单片机指纹识别系统及其算法设计与实现.pdf

上传人:H****o 文档编号:56669578 上传时间:2022-11-02 格式:PDF 页数:8 大小:606.70KB
返回 下载 相关 举报
单片机指纹识别系统及其算法设计与实现.pdf_第1页
第1页 / 共8页
单片机指纹识别系统及其算法设计与实现.pdf_第2页
第2页 / 共8页
点击查看更多>>
资源描述

《单片机指纹识别系统及其算法设计与实现.pdf》由会员分享,可在线阅读,更多相关《单片机指纹识别系统及其算法设计与实现.pdf(8页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、单片机指纹识别系统及其算法设计与实现作者:熊盛涛出处:熊盛涛1 引言指纹识别技术是众多生物识别技术中的一种,相对于其它身份认证技术,自动指纹识别是一种更为理想的身份确认技术,用自动指纹识别不仅具有许多独到的信息安全优点,更重要的是还具有很高的实用性、可行性。指纹识别技术是一种相对比较成熟的识别技术,早在20 世纪 60 年代,人们就开始着手研究利用计算机来处理指纹。随着电子计算机的出现,采集技术的发展以及对指纹识别的研究,人们逐渐将人工的指纹识别向指纹自动识别(Automated Fingerprint Identification System)AFIS 转变。现在使用的指纹识别系统基本上都

2、是指纹自动识别系统,国内外有许多的研究机构和生产公司从事于指纹识别系统的研究和开发,他们也极大的促进了指纹识别技术的发展。指纹识别技术涉及到传感技术、电子信号处理技术、图形图像处理学、人工智能学、软件工程学等多门技术学科,指纹识别系统的设计方案也不是一定,但衡量标准大致相同。本文着重介绍一种基于 FPS200传感芯片与 MCU 电路连接的指纹图像采集的方案,以及基于方向滤波的指纹图像处理的方案,并将得到的结果与标准进行对比。2 指纹识别系统的整体设计方案指纹识别技术是通过取像设备读取指纹图像,然后用计算机识别软件提取指纹的特征数据,最后通过匹配识别算法得到识别结果,以确定指纹所有人身份的生物特

3、征识别技术。指纹识别技术主要涉及指纹图像采集、指纹图像处理、特征提取、保存数据、特征值的比对与匹配等过程。自动指纹识别系统(Automatic Fingerprint Identification System,简称 AFIS)可以分成“离线部分”和“在线部分”两个部分:离线部分 用指纹采集仪采集指纹,提取出细节点,然后将细节点保存到数据库中,形成指纹模板库。在线部分用指纹采集仪采集指纹,提取出细节点,然后将这些细节点与保存在数据库中模板细节点进行匹配,判断输入细节点与模板细节点是否来自同一个手指的指纹。自动指纹识别系统框图如下图 1 所示:3 指纹识别系统的硬件设计硬件平台大致可以分为4 个

4、部分:电源部分、核心部件(CPU)、JTAG调式接口以及外部串行接口单元(SPI)。如图 2 所示:其中 Power电源部分负责给系统供电。该系统是一个多电平系统,包括5V电源,3.3V 电源以及 1.8V 电源。电源部分采用常见的LDO电压转换芯片实现 5V输入电压到 3.3V,1.8V 的转换。JTAG仿真器是采用的是WAVE系列仿真器。JTAG调试接口用于程序的跟踪和调试。SPI 接口用于和 RS232互联。核心部件是系统中最主要的部分,它包括中央处理单元80C51MCU 芯片、FPS200芯片、RS232串口芯片以及 LCD模块。4 指纹识别系统的基本算法文档编码:CH2U7L1C7Y

5、4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R

6、1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G

7、5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T

8、1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I1

9、0S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编

10、码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U

11、7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2指纹识别系统设计的整体流程大部分工作集中在图像处理和图像识别阶段。其中的图像的平滑滤波,图像与背景分离,方向信息提取,纹线提取,图像分割,图像细化,图像后处理都是属于图像处理的范畴;而特征提取,指纹

