Kong et al., 2005 - Google Patents
A study of brute-force break-ins of a palmprint verification systemKong et al., 2005
View PDF- Document ID
- 2893009578534818251
- Author
- Kong A
- Zhang D
- Kamel M
- Publication year
- Publication venue
- International Conference on Audio-and Video-Based Biometric Person Authentication
External Links
Snippet
Biometric systems are widely applied since they offer inherent advantages over traditional knowledge-based and token-based personal authentication approaches. This has led to the development of palmprint systems and their use in several real applications. Biometric …
- 230000018109 developmental process 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bolle et al. | Biometric perils and patches | |
Hemalatha | A systematic review on Fingerprint based Biometric Authentication System | |
Dinca et al. | The fall of one, the rise of many: a survey on multi-biometric fusion methods | |
Gawande et al. | A novel algorithm for feature level fusion using SVM classifier for multibiometrics‐based person identification | |
AlMahafzah et al. | A survey of multibiometric systems | |
US20090296994A1 (en) | Method and system for identifying a person based on their tongue | |
Kong et al. | A study of brute-force break-ins of a palmprint verification system | |
Kong et al. | Analysis of brute-force break-ins of a palmprint authentication system | |
Balraj et al. | Performance improvement of multibiometric authentication system using score level fusion with ant colony optimization | |
Vinothkanna et al. | A multimodal biometric approach for the recognition of finger print, palm print and hand vein using fuzzy vault | |
Sharma et al. | Human recognition methods based on biometric technologies | |
Tekade et al. | Enhancement of security through fused multimodal biometric system | |
Ghouzali | Multimodal biometric watermarking-based transfer learning authentication | |
Yang et al. | Iris recognition based on location of key points | |
H Nair et al. | Hybrid Biometric Based Person Identification Using Machine Learning. | |
Noor | A new algorithm for minutiae extraction and matching in fingerprint | |
Jain | Biometric system security | |
Sharma et al. | A novel transformation based security scheme for multi-instance fingerprint biometric system | |
Chaudhari et al. | Prevention of spoof attacks in fingerprinting using histogram features | |
Pandiaraja et al. | An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology | |
Emmanuel et al. | Vulnerability of Biometric Authentication System | |
Singh et al. | Adapted facial recognition and spoofing detection for management decision making system: a visually impaired people perspective. | |
Prasad et al. | A secure palmprint authentication system using chaotic mixing and watermarking | |
Jemimah et al. | Web based biometric validation using biological identities: an elaborate survey | |
Otsuka | Wolf attack: Algorithmic vulnerability in biometric authentication systems |