Secure Fingerprint Verification Based on Image Processing Segmentation Using Computational Geometry Algorithms

نویسندگان

  • V. Chrissikopoulos
  • N. Alexandris
چکیده

In this paper, fingerprint segmentation for secure Internet verification purposes is investigated. The novel application of computational geometry algorithms in the fingerprint segmentation stage showed that the extracted feature (characteristic polygon) may be used as a secure and accurate method for fingerprint-based verification over the Internet. On the other hand the proposed method promisingly allows very small false acceptance and false rejection rates, as it is based on specific segmentation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fingerprint Verification Based on Image Processing Segmentation Using an Onion Algorithm of Computational Geometry

In this study, we applied a digital image processing system using the onion algorithm of Computational geometry to develop fingerprint verification. This method may be characterized as an alternative method to the used minutiae extraction algorithm proposed by Ratha et al. The proposed algorithm is also compared to a well-known commercial verification algorithm that is based on Ratha’s algorith...

متن کامل

Fingerprint Verification Based on Image Processing Segmentation Using an Onion Algorithm of Computational Geometry

In this study, we applied a digital image processing system using the onion algorithm of Computational geometry to develop fingerprint verification. This method may be characterized as an alternative method to the used minutiae extraction algorithm proposed by Ratha et al. The proposed algorithm is also compared to a well-known commercial verification algorithm that is based on Ratha’s algorith...

متن کامل

Feasibility of detecting and localizing radioactive source using image processing and computational geometry algorithms

We consider the problem of finding the localization of radioactive source by using data from a digital camera. In other words, the camera could help us to detect the direction of radioactive rays radiation. Therefore, the outcome could be used to command a robot to move toward the true direction to achieve the source. The process of camera data is performed by using image processing and computa...

متن کامل

Secure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines

Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...

متن کامل

Improving Brain Magnetic Resonance Image (MRI) Segmentation via a Novel Algorithm based on Genetic and Regional Growth

Background: Regarding the importance of right diagnosis in medical applications, various methods have been exploited for processing medical images solar. The method of segmentation is used to analyze anal to miscall structures in medical imaging.Objective: This study describes a new method for brain Magnetic Resonance Image (MRI) segmentation via a novel algorithm based on genetic and regiona...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003