-
1
-
-
3242680768
-
A hand-based personal authentication using a coarse-to-fine strategy
-
Han C.C. A hand-based personal authentication using a coarse-to-fine strategy. Image Vision Comput. 22 11 (2004) 909-918
-
(2004)
Image Vision Comput.
, vol.22
, Issue.11
, pp. 909-918
-
-
Han, C.C.1
-
2
-
-
0141725475
-
Online palmprint identification
-
Zhang D., Kong W.K., You J., and Wong M. Online palmprint identification. IEEE Trans. Pattern Anal. Mach. Intell. 25 9 (2003) 1041-1050
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.25
, Issue.9
, pp. 1041-1050
-
-
Zhang, D.1
Kong, W.K.2
You, J.3
Wong, M.4
-
3
-
-
0036487321
-
Personal authentication using palm-print features
-
Han C.C., Cheng H.L., Lin C.L., and Fan K.C. Personal authentication using palm-print features. Pattern Recognition 36 2 (2003) 371-381
-
(2003)
Pattern Recognition
, vol.36
, Issue.2
, pp. 371-381
-
-
Han, C.C.1
Cheng, H.L.2
Lin, C.L.3
Fan, K.C.4
-
4
-
-
0037410759
-
Palmprint recognition using eigenpalms features
-
Lu G., Zhang D., and Wang K. Palmprint recognition using eigenpalms features. Pattern Recognition Lett. 24 9 (2003) 1463-1467
-
(2003)
Pattern Recognition Lett.
, vol.24
, Issue.9
, pp. 1463-1467
-
-
Lu, G.1
Zhang, D.2
Wang, K.3
-
5
-
-
4544365541
-
Palmprint classification using principal lines
-
Wu X., Zhang D., Wang K., and Huang B. Palmprint classification using principal lines. Pattern Recognition 37 10 (2004) 1987-1998
-
(2004)
Pattern Recognition
, vol.37
, Issue.10
, pp. 1987-1998
-
-
Wu, X.1
Zhang, D.2
Wang, K.3
Huang, B.4
-
6
-
-
2942549049
-
Characterization of palmprints by wavelet signatures via directional context modeling
-
Zhang L., and Zhang D. Characterization of palmprints by wavelet signatures via directional context modeling. IEEE Trans. Syst. Man Cybern. B 34 3 (2004) 1335-1347
-
(2004)
IEEE Trans. Syst. Man Cybern. B
, vol.34
, Issue.3
, pp. 1335-1347
-
-
Zhang, L.1
Zhang, D.2
-
7
-
-
1642386019
-
On hierarchical palmprint coding with multiple features for personal identification in large databases
-
You J., Kong W.K., Zhang D., and Cheung K.H. On hierarchical palmprint coding with multiple features for personal identification in large databases. IEEE Trans. Circuit Syst. Video Technol. 14 2 (2004) 234-243
-
(2004)
IEEE Trans. Circuit Syst. Video Technol.
, vol.14
, Issue.2
, pp. 234-243
-
-
You, J.1
Kong, W.K.2
Zhang, D.3
Cheung, K.H.4
-
8
-
-
1142268949
-
Multimodal biometric user-identification system for network-based applications
-
Ribaric S., Ribaric D., and Pavesic N. Multimodal biometric user-identification system for network-based applications. IEE Proc. Vision Image Signal Process. 150 6 (2003) 409-416
-
(2003)
IEE Proc. Vision Image Signal Process.
, vol.150
, Issue.6
, pp. 409-416
-
-
Ribaric, S.1
Ribaric, D.2
Pavesic, N.3
-
10
-
-
33749383084
-
Palmprint verification with moments
-
Pang Y.H., Teoh A., Ngo D., and San H.F. Palmprint verification with moments. J. Comput. Graphics Visualization Comput. Vision 12 2 (2004) 325-332
-
(2004)
J. Comput. Graphics Visualization Comput. Vision
, vol.12
, Issue.2
, pp. 325-332
-
-
Pang, Y.H.1
Teoh, A.2
Ngo, D.3
San, H.F.4
-
11
-
-
10044295195
-
A face and palmprint recognition approach based on discriminant DCT feature extraction
-
Jing X.Y., and Zhang D. A face and palmprint recognition approach based on discriminant DCT feature extraction. IEEE Trans. Syst. Man Cybern. B 34 6 (2004) 2405-2415
-
(2004)
IEEE Trans. Syst. Man Cybern. B
, vol.34
, Issue.6
, pp. 2405-2415
-
-
Jing, X.Y.1
Zhang, D.2
-
12
-
-
29144468320
-
Palmprint identification using feature-level fusion
-
Kong A., Zhang D., and Kamel M. Palmprint identification using feature-level fusion. Pattern Recognition 39 3 (2006) 478-487
-
(2006)
Pattern Recognition
, vol.39
, Issue.3
, pp. 478-487
-
-
Kong, A.1
Zhang, D.2
Kamel, M.3
-
14
-
-
33749252404
-
Two-dimensional locality preserving projections (2DLPP) with its application to palmprint recognition
-
Hu D., Feng G., and Zhou Z. Two-dimensional locality preserving projections (2DLPP) with its application to palmprint recognition. Pattern Recognition 40 1 (2007) 339-342
-
(2007)
Pattern Recognition
, vol.40
, Issue.1
, pp. 339-342
-
-
Hu, D.1
Feng, G.2
Zhou, Z.3
-
15
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha N.K., Connell J.H., and Bolle R.M. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40 3 (2001) 614-634
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
18
-
-
12844255931
-
PalmHashing: a novel approach for dual-factor authentication
-
Connie T., Teoh A., and Goh M. PalmHashing: a novel approach for dual-factor authentication. Pattern Anal. Appl. 7 3 (2005) 255-256
-
(2005)
Pattern Anal. Appl.
