Dynamic two-strip algorithm in curve fitting
Pattern Recognition
Efficiently Locating Objects Using the Hausdorff Distance
International Journal of Computer Vision
Digital Image Processing
Face Recognition Using Line Edge Map
IEEE Transactions on Pattern Analysis and Machine Intelligence
Pattern Recognition Letters - In memory of Professor E.S. Gelsema
A Multi-View Facial Analysis Technique for Identity Authentication
IEEE Pervasive Computing
Toward Reliable User Authentication through Biometrics
IEEE Security and Privacy
A survey of palmprint recognition
Pattern Recognition
A Comparative Study of Palmprint Recognition Algorithms
ACM Computing Surveys (CSUR)
Palmprint verification based on 2D - Gabor wavelet and pulse-coupled neural network
Knowledge-Based Systems
Biometric verification of a subject through eye movements
Computers in Biology and Medicine
An improved palmprint recognition system using iris features
Journal of Real-Time Image Processing
Hi-index | 0.00 |
Access security is an important aspect of pervasive computing systems. It offers the system developer and end users a certain degree of trust in the use of shared computing resources. Biometrics offers many advantages over the username-plus-password approach for access security control. Palmprint-based personal identification has seen less research than identification using fingerprints, irises, and faces. A proposed personal verification system employs palmprint images stored as 8-bit grayscale TIFF files. The system components include mechanisms for locating and aligning, extracting, and matching palmprints. The system first detects a human hand's interfinger key points and locates the palmprint on the basis of those points. Next, the system generates a line-edge-map representation of palmprint features. Finally, it performs feature matching based on the line segment Hausdorff distance. The LHD matching score provides the basis for verification decisions. Experimental results demonstrate that the key-point-detection technique is effective and that the palmprint line edge map has high discriminative power. This article is part of a special issue on security and privacy.