AUTOMATIC FINGERPRINT MATCHING

被引:0
|
作者
PRESTON, F
机构
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:199 / 202
页数:4
相关论文
共 50 条
  • [1] A novelty automatic fingerprint matching system
    Chen, Tianding
    [J]. INTELLIGENT COMPUTING IN SIGNAL PROCESSING AND PATTERN RECOGNITION, 2006, 345 : 100 - 111
  • [2] Automatic fingerprint matching using improved vector matching algorithm
    Wang Yuan
    Zhou Fuqiang
    Yao Lixiu
    [J]. ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL II, 2007, : 408 - +
  • [3] Capacitive fingerprint sensor chip for automatic matching
    Lim, TW
    Moghavvemi, M
    [J]. IEEE 2000 TENCON PROCEEDINGS, VOLS I-III: INTELLIGENT SYSTEMS AND TECHNOLOGIES FOR THE NEW MILLENNIUM, 2000, : A442 - A446
  • [4] Curvature-based matching approach for automatic fingerprint identification
    Saleh, AA
    Adhami, RR
    [J]. PROCEEDINGS OF THE 33RD SOUTHEASTERN SYMPOSIUM ON SYSTEM THEORY, 2001, : 171 - 175
  • [5] FINGERPRINT MATCHING
    Jain, Anil K.
    Feng, Jianjiang
    Nandakumar, Karthik
    [J]. COMPUTER, 2010, 43 (02) : 36 - 44
  • [6] Latent Fingerprint Matching
    Jain, Anil K.
    Feng, Jianjiang
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2011, 33 (01) : 88 - 100
  • [7] Externalized fingerprint matching
    Barral, C
    Coron, JS
    Naccache, D
    [J]. BIOMETRIC AUTHENTICATION, PROCEEDINGS, 2004, 3072 : 309 - 315
  • [8] AUTOMATIC FINGERPRINT IDENTIFICATION
    ELECCION, M
    [J]. IEEE SPECTRUM, 1973, 10 (09) : 36 - 45
  • [9] Stacking Fingerprint Matching Algorithms for Latent Fingerprint Identification
    Valdes-Ramirez, Danilo
    Angel Medina-Perez, Miguel
    Monroy, Raul
    [J]. PROGRESS IN PATTERN RECOGNITION, IMAGE ANALYSIS, COMPUTER VISION, AND APPLICATIONS (CIARP 2019), 2019, 11896 : 230 - 240
  • [10] Efficient Sensor Fingerprint Matching Through Fingerprint Binarization
    Bayram, Sevinc
    Sencar, Husrev Taha
    Memon, Nasir
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (04) : 1404 - 1413