: the location of the core, which is done through Radon transformation; the extraction of features (out of which a square fingerprint is produced with the core, and the center of the mass is ob...

Citations

Article
Full-text available
In the world security market, the size of the biometric industry is gradually increasing, of which the fingerprint verification is recognized of its superiority and marketability in terms of relatively low cost, light weight and uneasiness to input bio-information, compared to other biometric method. Fingerprint Recognition Technologies become popular to be used as a representative of biometrics. As all electronics devices are tending to smaller and smaller, people paid more attention to “linear sensor” method. The most important factor for securing the reliable Fingerprint Recognition Technology is pursuing upgrading the enhancement of the captured fingerprint image from sensors.
Conference Paper
In the world security market, the size of the biometric industry is gradually increasing, of which the fingerprint verification is recognized of its superiority and marketability in terms of relatively low cost, light weight and uneasiness to input bio-information, compared to other biometric methods. This paper proposes a method to utilize the strengths of the fingerprint verification for credit card dealing. The example of the utilization of the credit card payment is the model business of fingerprint verification credit card payment applied for three months in large domestic marts, to discuss the possibility to settle the non-medium credit trading by the biometric technology and the applicability to the financial services
Conference Paper
In the world security market, the size of the biometric industry is gradually increasing, of which the fingerprint verification is recognized of its superiority and marketability in terms of relatively low cost, light weight and easiness to input bio-information, compared to other biometric methods[1,2]. This paper proposes a method to utilize the strengths of the fingerprint verification for credit card dealing. The example of the utilization of the credit card payment is the model business of fingerprint verification credit card payment applied for three months in large domestic marts in Korea, to discuss the possibility to settle the non-medium credit trading by the biometric technology and the applicability to the financial services.
Conference Paper
Full-text available
Fingerprint Recognition Technologies are becoming more popular to be used as a representative of biometrics nowadays. As all electronics devices tends to be smaller and smaller, people pays more attention to “linear sensor” method. The most important factor for securing the reliable Fingerprint Recognition Technology is pursuing the enhancement of the captured fingerprint image from sensors. This paper presents an algorithm that uses Image Estimation and Reconstruction Method in order to embody precisely the image captured from Linear Sensors. The proposed algorithm is verified theoretically and experimentally that the image can be perfectly reconstructed from the fingerprint on the linear sensor even though the finger position is displaced vertically, horizontally, and/or rotationally. Also this system demonstrates much higher recognition and authentication rates than any other existing systems.