50 years of biometric research: Accomplishments, challenges, and opportunities
暂无分享,去创建一个
[1] Alphonse Bertillon,et al. Signaletic instructions including the theory and practice of anthropometrical identification , 2022 .
[2] A. F. Adams,et al. The Survey , 2021, Dyslexia in Higher Education.
[3] S. Pruzansky. Pattern‐Matching Procedure for Automatic Talker Recognition , 1963 .
[4] MITCHELL TRAURING,et al. Automatic Comparison of Finger-Ridge Patterns , 1963, Nature.
[5] Lawrence G. Roberts,et al. Machine Perception of Three-Dimensional Solids , 1963, Outstanding Dissertations in the Computer Sciences.
[6] 金出 武雄,et al. Picture processing system by computer complex and recognition of human faces , 1974 .
[7] L Sirovich,et al. Low-dimensional procedure for the characterization of human faces. , 1987, Journal of the Optical Society of America. A, Optics and image science.
[8] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[9] W. Babler. Embryologic development of epidermal ridges and their configurations. , 1991, Birth defects original article series.
[10] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[11] M. Bannier. [Aging of the face]. , 1993, Soins. Chirurgie.
[12] Penio S. Penev,et al. Local feature analysis: A general statistical theory for object representation , 1996 .
[13] Norbert Krüger,et al. Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.
[14] David J. Kriegman,et al. Recognition using class specific linear projection , 1997 .
[15] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[16] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.
[17] David R. Ashbaugh,et al. Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology , 1999 .
[18] Sharath Pankanti,et al. A Prototype Hand Geometry-based Verication System , 1999 .
[19] A. Barrett,et al. Crime and Punishment in England: A Sourcebook , 2001 .
[20] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[21] Sharath Pankanti,et al. On the similarity of identical twin fingerprints , 2002, Pattern Recognit..
[22] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[23] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[24] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[25] L. Weathered. The innocence project , 2003 .
[26] Thomas Vetter,et al. Face Recognition Based on Fitting a 3D Morphable Model , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[27] Lawrence O'Gorman,et al. Innovations in fingerprint capture devices , 2003, Pattern Recognit..
[28] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[29] Nilanjan Ray,et al. Pattern Recognition Letters , 1995 .
[30] Tieniu Tan,et al. Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.
[31] Craig I. Watson,et al. Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report , 2004 .
[32] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[33] Arun Ross,et al. Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..
[34] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[35] Stephanie Schuckers,et al. Time-series detection of perspiration as a liveness test in fingerprint devices , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[36] Robert K. Rowe,et al. Multispectral fingerprint imaging for spoof detection , 2005, SPIE Defense + Commercial Sensing.
[37] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[38] Dario Maio,et al. Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.
[39] Rudolf Hauke,et al. The Surround ImagerTM: A Multi-camera Touchless Device to Acquire 3D Rolled-Equivalent Fingerprints , 2006, ICB.
[40] Karl Ricanek,et al. MORPH: a longitudinal image database of normal adult age-progression , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[41] John Daugman,et al. Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.
[42] Kang Ryoung Park,et al. Fake Iris Detection by Using Purkinje Image , 2006, ICB.
[43] Shengcai Liao,et al. Illumination Invariant Face Recognition Using Near-Infrared Images , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[44] James L. Wayman. The scientific development of biometrics over the last 40 years , 2007 .
[45] Anil K. Jain,et al. Statistical Models for Assessing the Individuality of Fingerprints , 2005, IEEE Transactions on Information Forensics and Security.
[46] Christophe Champod,et al. Computation of Likelihood Ratios in Fingerprint Identification for Configurations of Any Number of Minutiæ , 2007, Journal of forensic sciences.
[47] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[48] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[49] Mark R. Hawthorne. Fingerprints: Analysis and Understanding , 2008 .
[50] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[51] Elke Greifender,et al. The History of Information Security: A Comprehensive Handbook , 2008 .
[52] Arun Ross,et al. An introduction to biometrics , 2008, ICPR 2008.
[53] R. Chellappa,et al. Age progression in Human Faces : A Survey , 2008 .
[54] Karim Faez,et al. Human Identification Based on Gait , 2008 .
