|
|
Fingerprint matching, spoof and liveness detection: classification and literature review |
Syed Farooq ALI1(), Muhammad Aamir KHAN2, Ahmed Sohail ASLAM3 |
1. Department of Software Engineering, University of Management and Technology, Lahore 54770, Pakistan 2. Department of Informatics and Systems, University of Management and Technology, Lahore 54770, Pakistan 3. Department of Computer Science, University of Management and Technology, Lahore 54770, Pakistan |
|
|
Abstract Fingerprint matching, spoof mitigation and liveness detection are the trendiest biometric techniques, mostly because of their stability through life, uniqueness and their least risk of invasion. In recent decade, several techniques are presented to address these challenges over well-known data-sets. This study provides a comprehensive review on the fingerprint algorithms and techniques which have been published in the last few decades. It divides the research on fingerprint into nine different approaches including feature based, fuzzy logic, holistic, image enhancement, latent, conventional machine learning, deep learning, template matching and miscellaneous techniques. Among these, deep learning approach has outperformed other approaches and gained significant attention for future research. By reviewing fingerprint literature, it is historically divided into four eras based on 106 referred papers and their cumulative citations.
|
Keywords
computer society
template matching
fingerprint recognition
survey
deep learning
machine learning
|
Corresponding Author(s):
Syed Farooq ALI
|
Just Accepted Date: 09 March 2020
Issue Date: 10 October 2020
|
|
1 |
M Kucken, A C Newell. Fingerprint formation. Journal of Theoretical Biology, 2005, 235(1): 71–83
https://doi.org/10.1016/j.jtbi.2004.12.020
|
2 |
S Sengupta, T Sengupta. Iris texture analysis, finger printing and signature verification for automatic data retrieval system using biometric pattern recognition system. International Journal of Advances in Computing and Management, 2013, 2(1): 6–10
|
3 |
D H McMahon, G L Johnson, S L Teeter, C G Whitney. A hybrid optical computer processing technique for fingerprint identification. IEEE Transactions on Computers, 1975, 100(4): 358–369
https://doi.org/10.1109/T-C.1975.224229
|
4 |
A K Jain, S Prabhakar, S Pankanti. On the similarity of identical twin fingerprints. Pattern Recognition, 2002, 35(11): 2653–2663
https://doi.org/10.1016/S0031-3203(01)00218-7
|
5 |
D Maltoni, D Maio, A K Jain, S Prabhakar. Handbook of Fingerprint Recognition. Springer Science & Business Media, 2009
https://doi.org/10.1007/978-1-84882-254-2
|
6 |
S A Cole. Is fingerprint identification valid? rhetorics of reliability in fingerprint proponents discourse. Law & Policy, 2006, 28(1): 109–135
https://doi.org/10.1111/j.1467-9930.2005.00219.x
|
7 |
S A Cole. Suspect Identities: A History of Fingerprinting and Criminal Identification. Harvard University Press, 2009
|
8 |
C N Wang, JW Wang, M H Lin, Y L Chang, C M Kuo. Optical methods in fingerprint imaging for medical and personality applications. Journal of Sensors, 2017, 17(10): 2418
https://doi.org/10.3390/s17102418
|
9 |
A K Jain, A A Ross, K Nandakumar. Introduction to Biometrics. Springer Science & Business Media, 2011
https://doi.org/10.1007/978-0-387-77326-1
|
10 |
J Wayman, A Jain, D Maltoni, D Maio. An Introduction to Biometric Authentication Systems. Springer Biometric Systems, 2005
https://doi.org/10.1007/b138151
|
11 |
M A Medina-Pérez, M García-Borroto, A E Gutierrez-Rodrguez, L Altamirano-Robles. Improving fingerprint verification using minutiae triplets. Journal of Sensors, 2012, 12(3): 3418–3437
