Biometric OAuth service based on finger-knuckles

The need for providing delicate authentication-based systems via biometric-based methods is increasing by the time. This importance is even more sustained for customer-oriented applications, especially the web-based systems. Having this authentication mechanism provides user friendly solutions for login that help the users to avoid thinking about memorizing different passwords or having to have periodic passwords changes.

[1]  Michael Goh Kah Ong,et al.  A single-sensor hand geometry and palmprint verification system , 2003, WBMA '03.

[2]  James Theiler,et al.  Contiguity-enhanced k-means clustering algorithm for unsupervised multispectral image segmentation , 1997, Optics & Photonics.

[3]  Eduardo D. Sontag,et al.  Neural Systems as Nonlinear Filters , 2000, Neural Computation.

[4]  Miguel A. Ferrer,et al.  Improved finger-knuckle-print authentication based on orientation enhancement , 2011 .

[5]  Kurt Konolige,et al.  Projected texture stereo , 2010, 2010 IEEE International Conference on Robotics and Automation.

[6]  Hong Jiang,et al.  Identification and Authentication in Large-Scale Storage Systems , 2009, 2009 IEEE International Conference on Networking, Architecture, and Storage.

[7]  Antonio Adán,et al.  Personal Authentication Based on Hands Natural Layout , 2005, MVA.

[8]  Leon Kaufman,et al.  A general algorithm for oblique image reconstruction , 1990, IEEE Computer Graphics and Applications.

[9]  Jan K. Buitelaar,et al.  Partition-based mass clustering of tractography streamlines , 2011, NeuroImage.

[10]  Pedro M. Domingos,et al.  Naive Bayes models for probability estimation , 2005, ICML.

[11]  Yonghong Zeng,et al.  Cooperative Spectrum Sensing in Cognitive Radio Networks with Weighted Decision Fusion Scheme , 2010, 2010 IEEE 71st Vehicular Technology Conference.

[12]  Ahmed Bouridane,et al.  Fusion of Finger-Knuckle-Print and Palmprint for an Efficient Multi-Biometric System of Person Recognition , 2011, 2011 IEEE International Conference on Communications (ICC).

[13]  David Zhang,et al.  Online finger-knuckle-print verification for personal authentication , 2010, Pattern Recognit..

[14]  Keiji Yanai,et al.  A SURF-Based Spatio-Temporal Feature for Feature-Fusion-Based Action Recognition , 2010, ECCV Workshops.

[15]  Ralph R. Martin,et al.  Bas-relief Generation Using Adaptive Histogram Equalisation , 2022 .

[16]  F. A. Afsar,et al.  Fingerprint Identification and Verification System using Minutiae Matching , 2004 .

[17]  A. Traboulsee,et al.  Invariant SPHARM Shape Descriptors for Complex Geometry in MR Region of Interest Analysis , 2007, 2007 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[18]  Xike Xie,et al.  UV-diagram: A Voronoi diagram for uncertain data , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[19]  Cordelia Schmid,et al.  Is that you? Metric learning approaches for face identification , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[20]  Hong Yan,et al.  ROI extraction from motion affected MR images by suppression of blurring and motion artifacts in the image background , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[21]  Manuel Castro,et al.  Web Tests in LMS Using Fingerprint Identification , 2010, 2010 10th IEEE International Conference on Advanced Learning Technologies.

[22]  Ohad Shamir,et al.  Stability and model selection in k-means clustering , 2010, Machine Learning.

[23]  Y. Miyoshi,et al.  Difference-of-Gaussian-Like Characteristics for Optoelectronic Visual Sensor , 2007, IEEE Sensors Journal.

[24]  V. Haertel,et al.  Adaptive low-pass fuzzy filter for noise removal , 1995 .

[25]  Henry Tirri,et al.  On Discriminative Bayesian Network Classifiers and Logistic Regression , 2005, Machine Learning.

[26]  Reynold Cheng,et al.  Naive Bayes Classification of Uncertain Data , 2009, 2009 Ninth IEEE International Conference on Data Mining.

[27]  D.M. Mount,et al.  An Efficient k-Means Clustering Algorithm: Analysis and Implementation , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[28]  P. C. Eng,et al.  FPGA-based embedded hand vein biometric authentication system , 2009, TENCON 2009 - 2009 IEEE Region 10 Conference.

[29]  Mohamed S. Kamel,et al.  Decision fusion in neural network ensembles , 2001, IJCNN'01. International Joint Conference on Neural Networks. Proceedings (Cat. No.01CH37222).

[30]  K.Velmurugan,et al.  Content-Based Image Retrieval using SURF and Colour Moments , 2011 .

[31]  Eui Chul Lee,et al.  New Finger Biometric Method Using Near Infrared Imaging , 2011, Sensors.

[32]  George M. Mohay,et al.  A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic , 2008, 2008 IFIP International Conference on Network and Parallel Computing.

[33]  Michel Defrise,et al.  REVIEW: Image reconstruction , 2006 .

[34]  M. Defrise,et al.  Image reconstruction. , 2006, Physics in medicine and biology.

[35]  Eunsung Lee,et al.  Image restoration using alpha map-based fusion for multiple color aperture computational camera , 2010, 2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE).