|
|
|
Jing Wang, Mengli Zhao, Xiao Xie, Li Zhang and Wenbo Zhu
Being an efficient image reconstruction and recognition algorithm, two-dimensional PCA (2DPCA) has an obvious disadvantage in that it treats the rows and columns of images unequally. To exploit the other lateral information of images, alternative 2DPCA (...
ver más
|
|
|
|
|
|
|
Fei Wang, Lu Leng, Andrew Beng Jin Teoh and Jun Chu
Biometric-based authentication is widely deployed on multimedia systems currently; however, biometric systems are vulnerable to image-level attacks for impersonation. Reconstruction attack (RA) and presentation attack (PA) are two typical instances for i...
ver más
|
|
|
|
|
|
|
Nurzalina Harun,Wan Enyzarina Wan Abd Rahman,Sitizaleha Zainal Abidin,Puwira Jaya Othman
Palmprint trait has emerged as a means of new and practical biometric recognition system. Palmprint is divided into three regions known as interdigital, hypothenar and thenar. These regions contain a bundle of patterns such as creases, ridges, minutiae a...
ver más
|
|
|
|
|
|
|
Mahdieh Izadpanahkakhk, Seyyed Mohammad Razavi, Mehran Taghipour-Gorjikolaie, Seyyed Hamid Zahiri and Aurelio Uncini
Palmprint verification is one of the most significant and popular approaches for personal authentication due to its high accuracy and efficiency. Using deep region of interest (ROI) and feature extraction models for palmprint verification, a novel approa...
ver más
|
|
|
|
|
|
|
Zhang, D. Kong, W.-K. You, J. Wong, M.
Pág. 1041 - 1050
|
|
|
|