https://doi.org/10.3390/s120303418
|
12 |
M Sahasrabudhe, A M Namboodiri. Fingerprint enhancement using unsupervised hierarchical feature learning. In: Proceedings of the ACM Indian Conference on Computer Vision Graphics and Image Processing. 2014, 14–17
https://doi.org/10.1145/2683483.2683485
|
13 |
T Y Jea, V Govindaraju. A minutia-based partial fingerprint recognition system. Pattern Recognition, 2005, 38(10): 1672–1684
https://doi.org/10.1016/j.patcog.2005.03.016
|
14 |
I S Msiza, B Leke-Betechuoh, F V Nelwamondo, N Msimang. A fingerprint pattern classification approach based on the coordinate geometry of singularities. In: Proceedings of IEEE International Conference on Systems, Man and Cybernetics. 2009, 510–517
https://doi.org/10.1109/ICSMC.2009.5346860
|
15 |
X Jiang, W Ser. Online fingerprint template improvement. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002, 24(8): 1121–1126
https://doi.org/10.1109/TPAMI.2002.1023807
|
16 |
M Selvi, A George. Fbfet: fuzzy based fingerprint enhancement technique based on adaptive thresholding. In: Proceedings of the 4th International Conference on Computing, Communications and Networking Technologies. 2013, 1–5
https://doi.org/10.1109/ICCCNT.2013.6726776
|
17 |
J Kim, A B J Teoh. One-factor cancellable biometrics based on indexingfirst- order hashing for fingerprint authentication. In: Proceedings of the 24th International Conference on Pattern Recognition. 2018, 3108–3113
https://doi.org/10.1109/ICPR.2018.8545565
|
18 |
P Li, X Yang, K Cao, X Tao, R Wang, J Tian. An alignment free fingerprint cryptosystem based on fuzzy vault scheme. Journal of Network and Computer Applications, 2010, 33(3): 207–220
https://doi.org/10.1016/j.jnca.2009.12.003
|
19 |
E Liu, H Zhao, J Liang, L Pang, M Xie, H Chen, Y Li, P Li, J Tian. A key binding system based on n-nearest minutiae structure of fingerprint. Pattern Recognition Letters, 2011, 32(5): 666–675
https://doi.org/10.1016/j.patrec.2010.12.015
|
20 |
M Ferrara, D Maltoni, R Cappelli. Noninvertible minutia cylinder-code representation. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1727–1737
https://doi.org/10.1109/TIFS.2012.2215326
|
21 |
Z Chen, C Kuo. A topology-based matching algorithm for fingerprint authentication. In: Proceedings of IEEE International Carnahan Conference on Security Technology. 1991, 84–87
|
22 |
B Bhanu, X Tan. Fingerprint indexing based on novel features of minutiae triplets. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2003, 25(5): 616–622
https://doi.org/10.1109/TPAMI.2003.1195995
|
23 |
R Singh, M Vatsa, A Noore. Fingerprint indexing using minutiae and pore features. In: Proceedings of International Conference on Image Processing. 2009, 870–875
|
24 |
F Afsar, M Arif, M Hussain. Fingerprint identification and verification system using minutiae matching. In: Proceedings of National Conference on Emerging Technologies. 2004, 141–146
|
25 |
J M Jaam, M L Rebaiaia, A Hasnah. A fingerprint minutiae recognition system based on genetic algorithms. International Arab Journal of Information Technology, 2006, 3(3): 242–248
|
26 |
Q Zhao, L Zhang, D Zhang, N Luo. Direct pore matching for fingerprint recognition. In: Proceedings of International Conference on Biometrics. 2009, 597–606
https://doi.org/10.1007/978-3-642-01793-3_61
|
27 |
Q Zhao, D Zhang, L Zhang, N Luo. High resolution partial fingerprint alignment using pore-valley descriptors. Pattern Recognition, 2010, 43(3): 1050–1061
https://doi.org/10.1016/j.patcog.2009.08.004
|
28 |
