OSA's Digital Library

Chinese Optics Letters

Chinese Optics Letters


  • Vol. 6, Iss. 9 — Sep. 1, 2008
  • pp: 657–660

A multi-resolution wavelet algorithm for hand vein pattern recognition

Yunxin Wang, Tiegen Liu, and Junfeng Jiang  »View Author Affiliations

Chinese Optics Letters, Vol. 6, Issue 9, pp. 657-660 (2008)

View Full Text Article

Acrobat PDF (403 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools

  • Export Citation/Save Click for help


A novel hand vein recognition algorithm is developed based on multi-resolution wavelet analysis. The texture feature of hand vein can be extracted by three-level wavelet decomposition. Furthermore, K-nearest neighbor (KNN) with support vector machines (SVM) and minimum distance classifier (MDC) are employed for feature matching. Finally, the experiments are respectively performed in identification and verification modes using Tianjin University (TJU) hand vein image database constructed by our group. The results show the feasibility and effectiveness of the proposed method.

© 2008 Chinese Optics Letters

OCIS Codes
(100.0100) Image processing : Image processing
(100.5010) Image processing : Pattern recognition
(100.7410) Image processing : Wavelets

Yunxin Wang, Tiegen Liu, and Junfeng Jiang, "A multi-resolution wavelet algorithm for hand vein pattern recognition," Chin. Opt. Lett. 6, 657-660 (2008)

Sort:  Author  |  Year  |  Journal  |  Reset


  1. R. de Luis-García, C. Alberola-López, O. Aghzout, and J. Ruiz-Alzola, Signal Processing 83, 2539 (2003).
  2. A. K. Jain, A. Ross, and S. Prabhakar, IEEE Trans. Circ. Syst. Video Technol. 14, 4 (2004).
  3. L. Ma, T. Tan, Y. Wang, and D. Zhang, Pattern Recogn. 37, 1287 (2004).
  4. R. Luo and T. Lin, Chin. Opt. Lett. 5, 160 (2007).
  5. C.-L. Lin and K.-C. Fan, IEEE Trans. Circ. Syst. Video Technol. 14, 199 (2004).
  6. L. Wang, G. Leedham, and D. S.-Y. Cho, Pattern Recogn. 41, 920 (2008).
  7. M. Shahin, A. Badawi, and M. Kamel, Int. J. Biomed. Sci. 2, 141 (2007).
  8. J. M. Cross and C. L. Smith, in Proceedings of 29th International Carnahan Conference on Security Technology 20 (1995).
  9. X. Lin, B. Zhuang, X. Su, Y. Zhou, and G. Bao, J. Tsinghua University (Sci. and Tech.) (in Chinese) 43, 164 (2003).
  10. T. Tanaka and N. Kubo, in Proceedings of SICE Annual Conference in Sapporo 249 (2004).
  11. D. Shen and H. H. S. Ip, Pattern Recogn. 32, 151 (1999).
  12. I. Daubechies, IEEE Trans. Information Theory 36, 961 (1990).
  13. Q. Xu, Y. Zhong, and Z. You, Acta Opt. Sin. (in Chinese) 20, 1617 (2000).
  14. S. Prabhakar, S. Pankanti, and A. K. Jain, IEEE Security Privacy 1, 33 (2003).
  15. C. Cortes and V. Vapnik, Machine Learning 20, 273 (1995).
  16. S. Li, Y. Zhang, L. Dong, S. Chang, and J. Shen, Acta Photon. Sin. (in Chinese) 35, 304 (2006).
  17. J. Sun, Q. Li, W. Lu, and Q. Wang, Chinese J. Lasers (in Chinese) 33, 1467 (2006).

Cited By

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited