The Research and Implementation about AFIS

Article Preview

Abstract:

Automatic identification technology becomes a urgent need of production and life, authentication technology gained worldwide attention because of its high reliability, fingerprint identification technology which applied to social security system can accurately determine protects a person's identity and prevent the phenomenon of the pension of falsely claim that solves this one long-term puzzling problem. Based on the preeminent fingerprint identification algorithm is improved, and combining with actual demand the improved algorithm, Using the fingerprint identification and IC card combination way realization of distributed fingerprint authentication system collection. Through the practical efficiency test analysis proves the whole system is feasible, and the running effect is good by practical application.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

830-833

Citation:

Online since:

July 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Tianjie, Yang xin. Theory and application of Biometrics identification technology. Publishing House of Electronics Industry. 2006: 56-77.

Google Scholar

[2] Wang shengguo. Fingerprint recognition algorithm research and realization implement. China excellent master degree theses full-text database. Hainan normal university. 2007: 38~41.

Google Scholar

[3] Ren chunxiao. Fingerprint algorithm study platform design development and application. Shandong university. 2007: 66~79.

Google Scholar

[4] Liang chuan. The Scenario and Application of Fingerprint Authentication with Electronic Request-Authorization System in Traffic Business. Sichuan university. 2007, (4).

Google Scholar

[5] A. Cavoukian, J. Stoianov. A Positive-Sum Technology that Achieves Strong. Authentication, Security and Privac. 2007, (3).

Google Scholar

[6] D. Simon, Z. Jortega, S. Llanas and J. Gonzalez. Minutiae Extractios chemefor fingerprint recognition systems. International Conferenceon Image Processing(ICIP), Greece, 2001, 10: 7~10.

Google Scholar

[7] W. Green, D. John. Internet and Distributed Application Development Beijing mechanical industry press. 2004(7).

Google Scholar

[8] K. J. Anil, P. Bolle. An Identity-Authentication System Using Fingerprints Proceedings of The IEEE. 1997, 9(9): 85.

Google Scholar

[9] A. Bishmu, S. Das, and S. Nandy. An improved Algorithm for Point Set Pattern Matehing under Rigid Motion. CIAC, LNCS 2653. 2003: 36~45.

Google Scholar