Jin et al., 2007 - Google Patents
Liveness detection of fingerprint based on band-selective Fourier spectrumJin et al., 2007
View PDF- Document ID
- 8685065553122183895
- Author
- Jin C
- Kim H
- Elliott S
- Publication year
- Publication venue
- International Conference on Information Security and Cryptology
External Links
Snippet
This paper proposes a novel method for fingerprint liveness detection based on band- selective Fourier spectrum. The 2D spectrum of a fingerprint image reflects the distribution and strength in spatial frequencies of ridge lines. The ridge-valley texture of the fingerprint …
- 238000001514 detection method 0 title abstract description 24
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/0008—Extracting features related to ridge properties; determining the fingerprint type, e.g. whorl, loop
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Jin et al. | Liveness detection of fingerprint based on band-selective Fourier spectrum | |
| Yuan et al. | Fingerprint liveness detection based on multi-scale LPQ and PCA | |
| Dubey et al. | Fingerprint liveness detection from single image using low-level features and shape analysis | |
| Woodard et al. | Finger surface as a biometric identifier | |
| Sequeira et al. | Iris liveness detection methods in mobile applications | |
| Krishnasamy et al. | Wet fingerprint recognition: Challenges and opportunities | |
| Ghiani et al. | Experimental results on fingerprint liveness detection | |
| Nikam et al. | Local binary pattern and wavelet-based spoof fingerprint detection | |
| Xia et al. | Combining Wavelet Transform and LBP Related Features for Fingerprint Liveness Detection. | |
| Marasco et al. | An anti-spoofing technique using multiple textural features in fingerprint scanners | |
| Appati et al. | Implementation of a Transform‐Minutiae Fusion‐Based Model for Fingerprint Recognition | |
| Aftab et al. | Hand-based multibiometric systems: state-of-the-art and future challenges | |
| El-Naggar et al. | Which dataset is this iris image from? | |
| Galbally et al. | Introduction to presentation attack detection in fingerprint biometrics | |
| Hegde et al. | Human authentication using finger knuckle print | |
| Lee et al. | Fake finger detection using the fractional Fourier transform | |
| Lu et al. | Fingerprint liveness detection based on pore analysis | |
| Abdulla et al. | Exploring human biometrics: A focus on security concerns and deep neural networks | |
| Sahmoud | Enhancing iris recognition | |
| Choudhary et al. | Multi-instance finger vein-based authentication with secured templates | |
| Wang et al. | Two-Factor Authentication Approach Based on Behavior Patterns for Defeating Puppet Attacks | |
| Hegde et al. | Human authentication based on ECG waves using radon transform | |
| Rawat | A hierarchical fingerprint matching system | |
| Ahmed et al. | Intelligent Technique for Human Authentication using Fusion of Finger and Dorsal Hand Veins | |
| Bakshe et al. | Hand geometry techniques: a review |