Matching reduction of 2DPalmHash Code
暂无分享,去创建一个
[1] David Zhang,et al. Three measures for secure palmprint identification , 2008, Pattern Recognit..
[2] Hengjian Li,et al. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..
[3] David Zhang,et al. A Palmprint Cryptosystem , 2007, ICB.
[4] David Zhang,et al. Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Lu Leng,et al. PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.
[6] Lu Leng,et al. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security , 2011, J. Netw. Comput. Appl..
[7] Ming Li,et al. A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion , 2014, Secur. Commun. Networks.
[8] L. Leng,et al. Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.
[9] Andrew Beng Jin Teoh,et al. Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..
[10] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[11] Junyu Niu,et al. Fragile Bits in Palmprint Recognition , 2012, IEEE Signal Processing Letters.
[12] Muhammad Khurram Khan,et al. Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion , 2011, STA.
[13] Zhenhua Guo,et al. Palmprint verification using binary orientation co-occurrence vector , 2009, Pattern Recognit. Lett..
[14] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[15] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[16] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[17] David Zhang,et al. A survey of palmprint recognition , 2009, Pattern Recognit..
[18] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[19] B. Ripley,et al. Pattern Recognition , 1968, Nature.