References |
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S., (2005) Handbook of Fingerprint Recognition, , Springer, New York; Bhanu, B., Tan, X., (2004) Computational Algorithms for Fingerprint Recognition, , Kluwer Academic Publishers, Boston; Mansukhani, P., Tulyakov, S., Govindaraju, V., A framework for efficient fingerprint identification using a minutiae tree (2010) IEEE Syst. J, 4 (2), pp. 126-137; http://www.supremainc.com/eng/technology/technology03.php?mark=3, Suprema fingerprint identification algorithm; http://www.supremainc.com/eng/technology/technology06.php?mark=6, MINEX test; Hong, L., Wan, Y., Jain, A., Fingerprint image enhancement: Algorithm and performance evaluation (1998) IEEE Trans. Pattern Anal. Mach. Intell, 20 (8), pp. 777-789; Tico, M., Vehvilainen, M., Saarinen, J., A method of fingerprint image enhancement based on second directional derivatives (2005) IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 985-988; Nilsson, M., Dahl, M., Claesson, I., Gray-scale image enhancement using the SMQT (2005) IEEE International Conference on Image Processing, ICIP 2005, 1, pp. 933-936; Bartunek, J., Nilsson, M., Nordberg, J., Claesson, I., Adaptive fingerprint binarization by frequency domain analysis (2006) Fortieth Asilomar Conference on Signals, Systems and Computers, ACSSC’06, pp. 598-602; Gottschlich, C., Curved-region-based ridge frequency estimation and curved Gabor filters for fingerprint image enhancement (2012) IEEE Trans. Image Proc, 21 (4), pp. 2220-2227; Bebis, G., Deaconu, T., Georgiopulos, M., Fingerprint Identification Using Delaunay Triangulation (1999) IEEE International Conference on Intelligence, Information, and Systems, ICIIS; Liu, N., Yin, Y., Zhang, H., A fingerprint matching algorithm based on delaunay triangulation net Proceedings of the 2005 the Fifth International Conference on Computer and Information Technology (CIT05); Liang, X., Bishnu, A., Asano, T., A robust fingerprint indexing scheme using minutia neighborhood structure and low-order delaunay triangles (2007) IEEE Trans. Inf. Forensics Secur, 2 (4), pp. 721-733; http://www.nist.gov/itl/iad/ig/nbis.cfm, NIST Biometric Image Software; http://www.nist.gov/srd/nistsd4.cfm, NIST Special Database 4; Du, Q., Wang, D., Recent progress in robust and quality delaunay mesh generation (2006) J. Comput. Appl. Math, 195 (1-2), pp. 8-23; Skvortsov, A.V., A survey of algorithms fro constructing a Delaunay triangulation (2002) Numer. Methods Program, 3, pp. 14-39; Guibas, L., Knuth, D., Sharir, M., Randomized incremental construction of Delaunay and Voronoi diagrams (1992) Algorithmica, 7, pp. 381-413; Cappelli, R., Ferrara, M., Maltoni, D., Minutia cylinder-code: A new representation and matching technique for fingerprint recognition (2010) IEEE Trans. Pattern Anal. Mach. Intell, 32 (12), pp. 2128-2141; http://www.prosoft.ru/company/en/, Prosoft Ltd |