JOURNA Cryptographic Key Generation from Finger Vein
暂无分享,去创建一个
[1] Paulina Belle Nissenblatt. Fingers , 1997, The Lancet.
[2] J. Roerdink,et al. Mathematical Morphology and its Applications to Image and Signal Processing , 1998 .
[3] Naoto Miura,et al. Automatic Feature Extraction from non-uniform Finger Vein Image and its Application to Personal Identification , 2002, MVA.
[4] Naoto Miura,et al. Feature Extraction of Finger-vein Patterns Based on Repeated Line Tracking and Its Application to Personal Identification , 2022 .
[5] Tsuhan Chen,et al. Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[6] Stelvio Cimato,et al. Encyclopedia of Cryptography and Security , 2005 .
[7] J. Hashimoto,et al. Finger Vein Authentication Technology and Its Future , 2006, 2006 Symposium on VLSI Circuits, 2006. Digest of Technical Papers..
[8] Wai Lok Woo,et al. Crypto Key Generation using Contour Graph Algorithm , 2006, SPPRA.
[9] Wanqing Li,et al. Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[10] Umut Uludag,et al. Secure biometric systems , 2006 .
[11] Kathy Buckner,et al. Fingers, veins and the grey pound: accessibility of biometric technology , 2007, ECCE '07.
[12] C.R. Costanzo. Active Biometric Cryptography (ABC): Key Generation Using Feature and Parametric Aggregation , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[13] David Zhang,et al. An Iris Cryptosystem for Information Security , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[14] Bernadette Dorizzi,et al. Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, CVPR.
[15] Mark Stamp,et al. Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.
[16] Dr.K. Duraiswamy,et al. Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature , 2010 .
[17] Vladislav A. Kuznetsov,et al. Extraction of Binary Features from Fingerprint Topology , 2011, 2011 International Conference on Hand-Based Biometrics.
[18] Algimantas Venčkauskas,et al. Study of Finger Vein Authentication Algorithms for Physical Access Control , 2012 .
[19] Algimantas Venckauskas,et al. Generation of the Secret Encryption Key Using the Signature of the Embedded System , 2012, Inf. Technol. Control..