1 Fingerprint verification Speaker: Shu-Fen Chiou ( 邱淑芬 ) Date:2005/06/03.

Slides:



Advertisements
Similar presentations
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
Advertisements

Detecting Faces in Images: A Survey
SPSC – Advandced Signal Processing (SE) Professor Horst Cerjak, Amir Rahimzadeh Fingerprint Features.
Fingerprint Verification Bhushan D Patil PhD Research Scholar Department of Electrical Engineering Indian Institute of Technology, Bombay Powai, Mumbai.
Face Image Recognition Face recognition technology works well with most of the shelf PC cameras, generally requiring 320*240 resolution at 3~5 frames per.
Presenter: Hoang, Van Dung
Pedestrian Detection: introduction
Automatic 3D Face Recognition System 邱彥霖 龔士傑 Biometric Authentication.
Instructor: Mircea Nicolescu Lecture 15 CS 485 / 685 Computer Vision.
Fingerprint Synthesis An Hong Tran. Outline Introduction Haar Wavelet Transform Fingerprint Synthesis Application Results Conclusion.
2005/6/16 by pj 1 Hiding Biometric Data Hiding Biometric Data IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 11, NOVEMBER.
66: Priyanka J. Sawant 67: Ayesha A. Upadhyay 75: Sumeet Sukthankar.
Suggested Term Projects CSE 666, Fall Guidelines The described projects are suggestions; if you have desire, skills or idea to explore alternative.
Sreya Chakraborty Under the guidance of Dr. K. R. Rao Multimedia Processing Lab (MPL) University of Texas at Arlington.
Computer and Robot Vision I
Fingerprint Recognition Professor Ostrovsky Andrew Ackerman.
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Object Detection and Tracking Mike Knowles 11 th January 2005
Algebraic Functions of Views for 3D Object Recognition CS773C Advanced Machine Intelligence Applications Spring 2008: Object Recognition.
Scale Invariant Feature Transform (SIFT)
Reconstructing Orientation Field From Fingerprint Minutiae to Improve Minutiae-Matching Accuracy 吳思穎.
Computer Vision UNR Dr. George Bebis
Introduction to Biometric Systems
1 A Collaboration Scheme for Making Peer-to-Peer Anonymous Routing Resilient Authors: X. Wang and J. Luo Source: 12th International Conference on Computer.
Learning Visual Similarity Measures for Comparing Never Seen Objects By: Eric Nowark, Frederic Juric Presented by: Khoa Tran.
New Segmentation Methods Advisor : 丁建均 Jian-Jiun Ding Presenter : 蔡佳豪 Chia-Hao Tsai Date: Digital Image and Signal Processing Lab Graduate Institute.
Eigenedginess vs. Eigenhill, Eigenface and Eigenedge by S. Ramesh, S. Palanivel, Sukhendu Das and B. Yegnanarayana Department of Computer Science and Engineering.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
Modern Floor-planning Based on B ∗ -Tree and Fast Simulated Annealing Paper by Chen T. C. and Cheng Y. W (2006) Presented by Gal Itzhak
1 Proteomics: APPROACHES AND IMAGE ANALYSIS TOOLS FOR DRUG DISCOVERY Authors: Sophia R. HE, Edmond J. Breen and Sybille M. N. Hunt Source: ICME 2003, pp.
Study Of Iris Recognition Schemes By:Ritika Jain Under guidance of DR K R RAO UNIVERSITY OF TEXAS AT ARLINGTON SPRING 2012.
Master Thesis Presentation, 14Dec07 Pair Wise Distance Histogram Based Fingerprint Minutiae Matching Algorithm Developed By: Neeraj Sharma M.S. student,
1 A peer mutual authentication method on super peer based peer-to- peer network Authors: Byeong-Thaek Oh, Sang-Bong Lee, and Ho-Jin Park Source: IEEE International.
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
1 Source: Journal of Chemical Information & Computer Sciences, 2003, vol.43, pp Authors: K. Kaczmarek, B. Walczak, S. de Jong, and B. G. M. Vandeginste.
Thinning & Distance Field Advisor : Ku-Yaw Chang Speaker : Jhen-Yu Yang.
Vision and SLAM Ingeniería de Sistemas Integrados Departamento de Tecnología Electrónica Universidad de Málaga (Spain) Acción Integrada –’Visual-based.
Deconstruction: Discriminative learning of local image descriptors Samantha Horvath Learning Based Methods in Vision 2/14/2012.
1 Biometric template selection and update: a case study in fingerprints Source:Pattern Recognition, Vol. 37, 2004, pp Authors: Umut Uludag, Arun.
Automated Fingertip Detection
Local Correlation-based Fingerprint Matching
Image Segmentation Superpixel methods Speaker: Hsuan-Yi Ko.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Visual Cryptography for Gray-Level Images by Dithering Techniques
1 Reversible and lossless data hiding in the integer wavelet transform domain (Review) Authors: S. Yousefi, H. R. Rabiee, E. Yousefi, and M. Ghanbari Speaker:
1 SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks Authors: Xiaowei Chen, Kaiyong Zhao, and Xiaowen Chu Source: Autonomic and Trusted.
1 Block Truncation Coding Using Pattern Fitting Source: Pattern Recognition, vol.37, 2004, pp Authors: Bibhas Chandra Dhara, Bhabatosh Chanda.
2D to 3D Conversion Using 3D Database For Football Scenes Kiana Calagari Final Project of CMPT880 July 2013.
1 Constructing trusted virtual execution environment in P2P grids Authors: D. Zou, W. Zheng, J. Long, H. Jin, and X. Chen Source: Future Generation Computer.
Finding Clusters within a Class to Improve Classification Accuracy Literature Survey Yong Jae Lee 3/6/08.
Recognizing specific objects Matching with SIFT Original suggestion Lowe, 1999,2004.
A. M. R. R. Bandara & L. Ranathunga
Author : Sang Hwa Lee, Junyeong Choi, and Jong-Il Park
(k, n)-Image Reversible Data Hiding
Enhancing Latent Fingerprints
Classification and numbering of teeth in dental bitewing images
ATM using fingerprint
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Coarse Classification
Outline S. C. Zhu, X. Liu, and Y. Wu, “Exploring Texture Ensembles by Efficient Markov Chain Monte Carlo”, IEEE Transactions On Pattern Analysis And Machine.
Research Institute for Future Media Computing
Reversible Data Hiding in JPEG Images
Digital Watermarking for Image Authentication with Localization
Small-Area Fingerprint Verification
Using Association Rules as Texture features
Hidden Digital Watermarks in Images
Privacy Protection for E-Health Systems by
Presentation transcript:

