Finger vein secure biometric template generation based on deep learning
暂无分享,去创建一个
Jian Shen | Jie Ling | Yi Liu | Chongzhi Gao | Zhusong Liu | Jian Shen | Zhusong Liu | Jie Ling | Chong-zhi Gao | Yi Liu
[1] David Zhang,et al. Three measures for secure palmprint identification , 2008, Pattern Recognit..
[2] Jin Li,et al. Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.
[3] Loris Nanni,et al. Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..
[4] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[5] Yuhui Zheng,et al. Image segmentation by generalized hierarchical fuzzy C-means algorithm , 2015, J. Intell. Fuzzy Syst..
[6] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[7] Jie Yuan,et al. A twice face recognition algorithm , 2016, Soft Comput..
[8] Yilong Yin,et al. Finger vein recognition with manifold learning , 2010, J. Netw. Comput. Appl..
[9] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[10] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[11] Ling Shao,et al. A rapid learning algorithm for vehicle classification , 2015, Inf. Sci..
[12] Enrique Argones-Rúa,et al. Biometric Template Protection Using Universal Background Models: An Application to Online Signature , 2012, IEEE Transactions on Information Forensics and Security.
[13] Li Xueyan,et al. Vein Pattern Recognitions by Moment Invariants , 2007, 2007 1st International Conference on Bioinformatics and Biomedical Engineering.
[14] Loris Nanni,et al. Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004 , 2005, Neurocomputing.
[15] Terry L. Huston,et al. Is telemedicine a practical reality? , 2000, CACM.
[16] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[17] Qiang Tang,et al. Efficient verifiable fuzzy keyword search over encrypted data in cloud computing , 2013, Comput. Sci. Inf. Syst..
[18] Bin Gu,et al. Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[19] Arun Ross,et al. Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.
[20] Fei Wu,et al. Determining Image Base of Firmware Files for ARM Devices , 2016, IEICE Trans. Inf. Syst..
[21] Su Fei,et al. Cracking Cancelable Fingerprint Template of Ratha , 2008, ISCSCT.
[22] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[23] Geoffrey E. Hinton. A Practical Guide to Training Restricted Boltzmann Machines , 2012, Neural Networks: Tricks of the Trade.
[24] Bin Liang,et al. High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia , 2016, Soft Comput..
[25] Jie Yuan,et al. A hierarchical face recognition algorithm based on humanoid nonlinear least-squares computation , 2015, Journal of Ambient Intelligence and Humanized Computing.
[26] Wang Ke. Finger Vein Recognition Based on Wavelet Moment Fused with PCA Transform , 2007 .
[27] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[28] Emanuele Maiorana,et al. Biometric cryptosystem using function based on-line signature recognition , 2010, Expert Syst. Appl..
[29] Yuanzhang Li,et al. Determining image base of firmware for ARM devices by matching literal pools , 2016, Digit. Investig..
[30] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[31] Yu-an Tan,et al. An Effective RAID Data Layout for Object-Based De-duplication Backup System , 2016 .
[32] Andrew Beng Jin Teoh,et al. An efficient dynamic reliability-dependent bit allocation for biometric discretization , 2012, Pattern Recognit..