Academia.eduAcademia.edu

FINGERPRINT RECOGNITION SYSTEM

28 papers
190 followers
AI Powered
A fingerprint recognition system is a biometric technology that identifies or verifies individuals by analyzing the unique patterns of ridges and valleys on their fingerprints. It involves capturing fingerprint images, processing them to extract features, and comparing these features against a database to determine identity.
Believing of the importance of biometrics in this research, we have presented a fused system that depends upon multimodal biometric system traits face, iris, and fingerprint, achieving higher performance than the unimodal biometrics. The... more
Biometric recognition systems have advanced significantly in the last decade and their use in specific applications will increase in the near future. The ability to conduct meaningful comparisons and assessments will be crucial to... more
Biometrics is a readily available metric that is playing a vital role in face recognition. There are many domain areas for the features extractionsuch as frequency measures, geometrical measures and statistical measures. In the proposed... more
Cloud computing is a promising new technology that is revolutionizing the old Internet computing paradigm and the entire IT sector. Customers and many firms, such as Apple, Google, Facebook, and Amazon, are increasingly adopting mobile... more
The widespread popularity of the Internet and the fast developments in computer technologies influence the expansion of electronic data exchange and digital communications. Consequently, digital audio communication is used in daily life... more
This paper presents new techniques for designing a simple and reliable multifeatured biometric system based on a single trait source. First, a one-toone relationship between the feature's edge and its associated angle is utilized after... more
Multimedia security has been extensively used in content protection, image authentication, data hiding and signal encryption. Similarly, transmission of biomedical data or information remotely for healthcare applications should be secure.... more
Superresolution (SR) is a method of enhancing image resolution by combining information from multiple images. Two main processes in superresolution are r egist ation and image reconstruction. Both of these processes greatly affect the... more
A survey on minutiae-based palmprint feature representations, and a full analysis of palmprint feature representation role in latent identification performance, Expert Systems With Applications (2019), doi:
Location-Based Services (LBSs) are increasingly popular in today's society. LBSs are used in a broad variety of applications such as social networks with location sharing. LBSs can help people enjoying a convenient life and has attracted... more
Face alignment is a computer vision technology for identifying the geometric structure of human faces in digital images. Given the location and size of a face, it automatically determines the shape of the face components such as eyes and... more
In fingerprint-based systems, the size of databases increases considerably with population growth. In developing countries, because of the difficulty in using a central system when enlisting voters, it often happens that several regional... more
Cancelable biometrics is an important biometric template protection scheme. With no a priori image pre-alignment, alignment-free cancelable fingerprint templates do not suffer from inaccurate singular point detection. In this paper, we... more
Recent findings confirm that biometric templates derived from electroencephalography (EEG) signals contain sensitive information about registered users, such as age, gender, cognitive ability, mental status and health information.... more
Fingerprint authentication techniques have been employed in various Internet of Things (IoT) applications for access control to protect private data, but raw fingerprint template leakage in unprotected IoT applications may render the... more
The main purpose of the classification of fingerprints is to devise a formula by which a given collection of fingerprints can be tracked and registered. To accelerate the system for classifying fingerprints, it is necessary to utilize... more
Pseudo-Random Number Generators (PRNGs) play an important role in many cryptographic applications. Many network security algorithms and protocols that are based on cryptography also require random or pseudorandom numbers at certain... more
In this paper provides the design method of wireless fingerprint attendance system based on ZigBee technology using LAN networking. The system includes terminal fingerprint acquisition module and attendance management module through... more
The fingerprint is the most widely used technology for identification or authentication systems, which can be known as fingerprint authentication systems (FAS). In addition to providing security, the fingerprint is also easy to use, very... more
One possible attack in the biometric system is the template stored in the database. This attack can cause Biometric template information leakage, thus pose a serious privacy security threat. Most available template protection techniques... more
This paper introduced some new techniques to extract the palmprint features based on fractal codes and fractal dimension. Four new techniques based on fractal, namely FDFC (fractal dimension from fractal codes), FDIFC (fractal dimension... more
To overcome the problem related to cloud computing such as high latency and to increase the efficiency of data processing, Fog computing was proposed and implemented close to IoT devices. This structure helps these devices to meet the... more
The fingerprint is the most widely used technology for identification or authentication systems, which can be known as fingerprint authentication systems (FAS).In addition to providing security, the fingerprint is also easy to use, very... more
