Description: A novel texture-based Automatic Fingerprint Authentication System (AFAS) is proposed. A fingerprint image is preprocessed to enhance the image by Short Time Fourier Transform (STFT) analysis. Then, three sets of invariant moment features, as a kind of texture features, are extracted from three different sizes of Region of Interest (ROI) areas based on the reference point from the enhanced fingerprint image. Each set of invariant moments contain seven invariant moments. Fingerprint verification is realized by Euclidean distance between the two corresponding features of the test fingerprint image and template fingerprint image in the database. Platform: |
Size: 422308 |
Author:ruan |
Hits:
Description: 用VISUAL C++编程实现指纹图像的特征提取以及对指纹图像的识别。-A program of extracting and identifying features of fingerprint images. Platform: |
Size: 46072 |
Author:李权波 |
Hits:
Description: 用VISUAL C++编程实现指纹图像的特征提取以及对指纹图像的识别。-A program of extracting and identifying features of fingerprint images. Platform: |
Size: 46080 |
Author:李权波 |
Hits:
Description: A novel texture-based Automatic Fingerprint Authentication System (AFAS) is proposed. A fingerprint image is preprocessed to enhance the image by Short Time Fourier Transform (STFT) analysis. Then, three sets of invariant moment features, as a kind of texture features, are extracted from three different sizes of Region of Interest (ROI) areas based on the reference point from the enhanced fingerprint image. Each set of invariant moments contain seven invariant moments. Fingerprint verification is realized by Euclidean distance between the two corresponding features of the test fingerprint image and template fingerprint image in the database. -A novel texture-based Automatic Fingerprint Authentication System (AFAS) is proposed. A fingerprint image is preprocessed to enhance the image by Short Time Fourier Transform (STFT) analysis. Then, three sets of invariant moment features, as a kind of texture features, are extracted from three different sizes of Region of Interest (ROI) areas based on the reference point from the enhanced fingerprint image. Each set of invariant moments contain seven invariant moments. Fingerprint verification is realized by Euclidean distance between the two corresponding features of the test fingerprint image and template fingerprint image in the database. Platform: |
Size: 421888 |
Author:ruan |
Hits:
Description: Fingerprint Verification System an easy to use library that allows programmers to integrate fingerprint technology into their software without specific know-how. Fast, easy to use, and small great for embedded systems.-Fingerprint Verification System an easy to use library that allows programmers to integrate fingerprint technology into their software without specific know-how. Fast, easy to use, and small great for embedded systems. Platform: |
Size: 913408 |
Author:sali |
Hits:
Description: 自动指纹识别系统的工作模式可以分为两类:验证模式和辨识模式。验证就是通过把一个现场采集到的指纹与一个以登记的指纹进行一对一得比对,来确认身份的过程。作为验证的前提条件,验证者的指纹必须在指纹库中已经注册。-Automated Fingerprint Identification System can be divided into two categories: model verification and identification modes. Authentication is through a collection of fingerprints at the scene with a registered fingerprint to one-on-one than the right, to confirm the identity of the process. As a prerequisite for verification, the fingerprint authentication must be registered in the fingerprint database. Platform: |
Size: 2048 |
Author:高 |
Hits:
Description: A novel texture-based Automatic Fingerprint Authentication System (AFAS) is proposed. A fingerprint image is preprocessed to enhance the image by Short Time Fourier Transform (STFT) analysis. Then, three sets of invariant moment features, as a kind of texture features, are extracted from three different sizes of Region of Interest (ROI) areas based on the reference point from the enhanced fingerprint image. Each set of invariant moments contain seven invariant moments. Fingerprint verification is realized by Euclidean distance between the two corresponding features of the test fingerprint image and template fingerprint image in the database Platform: |
Size: 276480 |
Author:joyce |
Hits:
Description: 基于三角形比对的指纹识别系统,此方法比传统使用的特征点比对具有更高的鲁棒性-A fingerprint verification system based on triangular matching and dynamic time warping Platform: |
Size: 1591296 |
Author:卢强 |
Hits:
Description: ONLINE FINGERPRINT VERIFICATION SYSTEM
Existing security measures rely on knowledge-based approaches like passwords or token-
based approaches such as swipe cards and passports to control access to physical and virtual
spaces. Though ubiquitous, such methods are not very secure. Tokens such as badges
and access cards may be shared or stolen. Furthermore, they cannot differentiate between
authorized user and a person having access to the tokens or passwords.-ONLINE FINGERPRINT VERIFICATION SYSTEM
Existing security measures rely on knowledge-based approaches like passwords or token-
based approaches such as swipe cards and passports to control access to physical and virtual
