: In this fingerprint verification approach, a fingerprint image is divided into equally sized cells and the pattern is represented by a substitute resulting in a feature vector of...
This paper exploits independent component analysis (ICA) to obtain transform-based compression schemes adapted to specific image classes. This adaptation results from the data-dep...
—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users’ biometric templates s...
Many different types of silicon fingerprint sweep sensors presently enter the biometrics market. Since they provide small stripe image sequences instead of full fingerprint images...
Peter Morguet, Christian Narr, Henning Lorch, Fran...
This paper describes a new, powerful technique of fingerprint verification based on a perturbation method. The proposed method consists of four parts. The first part performs loca...