A Finger Vein Image-Based Personal Identification System With Self-Adaptive Illuminance Control

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Near-infrared finger vein patterns for personal identification.

We have demonstrated a personal identification system that is based on near-infrared finger vein patterns. Finger vein patterns of 678 volunteers are acquired by transmitting near-infrared light through a finger and capturing the image with a CCD camera. These vein patterns are enhanced by a background-reduction filter. The similarity between two patterns is then quantified by use of the normal...

متن کامل

Automatic Feature Extraction from non-uniform Finger Vein Image and its Application to Personal Identification

A new method to extract vein patterns from an unclear finger image is proposed. Finger vein pattern can be used for personal identification technology. The finger vein image that is captured with infrared light contains not only the vein patterns but also irregular shades and noises. They result from the different thickness between finger bones and muscles and, light intensity fluctuations also...

متن کامل

Door-access-control System Based on Finger-vein Authentication

OVERVIEW: Door-access control is a physical security system that assures the security of a room or building by means of limiting the access to that room or building to specific people and by keeping records of such accesses. It utilizes an individual-authentication method in order to limit access to specific people. The most widespread authentication method for such systems is based on smart ca...

متن کامل

Door-access-control System Based on Finger-vein Authentication

OVERVIEW: Door-access control is a physical security system that assures the security of a room or building by means of limiting the access to that room or building to specific people and by keeping records of such accesses. It utilizes an individual-authentication method in order to limit access to specific people. The most widespread authentication method for such systems is based on smart ca...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Instrumentation and Measurement

سال: 2017

ISSN: 0018-9456,1557-9662

DOI: 10.1109/tim.2016.2622860