Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images
暂无分享,去创建一个
[1] V. Dolgov,et al. THE NEW CONCEPT OF BLOCK SYMMETRIC CIPHERS DESIGN , 2017 .
[2] Xueyin Lin,et al. Color image segmentation using modified HSI system for road following , 1991, Proceedings. 1991 IEEE International Conference on Robotics and Automation.
[3] Shaoyun Chen,et al. Autonomous navigation through case-based learning , 1995, Proceedings of International Symposium on Computer Vision - ISCV.
[4] Yuriy Gorbenko,et al. Post-quantum message authentication cryptography based on error-correcting codes , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[5] Ivan Gorbenko,et al. Examining a possibility to use and the benefits of post-quantum algorithms dependent on the conditions of their application , 2017 .
[6] Mariia Rodinko,et al. Improvement of the high nonlinear S-boxes generation method , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[7] Anil K. Jain,et al. Evidential Value of Automated Latent Fingerprint Comparison: An Empirical Approach , 2012, IEEE Transactions on Information Forensics and Security.
[8] Roman Oliynykov,et al. Influence of addition modulo 2n on algebraic attacks , 2016, Cryptography and Communications.
[9] I. Gorbenko,et al. Examination and implementation of the fast method for computing the order of elliptic curve , 2017 .
[10] A. V. Potii,et al. A System Approach to Certification of Pseudorandom Numbers Generators Used in Information Protection Systems , 1998 .
[11] A. A. Kuznetsov,et al. THE STATISTICAL ANALYSIS OF A NETWORK TRAFFIC FOR THE INTRUSION DETECTION AND PREVENTION SYSTEMS , 2015 .
[12] Oleg Illiashenko,et al. Advanced Security Assurance Case Based on ISO/IEC 15408 , 2015, DepCoS-RELCOMEX.
[13] Xudong Jiang,et al. Fingerprint minutiae matching based on the local and global structures , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[14] V. A. Krasnobayev,et al. A Method for Increasing the Reliability of Verification of Data Represented in a Residue Number System , 2014 .
[15] Nalini K. Ratha,et al. A new approach for iris segmentation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[16] Olexandr Kuznetsov,et al. Combinatorial properties of block symmetric ciphers key schedule , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[17] Alexandr Kuznetsov,et al. The research of modern stream ciphers , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[18] Olexandr Kuznetsov,et al. Strumok stream cipher: Specification and basic properties , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[19] Mariia Rodinko,et al. Open problems of proving security of ARX-based ciphers to differential cryptanalysis , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[20] Y. Stasev,et al. Asymmetric Code-Theoretical Schemes Constructed with the Use of Algebraic Geometric Codes , 2005 .
[21] Alexandr Kuznetsov,et al. Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2 , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[22] I. Gorbenko,et al. Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis , 1998 .
[23] Bruce A. Draper,et al. Recognizing faces with PCA and ICA , 2003, Comput. Vis. Image Underst..
[24] J. Connell,et al. Exploring Ridge Curvature for Fingerprint Indexing , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[25] Nalini K. Ratha,et al. Biometric Verification: Looking Beyond Raw Similarity Scores , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[26] Alina Andrushkevych,et al. The block symmetric ciphers in the post-quantum period , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[27] Tong Heng Lee,et al. Face recognition using recursive Fisher linear discriminant , 2006, IEEE Transactions on Image Processing.
[28] Sharath Pankanti,et al. A model-based sampling and sample synthesis method for auto identification in computer vision , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[29] Tamila Lavrovska,et al. Physical model of pseudorandom codes in multidimensional Euclidean space , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).
[30] V. Krasnobayev,et al. A Method for Arithmetic Comparison of Data Represented in a Residue Number System , 2016 .
[31] Alexandr Kuznetsov,et al. Periodic characteristics of output feedback encryption mode , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[32] Juyang Weng,et al. Incremental learning for vision-based navigation , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[33] Alexandr Kuznetsov,et al. Code-based public-key cryptosystems for the post-quantum period , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[34] Sergii Kavun. Conceptual fundamentals of a theory of mathematical interpretation , 2015, Int. J. Comput. Sci. Math..
[35] V. M. Grachev,et al. Technology for developing databases of information systems , 2014 .
[36] Sharath Pankanti,et al. On the individuality fingerprints , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[37] Nicholas Costen,et al. How Should We RepresentFaces for Automatic Recognition? , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[38] I. D. Gorbenko,et al. ENSEMBLE AND CORRELATION PROPERTIES OF CRYPTOGRAPHIC SIGNALS FOR TELECOMMUNICATION SYSTEM AND NETWORK APPLICATIONS , 2016 .
[39] Alexandr Kuznetsov,et al. Construction of cascade codes in the frequency domain , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[40] V. M. Grachev,et al. Data security mechanisms implemented in the database with universal model , 2014 .
[41] Anil K. Jain,et al. A Real-Time Matching System for Large Fingerprint Databases , 1996, IEEE Trans. Pattern Anal. Mach. Intell..
[42] Sharath Pankanti,et al. Minutia verification and classification for fingerprint matching , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[43] Alina Yanko,et al. Algorithms of data processing in the residual classes system , 2017, 2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[44] Ivan Gorbenko,et al. Anonymous electronic signature method , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).