Biometric Recognition: Overview and Recent Advances
暂无分享,去创建一个
[1] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[2] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[3] Anil K. Jain,et al. Biometric Systems: Technology, Design and Performance Evaluation , 2004 .
[4] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[5] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[6] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[7] Craig I. Watson,et al. Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report , 2004 .
[8] Anil K. Jain,et al. Integrating Faces and Fingerprints for Personal Identification , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[9] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[10] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .
[11] Sharath Pankanti,et al. On the Individuality of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[12] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[13] Yajie Tian,et al. Handbook of face recognition , 2003 .
[14] Pieter H. Hartel,et al. The state of the art in abuse of biometrics , 2005 .
[15] Alvin F. Martin,et al. NIST speaker recognition evaluation chronicles , 2004, Odyssey.
[16] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[17] Alice J. O'Toole,et al. FRVT 2006 and ICE 2006 large-scale results , 2007 .
[18] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] J. Daugman. 5 RECOGNIZING PERSONS BY THEIR IRIS PATTERNS , 2005 .
[20] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.