50 years of biometric research: Accomplishments, challenges, and opportunities
暂无分享,去创建一个
[1] Arun Ross,et al. What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.
[2] Anil K. Jain,et al. Longitudinal study of fingerprint recognition , 2015, Proceedings of the National Academy of Sciences.
[3] Anil K. Jain,et al. Recognizing infants and toddlers using fingerprints: Increasing the vaccination coverage , 2014, IEEE International Joint Conference on Biometrics.
[4] Arun Ross,et al. A Survey on Anti-Spoofing Schemes for Fingerprint Recognition Systems , 2014 .
[5] Ben D. Sawyer,et al. Google Glass , 2014, Hum. Factors.
[6] Stan Z. Li,et al. Handbook of Biometric Anti-Spoofing , 2014, Advances in Computer Vision and Pattern Recognition.
[7] Xiaogang Wang,et al. Deep Learning Face Representation from Predicting 10,000 Classes , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[8] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[9] Vincent M. Stanford,et al. Performance factor analysis for the 2012 NIST speaker recognition evaluation , 2014, INTERSPEECH.
[10] Vincent M. Stanford,et al. The 2021 NIST Speaker Recognition Evaluation , 2022, Odyssey.
[11] Takayuki Yamada,et al. Privacy Visor: Method for Preventing Face Image Detection by Using Differences in Human and Device Sensitivity , 2013, Communications and Multimedia Security.
[12] George W. Quinn,et al. IREX VI : Temporal Stability of Iris Recognition Accuracy , 2013 .
[13] Gabriel Gasque,et al. Small molecule drug screening in Drosophila identifies the 5HT2A receptor as a feeding modulation target , 2013, Scientific Reports.
[14] Paul Rayson,et al. Who Am I? Analyzing Digital Personas in Cybercrime Investigations , 2013, Computer.
[15] César A. Hidalgo,et al. Unique in the Crowd: The privacy bounds of human mobility , 2013, Scientific Reports.
[16] Ramesh Govindan,et al. P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.
[17] Arun Ross,et al. A survey on ear biometrics , 2013, CSUR.
[18] Anil K. Jain,et al. A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects , 2013 .
[19] Arun Ross,et al. Can facial cosmetics affect the matching accuracy of face recognition systems? , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[20] Anil K. Jain,et al. Face Recognition Performance: Role of Demographic Information , 2012, IEEE Transactions on Information Forensics and Security.
[21] Sébastien Marcel,et al. On the effectiveness of local binary patterns in face anti-spoofing , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[22] Junjie Yan,et al. A face antispoofing database with diverse attacks , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[23] George W. Quinn,et al. IREX III: Performance of Iris Identification Algorithms , 2012 .
[24] Vinay Bettadapura,et al. Face Expression Recognition and Analysis: The State of the Art , 2012, ArXiv.
[25] Anil K. Jain,et al. Altered Fingerprints: Analysis and Detection , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[26] Sander Oude Elberink,et al. Accuracy and Resolution of Kinect Depth Data for Indoor Mapping Applications , 2012, Sensors.
[27] Dileepan Joseph,et al. Toward a digital camera to rival the human eye , 2011, J. Electronic Imaging.
[28] Arun Ross,et al. Periocular Biometrics in the Visible Spectrum , 2011, IEEE Transactions on Information Forensics and Security.
[29] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[30] Sistema político,et al. Unique Identification Authority of India , 2011 .
[31] A. Zoubir,et al. EURASIP Journal on Advances in Signal Processing , 2011 .
[32] Yun Fu,et al. Age Synthesis and Estimation via Faces: A Survey , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[33] Yiying Tong,et al. Age-Invariant Face Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[34] Tomoyuki Suzuki,et al. Challenges of image-sensor development , 2010, 2010 IEEE International Solid-State Circuits Conference - (ISSCC).
[35] Nicolae Duta,et al. A survey of biometric technology based on hand shape , 2009, Pattern Recognit..
[36] Bruce A. Draper,et al. A meta-analysis of face recognition covariates , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[37] David Zhang,et al. A survey of palmprint recognition , 2009, Pattern Recognit..
[38] Patrick J. Flynn,et al. Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches , 2009, ICB.
[39] Bruce A. Draper,et al. Factors that influence algorithm performance in the Face Recognition Grand Challenge , 2009, Comput. Vis. Image Underst..
[40] Allen Y. Yang,et al. Robust Face Recognition via Sparse Representation , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[41] Anil K. Jain,et al. Handbook of Fingerprint Recognition, Second Edition , 2009 .
