一种存储伪图像的手掌静脉识别研究 下载: 812次
吴微, 林森, 苑玮琦. 一种存储伪图像的手掌静脉识别研究[J]. 光学学报, 2018, 38(4): 0411007.
Wei Wu, Sen Lin, Weiqi Yuan. Palm Vein Recognition with Pseudo Image Storage[J]. Acta Optica Sinica, 2018, 38(4): 0411007.
[1] Wright J, Yang A Y, Sastry S S, et al. Robust face recognition via sparse representation[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2009, 31(2): 210-227.
Wright J, Yang A Y, Sastry S S, et al. Robust face recognition via sparse representation[J]. IEEE Transactions on Pattern Analysis & Machine Intelligence, 2009, 31(2): 210-227.
[2] 王嫣然, 罗宇豪, 尹东. 一种监控视频人脸图像超分辨技术[J]. 光学学报, 2017, 37(3): 0318012.
王嫣然, 罗宇豪, 尹东. 一种监控视频人脸图像超分辨技术[J]. 光学学报, 2017, 37(3): 0318012.
[3] 韩民, 彭玉华, 张顺利, 等. 基于经验模态分解的虹膜识别[J]. 光学学报, 2010, 30(2): 364-368.
韩民, 彭玉华, 张顺利, 等. 基于经验模态分解的虹膜识别[J]. 光学学报, 2010, 30(2): 364-368.
[4] 苑玮琦, 冯素月. 改进的非接触式在线掌纹识别模拟系统[J]. 光学学报, 2011, 31(7): 0712003.
苑玮琦, 冯素月. 改进的非接触式在线掌纹识别模拟系统[J]. 光学学报, 2011, 31(7): 0712003.
[5] 赵珊, 王彪, 唐超颖. 基于链码表示的手臂静脉特征提取与匹配[J]. 光学学报, 2016, 36(5): 515003.
赵珊, 王彪, 唐超颖. 基于链码表示的手臂静脉特征提取与匹配[J]. 光学学报, 2016, 36(5): 515003.
[6] 苑玮琦, 柯丽, 白云. 生物特征识别技术[M]. 北京: 科学出版社, 2009.
苑玮琦, 柯丽, 白云. 生物特征识别技术[M]. 北京: 科学出版社, 2009.
Yuan WQ, KeL, BaiY. Biometric identification technology[M]. Beijing: Science Press, 2009.
Yuan WQ, KeL, BaiY. Biometric identification technology[M]. Beijing: Science Press, 2009.
[7] JainA, Ross AA, NandakumarK. Introduction to biometrics[M]. New York: Springer, 2011.
JainA, Ross AA, NandakumarK. Introduction to biometrics[M]. New York: Springer, 2011.
[8] Ross A, Othman A. Visual cryptography for biometric privacy[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(1): 70-81.
Ross A, Othman A. Visual cryptography for biometric privacy[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(1): 70-81.
[9] Jain A K, Uludag U. Hiding biometric data[J]. IEEE Computer Society, 2003, 25(11): 1494-1498.
Jain A K, Uludag U. Hiding biometric data[J]. IEEE Computer Society, 2003, 25(11): 1494-1498.
[10] Ratha N K, Connell J H, Bolle R M. Enhancing security and privacy in biometrics-based authentication systems[J]. IBM Systems Journal, 2001, 40(3): 614-634.
Ratha N K, Connell J H, Bolle R M. Enhancing security and privacy in biometrics-based authentication systems[J]. IBM Systems Journal, 2001, 40(3): 614-634.
[11] Canuto A M P, Pintro F, Xavier-Junior J C. Investigating fusion approaches in multi-biometric cancellable recognition[J]. Expert Systems with Applications, 2013, 40(6): 1971-1980.
Canuto A M P, Pintro F, Xavier-Junior J C. Investigating fusion approaches in multi-biometric cancellable recognition[J]. Expert Systems with Applications, 2013, 40(6): 1971-1980.
