2007 9th International Symposium on Signal Processing and Its Applications 2007
DOI: 10.1109/isspa.2007.4555384
|View full text |Cite
|
Sign up to set email alerts
|

An algorithm for fingerprint core point detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…For feature extraction binarization/thinning 650 based minutiae extraction method and smoothed orientation image creation proposed by Hong et al [5] were used. The core points are detected by the algorithm based on the method described in [53]. Finally, fingerprint matching method using a hybrid shape and orientation descriptor [54] is used for 655 matching purpose.…”
Section: Resultsmentioning
confidence: 99%
“…For feature extraction binarization/thinning 650 based minutiae extraction method and smoothed orientation image creation proposed by Hong et al [5] were used. The core points are detected by the algorithm based on the method described in [53]. Finally, fingerprint matching method using a hybrid shape and orientation descriptor [54] is used for 655 matching purpose.…”
Section: Resultsmentioning
confidence: 99%
“…The FVC2002 protocol ( Maio et al (2002)) was used in experimentation, comprising of n × 8 × 7/2 = 2800 genuine and n × (n − 1)/2 = 4950 imposter attempts for the FVC2002 database, and n × 8 × 7/2 = 588 genuine and n × (n − 1)/2 = 210 imposter attempts for the smaller database. Image enhancement for the FVC2002 database was performed via the STFT method ( Chikkerur et al (2004)), while the binarization/thinning based minutiae extraction method and smoothed orientation image creation proposed in Hong et al (1998) were used for feature extraction, along with the core point detection algorithm based on the method described in Julasayvake & Choomchuay (2007). Spurious minutiae had very crude filtering applied, with only short spurs and minutiae near segmented border regions removed.…”
Section: Resultsmentioning
confidence: 99%
“…Conventional detection algorithms for core point use the orientation of all ridges and choose the U turn point as core [17,18]. However they may be unsuccessful where the database includes deficient information on some fingerprints.…”
Section: Detection Of Core Point In Fingerprintmentioning
confidence: 99%
“…Most common core finding method is benefitted from the orientation of all ridges and chose the U turn point as core [17,18], but these methods may be unsuccessful where the database includes deficient information on some fingerprints. To find the core point, a unique method based on simple circle fitting process is applied.…”
Section: Introductionmentioning
confidence: 99%