S A Sudiro, R T Yuwono. Adaptable fingerprint minutiae extraction algorithm based on crossing number method for hardware implementation using fpga device. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), 2012, 2(3): 1–30
https://doi.org/10.5121/ijcseit.2012.2301
|
29 |
M S Sadi, M N Uddin, A Ahad, A Haque. An efficient approach to recognize fingerprints. Journal of Multimedia, 2012, 7(5): 327–331
https://doi.org/10.4304/jmm.7.5.327-331
|
30 |
R M Madhuri, R Mishra, Fingerprint recognition using robust local features. International Journal of Advanced Research in Computer Science and Software Engineering, 2012, 2(6): 1–5
|
31 |
A Ackerman, R Ostrovsky. Fingerprint recognition. Technical Report, UCLA Computer Science Department, 2012
|
32 |
A Nagar, K Nandakumar, A K Jain. A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters, 2010, 31(8): 733–741
https://doi.org/10.1016/j.patrec.2009.07.003
|
33 |
J Feng, A K Jain, Fingerprint reconstruction: from minutiae to phase. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011, 33(2): 209–223
https://doi.org/10.1109/TPAMI.2010.77
|
34 |
S Yoon, J Feng, A J Jain. Altered fingerprints: analysis and detection. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2012, 34(3): 451–464
https://doi.org/10.1109/TPAMI.2011.161
|
35 |
T Chugh, K Cao, A K Jain. Fingerprint spoof buster: use of minutiaecentered patches. IEEE Transactions on Information Forensics and Security, 2018, 13(9): 2190–2202
https://doi.org/10.1109/TIFS.2018.2812193
|
36 |
J J Engelsma, K Cao, A K Jain, Raspireader: open source fingerprint reader. IEEE Transactions on Pattern Analysis andMachine Intelligence, 2018, 41(10): 2511–2524
https://doi.org/10.1109/TPAMI.2018.2858764
|
37 |
C Gottschlich, E Marasco, A Y Yang, B Cukic. Fingerprint liveness detection based on histograms of invariant gradients. In: Proceedings of IEEE International Joint Conference on Biometrics. 2014, 1–7
https://doi.org/10.1109/BTAS.2014.6996224
|
38 |
A Rattani, Z Akhtar, G Foresti. A preliminary study on identifying fabrication material from fake fingerprint images. In: Proceedings of IEEE Symposium Series on Computational Intelligence. 2015, 362–366
https://doi.org/10.1109/SSCI.2015.61
|
39 |
R Raghavendra, M Avinash, S Marcel, C Busch. Finger vein liveness detection using motion magnification. In: Proceedings of the 7th IEEE International Conference on Biometrics Theory, Applications and Systems. 2015, 1–7
https://doi.org/10.1109/BTAS.2015.7358762
|
40 |
H Ding. Anti-spoofing a finger vascular recognition device with pulse detection. In: Proceedings of the 24th Twente Student Conference on IT. 2016
|
41 |
S C Newton, S Pemmaraju, S Mitra. Adaptive fuzzy leader clustering of complex data sets in pattern recognition. IEEE Transactions on Neural Networks, 1992, 3(5): 794–800
https://doi.org/10.1109/72.159068
|
42 |
R Velamuri. Fingerprint recognition using fuzzy inferencing techniques. Technical Report, Fuzzy Logic and Engineering, University of Texas El Paso, 2006
|
43 |
M T Yildirim, A Basturk, M E Yuksel. A detail preserving type-2 fuzzy logic filter for impulse noise removal from digital images. In: Proceedings of IEEE International Conference on Fuzzy Systems. 2007, 1–6
https://doi.org/10.1109/FUZZY.2007.4295460
|
44 |
A Majumdar, R Ward. Fingerprint recognition with curvelet features and fuzzy KNN classifier. In: Proceedings of the 10th IASTED International Conference. 2008, 31–36
|
45 |
A K Jain, S Prabhakar, L Hong, S Pankanti. Filterbank-based fingerprint matching. IEEE Transactions on Image Processing, 2000, 9(5): 846–859
https://doi.org/10.1109/83.841531
|
46 |
