Genetic Algorithm Based Palm Recognition Method for Biometric Authentication Systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Palm Features Extraction for Biometric Authentication

The Palmprint verification is a process of verifying the identity of the applicants. It performs one to one comparison between a newly input Palm print and the Palm print for the claimed identity that is stored in the database. In this paper, convolution filter and feature extraction using NI Vision Assistant 2009 has been used for detection. The feature extraction is templates of different siz...

متن کامل

A Survey Paper on Palm Prints Based Biometric Authentication System

In this paper we are providing an approach for authentication using palm prints. Reliability in computer aided personal authentication is becoming increasingly important in the information-based world, for effective security system. Biometrics is physiological characteristics of human beings, unique for every individual that are usually time invariant and easy to acquire. Palm print is one of t...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems

Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...

متن کامل

Privacy Protecting Biometric Authentication Systems Privacy Protecting Biometric Authentication Systems

Privacy Protecting Biometric Authentication Systems As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics and Electrical Engineering

سال: 2013

ISSN: 2029-5731,1392-1215

DOI: 10.5755/j01.eee.19.2.3473