Y. Morales, L. Díaz, F. Vega, C. Torres, L. Mattos
{"title":"指纹边缘检测中的径向希尔伯特变换及其在数字相关中的应用","authors":"Y. Morales, L. Díaz, F. Vega, C. Torres, L. Mattos","doi":"10.1109/STSIVA.2012.6340594","DOIUrl":null,"url":null,"abstract":"It is well-known that the Hilbert transform (HLT) is useful for generating the analytic signal, and saving the bandwidth required in communication. However, it is known by less people that the HLT is used for edge detection. In this paper, we introduce the radiant Hilbert transform (RHLT), and illustrate how to use it for edge detection with advantage noise immunity, obtaining this form the image squeleton fingerprint. The implemented system the images are entered into a Digital Correlator that uses the Fourier transform to change the space of representation, facilitating, the correlation operation and authenticate the user stored in the data base.","PeriodicalId":383297,"journal":{"name":"2012 XVII Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Radial Hilbert transform in the detect edges of fingerprinting and its application in digital correlation\",\"authors\":\"Y. Morales, L. Díaz, F. Vega, C. Torres, L. Mattos\",\"doi\":\"10.1109/STSIVA.2012.6340594\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is well-known that the Hilbert transform (HLT) is useful for generating the analytic signal, and saving the bandwidth required in communication. However, it is known by less people that the HLT is used for edge detection. In this paper, we introduce the radiant Hilbert transform (RHLT), and illustrate how to use it for edge detection with advantage noise immunity, obtaining this form the image squeleton fingerprint. The implemented system the images are entered into a Digital Correlator that uses the Fourier transform to change the space of representation, facilitating, the correlation operation and authenticate the user stored in the data base.\",\"PeriodicalId\":383297,\"journal\":{\"name\":\"2012 XVII Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 XVII Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/STSIVA.2012.6340594\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 XVII Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STSIVA.2012.6340594","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Radial Hilbert transform in the detect edges of fingerprinting and its application in digital correlation
It is well-known that the Hilbert transform (HLT) is useful for generating the analytic signal, and saving the bandwidth required in communication. However, it is known by less people that the HLT is used for edge detection. In this paper, we introduce the radiant Hilbert transform (RHLT), and illustrate how to use it for edge detection with advantage noise immunity, obtaining this form the image squeleton fingerprint. The implemented system the images are entered into a Digital Correlator that uses the Fourier transform to change the space of representation, facilitating, the correlation operation and authenticate the user stored in the data base.