Personal verification based on extraction and characterisation of retinal feature points
暂无分享,去创建一个
Manuel G. Penedo | Marcos Ortega | María J. Carreira | José Rouco | Noelia Barreira | M. J. Carreira | M. G. Penedo | M. Ortega | J. Rouco | N. Barreira
[1] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Anil K. Jain,et al. Performance evaluation of fingerprint verification systems , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Andrea F. Abate,et al. 2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..
[4] Manuel G. Penedo,et al. Personal authentication using digital retinal images , 2006, Pattern Analysis and Applications.
[5] H. G. Rylander,et al. Real-time algorithm for retinal tracking , 1993, IEEE Transactions on Biomedical Engineering.
[6] Jan Flusser,et al. Image registration methods: a survey , 2003, Image Vis. Comput..
[7] Pauli Kuosmanen,et al. Fingerprint Matching Using an Orientation-Based Minutia Descriptor , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Conor Heneghan,et al. Registration of digital retinal images using landmark correspondence by expectation maximization , 2004, Image Vis. Comput..
[9] Gérard Chollet,et al. Audio- and Video-based Biometric Person Authentication: First International Conference, AVBPA '97, Crans-Montana, Switzerland, March 12 - 14, 1997, Proceedings , 1997 .
[10] Bir Bhanu,et al. A robust two step approach for fingerprint identification , 2003, Pattern Recognit. Lett..
[11] Sharath Pankanti,et al. An identity-authentication system using fingerprints , 1997, Proc. IEEE.
[12] Joan Serrat,et al. Multilocal Creaseness Based on the Level-Set Extrinsic Curvature , 2000, Comput. Vis. Image Underst..
[13] Manuel G. Penedo,et al. Retinal Angiography Based Authentication , 2003, CIARP.
[14] Daniel P. Lopresti,et al. Forgery Quality and Its Implications for Behavioral Biometric Security , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[15] Joan Serrat,et al. Evaluation of Methods for Ridge and Valley Detection , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[16] Azriel Rosenfeld,et al. Face recognition: A literature survey , 2003, CSUR.
[17] Anil K. Jain,et al. Validating a Biometric Authentication System: Sample Size Requirements , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[18] Lisa M. Brown,et al. A survey of image registration techniques , 1992, CSUR.