[go: up one dir, main page]

Kong et al., 2005 - Google Patents

A study of brute-force break-ins of a palmprint verification system

Kong et al., 2005

View PDF
Document ID
2893009578534818251
Author
Kong A
Zhang D
Kamel M
Publication year
Publication venue
International Conference on Audio-and Video-Based Biometric Person Authentication

External Links

Snippet

Biometric systems are widely applied since they offer inherent advantages over traditional knowledge-based and token-based personal authentication approaches. This has led to the development of palmprint systems and their use in several real applications. Biometric …
Continue reading at www.cse.lehigh.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Bolle et al. Biometric perils and patches
Hemalatha A systematic review on Fingerprint based Biometric Authentication System
Dinca et al. The fall of one, the rise of many: a survey on multi-biometric fusion methods
Gawande et al. A novel algorithm for feature level fusion using SVM classifier for multibiometrics‐based person identification
AlMahafzah et al. A survey of multibiometric systems
US20090296994A1 (en) Method and system for identifying a person based on their tongue
Kong et al. A study of brute-force break-ins of a palmprint verification system
Kong et al. Analysis of brute-force break-ins of a palmprint authentication system
Balraj et al. Performance improvement of multibiometric authentication system using score level fusion with ant colony optimization
Vinothkanna et al. A multimodal biometric approach for the recognition of finger print, palm print and hand vein using fuzzy vault
Sharma et al. Human recognition methods based on biometric technologies
Tekade et al. Enhancement of security through fused multimodal biometric system
Ghouzali Multimodal biometric watermarking-based transfer learning authentication
Yang et al. Iris recognition based on location of key points
H Nair et al. Hybrid Biometric Based Person Identification Using Machine Learning.
Noor A new algorithm for minutiae extraction and matching in fingerprint
Jain Biometric system security
Sharma et al. A novel transformation based security scheme for multi-instance fingerprint biometric system
Chaudhari et al. Prevention of spoof attacks in fingerprinting using histogram features
Pandiaraja et al. An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology
Emmanuel et al. Vulnerability of Biometric Authentication System
Singh et al. Adapted facial recognition and spoofing detection for management decision making system: a visually impaired people perspective.
Prasad et al. A secure palmprint authentication system using chaotic mixing and watermarking
Jemimah et al. Web based biometric validation using biological identities: an elaborate survey
Otsuka Wolf attack: Algorithmic vulnerability in biometric authentication systems