• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Yiding, Jiang Nan, Li Kefeng. Dynamic Spatial Synthesis of Dorsal Hand Vein Images Based on PCA[J]. Journal of Computer Research and Development, 2014, 51(10): 2302-2307. DOI: 10.7544/issn1000-1239.2014.20130822
Citation: Wang Yiding, Jiang Nan, Li Kefeng. Dynamic Spatial Synthesis of Dorsal Hand Vein Images Based on PCA[J]. Journal of Computer Research and Development, 2014, 51(10): 2302-2307. DOI: 10.7544/issn1000-1239.2014.20130822

Dynamic Spatial Synthesis of Dorsal Hand Vein Images Based on PCA

More Information
  • Published Date: September 30, 2014
  • Databases of human dorsal hand vein (DHV) images are created and distributed for the purpose of testing DHV identification algorithm. For logistical and privacy reasons, these databases are often too small to fulfill their potential applications. A novel synthesis method of creating new DHV images using principal component analysis (PCA) is proposed, which can be applied to enlarge the existing DHV image database. Firstly, the origin database is divided into set B and set M. Set B provides a feature space and the set M constitutes a sample space used for projection. Then, the projection coefficients are obtained by projecting the sample space to the feature space. Finally, based on the method of PCA, new data are synthesized using the feature space and the projection coefficients extracted from the existing real data. Dynamic changing of the samples in the two sets can synthesize more and more new samples. The number of the samples in the two sets is also decided by our experiments. Therefore, a new synthesized DHV image database containing 8007 subjects is built in our research with 94 original subjects. The experimental results show that the synthesized database reaches a satisfied recognition rate of 97.84%, which indicates the proposed method performs well and would be applicable in the simulation test.
  • Related Articles

    [1]Zhang Jing, Ju Jialiang, Ren Yonggong. Double-Generators Network for Data-Free Knowledge Distillation[J]. Journal of Computer Research and Development, 2023, 60(7): 1615-1627. DOI: 10.7544/issn1000-1239.202220024
    [2]Li Tao, Liu Yali. A Double PUF-Based RFID Authentication Protocol[J]. Journal of Computer Research and Development, 2021, 58(8): 1801-1810. DOI: 10.7544/issn1000-1239.2021.20200477
    [3]Ouyang Dantong, Zhi Huayun, Liu Bowen, Zhang Liming, Zhang Yonggang. A Method of Computing Minimal Diagnoses Based on Pseudo-Failure-Degree to Create New Enumeration Tree[J]. Journal of Computer Research and Development, 2018, 55(4): 782-790. DOI: 10.7544/issn1000-1239.2018.20170016
    [4]Gao Peng, Wang Dongsheng, Wang Haixia. Increasing PCM Lifetime by Using Pipelined Pseudo-Random Encoding Algorithm[J]. Journal of Computer Research and Development, 2017, 54(6): 1357-1366. DOI: 10.7544/issn1000-1239.2017.20170065
    [5]Gao Shujing, Qu Yingjie, Song Tingqiang. Pseudorandom Number Generators Based on One-Way Functions[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399. DOI: 10.7544/issn1000-1239.2015.20131954
    [6]Jiang Jinsong, Yan Kun, Ni Guiqiang, He Ming, and Yang Bo. Generic GUI Generator Based on XML and XSD[J]. Journal of Computer Research and Development, 2012, 49(4): 826-832.
    [7]Zhu Hegui, Zhang Xiangde, Yang Lianping, and Tang Qingsong. Fingerprint-Based Random Sequence Generator[J]. Journal of Computer Research and Development, 2009, 46(11): 1862-1867.
    [8]Tian Junfeng, Jiao Hongqiang, Li Ning, and Liu Tao. Double Secret Keys and Double Random Numbers Authentication Scheme[J]. Journal of Computer Research and Development, 2008, 45(5): 779-785.
    [9]Shi Rui and Yang Xiaozong. Research on the Node Spatial Probabilistic Distribution of the Random Waypoint Mobility Model for Ad Hoc Network[J]. Journal of Computer Research and Development, 2005, 42(12): 2056-2062.
    [10]Lü Yanli, Li Xiaojian, Xia Chunhe, and Liu Shuzhi. Research on the Security of Initial Sequence Number Generation Arithmetic[J]. Journal of Computer Research and Development, 2005, 42(11): 1940-1945.
  • Cited by

    Periodical cited type(4)

    1. 丁艳,王娜,杜学绘. 基于区块链的大规模线性方程组外包计算方案. 信息安全学报. 2025(01): 91-104 .
    2. 郭煜. 改进粒子群优化算法的非线性方程组求解研究. 自动化技术与应用. 2022(07): 6-9 .
    3. 朱良杰,沈佳杰,周扬帆,王新. 云际存储系统性能优化研究现状与展望. 计算机工程与科学. 2021(05): 761-772 .
    4. 习宇兴,唐敏,庞健虎,张宇浩. 基于Gauss迭代法的线性方程组隐私保护外包计算. 现代信息科技. 2021(04): 149-152 .

    Other cited types(1)

Catalog

    Article views (1122) PDF downloads (695) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return