Orientation range of transposition for vertical correlation suppression of 2DPalmPhasor Code
暂无分享,去创建一个
Ming Li | Andrew Beng Jin Teoh | Muhammad Khurram Khan | Lu Leng | Ming Li | M. Khan | A. Teoh | L. Leng
[1] Lu Leng,et al. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security , 2011, J. Netw. Comput. Appl..
[2] Andrew Beng Jin Teoh,et al. 2Ns Discretisation of BioPhasor in Cancellable Biometrics , 2007, ICB.
[3] Tieniu Tan,et al. Ordinal palmprint represention for personal identification [represention read representation] , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[4] L. Leng,et al. Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.
[5] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[6] John N. Tsitsiklis,et al. A survey of computational complexity results in systems and control , 2000, Autom..
[7] Lu Leng,et al. PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.
[8] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[9] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[10] Andrew Beng Jin Teoh,et al. Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition , 2014, Neurocomputing.
[11] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[12] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[13] Ming Li,et al. Orientation Range for Transposition According to the Correlation Analysis of 2DPalmHash Code , 2013, 2013 International Symposium on Biometrics and Security Technologies.
[14] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[15] Bin Ma,et al. Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking , 2013, Multimedia Tools and Applications.
[16] David Zhang,et al. Palmprint verification based on robust line orientation code , 2007, Pattern Recognit..
[17] Jiajun Wen,et al. Appearance-based bidirectional representation for palmprint recognition , 2014, Multimedia Tools and Applications.
[18] Hengjian Li,et al. Robust palmprint identification based on directional representations and compressed sensing , 2012, Multimedia Tools and Applications.
[19] Ahmed A. Abd El-Latif,et al. Linear discriminant multi-set canonical correlations analysis (LDMCCA): an efficient approach for feature fusion of finger biometrics , 2013, Multimedia Tools and Applications.
[20] Andrew Beng Jin Teoh,et al. Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.
[21] David Zhang,et al. A survey of palmprint recognition , 2009, Pattern Recognit..
[22] Hanêne Ben-Abdallah,et al. Selection of discriminative sub-regions for palmprint recognition , 2012, Multimedia Tools and Applications.
[23] Muhammad Khurram Khan,et al. Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion , 2011, STA.
[24] Zhenhua Guo,et al. Palmprint verification using binary orientation co-occurrence vector , 2009, Pattern Recognit. Lett..
[25] C. Rathgeb,et al. Statistical attack against fuzzy commitment scheme , 2012, IET Biom..
[26] Junyu Niu,et al. Fragile Bits in Palmprint Recognition , 2012, IEEE Signal Processing Letters.
[27] David Zhang,et al. An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing , 2005, KES.
[28] Michele Nappi,et al. ES-RU: an entropy based rule to select representative templates in face surveillance , 2012, Multimedia Tools and Applications.
[29] Andrew Beng Jin Teoh,et al. Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..
[30] David Zhang,et al. Feature-Level Fusion for Effective Palmprint Authentication , 2004, ICBA.
[31] David Zhang,et al. Competitive coding scheme for palmprint verification , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[32] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[33] Andy Adler. Cancelable Biometrics , 2015, Encyclopedia of Biometrics.
[34] David Zhang,et al. An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.
[35] David Zhang,et al. Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[36] Gaurav Bhatnagar,et al. A New Fractional Random Wavelet Transform for Fingerprint Security , 2012, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.