Biometrics of next Generation: an Overview 1.1 Introduction
暂无分享,去创建一个
[1] Venu Govindaraju,et al. Efficient search and retrieval in biometric databases , 2005, SPIE Defense + Commercial Sensing.
[2] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[3] Jeremy Wickins,et al. The ethics of biometrics: the risk of social exclusion from the widespread use of electronic identification , 2007, Sci. Eng. Ethics.
[4] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[5] Josef Kittler,et al. Challenges and Research Directions for Adaptive Biometric Recognition Systems , 2009, ICB.
[6] Jeffrey P. Cohn,et al. Keeping an Eye on School Security: The Iris Recognition Project in New Jersey Schools: (538032006-003) , 2006 .
[7] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[8] Anil K. Jain,et al. Facial marks: Soft biometric for face recognition , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[9] Lior Shamir,et al. Biometric identification using knee X-rays , 2009, Int. J. Biom..
[10] Luís A. Alexandre,et al. The UBIRIS.v2: A Database of Visible Wavelength Iris Images Captured On-the-Move and At-a-Distance , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[12] Kazuhiko Ohnuma,et al. Novel biometrics based on nose pore recognition , 2009 .
[13] S. Rahman,et al. A New Antispoofing Approach for Biometric Devices , 2008, IEEE Transactions on Biomedical Circuits and Systems.
[14] Dario Maio,et al. Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.
[15] Ajay Kumar,et al. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..
[16] Andrea F. Abate,et al. 2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..
[17] Arun Ross,et al. From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[18] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[19] Yusuke Tamura,et al. Verification of Individual Identification Method Using Bioelectric Potential of Plant during Human Walking , 2007 .
[20] SUMMARY OF NIST STANDARDS FOR BIOMETRIC ACCURACY, TAMPER RESISTANCE, AND INTEROPERABILITY , 2002 .
[21] Nicolas Thériault,et al. Human Ear Recognition , 2011, Encyclopedia of Cryptography and Security.
[22] Pramod K. Varshney,et al. An adaptive multimodal biometric management algorithm , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[23] J. Wayman,et al. ANALYSIS OF SECURITY VULNERABILITIES IN BIOMETRIC SYSTEMS , 2009 .
[24] Matti Pietikäinen,et al. Dynamic Texture Based Gait Recognition , 2009, ICB.
[25] Anil K. Jain,et al. Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.
[26] Anil K. Jain,et al. Periocular biometrics in the visible spectrum: A feasibility study , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[27] James R. Bergen,et al. Iris Recognition in Less Constrained Environments , 2008 .
[28] R. Pearl. Biometrics , 1914, The American Naturalist.
[29] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[30] Ajay Kumar,et al. Personal Authentication Using Hand Vein Triangulation and Knuckle Shape , 2009, IEEE Transactions on Image Processing.
[31] Andreas Uhl,et al. Footprint-based biometric verification , 2008, J. Electronic Imaging.
[32] John Daugman,et al. IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE , 2004 .
[33] Pong C. Yuen,et al. Protecting Face Biometric Data on Smartcard with Reed-Solomon Code , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[34] H Eichenbaum,et al. Neural Correlates of Olfactory Recognition Memory in the Rat Orbitofrontal Cortex , 2000, The Journal of Neuroscience.
[35] Ajay Kumar,et al. Incorporating Cohort Information for Reliable Palmprint Authentication , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.
[36] W. Todd Scruggs,et al. eigenPulse: Robust human identification from cardiovascular function , 2008, Pattern Recognit..
[37] Anil K. Jain,et al. Latent Palmprint Matching , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[38] David Zhang,et al. Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[39] Xuelong Li,et al. General Tensor Discriminant Analysis and Gabor Features for Gait Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[40] J. Fierrez-Aguilar,et al. Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.
[41] Leszek Wojnar,et al. An Automatic Recognition of the Frontal Sinus in X-Ray Images of Skull , 2009, IEEE Transactions on Biomedical Engineering.
[42] Sharath Pankanti,et al. On the individuality fingerprints , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[43] Bhaskar D. Kulkarni,et al. Arterial Pulse Rate Variability analysis for diagnoses , 2008, 2008 19th International Conference on Pattern Recognition.
[44] Aparecido Nilceu Marana,et al. Frontal sinus recognition for human identification , 2008, SPIE Defense + Commercial Sensing.
[45] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[46] Richa Singh,et al. Online learning in biometrics: A case study in face classifier update , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[47] Tieniu Tan,et al. A study of multibiometric traits of identical twins , 2010, Defense + Commercial Sensing.
[48] James R. Matey,et al. Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments , 2006, Proceedings of the IEEE.
[49] Stark C. Draper,et al. Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[50] D. M. Hutton. Advances in Biometrics: Sensors, Algorithms and Systems , 2008 .
[51] A.K. Jain,et al. Scars, marks and tattoos (SMT): Soft biometric for suspect and victim identification , 2008, 2008 Biometrics Symposium.
[52] Anil K. Jain,et al. On matching latent fingerprints , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[53] Fabio Roli,et al. Dynamic Score Selection for Fusion of Multiple Biometric Matchers , 2007, 14th International Conference on Image Analysis and Processing (ICIAP 2007).
[54] Jongmoo Choi,et al. Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred Three-Dimensional Face Models , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[55] Anil K. Jain,et al. FM Model Based Fingerprint Reconstruction from Minutiae Template , 2009, ICB.
[56] Ping Yan,et al. Biometric Recognition Using 3D Ear Shape , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[57] George W. Quinn,et al. ELFT phase II :: an evaluation of automated latent fingerprint identification technologies , 2009 .
[58] Arun Ross,et al. Fusion in Multibiometric Identification Systems: What about the Missing Data? , 2009, ICB.
[59] Hui Chen,et al. Human Ear Recognition by Computer , 2008, Advances in Pattern Recognition.
[60] Patrick J. Flynn,et al. Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..
[61] Anil K. Jain,et al. Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.
[62] Anil K. Jain,et al. Automatic personal identification using fingerprints , 1998 .
[63] Hassen Drira,et al. Nasal Region Contribution in 3D Face Biometrics Using Shape Analysis Framework , 2009, ICB.
[64] Damon L. Woodard,et al. Finger surface as a biometric identifier , 2005, Comput. Vis. Image Underst..
[65] David Zhang,et al. A New Framework for Adaptive Multimodal Biometrics Management , 2010, IEEE Transactions on Information Forensics and Security.
[66] Ajay Kumar,et al. Personal Authentication Using Finger Knuckle Surface , 2009, IEEE Transactions on Information Forensics and Security.
[67] Anil K. Jain,et al. On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[68] S. Marginson,et al. The Immigration Department , 2022, Administrative Law in Action.
[69] Arun Ross,et al. Enhancement and Registration Schemes for Matching Conjunctival Vasculature , 2009, ICB.
[70] Kanya Tanaka,et al. Footprint-based personal recognition , 2000, IEEE Transactions on Biomedical Engineering.
[71] Ajay Kumar,et al. Human identification using KnuckleCodes , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[72] Anil K. Jain,et al. A Multispectral Whole-Hand Biometric Authentication System , 2007, 2007 Biometrics Symposium.
[73] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.