2015
DOI: 10.1109/tcyb.2014.2360894
|View full text |Cite
|
Sign up to set email alerts
|

Hand-Dorsa Vein Recognition by Matching Local Features of Multisource Keypoints

Abstract: As an emerging biometric for people identification, the dorsal hand vein has received increasing attention in recent years due to the properties of being universal, unique, permanent, and contactless, and especially its simplicity of liveness detection and difficulty of forging. However, the dorsal hand vein is usually captured by near-infrared (NIR) sensors and the resulting image is of low contrast and shows a very sparse subcutaneous vascular network. Therefore, it does not offer sufficient distinctiveness … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
26
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 66 publications
(26 citation statements)
references
References 28 publications
0
26
0
Order By: Relevance
“…• Given (11) and (12) in the absence of cross matching (µ = 0) and of initial expansion terms (ν = 0), x ij (k) and y ij (k) should asymptotically converge to zero: since the iterations become x ij (k + 1) = λx ij (k) and y ij (k + 1) = λy ij (k), this happens provided that λ < 1, as in (14). • The expansion term initially augments x ij (resp.…”
Section: A Dynamic Algorithm For Vein Matchingmentioning
confidence: 99%
See 1 more Smart Citation
“…• Given (11) and (12) in the absence of cross matching (µ = 0) and of initial expansion terms (ν = 0), x ij (k) and y ij (k) should asymptotically converge to zero: since the iterations become x ij (k + 1) = λx ij (k) and y ij (k + 1) = λy ij (k), this happens provided that λ < 1, as in (14). • The expansion term initially augments x ij (resp.…”
Section: A Dynamic Algorithm For Vein Matchingmentioning
confidence: 99%
“…Biometric systems can indeed automatically authenticate or identify subjects in a reliable and fast way and are therefore suitable to be used in a wide range of applications to face the risks of unauthorised logical or physical access and identity theft, as well as new threats such as terrorism or cybercrime [11].…”
Section: Introductionmentioning
confidence: 99%
“…[270] propose a fusion of multiple sets of SIFT key points which aims at reducing information redundancies and improving the discrimination power, respectively. Different types of key points are proposed to be used by [92], namely, based on Harris corner-ness measurement, Hessian blob-ness measurement and detection of curvature extrema by operating the DoG detector on a human vision inspired image representation (so-called oriented gradient maps).…”
Section: (Dorsal) Hand Vein Recognition Toolchainmentioning
confidence: 99%
“…Finite differences are used to approximate the equation (4), which lead to the discrete form of the anisotropic diffusion, which is characterized by an iterative procedure applied on the input palm image. The number of iterations corresponds to the t parameter from equation (4).…”
Section: Palm Edge Detectionmentioning
confidence: 99%