scispace - formally typeset
Search or ask a question

Showing papers on "Fingerprint recognition published in 1998"


Patent
26 Nov 1998
TL;DR: In this paper, the authors propose a method for accessing and operating a vehicle by means of at least one fingerprint sensor installed inside the vehicle at a convenient location and, optionally, outside the vehicle in or near a door handle.
Abstract: Apparatus, and a corresponding method for its use, for gaining access to and operating a vehicle, such as a car (10), by means of at least one fingerprint sensor (16) installed inside the vehicle at a convenient location and, optionally, outside the vehicle (at 14), in or near a door handle (12). Once an authorized user's identify has been verified in a fingerprint matching device (30), various vehicle subsystems are automatically adjusted to the identified user's preferred settings, which are stored in a memory (98). In addition, starting the vehicle engine is enabled if an interior fingerprint sensor has been used, or the vehicle is unlocked if an exterior fingerprint sensor has been used. Vehicle subsystems that are automatically adjusted to the user preferences include seats (38), mirrors (40), steering wheel (42), climate control (44), airbag (52), telephone (46), radio (50) and onboard computer (54), as well as performance control features (48) such as suspension and transmission adjustment. Door locks (34) and security system features (36) are also automatically controlled, as is a radio transmitter (56) that is automatically customized to open the user's home garage door or office parking entry gate. Features of a number of different fingerprints are stored in the device to allow for operation of the vehicle (10) by different family members, as authorized by a primary user.

286 citations


Patent
15 May 1998
TL;DR: In this article, the authors combine the functionality of a computer pointing device with a fingerprint authentication system by regularly scanning fingerprints acquired from the pointing device touch pad, fingerprint features may be extracted and compared to stored data on authorized users for passive authentication.
Abstract: The present invention combines the functionality of a computer pointing device with a fingerprint authentication system, In the preferred embodiment, by regularly scanning fingerprints acquired from the pointing device touch pad, fingerprint features may be extracted and compared to stored data on authorized users for passive authentication. Furthermore, calculations based upon the acquired fingerprint images and associated features allows the system to determine six degrees of freedom of the finger, allowing the user to control a variety of functions or to manipulate a three-dimensional model or virtual reality system.

249 citations


Proceedings ArticleDOI
TL;DR: In this paper, the consistency of the output pattern and the security of the filter function are discussed, and the two topics discussed in this paper are the consistency and security of filter function.
Abstract: Biometric EncryptionTM is an algorithm which has been developed to securely link and retrieve a digital key using the interaction of a biometric image, such as a fingerprint, with a secure block of data, known as a BioscryptTM. The key can be used, for example, as an encryption/decryption key. The BioscryptTM comprises a filter function, which is calculated using an image processing algorithm, and other information which is required to first retrieve, and then verify the validity of, the key. The key is retrieved using information from an output pattern formed via the interaction of the biometric image with the filter function. Therefore, the filter function must be designed so that it produces a consistent output pattern (and thus, key). The filter function must also be designed to be secure (i.e. information about the fingerprint cannot be retrieved from the filter function). The consistency of the output pattern and the security of the filter function are the two topics discussed in this paper.© (1998) COPYRIGHT SPIE--The International Society for Optical Engineering. Downloading of the abstract is permitted for personal use only.

234 citations


Proceedings ArticleDOI
R. Mohan1
12 May 1998
TL;DR: A novel scheme to match a video clip against a large database of videos based on similarity of temporal activity, i.e., it finds similar "actions" and provides precise temporal localization of the actions in the matched videos.
Abstract: We present a novel scheme to match a video clip against a large database of videos. Unlike previous schemes that match videos based on image similarity, this scheme matches videos based on similarity of temporal activity, i.e., it finds similar "actions". Furthermore, it provides precise temporal localization of the actions in the matched videos. Video sequences are represented as a sequence of feature vectors called fingerprints. The fingerprint of the query video is matched against the fingerprints of videos in a database using sequential matching. The fingerprints are computed directly from compressed MPEG videos. The matching is much faster than real-time. We have used this scheme to find similar actions in sporting events, such as diving and baseball.

