2006
DOI: 10.1016/j.patcog.2005.12.013
|View full text |Cite
|
Sign up to set email alerts
|

Detecting fingerprint minutiae by run length encoding scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…This characteristic makes it become widely used [11,13,14,15,17] and even become a component of other schemes, such as the JPEG standard [10], proposed in 1980's and in use for transmitting and storing images, uses discrete cosine transformation, quantization, run-length coding, and Huffman entropy coding [2]. The idea of run-length encoding has also been extensively exploited by researchers for other kinds of data compression.…”
Section: Related Workmentioning
confidence: 99%
“…This characteristic makes it become widely used [11,13,14,15,17] and even become a component of other schemes, such as the JPEG standard [10], proposed in 1980's and in use for transmitting and storing images, uses discrete cosine transformation, quantization, run-length coding, and Huffman entropy coding [2]. The idea of run-length encoding has also been extensively exploited by researchers for other kinds of data compression.…”
Section: Related Workmentioning
confidence: 99%
“…By using a RLE algorithm for every line in Era, defects will be found and labeled. RLE is a simple and popular encoding algorithm [14] . It is implemented by the following object-oriented-programming (OOP) based method in our approach.…”
Section: Fast Defects Searching By Run-length-encoding (Rle)mentioning
confidence: 99%
“…In [5] a run length coding based method for bifurcation and endpoint detection, which does not require thinning, is presented. The run length coding requires that the input image is binary and it is performed in two dimensions, thus allowing for the detection of starting, ending, merging, and splitting runs.…”
Section: B Feature Detectionmentioning
confidence: 99%