Author:Mlambo, S; Nelwamondo, Fulufhelo V; Mathekga, Mmamolatelo EDate:Mar 2015Smart cards are one of the most commonly used technologies that are integrated with fingerprints to develop higher security. One of the important uses of smart cards is the development of authentication systems for an individual. The demand ...Read more
Author:Nair, Kishor K; Helberg, A; Van der Merwe, Johannes JDate:Jul 2016The combination of smart cards and biometrics results in a strong 2-factor authentication. It facilitates a trusted credential for authenticating an individual’s identity through one-to-one biometric verification using the smart card token. ...Read more
Author:Khanyile, NP; Tapamo, JR; Dube, EDate:Aug 2011Thinning plays a very important role in the preprocessing phase of automatic fingerprint recognition/identification systems. The performance of minutiae extraction relies heavily on the quality of skeletons used. A good fingerprint thinning ...Read more
Author:Sharma, Ameeth; Singh, Ann; Roberts, Ted; Ramokolo, Lesiba R; Van der Westhuizen, CorrieDate:Nov 2016The optical coherence technique (OCT) technique, which was demonstrated by Fercher and Huang in the early 90s, has made significant strides in bio-medical diagnostic applications in the fields of dermatology, dentistry and ophthalmology. Other ...Read more
Author:Brown, Dane; Bradshaw, KDate:Sep 2016The feature-level, unlike the match score-level, lacks multi-modal fusion guidelines. This work demonstrates a practical approach for improved image-based biometric feature-fusion. The approach extracts and combines the face, fingerprint and ...Read more
Author:Akhoury, SS; Darlow, LNDate:Feb 2015Physiologists have found that fingerprint patterns exist in the inner layers (viz. papillary junction) of the skin
of the fingertip. However, conventional acquisition systems do not have capabilities to extract fingerprints at subsurface ...Read more
Author:Mathekga, Mmamolatelo EDate:Oct 2015The ease with which the green South African ID book could be forged has led to many instances of identity fraud, costing retail businesses millions in lost revenue on fraudulently created credit accounts. This has led the government, through ...Read more
Author:Baruni, Kedimotse P; Nair, Kishor K; Ratsoma, Mahlatse SDate:Aug 2018Due to the rising concern of data security and privacy, fingerprint recognition has been used for identity verification. This paper presents a minutiae-based finger code matching algorithm for identity verification. It describes the effect ...Read more
Author:Shabalala, MB; Moabalobelo, Terrence; Van der Merwe, TDate:Mar 2015As cybercrime is on the rise, individuals would like to rest assured that their authentication information cannot be stolen, and then used to gain access to their privileged information. Smart cards can and have played a pivotal role in ...Read more
Author:Baruni, Kedimotse P; Helberg, A; Nair, Kishor KDate:Dec 2016Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location ...Read more
Author:Msiza, IS; Leke-Betechuoh, B; Nelwamondo, Fulufhelo V; Msimang, NDate:Oct 2009The problem of Automatic Fingerprint Pattern Classification (AFPC) has been studied by many fingerprint biometric practitioners. It is an important concept because, in instances where a relatively large database is being queried for the ...Read more
Author:Msiza, IS; Leke-Betechuoh, B; Malumedzha, TDate:Feb 2011Fingerprint re-alignment is an important aspect in the subject of fingerprint biometrics because a fingerprint that has been rotated, voluntarily or involuntarily, can have negative impact on the functionality of an automated fingerprint ...Read more
Author:Lessing, MM; Weissenberger, LDate:Jul 2008Biometric advances apply to a range of disciplines to ensure the safety and security of individuals and groups. To stress the value of biometrics, this study focuses on the application of biometric techniques to a vast range of individuals ...Read more
Author:Khutlang, Rethabile; Machaka, Pheeha; Singh, Ann; Nelwamondo, Fulufhelo VDate:Aug 2017Biometric fingerprint scanners scan the external skin's features onto a 2-D image. The performance of the automatic fingerprint identification system suffers first and foremost if the finger skin is wet, worn out or a fake fingerprint is used. ...Read more
Author:Khutlang, Rethabile; Nelwamondo, Fulufhelo VDate:Dec 2014Biometric fingerprint scanners scan the external skin features onto a 2-D image. The performance of the automatic fingerprint identification system suffers if the finger skin is wet, worn out, fake fingerprint is used et cetera. In this paper, ...Read more
Author:Mgaga, Sboniso S; Tapamo, JRDate:Dec 2020Latent fingerprints are fingerprint impressions left on the surfaces a finger comes into contact with. They are found in almost every crime scene. Conventionally, latent fingerprints have been obtained using chemicals or physical methods, ...Read more
Author:Darlow, Luke N; Connan, J; Singh, AnnDate:Jun 2016The Hybrid fingerprint is a local-quality-specific blend of the surface and internal fingerprints, extracted from optical coherence tomography scans. Owing to its origin, and the manner in which it is obtained, the Hybrid fingerprint is a ...Read more