A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing Communications
- 23 September 2011
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Systems Journal
- Vol. 5 (4), 574-583
- https://doi.org/10.1109/jsyst.2011.2165600
Abstract
In cloud computing communications, information security entails the protection of information elements (e.g., multimedia data), only authorized users are allowed to access the available contents. Fingerprint recognition is one of the popular and effective approaches for priori authorizing the users and protecting the information elements during the communications. However, traditional fingerprint recognition approaches have demerits of easy losing rich information and poor performances due to the complex inputs, such as image rotation, incomplete input image, poor quality image enrollment, and so on. In order to overcome these shortcomings, in this paper, a new fingerprint recognition scheme based on a set of assembled invariant moment (geometric moment and Zernike moment) features to ensure the secure communications is proposed. And the proposed scheme is also based on an effective preprocessing, the extraction of local and global features and a powerful classification tool, thus it is able to handle the various input conditions encountered in the cloud computing communication. The experimental results show that the proposed method has a higher matching accuracy comparing with traditional or individual feature based methods on public databases.Keywords
This publication has 20 references indexed in Scilit:
- Non-minutiae based fingerprint descriptorPublished by IntechOpen ,2011
- Distributed Explicit Rate Schemes in Multi-Input–Multi-Output Network SystemsIEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews), 2010
- RFID-based seamless multimedia services for smart homesInternational Journal of Internet Protocol Technology, 2009
- A secure mechanism of group communication for pervasive gridInternational Journal of Ad Hoc and Ubiquitous Computing, 2009
- ID-based authentication scheme combined with identity-based encryption with fingerprint hashingThe Journal of China Universities of Posts and Telecommunications, 2008
- Network Security Using Biometric and CryptographyLecture Notes in Computer Science, 2008
- Localization of corresponding points in fingerprints by complex filteringPattern Recognition Letters, 2003
- FVC2002: Second Fingerprint Verification CompetitionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Wavelet domain features for fingerprint recognitionElectronics Letters, 2001
- Filterbank-based fingerprint matchingIEEE Transactions on Image Processing, 2000