C I Watson, P J Grother, D P Casasent. Distortion-tolerant filter for elastic-distorted fingerprint matching. In: Proceedings of SPIE, Optical Pattern Recognition XI. 2000, 166–174
https://doi.org/10.1117/12.381591
|
47 |
W H Jung. Fast fingerprint recognition using spiral. Technical Report, Department of Electrical and Computer Engineering, Carnegie Mellon University, 2005
|
48 |
H Xu, R N Veldhuis, A M Bazen, T A Kevenaar, T A Akkermans, B Gokberk. Fingerprint verification using spectral minutiae representations. IEEE Transactions on Information Forensics and Security, 2009, 4(3): 397–409
https://doi.org/10.1109/TIFS.2009.2021692
|
49 |
A A Aburas, S A Rehiel. Fingerprint patterns recognition system using huffman coding. In: Proceedings of theWorld Congress on Engineering. 2008, 1794–1796
|
50 |
F Chen, J Feng, A K Jain, J Zhou, J Zhang. Separating overlapped fingerprints. IEEE Transactions on Information Forensics and Security, 2011, 6(2): 346–359
https://doi.org/10.1109/TIFS.2011.2114345
|
51 |
B G Sherlock, D Monro, K Millard. Fingerprint enhancement by directional fourier filtering. IEE Proceedings Vision, Image and Signal Processing, 1994, 147(2): 87–94
https://doi.org/10.1049/ip-vis:19949924
|
52 |
L Hong, Y Wan, A K Jain. Fingerprint image enhancement: algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1998, 20(8): 777–789
https://doi.org/10.1109/34.709565
|
53 |
R Bansal, P Arora, M Gaur, P Sehgal, P Bedi. Fingerprint image enhancement using type-2 fuzzy sets. In: Proceedings of the 6th IEEE International Conference on Fuzzy Systems and Knowledge Discovery. 2009, 412–417
https://doi.org/10.1109/FSKD.2009.396
|
54 |
V Chawla, C Kant. Addressing sensor interoperability problem using fingerprint segmentation. International Journal of Advanced Research in Computer Science, 2016, 7(3): 125–131
|
55 |
J Feng, J Zhou, A K Jain. Orientation field estimation for latent fingerprint enhancement. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2013, 35(4): 925–940
https://doi.org/10.1109/TPAMI.2012.155
|
56 |
K Cao, E Liu, A K Jain. Segmentation and enhancement of latent fingerprints: a coarse to fine ridge structure dictionary. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2014, 36(9): 1847–1859
https://doi.org/10.1109/TPAMI.2014.2302450
|
57 |
K Ito, A Morita, T Aoki, T Higuchi, H Nakajima, K Kobayashi. A fingerprint recognition algorithm using phase-based image matching for low- quality fingerprints. In: Proceedings of IEEE International Conference on Image Processing. 2005, 33–36
https://doi.org/10.1109/ICIP.2005.1529984
|
58 |
S Mil’Shtein, S Pillai, A Shendye, C Liessner, M Baier. Fingerprint recognition algorithms for partial and full fingerprints. In: Proceedings of IEEE Conference on Technologies for Homeland Security. 2008, 449–452
https://doi.org/10.1109/THS.2008.4534494
|
59 |
A K Jain, J Feng. Latent fingerprint matching. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2011, 33(1): 88–100
https://doi.org/10.1109/TPAMI.2010.59
|
60 |
M Vatsa, R Singh, A Noore, K Morris. Simultaneous latent fingerprint recognition. Journal of Applied Soft Computing, 2011, 11(7): 4260–4266
https://doi.org/10.1016/j.asoc.2011.02.005
|
61 |
A Nagar, H Choi, A K Jain. Evidential value of automated latent fingerprint comparison: an empirical approach. IEEE Transactions on Information Forensics and Security, 2012, 7(6): 1752–1765
https://doi.org/10.1109/TIFS.2012.2210216
|
62 |
Q Zhao, A K Jain. Model based separation of overlapping latent fingerprints. IEEE Transactions on Information Forensics and Security, 2012, 7(3): 904–918
https://doi.org/10.1109/TIFS.2012.2187281
|
63 |
