by Zhao Feng. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 64-68). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgments --- p.vi / Table of Contents --- p.vii / List of Figures --- p.ix / List of Tables --- p.x / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Automatic Personal Identification --- p.1 / Chapter 1.2 --- Biometrics --- p.2 / Chapter 1.2.1 --- Objectives --- p.2 / Chapter 1.2.2 --- Operational Mode --- p.3 / Chapter 1.2.3 --- Requirements --- p.3 / Chapter 1.2.4 --- Performance Evaluation --- p.4 / Chapter 1.2.5 --- Biometric Technologies --- p.4 / Chapter 1.3 --- Fingerprint --- p.6 / Chapter 1.3.1 --- Applications --- p.6 / Chapter 1.3.2 --- Advantages of Fingerprint Identification --- p.7 / Chapter 1.3.3 --- Permanence and Uniqueness --- p.8 / Chapter 1.4 --- Thesis Overview --- p.8 / Chapter 1.5 --- Summary --- p.9 / Chapter Chapter 2 --- Fingerprint Identification --- p.10 / Chapter 2.1 --- History of Fingerprints --- p.10 / Chapter 2.2 --- AFIS Architecture --- p.12 / Chapter 2.3 --- Fingerprint Acquisition --- p.15 / Chapter 2.4 --- Fingerprint Representation --- p.16 / Chapter 2.5 --- Fingerprint Classification --- p.18 / Chapter 2.6 --- Fingerprint Matching --- p.20 / Chapter 2.7 --- Challenges --- p.21 / Chapter 2.8 --- Combination Schemes --- p.22 / Chapter 2.9 --- Summary --- p.23 / Chapter Chapter 3 --- Live-Scan Fingerprint Database --- p.24 / Chapter 3.1 --- Live-Scan Fingerprint Sensors --- p.24 / Chapter 3.2 --- Database Features --- p.24 / Chapter 3.3 --- Filename Description --- p.28 / Chapter Chapter 4 --- Preprocessing for Skeleton-Based Minutiae Extraction --- p.30 / Chapter 4.1 --- Review of Minutiae-based Methods --- p.31 / Chapter 4.2 --- Skeleton-based Minutiae Extraction --- p.32 / Chapter 4.2.1 --- Preprocessing --- p.33 / Chapter 4.2.2 --- Validation of Bug Pixels and Minutiae Extraction --- p.40 / Chapter 4.3 --- Experimental Results --- p.42 / Chapter 4.4 --- Summary --- p.44 / Chapter Chapter 5 --- Post-Processing --- p.46 / Chapter 5.1 --- Review of Post-Processing Methods --- p.46 / Chapter 5.2 --- Post-Processing Algorithms --- p.47 / Chapter 5.2.1 --- H-Point --- p.47 / Chapter 5.2.2 --- Termination/Bifurcation Duality --- p.48 / Chapter 5.2.3 --- Post-Processing Procedure --- p.49 / Chapter 5.3 --- Experimental Results --- p.52 / Chapter 5.4 --- Summary --- p.54 / Chapter Chapter 6 --- Conclusions and Future Work --- p.58 / Chapter 6.1 --- Conclusions --- p.58 / Chapter 6.2 --- Problems and Future Works --- p.59 / Chapter 6.2.1 --- Problem 1 --- p.59 / Chapter 6.2.2 --- Problem 2 --- p.61 / Chapter 6.2.3 --- Problem 3 --- p.61 / Chapter 6.2.4 --- Future Works --- p.62 / Bibliography --- p.64
Identifer | oai:union.ndltd.org:cuhk.edu.hk/oai:cuhk-dr:cuhk_323956 |
Date | January 2002 |
Contributors | Zhao, Feng., Chinese University of Hong Kong Graduate School. Division of Information Engineering. |
Source Sets | The Chinese University of Hong Kong |
Language | English, Chinese |
Detected Language | English |
Type | Text, bibliography |
Format | print, x, 68 leaves : ill. (some col.) ; 30 cm. |
Rights | Use of this resource is governed by the terms and conditions of the Creative Commons “Attribution-NonCommercial-NoDerivatives 4.0 International” License (http://creativecommons.org/licenses/by-nc-nd/4.0/) |
Page generated in 0.0015 seconds