Font Size: a A A

Research And Application Of Fingerprint Recognition Technology

Posted on:2005-05-22Degree:MasterType:Thesis
Country:ChinaCandidate:J HeFull Text:PDF
GTID:2208360122996098Subject:Information economy
Abstract/Summary:PDF Full Text Request
With the development of our society, the recognition system of identification with high efficiency and reliability is becoming a great demand. The traditional means, such as key, password, cryptogram, ID card and even IC card, have fallen behind the needs of economic activity and social security. This is because that they would be forgeable, falsifiable, stolen or decodable.Fortunately, the rapid improvements of recognition and computer technologies have brought the biometric recognition technology, like recognition of fingerprint, palm, voice, iris, face, into actual use. Among these novel technologies, fingerprint recognition is superior to others. Because different people have different fingerprints and their fingerprints keep unchanged all the life, fingerprint recognition is undoubtedly accurate and reliable. In addition, as many up-to-date algorithms for fingerprint recognition are very fast and accurate, they can be definitely commercialized.This paper includes five chapters. Chapter one is focused on the basic theories of fingerprint recognition. In this Chapter, the author mainly states the digital image processing and drawing the eigenvalue of fingerprint's image. Chapter two addresses in details the algorithm of matching in fingerprint technology. The author also mentions some basic conception of pattern recognition. Chapter three presents the auto fingerprint recognition system. Chapter four states the management system of fingerprint in the Bank. That is the innovative use. The last Chapter describes the writer's experience in developing the fingerprint recognition system.
Keywords/Search Tags:The technique of fingerprint recognition, The auto-recognition system of fingerprint, Pattern matching algorithm, Management System of Fingerprint in the Bank, The pattern of verification, The pattern of identification
PDF Full Text Request
Related items