A Review on Minutiae Extraction of Fingerprint
This paper discuss methods to identify minutiae or ridges consist of deciding whether the pixel evaluated belongs to same person or otherwise. A lot of researchers proposed an algorithm or a technique for the minutiae extraction. Normally, the minutiae such as ridge ending and bifurcation detectio...
| Main Authors: | Rozita, Mohd Yusof, Norrozila, Sulaiman |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SPROC LTD
2013
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/6217/ http://umpir.ump.edu.my/id/eprint/6217/1/A_review_on_minutiae_extraction_of_fingerprint.pdf |
Similar Items
Fingerprint extraction base on minutiae
by: Nur Amirah, Anuar
Published: (2010)
by: Nur Amirah, Anuar
Published: (2010)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Minutiae point exraction for skeleton-based fingerprint image
by: Azril Nizam, Muhamad
Published: (2008)
by: Azril Nizam, Muhamad
Published: (2008)
Privacy Preserving Minutia-Based Fingerprint Template Protection Techiniques
by: Jin, Zhe
Published: (2015)
by: Jin, Zhe
Published: (2015)
Fingerprint based automatic teller machine
by: Steven, Arokiasamy
Published: (2018)
by: Steven, Arokiasamy
Published: (2018)
Event student attendance system via fingerprint
by: Ng, Ching Hong
Published: (2014)
by: Ng, Ching Hong
Published: (2014)
Reversible watermarking technique for fingerprint authentication based on DCT
by: Mohamed, Lebcir, et al.
Published: (2020)
by: Mohamed, Lebcir, et al.
Published: (2020)
Fingerprint image watermarking in spatial, frequency and multiresolution domain: techniques and challenges
by: Lebcir, Mohamed, et al.
Published: (2018)
by: Lebcir, Mohamed, et al.
Published: (2018)
A survey of multi-biometrics and fusion levels
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new biometric template protection based on secure data hiding approach
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Fingerprint watermarking with tamper localization and exact recovery using multi-level authentication
by: Wei, Keat Lee, et al.
Published: (2018)
by: Wei, Keat Lee, et al.
Published: (2018)
Fingerprint image segmentation using hierarchical technique
by: Wan Abu Bakar, Wan Aezwani, et al.
Published: (2000)
by: Wan Abu Bakar, Wan Aezwani, et al.
Published: (2000)
Fingerprint Recognition Student Attendance Management System
by: Liew, Ken Nam
Published: (2015)
by: Liew, Ken Nam
Published: (2015)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
by: Sulong, Siti Masrina
Published: (2002)
by: Sulong, Siti Masrina
Published: (2002)
Robust blind watermarking approach against the compression for fingerprint image using 2D-DCT
by: Lebcir, Mohamed, et al.
Published: (2022)
by: Lebcir, Mohamed, et al.
Published: (2022)
A review on type of attacks on fingerprint image and watermarking techniques
by: Lebcir, Mohamed, et al.
Published: (2019)
by: Lebcir, Mohamed, et al.
Published: (2019)
Assessing Usability Elements For A Website of Higher Education Website
by: Nur Sukinah, Aziz, et al.
Published: (2013)
by: Nur Sukinah, Aziz, et al.
Published: (2013)
A novel normal parameter reduction algorithm of soft sets
by: Ma, Xiuqin, et al.
Published: (2010)
by: Ma, Xiuqin, et al.
Published: (2010)
A novel Intrusion Detection System by using intelligent data mining in WEKA environment
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
A novel local network intrusion detection system based on support vector machine
by: Mohammed, Muamer N., et al.
Published: (2011)
by: Mohammed, Muamer N., et al.
Published: (2011)
GPS, fingerprint and QR-code based attendance system
by: Lim, Guo Hong
Published: (2019)
by: Lim, Guo Hong
Published: (2019)
Fingerprint Authentication System using a low-priced Webcam
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Network Security Encryption Techniques for Reliablility Data Transmission on Password System
by: Norrozila, Sulaiman, et al.
Published: (2013)
by: Norrozila, Sulaiman, et al.
Published: (2013)
Anti-forensic steganography method based on randomization
by: Khalaf, Emad Taha, et al.
Published: (2013)
by: Khalaf, Emad Taha, et al.
Published: (2013)
Effect of Different Error Correction Algorithms on Video Quality over Heterogeneous Networks
by: Osamah, I. Khalaf, et al.
Published: (2015)
by: Osamah, I. Khalaf, et al.
Published: (2015)
Iris template protection based on enhanced hill cipher
by: Khalaf, Emad Taha, et al.
Published: (2016)
by: Khalaf, Emad Taha, et al.
Published: (2016)
Technology Review: Image Enhancement, Feature Extraction and Template Protection of a Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2010)
by: Islam, Md. Rajibul, et al.
Published: (2010)
XRecursive: An efficient method to store and query XML documents
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
Efficient Mapping XML DTD to Relational Database
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
Reduction the Effect of Mobility in Link Transmitting Using Efficient DSR Route Cache for MANETs
by: Ayoob, Ayoob A., et al.
Published: (2014)
by: Ayoob, Ayoob A., et al.
Published: (2014)
Efficient Algorithms to Index, Store and Query XML Documents
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
Image enhancement and segmentation on simultaneous latent fingerprint detection
by: Rozita, Mohd Yusof
Published: (2015)
by: Rozita, Mohd Yusof
Published: (2015)
A new enhancement of fingerprint classification for the damaged fingerprint with adaptive features
by: Josphineleela, R., et al.
Published: (2009)
by: Josphineleela, R., et al.
Published: (2009)
Fingerprint synthesis toward construct enhanced Authentication System using low resolution Webcam
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Effect of Using Different QoS Parameters in Performance of AODV, DSR, DSDV AND OLSR Routing Protocols In MANET
by: Norrozila, Sulaiman, et al.
Published: (2014)
by: Norrozila, Sulaiman, et al.
Published: (2014)
Precise Fingerprint Enrolment through Projection Incorporated Subspace Based on Principal Component Analysis (PCA)
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Feature extraction approaches from natural language requirements for reuse in software product lines: a systematic literature review
by: Bakar, Noor Hasrina, et al.
Published: (2015)
by: Bakar, Noor Hasrina, et al.
Published: (2015)
Assessing web site usability measurement
by: Nur Sukinah, Aziz, et al.
Published: (2013)
by: Nur Sukinah, Aziz, et al.
Published: (2013)
Similar Items
-
Fingerprint extraction base on minutiae
by: Nur Amirah, Anuar
Published: (2010) -
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012) -
Minutiae point exraction for skeleton-based fingerprint image
by: Azril Nizam, Muhamad
Published: (2008) -
Privacy Preserving Minutia-Based Fingerprint Template Protection Techiniques
by: Jin, Zhe
Published: (2015) -
Fingerprint based automatic teller machine
by: Steven, Arokiasamy
Published: (2018)