Large-Scale Fingerprint Indexing Method Based on Self-Attention Deep Hashing
WU Yuanchun, ZHAO Tong
1.School of Computer Science and Technology, University of Chinese Academy of Sciences(UCAS), Beijing 100049, China
2.School of Mathematical Sciences, University of Chinese Academy of Sciences(UCAS), Beijing 100049, China
3.Key Laboratory of Big Data Mining and Knowledge Management, Chinese Academy of Sciences, Beijing 100190, China
WU Yuanchun, ZHAO Tong. Large-Scale Fingerprint Indexing Method Based on Self-Attention Deep Hashing[J]. Computer Engineering and Applications, 2022, 58(18): 241-250.
[1] MALTONI D,MAIO D,JAIN A,et al.Handbook of fingerprint recognition[M].Dordrecht:Springer,2009.
[2] GUPTA P,TIWARI K,ARORA G.Fingerprint indexing schemes—a survey[J].Neurocomputing,2019,335:352-365.
[3] GALTON F.Finger prints[M].[S.l.]:Macmillan and Company,1892.
[4] HENRY E R.Classification and uses of finger prints[M].[S.l.]:Darling and Son,Limited,1913.
[5] WILSON C L,CANDELA G T,WATSON C I.Neural network fingerprint classification[J].Journal of Artificial Neural Networks,1994,1(2):203-228.
[6] VASWANI A,SHAZEER N,PARMAR N,et al.Attention is all you need[J].arXiv:1706.03762,2017.
[7] CARION N,MASSA F,SYNNAEVE G,et al.End-to-end object detection with transformers[C]//European Conference on Computer Vision.Cham:Springer,2020:213-229.
[8] ZHU X,SU W,LU L,et al.Deformable DETR:deformable transformers for end-to-end object detection[J].arXiv:2010.04159,2020.
[9] DOSOVITSKIY A,BEYER L,KOLESNIKOV A,et al.An image is worth 16×16 words:transformers for image recognition at scale[J].arXiv:2010.11929,2020.
[10] JADERBERG M,SIMONYAN K,ZISSERMAN A,et al.Spatial transformer networks[J].arXiv:1506.02025,2015.
[11] ENGELSMA J J,CAO K,JAIN A K.Learning a fixed-length fingerprint representation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2021,43(6):1981-1997.
[12] ZHANG P,ZHANG W,LI W J,et al.Supervised hashing with latent factor models[C]//Proceedings of the 37th International ACM SIGIR Conference on Research & Development in Information Retrieval,2014:173-182.
[13] WEISS Y,TORRALBA A,FERGUS R.Spectral hashing[C]//Proceedings of the 21st International Conference on Neural Information Processing Systems,2008.
[14] LI Q,SUN Z,HE R,et al.Deep supervised discrete hashing[J].arXiv:1705.10999,2017.
[15] MAIO D,MALTONI D,CAPPELLI R,et al.FVC2000:fingerprint verification competition[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2002,24(3):402-412.
[16] MAIO D,MALTONI D,CAPPELLI R,et al.FVC2002:second fingerprint verification competition[C]//Object Recognition Supported by User Interaction for Service Robots,2002:811-814.
[17] MAIO D,MALTONI D,CAPPELLI R,et al.FVC2004:third fingerprint verification competition[C]//International Conference on Biometric Authentication.Berlin,Heidelberg:Springer,2004:1-7.
[18] WATSON C I,WILSON C L.NIST special database 4,fingerprint database[D].National Institute of Standards and Technology,1992.
[19] WATSON C I.NIST special database 14,fingerprint database[D].US National Institute of Standards and Technology,1993.
[20] CAPPELLI R,FERRARA M,MALTONI D.Fingerprint indexing based on minutia cylinder-code[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2010,33(5):1051-1057.
[21] FERRARA M,MALTONI D,CAPPELLI R.Noninvertible minutia cylinder-code representation[J].IEEE Transactions on Information Forensics and Security,2012,7(6):1727-1737.
[22] BAI C,WANG W,ZHAO T,et al.Fast exact fingerprint indexing based on compact binary minutia cylinder codes[J].Neurocomputing,2018,275:1711-1724.
[23] SZEGEDY C,IOFFE S,VANHOUCKE V,et al.Inception-v4,inception-resnet and the impact of residual connections on learning[C]//Proceedings of the AAAI Conference on Artificial Intelligence,2017.