Fingerprint recognition [1] is an active research area nowadays. An important component in fingerprint recognition systems is the fingerprint matching algorithm. According to the problem domain, fingerprint matching algorithms are classified in two categories: fingerprint verification algorithms and fingerprint identification algorithms. The aim of fingerprint verification algorithms is to determine whether two fingerprints come from the same finger or not. On the other hand, the fingerprint identification algorithms search a query fingerprint in a database looking for the fingerprints coming from the same finger.
There are hundreds of papers concerning to fingerprint verification but, as far as we know, there is not any framework for fingerprint verification available on the web. So, you must implement your own tools in order to test the performance of your fingerprint verification algorithms. Moreover, you must spend a lot of time implementing algorithms of other authors to compare with your algorithms. This was our motivation to put our fingerprint verification framework available for everyone.
The most closely related work to our framework is the FVC-onGoing web system. This system has the following limitations:
There are hundreds of papers concerning to fingerprint verification but, as far as we know, there is not any framework for fingerprint verification available on the web. So, you must implement your own tools in order to test the performance of your fingerprint verification algorithms. Moreover, you must spend a lot of time implementing algorithms of other authors to compare with your algorithms. This was our motivation to put our fingerprint verification framework available for everyone.
The most closely related work to our framework is the FVC-onGoing web system. This system has the following limitations:
- You do not have access to any algorithm but yours.
- It is not a framework; so, you cannot reuse any software component.
- It cannot be used with educational purpose because students cannot see how the algorithms work.
- After performing an experiment using a database (standard or hard) you must wait 30 days to perform another experiment using the same database.
- You do not have control over the fingerprint databases. Thus, you cannot use your own databases neither modify the existing ones.
- You do not have access to the fingerprints that your algorithm fails matching. Hence, you cannot analyze why the algorithm fails in order to fix your code.
- You cannot create an experiment with a custom protocol for performance evaluation.
I guess you came to this post by searching similar kind of issues in any of the search engine and hope that this resolved your problem. If you find this tips useful, just drop a line below and share the link to others and who knows they might find it useful too.
Stay tuned to my blog, twitter or facebook to read more articles, tutorials, news, tips & tricks on various technology fields. Also Subscribe to our Newsletter with your Email ID to keep you updated on latest posts. We will send newsletter to your registered email address. We will not share your email address to anybody as we respect privacy.
Stay tuned to my blog, twitter or facebook to read more articles, tutorials, news, tips & tricks on various technology fields. Also Subscribe to our Newsletter with your Email ID to keep you updated on latest posts. We will send newsletter to your registered email address. We will not share your email address to anybody as we respect privacy.
No comments:
Post a Comment