Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
Deep Fingerprint Matching From Contactless To Contact Fingerprints For Increased Interoperability, Alexander James Wilson
Deep Fingerprint Matching From Contactless To Contact Fingerprints For Increased Interoperability, Alexander James Wilson
Graduate Theses, Dissertations, and Problem Reports
Contactless fingerprint matching is a common form of biometric security today. Most smartphones and associated apps now let users opt into using this form of biometric security. However, it’s difficult to match a finger-photo to a fingerprint because of perspective distortion occurring at the edges of the finger-photo, so direct matching using conventional methods will not be as accurate due to a lack of sufficient matching minutiae points. To address this issue, we propose a deep model, Perspective Distortion Rectification Model (PDRM), to estimate the fingerprint correspondence for finger-photo images in order to recover more minutiae points. Not only do …
Single And Differential Morph Attack Detection, Baaria Chaudhary
Single And Differential Morph Attack Detection, Baaria Chaudhary
Graduate Theses, Dissertations, and Problem Reports
Face recognition systems operate on the assumption that a person's face serves as the unique link to their identity. In this thesis, we explore the problem of morph attacks, which have become a viable threat to face verification scenarios precisely because of their inherent ability to break this unique link. A morph attack occurs when two people who share similar facial features morph their faces together such that the resulting face image is recognized as either of two contributing individuals. Morphs inherit enough visual features from both individuals that both humans and automatic algorithms confuse them. The contributions of this …