[42] Carlos D. Castillo,et al. Fake Finger Detection , 2009, Encyclopedia of Biometrics.
[43] George W. Quinn,et al. ELFT phase II :: an evaluation of automated latent fingerprint identification technologies , 2009 .
[44] Arun Ross,et al. An introduction to biometrics , 2008, ICPR 2008.
[45] Elke Greifender,et al. The History of Information Security: A Comprehensive Handbook , 2008 .
[46] Mark R. Hawthorne. Fingerprints: Analysis and Understanding , 2008 .
[47] Karim Faez,et al. Human Identification Based on Gait , 2008 .
[48] R. Chellappa,et al. Age progression in Human Faces : A Survey , 2008 .
[49] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[50] Yong Wang,et al. ISAR Imaging of Rotating Target with Equal Changing Acceleration Based on the Cubic Phase Function , 2008, EURASIP J. Adv. Signal Process..
[51] Shengcai Liao,et al. Illumination Invariant Face Recognition Using Near-Infrared Images , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[52] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[53] Christophe Champod,et al. Computation of Likelihood Ratios in Fingerprint Identification for Configurations of Any Number of Minutiæ , 2007, Journal of forensic sciences.
[54] Anil K. Jain,et al. Statistical Models for Assessing the Individuality of Fingerprints , 2005, IEEE Transactions on Information Forensics and Security.
[55] James L. Wayman. The scientific development of biometrics over the last 40 years , 2007 .
[56] John Daugman,et al. Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.
[57] Dario Maio,et al. Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.
[58] Karl Ricanek,et al. MORPH: a longitudinal image database of normal adult age-progression , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[59] Rudolf Hauke,et al. The Surround ImagerTM: A Multi-camera Touchless Device to Acquire 3D Rolled-Equivalent Fingerprints , 2006, ICB.
[60] Kang Ryoung Park,et al. Fake Iris Detection by Using Purkinje Image , 2006, ICB.
[61] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[62] Stephanie Schuckers,et al. Time-series detection of perspiration as a liveness test in fingerprint devices , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[63] Robert K. Rowe,et al. Multispectral fingerprint imaging for spoof detection , 2005, SPIE Defense + Commercial Sensing.
[64] David G. Lowe,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.
[65] Tieniu Tan,et al. Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.
[66] Arun Ross,et al. Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..
[67] William E. Burr,et al. Electronic Authentication Guideline | NIST , 2004 .
[68] Craig I. Watson,et al. Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report , 2004 .
[69] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[70] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[71] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[72] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[73] Thomas Vetter,et al. Face Recognition Based on Fitting a 3D Morphable Model , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[74] Lawrence O'Gorman,et al. Innovations in fingerprint capture devices , 2003, Pattern Recognit..
[75] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[76] L. Weathered. The innocence project , 2003 .
[77] Sharath Pankanti,et al. On the similarity of identical twin fingerprints , 2002, Pattern Recognit..
[78] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[79] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[80] A. Barrett,et al. Crime and Punishment in England: A Sourcebook , 2001 .
[81] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.
[82] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[83] David R. Ashbaugh,et al. Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology , 1999 .
[84] Sharath Pankanti,et al. A Prototype Hand Geometry-based Verication System , 1999 .
[85] G.E. Moore,et al. Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.
[86] Norbert Krüger,et al. Face recognition by elastic bunch graph matching , 1997, Proceedings of International Conference on Image Processing.
[87] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[88] Penio S. Penev,et al. Local feature analysis: A general statistical theory for object representation , 1996 .
[89] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[90] M. Bannier. [Aging of the face]. , 1993, Soins. Chirurgie.
[91] W. Babler. Embryologic development of epidermal ridges and their configurations. , 1991, Birth defects original article series.
[92] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[93] L Sirovich,et al. Low-dimensional procedure for the characterization of human faces. , 1987, Journal of the Optical Society of America. A, Optics and image science.
[94] 金出 武雄,et al. Picture processing system by computer complex and recognition of human faces , 1974 .
[95] MITCHELL TRAURING,et al. Automatic Comparison of Finger-Ridge Patterns , 1963, Nature.
[96] S. Pruzansky. Pattern‐Matching Procedure for Automatic Talker Recognition , 1963 .
[97] A. F. Adams,et al. The Survey , 2021, Dyslexia in Higher Education.
[98] Alphonse Bertillon,et al. Signaletic instructions including the theory and practice of anthropometrical identification , 2022 .