[12] Bringer J, Morel C, Rathgeb C. Security analysis and improvement of some biometric protected templates based on Bloom filters[J]. Image & Vision Computing, 2016, 58: 239-253.
Bringer J, Morel C, Rathgeb C. Security analysis and improvement of some biometric protected templates based on Bloom filters[J]. Image & Vision Computing, 2016, 58: 239-253.
[13] SutcuY, LiQ, MemonN. Secure biometric templates from fingerprint-face features[C]. IEEE Conference on Computer Vision and Pattern Recognition, 2007: 1- 6.
SutcuY, LiQ, MemonN. Secure biometric templates from fingerprint-face features[C]. IEEE Conference on Computer Vision and Pattern Recognition, 2007: 1- 6.
[14] Nagar A, Nandakumar K, Jain A K. Multibiometric cryptosystems based on feature-level fusion[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(1): 255-268.
Nagar A, Nandakumar K, Jain A K. Multibiometric cryptosystems based on feature-level fusion[J]. IEEE Transactions on Information Forensics & Security, 2012, 7(1): 255-268.
[15] Tuyls P, Tuyls P, Obi C, et al. Key extraction from general nondiscrete signals[J]. IEEE Transactions on Information Forensics & Security, 2010, 5(2): 269-279.
Tuyls P, Tuyls P, Obi C, et al. Key extraction from general nondiscrete signals[J]. IEEE Transactions on Information Forensics & Security, 2010, 5(2): 269-279.
[16] 王楠. 手掌静脉特征提取与识别方法研究[D]. 沈阳: 沈阳工业大学, 2011.
王楠. 手掌静脉特征提取与识别方法研究[D]. 沈阳: 沈阳工业大学, 2011.
WangN. Research on palm vein extraction and recognition method[D]. Shenyang: Shenyang University of Technology, 2011.
WangN. Research on palm vein extraction and recognition method[D]. Shenyang: Shenyang University of Technology, 2011.
[17] Yan X K, Kang W X, Deng F Q, et al. Palm vein recognition based on multi-sampling and feature-level fusion[J]. Neurocomputing, 2015, 151(151): 798-807.
Yan X K, Kang W X, Deng F Q, et al. Palm vein recognition based on multi-sampling and feature-level fusion[J]. Neurocomputing, 2015, 151(151): 798-807.
[18] Wu K S, Lee J C, Lo T M, et al. A secure palm vein recognition system[J]. Journal of Systems & Software, 2013, 86(11): 2870-2876.
Wu K S, Lee J C, Lo T M, et al. A secure palm vein recognition system[J]. Journal of Systems & Software, 2013, 86(11): 2870-2876.
[19] Ladoux PO, RosenbergerC, DorizziB. Palm vein verification system based on SIFT matching[C]. International Conference on Advances in Biometrics, 2009, 5558: 1290- 1298.
Ladoux PO, RosenbergerC, DorizziB. Palm vein verification system based on SIFT matching[C]. International Conference on Advances in Biometrics, 2009, 5558: 1290- 1298.
[21] Lee J C. A novel biometric system based on palm vein image[J]. Pattern Recognition Letters, 2012, 33(12): 1520-1528.
Lee J C. A novel biometric system based on palm vein image[J]. Pattern Recognition Letters, 2012, 33(12): 1520-1528.
[22] Wang R, Wang G Y, Chen Z, et al. A palm vein identification system based on Gabor wavelet features[J]. Neural Computing and Applications, 2014, 24(1): 161-168.
Wang R, Wang G Y, Chen Z, et al. A palm vein identification system based on Gabor wavelet features[J]. Neural Computing and Applications, 2014, 24(1): 161-168.
[23] Kang W X, Wu Q X. Contactless palm vein recognition using a mutual foreground-based local binary pattern[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(11): 1974-1985.
