跳到主要內容

臺灣博碩士論文加值系統

(44.201.97.0) 您好!臺灣時間:2024/04/24 10:34
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林宸逸
研究生(外文):Chen-Yi Lin
論文名稱:基於Delaunay三角網指紋辨識系統
論文名稱(外文):Fingerprint Recognition System Based on Delaunay Triangulation
指導教授:余政杰余政杰引用關係
口試委員:曾德樟鄭群星
口試日期:2016-07-27
學位類別:碩士
校院名稱:國立臺北科技大學
系所名稱:電子工程系研究所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
畢業學年度:104
語文別:中文
中文關鍵詞:Delaunay三角網藍牙傳輸微控器影像處理指紋辨識
外文關鍵詞:Delaunay TriangulationMicrocontroller unitsimage processingfingerprint recognizing system
相關次數:
  • 被引用被引用:5
  • 點閱點閱:311
  • 評分評分:
  • 下載下載:94
  • 收藏至我的研究室書目清單書目收藏:0
近年來,隨著社會的發展,人們在生活及資訊安全應用或是出入境管理上需求量日益增大,保護個人財產安全或網路安全的防護機制也漸漸被重視,使用指紋辨識便可以在任何需要身分辨識的時刻不需攜帶各式門禁卡及鑰匙,只要擷取指紋圖像配對即可進入,由於每個人指紋是獨一無二的可以提升系統安全性,而本論文之研究主要開發一套指紋辨識系統,在開發上利用微控器連接周邊模組傳輸指紋圖像連接電腦進行影像處理。
硬體方面使用STMicroelectronics公司的STM32F407IG嵌入式開發板,由於可程式化設計的晶片使得系統在開發設計時可以獲得具有靈活變化的實用性。將微控器連結高精密光學指紋模組(TFS-D400)擷取指紋圖像使用非同步串列埠(Universal Asynchronous Receiver Transmitter;UART)傳輸到微控器進行處理,再利用藍牙傳輸從微控器傳送指紋圖像至電腦裡。
軟體方面使用Microsoft的C#,C#可使用物件為導向的語言能夠提供快速的應用程式開發,將傳輸至電腦的圖像做影像處理優化,並利用Delaunay三角網進行指紋匹配。
Nowadays, the demands on personal and information security are rapidly increasing with the development of technologies. Since that security issue has been gradually drawn much more attention. By recognizing the fingerprint, user is allowed to entering without remembering anything with their unique body mark. The main purpose of the thesis is developing a fingerprint recognizing system which can provide highly reliability and accuracy. By making the connection between the Microcontroller units (MCU) and fingerprint recognizing module, then transfer data to computer synchronously by UART (Universal Asynchronous Receiver/ Transmitter) for image processing.
By applying STM32F407IG embedded developing board which manufactured by STMicroelectronics (ST), the advantage of high applicability of programmable system could achieve our part of the goal on realizing the fingerprint recognizing system.
On the end side of image processing is realized by object-oriented C# which developing by Microsoft provide. The received image data will be optimization and then processing matching fingerprint based on Delaunay Triangulation.
中文摘要 ....i
英文摘要 ...ii
誌謝 ..iii
目錄 ...iv
表目錄 .vii
圖目錄 viii
第一章 緒論 .1
1.1 研究背景 ...1
1.2 研究動機及目的 ...1
1.3 論文綱要 ...3
第二章 開發環境與各部硬體介紹 ..4
2.1 STM32F407IGT6微控器介紹 ...4
2.2 數位傳輸介紹 .10
2.2.1 串列與並列 .10
2.2.2 單工與雙工 .11
2.3 傳輸介面 .13
2.3.1 USART .13
2.3.2 I2C .16
2.3.3 SPI .19
2.4 模組介紹 .22
2.4.1 HC-05藍牙模組特性介紹 .22
2.4.2 UART Fingerprint Reader 特性介紹 .23
2.5 STM32開發環境與工具 .26
2.6 Microsoft Visual C# 開發環境 .27
第三章 指紋影像處理 .29
3.1 指紋影像處理流程 .29
3.2 圖像場計算 .30
3.2.1 指紋圖像梯度場 .31
3.2.2 指紋圖像方向場 .32
3.3 均衡 .35
3.4 紋線增強 .38
3.5 平滑化 .45
3.6 二值化 .48
3.7 細線化 .52
第四章 指紋影像特徵擷取與比對 .57
4.1 指紋影像特徵擷取 .57
4.1.1 端點、叉點擷取 .57
4.1.2 中心點、三角點擷取 .62
4.2 特徵比對 .65
4.2.1 Delaunay三角應用性質 .65
4.2.2 Delaunay三角構造 .67
4.2.3 Delaunay三角比對 .69
第五章 系統整合實驗結果 .73
5.1 指紋影像無線傳輸實驗 .73
5.2 指紋影像處理實驗 .78
5.2.1 圖像場 .78
5.2.2 均衡 .79
5.2.3 紋線增強 .80
5.2.4 平滑 .81
5.2.5 二值化 .82
5.2.6 細線化 .84
5.3 指紋特徵擷取實驗 .85
5.4 指紋特徵比對實驗 .89
5.4.1 原Delaunay三角網指紋比對 .89
5.4.2 改良Delaunay三角網指紋比對 .93
5.4.3 Delaunay三角網指紋匹配比較 .96
第六章 結論與未來展望 .98
6.1 結論 .98
6.2 未來展望 .99
參考文獻 …100
[1]曾銘崧,熱感式指紋成像及其自動辨識法之研究,碩士論文,私立中原大學 電子工程系,桃園,2001。
[2]STM32/417, “Getting started with STM32F4xxxx MCU”, STMicroelectronics Inc., http://www.st.com/stonline/.
[3]STMicroelectronics Inc., STM32F407/417, “STM32F407IG Family Data Sheet”, http://www.st.com/stonline/stappl/resourceSelector/app?page=fullResourceSelector&doctype=datasheet&LineID=11, 2014.
[4]STMicroelectronics Inc., STM32F407/417, “STM32Application Note,” http://www.st.com/stonline/stappl/resourceSelector/app?page=fullResourceSelector&doctype=application_note&LineID=11, 2014.
[5]KSHC Inc., “HC-05 Data Sheet, ” available from KSHC’s homepage,http;//www.mcu-turkey.com/wp-content/upload/2013/01/HC-Serial-Bluetooth-Products-2011/04.pdf, 2013.
[6]Waveshare Inc., “UART Fingerprint Reader User Manual,” http://www.waveshare.com/w/upload/6/65/UART-Fingerprint-Reader-UserManual.pdf
[7]STMicroelectronics Inc., “ST-LINK/V2 in-circuit debugger/programmer,” http://www.st.com/web/catalog/tools/FM146/CL1984/SC724/SS1677/PF251168?sc=internet/evalboard/product/251168.jsp., 2014.
[8]H. Lin, Y. Wan, and A. Jain, “Fingerprint Image Enhancement:Algorithm and Performance Evaluation,” IEEE Trans. Pattern Analysis and Machine Intellignce, vol. 20, no. 8, pp. 777-789, Aug. 1998.

