Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-6 of 6 total results
Mathematical Morphology Approach for Genuine Fingerprint ...
BibTeX @INPROCEEDINGS{Humbe08mathematicalmorphology, author = {Vikas Humbe and S. S. Gornale and Ramesh Manza and K. V. Kale and Vikas Humbe and S. S. Gornale and Ramesh Manza and K. V. Kale}, title = {Mathematical Morphology Approach for Genuine Fingerprint feature extraction method}, booktitle = {International Conference on Pattern Recognition}, year = {2008}}
Mathematical Morphology Approach for Genuine Fingerprint ...
BibTeX @MISC{Humbe_mathematicalmorphology, author = {Vikas Humbe and S. S. Gornale and Ramesh Manza and K. V. Kale and Vikas Humbe and S. S. Gornale and Ramesh Manza and K. V. Kale}, title = {Mathematical Morphology Approach for Genuine Fingerprint Feature Extraction}, year = {}}
Mathematical Morphology Approach for Genuine Fingerprint ...
Mathematical Morphology Approach for Genuine Fingerprint Feature Extraction . By Vikas Humbe, S. S. Gornale, ... In this paper we have used the mathematical morphology to remove the superfluous information for genuine feature extraction and measure the feature extraction performance through sensitivity and specificity...
https://core.ac.uk/display/25761527
Average Rating (0 votes)
Mathematical Morphology Approach for Genuine Fingerprint ...
Mathematical Morphology Approach for Genuine Fingerprint Feature Extraction. Vikas Humbe, S. S. Gornale, Ramesh Manza, K. V. Kale Pages - 45 - 51 | Revised - 15-08-2007 | Published - 30-08-2007
A novel fingerprint feature extraction method for ...
V. Humbe , S.S. Gornale , R. Manza and K.V. Kale , Mathematical morphology approach for genuine fingerprint feature extraction, International Journal of Computer Science and Security 1(2) (2017), 552–571. [9]
Journal – Prof. K.V. Kale
K. V. Kale, Vikas Humbe, S. S. Gornale, Ramesh Manza, “Mathematical Morphology Approach for Genuine Fingerprint Feature Extraction”, in International Journal on Computer Science and Security (IJCSS), Vol. 1, Issue 2, PP. 53-59, 2007 [2 Citations]