Biometric recognition requires that the biometric characteristics used for the verification should be unique among individuals. The purpose of this study is to verify the individuality of finger vein, a new trait with superiority on accuracy and security. To carry out the research, we construct a large-scale finger vein database consisting of 710,399 images from 363,703 fingers. We adopt a score level fusion strategy to reduce the negative impact of algorithm deficiencies. We also design a distributed computing system for more than 83 billion impostor comparisons. The experimental results demonstrate that finger vein is sufficiently unique to distinguish one person from another in such scale.CPCI-S(ISTP)yeyapeng@pku.edu.cn; zhenghe@pku.edu....
Finger vein recognition is a biometric method utilizing the vein patterns inside one's fingers ...
Over the past years, finger vein identification has gaining increasing attention in biometrics. It h...
Human security becomes important in this spoofing attack world. The traditional ways that used to pr...
Biometric recognition requires that the biometric characteristics used for the verification should b...
AbstractThis paper proposes a novel authentication system using hidden biometric trait called finger...
Biometric identification is the study of physiological and behavioral attributes of an individual to...
Recently, the security-based system using finger vein as a biometric trait has been getting more att...
The aim of this paper is hardware realization and testing of a simple system for biometric user auth...
In today’s society with the rapid growth in the field of electronic information technology and its s...
M.Sc. (Information Technology)Biometrics is a unique method used to identify humans by distinct biol...
Abstract: The finger-vein biometric offers higher degree of security, personal privacy and strong an...
Biometric system has been actively emerging in various industries and continuing to roll to provide ...
Diversity of human finger vein images is shown by extracting their patterns from the right and left ...
The Finger-vein recognition (FVR) method has received increasing attention in recent years. It is a ...
Finger vein is a unique physiological biometric which is used for identification of individuals base...
Finger vein recognition is a biometric method utilizing the vein patterns inside one's fingers ...
Over the past years, finger vein identification has gaining increasing attention in biometrics. It h...
Human security becomes important in this spoofing attack world. The traditional ways that used to pr...
Biometric recognition requires that the biometric characteristics used for the verification should b...
AbstractThis paper proposes a novel authentication system using hidden biometric trait called finger...
Biometric identification is the study of physiological and behavioral attributes of an individual to...
Recently, the security-based system using finger vein as a biometric trait has been getting more att...
The aim of this paper is hardware realization and testing of a simple system for biometric user auth...
In today’s society with the rapid growth in the field of electronic information technology and its s...
M.Sc. (Information Technology)Biometrics is a unique method used to identify humans by distinct biol...
Abstract: The finger-vein biometric offers higher degree of security, personal privacy and strong an...
Biometric system has been actively emerging in various industries and continuing to roll to provide ...
Diversity of human finger vein images is shown by extracting their patterns from the right and left ...
The Finger-vein recognition (FVR) method has received increasing attention in recent years. It is a ...
Finger vein is a unique physiological biometric which is used for identification of individuals base...
Finger vein recognition is a biometric method utilizing the vein patterns inside one's fingers ...
Over the past years, finger vein identification has gaining increasing attention in biometrics. It h...
Human security becomes important in this spoofing attack world. The traditional ways that used to pr...