A A Paulino, J Feng, A K Jain. Latent fingerprint matching using descriptor-based hough transform. IEEE Transactions on Information Forensics and Security, 2012, 8(1): 31–45
https://doi.org/10.1109/TIFS.2012.2223678
|
64 |
S S Arora, E Liu, K Cao, A K Jain. Latent fingerprint matching: performance gain via feedback from exemplar prints. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2014, 36(12): 2452–2465
https://doi.org/10.1109/TPAMI.2014.2330609
|
65 |
T Chugh, K Cao, J Zhou, E Tabassi, A K Jain. Latent fingerprint value prediction: crowd-based learning. IEEE Transactions on Information Forensics and Security, 2018, 13(1): 20–34
https://doi.org/10.1109/TIFS.2017.2721099
|
66 |
M T Leung, W Engeler, P Frank. Fingerprint image processing using neural networks. In: Proceedings of IEEE Region 10 Conference on Computer and Communication Systems. 1990, 582–586
|
67 |
C L Wilson, G T Candela, C I Watson. Neural network fingerprint classification. Journal of Artificial Neural Networks, 1994, 1(2): 203–228
|
68 |
A K Jain, S Prabhakar, L Hong. A multichannel approach to fingerprint classification. IEEE Transactions on Pattern Analysis and Machine Intelligence, 1999, 21(4): 348–359
https://doi.org/10.1109/34.761265
|
69 |
B Tan, A Lewicke, D Yambay, S Schuckers. The effect of environmental conditions and novel spoofing methods on fingerprint anti-spoofing algorithms. In: Proceedings of IEEE International Workshop on Information Forensics and Security. 2010, 1–6
https://doi.org/10.1109/WIFS.2010.5711436
|
70 |
A Rattani, A Ross. Automatic adaptation of fingerprint liveness detector to new spoof materials. In: Proceedings of IEEE International Joint Conference on Biometrics. 2014, 1–8
https://doi.org/10.1109/BTAS.2014.6996254
|
71 |
Y Ding, A Rattani, A Ross. Bayesian belief models for integrating match scores with liveness and quality measures in a fingerprint verification system. In: Proceedings of IEEE International Conference on Biometrics. 2016, 1–8
https://doi.org/10.1109/ICB.2016.7550095
|
72 |
E Liu, H Zhao, F Guo, J Liang, J Tian. Fingerprint segmentation based on an adaboost classifier. Frontiers of Computer Science, 2011, 5(2): 148–157
https://doi.org/10.1007/s11704-011-9134-x
|
73 |
T Kristensen. Two different regimes of fingerprint identification-a comparison. American Journal of Computational and Applied Mathematics, 2012, 2(2): 1–9
https://doi.org/10.5923/j.ajcam.20120202.01
|
74 |
S Minaee, Y Wang. Fingerprint recognition using translation invariant scattering network. In: Proceedings of IEEE Symposium on Signal Processing in Medicine and Biology. 2015, 1–6
https://doi.org/10.1109/SPMB.2015.7405471
|
75 |
D Menotti, G Chiachia, A Pinto, W R Schwartz, H Pedrini, A X Falcao, A Rocha. Deep representations for iris, face, and fingerprint spoofing detection. IEEE Transactions on Information Forensics and Security, 2015, 10(4): 864–879
https://doi.org/10.1109/TIFS.2015.2398817
|
76 |
C Ryu, H Kim, A K Jain. Template adaptation based fingerprint verification. In: Proceedings of the 18th International Conference on Pattern Recognition. 2006, 582–585
|
77 |
R Cappelli, A Lumini, D Maio, D Maltoni. Evaluating minutiae template vulnerability to masquerade attack. In: Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies. 2007, 174–179
https://doi.org/10.1109/AUTOID.2007.380615
|
78 |
R Cappelli, D Maio, A Lumini, D Maltoni. Fingerprint image reconstruction from standard templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29(9): 1489–1503
https://doi.org/10.1109/TPAMI.2007.1087
|
79 |
L H Thai, H N Tam. Fingerprint recognition using standardized fingerprint model. International Journal of Computer Science, 2010, 7(7): 1694–1700.
