Online Palmprint Identification
IEEE Transactions on Pattern Analysis and Machine Intelligence
Two-Dimensional PCA: A New Approach to Appearance-Based Face Representation and Recognition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Competitive Coding Scheme for Palmprint Verification
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 1 - Volume 01
Ordinal Palmprint Represention for Personal Identification
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
An analysis of BioHashing and its variants
Pattern Recognition
(2D)2LDA: An efficient approach for face recognition
Pattern Recognition
Palmprint verification based on robust line orientation code
Pattern Recognition
EURASIP Journal on Advances in Signal Processing
A survey of palmprint recognition
Pattern Recognition
Palmprint verification using binary orientation co-occurrence vector
Pattern Recognition Letters
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
2D-LDA: A statistical linear discriminant analysis for image matrix
Pattern Recognition Letters
Cancellable biometerics featuring with tokenised random number
Pattern Recognition Letters
Two-Dimensional Random Projection for Face Recognition
PCSPA '10 Proceedings of the 2010 First International Conference on Pervasive Computing, Signal Processing and Applications
Two-dimensional random projection
Signal Processing
ICCSA'11 Proceedings of the 2011 international conference on Computational science and Its applications - Volume Part V
An analysis on accuracy of cancelable biometrics based on biohashing
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Cancelable Biometrics Realization With Multispace Random Projections
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A New Fractional Random Wavelet Transform for Fingerprint Security
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Learning saliency-based visual attention: A review
Signal Processing
PalmHash Code vs. PalmPhasor Code
Neurocomputing
Color-to-gray based on chance of happening preservation
Neurocomputing
Hi-index | 0.01 |
Recently two-dimensional (2D) PalmHash Code, whose original features were extracted by 2D Gabor filter, was proposed as a cancelable palmprint coding scheme for secure palmprint verification. However, vertical correlation inherently found in 2DPalmHash Code is vulnerable to statistical analysis attack. It was empirically attested that the vertical correlation of 2DPalmHash Code was suppressed by transposing Gabor feature matrices that were tuned to vertical orientation. Unfortunately, the mechanism behind why it works remains open. In this paper, we first systematically analyze and reveal the horizontal and vertical correlations of 2DPalmHash Code. We then uncover the secret behind the transposition of Gabor feature matrices for vertical correlation suppression. Finally, the orientation range of Gabor feature matrices suitable for transposition is determined from the correlation analysis and verified by a series of experiments.