|
[1] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, “Handbook of fingerprint recognition,” Springer-Verlag, 2003. [2] L. Hong, Y. Wan, and A. Jain, “Fingerprint image enhancement: algorithm and performance evaluation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 777–789, Aug 1998. [3] S. Chikkerur, A. N. Cartwright, and V. Govindaraju, “Fingerprint enhancement using stft analysis,” Pattern Recog., no. 1, pp. 198–211, 2007. [4] J. Bartunek, M. Nilsson, B. Sallberg, and I. Claesson, “Adaptive fingerprint image enhancement with emphasis on preprocessing of data,” IEEE Transactions on Image Processing, no. 2, pp. 644–656, Feb. 2013. [5] J. Yang, N. Xiong, and A. Vasilakos, “Two-stage enhancement scheme for low-quality fingerprint images by learning from the images,” IEEE Transactions on Human-Machine Systems, no. 2, pp. 235–248, March 2013. [6] J. C. Amengual, A. Juan, J. C. Pdrez, F. Prat, S. Sez, and J. M. Vilar, “Real-time minutiae extraction in fingerprint images,” In Proc. of the 6th Int. Conf. on Image Processing and its Applications, pp. 871–875, July 1997. [7] E. Liu, H. Zhao, J. Liang, L. Pang, M. Xie, and H. Chen, “A key binding system based on n-nearest minutiae structure of fingerprint,” Pattern Recognition, pp. 666–675, April 2011. [8] A. Ross, A. Jain, and J. Reisman, “A hybrid fingerprint matcher,” Pattern Recognition, pp. 166–1673, August 2002. [9] N. Ratha, K. Karu, S. Chen, and A. Jain, “A real-time matching system for large fingerprint databases,” IEEE trans. Pattern Analysis and Machine Intelligence, vol. 18, no. 8, pp. 799–813, 1996. [10] S. Chang, F. Cheng, W. Hsu, and G. Wu, “Fast algorithm for point pattern matching invariant to translations, rotations and scale change,” Pattern Recognition, vol. 30, pp. 311–320, 1997. [11] A. Jain and L. Hong, “On-line fingerprint verification,” Pattern Recog. (ICPR), pp. 596–600, August 1996. [12] V. K. Alilou, “Fingerprint matching: A simple approach.” [Online]. Available: http://www.mathworks.com/matlabcentral/fileexchange/44369- fingerprint-matching–a-simple-approach [13] J. Feng, Z. Ouyang, and A. Cai, “Fingerprint matching using ridges,” Pattern Recognition, pp. 2131–2140, 2006. [14] A. Hrechak and J. McHugh, “Automated fingerprint recognition using structural matching,” Pattern Recognition, pp. 893–904, 1990. [15] A. Willis and L. Myers, “A cost-effective fingerprint recognition system for use with low-quality prints and damaged fingertips,” Pattern Recognition, vol. 34, pp. 255–270, 2001. [16] X. Jiang and W. Yau, “Fingerprint minutiae matching based on local and global structures,” Int. Conf. Pattern Recognition, vol. 2, pp. 6038–6041, 2000. [17] N. Ratha, V. D. Pandit, R. M. Bolle, and V. Vaish, “Robust fingerprint authentication using local structural similarity,” Proc. IEEE Workshop Applications of Computer Vision,, pp. 29–34, 2000. [18] G. Parziale and A. Niel, “A fingerprint matching using minutiae triangulation,” in Proc. Biom. Authenticat., pp. 241–2482, 2004. [19] H. Deng and Q. Huo, “Minutiae matching based fingerprint verification using delaunay triangulation and algined-edge-quided triangle matching,” in Proc. 5th internaltional AVBPA conference, pp. 270–278, 2005. [20] X. Linag, A. Bishnu, and T. Asano, “A robust fingerprint indexing scheme using minutia neighborhood structure and low-order delaunay triangles,” IEEE trans. Information Forensics and Security, vol. 2, no. 4, pp. 721–733, 2007. [21] W. Yang, J. Hu, and S. Wang, “A delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement,” IEEE Transactions on Information Forensics and Security, pp. 1179–1192, July 2014. [22] R. Cappelli, M. Ferrara, and D. Maltoni, “Minutiae cylinder-code: A new representation and matching technique for fingerprint recognition,” IEEE Trans. Pattern Analysis and Machine Intelligence, pp. 2128–2141, December 2010. [23] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in Proc. 6th ACM Conf. Comput. Commun. Security, pp. 28–36, 1999. [24] A. Juels and M. Sudan, “A fuzzy vault scheme,” Des., Codes Cryptogr., vol. 38, no. 2, pp. 237–257, 2006. [25] H. Kuhn, “The hungarian method for the assignement problem,” Naval Research Logistics Quarterly, vol. 2, pp. 83–97, 1955. [26] R. Cappelli, M. Ferrara, D. Maltoni, and M. Tistarelli, “Mcc: a baseline algorithm for fingerprint verification in fvc-ongoing,” Int. Conf. Control, Automation, Robotics and Vision, pp. 19–23, 2010. [27] BioLab, “The fvc2000 datasets,” 2015. [Online]. Available: http://bias.csr.unibo.it/fvc2000 [28] BioLab., “The fvc2002 datasets,” 2015. [Online]. Available: http://bias.csr.unibo.it/fvc2002 [29] M. Fons, F. Fons, and E. Canto, “Embedded vlsi accelerators for fingerprint signal processing,” IEEE International Symposium on Intelligent Signal Processing, pp. 1–6, 2007. [30] A. Alilla, M. Faccio, T. Vali, G. Marotta, and L. DeSantis, “A new low cost fingerprint recognition system on fpga,” IEEE International conf. on Industrial Technology(ICIT), pp. 988–993, 2013. [31] P. D. Gutierrez, M. Lastra, F. Herrera, and J. M. Benotez, “A high performance fingerprint matching system for large databases based on gpu,” IEEE Trans. Information Forensics and Security, pp. 62–71, January 2014. |