1. bookVolumen 17 (2017): Edición 2 (October 2017)
Detalles de la revista
License
Formato
Revista
eISSN
2286-2455
Primera edición
16 Apr 2016
Calendario de la edición
2 veces al año
Idiomas
Inglés
Acceso abierto

A Simple Technique for Palm Recognition Using Major Lines

Publicado en línea: 23 Oct 2017
Volumen & Edición: Volumen 17 (2017) - Edición 2 (October 2017)
Páginas: 38 - 43
Detalles de la revista
License
Formato
Revista
eISSN
2286-2455
Primera edición
16 Apr 2016
Calendario de la edición
2 veces al año
Idiomas
Inglés

[1] Z. Sun, T. Tan, Y. Wang, and S. Z. Li, “Ordinal palmprint representation for personal identification,” in Proc. IEEE Computer Vision and Pattern Recognition (CVPR, 2005, pp. 279–284.Search in Google Scholar

[2] A. Jain, A. Ross, and S. Prabhakar, “An introduction to biometric recognition,” Circuits and Systems for Video Technology, IEEE Transactions on, vol. 14, no. 1, pp. 4 – 20, jan. 2004.10.1109/TCSVT.2003.818349Search in Google Scholar

[3] E. Yörük, H. Dutagaci, and B. Sankur, “Hand biometrics,” Image Vision Comput., vol. 24, no. 5, pp. 483–497, 2006.10.1016/j.imavis.2006.01.020Abierto DOISearch in Google Scholar

[4] A. Kong, D. Zhang, and M. Kamel, “A survey of palmprint recognition,” pattern recognition, vol. 42, no. 7, pp. 1408–1418, 2009.Search in Google Scholar

[5] A. Kumar, D. C. M. Wong, H. C. Shen, and A. K. Jain, “Personal verification using palmprint and hand geometry biometric,” in Audio-and Video-Based Biometric Person Authentication. Springer Berlin Heidelberg, 2003, pp. 668–678.10.1007/3-540-44887-X_78Search in Google Scholar

[6] V. I. Pavlovic, R. Sharma, and T. S. Huang, “Visual interpr etation of hand gestures for human-computer interaction: A review,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 19, no. 7, pp. 677–695, 1997.10.1109/34.598226Abierto DOISearch in Google Scholar

[7] N. Bhanushali, P. Nikam, P. Tripathi et al., “High security using palm vein recognition technology,” Inter-national Journal of Computer Applications, vol. 119, no. 1, 2015.10.5120/21035-3141Search in Google Scholar

[8] R. C. Gonzalez and R. E. Woods., Digital Image Processing. Prentice Hall, 2008.Search in Google Scholar

[9] M. Basu, “Gaussian-based edge-detection methods-a survey,” IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), vol. 32, no. 3, pp. 252–260, 2002.10.1109/TSMCC.2002.804448Abierto DOISearch in Google Scholar

[10] N. Senthilkumaran and R. Rajesh, “Image segmentation-a survey of soft computing approaches,” in Advances in Recent Technologies in Communication and Computing, 2009. ARTCom'09. International Conference on. IEEE, 2009, pp. 844–846.10.1109/ARTCom.2009.219Search in Google Scholar

[11] A. Rosenfeld and L. S. Davis, “A note on thinning,” Systems, Man and Cybernetics, IEEE Transactions on, no. 3, pp. 226–228, 1976.10.1109/TSMC.1976.5409243Abierto DOISearch in Google Scholar

[12] R. L. Zunkel and C. Campbell, “4 hand geometry based verification,” Personal Identification in Networked Society, p. 87, 1999.10.1007/0-306-47044-6_4Search in Google Scholar

[13] A. Amin and S. Fischer, “A document skew detection method using the hough transform,” vol. 3, no. 3, 2000, pp. 243–253.10.1007/s100440070009Search in Google Scholar

Artículos recomendados de Trend MD

Planifique su conferencia remota con Sciendo