Key Point Localization Based on Intersecting Circle for Palmprint Preprocessing in Public Security
暂无分享,去创建一个
[1] Lu Leng. Palmprint Recognition System with Double-assistant-point on iOS Mobile Devices , 2018, BMVC.
[2] Murat Ekinci,et al. AAM-based palm segmentation in unrestricted backgrounds and various postures for palmprint recognition , 2013, Pattern Recognit. Lett..
[3] Lu Leng,et al. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security , 2011, J. Netw. Comput. Appl..
[4] Koichi Ito,et al. A Contactless Palmprint Authentication Algorithm for Mobile Phones , 2013 .
[5] LI Zi-liang. Palmprint segmentation algorithm based on geometric features , 2010 .
[6] Ming Li,et al. A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion , 2014, Secur. Commun. Networks.
[7] Andrew Beng Jin Teoh,et al. Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition , 2014, Neurocomputing.
[8] L. Leng,et al. Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.
[9] Slobodan Ribaric,et al. Real-Time Model-Based Hand Localization for Unsupervised Palmar Image Acquisition , 2009, ICB.
[10] Ming Li,et al. Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code , 2014, Multimedia Tools and Applications.
[11] Ming Li,et al. Dual-source discrimination power analysis for multi-instance contactless palmprint recognition , 2015, Multimedia Tools and Applications.
[12] Murat Ekinci,et al. Developing a contactless palmprint authentication system by introducing a novel ROI extraction method , 2015, Image Vis. Comput..
[13] Muhammad Khurram Khan,et al. Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain , 2010 .
[14] Adams Wai-Kin Kong,et al. Palmprint Recognition in Uncontrolled and Uncooperative Environment , 2019, IEEE Transactions on Information Forensics and Security.
[15] Dipak Ghosal,et al. Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks , 2016, Mob. Networks Appl..
[16] Dzati Athiar Ramli,et al. Evaluation on palm-print ROI selection techniques for smart phone based touch-less biometric system , 2013 .
[17] Ruan Qiu-qi. A New Preprocessing Method of Palmprint , 2008 .
[18] Zhang Jia-shu. Development and integration of software platform for palmprint recognition based on software component , 2012 .
[19] Lu Leng,et al. PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.
[20] 이상호,et al. Effective Palm Print Authentication Guideline Image with Smart Phone , 2014 .
[21] Fumeng Gao,et al. Palmprint recognition system on mobile devices with double-line-single-point assistance , 2018, Personal and Ubiquitous Computing.
[22] Fumeng Gao,et al. Mobile Palmprint Segmentation Based on Improved Active Shape Model , 2018, J. Multim. Inf. Syst..
[23] Lu Leng,et al. Non-contact Palmprint Attendance System on PC Platform , 2018 .
[24] Ming Li,et al. Simplified 2DPalmHash code for secure palmprint verification , 2017, Multimedia Tools and Applications.
[25] Koichi Ito,et al. Palm region extraction for contactless palmprint recognition , 2015, 2015 International Conference on Biometrics (ICB).
[26] David Zhang,et al. Feature Extraction Methods for Palmprint Recognition: A Survey and Evaluation , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[27] Muhammad Khurram Khan,et al. Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing , 2014, 2014 11th International Conference on Information Technology: New Generations.
[28] Xiang Fu,et al. Palmprint Verification System with Dual-Line-Single-Point Assistance on Android Mobile Devices , 2018, 2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC).
[29] Andrew Beng Jin Teoh,et al. Conjugate 2DPalmHash code for secure palm-print-vein verification , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).
[30] Ming Li,et al. Matching reduction of 2DPalmHash Code , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).
[31] DAVID ZHANG,et al. A Comparative Study of Palmprint Recognition Algorithms , 2012, CSUR.
[32] Neera,et al. Mobile based palmprint recognition system , 2015, 2015 International Conference on Control, Automation and Robotics.
[33] Tjokorda Agung Budi Wirayuda,et al. Real-time hand-tracking on video image based on palm geometry , 2013, 2013 International Conference of Information and Communication Technology (ICoICT).
[34] Lu Leng,et al. Palmhash Code for palmprint verification and protection , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[35] Liu Gan. Location Method of Touchless Palmvein Image Using Point Set Operation , 2015 .
[36] Ming Li,et al. Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[37] Muhammad Khurram Khan,et al. Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion , 2011, STA.
[38] Zhenhua Guo,et al. Palmprint verification using binary orientation co-occurrence vector , 2009, Pattern Recognit. Lett..
[39] Andrew Beng Jin Teoh,et al. Theoretical analysis on the performance of PalmPhasor algorithm , 2015 .
[40] Jing Xu,et al. Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).
[41] A.M. Aibinu,et al. A Novel Palmprint Segmentation Technique , 2011, 2011 First International Conference on Informatics and Computational Intelligence.
[42] Muhammad Khurram Khan,et al. Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition , 2011, ICCSA.
[43] Jin Su Kim,et al. An empirical study of palmprint recognition for mobile phones , 2015, IEEE Transactions on Consumer Electronics.
[44] Andrew Beng Jin Teoh,et al. Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault , 2015, Pattern Recognit..
[45] David Zhang,et al. Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..