scispace - formally typeset
Topic

Fingerprint (computing)

About: Fingerprint (computing) is a(n) research topic. Over the lifetime, 20189 publication(s) have been published within this topic receiving 201984 citation(s). The topic is also known as: digital fingerprint & Empreinte numérique.
Papers
More filters

Book
10 Mar 2005-
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,730 citations


Proceedings Article
01 Apr 1992-
TL;DR: This document describes the MD5 message-digest algorithm, which takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input.
Abstract: This document describes the MD5 message-digest algorithm. The algorithm takes as input a message of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input. This memo provides information for the Internet community. It does not specify an Internet standard.

3,429 citations


Journal ArticleDOI
01 Apr 1988-Genomics
TL;DR: Simple formulas are derived showing how the progress of a physical mapping project is affected by the nature of the fingerprinting scheme, and the analytic considerations involved in selecting an appropriate fingerprinting schemes for a particular project are discussed.
Abstract: Results from physical mapping projects have recently been reported for the genomes of Escirerichiu coli, Saccharomycee cerevisiae, and Caenorhabditis elegune, and similar projects are currently being planned for other organisms. In such projects, the physical map is assembled by first “fingerprinting” a large number of clones chosen at random from a recombinant library and then inferring overlaps between clones with sufficiently similar fingerprints. Although the basic approach is the same, there are many possible choices for the fingerprint used to characterize the clones and the rules for declaring overlap. In this paper, we derive simple formulas showing how the progress of a physical mapping project is affected by the nature of the Angerprinting scheme. Using these formulas, we discuss the analytic considerations involved in selecting an appropriate Angerprinting scheme for a particular project. 63 1998 Academic Press, Inc.

911 citations


Journal ArticleDOI
TL;DR: It is argued that imaging provides a useful way to define functional fingerprints because it is possible to compare activations across many cortical areas and across a wide range of tasks.
Abstract: The functions of a cortical area are determined by its extrinsic connections and intrinsic properties. Using the database CoCoMac, we show that each cortical area has a unique pattern of corticocortical connections — a ‘connectional fingerprint’. We present examples of such fingerprints and use statistical analysis to show that no two areas share identical patterns. We suggest that the connectional fingerprint underlies the observed cell-firing differences between areas during different tasks. We refer to this pattern as a ‘functional fingerprint’ and present examples of such fingerprints. In addition to electrophysiological analysis, functional fingerprints can be determined by functional brain imaging. We argue that imaging provides a useful way to define such fingerprints because it is possible to compare activations across many cortical areas and across a wide range of tasks.

891 citations


Journal Article
TL;DR: Gummy fingers, namely artificial fingers that are easily made of cheap and readily available gelatin, were accepted by extremely high rates by 11 particular fingerprint devices with optical or capacitive sensors.
Abstract: Potential threats caused by something like real fingers, which are called fake or artificial fingers, should be crucial for authentication based on fingerprint systems. Security evaluation against attacks using such artificial fingers has been rarely disclosed. Only in patent literature, measures, such as live and well detection, against fake fingers have been proposed. However, the providers of fingerprint systems usually do not mention whether or not these measures are actually implemented in emerging fingerprint systems for PCs or smart cards or portable terminals, which are expected to enhance the grade of personal authentication necessary for digital transactions. As researchers who are pursuing secure systems, we would like to discuss attacks using artificial fingers and conduct experimental research to clarify the reality. This paper reports that gummy fingers, namely artificial fingers that are easily made of cheap and readily available gelatin, were accepted by extremely high rates by 11 particular fingerprint devices with optical or capacitive sensors. We have used the molds, which we made by pressing our live fingers against them or by processing fingerprint images from prints on glass surfaces, etc. We describe how to make the molds, and then show that the gummy fingers, which are made with these molds, can fool the fingerprint devices.

763 citations


Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202214
2021635
20201,201
20191,588
20181,939
20172,054

Top Attributes

Show by:

Topic's top 5 most impactful authors

Anil K. Jain

62 papers, 8.1K citations

Zhang Haiping

41 papers, 338 citations

Christoph Busch

35 papers, 365 citations

Gian Luca Marcialis

24 papers, 677 citations

Jürgen Bajorath

20 papers, 362 citations