205 citations


Journal ArticleDOI
01 Jun 1998
TL;DR: The proposed fingerprint recognition scheme can provide an efficient way of automated identification and can be extended to numerous other security or administration applications.
Abstract: The paper describes an enhanced fingerprint recognition system consisting of image preprocessing, feature extraction and matching that runs accurately and effectively on a personal computer platform. The image preprocessing includes histogram equalisation, modification of directional codes, dynamic thresholding and ridgeline thinning which are sufficient to enhance the image to a state ready for feature extraction. Only features extracted are stored in a file for fingerprint matching. The matching algorithm presented is a modification and improvement of the structural approach. Experimental results acquired for matching are accurate, reliable and fast for implementation using a PC and a fingerprint scanner. The proposed fingerprint recognition scheme can provide an efficient way of automated identification and can be extended to numerous other security or administration applications.

161 citations


Journal ArticleDOI
TL;DR: This paper introduces a single-chip, 200/spl times/200-element sensor array implemented in a standard two-metal digital CMOS technology that is able to grab the fingerprint pattern without any use of optical and mechanical adaptors.
Abstract: This paper introduces a single-chip, 200/spl times/200-element sensor array implemented in a standard two-metal digital CMOS technology. The sensor is able to grab the fingerprint pattern without any use of optical and mechanical adaptors. Using this integrated sensor, the fingerprint is captured at a rate of 10 F/s by pressing the finger skin onto the chip surface. The fingerprint pattern is sampled by capacitive sensors that detect the electric field variation induced by the skin surface. Several design issues regarding the capacitive sensing problem are reported and the feedback capacitive sensing scheme (FCS) is introduced. More specifically, the problem of the charge injection in MOS switches has been revisited for charge amplifier design.

143 citations


01 Jan 1998
TL;DR: This thesis designs two prototype biometric systems: a verification system which uses only fingerprints to authenticate the identity claimed by a user, and an integrated identification system which combines face recognition and fingerprint verification to make a personal identification.
Abstract: An accurate automatic personal identification is critical in a wide range of application domains such as national ID card, electronic commerce, and automated banking. Biometrics, which refers to automatic identification of a person based on her physiological or behavioral characteristics, is inherently more reliable and more capable in differentiating between an authorized person and a fraudulent imposter than traditional methods such as passwords and PIN numbers. Automatic fingerprint identification is one of the most reliable biometric technology. In this thesis, our objective is to design a fingerprint-based biometric system which is capable of achieving a fully automatic "positive personal identification" with a high level of confidence. We have identified and explored the following issues: (i) feature extraction finding representative features from an input image for the purpose of fingerprint matching, (ii) image enhancement--improving the clarity of ridge structures of fingerprint images to facilitate automatic extraction of features or for visual inspection, (iii) minutiae matching--determining whether two sets of features (minutiae patterns) are extracted from the same finger, (iv) integration of multiple biometrics--improving the performance of a biometric system by combining several biometrics (e.g. fingerprint, face, speech, etc.), and (v) fingerprint classification--assigning a fingerprint into one of several pre-specified categories according to its pattern formation. We have designed two prototype biometric systems: (i) a verification system which uses only fingerprints to authenticate the identity claimed by a user, and (ii) an integrated identification system which combines face recognition and fingerprint verification to make a personal identification. Our systems have been evaluated extensively on a large number of fingerprint images captured with the traditional inked method and more recent inkless optical scanners. Experimental results show that our systems perform very well on these data sets.

116 citations


Patent
10 Apr 1998
TL;DR: In this paper, a portable fingerprint recognition transmitter that is compact, being less than the size of a cigarette pack, allowing the fingerprint recognition receiver to be carried by an individual in a pocket or purse.
Abstract: A portable fingerprint recognition transmitter that is compact, being less than the size of a cigarette pack, allowing the fingerprint recognition transmitter to be carried by an individual in a pocket or purse. The fingerprint recognition transmitter operates to take the image of the fingerprint and formulates a fingerprint image capable of transmitting through infrared or radio frequency to a receiver having previously stored fingerprint images so as to cause a comparison between the image taken and the image stored for purposes unlocking a security area.