, vol.7
, Issue.3
, pp. 255-256
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
-
19
-
-
9944223229
-
PalmHashing: a novel approach for cancellable biometrics
-
Connie T., Teoh A., Goh M., and Ngo D. PalmHashing: a novel approach for cancellable biometrics. Inf. Process. Lett. 93 1 (2005) 1-5
-
(2005)
Inf. Process. Lett.
, vol.93
, Issue.1
, pp. 1-5
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
20
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs
-
Jin A.T.B., Goh A., and Ngo D.C.L. Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28 12 (2006) 1892-1901
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Jin, A.T.B.1
Goh, A.2
Ngo, D.C.L.3
-
21
-
-
33646095185
-
An analysis of Biohashing and its variants
-
Kong A., Cheung K.H., Zhang D., Kamel M., and You J. An analysis of Biohashing and its variants. Pattern Recognition 39 7 (2006) 1359-1368
-
(2006)
Pattern Recognition
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
22
-
-
36849007216
-
-
M. Braithwaite, U.C. von Seelen, J. Cambier, J. Daugman, R. Class, R. Moore, I. Scott, Applications-specific biometric template, in: IEEE Workshop on Automatic Identification Advanced Technologies, Tarrytown, NY, March 14-15, 2002, pp. 167-171.
-
-
-
-
24
-
-
33749415612
-
An analysis of brute-force break-ins of a palmprint authentication system
-
Kong A., Zhang D., and Kamel M. An analysis of brute-force break-ins of a palmprint authentication system. IEEE Trans. Systems Man Cybern. B 36 5 (2006) 1201-1205
-
(2006)
IEEE Trans. Systems Man Cybern. B
, vol.36
, Issue.5
, pp. 1201-1205
-
-
Kong, A.1
Zhang, D.2
Kamel, M.3
-
26
-
-
10044222391
-
Biometric cryptosystems: issues and challenges
-
Uludag U., Pankanti S., Prabhakar S., and Jain A.K. Biometric cryptosystems: issues and challenges. Proc. IEEE 92 6 (2004) 948-960
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
27
-
-
33745315642
-
An analysis on accuracy of Cancellable biometrics on Biohashing
-
Cheung K.H., Kong A., Zhang D., Kamel M., You J., and Lam T.H.W. An analysis on accuracy of Cancellable biometrics on Biohashing. Proceedings of the 9th International Conference on Knowledge-based Intelligent Information and Engineering System (2005) 1168-1172
-
(2005)
Proceedings of the 9th International Conference on Knowledge-based Intelligent Information and Engineering System
, pp. 1168-1172
-
-
Cheung, K.H.1
Kong, A.2
Zhang, D.3
Kamel, M.4
You, J.5
Lam, T.H.W.6
-
28
-
-
8344236959
-
Biometric encryption
-
Nichols R.K. (Ed), McGraw-Hill, New York
-
Soutor C., Roberge D., Stojanov S.A., Gilroy R., and Vijaya Kumar B.V.K. Biometric encryption. In: Nichols R.K. (Ed). ICAS Guide to Cryptography (1999), McGraw-Hill, New York
-
(1999)
ICAS Guide to Cryptography
-
-
Soutor, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
29
-
-
34147175446
-
Does EigenPalm work? A system and evaluation perspective
-
Cheung H.K., Kong A., Zhang D., Kamel M., and You J. Does EigenPalm work? A system and evaluation perspective. Proceedings of International Conference on Pattern Recognition vol. 4 (2006) 445-448
-
(2006)
Proceedings of International Conference on Pattern Recognition
, vol.4
, pp. 445-448
-
-
Cheung, H.K.1
Kong, A.2
Zhang, D.3
Kamel, M.4
You, J.5
|