12、匹配,匹配结果都属于图像识别。下面将重点对图像增强,特征提取,指纹匹配等关键步骤进行论述。(一)图像增强指纹增强的目的是为了可靠的提取指纹特征。由于人为的因素和采集条件的影响,采集到的指纹图像会不同程度地受到各种噪声的干扰。具体做法是首先将输入的指纹灰度图像用滤波来增强指纹图像并得到二值图像,并细化二值图像得到细化后的图像,再结合二值图像和细化后的图像做规则引导下的两个步骤处理:第一步是对简单的脊线结构,即明显的断线、脊线间明显的桥、以及作为短脊线存在的毛刺等用简单的规则做初步处理;为了克服指纹形变,第二步是利用前述两个主要的知识,先在脊线的端点用一次或二次曲线来拟合局部脊线,再沿该端点的方向

13、延伸得到的拟合曲线,并根据端点附近的脊线信息建立不同的处理规则来处理不同的情况。经过这些处理得到最终的增强后二值图像,这样提取出的细节点和采集的脊线点更可靠有效。一个专业的指纹识别依赖于对脊线结构、细节点的辨识。然而在实践中,由于手指本身的因素和采集条件的影响,采集到的指纹图像会不同程度地受到各种噪声地干扰,因此在进行分类和细节匹配之前一般要对采集到的指纹图像做增强处理。对于一个自动指纹识别系统来说,图像增强算法的优劣很大程度决定了系统性能的好坏。图像的增强采用平滑、滤波、二值化、细化等数字图像处理方法来进行。(二)特征提取特征提取的基本过程是,将灰度指纹图转换成黑白图像,然后生成方向数组。此

14、数组是分类系统使用的基本特征。匹配两幅指纹图像大量地采用基于比对两幅指纹图像的点模式的方法。用来匹配的点称为细节点。通常指纹特征可以分为两类:细节特征和单独点(有的文献中称为奇异点)。用来匹配指纹图像的点称为细节点,在指纹图像拓扑中,它们是脊终点和分叉点。单独点包括中心点和三角点。三角点和中心点之间的距离以及脊线的数目一般认为不会随图像变换、旋转、放大和缩小而改变。(三)指纹匹配指纹图像匹配就是对两个输入指纹的特征集合(模板)判断是否属于同一指纹。点模式匹配是预先从指纹图像中提取出的细节点集与输入的待匹配的指纹图像中提取出的细节点集的匹配。它利用脊线末梢(我们称为端点)与脊线分支点这两种关键点

15、来鉴定指纹。通过将细节点表示为点模式,一个自动指纹认证问题可以转化为一个点模式匹配(细节匹配)问题。如果两幅指纹图像是匹配的,那么这两个点集通过某些变换,如旋转、伸缩及平移,可以得到较好的匹配。5 指纹图像处理的算法及其实现(一)图像的方向滤波首先确定脊线方向图,然后求块方向,将点方向图划分成NxN大小的块,计算块内点方向分布概率。块内点方向分布概率最大所对应的方向即为相应的块方向,继而获得块方向图。最后我们采用方向滤波器(水平方向滤波器,其他方向通过旋转得到)对块方向图作滤波处理。方向滤波器属双重滤波器,有两组权函数,分别对应平均滤波和分离滤波。在运用方向滤波器对块方向图去噪时,方向滤波器的

16、选择由块方向决定。(二)图像的二值化处理文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5

17、 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1

18、A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10

19、S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码

20、:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7

21、L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4

22、 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2二值化操作把灰度指纹图像变成0、1 取值的图像。不同指纹图像,其灰度深度是存在差异的。同一幅指纹图像,不同部位其明暗分布可能是不

23、同的。因此,在对指纹图像二值化的过程中,选用固定的阀值显然不合适,研究中,我们将指纹图像分成若干个16X16的子区,先计算各子区的灰度均值,以此均值作为相应子区的阀值。将阀值与给定条件相比较(这样做是为了防止阀值过低而引入噪音),如结果为真,则以该阀值为标准,作二值化处理,否则相应子区二值化结果全为0。(三)图像的细化所谓细化就是将二值图像变换为宽度为一个象素的线图像。细化操作要求处理后的图像具有良好的连通性、保持性与快速性。鉴于指纹图像为脊,谷线交替排列的特点,本文采用最近邻点的方式抽取线骨架,即对点(j,k),判断其上下左右四个邻点是否满足一组方程,若成立,保留相应的邻点,否则予以删除。根