|
80 |
Q Gao. Fingerprint based authentication with randomly selected minutiae sub-templates. International Journal of Research and Reviews in Information Security and Privacy (IJRRISP), 2012, 2(1): 55–62
|
81 |
P Jiang, Q Wen, W Li, Z Jin, H Zhang. An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers of Computer Science, 2015, 9(1): 142–156
https://doi.org/10.1007/s11704-014-3125-7
|
82 |
N K Ratha, J H Connell, R M Bolle. An analysis of minutiae matching strength. In: Proceedings of International Conference on Audio and Video Based Biometric Person Authentication. 2001, 223–228
https://doi.org/10.1007/3-540-45344-X_32
|
83 |
M Vatsa, R Singh, A Noore, M M Houck, K Morris. Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express, 2006, 3(2): 23–28
https://doi.org/10.1587/elex.3.23
|
84 |
J Fierrez-Aguilar, Y Chen, J Ortega-Garcia, A K Jain. Incorporating image quality in multi-algorithm fingerprint verification. In: Proceedings of International Conference on Biometrics. 2006, 213–220
https://doi.org/10.1007/11608288_29
|
85 |
M He, H Zhao. A identity authentication based on fingerprint identification. In: Proceedings of the International Symposium on Web Information Systems and Applications. 2009, 261–263
|
86 |
P J Kellman, J L Mnookin, G Erlikhman, P Garrigan, T Ghose, E Mettler, D Charlton, I E Dror. Forensic comparison and matching of fingerprints using quantitative image measures for estimating error rates through understanding and predicting difficulty. PloS One, 2014, 9(5): e94617.
https://doi.org/10.1371/journal.pone.0094617
|
87 |
S Yoon, A K Jain. Longitudinal study of fingerprint recognition. Proceedings of the National Academy of Sciences, 2015, 112(28): 8555–8560
https://doi.org/10.1073/pnas.1410272112
|
88 |
A K Jain, S S Arora, K Cao, L Best-Rowden, A Bhatnagar. Fingerprint recognition of young children. IEEE Transactions on Information Forensics and Security, 2017, 12(7): 1501–1514
https://doi.org/10.1109/TIFS.2016.2639346
|
89 |
X Li, Y Yin, Y Ning, G Yang, L Pan. A hybrid biometric identification framework for high security applications. Frontiers of Computer Science, 2015, 9(3): 392–401
https://doi.org/10.1007/s11704-014-4070-1
|
90 |
W Engeler, P Frank, M Leung. Fingerprint image processing using neural network. In: Proceedings of IEEE Conference on Computer and Communication Systems. 1990, 582–586
|
91 |
A Jain, S Pankanti. Automated fingerprint identification and imaging systems. Advances in Fingerprint Technology, 2001, 275–340
https://doi.org/10.1201/9781420041347.ch8
|
92 |
J Gu, J Zhou, C Yang. Fingerprint recognition by combining global structure and local cues. IEEE Transactions on Image Processing, 2006, 15(7): 1952–1964
https://doi.org/10.1109/TIP.2006.873443
|
93 |
R Cappelli, D Maio, D Maltoni, J L Wayman, A K Jain. Performance evaluation of fingerprint verification systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2006, 28(1): 3–18
https://doi.org/10.1109/TPAMI.2006.20
|
94 |
H Kekre, V Bharadi. Fingerprint core point detection algorithm using orientation field based multiple features. International Journal of Computer Applications, 2010, 1(15): 106–112
