• Title/Summary/Keyword: fingerprint image

Search Result 240, Processing Time 0.031 seconds

Matching Algorithms for processing Binarized Fingerprint Image efficiently (이진화된 지문이미지의 효율적 처리를 위한 정합알고리즘)

  • Park, Jong-Min;Kim, Yong-Hun;Cho, Beom-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.381-384
    • /
    • 2004
  • 본 논문에서는 이진화된 지문 이미지를 효율적으로 처리하기 위한 자료 구조인 Union and Division을 이용하여 이진화와 잡음 제거, 그리고 특이점 추출 단계로 이루어진다. Union and Division을 사용하는 경우에, 융선을 추적 가능하다는 성질을 이용하여 동일 융선 상에 있는 두 개의 특이점을 잇는 선분을 기준점으로 하는 정합 알고리즘을 제안한다.

  • PDF

Discussion on the Effect of Improving the Image of a Fingerprint Shape Using a Forensic Light Source with Low-pass Filter (Low-pass 필터가 장착된 법과학 광원을 이용한 지문의 형광 이미지 개선 효과에 대한 논의)

  • Lee, A-Ram;Seo, Bo-Gil;Kim, Ju-Bi;Kim, Duke;Yu, Je-Seol
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.527-534
    • /
    • 2019
  • Most of the prints left on the crime scene are latent prints. And, even after the latent prints have been developed, additional enhancement is required and forensic light sources are mainly used. Depending on the applied technique and the light source used, it is difficult to obtain the ideal enhancement effect when the reflected light cannot be cut off well. In this study, we improved the wavelength of the forensic light source by attaching a low-pass filter, resulting in better quality fingerprint images.

Digital Holographic Security Identification System (디지털 홀로그래픽 보안 인증 시스템)

  • Kim, Jung-Hoi;Kim, Nam;Jeon, Seok-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.89-98
    • /
    • 2004
  • In this paper, we implement a digital holographic security card system that combines digital holographic memory using random phase encoded reference beams with electrical biometrics. Digitally encoded data including a document, a picture of face, and a fingerprint are recorded by multiplexing of holographic memory. A random phase mask encoding reference beams are used as a decoded key to protect illegal counterfeit. As a result, we can achieve a raw BER of 3.6${\times}$10-4 and shift selectivity of 4${\mu}{\textrm}{m}$ using the 2D random phase mask. Also, we develop a recording pattern and image processing which are suitable for a low cost reader without a position sensing photo-detector for real time data extraction and remove danger of fraud from unauthorized person by comparing the reconstructed holographic data with the live fingerprint data.

Android malicious code Classification using Deep Belief Network

  • Shiqi, Luo;Shengwei, Tian;Long, Yu;Jiong, Yu;Hua, Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.454-475
    • /
    • 2018
  • This paper presents a novel Android malware classification model planned to classify and categorize Android malicious code at Drebin dataset. The amount of malicious mobile application targeting Android based smartphones has increased rapidly. In this paper, Restricted Boltzmann Machine and Deep Belief Network are used to classify malware into families of Android application. A texture-fingerprint based approach is proposed to extract or detect the feature of malware content. A malware has a unique "image texture" in feature spatial relations. The method uses information on texture image extracted from malicious or benign code, which are mapped to uncompressed gray-scale according to the texture image-based approach. By studying and extracting the implicit features of the API call from a large number of training samples, we get the original dynamic activity features sets. In order to improve the accuracy of classification algorithm on the features selection, on the basis of which, it combines the implicit features of the texture image and API call in malicious code, to train Restricted Boltzmann Machine and Back Propagation. In an evaluation with different malware and benign samples, the experimental results suggest that the usability of this method---using Deep Belief Network to classify Android malware by their texture images and API calls, it detects more than 94% of the malware with few false alarms. Which is higher than shallow machine learning algorithm clearly.

WWW based on Missing-Child Prevention System Construction using Fingerprint (WWW 기반 지문을 이용한 미아방지시스템 구축)

  • 송영옥;김성영;조용환
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.2
    • /
    • pp.64-72
    • /
    • 2002
  • In this paper, the aims are to develop convenient and safe system-solutions, looking for missing-child, which is one of the increasing social problems, on the basis of World Wide Web. Finger-print cognition has been researching from long time before, as well as Bio-cognition technology, which is adapted for private-cognition in the field of human-cognition. By the fingerprint cognition, which discern finger print, which is generally used in Bio-cognition and is characterized each by using image-processing, missing-child protection system on the basis of Word Wide Web is designed and implemented in this paper. Additionally, indicates plans for revitalization method of this system.

