Security and Liveness, Overview
暂无分享,去创建一个
[1] Gian Luca Marcialis,et al. Vitality Detection from Fingerprint Images: A Critical Survey , 2007, ICB.
[2] Dario Maio,et al. Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.
[3] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[4] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[5] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[6] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[7] Stephanie Schuckers,et al. Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..
[8] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[9] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[10] L. Biel,et al. ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).
[11] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[12] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[13] Bruce Schneier,et al. Practical cryptography , 2003 .