This paper introduced some new techniques to extract the palmprint features based on fractal codes and fractal dimension. Four new techniques based on fractal, namely FDFC (fractal dimension from fractal codes), FDIFC (fractal dimension... more
Social network Sites (SNS) are the major source for social capital[6], now a day’s dynamic mining [2] is a part of its activity for many organizations. Inter estingly on the other end we can see that most of t he users are having more... more
Automatic Fingerprint authentication for personal identification and verification has received considerable attention over the past decades among various biometric techniques because of the distinctiveness and persistence properties of... more
Fingerprint registration and verification is an active area of research in the field of image processing. Usually, fingerprints are obtained from sensors; however, there is recent interest in using images of fingers obtained from digital... more
Biometric advancements have the potential to provide more robust security and authentication approaches compared to conventional password-based security measures. When compared to knowledge-based security, biometrics relies on what makes... more
Privacy-enhancing technologies are technologies that implement fundamental data protection principles. With respect to biometric recognition, different types of privacy-enhancing technologies have been introduced for protecting stored... more
Believing of the importance of biometrics in this research, we have presented a fused system that depends upon multimodal biometric system traits face, iris, and fingerprint, achieving higher performance than the unimodal biometrics. The... more
Cancelable and hybrid biometric cryptosystems are two techniques used to offer protection against the security and privacy challenges faced by users of biometric authentication systems. The main objective of this paper is to present a... more
Today, biometrics is a research field in full expansion, several identification and verification systems are now being developed, however their performance is inadequate to meet the growing needs of security. The use of a single biometric... more
Background/Objective: A computer based biological recognition system implementation for gender identification by using digitally acquired fingerprint through an optical fingerprint sensor. Methods/Statistical Analysis: Gender... more
Most of system uses Biometric to identify persons .So one can use any feature such as it may be face, fingerprint ,hand retina etc. In this paper we focus on fingerprint recognition. Input image is scanned and then pre-process to extract... more
For most of us now, life is incomplete if living without mobile phones. This is because mobile phones are like a necessity to many people nowadays. Statistics have shown that more than seven billion people in the world are having these... more
with identity fraud in our society reaching unprecedented proportions and with an increasing emphasis on the emerging automatic personal identification applications, biometrics-based verification, especially fingerprint-based... more
Believing of the importance of biometrics in this research, we have presented a fused system that depends upon multimodal biometric system traits face, iris, and fingerprint, achieving higher performance than the unimodal biometrics. The... more
Pseudo-Random Number Generators (PRNGs) play an important role in many cryptographic applications. Many network security algorithms and protocols that are based on cryptography also require random or pseudorandom numbers at certain... more
Internet is the base of web based communication. The electronic transfer is only possible when both the parties recognize each other. In other words, only authorize parties can make electronic (money) transfer over the Internet; the... more
Cloud computing has developed from various technologies such as autonomic computing, virtualization, grid computing, and other technologies, and the secure storage is essential and important for it due to it provides virtualized resources... more
Pseudo-Random Number Generators (PRNGs) play an important role in many cryptographic applications. Many network security algorithms and protocols that are based on cryptography also require random or pseudorandom numbers at certain... more
Fingerprint evidence is undoubtedly the most reliable and acceptable evidence till date in the court of law. Fingerprints are obtained at the site of crime and in many old monuments and in excavated things. Estimating the gender of... more
Wireless techniques utilized in industrial applications face significant challenges in preventing noise, collision, and data fusion, particularly when wireless sensors are used to identify and classify fault in real time for protection.... more
Today, biometrics are the preferred technologies for person identification, authentication, and verification cutting across different applications and industries. Sadly, this ubiquity has invigorated criminal efforts aimed at violating... more
Author(s) and ACAA permit unrestricted use, distribution, and reproduction in any medium, provided the original work with proper citation. This work is licensed under Creative Commons Attribution International License (CC BY 4.0).
The fingerprint is the most widely used technology for identification or authentication systems, which can be known as fingerprint authentication systems (FAS).In addition to providing security, the fingerprint is also easy to use, very... more
The field of biometrics has evolved tremendously for over the last century. Yet scientists are still continuing to come up with precise and efficient algorithms to facilitate automatic fingerprint recognition systems. Like other... more
In today's complex world, due to the increasing use of web-based programs, smart phones and social networks, production rate is increasing constantly as well as volume of data. Also, companies try to provide their services with more... more