Secure Fingerprint Verification Based on Image Processing Segmentation Using Computational Geometry Algorithms
نویسندگان
چکیده
In this paper, fingerprint segmentation for secure Internet verification purposes is investigated. The novel application of computational geometry algorithms in the fingerprint segmentation stage showed that the extracted feature (characteristic polygon) may be used as a secure and accurate method for fingerprint-based verification over the Internet. On the other hand the proposed method promisingly allows very small false acceptance and false rejection rates, as it is based on specific segmentation.
منابع مشابه
Fingerprint Verification Based on Image Processing Segmentation Using an Onion Algorithm of Computational Geometry
In this study, we applied a digital image processing system using the onion algorithm of Computational geometry to develop fingerprint verification. This method may be characterized as an alternative method to the used minutiae extraction algorithm proposed by Ratha et al. The proposed algorithm is also compared to a well-known commercial verification algorithm that is based on Ratha’s algorith...
متن کاملFingerprint Verification Based on Image Processing Segmentation Using an Onion Algorithm of Computational Geometry
In this study, we applied a digital image processing system using the onion algorithm of Computational geometry to develop fingerprint verification. This method may be characterized as an alternative method to the used minutiae extraction algorithm proposed by Ratha et al. The proposed algorithm is also compared to a well-known commercial verification algorithm that is based on Ratha’s algorith...
متن کاملFeasibility of detecting and localizing radioactive source using image processing and computational geometry algorithms
We consider the problem of finding the localization of radioactive source by using data from a digital camera. In other words, the camera could help us to detect the direction of radioactive rays radiation. Therefore, the outcome could be used to command a robot to move toward the true direction to achieve the source. The process of camera data is performed by using image processing and computa...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملImproving Brain Magnetic Resonance Image (MRI) Segmentation via a Novel Algorithm based on Genetic and Regional Growth
Background:Â Regarding the importance of right diagnosis in medical applications, various methods have been exploited for processing medical images solar. The method of segmentation is used to analyze anal to miscall structures in medical imaging.Objective:Â This study describes a new method for brain Magnetic Resonance Image (MRI) segmentation via a novel algorithm based on genetic and regiona...
متن کامل