1 Fingerprint verification Speaker: Shu-Fen Chiou ( 邱淑芬 ) Date:2005/06/03

2 Fast Fingerprint Verification Using Subregions of Fingerprint Images IEEE transactions on circuits and systems for video technology, vol. 14, no.1, 2004, pp K.C. Chan, Y.S. Moon, and P.S. Cheng

3 Acceleration problem from a different perspective—using a smaller fingerprint images region to extract the minutiae.

4

5

6

7 Fingerprint minutiae matching using the adjacent feature vector Pattern Recognition Letters, vol.26, 2005, pp Xifeng Tong, Janhua Huang, Xianglong Tang, and Daming Shi

8 Adjacent features of a minutia is very important for matching.

9

10

11

12 Fingerprint Matching Using an Orientation-Based Minutia Descriptor IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 25, NO. 8, AUGUST 2003 Marius Tico, Member, IEEE, and Pauli Kuosmanen, Member, IEEE

13 A novel fingerprint representation scheme that relies on describing the orientation field of the fingerprint pattern with respect to each minutia detail.

14

15

16 Biohashing: two factor authentication featuring fingerprint data and tokenised random number Pattern Recognition, vol. 37, 2004, pp.2245 – 2255 Andrew Teoh Beng Jina, David Ngo Chek Linga and Alwyn Gohb

17 The discretisation is carried out by iterated inner product between the pseudo-random number and the wavelet Fourier–Mellin transform (FMT)( 傅利葉 - 梅林變換式 ) fingerprint feature.

18

19

20