113 citations


Patent
24 Sep 1998
TL;DR: In this article, a pointing and fingerprint identifier mechanism is proposed to provide both a pointing mode and a fingerprint identification mode in a computer system controller in the form of a pointing device for cursor movement control.
Abstract: A computer system controller in the form of a pointing and fingerprint identifier mechanism provides both a pointing mode and a fingerprint identification mode. In the pointing mode, the mechanism serves as a pointing device for cursor movement control. In the fingerprint identification mode, the mechanism serves as a fingerprint identification device to prevent unauthorized use. These modes are generated and controlled by device code executed by control logic within the mechanism. The device code thus integrates pointing functions and fingerprint identification functions in a single device. The need for a distinct fingerprint scanner separate from a pointing device in a computer system is thereby eliminated.

103 citations


Patent
12 May 1998
TL;DR: In this paper, a planar array of closely-spaced capacitive sense elements is used to measure the distance between a finger and a single capacitive plate and the finger surface.
Abstract: The present invention relates to a fingerprint sensing device comprising a planar array of closely-spaced capacitive sense elements (120, Fig. 1). When a finger (510) is placed in close proximity to the sensing device, the capacitive sense elements measure a capacitance (508) between the finger (510) and a single capacitor plate (500) in each sense element. This is accomplished by precharging each capacitor plate, and then using a known current source (522) to remove a fixed amount of charge from each capacitor plate (500). The measured capacitance varies as a function of the distance between the capacitor plate and the finger surface (200, Fig. 2). Thus, a capacitance measurement allows the distance between the capacitor plate and the finger surface to be determined (Fig. 3). Distance measurements across the array of sense elements are combined to produce a representation of the pattern of ridges on the finger surface which comprise a fingerprint. After a fingerprint is acquired, the quality of the fingerprint is evaluated, and if necessary, a gain parameter for the sense elements is iteratively adjusted until a satisfactory fingerprint is acquired.

103 citations


Patent
06 May 1998
TL;DR: A fingerprint sensor includes an array of fingerprint sensing elements and associated active circuits, and an impedance matrix filter connected to the active circuits for filtering the signals as discussed by the authors, which is used to convert a gray scale fingerprint image to a binarized fingerprint image.
Abstract: A fingerprint sensor includes an array of fingerprint sensing elements and associated active circuits and an impedance matrix filter connected to the active circuits for filtering the signals. The impedance matrix filter comprises a plurality of impedance elements with a respective impedance element connectable between each of the active circuit for each fingerprint sensing element and at least one other active circuit for an adjacent fingerprint sensing element. The impedance matrix filter includes a plurality of switches with a respective switch connected in series with each impedance element. The switches are selectively operated to determine ridge flow directions of the fingerprint image. The ridge flow directions are used to determine a core location of the fingerprint image. The switches are selectively operated to convert a gray scale fingerprint image to a binarized fingerprint image. Processing of the fingerprint image is carried out at the sensor and reduces additional downstream computational requirements.

Patent
06 May 1998
TL;DR: A fingerprint sensor includes an array of fingerprint sensing elements; analog-to-digital (A/D) converters having a controllable range; a scanner to perform sequential A/D conversions of predetermined ones of the array of fingerprints.
Abstract: A fingerprint sensor includes an array of fingerprint sensing elements; analog-to-digital (A/D) converters having a controllable range; a scanner to perform sequential A/D conversions of predetermined ones of the array of fingerprint sensing elements; and a range determining and setting circuit for controlling the range of the A/D converters based upon prior A/D conversions to thereby provide enhanced conversion resolution. A plurality of A/D converters are used for simultaneously converting analog signals from a corresponding plurality of fingerprint sensing elements. The A/D converters may include at least one reference voltage input for permitting setting of first and second points of the range. The range scale determining and setting circuit generate a histogram based upon prior A/D conversions.

