2001
DOI: 10.1016/s0893-6080(01)00086-7
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprints classification using artificial neural networks: a combined structural and statistical approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
18
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 55 publications
(18 citation statements)
references
References 16 publications
0
18
0
Order By: Relevance
“…EDM is computed between the energy vector E new M of the unknown fingerprint and the energy vector E j M of the template image j while EDD is computed between the energy vector E new D of the unknown fingerprint and E j D of the template image j. Then the Euclidean distance measures are given by the following formulae [3]:…”
Section: Adaptive Matchingmentioning
confidence: 99%
See 1 more Smart Citation
“…EDM is computed between the energy vector E new M of the unknown fingerprint and the energy vector E j M of the template image j while EDD is computed between the energy vector E new D of the unknown fingerprint and E j D of the template image j. Then the Euclidean distance measures are given by the following formulae [3]:…”
Section: Adaptive Matchingmentioning
confidence: 99%
“…In the identification mode, AFIS recognizes an individual without a claimed identity. Its criminal applications include verifying the alleged identity of suspects, identifying known criminals, persons considered as potential criminals and detained suspects [3]. The manual matching of fingerprints is a very tedious task because of the size of the image database, which can vary from a few hundred to several million records.…”
Section: Introductionmentioning
confidence: 99%
“…This reduction is usually quan- 81 tified with the ratio of penetration [99] in the database, which 82 measures the percentage of the database that is searched before 83 matching the fingerprint. Classification is the most extended 84 method to reduce the ratio of penetration, which is also directly 85 related with the classification accuracy (percentage of correctly 86 classified examples) obtained by the classification methods. This 87 paper focuses on this type of methods to reduce the search space 88 even though other techniques have also been developed such as 89 indexing [6,64,14], continuous classification [15,17,19] or cluster- 90 ing and classification [47,68,69].…”
mentioning
confidence: 99%
“…12 method, which can be found in Table 1. approach, Nagaty [86] considered to process these strings further, 638 transforming them into binary codified ones. Even two of them have also carried out the alignment with the ori-689 entation of the reference point [4,63].…”
mentioning
confidence: 99%
“…where ( These detected spurious directions within ( ) p O I will be corrected one-by-one by analyzing the statistical number pattern of neighbor directions [9][10]. In this paper, the spurious direction is restored to the center of the range of the class that appears most frequently in the 3 3 × neighborhood structure.…”
mentioning
confidence: 99%