Enhancing security and privacy in biometrics-based authentication systems
暂无分享,去创建一个
[1] T. Parthasarathy,et al. Development of a Mathematical Formula for the Calculation of Fingerprint Probabilities Based on Individual Characteristics , 1977 .
[2] S. Sclove. The Occurrence of Fingerprint Characteristics as a Two-Dimensional Process , 1979 .
[3] John I. Thornton,et al. A Critical Analysis of Quantitative Fingerprint Individuality Models , 1986 .
[4] Thaddeus Beier,et al. Feature-based image metamorphosis , 1992, SIGGRAPH.
[5] B. Miller,et al. Vital signs of identity [biometrics] , 1994, IEEE Spectrum.
[6] Jelena Kovacevic,et al. Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.
[7] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[8] Christopher M. Brislawn,et al. FBI compression standard for digitized fingerprint images , 1996, Optics & Photonics.
[9] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[10] Robert S. Germain,et al. Fingerprint matching using transformation parameter clustering , 1997 .
[11] Nasir D. Memon,et al. Protecting digital media content , 1998, CACM.
[12] Bruce Schneier,et al. SECURITY PITFALLS IN CRYPTOGRAPHY , 1998 .
[13] George Wolberg,et al. Image morphing: a survey , 1998, The Visual Computer.
[14] Ahmed H. Tewfik,et al. Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.
[15] Thaddeus Beier,et al. Feature-based image metamorphosis , 1998 .
[16] W. Gropp,et al. Accepted for publication , 2001 .
[17] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[18] Markus G. Kuhn,et al. Information hiding-a survey , 1999, Proc. IEEE.
[19] Sharath Pankanti,et al. Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.
[20] Ja-Ling Wu,et al. Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..
[21] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .