Local Correlation-based Fingerprint Matching

Slides:



Advertisements
Similar presentations
1 P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Authors: P. Dewan and P. Dasgupta Source: IEEE Transactions.
Advertisements

Chapter Twelve Incentives and Performance-Based Rewards.
1 Fingerprint verification Speaker: Shu-Fen Chiou ( 邱淑芬 ) Date:2005/06/03.
Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Mentor: Mr. Roland Foster.
第七章 抽樣與抽樣分配 蒐集統計資料最常見的方式是抽查。這 牽涉到兩個問題: 抽出的樣本是否具有代表性?是否能反應出母體的特徵?
2005/5/51 新世紀多媒體通訊技術與應用之研發 Developing Multimedia Communication Techniques and Applications for the New Century 計畫編號: CHU-93-TR-004 執行期間: 93 年 08 月 01 日至.
Title of Presentation Author 1, Author 2, Author 3, Author 4 Abstract Introduction This is my abstract. This is my abstract. This is my abstract. This.
指導教授:應鳴雄 老師 組長: B 鄧光宏 組員: B 莊禮仲 B 陳品諺 B 林于迪 古弗瑞德交友網站系統 中華大學資訊管理學系九十九學年專題報告 1.
1 Advanced Chemical Engineering Thermodynamics Chapter 1 The phase equilibrium problem.
全球化環境下的組織管理 本章內容 全球化的趨勢 國際化的階段 國際企業母公司對分支機構的管理取向 國際企業組織的結構設計 Chapter 6
Digital Humanities, Research Computing Modeling Life Histories and this workshop Peter Bol.
第六單元 廣告創意與表現 廣告創意的來源 產生廣告創意的方法 好廣告的特質 廣告訴求方式 廣告表現方式.
Factor Analysis 理論模式 Z j 是第 j 個標準化分數 F i 是共同因素 U j 是 Z j 的唯一因素 a ij 是因素負荷量.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc.,All Rights Reserved. 肆 資料分析與表達.
具備人臉追蹤與辨識功能的一個 智慧型數位監視系統 系統架構 在巡邏模式中 ,攝影機會左右來回巡視,並 利用動態膚色偵測得知是否有移動膚色物體, 若有移動的膚色物體則進入到追蹤模式,反之 則繼續巡視。
4 CHAPTER 需求與供給. 4 CHAPTER 需求與供給 C H A P T E R C H E C K L I S T 學習本章後,您將能: 區別需求量與需求的差異,瞭解需求的決定因素 1 區別供給量與供給的差異,瞭解供給的決定因素 2 解釋需求與供給如何決定市場價格與數量,以及需求與供.
第1章 歷史、理論與應用方向 pp4-9,28-30,32.
Chapter 20 塑模動態觀點:狀態圖 Statechart Diagram. 學習目標  說明狀態圖的目的  定義狀態圖的基本記號  展示狀態圖的建構  定義活動、內部事件及遞延事件的狀態 圖記號.
Retargetting Motion to New Characters SIGGRAPH ’98 Speaker: Alvin Date: 6 July 2004.
微生物應用工業 緒論 ( 續 ) 阮雪芬 Sep 23, 2002 NTUT
基本法的解釋 基本法第一五八條 解 釋 權 屬 於 全 國 人 民 代 表 大 會 常 務 委 員 會 如 法 院 在 審 理 案 件 時 需 要 對 基本 法 的 條 款 進 行 解 釋 , 而 該 條 款 的 解 釋 又 影 響 到 案 件 的 判 決 , 在 對 該 案 件 作 出 不 可 上.
1 單元四 個人化服務 Web of Science 利用指引. 2 個人化服務 Sign In 登入 My EndNote Web 使用 EndNote Web 者可登入 My Citation Alert 查看或修改先前設定的引用通告 My Saved Searches 查看或更改先前儲存過的檢索.
The application of boundary element evaluation on a silencer in the presence of a linear temperature gradient Boundary Element Method 期末報告 指導老師:陳正宗終身特聘教授.
Notes appear on slides 4, 6, and 12.
奇怪的隱形人 ---- 微中子簡介 An Introduction to Neutrino High School Seminar at NTHU July 9, 2007 張維甫 We-Fu Chang.
Pores and Ridges: High- Resolution Fingerprint Matching Using Level 3 Features Anil K. Jain Yi Chen Meltem Demirkus.
Mid exam answers 1.We assume that a permanent increase in the growth rate of the U.S. money supply is from  to  +  . The Fed unexpectedly announces.
Feature Motion for Monocular Robot Navigation. 單視覺機器人 – 追蹤 (tracking) 最常見的機器人導航技術 特徵點特性(特別 匹配性 抗破壞性) 特徵點取得(區塊 尺度不變)
廣電新聞播報品質電腦化 評估系統之研發 國立政治大學 資訊科學系 指導教授:廖文宏 學生:蘇以暄.