Kang W X, Wu Q X. Contactless palm vein recognition using a mutual foreground-based local binary pattern[J]. IEEE Transactions on Information Forensics & Security, 2014, 9(11): 1974-1985.
[24] Wang J G, Yau W Y, Suwandy A, et al. Person recognition by fusing palmprint and palm vein images based on “Laplacianpalm” representation[J]. Pattern Recognition, 2008, 41(5): 1514-1527.
Wang J G, Yau W Y, Suwandy A, et al. Person recognition by fusing palmprint and palm vein images based on “Laplacianpalm” representation[J]. Pattern Recognition, 2008, 41(5): 1514-1527.
[25] Lee E C, Park K R. Image restoration of skin scattering and optical blurring for finger vein recognition[J]. Optics and Lasers in Engineering, 2011, 49(7): 816-828.
Lee E C, Park K R. Image restoration of skin scattering and optical blurring for finger vein recognition[J]. Optics and Lasers in Engineering, 2011, 49(7): 816-828.
[26] 王惠文, 吴载斌, 孟洁, 等. 偏最小二乘回归的线性与非线性方法[M]. 北京: 国防工业出版社, 2006: 150- 155.
王惠文, 吴载斌, 孟洁, 等. 偏最小二乘回归的线性与非线性方法[M]. 北京: 国防工业出版社, 2006: 150- 155.
Wang HW, Wu ZB, MengJ, et al.Linear and non-linear method of partial least squares[M]. Beijing: National Defense Industry Press, 2006: 150- 155.
Wang HW, Wu ZB, MengJ, et al.Linear and non-linear method of partial least squares[M]. Beijing: National Defense Industry Press, 2006: 150- 155.
[27] Lu G, Zhang D, Wang K. Palmprint recognition using eigenpalms features[J]. Pattern Recognition Letters, 2003, 24(9): 1463-1467.
Lu G, Zhang D, Wang K. Palmprint recognition using eigenpalms features[J]. Pattern Recognition Letters, 2003, 24(9): 1463-1467.
[28] Zhang D, Guo Z, Lu G, et al. An online system of multispectral palmprint verification[J]. IEEE Transactions on Instrumentation & Measurement, 2010, 59(2): 480-490.
Zhang D, Guo Z, Lu G, et al. An online system of multispectral palmprint verification[J]. IEEE Transactions on Instrumentation & Measurement, 2010, 59(2): 480-490.
[29] 吴微, 苑玮琦, 林森, 等. 手掌静脉识别典型波长选择[J]. 光学学报, 2012, 32(12): 1211002.
吴微, 苑玮琦, 林森, 等. 手掌静脉识别典型波长选择[J]. 光学学报, 2012, 32(12): 1211002.
[30] Zhou Y, Kumar A. Human identification using palm-vein images[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(4): 1259-1274.
Zhou Y, Kumar A. Human identification using palm-vein images[J]. IEEE Transactions on Information Forensics & Security, 2011, 6(4): 1259-1274.
[31] Badrinath G S, Gupta P. Stockwell transform based palm-print recognition[J]. Applied Soft Computing Journal, 2011, 11(7): 4267-4281.
Badrinath G S, Gupta P. Stockwell transform based palm-print recognition[J]. Applied Soft Computing Journal, 2011, 11(7): 4267-4281.
[32] 吴微, 苑玮琦, 林森, 等. 基于灰度曲面匹配的快速手掌静脉识别[J]. 光学学报, 2013, 33(10): 1015004.
吴微, 苑玮琦, 林森, 等. 基于灰度曲面匹配的快速手掌静脉识别[J]. 光学学报, 2013, 33(10): 1015004.
吴微, 林森, 苑玮琦. 一种存储伪图像的手掌静脉识别研究[J]. 光学学报, 2018, 38(4): 0411007. Wei Wu, Sen Lin, Weiqi Yuan. Palm Vein Recognition with Pseudo Image Storage[J]. Acta Optica Sinica, 2018, 38(4): 0411007.