Security Lock System for Mobile Devices Based on Fingerprint Recognition Algorithm

被引:2
作者
Szczepanik, Michal [1 ]
Jozwiak, Ireneusz J. [1 ]
Jamka, Tomasz [1 ]
Stasinski, Karol [1 ]
机构
[1] Wroclaw Univ Technol, Fac Comp Sci & Management, Dept Informat, PL-50370 Wroclaw, Poland
来源
INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2015, PT III | 2016年 / 431卷
关键词
Biometric; Fingerprint; Minutia group; Access controls;
D O I
10.1007/978-3-319-28564-1_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper authors focus on fingerprint recognition biometric systems used by mobile devices to unlock or to confirm user actions. Authors compare the existing fingerprint recognition algorithms and test their own algorithm on fingerprints database, which include changes in the structure as a result of physical damage. They also propose new selective attention algorithms, which help to detect the most sensitive to damage areas, and add it as step of fingerprint analyses for the fingerprint recognition procedures. They also propose a new algorithm, which does not require complex hardware systems, so it can be applied in mobile devices, which restrict unauthorized access to sensitive data or other user's resources. The main goal of this work is to demonstrate the applicability of the developed algorithm for mobile devices.
引用
收藏
页码:25 / 35
页数:11
相关论文
共 17 条
[1]  
[Anonymous], 2005, Biometric Systems: Technology, Design and Performance Evaluation
[2]  
[Anonymous], 2009, HDB FINGERPRINT RECO
[3]  
[Anonymous], 2011, Handbook of Multibiometrics
[4]   Fingerprint matching by thin-plate spline modelling of elastic deformations [J].
Bazen, AM ;
Gerez, SH .
PATTERN RECOGNITION, 2003, 36 (08) :1859-1867
[5]  
Bebis G., 1999, Proceedings 1999 International Conference on Information Intelligence and Systems (Cat. No.PR00446), P452, DOI 10.1109/ICIIS.1999.810315
[6]   Fingerprint classification by directional image partitioning [J].
Cappelli, R ;
Lumini, A ;
Maio, D ;
Maltoni, D .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1999, 21 (05) :402-421
[7]  
Chikkerur S, 2006, LECT NOTES COMPUT SC, V3832, P309
[8]  
Grzeszyk C., 1992, FORENSIC FINGERPRINT
[9]  
He Y., 2005, J HARBIN I TECHNOLOG, V10, P95
[10]  
Hicklin A., 2005, 7271 NIST