萬獸之王 ─ 獅子 作著:楊紹芃 作著:楊紹芃. 關於獅子 學名 分類特徵 Panthera leo 哺乳綱 毛色變化大,從淡黃褐色、銀灰色、橘色一直到暗棕赭色都有 分布 非洲地區.
Reconstructing Orientation Field From Fingerprint Minutiae to Improve Minutiae-Matching Accuracy 吳思穎.
ArcINFO &Geodatabase 由 ESRI 產生 1970 ArcINFO 一開始被設計在迷你電 腦上, 後來逐漸發展, 在 UNIX 系統上也能 執行, 直到今天, 已經可以在不同的平台上 運作.
 Prentice Hal Chapter 151 新興的領導議題.  Prentice Hal Chapter 152 學習目標 比較交換型與轉換型領導 定義魅力領導者的特質 確認有願景領導者所展現出來的技能 解釋構思如何影響領導 描述追隨者如何依賴領導者.
Allport ( ).
家庭社會工作 陳阿梅.
1 Analysis of SMTP Connection Characteristics for Detecting Spam Relays Authors: P. J. Sandford, J. M. Sandford, and D. J. Parish Speaker: Shu-Fen Chiou(
1 A Collaboration Scheme for Making Peer-to-Peer Anonymous Routing Resilient Authors: X. Wang and J. Luo Source: 12th International Conference on Computer.
RFID ACCESS AUTHORIZATION BY FACE RECOGNITION 報告學生:翁偉傑 1 Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, Baoding,
1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:
1 Consider a system of linear equations.  The variables, or unknowns, are referred to as x 1, x 2, …, x n while the a ij ’s and b j ’s are constants.
ROBUST VIDEO STABILIZATION BASED ON PARTICLE FILTER TRACKING OF PROJECTED CAMERA MOTION IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,
1 Proteomics: APPROACHES AND IMAGE ANALYSIS TOOLS FOR DRUG DISCOVERY Authors: Sophia R. HE, Edmond J. Breen and Sybille M. N. Hunt Source: ICME 2003, pp.
Improvements to the JPEG-LS prediction scheme Authors: S. Bedi, E. A. Edirisinghe, and G. Grecos Source : Image and Vision Computing. Vol. 22, No. 1, 2004,
1 A peer mutual authentication method on super peer based peer-to- peer network Authors: Byeong-Thaek Oh, Sang-Bong Lee, and Ho-Jin Park Source: IEEE International.
Partition and multi-path transmission-An encryption-free reputation sharing protocol in Gnutella-like peer-to-peer network Author: X. X. Ma, and Z. G.
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
1 Efficient User Authentication and Key Management for Peer-to- Peer Live Streaming Systems Authors: X. Liu, Y. Hao, C. Lin, and C. Du Source: Tsinghua.
1 Source: Journal of Chemical Information & Computer Sciences, 2003, vol.43, pp Authors: K. Kaczmarek, B. Walczak, S. de Jong, and B. G. M. Vandeginste.
Web mining:a survey in the fuzzy framework
Unit 17 New words. ability n. --- power and skill, esp. to do, think, act, make, etc. e.g. He has the ability to make a very good house. disability n.
1 Proposal of Service System for Ubiquitous Learning System on Adaptive Instructional System 2009 International Conference on Computational Science and.
Annotation techniques for Query-By-Concept Approach in Image Retrieval System Rakesh Kamatham Venkata.
1 Distinct types of diffuse large B-cell lymphoma identified by gene expression profiling Author: Ash A. Alizadeh, Michael B. Eisen et al. Source: Nature.
1 Biometric template selection and update: a case study in fingerprints Source:Pattern Recognition, Vol. 37, 2004, pp Authors: Umut Uludag, Arun.