spaces. Though ubiquitous, such methods are not very secure. Tokens such as badges
and access cards may be shared or stolen. Furthermore, they cannot differentiate between
authorized user and a person having access to the tokens or passwords. Platform: |
Size: 3763200 |
Author:Deepak |
Hits:
Description: 人脸识别是近年来模式识别、图像处理、机器视
觉、神经网络以及认知科学等领域研究的热点课题之
一。作为生物特征识别的一个重要方面, 人脸识别在
档案管理系统、安全验证系统、信用卡验证、公安系统
的罪犯身份识别、银行和海关的监控、人机交互等领域
具有广阔的应用前景。与指纹识别、视网膜识别、虹膜
识别等技术相比, 人脸识别技术在数据采集方面手续
比较简单, 使用者更容易接受。-Face recognition in recent years, pattern recognition, image processing, machine vision, neural networks, and research in the field of cognitive science, one of the hot topics. As a biological feature recognition is an important aspect, face recognition in the file management systems, security verification systems, credit card verification, security system, criminal identification, banking and customs controls, the areas of human-computer interaction has broad application prospects. And fingerprint recognition, retina identification, iris recognition technology, compared with face recognition technology in the data collection procedure is relatively simple, the user is more receptive. Platform: |
Size: 533504 |
Author:天使 |
Hits:
Description: 基于指纹采集仪的指纹登陆系统,具有通过指纹注册的功能,能够验证指纹、识别用户名、非法注册名验证、重复注册验证等功能-Fingerprints based on fingerprint acquisition instrument landing system, with functions through the fingerprint registration, to verify the fingerprint, identifying the user name, illegal registration name verification, validation and other functions duplicate registration Platform: |
Size: 174080 |
Author:雷子 |
Hits:
Description: 这是一个完整的非细节点匹配的指纹识别系统,是一种非常经典的方法,很实用-This is a complete non-minutiae fingerprint verification system and it is classical and helpful for you Platform: |
Size: 1202176 |
Author:马浚 |
Hits:
Description: 门禁系统,管理员有随意开门的权限,员工要通过门卡或指纹的验证才能进门,外来人员要经过管理员的同意,由管理员开门
系统有日志记录,记录在electronDoor.log文件中-Access control system, administrators are free to open the door of the authority, staff card or through fingerprint verification door to door, the visitor to go through the consent of the administrator, open the door by an administrator logging system to record documents in electronDoor.log Platform: |
Size: 353280 |
Author:李平乐 |
Hits:
Description: The use of fingerprints for identification has been
employed in law enforcement for about a century. A much
broader application of fingerprints is for personal
authentication, for instance to access a computer, a network, a
bank-machine, a car, or a home. The topic of this chapter is
fingerprint verification, where "verification" implies a user
matching a fingerprint against a single fingerprint associated
with the identity that the user claims. The following topics are
covered: history, image processing methods, enrollment and
verification procedures, system security considerations,
recognition rate statistics, fingerprint capture devices,
combination with other biometrics, and the future of fingerprint
verification. Platform: |
Size: 323584 |
Author:swetha |
Hits:
Description: The use of fingerprints for identification has been
employed in law enforcement for about a century. A much
broader application of fingerprints is for personal
authentication, for instance to access a computer, a network, a
bank-machine, a car, or a home. The topic of this chapter is
fingerprint verification, where "verification" implies a user
matching a fingerprint against a single fingerprint associated
with the identity that the user claims. The following topics are
covered: history, image processing methods, enrollment and
verification procedures, system security considerations,
recognition rate statistics, fingerprint capture devices,
combination with other biometrics, and the future of fingerprint
verification. Platform: |
Size: 148480 |
Author:swetha |
Hits:
Description: The use of fingerprints for identification has been
employed in law enforcement for about a century. A much
broader application of fingerprints is for personal
authentication, for instance to access a computer, a network, a
bank-machine, a car, or a home. The topic of this chapter is
fingerprint verification, where "verification" implies a user
matching a fingerprint against a single fingerprint associated
with the identity that the user claims. The following topics are
covered: history, image processing methods, enrollment and
verification procedures, system security considerations,
recognition rate statistics, fingerprint capture devices,
combination with other biometrics, and the future of fingerprint
verification. Platform: |
Size: 358400 |
Author:swetha |
Hits:
Description: combined fingerprint verification system. In run time the code will get two fingerprint as input. combine the two fingerprint in one identity. this is used for authentication and verification.-combined fingerprint verification system. In run time the code will get two fingerprint as input. combine the two fingerprint in one identity. this is used for authentication and verification. Platform: |
Size: 8233984 |
Author:sriganesh |
Hits: