9   Artículos

 
en línea
Jing Wang, Mengli Zhao, Xiao Xie, Li Zhang and Wenbo Zhu    
Being an efficient image reconstruction and recognition algorithm, two-dimensional PCA (2DPCA) has an obvious disadvantage in that it treats the rows and columns of images unequally. To exploit the other lateral information of images, alternative 2DPCA (... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fei Wang, Lu Leng, Andrew Beng Jin Teoh and Jun Chu    
Biometric-based authentication is widely deployed on multimedia systems currently; however, biometric systems are vulnerable to image-level attacks for impersonation. Reconstruction attack (RA) and presentation attack (PA) are two typical instances for i... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Nurzalina Harun,Wan Enyzarina Wan Abd Rahman,Sitizaleha Zainal Abidin,Puwira Jaya Othman    
Palmprint trait has emerged as a means of new and practical biometric recognition system. Palmprint is divided into three regions known as interdigital, hypothenar and thenar. These regions contain a bundle of patterns such as creases, ridges, minutiae a... ver más

 
en línea
Mahdieh Izadpanahkakhk, Seyyed Mohammad Razavi, Mehran Taghipour-Gorjikolaie, Seyyed Hamid Zahiri and Aurelio Uncini    
Palmprint verification is one of the most significant and popular approaches for personal authentication due to its high accuracy and efficiency. Using deep region of interest (ROI) and feature extraction models for palmprint verification, a novel approa... ver más
Revista: Applied Sciences    Formato: Electrónico

 
usuarios registrados
Zhang, D. Kong, W.-K. You, J. Wong, M.     Pág. 1041 - 1050

« Anterior     Página: 1 de 1     Siguiente »