期刊文献+

一种基于网络的大型指纹数据库检索方法 被引量:1

A Search Way Based on Internet Fingerprint Large Database
在线阅读 下载PDF
导出
摘要 随着指纹识别技术的广泛应用和网络技术的发展,基于网络的指纹自动识别系统面临着如何提高检索速度和准确度的问题。本文根据指纹数据库自身的特点,提出了一种新的检索和索引网络大型指纹数据库的方法。该算法利用指纹的类别和局部特征建立了三级索引,有利于缩小检索空间,提高检索速度。在算法中提出了一种新的指纹分类方法,将指纹分为八类:弧形、尖拱形、左旋形、右旋形、正涡形、左涡形、右涡形、混合形。该算法利用core点和delta点的位置、数目和方向判断指纹的类别,有效地解决了采集时对指纹的旋转、平移和形变不变性的要求,并有助于进一步缩小检索空间,提高检索速度。实验证明,效果良好。 With the wide use of the fingerprint recognition and Internet development,FAIS (fingerprint automatic identification system)based on Internet confronts how to improve search rate and accuracy. On the basis of the features of the fingerprint database, this paper proposes a new method of searching and indexing the large net fingerprint database. This method uses the fingerprint classification and regional features to set up the three-level index. It helps reduce the search space and increase the search rate. Meantime, a new fingerprint classification way is presented in this paper. Fingerprint is classified into eight categories:arch, tented arch, left loop, right loop, vertical whorl, left whorl, right whorl, mixture. This classification algorithm not only uses the location and number of core points and delta points, but also uses their direction. It successfully solves the problem of fingerprint rotation, translation and transformation, and further reduces the search space and improves search rate. The experiment proves that the search way is efficient.
出处 《计算机科学》 CSCD 北大核心 2005年第8期196-199,共4页 Computer Science
  • 相关文献

参考文献8

二级参考文献24

  • 1[1]Jain A,Ling Hong.On-line Fingerprint Verification.IEEE Trans.on Pattern Analysis and Machine Intelligence,1997,19(4)
  • 2[2]Ling Hong,Wan Yifei,Jain A.Fingerprint Image Enhancement.IEEE Trans.on Pattern Analysis and Machine Intelligence,1998,120(8)
  • 3[1]Ellison C, Schneier B. Ten Risk of PKI: What You're not Being Told About Public Key Infrastructure[J]. Computer Security Journal, 2000, 16(1):i-7.
  • 4[2]Young A, Yung M. The Dark Side of Blackbox Cryptography or Should We Trust Capstone? [ A]. Advances in Cryptology--Cryp-to'96 Proc[C]. Springer-Verlag, 1996.
  • 5[3]Fox B, LaMacchia B. Certificate Revocation: Mechanics and Meaning[A]. Proc Financial Cryptography' 98[C]. 1998. 158-164.
  • 6[4]McDaniel P, Rubin A. A Response to "Can We Eliminate Certificate Revocation Lists.? "[ A ]. Proc Financial Cryptography 2000[C]. 2000.245 - 258.
  • 7[5]Reiter M K, Stubblebine S G. Authentication Metric Analysis and Design[J]. ACM Trans on Information and System Security, 1999,2(2):138- 158.
  • 8[6]Lampson B, Abadum M, Burrows M, et al. Authentication in Distributed Systems: Theory and Practice[J]. ACM Trans on Computer Systems, 1992,10(4): 265 - 310.
  • 9[7]Millen K, Wright. Reasoning About Trust and Insurance in a Public Key Infrastructure [A]. IEEE Computer Security Foundations Workshop(CSFW-13) [ C]. 2000.
  • 10[1]H C Lee, R E Gaensslen. Advances in Fingerprint Technology. New York: Elsevier, 1991

共引文献16

同被引文献6

  • 1祝恩,殷建平,张国敏.指纹纹路间距的计算[J].微电子学与计算机,2004,21(10):7-9. 被引量:6
  • 2Leong Chung Ern. Fingerprint Classification Approaches: .An Overview[C]//Proc. of the 6th International Symposium on Signal Processing and Its Applications. [S. l.]: IEEE Press, 2001.
  • 3马惠敏,苏光大,黄如克.一种用于大库匹配的指纹分类算法[C]//第12届全国神经网络计算学术会议论文集.青岛,中国:[出版者不详],2003.
  • 4Qi Jin, Shi Zhongchao, Zhao Xuying, et al. Measuring Fingerprint Image Qualiy Using Gradient[C]//Proc. of the SPIE'05. [S. l.]: IEEE Press, 2005.
  • 5亓秀燕,尹义龙,骆功庆,刘懋.基于频谱能量的指纹分类[J].计算机工程与设计,2008,29(8):2010-2013. 被引量:1
  • 6张雄,贺贵明.基于宏观曲率的指纹特征提取和分类[J].计算机研究与发展,2003,40(3):453-458. 被引量:12

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部