no code implementations • 31 Jul 2023 • Yapeng Su, Tong Zhao, ZiCheng Zhang
However, previous works including CNN-based and Transformer-based approaches fail to exploit the nonstructural data, such as topology and correlation in fingerprints, which is essential to facilitate the identifiability and robustness of embedding.