Fingerprint Recognition with Embedded Cameras on Mobile Phones View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

Mohammad Omar Derawi , Bian Yang , Christoph Busch

ABSTRACT

Mobile phones with a camera function are capable of capturing image and processing tasks. Fingerprint recognition has been used in many different applications where high security is required. A first step towards a novel biometric authentication approach applying cell phone cameras capturing fingerprint images as biometric traits is proposed. The proposed method is evaluated using 1320 fingerprint images from each embedded capturing device. Fingerprints are collected by a Nokia N95 and a HTC Desire. The overall results of this approach show a biometric performance with an Equal Error Rate (EER) of 4.5% by applying a commercial extractor/comparator and without any preproccesing on the images. More... »

PAGES

136-147

References to SciGraph publications

Book

TITLE

Security and Privacy in Mobile Information and Communication Systems

ISBN

978-3-642-30243-5
978-3-642-30244-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_12

DOI

http://dx.doi.org/10.1007/978-3-642-30244-2_12

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1020605737


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "name": [
            "Norwegian Information Security Laboratory, Gjvik University College, Norway"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Derawi", 
        "givenName": "Mohammad Omar", 
        "id": "sg:person.014246434611.44", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014246434611.44"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Norwegian Information Security Laboratory, Gjvik University College, Norway"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Yang", 
        "givenName": "Bian", 
        "id": "sg:person.014471467160.30", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014471467160.30"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "name": [
            "Norwegian Information Security Laboratory, Gjvik University College, Norway"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Busch", 
        "givenName": "Christoph", 
        "id": "sg:person.011143356603.69", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://app.dimensions.ai/details/publication/pub.1032485455", 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-1-4757-4036-3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1032485455", 
          "https://doi.org/10.1007/978-1-4757-4036-3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/978-1-4757-4036-3", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1032485455", 
          "https://doi.org/10.1007/978-1-4757-4036-3"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.jvcir.2009.12.003", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042967145"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tpami.2002.1023799", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061742401"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iccsa.2010.71", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095306812"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iih-msp.2009.50", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095424685"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Mobile phones with a camera function are capable of capturing image and processing tasks. Fingerprint recognition has been used in many different applications where high security is required. A first step towards a novel biometric authentication approach applying cell phone cameras capturing fingerprint images as biometric traits is proposed. The proposed method is evaluated using 1320 fingerprint images from each embedded capturing device. Fingerprints are collected by a Nokia N95 and a HTC Desire. The overall results of this approach show a biometric performance with an Equal Error Rate (EER) of 4.5% by applying a commercial extractor/comparator and without any preproccesing on the images.", 
    "editor": [
      {
        "familyName": "Prasad", 
        "givenName": "Ramjee", 
        "type": "Person"
      }, 
      {
        "familyName": "Farkas", 
        "givenName": "K\u00e1roly", 
        "type": "Person"
      }, 
      {
        "familyName": "Schmidt", 
        "givenName": "Andreas U.", 
        "type": "Person"
      }, 
      {
        "familyName": "Lioy", 
        "givenName": "Antonio", 
        "type": "Person"
      }, 
      {
        "familyName": "Russello", 
        "givenName": "Giovanni", 
        "type": "Person"
      }, 
      {
        "familyName": "Luccio", 
        "givenName": "Flaminia L.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-30244-2_12", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-30243-5", 
        "978-3-642-30244-2"
      ], 
      "name": "Security and Privacy in Mobile Information and Communication Systems", 
      "type": "Book"
    }, 
    "name": "Fingerprint Recognition with Embedded Cameras on Mobile Phones", 
    "pagination": "136-147", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-30244-2_12"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "622ef25ebbc4cbe4a26d0ca3d7e80577b5f7e52263f8bc664a5295bf92ce1c7e"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1020605737"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-30244-2_12", 
      "https://app.dimensions.ai/details/publication/pub.1020605737"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T18:10", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8681_00000256.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-642-30244-2_12"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_12'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_12'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_12'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_12'


 

This table displays all metadata directly associated to this object as RDF triples.

