X Wu, K Wang, D Zhang - International Conference on Biometric …, 2004 - Springer
This paper presents a novel approach of palmprint identification with Hidden Markov Models (HMMs). Palmprint is first aligned and normalized by using the boundary of the fingers. Then …
Most of the existing techniques for palmprint recognition rely on metrics, typically based on static functions, which evaluate the distance between a pair of features. In this paper, we …
MM Ali, VH Mahale, PL Yannawar… - International Journal of …, 2018 - academia.edu
The palmprint recognition system has active research works over 15 years, which are employed on different images resolution (High and Low). This paper shows the types of …
XQ Wu, KQ Wang, D Zhang - Proceedings of the 2003 …, 2003 - ieeexplore.ieee.org
In this paper, a novel method for palmprint recognition is proposed. In this method, each pixel of a palmprint image is considered as a coordinate in a high-dimensional image space …
This paper presents a new personal authentication system that simultaneously exploits 2D and 3D palmprint features. The objective of our work is to improve accuracy and robustness …
S Iitsuka, K Ito, T Aoki - 2008 19th International Conference on …, 2008 - ieeexplore.ieee.org
This paper proposes a practical palmprint recognition algorithm using two-dimensional (2D) phase information. The proposed algorithm (i) reduces the registered data size by …
D Zhang, WK Kong, J You… - IEEE Transactions on …, 2003 - ieeexplore.ieee.org
Biometrics-based personal identification is regarded as an effective method for automatically recognizing, with a high confidence, a person's identity. This paper presents a new biometric …
W Jiang, J Tao, L Wang - International Conference on Digital …, 2006 - ieeexplore.ieee.org
Recently palmprint recognition received many researchers' attention because of it's low resolution and cheap devices. As other features recognition, algebraic feature is the …
CC Han, HL Cheng, CL Lin, KC Fan - Pattern recognition, 2003 - Elsevier
Biometrics-based authentication is a verification approach using the biological features inherent in each individual. They are processed based on the identical, portable, and …