24、据上面的算法,在MATLAB 编程平台上实现算法(部分原程序):function pd=dot_direction(x,y)%dot_direction的作用是计算点的脊点方向;%将点(x,y)取 16 个方向,从 6 点钟方向逆时针旋转一周,方向间距为pi/8;%x代表列;y 代表行;%sd(116)分别代表 16 个方向上的取值,找出其中最小值为脊点方向;sd=zeros(1,16);for i=1:16sd(i)=zip1(i,x,y);endmin=sd(1);pd=1;for s=1:16if minsd(s)min=sd(s);pd=s;endend6 实验结果及分析本实验小组的成

25、员共6 人,数据采集都成功完成,并且得到采集上来的原始图像,以下是本人的大拇指纹图像(图 3):文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2

26、文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:C

27、H2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1

28、C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 H

29、C5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8

30、R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 Z

31、G3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2以上图为例,后期的图像处理主要经过了滤波,方向滤波,二值化,细化等步骤,

32、分别显示出来的图像如(图 4)所示:文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 Z

33、G3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A1

34、0I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2

35、文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:C

36、H2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1

37、C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 H

38、C5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2经滤波,方向滤波,二值化,细化等步骤最终得到的指纹图像,基本上肉眼就能区分脊终点和脊分叉等特征点,也为后期的特征提取工作打下了良好的

39、基础。7 结束语在前面的讨论中,我们介绍了指纹图像采集,指纹图像处理,指纹图像的提取和指纹图像匹配的基本方法,并且给出了图像采集和图像处理的实现方案以及结果。从最终的结果分析,可以看出我们的这一整套设计方案是有效的,基本达到了设计前所预想的效果。虽然整个指纹系统的设计工作还没有完成(特征提取和指纹匹配未完成),但是前期的工作已经为后期的工作打下了良好的基础。下一步我们的主要任务是完成基于方向滤波后的指纹图像的特征提取和指纹匹配的设计,以及通过计算机语言实现该算法。前期的设计工作已经完成,到还是有许多可以继续改进的地方,硬件的设计可以换成是基于DSP为核心处理单元的硬件电路,这样可以加快数据采集

40、的速度与准确性,图像处理的算法也不是唯一的,算法也是不断在跟新的,朝着更快捷更准确更高效的方向发展。无论是从硬件方面还是软件方面来看,指纹识别技术的文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4

41、 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1

42、V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5

43、 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1

44、A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10

45、S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码

46、:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2发展是非常迅猛的,我

47、相信指纹识别技术全面普及将会很快的实现,我也希望我能为此做出我的一点贡献。参 考 文 献1 刘少聪.新指纹学.合肥:安徽人民出版社,1984.2 胡汉才.单片机原理及其接口技术.北京:清华大学出版社,1996.3 张贤达.现代信号处理.北京:清华大学出版社,2002.10.4 姚天任,孙洪.现代数字信号处理.武汉:华中科技大学出版社,1999.11.5 傅德胜,寿亦禾.图形图像处理学.南京:东南大学出版社,2001.12.6 赵荣椿.数字图像处理导论.西安:西北工业大学书版社,1995.6.7 霍宏涛.数字图像处理.北京:机械工业出版社,2003.5.8 徐建华.图像处理与分析.北京:北京科学

48、出版社,1992.9 李广第.单片机基础.北京:北京航空航天大学出版社,2001.7.10 希尔特(Schildt,h.).C 语言大全.北京:电子工业出版社,2001.9.11 曹青.Visual Basic程序设计教程.北京:机械工业出版社,2002.2.12 夏路易,石宗义.电路原理与电路设计教程.北京:北京希望电子出版社,2002.6.13 周金萍.MATLAB 6.5 图形图像处理与应用实例.北京:科学出版社,2003.14 张志勇.精通 MATLAB 6.5.北京:北京航空航天大学出版社,2003.3.文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10

49、S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码

50、:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7L1C7Y4 HC5R1V8R6G5 ZG3T1A10I10S2文档编码:CH2U7

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 教育专区 > 高考资料

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