  • PDF

Volume holographic correlator for fingerprint recognition (지문 인식을 위한 체적 홀로그래픽 광상관기)

  • 이승현;김은수
    • Korean Journal of Optics and Photonics
    • /
    • v.9 no.6
    • /
    • pp.385-389
    • /
    • 1998
  • In this paper, we propose an optical correlator system using volume holograms for database of matched filters. Optical correlator has high speed and parallel processing characteristics of optics. Matched filters are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference images of database are prerecorded in a photorefractive crystal in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database can be achieved by rotating the crystal by use of a step motor. Experimental results show that the proposed system can be used for the fingerprint recognition.

  • PDF

A Hardware Implementation of Fingerprint Identification Thinning Algorithm (지문인식 세선화 알고리즘의 하드웨어 구현)

  • Woo, Yun-Hee;Ha, Mi-Na;Jung, Seung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.493-496
    • /
    • 2010
  • This paper proposes an effective hardware scheme for thinning stage processing of a fingerprint identification algorithm based on minutiae with 40% cycle occupation of 32-bit RISC microprocessor. The thinning step is needed to be processed by hardware block, because it is performed repeatedly by processing the same operation using an image window masking method. It can reduce the burden of the system and improve speed. The hardware is implemented by HDL and simulated. The result is compared with a conventional one.

  • PDF

Design and Experiment of an Optical System using a Prism with a High Enough Refractive Index for Wet Fingerprint Identification (물 묻은 지문을 인식하기 위한 프리즘 광학계의 설계 및 실험적 고찰)

  • Kang, Myung-Hoon;Kim, Jin-Su;Jung, Jin-Woo;Ko, Eun-Mi;Kim, Jae-Gu;Cho, Guan-Sik;Song, Han-Jung;Hwang, Jae-Mun
    • Korean Journal of Optics and Photonics
    • /
    • v.18 no.6
    • /
    • pp.395-400
    • /
    • 2007
  • We propose a design and analysis of an optical system using a prism with a high enough refractive index for wet fingerprint identification. Important parameters including the tilting angle($\beta$) of the $1^{st}$ image plane, an anamorphic distortion, and a tilt of image plane are considered in terms of the apex angle of the prism($\alpha$) and refractive index of the prism material. Our suggestion on refractive index and apex angle of the prism corroborates well with experimental results.

A Robust Watermarking Algorithm using Wavelet for Biometric Information (웨이블렛을 이용한 생체정보의 강인한 워터마킹 알고리즘)

  • Lee, Wook-Jae;Lee, Dae-Jong;Moon, Ki-Young;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.5
    • /
    • pp.632-639
    • /
    • 2007
  • This paper presents a wavelet-based watermarking algorithm to securely hide biometric features such as face and fingerprint and effectively extract them with less distortion of the concealed data. To hide the biometric features, we proposed a determination method of insert location based on wavelet transform and adaptive weight method according to the image characteristics. The hidden features are effectively extracted by applying the inverse wavelet transform to the watermarked image. To show the effectiveness, we analyze the various performance such as PSNR and correlation of watermark features before and after applying watermarking. Also, we evaluate the effect of watermaking algorithm with respect to biometric system such as recognition rate. Recognition rate shows 98.67% for multimodal biometric systems consisted of face and fingerprint. From these, we confirm that the proposed method makes it possible to effectively hide and extract the biometric features without lowering recognition rate.

Design of a Capacitive Detection Circuit using MUX and DLC based on a vMOS (vMOS 기반의 DLC와 MUX를 이용한 용량성 감지회로)

  • Jung, Seung-Min
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.4
    • /
    • pp.63-69
    • /
    • 2012
  • This paper describes novel scheme of a gray scale capacitive fingerprint image for high-accuracy capacitive sensor chip. The typical gray scale image scheme used a DAC of big size layout or charge-pump circuit of non-volatile memory with high power consumption and complexity by a global clock signal. A modified capacitive detection circuit of charge sharing scheme is proposed, which uses DLC(down literal circuit) based on a neuron MOS(vMOS) and analog simple multiplexor. The detection circuit is designed and simulated in 3.3V, $0.35{\mu}m$ standard CMOS process. Because the proposed circuit does not need a comparator and peripheral circuits, a pixel layout size can be reduced and the image resolution can be improved.