Reinforced Feature Extraction and Multi-Resolution Learning for Driver Mobility Fingerprint Identification

2021 ◽  
Author(s):  
Mahan Tabatabaie ◽  
Suining He ◽  
Xi Yang
2012 ◽  
Vol 155-156 ◽  
pp. 851-855 ◽  
Author(s):  
Bo Feng ◽  
Li Jiuan Zhang ◽  
Hui Tao Zhang

Aiming at the existing fingerprint algorithm refinement not refined exist completely swallowed, skeleton, lines from lines problems such as center, the paper puts forward the rapid thinning algorithm, through the analysis of target of the direction of the trend lines around, choose to remove or keep connected point around, effectively solve traditional iteration algorithm has refined the problems, and refining the template image square ridge tracking, overcome the gradually to the main lines tracking algorithm are too complicated and not easy to realize. Finally the improved algorithm in FPS200 fingerprint sensor as acquisition device automatic fingerprint identification system for verification. The results show that the algorithm has a good refined effect, get the details of the image further satisfy the requirements of feature extraction.


Author(s):  
Hunny Mehrotra ◽  
Pratyush Mishra ◽  
Phalguni Gupta

In today’s high-speed world, millions of transactions occur every minute. For these transactions, data need to be readily available for the genuine people who want to have access, and it must be kept securely from imposters. Some methods of establishing a person’s identity are broadly classified into: 1. Something You Know: These systems are known as knowledge-based systems. Here the person is granted access to the system using a piece of information like a password, PIN, or your mother’s maiden name. 2. Something You Have: These systems are known as token-based systems. Here a person needs a token like a card key, smartcard, or token (like a Secure ID card). 3. Something You Are: These systems are known as inherited systems like biometrics. This refers to the use of behavioral and physiological characteristics to measure the identity of an individual. The third method of authentication is preferred over token-based and knowledge-based methods, as it cannot be misplaced, forgotten, stolen, or hacked, unlike other approaches. Biometrics is considered as one of the most reliable techniques for data security and access control. Among the traits used are fingerprints, hand geometry, handwriting, and face, iris, retinal, vein, and voice recognition. Biometrics features are the information extracted from biometric samples which can be used for comparison. In cases of face recognition, the feature set comprises detected landmark points like eye-to-nose distance, and distance between two eye points. Various feature extraction methods have been proposed, for example, methods using neural networks, Gabor filtering, and genetic algorithms. Among these different methods, a class of methods based on statistical approaches has recently received wide attention. In cases of fingerprint identification, the feature set comprises location and orientation of ridge endings and bifurcations, known as a minutiae matching approach (Hong, Wan, & Jain, 1998). Most iris recognition systems extract iris features using a bank of filters of many scales and orientation in the whole iris region. Palmprint recognition, just like fingerprint identification, is based on aggregate information presented in finger ridge impression. Like fingerprint identification, three main categories of palm matching techniques are minutiae-based matching, correlation-based matching, and ridge-based matching. The feature set for various traits may differ depending upon the extraction mechanism used. The system that uses a single trait for authenticity veri- fication is called unimodal biometric system. A unimodal biometric system (Ross & Jain, 2003) consists of three major modules: sensor module, feature extraction module, and matching module. However, even the best biometric traits face numerous problems like non-universality, susceptibility to biometric spoofing, and noisy input. Multimodal biometrics provides a solution to the above mentioned problems. A multimodal biometric system uses multiple sensors for data acquisition. This allows capturing multiple samples of a single biometric trait (called multi-sample biometrics) and/or samples of multiple biometric traits (called multi-source or multimodal biometrics). This approach also enables a user who does not possess a particular biometric identifier to still enroll and authenticate using other traits, thus eliminating the enrollment problems. Such systems, known as multimodal biometric systems (Tolba & Rezq, 2000), are expected to be more reliable due to the presence of multiple pieces of evidence. A good fusion technique is required to fuse information for such biometric systems.


Author(s):  
J.P. Fallon ◽  
P.J. Gregory ◽  
C.J. Taylor

Quantitative image analysis systems have been used for several years in research and quality control applications in various fields including metallurgy and medicine. The technique has been applied as an extension of subjective microscopy to problems requiring quantitative results and which are amenable to automatic methods of interpretation.Feature extraction. In the most general sense, a feature can be defined as a portion of the image which differs in some consistent way from the background. A feature may be characterized by the density difference between itself and the background, by an edge gradient, or by the spatial frequency content (texture) within its boundaries. The task of feature extraction includes recognition of features and encoding of the associated information for quantitative analysis.Quantitative Analysis. Quantitative analysis is the determination of one or more physical measurements of each feature. These measurements may be straightforward ones such as area, length, or perimeter, or more complex stereological measurements such as convex perimeter or Feret's diameter.


Sign in / Sign up

Export Citation Format

Share Document