Online Signature-Based Biometric Recognition
暂无分享,去创建一个
Mohammad S. Obaidat | Neeraj Kumar | Sudeep Tanwar | Sudhanshu Tyagi | Neeraj Kumar | M. Obaidat | S. Tanwar | Sudhanshu Tyagi
[1] Nasir D. Memon,et al. How to protect biometric templates , 2007, Electronic Imaging.
[2] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[3] Ashish Mm,et al. Biometric Template Protection , 2017 .
[4] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[5] Loris Nanni,et al. Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004 , 2005, Neurocomputing.
[6] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[7] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[8] Daniel J. Wigdor,et al. Typing on flat glass: examining ten-finger expert typing patterns on touch surfaces , 2011, CHI.
[9] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[10] Réjean Plamondon,et al. Automatic signature verification and writer identification - the state of the art , 1989, Pattern Recognit..
[11] M. Faundez-Zanuy. Signature recognition state-of-the-art , 2005, IEEE Aerospace and Electronic Systems Magazine.
[12] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[13] Stefan Fischer,et al. Expert Conciliation for Multi Modal Person Authentication Systems by Bayesian Statistics , 1997, AVBPA.
[14] Michael Fairhurst,et al. Signature verification revisited: promoting practical exploitation of biometric technology , 1997 .
[15] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for dual-factor authentication , 2004, Pattern Analysis and Applications.
[16] Umapada Pal,et al. Signature-Based Biometric Authentication , 2014, Computational Intelligence in Digital Forensics.
[17] Mohammad S. Obaidat,et al. Security of e-Systems and Computer Networks , 2007 .
[18] Nalini K. Ratha,et al. Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.
[19] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[20] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[21] Kenta Takahashi,et al. Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[22] Mario Vento,et al. Signature Verification: Increasing Performance by a Multi-Stage System , 2000, Pattern Analysis & Applications.
[23] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[24] Julian Fiérrez,et al. HMM-based on-line signature verification: Feature extraction and signature modeling , 2007, Pattern Recognit. Lett..
[25] Jianying Hu,et al. Retail applications of signature verification , 2004, SPIE Defense + Commercial Sensing.
[26] Flávio Bortolozzi,et al. Off-line signature verification using HMM for random, simple and skilled forgeries , 2001, Proceedings of Sixth International Conference on Document Analysis and Recognition.
[27] Gady Agam,et al. Warping-Based Offline Signature Recognition , 2007, IEEE Transactions on Information Forensics and Security.
[28] Nasir D. Memon,et al. Biometric-rich gestures: a novel approach to authentication on multi-touch devices , 2012, CHI.
[29] Ana Belén Moreno,et al. Robust off-line signature verification using compression networks and positional cuttings , 2003, 2003 IEEE XIII Workshop on Neural Networks for Signal Processing (IEEE Cat. No.03TH8718).
[30] Mohammad S. Obaidat,et al. Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.
[31] Andrew Beng Jin Teoh,et al. Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..
[32] Jiri Matas,et al. On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[33] Kenta Takahashi,et al. Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.
[34] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[35] Tao Li,et al. Cancelable Voiceprint Templates Based on Knowledge Signatures , 2008, 2008 International Symposium on Electronic Commerce and Security.
[36] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[37] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[38] Asghar Fallah,et al. A new online signature verification system based on combining Mellin transform, MFCC and neural network , 2011, Digit. Signal Process..
[39] Andrew Beng Jin Teoh,et al. Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..
[40] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[41] Guangxi Zhu,et al. On-Line Handwriting Signature Recognition Based on Wavelet Energy Feature Matching , 2006, 2006 6th World Congress on Intelligent Control and Automation.
[42] L. Udawatta,et al. An Evolving Signature Recognition System , 2006, First International Conference on Industrial and Information Systems.
[43] Yuan Yan Tang,et al. Offline signature verification:A new rotation invariant approach , 2007, 2007 IEEE International Conference on Systems, Man and Cybernetics.
[44] Ben M. Herbst,et al. Offline Signature Verification Using the Discrete Radon Transform and a Hidden Markov Model , 2004, EURASIP J. Adv. Signal Process..