https://doi.org/10.5120/314-482
|
95 |
A K Jain, J Feng, K Nandakumar. Fingerprint matching. Journal of Computer, 2010, 43(2): 36–44
https://doi.org/10.1109/MC.2010.38
|
96 |
S Bana, D D Kaur. Fingerprint recognition using image segmentation. International Journal of Advanced Engineering Sciences and Technologies, 2011, 5(1): 012–023
|
97 |
R Mishra, R Mishra. Fingerprint recognition using robust local features. International Journal of Advanced Research in Computer Science and Software Engineering, 2012, 2(6): 1–5
|
98 |
R Subban, D P Mankame. A study of biometric approach using finger print recognition. Lecture Notes on Software Engineering, 2013, 1(2): 209–213
https://doi.org/10.7763/LNSE.2013.V1.47
|
99 |
J Galbally, S Marcel, J Fierrez. Image quality assessment for fake biometric detection: application to iris, fingerprint, and face recognition. IEEE Transactions on Image Processing, 2014, 23(2): 710–724
https://doi.org/10.1109/TIP.2013.2292332
|
100 |
A Sankaran, M Vatsa, R Singh. Latent fingerprint matching: a survey. IEEE Access, 2014, 2(1): 982–1004
https://doi.org/10.1109/ACCESS.2014.2349879
|
101 |
K Tiwari, V D Kaushik, P Gupta. An efficient fingerprint matching using continuous minutiae template learning. In: Bhatia S, Tiwari S, Mishra K, Trivedi M, eds. Advances in Computer Communication and Computational Sciences. Springer, Singapore, 2019, 289–298
https://doi.org/10.1007/978-981-13-0344-9_25
|
102 |
A K Jain, K Nandakumar, A Ross. 50 years of biometric research: accomplishments, challenges, and opportunities. Pattern Recognition Letters, 2016, 79: 80–105
https://doi.org/10.1016/j.patrec.2015.12.013
|
103 |
L Ghiani, D A Yambay, V Mura, G L Marcialis, F Roli, S A Schuckers. Review of the fingerprint liveness detection (livdet) competition series: 2009 to 2015. Image and Vision Computing, 2017, 58: 110–128
https://doi.org/10.1016/j.imavis.2016.07.002
|
104 |
A Manickam, E Devarasan, G Manogaran, M K Priyan, R Varatharajan, C H Hsu, R Krishnamoorthi. Score level based latent fingerprint enhancement and matching using sift feature. Multimedia Tools and Applications, 2019, 78(3): 3065–3085
https://doi.org/10.1007/s11042-018-5633-1
|
105 |
K Khongkraphan. An efficient fingerprint matching by multiple reference points. Journal of Information Processing Systems, 2019, 15(1): 22–33
|
106 |
D Maio, D Maltoni, R Cappelli, J L Wayman, A K Jain. Fvc2000: fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002, 24(3): 402–412
https://doi.org/10.1109/34.990140
|
107 |
A J Mansfield, J L Wayman. Best practices in testing and reporting performance of biometric devices. National Physical Labrotary Report, 2002, 1–32
|
108 |
D Maio, D Maltoni, R Cappelli, J L Wayman, A K Jain. FVC2002: second fingerprint verification competition. In: Proceedings of IEEE Object Recognition Supported by User Interaction for Service Robots, 2002, 811–814
|
109 |
J Fierrez, J Ortega-Garcia, D T Toledano, J Gonzalez-Rodriguez. Biosec baseline corpus: a multimodal biometric database. Pattern Recognition, 2007, 40(4): 1389–1392
https://doi.org/10.1016/j.patcog.2006.10.014
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|