Dense Hand-CNN: A Novel CNN Architecture based on Later Fusion of Neural and Wavelet Features for Identity Recognition
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 6
Abstract
Biometric recognition or biometrics has emerged as the best solution for criminal identification and access control applications where resources or information need to be protected from unauthorized access. Biometric traits such as fingerprint, face, palmprint, iris, and hand-geometry have been well explored; and matured approaches are available in order to perform personal identification. The work emphasizes the opportunities for obtaining texture information from a palmprint on the basis of such descriptors as Curvelet, Wavelet, Wave Atom, SIFT, Gabor, LBP, and AlexNet. The key contribution is the application of mode voting method for accurate identification of a person at the fusion decision level. The proposed approach was tested in a number of experiments at the CASIA and IITD palmprint databases. The testing yielded positive results supporting the utilization of the described voting technique for human recognition purposes.
Authors and Affiliations
Elaraby A. Elgallad, Wael Ouarda, Adel M. Alimi
Conceptual Modeling in Simulation: A Representation that Assimilates Events
Simulation is often based on some type of model of the evolved portion of the world being studied. The underlying model is a static description; the simulation itself is executed by generating events or dynamic aspects i...
Current Trends in Group Key Management
Various network applications require sending data onto one or many members, maintaining security in the large groups is one of the major obstacles for controlling access. Unfortunately, IP multicast is not providing any...
Role of Secondary Attributes to Boost the Prediction Accuracy of Students’ Employability Via Data Mining
Data Mining is best-known for its analytical and prediction capabilities. It is used in several areas such as fraud detection, predicting client behavior, money market behavior, bankruptcy prediction. It can also help in...
Secure Device Pairing Methods: An Overview
The procedure of setting up a secure communication channel among unfamiliar human-operated devices is called “Secure Device Pairing”. Secure binding of electronic devices is a challenging task because there are no securi...
GSM-Based Wireless Database Access For Food And Drug Administration And Control
GSM (Global system for mobile communication) based wireless database access for food and drug administration and control is a system that enables one to send a query to the database using the short messaging system...