Logo - springer
Slogan - springer

Computer Science - Theoretical Computer Science | Palmprint Authentication

Palmprint Authentication

16/F, Maxdo Center, 8#, Xingyi Road,Chang Ning District

2004, XI, 242 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$129.00

(net) price for USA

ISBN 978-1-4020-8097-5

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Hardcover
Information

Hardcover version

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$169.00

(net) price for USA

ISBN 978-1-4020-8096-8

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$169.00

(net) price for USA

ISBN 978-1-4757-7913-4

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

Palmprint Authentication is the first book to provide a comprehensive introduction to palmprint technologies. It reveals automatic biometric techniques for personal identification using palmprint, from the approach based on offline palmprint images, to the current state-of-the-art algorithm using online palmprint images.

Palmprint Authentication provides the reader with a basic concept of Palmprint Authentication. It also includes an in-depth discussion of Palmprint Authentication technologies, a detailed description of Palmprint Authentication systems, and an up-to-date coverage of how these issues are developed. This book is suitable for different levels of readers: those who want to learn more about palmprint technology, and those who wish to understand, participate, and/or develop a palmprint authentication system.

Palmprint Authentication is effectively a handbook for biometric research and development. Graduate students and researchers in computer science, electrical engineering, systems science, and information technology will all find it uniquely useful, not only as a reference book, but also as a text book. Researchers and practitioners in industry, and R&D laboratories working in the fields of security system design, biometrics, immigration, law enforcement, control, and pattern recognition will also benefit from this volume.

Content Level » Research

Keywords » Information Technology (IT) - Matching - Processing - Signatur - algorithms - biometrics - classification - computer - computer science - control - image analysis - information - modeling - pattern recognition - technology

Related subjects » Image Processing - Information Systems and Applications - Software Engineering - Theoretical Computer Science

Table of contents 

Preface. Acknowledgements. Part I: Introduction And Background. 1. Introduction. 1.1. Overview. 1.2. Biometric Systems. 1.3. Hand-Based Biometrics. 1.4. Why Palmprint? 1.5. Arrangement of this Book. 2. Palmprint Data. 2.1. Palmprint Data Acquisition. 2.2. Different Online Palmprint Acquisition Devices. 2.3. Offline Palmprint Databases. 2.4. Online Palmprint Databases. 2.5. Summary. Part II: Offline Methodologies. 3. Palmprint Preprocessing. 3.1. Introduction. 3.2. Datum Point Registration. 3.3. Inked Image Alignment. 3.4. Experimental Result. 3.5. Summary. 4. Feature Extraction and Matching. 4.1. Line Features Extraction. 4.2. Line Matching. 4.3. Singular Point for Classification. 4.4. Summary. 5. Layered Identification Using Multiple Features. 5.1. Introduction. 5.2. Coarse-level Classification. 5.3. Fine-level Identification. 5.4. Experimental Results. 5.5. Summary. Part III: Online Methodologies. 6. Palmprint Segmentation by Key Point Features. 6.1. Square-Based Segmentation. 6.2. Inscribed Circle-Based Segmentation. 6.3. Comparison between two Segmentation Approaches. 6.4. Summary. 7. Texture Feature Using 2-D Gabor Filters. 7.1. Texture Feature Extraction. 7.2. Feature Matching. 7.3. Parameter Selection and Performance Test. 7.4. Experimental Results and Analysis. 7.5. Summary. 8. Line Features Extraction and Representation. 8.1. Palm Line Feature Extraction. 8.2. Line Matching Strategies. 8.3. Experiments and Analysis. 8.4. Summary. 9. Linear Discrimination Feature Extraction. 9.1. Definition: Fisherpalms. 9.2. Analysis on Fisherpalms. 9.3. Eigenpalms in Palmprint. 9.4. Performance Analysis on Eigenpalms. 9.5. Summary. 10. Transform-Based Palmprint Image Analysis. 10.1. Palmprint Analysis by Fourier Transform. 10.2. Wavelet Signatures via Directional Context Modeling. 10.3. Characterization of Palmprint by Wavelet Signatures. 10.4. Identification Strategies and Experiments. 10.5. Summary. 11. Online Palmprint Classification. 11.1. Online Palmprint Preprocessing. 11.2. Principal Lines Extraction. 11.3. Six Types of Palmprints. 11.4. Experimental Results. 11.5. Summary. 12. Hierarchical Palmprint Coding With Multi-Features. 12.1. Introduction. 12.2. Hierarchical Palmprint Coding. 12.3. Multiple Similarity Measurement. 12.4. Hierarchical Palmprint Matching. 12.5. Experimental Results. 12.6. Summary. Part IV: Palmprint Authentication System. 13. Palmprint Acquisition System. 13.1. System Requirements. 13.2. Parameter Selection. 13.3. System Performance Evaluation. 13.4. Summary. 14. A Prototype Design for Civil Applications. 14.1. Introduction. 14.2. System Framework. 14.3. Experimental Results. 14.4. Performance Evaluation. 14.5. Potential Applications. 14.6. Summary. 15. Book Review And Future Work. 15.1. Book Recapitulation. 15.2. Future Work. References. Index.

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Theory of Computation.