相关期刊:《Journal of Computer and Communications》《Wuhan University Journal of Natural Sciences》《Journal of Physical Science and Application》《Journal of Biomedical Science and Engineering》更多>>
In this study,two models for fingerprint and DNA identifications are constructed based on modern technologies,while offering significant advances over prior models.Our models have high credibility,obtaining relatively...
Nowadays, it is a new technology era. Fingerprint is necessary identification recognition of citizens. Fingerprint technology has become more popular and connected to human being life and come to replace traditional i...
supported by the National Natural Science Foundation of China[grant number 71371188];the Shang-hai Key Laboratory of Crime Scene Evidence[grant number 2016XCWZK08].
The selection of minutiae is a critical part of the analysis phase within the fingerprint identification methodology,known as analysis-comparison-evaluation-verification.This study assessed the accuracy and reliabilit...
Fingerprints are an extraordinary source for recognizable proof of people. Unique finger impression acknowledgment is one of the most seasoned types of biometric identification. However, getting a decent unique finger...
supported by the National Natural Science Foundation of China(No.61272045);Zhejiang Qianjiang Talents Project(No.2013R10071);The Key Program of the Zhejiang Natural Science Foundation(No.LZ17020002);the Zhejiang Science and Technology Innovation Team(No.2013TD03)
Juels and Sudan proposed in 2002 an algorithm for computing a fuzzy vault that binds a user's biometric template with his secret.It was suggested that this vault could be used to securely store one's secret or a crypt...
Biometric techniques require critical operations of digital processing for identification of individuals. In this context, this paper aims to develop a system for automatic processing of fingerprint identification by ...
supported by National Natural Science Foundation of China(Grant No.61333015);National Basic Research Program of China(973)(Grant No.2011CB302400)
Extracting effective minutiae is difficult for high-resolution palmprint, because of the strong influence from principal lines, creases, and other noises. In this paper, a novel minutiae detection and reliability meas...
A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-i...
In this paper, we propose a novel method for finger-vein recognition. We extract the features of the vein patterns for recognition. Then, the minutiae features included bifurcation points and ending points are extract...
Minutiae-based fingerprint matching is the most commonly used in an automatic fingerprint identification system. In this paper, we propose a minutia matching method based on line segment vector. This method uses all t...