Biometric Anti-spoofing Technique Using Randomized 3D Multi-Modal Traits
暂无分享,去创建一个
[1] Manish Thakker,et al. Biometric Recognition Techniques: A Review , 2012 .
[2] Shashank Pujari,et al. Fingerprint Based Attendance System Using Microcontroller and LabView , 2015 .
[3] Sumit Chabbra,et al. Applications of Swarm Intelligence inBiometrics systems , 2014 .
[4] G. Hemantha Kumar,et al. A New Hybrid Approach for Information Fusion in Multibiometric Systems , 2011, 2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics.
[5] Clement Onime,et al. Multi-biometric liveness detection – A new perspective , 2016 .
[6] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[7] N. Singla,et al. Biometric Fingerprint Indentification Using Artificial Neural Network , 2014 .
[8] Abdenour Hadid,et al. Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned , 2015, IEEE Signal Processing Magazine.
[9] Pierre Margot,et al. A CHRONOLOGICAL REVIEW OF FINGERPRINT FORGERY , 1999 .
[10] Sébastien Marcel,et al. On the vulnerability of palm vein recognition to spoofing attacks , 2015, 2015 International Conference on Biometrics (ICB).
[11] Borhanuddin Mohd Ali,et al. TECHNICAL ISSUES AND CHALLENGES OF BIOMETRIC APPLICATIONS AS ACCESS CONTROL TOOLS OF INFORMATION SECURITY , 2012 .
[12] Sanjeevakumar M. Hatture,et al. Liveness Detection Technique for Prevention of Spoof Attack in Face Recognition System , 2013 .
[13] Robert H. Deng,et al. Understanding OSN-based facial disclosure against face authentication systems , 2014, AsiaCCS.
[14] Jia-Hong Dai,et al. An embedded fingerprint authentication system with reduced hardware resources requirement , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..
[15] Jameson Mbale,et al. Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System , 2011, Int. J. Comput. Intell. Syst..
[16] Clement Onime,et al. Enhancing Biometric Liveness Detection Using Trait Randomization Technique , 2017, 2017 UKSim-AMSS 19th International Conference on Computer Modelling & Simulation (UKSim).
[17] Selina Sharmin,et al. A Survey of Biometrics Security System , 2011 .
[18] Valsamma Km Dr Valsamma Km. Aadhaar, Function Creep and The Emerging Symbiotic Relationship between Society and Technology , 2012 .
[19] Mohmad Kashif Qureshi. LIVENESS DETECTION OF BIOMETRIC TRAITS , 2010 .
[20] F. Roli,et al. Security evaluation of biometric authentication systems under real spoofing attacks , 2012, IET Biom..
[21] Luisa Verdoliva,et al. An Investigation of Local Descriptors for Biometric Spoofing Detection , 2015, IEEE Transactions on Information Forensics and Security.
[22] Shilpa Shrivastava. Biometric: Types and its Applications , 2015 .
[23] A. Lakshmi,et al. DEEP REPRESENTATIONS FOR IRIS , FACE , AND FINGERPRINT SPOOFING DETECTION , 2017 .
[24] Philippe C. Cattin,et al. Biometric authentication system using human gait , 2002 .
[25] Dhiraj Sunehra. Fingerprint Based Biometric ATM Authentication System , 2014 .
[26] Jiang-Wei Li,et al. Eye blink detection based on multiple Gabor response waves , 2008, 2008 International Conference on Machine Learning and Cybernetics.
[27] C. Chellappan,et al. Biometrics: An Overview of the Technology, Issues and Applications , 2012 .
[28] Sébastien Marcel,et al. Biometric Antispoofing Methods: A Survey in Face Recognition , 2014, IEEE Access.
[29] A. D. Fitt,et al. Fluid Mechanics of the Human Eye: Aqueous Humour Flow in The Anterior Chamber , 2006, Bulletin of mathematical biology.
[30] Deepak Rasaily,et al. Biometric Attendance System using Microcontroller , 2016 .
[31] Gian Luca Marcialis,et al. LivDet 2011 — Fingerprint liveness detection competition 2011 , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[32] Milind V. Sarode,et al. BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FINGERPRINT RECOGNITION , 2012 .