{"title":"指纹识别中的模糊特征选择","authors":"V. Sagar, D.B.L. Ngo, K. Foo","doi":"10.1109/CCST.1995.524738","DOIUrl":null,"url":null,"abstract":"Fingerprint verification systems are expensive and complex, requiring sensing facilities, preprocessing algorithms for image quality enhancement and procedures for ridge and minutiae detection which can be used for classification, verification and recognition. To-date, the main published approaches to fingerprint recognition break down the process of ridge detection into smoothing or early pre-processing, edge detection, thresholding, binarization and subsequently thinning. This whole procedure can be very computationally expensive and hence requires more expensive hardware to meet the response-time requirements. The approach presented in this paper is based on fuzzy logic techniques. This has the advantage of being simple and less expensive.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":"{\"title\":\"Fuzzy feature selection for fingerprint identification\",\"authors\":\"V. Sagar, D.B.L. Ngo, K. Foo\",\"doi\":\"10.1109/CCST.1995.524738\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fingerprint verification systems are expensive and complex, requiring sensing facilities, preprocessing algorithms for image quality enhancement and procedures for ridge and minutiae detection which can be used for classification, verification and recognition. To-date, the main published approaches to fingerprint recognition break down the process of ridge detection into smoothing or early pre-processing, edge detection, thresholding, binarization and subsequently thinning. This whole procedure can be very computationally expensive and hence requires more expensive hardware to meet the response-time requirements. The approach presented in this paper is based on fuzzy logic techniques. This has the advantage of being simple and less expensive.\",\"PeriodicalId\":376576,\"journal\":{\"name\":\"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1995-10-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"15\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1995.524738\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1995.524738","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fuzzy feature selection for fingerprint identification
Fingerprint verification systems are expensive and complex, requiring sensing facilities, preprocessing algorithms for image quality enhancement and procedures for ridge and minutiae detection which can be used for classification, verification and recognition. To-date, the main published approaches to fingerprint recognition break down the process of ridge detection into smoothing or early pre-processing, edge detection, thresholding, binarization and subsequently thinning. This whole procedure can be very computationally expensive and hence requires more expensive hardware to meet the response-time requirements. The approach presented in this paper is based on fuzzy logic techniques. This has the advantage of being simple and less expensive.