Proceedings ArticleDOI
Atsushi Sugiura1, Yoshiyuki Koseki1
01 Nov 1998
TL;DR: A new user interface, called a fingerprint user interface (FUI), which employs fingerprint recognition, which uses not only the differences among fingerprint patterns of different persons, but also the differences between the ten fingers of a single person.
Abstract: This paper describes a new user interface, called a fingerprint user interface (FUI), which employs fingerprint recognition. While the unique feature patterns of fingerprints have mainly been used for personal identification, the FUI is unique in that it uses not only the differences among fingerprint patterns of different persons, but also the differences among the ten fingers of a single person. In the FUI, the system identifies the finger that has operated (touched) an input device through pattern matching of fingerprints and it performs the task assigned to the identified finger. Since users are able to specify different tasks by using different fingers, they feel as if commands and data objects were actually held on their fingers.

Journal ArticleDOI
TL;DR: Biometric technology would change security and access control by providing systems that recognize us by the authors' biological or behavioral characteristics, such as fingerprints, iris patterns, facial characteristics, and speech patterns.
Abstract: However, these security methods have important weaknesses—they can be lost, stolen, forged, or forgotten. Biometric technology would change security and access control by providing systems that recognize us by our biological or behavioral characteristics, such as fingerprints, iris patterns, facial characteristics , and speech patterns. A biometric security system uses one or more sensors (such as a camera or microphone) to acquire a sample of a physical or behavioral characteristic of someone who desires entry to a computer network, building, or other secure system. The biometric system then classifies the sample in some unique way and compares it to classifications for one or more authorized users in a database. Referring to biometric technology, Jackie Fenn, an analyst with the Gartner Group, a market research firm, said, \" It is becoming more credible based on some real-world deployments. \" In fact, Erik Bowman, an industry analyst with CardTech/SecurTech—which offers conferences, market research, and consulting services on smart-card and security technology—predicted the growing demand for network security will help increase the worldwide market for bio-metrics applications from $24 million in 1997 to $60 million in 1999. Past and projected sales figures are shown in Figure 1. The primary concerns about the technology are cost, accuracy, security, inter-operability, and intrusiveness on the people who are subject to biometric scanning. However, in the face of rapidly increasing demand for the technology, researchers and vendors are working on ways to address these concerns. In the late 1970s, security-conscious and technologically sophisticated organizations , such as the US Central Intelligence Agency and Department of Defense, began using electronic biomet-ric technology (like fingerprint-recognition systems) to guard access to such secure facilities as nuclear reactors. The technology Today, most biometric systems capture data about biological or behavioral characteristics via cameras or microphones and relay the data to a digital signal processor (DSP) for analysis, digitization, and processing. Most biometric systems conduct a verification process, in which they take processed data from a person claiming to be an authorized user and compare it to stored data for the actual user. Because this requires comparison to just one stored file, verification systems generally use a relatively simple database. On the other hand, biometric identification applications—which read a person's biological or behavioral characteristics and try to find a match from data stored for hundreds or even thousands of authorized users—can be quite complex. For example, identification applications require sophisticated databases and …

Proceedings ArticleDOI
16 Aug 1998
TL;DR: A neural classifier, whose topology has been designed to exploit the minutiae duality, is employed to perform the neighborhoods classification and a significant improvement in the overall performance is achieved.
Abstract: Minutiae correspond essentially to the terminations and bifurcations of fingerprint patterns. Since the quality of fingerprint images is often low, automatic minutiae detection is a very difficult task and the extraction algorithms produce a large number of false alarms. We present an approach to minutiae filtering based on a neural network. The minutiae neighborhoods extracted by the algorithm presented by us (1997) are normalized with respect to rotation and scale, and their dimensionality is reduced via a KL transform. A neural classifier, whose topology has been designed to exploit the minutiae duality, is employed to perform the neighborhoods classification. The filtering proposed, as confirmed by simulations, allows a significant improvement in the overall performance to be achieved.

Patent
16 Sep 1998
TL;DR: In this article, a touchpad device comprised of a detection array having a detection surface is configured to receive a fingerprint image and a processing device is provided to receive the fingerprint image or image data from the detection array.
Abstract: A touchpad device comprised of a detection array having a detection surface, wherein the detection surface is configured to receive a fingerprint image. Additionally, a processing device is provided to receive the fingerprint image or image data from the detection array. The processing device configures the touchpad device to operate as a pointer control device or a fingerprint recognition device based upon parameters associated with the fingerprint image.