[55] Bruce A. Draper,et al. A meta-analysis of face recognition covariates , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[56] Nicolae Duta,et al. A survey of biometric technology based on hand shape , 2009, Pattern Recognit..
[57] Patrick J. Flynn,et al. Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches , 2009, ICB.
[58] David Zhang,et al. A survey of palmprint recognition , 2009, Pattern Recognit..
[59] Carlos D. Castillo,et al. Fake Finger Detection , 2009, Encyclopedia of Biometrics.
[60] Bruce A. Draper,et al. Factors that influence algorithm performance in the Face Recognition Grand Challenge , 2009, Comput. Vis. Image Underst..
[61] George W. Quinn,et al. ELFT phase II :: an evaluation of automated latent fingerprint identification technologies , 2009 .
[62] Allen Y. Yang,et al. Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[63] Anil K. Jain,et al. Handbook of Fingerprint Recognition, Second Edition , 2009 .
[64] Yun Fu,et al. Age Synthesis and Estimation via Faces: A Survey , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[65] Rishi Gupta,et al. Iris Recognition System , 2010 .
[66] Tomoyuki Suzuki,et al. Challenges of image-sensor development , 2010, 2010 IEEE International Solid-State Circuits Conference - (ISSCC).
[67] Yiying Tong,et al. Age-Invariant Face Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[68] Dileepan Joseph,et al. Toward a digital camera to rival the human eye , 2011, J. Electronic Imaging.
[69] Sistema político,et al. Unique Identification Authority of India , 2011 .
[70] A. Zoubir,et al. EURASIP Journal on Advances in Signal Processing , 2011 .
[71] Matthijs C. Dorst. Distinctive Image Features from Scale-Invariant Keypoints , 2011 .
[72] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[73] Arun Ross,et al. Periocular Biometrics in the Visible Spectrum , 2011, IEEE Transactions on Information Forensics and Security.
[74] Junjie Yan,et al. A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[75] Anil K. Jain,et al. Altered Fingerprints: Analysis and Detection , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[76] Sébastien Marcel,et al. On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[77] George W. Quinn,et al. IREX III: Performance of Iris Identification Algorithms , 2012 .
[78] Anil K. Jain,et al. Face Recognition Performance: Role of Demographic Information , 2012, IEEE Transactions on Information Forensics and Security.
[79] Sander Oude Elberink,et al. Accuracy and Resolution of Kinect Depth Data for Indoor Mapping Applications , 2012, Sensors.
[80] Arun Ross,et al. Can facial cosmetics affect the matching accuracy of face recognition systems? , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[81] Vinay Bettadapura,et al. Face Expression Recognition and Analysis: The State of the Art , 2012, ArXiv.
[82] Vincent M. Stanford,et al. The 2021 NIST Speaker Recognition Evaluation , 2022, Odyssey.
[83] Anil K. Jain,et al. A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects , 2013 .
[84] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[85] Takayuki Yamada,et al. Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity , 2013, Communications and Multimedia Security.
[86] Ramesh Govindan,et al. P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.
[87] Paul Rayson,et al. Who Am I? Analyzing Digital Personas in Cybercrime Investigations , 2013, Computer.
[88] Arun Ross,et al. A survey on ear biometrics , 2013, CSUR.
[89] George W. Quinn,et al. IREX VI : Temporal Stability of Iris Recognition Accuracy , 2013 .
[90] Xiaogang Wang,et al. Deep Learning Face Representation from Predicting 10,000 Classes , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[91] Stan Z. Li,et al. Handbook of Biometric Anti-Spoofing , 2014, Advances in Computer Vision and Pattern Recognition.
[92] Ben D. Sawyer,et al. Google Glass , 2014, Hum. Factors.
[93] Anil K. Jain,et al. Recognizing infants and toddlers using fingerprints: Increasing the vaccination coverage , 2014, IEEE International Joint Conference on Biometrics.
[94] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[95] Arun Ross,et al. A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .
[96] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[97] Anil K. Jain,et al. Longitudinal study of fingerprint recognition , 2015, Proceedings of the National Academy of Sciences.
[98] Arun Ross,et al. What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.
[99] Arun Ross,et al. 50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..