Palmprint authentication using modified legendre moments
Tài liệu tham khảo
Zhang, 2003, Online palmprint identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, 25, 1041, 10.1109/TPAMI.2003.1227981
Han, 2003, Personal authentication using palmprint features, Pattern Recognition, 37, 371, 10.1016/S0031-3203(02)00037-7
Duta, 2002, Matching of Palmprints, Pattern Recognition Letters, 23, 477, 10.1016/S0167-8655(01)00179-9
Kong, 2003, Palmprint feature extraction using 2-D Gabor filter, Pattern Recognition, 36, 2339, 10.1016/S0031-3203(03)00121-3
Zhang, 1999, Two novel charateristics in palmprint verification: Datum point invariance and Line feature matching, Pattern Recognition, 32, 691, 10.1016/S0031-3203(98)00117-4
Hu, 2007, Two-dimensional locality preserving projections (2dlpp) with its application to palmprint recognition, Pattern Recognition, 40, 339, 10.1016/j.patcog.2006.06.022
M. Ekinci, M. Aykut, Palmprint recognition by applying wavelet subband representation and kernel PCA, 5th International Conference on Machine Learning and Data Mining in Pattern Recognition, Germany, pages 628–642, 2007.
Shang, 2006, Palmprint recognition using fast ICA and Radial Basis Probabilistic Neural Network, Nerocomputing, 69, 1782, 10.1016/j.neucom.2005.11.004
Li, 2005, Texture-based palmprint retrieval using a layered search scheme for personal identification, IEEE Transactions on Multimedia, 7, 891, 10.1109/TMM.2005.854380
R. Raghavendra, Ashok Rao, G. Hemantha Kumar, A Novel Three Stage Process for Palmprint Verification, International Conference on Advances in Computing, Control and Telecommunication Technologies, 2009.
S. Du, R. Ward, Wavelet-based illumination normalization for face recognition, Proc. of the IEEE International Conference on Image Processing, September 2005.
Hosny, 2007, Efficient computation of Legendre moments for gray level images, Int. J. of Image and Graphics, 7, 735, 10.1142/S021946780700288X
Hosny, 2010, New Set Of Rotationally Legendre Moment Invariants, International Journal of Electrical, Computer, and Systems Engineering, 4
Siavash Mirarab, Alaa Hassouna, Ladan Tahvildari, Using Bayesian Belief Networks to Predict Change Propagation in Software Systems, icpc, pp.177–188, 15th IEEE International Conference on Program Comprehension (ICPC’07), 2007.
Ying, 2004, Predicting source code changes by mining change history, IEEE Transaction on Software Engineering, 30, 574, 10.1109/TSE.2004.52
Genie/Smile, 2005–2006 http://genie.sis.pitt.edu/.
Teh, 1988, On image analysis by the method of moments, IEEE Trans. Pattern Analysis and Machine Intelligence, 10, 496, 10.1109/34.3913
Badrinath, 2010, Palmprint based Verification System Robust to Occlusion using Low-order Zernike Moments of Sub- images, Journal of Telecommunication Systems