Revealing the Secret of FaceHashing
暂无分享,去创建一个
[1] Andrew Beng Jin Teoh,et al. An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number , 2004, ICBA.
[2] David Chek Ling Ngo,et al. PalmHashing: A novel approach for dual-factor authentication , 2004, Pattern Analysis and Applications.
[3] Avinash C. Kak,et al. PCA versus LDA , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Bir Bhanu,et al. Fingerprint Indexing Based on Novel Features of Minutiae Triplets , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[5] Andrew Beng Jin Teoh,et al. Eigenspace-Based Face Hashing , 2004, ICBA.
[6] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[7] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for dual-factor authentication , 2004, Pattern Analysis and Applications.
[8] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[9] Ying Han Pang,et al. Palmprint based Cancelable Biometric Authentication System , 2007 .
[10] Andrew Beng Jin Teoh,et al. Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..
[11] David Zhang,et al. Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[12] David Zhang,et al. On-Line Palmprint Identification , 2005 .
[13] Andy Harter,et al. Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.
[14] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[15] Anil K. Jain,et al. On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[16] Rama Chellappa,et al. Human and machine recognition of faces: a survey , 1995, Proc. IEEE.
[17] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[18] Andrew Beng Jin Teoh,et al. Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..
[19] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .
[20] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..