Login / Signup
Analysis of Brute-Force Break-Ins of a Palmprint Authentication System.
Adams Wai-Kin Kong
David Zhang
Mohamed Kamel
Published in:
IEEE Trans. Syst. Man Cybern. Part B (2006)
Keyphrases
</>
brute force
palmprint
palmprint recognition
personal authentication
image analysis
evolutionary algorithm
coarse to fine
exhaustive search
personal identification