In this paper, a whole identification system is introduced for finger vein recognition. The proposed algorithm first maps the input data into kernel space, then; two-dimensional principal component analysis (2DPCA) is applied to extract the most valuable features from the mapped data. Finally, Euclidian distance classifies the features and the final decision is made. Because of the natural shape of human fingers, the image matrixes are not square, which makes them possible to use kernel mappings in two different ways-along row or column directions. Although some research has been done on the row and column direction through 2DPCA, our argument is how to map the input data in different directions and get a square matrix out of it to be analy...
Human security becomes important in this spoofing attack world. The traditional ways that used to pr...
Dorsal hand vein pattern is an emerging biometric which is attracting the attention of researchers, ...
Abstract- Nowadays, personal identification plays a major role in authentication process in many fie...
In this paper, a whole identification system is introduced for finger vein recognition. The proposed...
In this paper, we introduce a new method of data transformation for finger vein recognition system. ...
AbstractIn this paper, the performance of a variety of different methods of dimensionality reduction...
Kernel functions have been very useful in data classification for the purpose of identification and ...
In this paper the issue of dimensionality reduction is investigated in finger vein recognition syste...
In the field of biometric recognition, finger vein recognition has received widespread attention by ...
Popular methods of protecting access such as Personal Identification Numbers and smart cards are sub...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
The quest of providing more secure identification system has led to a rise in developing biometric s...
The protection of control and intelligent systems across networks and interconnected components is a...
[[abstract]]This paper presents a personal identification system using finger-vein patterns with com...
[[abstract]]This paper presents a support vector machine (SVM) technique for finger-vein pattern ide...
Human security becomes important in this spoofing attack world. The traditional ways that used to pr...
Dorsal hand vein pattern is an emerging biometric which is attracting the attention of researchers, ...
Abstract- Nowadays, personal identification plays a major role in authentication process in many fie...
In this paper, a whole identification system is introduced for finger vein recognition. The proposed...
In this paper, we introduce a new method of data transformation for finger vein recognition system. ...
AbstractIn this paper, the performance of a variety of different methods of dimensionality reduction...
Kernel functions have been very useful in data classification for the purpose of identification and ...
In this paper the issue of dimensionality reduction is investigated in finger vein recognition syste...
In the field of biometric recognition, finger vein recognition has received widespread attention by ...
Popular methods of protecting access such as Personal Identification Numbers and smart cards are sub...
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the ...
The quest of providing more secure identification system has led to a rise in developing biometric s...
The protection of control and intelligent systems across networks and interconnected components is a...
[[abstract]]This paper presents a personal identification system using finger-vein patterns with com...
[[abstract]]This paper presents a support vector machine (SVM) technique for finger-vein pattern ide...
Human security becomes important in this spoofing attack world. The traditional ways that used to pr...
Dorsal hand vein pattern is an emerging biometric which is attracting the attention of researchers, ...
Abstract- Nowadays, personal identification plays a major role in authentication process in many fie...