Postprocessing algorithm for security features extraction

One of the issues of fingerprint recognition is finding minutiae or ridges, which involves deciding whether the pixel evaluated is a valid minutiae (ridge ending or ridge bifurcation) or not. Usually, the minutiae are detected in the thinned image which contains a large number of false minutiae and...

Full description

Bibliographic Details
Main Authors: Rozita, Mohd Yusof, Norrozila, Sulaiman
Format: Conference or Workshop Item
Language:English
Published: IEEE 2012
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/26996/
http://umpir.ump.edu.my/id/eprint/26996/1/Postprocessing%20algorithm%20for%20security%20features%20extraction.pdf
_version_ 1848822677866807296
author Rozita, Mohd Yusof
Norrozila, Sulaiman
author_facet Rozita, Mohd Yusof
Norrozila, Sulaiman
author_sort Rozita, Mohd Yusof
building UMP Institutional Repository
collection Online Access
description One of the issues of fingerprint recognition is finding minutiae or ridges, which involves deciding whether the pixel evaluated is a valid minutiae (ridge ending or ridge bifurcation) or not. Usually, the minutiae are detected in the thinned image which contains a large number of false minutiae and noises. Its may highly decrease the matching performance of the system. This paper proposes an algorithm which is used to eliminate spurious minutiae and non-component of fingerprint features.
first_indexed 2025-11-15T02:45:03Z
format Conference or Workshop Item
id ump-26996
institution Universiti Malaysia Pahang
institution_category Local University
language English
last_indexed 2025-11-15T02:45:03Z
publishDate 2012
publisher IEEE
recordtype eprints
repository_type Digital Repository
spelling ump-269962020-03-22T23:32:12Z http://umpir.ump.edu.my/id/eprint/26996/ Postprocessing algorithm for security features extraction Rozita, Mohd Yusof Norrozila, Sulaiman QA76 Computer software One of the issues of fingerprint recognition is finding minutiae or ridges, which involves deciding whether the pixel evaluated is a valid minutiae (ridge ending or ridge bifurcation) or not. Usually, the minutiae are detected in the thinned image which contains a large number of false minutiae and noises. Its may highly decrease the matching performance of the system. This paper proposes an algorithm which is used to eliminate spurious minutiae and non-component of fingerprint features. IEEE 2012 Conference or Workshop Item PeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/26996/1/Postprocessing%20algorithm%20for%20security%20features%20extraction.pdf Rozita, Mohd Yusof and Norrozila, Sulaiman (2012) Postprocessing algorithm for security features extraction. In: IEEE International Conference on E-Learning and E-Technologies in Education (ICEEE 2012) , 24-26 September 2012 , Lodz, Poland. pp. 219-222.. ISBN 978-1-4673-1678-1 (Published) https://doi.org/10.1109/ICeLeTE.2012.6333392
spellingShingle QA76 Computer software
Rozita, Mohd Yusof
Norrozila, Sulaiman
Postprocessing algorithm for security features extraction
title Postprocessing algorithm for security features extraction
title_full Postprocessing algorithm for security features extraction
title_fullStr Postprocessing algorithm for security features extraction
title_full_unstemmed Postprocessing algorithm for security features extraction
title_short Postprocessing algorithm for security features extraction
title_sort postprocessing algorithm for security features extraction
topic QA76 Computer software
url http://umpir.ump.edu.my/id/eprint/26996/
http://umpir.ump.edu.my/id/eprint/26996/
http://umpir.ump.edu.my/id/eprint/26996/1/Postprocessing%20algorithm%20for%20security%20features%20extraction.pdf