2012 International Conference on Wavelet Analysis and Pattern Recognition 2012
DOI: 10.1109/icwapr.2012.6294770
|View full text |Cite
|
Sign up to set email alerts
|

A review of fingerprint pre-processing using a mobile phone

Abstract: Nowadays, the mobile phones are becoming part of our daily life. They transformed from communication devices to personal computers. They are capable of storing personal information and connect to other applications where security is required. The need for securing the confidential information and the other application is increasing every day. Fingerprint authentication has been used in many different applications where high security is required. Mobile phones can process a lot of tasks and equipped with a buil… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…The pioneering touchless fingerprint recognition scheme by Song et al in 2004 marked the inception of a growing body of research aimed at improving the reliability and user-friendliness of these systems [5]. Contributions by Parziale and Chen [6] and Khalil and Wan [7] distinguished between 2D and 3D acquisition technologies, processing strategies, and quality considerations, with additional insights into presentation attack detection (PAD) schemes. However, existing reviews lack a comprehensive discussion of current approaches.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The pioneering touchless fingerprint recognition scheme by Song et al in 2004 marked the inception of a growing body of research aimed at improving the reliability and user-friendliness of these systems [5]. Contributions by Parziale and Chen [6] and Khalil and Wan [7] distinguished between 2D and 3D acquisition technologies, processing strategies, and quality considerations, with additional insights into presentation attack detection (PAD) schemes. However, existing reviews lack a comprehensive discussion of current approaches.…”
Section: Literature Reviewmentioning
confidence: 99%
“…4d. In 2012, Khalil and Wan [8] presented a survey on the special topic of preprocessing finger images acquired with mobile phones. The authors highlighted the relevance of this field of research and summarized the differences between the touchless and the touchbased domain.…”
Section: Preprocessing Pipelinementioning
confidence: 99%
“…Further, the authors gave an overview on presentation attack detection (PAD) schemes. Khalil and Wan [8] reviewed state-of-the-art algorithms along the preprocessing pipeline and address PAD. Even though, their work highlights some important issues in the field it lacks a comprehensive discussion of current approaches.…”
Section: Introductionmentioning
confidence: 99%
“…Unconstrained acquisition systems only perform an approximated normalization by evaluating the finger's silhouette [38]. Preprocessing methods for touchless images captured by mobile devices are reviewed in [54].…”
Section: Previous Work a Two-dimensional Systemsmentioning
confidence: 99%