Direct Attacks Using Fake Images in Iris Verification
暂无分享,去创建一个
Julian Fiérrez | Javier Ortega-Garcia | Fernando Alonso-Fernandez | Javier Galbally | Pedro Tome | Virginia Ruiz-Albacete | Julian Fierrez | J. Ortega-Garcia | F. Alonso-Fernandez | Javier Galbally | Virginia Ruiz-Albacete | Pedro Tome
[1] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .
[2] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[3] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[4] Libor Masek,et al. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .
[5] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[6] Josef Kittler,et al. Audio- and Video-Based Biometric Person Authentication, 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005, Proceedings , 2005, AVBPA.
[7] Bruce Schneier,et al. Two-factor authentication: too little, too late , 2005, CACM.
[8] A. Pacut,et al. Aliveness Detection for IRIS Biometrics , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[9] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[10] Dexin Zhang,et al. DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Julian Fiérrez,et al. Biosec baseline corpus: A multimodal biometric database , 2007, Pattern Recognit..