Patent
Satoru Akizuki1
29 Dec 1998
TL;DR: In this article, a touch pad consisting of a fingerprint sensor and a position sensor is used for detecting a fingerprint of a finger and detecting a position of contact of the finger with the position sensor; a processor for processing an output from the fingerprint and position sensor, where the processor selectively outputs one of fingerprint detection data and positional detection data to an information processing apparatus.
Abstract: A touch pad comprising: a fingerprint and position sensor which acts not only as a fingerprint sensor for detecting a fingerprint of a finger but as a position sensor for detecting a position of contact of the finger with the position sensor; a processor for processing an output from the fingerprint and position sensor; and a fingerprint detection and touch pad controller for controlling the fingerprint and position sensor and the processor; wherein the processor selectively outputs one of fingerprint detection data and positional detection data to an information processing apparatus as an input from the finger.

Proceedings ArticleDOI
16 Aug 1998
TL;DR: This work presents a method of constructing a rolled fingerprint from an image sequence of partial fingerprints using a live-scan fingerprint imager.
Abstract: With the use of inkless scanners as input devices for acquiring fingerprints of a person, the digital image of the finger is restricted to the area in contact with the sensor The conventional method of fingerprint image acquisition involves obtaining a nail-to-nail image of the finger known as the rolled fingerprint impression. We present a method of constructing a rolled fingerprint from an image sequence of partial fingerprints using a live-scan fingerprint imager.

Patent
Paul C. Ross1
16 Jan 1998
TL;DR: In this paper, a system and method for authenticating fingerprints includes a remote site having a scanner for generating fingerprint data and an access mechanism, a local site connects to the remote site via transmission cables and includes a processor for extracting minutia from the fingerprint data.
Abstract: A system and method for authenticating fingerprints includes a remote site having a scanner for generating fingerprint data and an access mechanism. A local site connects to the remote site via transmission cables and includes a processor for extracting minutia from the fingerprint data. A comparator matches the fingerprint data to historical fingerprint data maintained in a database to verify whether the detected fingerprint data falls within statistical maximum deviations and exceeds statistical minimum deviations to establish the authenticity of the fingerprint.

Proceedings ArticleDOI
16 Aug 1998
TL;DR: It is shown that simple steps in image acquisition can enhance the system performance vastly and compensate for scaling, translation, rotation and structural distortions of the fingerprint minutiae features due to skin elasticity.
Abstract: In an automatic fingerprint identification or authentication system, the matcher subsystem handles the most complex task of compensating for scaling, translation, rotation and structural distortions of the fingerprint minutiae features due to skin elasticity. We analyze the effect of controlled image acquisition on matcher performance. We show that simple steps in image acquisition can enhance the system performance vastly.

Proceedings ArticleDOI
Stefan Jung1, Roland Thewes1, T. Scheiter1, K. Goser1, Werner Weber1 
01 Jan 1998
TL;DR: A capacitive fingerprint sensor array with pixel-parallel cellular logic in CMOS is presented, which acquires a binary fingerprint image and performs several image processing algorithms, including thinning the ridges of the fingerprint structure and extracting its characteristic features.
Abstract: A capacitive fingerprint sensor array with pixel-parallel cellular logic in CMOS is presented. The system acquires a binary fingerprint image and performs several image processing algorithms, including thinning the ridges of the fingerprint structure and extracting its characteristic features. The massive parallelism of the architecture leads to a very low power dissipation. Results of both simulations and measurements on a demonstrator chip are shown. The approach is well suited for person identification applications, especially in small portable systems, such as smart cards.

