A New Approach for Fingerprint Authentication in Biometric Systems Using BRISK Algorithm
How to cite (IJASEIT) :
Yoichi Seto, “Development of Personal Authentication Systems using Fingerprint with Smart Cards and Digital Signature Technologies", Seventh International Conference on Control Automation Robotics and Vision (ICARCV’OZ), Singapore, pp: 996-1001, 2002.
A. C. Leniski, R. C. Skinner, S. F. McGann, and S. J. Elliott, "Securing the Biometric Model," presented at Security Technology, in proceedings of the 37th IEEE Annual 2003 International Carnahan Conference, 2003.
Karthik Nandakumar, " Multi-biometric Systems: Fusion Strategies and Template Security", PhD Thesis, Department of Computer Science and Engineering, Michigan State University, USA, pp: 1-202, 2008.
Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K. Jain, "Biometric Cryptosystems: Issues and Challenges", in proceeding of IEEE, Vol.92, No.6, pp: 948-960, 2004.
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, B.V.K.V Kumar, "Biometric Encryption", in R.K. Nichols, editor ICSA Guide to cryptography, McGraw Hill New York, pp: 42-46, 1999.
Umma Hany, Lutfa Akter, "Speeded Up Robust Feature Extraction and Matching for Fingerprint Recognition", 2nd International Conference on Electrical Engineering, Information and Communication Technology, IEEE, 2015.
Ami M Patel, Rikin Thakkar,” Object Based Image Retrieval from Database using Local and Global Features”, IJIRT, Vol.1, No.12, 2015.
Guesmi, H., Trichili, H., Alimi, A.M., Solaiman, B, “Curvelet Transform-Based Features Extraction for Fingerprint Identification”, in Biometrics Special Interest Group (BIOSIG), BIOSIG-Proceedings of the International Conference of the IEEE, pp. 1-5, 2012.
R. Shakthi Pooja, S. Swetha,S., K. Alice, “Robust Fingerprint Matching Using Ring Based ZERNIKE Moments: A Survey.” International Journal of Engineering Science and Research Technology, Vol. 6, No. 3, pp. 329-340, 2017.
R. Kumar, P. Chandra, M. Hanmandlu: "Rotation Invariant Fingerprint Matching Using Local Directional Descriptors", International Journal of Computational Intelligent Studies, Vol. 3, No. 4, PP. 292-319, 2014.
P.H. Saini, Rakesh S., “Perspective of Fingerprint Recognition Using Robust Local Feature.” International of Science and Research, Vol. 4, No. 6, pp. 2428-2433, 2015.
Sheng Li, A. C. Kot, “Fingerprint Combination for Privacy Protection", IEEE Transactions on Information Forensics and Security, Vol.8, No.2, PP. 350-360, 2012.
Karthik Nandakumar, " Multi-biometric Systems: Fusion Strategies and Template Security", PhD Thesis, Department of Computer Science and Engineering, Michigan State University, USA, pp: 1-202, 2012.
David G. Lowe, "Distinctive Image Features from Scale-Invariant Key points", International Journal of Computer Vision, Vol.60, No.2, pp 91-110, 2004.
H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool, 2008. "Speeded-Up Robust Features (SURF)" Journal of Computer Vision and Image Understanding, Vol.110, No.3, PP.346-359.
Leutenegger S. Chli M., Siegwart R. Y, "Binary Robust Invariant Scalable Key-Points", Journal of Computer Vision, (ICCV), IEEE, pp 2548-2555, 2011.
Rublee, Ethan; Rabaud, Vincent; Konolige, Kurt; Bradski, Gary, "ORB: an efficient alternative to SIFT or SURF", Journal of Computer Vision, (ICCV), IEEE International Conference on Computer Vision (ICCV), 2011.
J. Matas, O. Chum, M. Urban, T. Pajdla, "Robust Wide Baseline Stereo from Maximally Stable Extremal Regions.” Proc. of British Machine Vision Conference, pp 384-396, 2002.
Meenu, Surender Singh, " Enhanced the Fingerprint Matching using BRISK, SURF & MSER” International Journal of Advance Research in Computer Science and Management Studies, Vol.4, No.7, pp 78-83, 2016.
Leutenegger, Stefan, Margarita Chli, and Roland Y. Siegwart. “BRISK: Binary robust invariant scalable keypoints.” Computer Vision (ICCV), 2011 IEEE International Conference on. IEEE, 2011.
L. Najman and M. Couprie: "Building the component tree in quasi-linear time" Archived 2011-04-09 at the Wayback Machine.; IEEE Transaction on Image Processing, Volume 15, Numbers 11, pp 3531-3539, 2006.
Kant C., Nath R., “Reducing Process-Time for Fingerprint Identification System”, International Journals of Biometric and Bioinformatics, Vol.3, No. 1, pp. 1-9, 2009.
P. S. Sanjekar, P. S., Dhabe, “Fingerprint Verification Using Haar Wavelet”, 2nd International Conference on Computer Engineering and Technology, IEEE, Vol.3, pp. 361-365, 2010.
Yunfei Zhong, Xiaoqi Peng, “SIFT Based Low Quality Fingerprint LSH Retrieving and Recognition Method.” International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 8, No. 8, pp. 263-272, 2015.
P.H. Saini, Rakesh S., “Perspective of Fingerprint Recognition Using Robust Local Feature.” International of Science and Research, Vol. 4, No. 6, pp. 2428-2433, 2015.
Rohit K. Dubey, Jonathan, V. L.L. Thing, “Fingerprint Liveliness Detection”, Information Forensics and Security, Vol.11, No.7, 2016.
Martin A. Fischler, Robert C. Bolles, “"Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography", Comm. ACM., Vol.24, No.6, pp: 381-395, 1981.
Tawfiq A. AL-asadi, Ahmed J.Obaid, “Object detection and Recognition by Using Enhanced Speeded Up Robust Feature” International Journal of Computer Science and Network Security, Vol.16 , No. 4, pp. 66-71, 2016.
UPEK fingerprint Database, BERKELEY, Calif.--(BUSINESS WIRE) --May 3, 2006, UPEK, Inc. Steve Hahm, downloaded from http://www.advancedsourcecode.com/fingerprintdatabase.asp, last updated 2012.
Ertugrul Bayraktar, Pinar Boyraz, “Analysis of Feature Detector and Descriptor Combinations with a Localization Experiment for Various Performance Metrics” Turkish Journal of Electrical Engineering & Computer Sciences, pp. 2444 - 2454, 2017.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).