YLM Latha, MVNK Prasad - International Journal of …, 2017 - inderscienceonline.com
Palmprint technology is a new branch of biometrics used to identify an individual. Palmprint has rich set of features like palm lines, wrinkles, minutiae points, texture, ridges, etc. Several …
R Luo, T Lin - Chinese Optics Letters, 2007 - opg.optica.org
The finger joint lines defined as finger creases and its distribution can identify a person. In this paper, we propose a new finger crease pattern recognition method based on Legendre …
AN Pour, E Eslami… - International Journal of …, 2015 - inderscienceonline.com
Personal identification based on vein pattern is one of the latest biometric approaches that have ever attracted lots of attentions. The method of personal identification suggested in this …
S Shekhar, BVS Kumar… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Palmprint based biometric system is potentially a good choice for biometric applications due to its richness in amount of features. Palmprint contains geometric features, line features …
X Cheng, S Wang - 2008 International Conference on …, 2008 - ieeexplore.ieee.org
Palmprint is one of the relatively new physiological biometrics due to its stable and unique characteristics. The rich texture information of palmprint offers one of the powerful means in …
S Zhang, B Zhang - 2010 Second International Conference on …, 2010 - ieeexplore.ieee.org
This paper presents a system called DCMR. Content-based video searching is a challenging field, and most research focus on the low level features such as color histogram …
Z Guo, D Zhang, L Zhang - Computer Analysis of Images and Patterns …, 2009 - Springer
Palmprint as a new biometric has received great research attention in the past decades. It owns many merits, such as robustness, low cost, user friendliness, and high accuracy. Most …
H Ota, S Aoyama, R Watanabe, K Ito, Y Miyake… - Multimedia …, 2013 - Springer
When a cellular phone is lost or stolen, it may be used improperly or the personal information may be stolen from it by a malicious user. Biometric authentication such as …