Proceedings ArticleDOI
05 Feb 1998
TL;DR: In this article, a 2D array of metal plates capped with a thin dielectric layer is used to capture a direct finger contact with the surface of the sensor IC to capture the capacitive fingerprint image.
Abstract: This high-resolution, low-power direct-contact capacitive sensor using standard CMOS front-end processing exhibits high sensitivity while maintaining an effective barrier to chemical, physical and electrostatic intrusion. The sensor uses direct finger contact with the surface of the sensor IC to capture a capacitive fingerprint image. The sensor consists of a 2-D array of metal plates capped with a thin dielectric layer. Unlike previous designs, each sensing site uses one metal sensor plate. Each functions as capacitor bottom plate, with the finger surface acting as the grounded top plate. Distance between the finger and the sensor and hence the measured capacitance varies with the pattern of ridges and valleys in the fingerprint. The capacitance is "measured" as the change in voltage that results when a fixed charge is removed from each sensing plate.

Patent
18 Jun 1998
TL;DR: In this article, a pointing device for use with a computer system is presented. The pointing device can be in the form of a mouse, trackball or any other type of apparatus that can be employed by the user of the computer system to displace a cursor on the screen.
Abstract: The present invention relates to a novel pointing device for use with a computer system. The pointing device can be in the form of a mouse, trackball or any other type of apparatus that can be employed by the user of the computer system to displace a cursor on the screen. The novel pointing device features a fingerprint identification system that enables the computer system to recognize the identity of the individual whose finger is being scanned. The advantage of providing the pointing device with a fingerprint recognition capability is the ease and simplicity with which user identification can be effected. In another aspect of the invention, a pointing device is provided that is capable of optically detecting and tracking significant papillary features of the user's finger. Thus, the movement of the user's finger can be mapped to the displacement of the cursor on the screen. The main advantage of this approach is to enable a much higher resolution in detecting the finger position by comparison to traditional methods.

Patent
02 Nov 1998
TL;DR: In this paper, a system and related method for controlling access to building doors or to automated teller machines (ATMs), such as automatic teller machine (ATM), is described.
Abstract: A system and related method for controlling access to building doors or to machines, such as automatic teller machines (ATMs). The system combines high-speed fingerprint matching with another form of identification carried or memorized by a user (10) of the system. In one disclosed embodiment of the invention, the user (10) carries or wears an identification badge (18) that includes a transponder for sending preliminary identification data to an access controller (14) as the user approaches a door (12) through which access is controlled. The controller (14) uses the preliminary identification data, such as an account number or employee number, to access a fingerprint database (44) and retrieve reference fingerprint data previously stored there during an enrollment procedure. If the user's identification includes a "smart card," the reference fingerprint data may stored in the card instead of in the database (44). The retrieved reference fingerprint data are then compared, in a fingerprint correlator (46), with a subject fingerprint image obtained from the user (10) through a fingerprint sensor (16) located near, or integrated into the door (12). A successful match in the correlator (46) verifies the preliminary identification data and results in access to the door or machine being granted to the user. In another form of the invention, the user carries a conventional machine-readable card, which is placed in a card reader (32) to obtain the preliminary identification data.

Patent
27 Jan 1998
TL;DR: In this article, a method to extract automatic high level features of a gray level ridge flow image including the automatic determination of the location of the high-level features including the core and delta points of a fingerprint image in the form of a grey level image is presented.
Abstract: A method to extract automatic high level features of a gray level ridge flow image including the automatic determination of the location of the high level features including the core and delta points of a fingerprint image in the form of a gray level image, comprising the following five steps: (1).determining a ridge flow direction of each gray level pixel of a fingerprint image and assign it with a direction code; (2).finding out a block directional flow and assigning each with appropriate direction code thereof; (3).correcting block flow directions in which a detection of the flow direction is affected image an input image quality in order to be immune from noises infiltrated during the acquiring process; (4).locating the delta points which are based on a corrected block direction flow diagram to locate from zero to a few delta points; and (5).locating the core points which are based on a corrected block direction flow diagram to locate one to two core points.

