A comparative study of palmprint recognition algorithms

D Zhang, W Zuo, F Yue - ACM computing surveys (CSUR), 2012 - dl.acm.org
Palmprint images contain rich unique features for reliable human identification, which makes
it a very competitive topic in biometric research. A great many different low resolution …

A survey of palmprint recognition

A Kong, D Zhang, M Kamel - pattern recognition, 2009 - Elsevier
Palmprint recognition has been investigated over 10 years. During this period, many
different problems related to palmprint recognition have been addressed. This paper …

Finger vein secure biometric template generation based on deep learning

Y Liu, J Ling, Z Liu, J Shen, C Gao - Soft Computing, 2018 - Springer
Leakage of unprotected biometric authentication data has become a high-risk threat for
many applications. Lots of researchers are investigating and designing novel authentication …

Palmhash code vs. palmphasor code

L Leng, J Zhang - Neurocomputing, 2013 - Elsevier
The existing palmprint protection schemes without verification degrading do not strictly meet
non-invertible requirement; while non-invertible palmprint protection schemes do not meet …

Alignment-free row-co-occurrence cancelable palmprint fuzzy vault

L Leng, ABJ Teoh - Pattern Recognition, 2015 - Elsevier
Texture coding approach of palmprint biometric enjoys several merits; however, palmprint
texture code suffers from alignment problem during matching, which hinders it from being …

Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing

H Kaur, P Khanna - Future Generation Computer Systems, 2020 - Elsevier
Biometric authentication over cloud and network applications demands a wide range of
solutions against increasing cyber crimes and digital identity thefts. This work addresses …

Secure biometric template generation for multi-factor authentication

SH Khan, MA Akbar, F Shahzad, M Farooq, Z Khan - Pattern Recognition, 2015 - Elsevier
In the light of recent security incidents, leading to compromise of services using single factor
authentication mechanisms, industry and academia researchers are actively investigating …

Conjugate 2DPalmHash code for secure palm-print-vein verification

L Leng, M Li, ABJ Teoh - … on image and signal processing (CISP …, 2013 - ieeexplore.ieee.org
Multi-modal biometrics enjoy more merits than their single-modal counterparts in terms of
accuracy performance and security. The fusion of hand-based biometrics such as palmprint …

An algorithm for finger-vein segmentation based on modified repeated line tracking

T Liu, JB Xie, W Yan, PQ Li, HZ Lu - The Imaging Science Journal, 2013 - Taylor & Francis
Image segmentation is an important step for finger-vein identification technique. However, it
is difficult to extract precise details of the image because of the irregular noise and shades …

A survey on different continuous authentication systems

S Ayeswarya, J Norman - International Journal of Biometrics, 2019 - inderscienceonline.com
There has been significant research in the provision of trustworthy initial login user
authentication, however, there is still need for continuous authentication during a user …