[9]Y. Wang, J. Hu, and D. Phillips, “A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing,” IEEE Trans. Pattern Analysis and Machine Intellignce, vol. 29, no. 4, Apr. 2007.
[10]井上誠喜、八木伸行、林正樹、中須英輔、三谷公二、奧井誠人,C語言數位影像處理,台北,全華圖書股份有限公司,2009。
[11]J. S. Weszka and A. Rosenfeld, “Histogram Modification for Threshold Selection,” IEEE Trans. Systems, Man, and Cybernetics, SMC- 9, pp. 38-52, 1979.
[12]R. C. Gonzalez and R. E. Woods, Digital Image Process (3rd edition), Prentice-Hall,Englewood Cliffs, NJ, 2007.
[13]C. T. Hsieh, E. Lai, and Y. C. Wang, “An Effective Algorithm for Fingerprint Image Enhancement Based on Wavelet Transform,” Pattern Recognition, vol. 36, no. 2, pp. 303-312, 2003.
[14]S. Hatami, H. Reshad, K. Mahmoud, and A. Hossein, “Wavelet Based Fingerprint Image Enhancement,” in Proc. IEEE Int. Symposium on Circuits and Systems, vol. 5, pp. 4610-4613, 2005.
[15]B. N. Lavanya, K. B. Raja, and K. R. Venugopal, “Fingerprint Verification based on Gabor Filter Enhancement,” IEEE Trans. Computer Science and Information Security, vol. 6, no. 2, pp. 138-144, 2009.
[16]J. G. Daugman, “Complete Discrete 2-D Gabor Transforms by Neural Networks for Image Analysis and Compression,” IEEE Trans. Acoustics, Speech and Signal process, vol. 36, no. 7, pp. 1169-1179, Jul. 1988.
[17]Q. Chen, Q. Sun, P. A. Heng, and D. Xia, “A Double-Threshold Image Binarization Method Based on Edge Detector,” Pattern Recognition, vol. 41, pp. 1254-1267, 2008.
[18]T. Y. Zhang and C. Y. Suen, “A Fast Thinning Algorithm for Thinning Digital Patterns,” Comm. of ACM, vol. 27, no.3, pp. 236-239, 1984.

[19]L. Ji, Y. L. Shang, and X. Pu, “Binary Fingerprint Image Thinning Using Template-Based PCNNs,” IEEE Trans. Systems, Man and Cybernetics-part B:Cybernetics, vol. 37, no. 5, pp. 1407-1413, Oct. 2007.
[20]L. Shang, Z. Yi and L. Ji, “Binary Image Thinning Using Autowaves Generated by PCNNs,” Neural Processing Letters, vol. 25, no. 1, pp. 49–62, Feb. 2007.
[21]M. S. Khalil, D. Muhammad, M. K. Khan and K. Alghathbar, “Singular Points Detection Using Fingerprint Orientation Field Reliability,” IEEE Trans. Physical Sciences, vol.5, no. 4, pp. 352-357, Apr. 2010.
[22]N. Liu, Y. Yin, and H. Zhang, “A Fingerprint Matching Algorithm Based on Delaunay Triangulation Net,” IEEE International Conference on Computer and Information Technology, pp. 591–595, 2005.
[23]Z. M. Kovacs-Vajna, "A Fingerprint Verification System Based on Triangular Matching and Dynamic Time Warping," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 11, pp. 1266-1276, 2000.
連結至畢業學校之論文網頁點我開啟連結
註: 此連結為研究生畢業學校所提供,不一定有電子全文可供下載,若連結有誤,請點選上方之〝勘誤回報〞功能,我們會盡快修正,謝謝!
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