125 TRIPLES      23 PREDICATES      33 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-30244-2_12 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author N8e9d39447fa344cfa601d46e95d845ad
4 schema:citation sg:pub.10.1007/978-1-4757-4036-3
5 https://app.dimensions.ai/details/publication/pub.1032485455
6 https://doi.org/10.1016/j.jvcir.2009.12.003
7 https://doi.org/10.1109/iccsa.2010.71
8 https://doi.org/10.1109/iih-msp.2009.50
9 https://doi.org/10.1109/tpami.2002.1023799
10 schema:datePublished 2012
11 schema:datePublishedReg 2012-01-01
12 schema:description Mobile phones with a camera function are capable of capturing image and processing tasks. Fingerprint recognition has been used in many different applications where high security is required. A first step towards a novel biometric authentication approach applying cell phone cameras capturing fingerprint images as biometric traits is proposed. The proposed method is evaluated using 1320 fingerprint images from each embedded capturing device. Fingerprints are collected by a Nokia N95 and a HTC Desire. The overall results of this approach show a biometric performance with an Equal Error Rate (EER) of 4.5% by applying a commercial extractor/comparator and without any preproccesing on the images.
13 schema:editor N41a39f2771dc4ec8ab67c46e7bd82516
14 schema:genre chapter
15 schema:inLanguage en
16 schema:isAccessibleForFree false
17 schema:isPartOf N80e894aa7a7946aca420add5b32293fb
18 schema:name Fingerprint Recognition with Embedded Cameras on Mobile Phones
19 schema:pagination 136-147
20 schema:productId N436fb5ee0fe24f85b442e5971b779693
21 Nda6c192d0de64fcaa8c80871d5cbe0c8
22 Ne714cf2821444b6bab222e8f56f636d1
23 schema:publisher N0d1d3875d3c64a66985071d8f1253f95
24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020605737
25 https://doi.org/10.1007/978-3-642-30244-2_12
26 schema:sdDatePublished 2019-04-15T18:10
27 schema:sdLicense https://scigraph.springernature.com/explorer/license/
28 schema:sdPublisher Nb28968cb3c1f4373aefc5fb869f7116b
29 schema:url http://link.springer.com/10.1007/978-3-642-30244-2_12
30 sgo:license sg:explorer/license/
31 sgo:sdDataset chapters
32 rdf:type schema:Chapter
33 N0d1d3875d3c64a66985071d8f1253f95 schema:location Berlin, Heidelberg
34 schema:name Springer Berlin Heidelberg
35 rdf:type schema:Organisation
36 N1aeb253c5d87457e908464687ad6285a schema:familyName Luccio
37 schema:givenName Flaminia L.
38 rdf:type schema:Person
39 N23fdf0cb720f48eb99869584c55302ce rdf:first Nd8839b9cd754481c819e2e1c07d93d02
40 rdf:rest N53adcf5f0ac24e4d86d6030d613a1579
41 N32462e21285547099d69b07e836f622c schema:familyName Russello
42 schema:givenName Giovanni
43 rdf:type schema:Person
44 N41a39f2771dc4ec8ab67c46e7bd82516 rdf:first Nb270d5488b90419bb493e5c2789d1a45
45 rdf:rest N6e2e9b52674248dd8ff4d6ed3b0d22d3
46 N436fb5ee0fe24f85b442e5971b779693 schema:name dimensions_id
47 schema:value pub.1020605737
48 rdf:type schema:PropertyValue
49 N53adcf5f0ac24e4d86d6030d613a1579 rdf:first N32462e21285547099d69b07e836f622c
50 rdf:rest N9bca1c221a724cf19011ef91a9ea0558
51 N6da2140b2ea34d69a8a74a7e996696ee schema:name Norwegian Information Security Laboratory, Gjvik University College, Norway
52 rdf:type schema:Organization
53 N6e2e9b52674248dd8ff4d6ed3b0d22d3 rdf:first Nf2d7e82594c849288aa650fd9f8c6269
54 rdf:rest Naabe85f147a544b3a0586b80963093e6
55 N7b5aa2fe5d3e4516bb18bad061181d81 schema:name Norwegian Information Security Laboratory, Gjvik University College, Norway
56 rdf:type schema:Organization
57 N80e894aa7a7946aca420add5b32293fb schema:isbn 978-3-642-30243-5
58 978-3-642-30244-2