Patent
27 Nov 1998
TL;DR: In this article, a personal identification authenticating system for a client terminal in communication with a server is disclosed. But the authors did not specify how to authenticate the user's identity.
Abstract: A personal identification authenticating system for a client terminal 30 in communication with a server 32 is disclosed The server includes a computer and a database which stores personal information of the service users including information related to fingerprints and ID numbers of the service users A client terminal user impresses his fingerprint on a fingerprint sensor 46 and puts his IC card 48 into a card reader 44 The IC card stores personal information including information related to a fingerprint and an ID number of the card owner The client terminal includes an authenticator, which provides an authenticating signal if the sensed fingerprint information matches stored fingerprint information from the card The client terminal transmits stored personal information from the card and the sensed fingerprint information to the server upon occurrence of the authenticating signal The server incorporates an authorizer 40 The authorizer transmits an authorizing signal to the client terminal if the transmitted information matches the stored personal information on the database Upon receiving the authorizing signal, the client terminal user is authorized to access into the computer of the server

Proceedings ArticleDOI
01 Feb 1998
TL;DR: Two main methods for singular reference point detection using Hough transform are proposed: clustering and relaxational, a classification of fingerprint based on a trajectory and dynamics of convergence being executed as a byproduct in the latter case.
Abstract: The extraction of some unique for a given fingerprint reference point will considerably reduce the size of the description code and an indeterminate zone where an exhaustive matching of the minutiae sets must be performed, besides there is an opportunity not only to increase the accuracy of identification, but also to receive an exact criterion of availability ofpresented fingerprint in a database. The most essential in this case is the detection of reference point with accuracy not worse than up to 1/2 of an average period of structure (here the latter means an average shortest distance between distinct ridges). There are variety ofalgoritkms for singular points detection and automatic classification of fingerprints. The distinct features of our approach are the possibility to obtain very high accuracy, an opportunity to be applied before the stage of directional image generation, and ,in some cases, higher robustness to noises and distortions. Two main methods for singular reference point detection using Hough transform are proposed: clustering and relaxational, a classification of fingerprint based on a trajectory and dynamics of convergence being executed as a byproduct in the latter case. The offered algorithms were implemented in the test fingerprints identification system, the results obtained on the databases of 10000 and 500000 fingerprints have demonstrated accuracy of identification about 98% and 97% respectively. Keywords: image processing, directional image, fingerprint recognition, minutiae points.

Patent
18 May 1998
TL;DR: A code reader incorporated into a fingerprint scanner for viewing of security items such as credit cards, bank cards, passports and the like and comparing embedded coding on the item to an individual's fingerprint is described in this paper.
Abstract: A code reader incorporated into a fingerprint scanner for viewing of security items such as credit cards, bank cards, passports and the like and comparing embedded coding on the item to an individual's fingerprint. In this manner, the imaging plane can be used to view the security items in combination with scanning the fingerprint of the individual for comparison.

Patent
10 Dec 1998
TL;DR: In this article, the authentication system allows a user to perform predetermined operation to the computer only when fingerprint information of the user detected by the fingerprint collating device is coincident with fingerprint information registered in the fingerprint database.
Abstract: An authentication system includes a computer 1, an input means 3, a fingerprint database 4, a display device 10, an adapter circuit 11, and a fingerprint collating device 12. The input means 3 includes a keyboard 8 and a fingerprint sensor 9. The fingerprint sensor 9 is integrated into the keyboard 8. The authentication system allows a user to perform predetermined operation to the computer 1, only when fingerprint information of the user detected by the fingerprint collating device 12 is coincident with fingerprint information registered in the fingerprint database 4.

Patent
02 Mar 1998
TL;DR: In this paper, an electronic key device which combines a fingerprint with an input ID code to generate a key signal to initiate a computer system is presented, which includes a fingerprint input module for inputting a user's fingerprint and a fingerprint encoder having a memory for storing the fingerprint image signal.
Abstract: The present invention provides an electronic key device which can combine a fingerprint with an input ID code to generate a key signal to initiate a computer system. The key device comprises a fingerprint input module for inputting a user's fingerprint to generate a fingerprint image signal, and a fingerprint encoder having a memory for storing the fingerprint image signal, an input ID code and a fingerprint encoding program, and a processor for executing the fingerprint encoding program. The fingerprint encoding program is used for converting the fingerprint image signal according its characteristics into a digital fingerprint code, and encoding the fingerprint code and the input ID code according to a key encoding procedure to generate the key signal.