New Approaches to Fingerprint Authentication Using Software Methods Based on Fingerprint Texture

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 433

This Paper With 5 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

KBEI02_223

تاریخ نمایه سازی: 5 بهمن 1395

Abstract:

Fingerprint recognition systems are used in many government and military application programs. Fake fingerprints are considered a major threat to such systems. A method of coping with the invasion of fingerprint forging is to detect whether the fingerprint texture is alive or not. Among various such methods, Local Binary Patterns (LBP) operator is considered one of the best. However, the original LBP was spatially-limited and noise-sensitive, and the binary pattern was also long. Therefore, this paper introduces Multi-Scale Center-Symmetric Local Binary Patterns (MS-CS-LBP) operator as a new anti-spoofing method which is a combination of Center-Symmetric Local Binary Patterns (CS-LBP) and Multi-Scale Local Binary Patterns (MSLBP) operators. The proposed method overcame all three limitations of the original LBP. A second method was also proposed in a way that MS-LBP and CS-LBP operators were separately applied to the image. The features resulting from both operators were then combined with each other. The results of the proposed methods were compared to those of previous approaches. The proposed methods were tested on the available fingerprints in ATVS database. The results indicated that the proposed methods improved in terms of time and accuracy in comparison with previous approaches.

Authors

Samira Mohammadi

Faculty Computer And Electronic ,IT Islamic Azad Zanjan Uneversity,Iaznu Zanjan, Iran

Mahdi Hariri

Faculty Computer And Electronic ,IT Islamic Azad Zanjan Uneversity,Iaznu Zanjan, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • s.Nikam, , S.Agarwal, Local binary pattern and wavelet-based spoof ...
  • _ _ _ Shafiul Azam, Face Recognition using Local Binary ...
  • _ _ _ Informatics and Computer Science Intelligent Systems Applications, ...
  • t.Ojala , m. Pietikainen, d.Harwood, 1994, a comparative study of ...
  • M.Heikkil'a, M. Pietik"ainen, C.Schmid, "Description of interest regions with c ...
  • M.Heikkil"a , M.PietikFainen, C. Schmid, "Description of interest regions with ...
  • A.Wehde , J. N. Beffel, Finger-prints can be forged. Tremonia ...
  • Copyright Notice is: 978-1 -4673-6506-2/ 5/831 _ 00 G2015 IEEE ...
  • نمایش کامل مراجع