Identification Using Encrypted Biometrics
暂无分享,去创建一个
Saman A. Zonouz | Mohamed Abdel-Mottaleb | Mohammad Haghighat | S. Zonouz | M. Abdel-Mottaleb | Mohammad Haghighat
[1] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[2] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[3] Ehsan Namjoo,et al. Evaluating the informativity of features in dimensionality reduction methods , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).
[4] LinLin Shen,et al. Gabor wavelets and General Discriminant Analysis for face identification and verification , 2007, Image Vis. Comput..
[5] Chengjun Liu,et al. Gabor feature based classification using the enhanced fisher linear discriminant model for face recognition , 2002, IEEE Trans. Image Process..
[6] G. Baudat,et al. Generalized Discriminant Analysis Using a Kernel Approach , 2000, Neural Computation.
[7] Hadi Seyedarabi,et al. Face recognition using Gabor-based direct linear discriminant analysis and support vector machine , 2013, Comput. Electr. Eng..
[8] Hyeonjoon Moon,et al. The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[9] Julien Bringer,et al. Error-Tolerant Searchable Encryption , 2009, 2009 IEEE International Conference on Communications.
[10] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[12] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.