• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Mei Yuan, Sun Huaijiang, and Xia Deshen. A Gradient-Based Robust Method for Estimation of Fingerprint Orientation Field[J]. Journal of Computer Research and Development, 2007, 44(6): 1022-1031.
Citation: Mei Yuan, Sun Huaijiang, and Xia Deshen. A Gradient-Based Robust Method for Estimation of Fingerprint Orientation Field[J]. Journal of Computer Research and Development, 2007, 44(6): 1022-1031.

A Gradient-Based Robust Method for Estimation of Fingerprint Orientation Field

More Information
  • Published Date: June 14, 2007
  • Automatic fingerprint identification system (AFIS), which is one of the most important biometric authentication, has been extensively studied and good performance on small database is obtained, but there still exist some critical issues such as long processing time on large databases and low matching rate on poor image. To solve these problems, improvements of fingerprint classification and identification are needed. As a global feature of fingerprint, orientation field which describes the local direction of the ridge-valley pattern plays a very important role in both topics mentioned above. Many fingerprint orientation estimating methods based on gradient have been proposed, but their results are not very satisfactory, especially for poor images. In this paper, a gradient based robust method for estimation of fingerprint orientation fields is proposed. This new method mainly comprises three steps: firstly, normalize the point-gradient vectors and calculate the block-gradient vectors and the corresponding block-coherence; then detect the noisy areas to eliminate the side effect of noise diffusing; finally, re-estimate all block-gradient vectors based on iteration and transform the gradient field to orientation field. Compared with the previously proposed gradient-based methods, experiments conducted on FVC 2000 and FVC 2004 show that the proposed method is more accurate and more robust against noise, and is able to predict orientation field within the large noisy areas.
  • Related Articles

    [1]Hu Yujing, Gao Yang, An Bo. Online Counterfactual Regret Minimization in Repeated Imperfect Information Extensive Games[J]. Journal of Computer Research and Development, 2014, 51(10): 2160-2170. DOI: 10.7544/issn1000-1239.2014.20130823
    [2]Tian Youliang, Peng Chenggen, Ma Jianfeng, Jiang Qi, Zhu Jianming. Game-Theoretic Mechanism for Cryptographic Protocol[J]. Journal of Computer Research and Development, 2014, 51(2): 344-352.
    [3]Zhu Guiming, Jin Shiyao, Guo Deke, Wei Hailiang. SOSC:A Self-Organizing Semantic Cluster Based P2P Query Routing Algorithm[J]. Journal of Computer Research and Development, 2011, 48(5): 736-745.
    [4]Cheng Bailiang, Zeng Guosun, Jie Anquan. Study of Multi-Agent Trust Coalition Based on Self-Organization Evolution[J]. Journal of Computer Research and Development, 2010, 47(8): 1382-1391.
    [5]Shi Chunqi, Shi Zhiping, Liu Xi, Shi Zhongzhi. Image Segmentation Based on Self-Organizing Dynamic Neural Network[J]. Journal of Computer Research and Development, 2009, 46(1): 23-30.
    [6]Luo Junhai and Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2008, 45(10): 1704-1710.
    [7]Wang Wei and Zeng Guosun. Self-Organization Resource Topology Revolution Based on Trust Mechanism[J]. Journal of Computer Research and Development, 2007, 44(11): 1849-1856.
    [8]Huang Guanyao, Hong Peilin, and Li Jinsheng. P2P-VCG: A Game Theory Proposal for Bandwidth Allocation[J]. Journal of Computer Research and Development, 2007, 44(1): 78-84.
    [9]Tang Jiuyang, Zhang Weiming, Xiao Weidong, and Tang Daquan. Self-Organizing Peer-to-Peer Network Based on Community Mimicking Social Society[J]. Journal of Computer Research and Development, 2006, 43(8): 1383-1390.
    [10]Hou Yuexian, Ding Zheng, and He Pilian. Self-Organizing Isometric Embedding[J]. Journal of Computer Research and Development, 2005, 42(2): 188-195.

Catalog

    Article views PDF downloads Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return