A multi-spectral palmprint fuzzy commitment based on deep hashing code with discriminative bit selection

T Wu, L Leng, MK Khan - Artificial Intelligence Review, 2023 - Springer
Direct usage of original biometric features/templates definitely leads to serious privacy
leakage. In biometric cryptosystems, a biometric key is generated and then strictly protected …

Palmprint-palmvein fusion recognition based on deep hashing network

T Wu, L Leng, MK Khan, FA Khan - IEEE Access, 2021 - ieeexplore.ieee.org
Palmprint has attracted increasing attention due to its several advantages in the biometrics
field. Deep learning has achieved remarkable performance in the computer vision area, so a …

CO3Net: Coordinate-Aware Contrastive Competitive Neural Network for Palmprint Recognition

Z Yang, W Xia, Y Qiao, Z Lu, B Zhang… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Palmprint recognition achieves high discrimination for identity verification. Compared with
handcrafted local texture descriptors, convolutional neural networks (CNNs) can …

Multi-order texture features for palmprint recognition

Z Yang, L Leng, T Wu, M Li, J Chu - Artificial Intelligence Review, 2023 - Springer
Palmprint attracts increasing attention thanks to its several advantages. 1st-order textures
have been widely used for palmprint recognition; unfortunately, high-order textures …

Extreme downsampling and joint feature for coding-based palmprint recognition

Z Yang, L Leng, W Min - IEEE Transactions on Instrumentation …, 2020 - ieeexplore.ieee.org
Palmprint is a commonly used and significant modality for biometric recognition currently.
The coding-based methods are practical for palmprint recognition because they can be free …

Palmprint false acceptance attack with a generative adversarial network (GAN)

F Wang, L Leng, ABJ Teoh, J Chu - Applied Sciences, 2020 - mdpi.com
Biometric-based authentication is widely deployed on multimedia systems currently;
however, biometric systems are vulnerable to image-level attacks for impersonation …

Reinforced palmprint reconstruction attacks in biometric systems

Y Sun, L Leng, Z Jin, BG Kim - Sensors, 2022 - mdpi.com
Biometric signals can be acquired with different sensors and recognized in secure identity
management systems. However, it is vulnerable to various attacks that compromise the …

Multi-task pre-training with soft biometrics for transfer-learning palmprint recognition

H Xu, L Leng, Z Yang, ABJ Teoh, Z Jin - Neural Processing Letters, 2023 - Springer
As a discriminative biometric modality, palmprint accommodates two attributes of soft
biometrics, namely chirality and gender. Our study reveals that the false matching of a pair of …

Two novel style-transfer palmprint reconstruction attacks

Z Yang, L Leng, B Zhang, M Li, J Chu - Applied Intelligence, 2023 - Springer
Palmprint has been widely used for personal authentication in many applications, such that
the assessment of recognition system security is important. Online attacks of palmprint …

Downsampling in uniformly-spaced windows for coding-based Palmprint recognition

Z Yang, L Leng, W Min - Multimedia Tools and Applications, 2023 - Springer
Palmprint is deemed as one of the most important biometric modalities. Many coding-based
palmprint recognition methods have achieved satisfactory recognition performance, which …