Key Point Localization Based on Intersecting Circle for Palmprint Preprocessing in Public Security

[1]  Lu Leng Palmprint Recognition System with Double-assistant-point on iOS Mobile Devices , 2018, BMVC.

[2]  Murat Ekinci,et al.  AAM-based palm segmentation in unrestricted backgrounds and various postures for palmprint recognition , 2013, Pattern Recognit. Lett..

[3]  Lu Leng,et al.  Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security , 2011, J. Netw. Comput. Appl..

[4]  Koichi Ito,et al.  A Contactless Palmprint Authentication Algorithm for Mobile Phones , 2013 .

[5]  LI Zi-liang Palmprint segmentation algorithm based on geometric features , 2010 .

[6]  Ming Li,et al.  A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion , 2014, Secur. Commun. Networks.

[7]  Andrew Beng Jin Teoh,et al.  Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition , 2014, Neurocomputing.

[8]  L. Leng,et al.  Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.

[9]  Slobodan Ribaric,et al.  Real-Time Model-Based Hand Localization for Unsupervised Palmar Image Acquisition , 2009, ICB.

[10]  Ming Li,et al.  Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code , 2014, Multimedia Tools and Applications.

[11]  Ming Li,et al.  Dual-source discrimination power analysis for multi-instance contactless palmprint recognition , 2015, Multimedia Tools and Applications.

[12]  Murat Ekinci,et al.  Developing a contactless palmprint authentication system by introducing a novel ROI extraction method , 2015, Image Vis. Comput..

[13]  Muhammad Khurram Khan,et al.  Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain , 2010 .

[14]  Adams Wai-Kin Kong,et al.  Palmprint Recognition in Uncontrolled and Uncooperative Environment , 2019, IEEE Transactions on Information Forensics and Security.

[15]  Dipak Ghosal,et al.  Reduced Overhead Frequent User Authentication in EAP-Dependent Broadband Wireless Networks , 2016, Mob. Networks Appl..

[16]  Dzati Athiar Ramli,et al.  Evaluation on palm-print ROI selection techniques for smart phone based touch-less biometric system , 2013 .

[17]  Ruan Qiu-qi A New Preprocessing Method of Palmprint , 2008 .

[18]  Zhang Jia-shu Development and integration of software platform for palmprint recognition based on software component , 2012 .

[19]  Lu Leng,et al.  PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.

[20]  이상호,et al.  Effective Palm Print Authentication Guideline Image with Smart Phone , 2014 .

[21]  Fumeng Gao,et al.  Palmprint recognition system on mobile devices with double-line-single-point assistance , 2018, Personal and Ubiquitous Computing.

[22]  Fumeng Gao,et al.  Mobile Palmprint Segmentation Based on Improved Active Shape Model , 2018, J. Multim. Inf. Syst..

[23]  Lu Leng,et al.  Non-contact Palmprint Attendance System on PC Platform , 2018 .

[24]  Ming Li,et al.  Simplified 2DPalmHash code for secure palmprint verification , 2017, Multimedia Tools and Applications.

[25]  Koichi Ito,et al.  Palm region extraction for contactless palmprint recognition , 2015, 2015 International Conference on Biometrics (ICB).

[26]  David Zhang,et al.  Feature Extraction Methods for Palmprint Recognition: A Survey and Evaluation , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[27]  Muhammad Khurram Khan,et al.  Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint Preprocessing , 2014, 2014 11th International Conference on Information Technology: New Generations.

[28]  Xiang Fu,et al.  Palmprint Verification System with Dual-Line-Single-Point Assistance on Android Mobile Devices , 2018, 2018 4th Annual International Conference on Network and Information Systems for Computers (ICNISC).

[29]  Andrew Beng Jin Teoh,et al.  Conjugate 2DPalmHash code for secure palm-print-vein verification , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).

[30]  Ming Li,et al.  Matching reduction of 2DPalmHash Code , 2014, 2014 International Symposium on Biometrics and Security Technologies (ISBAST).

[31]  DAVID ZHANG,et al.  A Comparative Study of Palmprint Recognition Algorithms , 2012, CSUR.

[32]  Neera,et al.  Mobile based palmprint recognition system , 2015, 2015 International Conference on Control, Automation and Robotics.

[33]  Tjokorda Agung Budi Wirayuda,et al.  Real-time hand-tracking on video image based on palm geometry , 2013, 2013 International Conference of Information and Communication Technology (ICoICT).

[34]  Lu Leng,et al.  Palmhash Code for palmprint verification and protection , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).

[35]  Liu Gan Location Method of Touchless Palmvein Image Using Point Set Operation , 2015 .

[36]  Ming Li,et al.  Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code , 2013, 2013 International Symposium on Biometrics and Security Technologies.

[37]  Muhammad Khurram Khan,et al.  Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion , 2011, STA.

[38]  Zhenhua Guo,et al.  Palmprint verification using binary orientation co-occurrence vector , 2009, Pattern Recognit. Lett..

[39]  Andrew Beng Jin Teoh,et al.  Theoretical analysis on the performance of PalmPhasor algorithm , 2015 .

[40]  Jing Xu,et al.  Dynamic weighted discrimination power analysis in DCT domain for face and palmprint recognition , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).

[41]  A.M. Aibinu,et al.  A Novel Palmprint Segmentation Technique , 2011, 2011 First International Conference on Informatics and Computational Intelligence.

[42]  Muhammad Khurram Khan,et al.  Two-Directional Two-Dimensional Random Projection and Its Variations for Face and Palmprint Recognition , 2011, ICCSA.

[43]  Jin Su Kim,et al.  An empirical study of palmprint recognition for mobile phones , 2015, IEEE Transactions on Consumer Electronics.

[44]  Andrew Beng Jin Teoh,et al.  Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault , 2015, Pattern Recognit..

[45]  David Zhang,et al.  Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..