An analysis on equal width quantization and linearly separable subcode encoding-based discretization and its performance resemblances
暂无分享,去创建一个
[1] Julian Fierrez,et al. Fingerprint liveness detection based on quality measures , 2009, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS).
[2] David Zhang,et al. Hand-Geometry Recognition Using Entropy-Based Discretization , 2007, IEEE Transactions on Information Forensics and Security.
[3] Julian Fierrez,et al. Hill-climbing attack to an Eigenface-based face verification system , 2009, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS).
[4] Tsuhan Chen,et al. Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[5] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[6] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[7] Chun Chen,et al. Biometric Quantization through Detection Rate Optimized Bit Allocation , 2009, EURASIP J. Adv. Signal Process..
[8] Anton H. M. Akkermans,et al. Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[9] Aleix M. Martinez,et al. The AR face database , 1998 .
[10] Yixin Chen,et al. Image Categorization by Learning and Reasoning with Regions , 2004, J. Mach. Learn. Res..
[11] K. Pearson. NOTES ON THE HISTORY OF CORRELATION , 1920 .
[12] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[13] R.N.J. Veldhuis,et al. Multi-Bits Biometric String Generation based on the Likelihood Ratio , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[14] Martin D. Buhmann,et al. Radial Basis Functions: Theory and Implementations: Preface , 2003 .
[15] Qi Li,et al. Using voice to generate cryptographic keys , 2001, Odyssey.
[16] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[17] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[18] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[19] A. Martínez,et al. The AR face databasae , 1998 .
[20] Claudio Gutierrez,et al. Survey of graph database models , 2008, CSUR.
[21] James Ze Wang,et al. Image retrieval: Ideas, influences, and trends of the new age , 2008, CSUR.
[22] Andrew Beng Jin Teoh,et al. Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures , 2006, ICB.
[23] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[24] Andrew Beng Jin Teoh,et al. Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..
[25] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[26] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[27] Meng-Hui Lim,et al. Linearly Separable SubCode: A novel output label with high separability for biometric discretization , 2010, 2010 5th IEEE Conference on Industrial Electronics and Applications.
[28] Andrew Beng Jin Teoh,et al. Cancellable biometrics and user-dependent multi-state discretization in BioHash , 2009, Pattern Analysis and Applications.
[29] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[30] Evgeny Verbitskiy,et al. RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION , 2007 .
[31] Chun Chen,et al. Extracting biometric binary strings with minimal area under the FRR curve for the hamming distance classifier , 2009, 2009 17th European Signal Processing Conference.
[32] Hyeonjoon Moon,et al. The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[33] Xudong Jiang,et al. Eigenfeature Regularization and Extraction in Face Recognition , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[34] Hyeonjoon Moon,et al. The FERET evaluation methodology for face-recognition algorithms , 1997, Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[35] Fabrizio Sebastiani,et al. Machine learning in automated text categorization , 2001, CSUR.