Have a personal or library account? Click to login
A Simple Technique for Palm Recognition Using Major Lines Cover
Open Access
|Oct 2017

References

  1. [1] Z. Sun, T. Tan, Y. Wang, and S. Z. Li, “Ordinal palmprint representation for personal identification,” in Proc. IEEE Computer Vision and Pattern Recognition (CVPR, 2005, pp. 279–284.
  2. [2] A. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” Circuits and Systems for Video Technology, IEEE Transactions on, vol. 14, no. 1, pp. 4 – 20, jan. 2004.10.1109/TCSVT.2003.818349
  3. [3] E. Yörük, H. Dutagaci, and B. Sankur, “Hand biometrics,” Image Vision Comput., vol. 24, no. 5, pp. 483–497, 2006.10.1016/j.imavis.2006.01.020
  4. [4] A. Kong, D. Zhang, and M. Kamel, “A survey of palmprint recognition,” pattern recognition, vol. 42, no. 7, pp. 1408–1418, 2009.
  5. [5] A. Kumar, D. C. M. Wong, H. C. Shen, and A. K. Jain, “Personal verification using palmprint and hand geometry biometric,” in Audio-and Video-Based Biometric Person Authentication. Springer Berlin Heidelberg, 2003, pp. 668–678.10.1007/3-540-44887-X_78
  6. [6] V. I. Pavlovic, R. Sharma, and T. S. Huang, “Visual interpr etation of hand gestures for human-computer interaction: A review,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 19, no. 7, pp. 677–695, 1997.10.1109/34.598226
  7. [7] N. Bhanushali, P. Nikam, P. Tripathi et al., “High security using palm vein recognition technology,” Inter-national Journal of Computer Applications, vol. 119, no. 1, 2015.10.5120/21035-3141
  8. [8] R. C. Gonzalez and R. E. Woods., Digital Image Processing. Prentice Hall, 2008.
  9. [9] M. Basu, “Gaussian-based edge-detection methods-a survey,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 32, no. 3, pp. 252–260, 2002.10.1109/TSMCC.2002.804448
  10. [10] N. Senthilkumaran and R. Rajesh, “Image segmentation-a survey of soft computing approaches,” in Advances in Recent Technologies in Communication and Computing, 2009. ARTCom'09. International Conference on. IEEE, 2009, pp. 844–846.10.1109/ARTCom.2009.219
  11. [11] A. Rosenfeld and L. S. Davis, “A note on thinning,” Systems, Man and Cybernetics, IEEE Transactions on, no. 3, pp. 226–228, 1976.10.1109/TSMC.1976.5409243
  12. [12] R. L. Zunkel and C. Campbell, “4 hand geometry based verification,” Personal Identification in Networked Society, p. 87, 1999.10.1007/0-306-47044-6_4
  13. [13] A. Amin and S. Fischer, “A document skew detection method using the hough transform,” vol. 3, no. 3, 2000, pp. 243–253.10.1007/s100440070009
DOI: https://doi.org/10.1515/sbeef-2017-0009 | Journal eISSN: 2286-2455 | Journal ISSN: 1843-6188
Language: English
Page range: 38 - 43
Published on: Oct 23, 2017
In partnership with: Paradigm Publishing Services
Publication frequency: 2 issues per year

© 2017 V. Kumar, A. Dua, H. Bansal, H. Aggarwal, A. Madan, J.S. Bhatia, published by Valahia University of Targoviste
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.