2014
DOI: 10.3844/jcssp.2014.1389.1396
|View full text |Cite
|
Sign up to set email alerts
|

Palmprint Verification Using Invariant Moments Based on Wavelet Transform

Abstract: Data security is one of the important issues among computer users. Data security can prevent fraudulent users from accessing an individual's personal data. The biometrics recognition as one of the most important parts in the security of the data and the application of computer vision. The biometrics is the authentication method used in a wide variety of applications such as e-banking, e-commerce, e-government and many others. A biometric system is one which requires the recognition of a pattern, whereby it ena… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 11 publications
(10 reference statements)
0
3
0
Order By: Relevance
“…These simulations could be improved. Babuska and Verbruggen (1996;Chandramohan and Kamalakkannan, 2014;Hussein and Nordin, 2014;Kareem, et al, 2014;Kahtan et al, 2014;Sridharan and Chitra, 2014) mentioned that modeling of complex systems will always remain an interactive approach. Thus, future study could consider the usage of other software packages or programming languages and incorporate graphic interface.…”
Section: Resultsmentioning
confidence: 99%
“…These simulations could be improved. Babuska and Verbruggen (1996;Chandramohan and Kamalakkannan, 2014;Hussein and Nordin, 2014;Kareem, et al, 2014;Kahtan et al, 2014;Sridharan and Chitra, 2014) mentioned that modeling of complex systems will always remain an interactive approach. Thus, future study could consider the usage of other software packages or programming languages and incorporate graphic interface.…”
Section: Resultsmentioning
confidence: 99%
“…Palmprint image can be classified into low-resolution (below 150 ppi) and highresolution (about 500 ppi). Low resolution is appropriate for commercial and civil applications while high resolution is used for forensic applications (Jain and Feng, 2009;Hussein and Nordin, 2014;Fei et al, 2018;Jamshidnezhad et al, 2012). In addition, it is important to note that any biometric system consists of four major steps: Image capture, image processing (which includes image segmentation), feature extraction and matching (Kumar, 2018;Wu et al, 2018;Zhang et al, 2018;Kahaki et al, 2016;Ashtari et al, 2015).…”
Section: Introductionmentioning
confidence: 99%
“…The biometric systems are designed for a reliable and accurate identification/verification. Biometrics can use physical characteristics like fingerprints (Ponnarasi and Rajaram, 2012), face, palmprints (Gayathri and Ramamoorthy, 2012;Hussein and Nordin, 2014), ear (Algabary et al, 2014), irises, or hand veins, or behavioural characteristics like speech, hand scripting or typing beat, to authenticate an individual. The personal traits are very difficult to lose or forget compared to the keys and passwords.…”
Section: Introductionmentioning
confidence: 99%