59 schema:name Security and Privacy in Mobile Information and Communication Systems
60 rdf:type schema:Book
61 N880ad290906e45b59d18b8b7eb09c4cd rdf:first sg:person.014471467160.30
62 rdf:rest Na3753fc7c4b34bd48602f93b3f411cfb
63 N8e9d39447fa344cfa601d46e95d845ad rdf:first sg:person.014246434611.44
64 rdf:rest N880ad290906e45b59d18b8b7eb09c4cd
65 N9bca1c221a724cf19011ef91a9ea0558 rdf:first N1aeb253c5d87457e908464687ad6285a
66 rdf:rest rdf:nil
67 Na3753fc7c4b34bd48602f93b3f411cfb rdf:first sg:person.011143356603.69
68 rdf:rest rdf:nil
69 Naabe85f147a544b3a0586b80963093e6 rdf:first Nd5411a7dea494603a51d3a53c3f3d705
70 rdf:rest N23fdf0cb720f48eb99869584c55302ce
71 Nb270d5488b90419bb493e5c2789d1a45 schema:familyName Prasad
72 schema:givenName Ramjee
73 rdf:type schema:Person
74 Nb28968cb3c1f4373aefc5fb869f7116b schema:name Springer Nature - SN SciGraph project
75 rdf:type schema:Organization
76 Nd5411a7dea494603a51d3a53c3f3d705 schema:familyName Schmidt
77 schema:givenName Andreas U.
78 rdf:type schema:Person
79 Nd8839b9cd754481c819e2e1c07d93d02 schema:familyName Lioy
80 schema:givenName Antonio
81 rdf:type schema:Person
82 Nda6c192d0de64fcaa8c80871d5cbe0c8 schema:name doi
83 schema:value 10.1007/978-3-642-30244-2_12
84 rdf:type schema:PropertyValue
85 Ne39cae176e764788b5d198fd737aa7d3 schema:name Norwegian Information Security Laboratory, Gjvik University College, Norway
86 rdf:type schema:Organization
87 Ne714cf2821444b6bab222e8f56f636d1 schema:name readcube_id
88 schema:value 622ef25ebbc4cbe4a26d0ca3d7e80577b5f7e52263f8bc664a5295bf92ce1c7e
89 rdf:type schema:PropertyValue
90 Nf2d7e82594c849288aa650fd9f8c6269 schema:familyName Farkas
91 schema:givenName Károly
92 rdf:type schema:Person
93 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
94 schema:name Information and Computing Sciences
95 rdf:type schema:DefinedTerm
96 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
97 schema:name Artificial Intelligence and Image Processing
98 rdf:type schema:DefinedTerm
99 sg:person.011143356603.69 schema:affiliation N7b5aa2fe5d3e4516bb18bad061181d81
100 schema:familyName Busch
101 schema:givenName Christoph
102 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011143356603.69
103 rdf:type schema:Person
104 sg:person.014246434611.44 schema:affiliation Ne39cae176e764788b5d198fd737aa7d3
105 schema:familyName Derawi
106 schema:givenName Mohammad Omar
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014246434611.44
108 rdf:type schema:Person
109 sg:person.014471467160.30 schema:affiliation N6da2140b2ea34d69a8a74a7e996696ee
110 schema:familyName Yang
111 schema:givenName Bian
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014471467160.30
113 rdf:type schema:Person
114 sg:pub.10.1007/978-1-4757-4036-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032485455
115 https://doi.org/10.1007/978-1-4757-4036-3
116 rdf:type schema:CreativeWork
117 https://app.dimensions.ai/details/publication/pub.1032485455 schema:CreativeWork
118 https://doi.org/10.1016/j.jvcir.2009.12.003 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042967145
119 rdf:type schema:CreativeWork
120 https://doi.org/10.1109/iccsa.2010.71 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095306812
121 rdf:type schema:CreativeWork
122 https://doi.org/10.1109/iih-msp.2009.50 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095424685
123 rdf:type schema:CreativeWork
124 https://doi.org/10.1109/tpami.2002.1023799 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061742401
125 rdf:type schema:CreativeWork
 




Preview window. Press ESC to close (or click here)


...