All Projects → matkowski-voy → Palmprint-Recognition-in-the-Wild

matkowski-voy / Palmprint-Recognition-in-the-Wild

Licence: other
No description or website provided.

Programming Languages

matlab
3953 projects

Projects that are alternatives of or similar to Palmprint-Recognition-in-the-Wild

EDCC-Palmprint-Recognition
EDCC: An efficient and accurate algorithm for palmprint recognition.
Stars: ✭ 103 (+368.18%)
Mutual labels:  biometrics, palm, palmprint, palmprint-recognition, biometric-identification, palmprintid
dcfldd
Enhanced version of dd for forensics and security
Stars: ✭ 27 (+22.73%)
Mutual labels:  forensics, forensic-analysis, forensics-investigations
Judge-Jury-and-Executable
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (+200%)
Mutual labels:  forensics, forensic-analysis, forensics-investigations
ForensicsTools
A list of free and open forensics analysis tools and other resources
Stars: ✭ 392 (+1681.82%)
Mutual labels:  forensics, forensic-analysis, forensics-investigations
vminspect
Tools for inspecting disk images
Stars: ✭ 25 (+13.64%)
Mutual labels:  forensics, forensic-analysis
hashlookup-forensic-analyser
Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
Stars: ✭ 43 (+95.45%)
Mutual labels:  forensic-analysis, forensics-investigations
btrfscue
Recover files from damaged BTRFS filesystems
Stars: ✭ 28 (+27.27%)
Mutual labels:  forensics, forensic-analysis
ingest-file
Ingestors extract the contents of mixed unstructured documents into structured (followthemoney) data.
Stars: ✭ 40 (+81.82%)
Mutual labels:  forensics, forensics-investigations
Packrat
Live system forensic collector
Stars: ✭ 16 (-27.27%)
Mutual labels:  forensics, forensics-investigations
pyaff4
The Python implementation of the AFF4 standard.
Stars: ✭ 37 (+68.18%)
Mutual labels:  forensics, forensic-analysis
lsrootkit
Rootkit Detector for UNIX
Stars: ✭ 53 (+140.91%)
Mutual labels:  forensics, forensic-analysis
CRC-manipulator
Change CRC checksums of your files.
Stars: ✭ 73 (+231.82%)
Mutual labels:  forensics
prowler
Prowler is an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. It contains hundreds of controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks.
Stars: ✭ 8,046 (+36472.73%)
Mutual labels:  forensics
Gait-Recognition-Using-Smartphones
Deep Learning-Based Gait Recognition Using Smartphones in the Wild
Stars: ✭ 77 (+250%)
Mutual labels:  biometrics
Adtimeline
Timeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+1045.45%)
Mutual labels:  forensics
cora-docs
CoRA Docs
Stars: ✭ 36 (+63.64%)
Mutual labels:  forensics
bob
Bob is a free signal-processing and machine learning toolbox originally developed by the Biometrics group at Idiap Research Institute, in Switzerland. - Mirrored from https://gitlab.idiap.ch/bob/bob
Stars: ✭ 38 (+72.73%)
Mutual labels:  biometrics
Invtero.net
inVtero.net: A high speed (Gbps) Forensics, Memory integrity & assurance. Includes offensive & defensive memory capabilities. Find/Extract processes, hypervisors (including nested) in memory dumps using microarchitechture independent Virtual Machiene Introspection techniques
Stars: ✭ 237 (+977.27%)
Mutual labels:  forensics
Radare2
UNIX-like reverse engineering framework and command-line toolset
Stars: ✭ 15,412 (+69954.55%)
Mutual labels:  forensics
marcellelee.github.io
No description or website provided.
Stars: ✭ 27 (+22.73%)
Mutual labels:  forensics

Palmprint-Recognition-in-Uncontrolled-and-Uncooperative-Environment

Paper

Wojciech Michal Matkowski, Tingting Chai and Adams Wai Kin Kong. “Palmprint Recognition in Uncontrolled and Uncooperative Environment.” IEEE Transactions on Information Forensics and Security, vol. 15, pp 1601-1615, 2019, DOI: 10.1109/TIFS.2019.2945183.

Preprint can be found now on arXiv here
Paper can be found on IEEE Xplore here

Database

How to acquire the dataset?

To acquire the NTU Palmprints from the Internet (NTU-PI-v1) database (which was used in the paper), download and fill in the "Data Release Agreement.pdf" file. Print the agreement and sign on page 2. Scan the signed copy and send back to [email protected], [email protected] or [email protected] with title "Application for NTU Palmprints from the Internet database (NTU-PI-v1)". A download link to the database will be send to you once after we receive the signed agreement file.

Image examples

alt text
Example images from NTU-PI-v1. Images in the same column are from the same palm. Images are resized to the same size. alt text
Examples of original images downloaded from the Internet. Hands are higlited in red boxes in the original images.

Code

  • download matconvnet here unpack and put into maltab folder
  • download pretrained alignemnt network (ROI-LAnet) here and put into preTrainedNetworks folder
  • download pretrained end to end network (EE-PRnet) here and put into preTrainedNetworks folder
  • see and run demo codes in ROI-LAnet and EE-PRnet folders

Questions

If you have any questions about the paper please email me on [email protected], [email protected] or [email protected]

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].