Spelling suggestions: "subject:"fingerprints"" "subject:"fingerprint""
1 |
A framework for a fast fingerprint identification using a hybrid system /Sanpachai Huvanandana. January 2002 (has links)
Thesis (Ph. D.)--University of Washington, 2002. / Vita. Includes bibliographical references (leaves 110-114).
|
2 |
De beteekenis van vingerafdrukken voor het anthropologisch onderzoek ...Dankmeijer, Johan. January 1934 (has links)
Proefschrift--Utrecht. / "Summary" in English: p.[88]. "Stellingen": 2 L. laid in. "Literatuuropgave": p. [89]-98.
|
3 |
De beteekenis van vingerafdrukken voor het anthropologisch onderzoek ...Dankmeijer, Johan. January 1934 (has links)
Proefschrift--Utrecht. / "Summary" in English: p.[88]. "Stellingen": 2 L. laid in. "Literatuuropgave": p. [89]-98.
|
4 |
Reconstruction of fingerprints from minutiae pointsShah, Jidnya A. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2005. / Title from document title page. Document formatted into pages; contains ix, 80 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 77-80).
|
5 |
Robust minutia-based fingerprint verificationDeng, Huimin, January 2006 (has links)
Thesis (Ph. D.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
|
6 |
Pokročilé generování artefaktů falzifikátů do syntetických otisků prstů / Advanced Generation of Spoof Artefacts into Synthetic FingerprintsVrábľová, Žofia January 2021 (has links)
The goal of this thesis is to extend the application for spoof effects generation into synthetic fingerprints with the possibility of generation of two new spoof effects together with annotations of generated damages. Spoof effects chosen for this thesis are areas with lower clarity and defects in spoof material. Those effects were analyzed, methods to generate those effects were designed and then implemented. According to testing, generation of two new added spoof effects led to reduction in quality of fingerprint images, as well as the value of the similarity score determined during identification. In comparison with the original solution, the quality of the fingerprints decreased more in the extended solution, the similarity score in the generation of separate spoof effect decreased overall approximately equally.
|
7 |
Automatic fingerprint interpretation and classification via contextual analysis and topological coding /Hankley, William J. January 1968 (has links)
No description available.
|
8 |
Pokročilé generování projevů poškození do syntetických otisků prstů / Advanced Generation of Damage Effects into Synthetic FingerprintsSvoradová, Veronika January 2021 (has links)
The main goal of this thesis was to design and implement a application that would be able to generate fingerprint damage into a synthetic fingerprint. The application can create fingerprint images damaged by pressure, moisture and skin disease dyshidrosis with different intensity of damage. The application also allows annotation of the generated damage and its export. Selected damages were analyzed before the design was created. A database of fingerprints from five users was created to analyze the damage caused by pressure and moisture. The generated images and the achieved results are tested with VeriFinger and FiQiVi. For testing, 19 sets with fingerprints of different intensity and different type of damage were created. Experiments showed that the quality of the fingerprint decreased the most during the generation of moisture with the highest intensity of damage, where the quality decreased by 61.8 %. This thesis can be used for further research in the field of biometric fingerprint processing.
|
9 |
Robust minutia-based fingerprint verificationDeng, Huimin, 鄧惠民 January 2006 (has links)
published_or_final_version / abstract / Computer Science / Doctoral / Doctor of Philosophy
|
10 |
Skeleton-based fingerprint minutiae extraction.January 2002 (has links)
by Zhao Feng. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 64-68). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgments --- p.vi / Table of Contents --- p.vii / List of Figures --- p.ix / List of Tables --- p.x / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Automatic Personal Identification --- p.1 / Chapter 1.2 --- Biometrics --- p.2 / Chapter 1.2.1 --- Objectives --- p.2 / Chapter 1.2.2 --- Operational Mode --- p.3 / Chapter 1.2.3 --- Requirements --- p.3 / Chapter 1.2.4 --- Performance Evaluation --- p.4 / Chapter 1.2.5 --- Biometric Technologies --- p.4 / Chapter 1.3 --- Fingerprint --- p.6 / Chapter 1.3.1 --- Applications --- p.6 / Chapter 1.3.2 --- Advantages of Fingerprint Identification --- p.7 / Chapter 1.3.3 --- Permanence and Uniqueness --- p.8 / Chapter 1.4 --- Thesis Overview --- p.8 / Chapter 1.5 --- Summary --- p.9 / Chapter Chapter 2 --- Fingerprint Identification --- p.10 / Chapter 2.1 --- History of Fingerprints --- p.10 / Chapter 2.2 --- AFIS Architecture --- p.12 / Chapter 2.3 --- Fingerprint Acquisition --- p.15 / Chapter 2.4 --- Fingerprint Representation --- p.16 / Chapter 2.5 --- Fingerprint Classification --- p.18 / Chapter 2.6 --- Fingerprint Matching --- p.20 / Chapter 2.7 --- Challenges --- p.21 / Chapter 2.8 --- Combination Schemes --- p.22 / Chapter 2.9 --- Summary --- p.23 / Chapter Chapter 3 --- Live-Scan Fingerprint Database --- p.24 / Chapter 3.1 --- Live-Scan Fingerprint Sensors --- p.24 / Chapter 3.2 --- Database Features --- p.24 / Chapter 3.3 --- Filename Description --- p.28 / Chapter Chapter 4 --- Preprocessing for Skeleton-Based Minutiae Extraction --- p.30 / Chapter 4.1 --- Review of Minutiae-based Methods --- p.31 / Chapter 4.2 --- Skeleton-based Minutiae Extraction --- p.32 / Chapter 4.2.1 --- Preprocessing --- p.33 / Chapter 4.2.2 --- Validation of Bug Pixels and Minutiae Extraction --- p.40 / Chapter 4.3 --- Experimental Results --- p.42 / Chapter 4.4 --- Summary --- p.44 / Chapter Chapter 5 --- Post-Processing --- p.46 / Chapter 5.1 --- Review of Post-Processing Methods --- p.46 / Chapter 5.2 --- Post-Processing Algorithms --- p.47 / Chapter 5.2.1 --- H-Point --- p.47 / Chapter 5.2.2 --- Termination/Bifurcation Duality --- p.48 / Chapter 5.2.3 --- Post-Processing Procedure --- p.49 / Chapter 5.3 --- Experimental Results --- p.52 / Chapter 5.4 --- Summary --- p.54 / Chapter Chapter 6 --- Conclusions and Future Work --- p.58 / Chapter 6.1 --- Conclusions --- p.58 / Chapter 6.2 --- Problems and Future Works --- p.59 / Chapter 6.2.1 --- Problem 1 --- p.59 / Chapter 6.2.2 --- Problem 2 --- p.61 / Chapter 6.2.3 --- Problem 3 --- p.61 / Chapter 6.2.4 --- Future Works --- p.62 / Bibliography --- p.64
|
Page generated in 0.0473 seconds