• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 7
  • 7
  • 7
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Robust minutia-based fingerprint verification

Deng, Huimin, 鄧惠民 January 2006 (has links)
published_or_final_version / abstract / Computer Science / Doctoral / Doctor of Philosophy
2

Skeleton-based fingerprint minutiae extraction.

January 2002 (has links)
by Zhao Feng. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 64-68). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgments --- p.vi / Table of Contents --- p.vii / List of Figures --- p.ix / List of Tables --- p.x / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Automatic Personal Identification --- p.1 / Chapter 1.2 --- Biometrics --- p.2 / Chapter 1.2.1 --- Objectives --- p.2 / Chapter 1.2.2 --- Operational Mode --- p.3 / Chapter 1.2.3 --- Requirements --- p.3 / Chapter 1.2.4 --- Performance Evaluation --- p.4 / Chapter 1.2.5 --- Biometric Technologies --- p.4 / Chapter 1.3 --- Fingerprint --- p.6 / Chapter 1.3.1 --- Applications --- p.6 / Chapter 1.3.2 --- Advantages of Fingerprint Identification --- p.7 / Chapter 1.3.3 --- Permanence and Uniqueness --- p.8 / Chapter 1.4 --- Thesis Overview --- p.8 / Chapter 1.5 --- Summary --- p.9 / Chapter Chapter 2 --- Fingerprint Identification --- p.10 / Chapter 2.1 --- History of Fingerprints --- p.10 / Chapter 2.2 --- AFIS Architecture --- p.12 / Chapter 2.3 --- Fingerprint Acquisition --- p.15 / Chapter 2.4 --- Fingerprint Representation --- p.16 / Chapter 2.5 --- Fingerprint Classification --- p.18 / Chapter 2.6 --- Fingerprint Matching --- p.20 / Chapter 2.7 --- Challenges --- p.21 / Chapter 2.8 --- Combination Schemes --- p.22 / Chapter 2.9 --- Summary --- p.23 / Chapter Chapter 3 --- Live-Scan Fingerprint Database --- p.24 / Chapter 3.1 --- Live-Scan Fingerprint Sensors --- p.24 / Chapter 3.2 --- Database Features --- p.24 / Chapter 3.3 --- Filename Description --- p.28 / Chapter Chapter 4 --- Preprocessing for Skeleton-Based Minutiae Extraction --- p.30 / Chapter 4.1 --- Review of Minutiae-based Methods --- p.31 / Chapter 4.2 --- Skeleton-based Minutiae Extraction --- p.32 / Chapter 4.2.1 --- Preprocessing --- p.33 / Chapter 4.2.2 --- Validation of Bug Pixels and Minutiae Extraction --- p.40 / Chapter 4.3 --- Experimental Results --- p.42 / Chapter 4.4 --- Summary --- p.44 / Chapter Chapter 5 --- Post-Processing --- p.46 / Chapter 5.1 --- Review of Post-Processing Methods --- p.46 / Chapter 5.2 --- Post-Processing Algorithms --- p.47 / Chapter 5.2.1 --- H-Point --- p.47 / Chapter 5.2.2 --- Termination/Bifurcation Duality --- p.48 / Chapter 5.2.3 --- Post-Processing Procedure --- p.49 / Chapter 5.3 --- Experimental Results --- p.52 / Chapter 5.4 --- Summary --- p.54 / Chapter Chapter 6 --- Conclusions and Future Work --- p.58 / Chapter 6.1 --- Conclusions --- p.58 / Chapter 6.2 --- Problems and Future Works --- p.59 / Chapter 6.2.1 --- Problem 1 --- p.59 / Chapter 6.2.2 --- Problem 2 --- p.61 / Chapter 6.2.3 --- Problem 3 --- p.61 / Chapter 6.2.4 --- Future Works --- p.62 / Bibliography --- p.64
3

A digital method for generating a reference point in a fingerprint.

Karasik, Richard Paul January 1969 (has links)
No description available.
4

A digital method for generating a reference point in a fingerprint.

Karasik, Richard Paul January 1969 (has links)
No description available.
5

Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniques

Crundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting. The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques. The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered. It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology / M.Tech (Forensic Investigation)
6

Enhancing the validity of the SAPS gold fingerprinting database through improved sample-collection techniques

Crundwell, Gordon Rhodes 30 April 2008 (has links)
This study's main focus was to analyse the methodology used by gold mines when obtaining reference samples required for gold fingerprinting analysis. Such methodology is also regulated by legislation in that in terms of the Precious Metals Act 37 of 2005 sect 22(1), "Any producer or any person who imports precious metals must submit to the Forensic Science Laboratory (FSL) of the South African Police Service (SAPS) such specimens of any precious metals produced or imported by him or her as may be prescribed". The gold mines are producers of precious metals, specifically gold, and they are therefore required to submit reference samples, which are then used by the SAPS FSL to maintain a database of gold samples. This database can then be used for comparison purposes during the forensic science of gold fingerprinting. The supporting regulations of the Precious Metals Act, Section 19 stipulate seven requirements for the submission of reference samples and this study intends to give guidelines to security officials employed on the gold mines of South Africa to ensure that these requirements are met and that the validity of the SAPS gold fingerprint database is enhanced through improved sample-collection techniques. The use of gold fingerprinting is part of the forensic investigation process used when trying to establish the origin of gold confiscated as an exhibit during police and mining security crime operations and recoveries, and this allows for victim identification in the resultant criminal trial and proper disposal of recovered gold-bearing materials that are recovered. It is important for the mine security official responsible for reference sample collection to keep in mind that the methodology used when obtaining these samples could be challenged in court and that, therefore, definitive guidelines should be followed to ensure that the most representative samples are collected and that the collection and handing over of samples meet chain of evidence requirements. / Criminology and Security Science / M.Tech (Forensic Investigation)
7

The use of Automated Fingerprint Identification System in identifying fraudulent voters’ registration in Lesotho

Chigando, Lesole John January 2018 (has links)
The research was prompted by constant criticism of the Independent Electoral Commission (IEC) because of its poor voter registration and voters’ roll. Free and fair elections are the strong arm of democracy. The identified research problem was investigated by means of qualitative research. A thorough literature study from various sources of information, a case file analysis and structured interviews were used to gather the required data. The interviews were conducted with fingerprint experts, a data processor and constituency electoral assistants from the Lesotho Mounted Police Service, the National Identity and Civil Registry at the Ministry of Home Affairs and the IEC respectively. It was found that using fingerprints and the Automated Fingerprint Identification System (AFIS) can assist in investigations and in combating voter’s fraud, as fingerprints are unique. AFIS can be utilised for various purposes by institutions in the private and public sectors. Like any apparatus, AFIS has its own strengths and weaknesses. / Criminology and Security Science / M. Tech. (Forensic investigation)

Page generated in 0.1094 seconds