Report: LIU TENG YUAN. The iteration Short iteration (two weeks) generalist developers v.s domain experts Fig 1: Day one of the iteration. Looking good.
BlindLocation: Supporting User Location Privacy in Mobile Database Using Blind Signature Source: Journal of Computer Science and Technology, reviewing.
Visual Cryptography for Gray-Level Images by Dithering Techniques
1 Reversible and lossless data hiding in the integer wavelet transform domain (Review) Authors: S. Yousefi, H. R. Rabiee, E. Yousefi, and M. Ghanbari Speaker:
1 SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks Authors: Xiaowei Chen, Kaiyong Zhao, and Xiaowen Chu Source: Autonomic and Trusted.
1 Agent that models, reasons and makes decisions Authors: Miao, C.Y.; Goh, A.; Miao, Y.; Yang, Z.H. Source: Knowledge-Based Systems Volume: 15, Issue:
1 Block Truncation Coding Using Pattern Fitting Source: Pattern Recognition, vol.37, 2004, pp Authors: Bibhas Chandra Dhara, Bhabatosh Chanda.
Medical Card System with Fingerprint Authentication Luvuyo Morris Supervisor: Mr. R. Dodds Co-Supervisor: Mr. M. Ghazi-Asgar Mentor: Mr. Roland Foster.
1 Constructing trusted virtual execution environment in P2P grids Authors: D. Zou, W. Zheng, J. Long, H. Jin, and X. Chen Source: Future Generation Computer.
人力資源報告 Image and Signal Processing 1 Steganography Using Sudoku Revisited Wien Hong, Tung-Shou Chen, Chih-Wei Shiu Department of Information Management,
Evaluation of face recognition techniques using PCA, wavelets and SVM Ergun Gumus, Niyazi Kilic, Ahmet Sertbas, Osman N. Ucan Expert Sysetems with Applications.2010.
ML for FinTech: Some Examples
TITLE Authors Institution RESULTS INTRODUCTION CONCLUSION AIMS METHODS
Color Image Retrieval based on Primitives of Color Moments
Source: Pattern Recognition Letters 29 (2008)
Presentation transcript:

Local Correlation-based Fingerprint Matching Authors: Karthik Nandakumar, Anil K. Jain Source: To Appear in Proceedings of ICVGIP, Kolkata, December 2004 Speaker: Shu-Fen Chiou(邱淑芬)

Outline Introduction Proposed Method Experimental Results Conclusions Comment

指紋 特性: 唯一/萬人不同的關鍵性 特徵本身之永久不變 事後追查的能力 特徵取得之變動性

指紋辨識 Query Minutiae Template Minutiae

Proposed Method Minutiae Extraction Fingerprint Alignment Local Correlation-based Matching

Minutiae Extraction

Minutiae Extraction

Fingerprint Alignment

Fingerprint Alignment

Local Correlation-based Matching

Experimental Results Data : 160 users

Experimental Results

Experimental Results

Conclusions The performance of our algorithm is slightly inferior to that of the 2D dynamic programming based minutiae matcher, mainly due to the inability to handle fingerprint images of very low quality. However, integrating the proposed algorithm with the 2D dynamic programming based matching yields a better matcher.

Comment R tree db Location, relation,… Template image R tree Match Query image