The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.32604/cmc.2022.016410
|View full text |Cite
|
Sign up to set email alerts
|

Finger Vein Authentication Based on Wavelet Scattering Networks

Abstract: Biometric-based authentication systems have attracted more attention than traditional authentication techniques such as passwords in the last two decades. Multiple biometrics such as fingerprint, palm, iris, palm vein and finger vein and other biometrics have been introduced. One of the challenges in biometrics is physical injury. Biometric of finger vein is of the biometrics least exposed to physical damage. Numerous methods have been proposed for authentication with the help of this biometric that suffer fro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 36 publications
(38 reference statements)
0
3
0
Order By: Relevance
“…Furthermore, that makes it stable for changes. However, since the wavelet transform computes convolutions with wavelet filters, the wavelet transform is unstable to changes [29,30]. To this end, a set of wavelet filters is needed to produce a descriptor with stable features against deformation, transmission, scaling, direction, and dilation [31][32][33].…”
Section: Scattering Waveletmentioning
confidence: 99%
“…Furthermore, that makes it stable for changes. However, since the wavelet transform computes convolutions with wavelet filters, the wavelet transform is unstable to changes [29,30]. To this end, a set of wavelet filters is needed to produce a descriptor with stable features against deformation, transmission, scaling, direction, and dilation [31][32][33].…”
Section: Scattering Waveletmentioning
confidence: 99%
“…It does not recognize new attack variations. AIDS (Anomaly-based intrusion detection system) techniques for this issue are possible because it works on pro ling the appropriate behavior of attacks [34][35][36].…”
Section: Signature-based Intrusion Detection Systems (Sids)mentioning
confidence: 99%
“…The deep wavelet scattering transform, known for its ability to capture multi-scale and invariant representations, has emerged as a promising approach for extracting robust features from facial images. By decomposing facial data into different frequency bands and orientations, the deep wavelet scattering transform effectively captures both local and global information, enabling enhanced face recognition accuracy [5]. The upcoming sections of this paper follow this organization: Section 2 examines related literature, Section 3 outlines the research background, Section 4 presents the methodology and the proposed approach in detail, Section 5 analyzes the experimental results, and finally, Section 6 concludes the paper along with discussing future work.…”
Section: Introductionmentioning
confidence: 99%