Secure Palmprint Verification Using Random Measure and Permutations
暂无分享,去创建一个
[1] David Zhang,et al. Three measures for secure palmprint identification , 2008, Pattern Recognit..
[2] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[3] Muhammad Khurram Khan,et al. Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion , 2011, STA.
[4] Hengjian Li,et al. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..
[5] Anil K. Jain,et al. Latent Palmprint Matching , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] David Zhang,et al. On-Line Palmprint Identification , 2005 .
[7] Bernadette Dorizzi,et al. Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[8] Xuanqin Mou,et al. Chaotic encryption scheme for real-time digital video , 2002, IS&T/SPIE Electronic Imaging.
[9] Muhammad Khurram Khan,et al. Challenge-response-based biometric image scrambling for secure personal identification , 2011, Future Gener. Comput. Syst..
[10] Salwani Abdullah,et al. Great Deluge Algorithm for Rough Set Attribute Reduction , 2010, FGIT-DTA/BSBT.
[11] Zhong Jin,et al. Normalized Direct Linear Discriminant Analysis with its Application to Face Recognition , 2010, J. Digit. Content Technol. its Appl..
[12] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[13] David Zhang,et al. A survey of palmprint recognition , 2009, Pattern Recognit..
[14] David Zhang,et al. Fisherpalms based palmprint recognition , 2003, Pattern Recognit. Lett..
[15] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[16] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[17] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[18] David Zhang,et al. Competitive coding scheme for palmprint verification , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[19] David Zhang,et al. Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[20] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[21] Cai Guoqiang,et al. A Method of Face Recognition under Movement Condition , 2011 .
[22] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[23] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[24] Yue Zeng,et al. The Face Recognition Method of the Two-direction Variation of 2DPCA , 2011 .
[25] Chao Wang,et al. Palmprint Recognition Based on 2-Dimension PCA , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[26] Rama Chellappa,et al. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.