Sign in

Analysis of Brute-Force Break-Ins of a Palmprint Authentication System.

Adams Wai-Kin KongDavid ZhangMohamed Kamel
Published in: IEEE Trans. Syst. Man Cybern. Part B (2006)
Keyphrases
  • brute force
  • palmprint
  • palmprint recognition
  • personal authentication
  • image analysis
  • evolutionary algorithm
  • coarse to fine
  • exhaustive search
  • personal identification