An empirical study on iris recognition in a mobile phone
暂无分享,去创建一个
Jaihie Kim | Kar-Ann Toh | Byungjun Son | Yujin Jung | Dongik Kim | K. Toh | Jaihie Kim | Byungjun Son | Dongik Kim | Yujin Jung
[1] N. L. Clarke,et al. Biometric Authentication for Mobile Devices , 2002 .
[2] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[3] John Daugman,et al. 10.7 – How Iris Recognition Works , 2005 .
[4] Hyun Lee,et al. Rapid eye detection method for non-glasses type 3D display on portable devices , 2010, IEEE Transactions on Consumer Electronics.
[5] Thuc Dinh Nguyen,et al. Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme , 2015, International Journal of Information Security.
[6] Kang Ryoung Park,et al. A new multi-unit iris authentication based on quality assessment and score level fusion for mobile phones , 2010, Machine Vision and Applications.
[7] Pei-Lee Teh,et al. Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system , 2014, Expert Syst. Appl..
[8] John Daugman. How iris recognition works , 2004 .
[9] Steven Furnell,et al. Authentication of users on mobile telephones - A survey of attitudes and practices , 2005, Comput. Secur..
[10] Rupert Young,et al. Iris Recognition on Low Computational Power Mobile Devices , 2011 .
[11] Juliane Krämer,et al. “My smartphone is a safe!” The user's point of view regarding novel authentication methods and gradual security levels on smartphones , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[12] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[13] Steven Furnell,et al. Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.
[14] Shuo Wang,et al. Biometrics on mobile phone , 2011 .
[15] S. R. Mahadeva Prasanna,et al. Multimodal Biometric Person Authentication : A Review , 2012 .
[16] Maria Papadaki,et al. Active authentication for mobile devices utilising behaviour profiling , 2014, International Journal of Information Security.
[17] Gonzalo Bailador,et al. Authentication in mobile devices through hand gesture recognition , 2012, International Journal of Information Security.
[18] John D. Fernandez,et al. Facial feature detection using Haar classifiers , 2006 .
[19] John Daugman,et al. New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[20] Kang Ryoung Park,et al. Multifeature-based fake iris detection method , 2007 .
[21] Jerry Gao,et al. Emerging Security Technologies for Mobile User Accesses , 2008 .
[22] Fengling Han,et al. Mobile Fingerprint for Identity Authentication in Mobile Commerce Applications , 2014, MoMM.
[23] John J. Howard,et al. Enhancing the Usability of Human Machine Interface on the Handheld Interagency Identification Detection Equipment (HIIDE) , 2011, 2011 21st International Conference on Systems Engineering.
[24] Konstantinos G. Derpanis,et al. Integral image-based representations , 2007 .
[25] Kang Ryoung Park,et al. Enhanced iris recognition method based on multi-unit iris images , 2013 .
[26] Orcan Alpar. Intelligent biometric pattern password authentication systems for touchscreens , 2015, Expert Syst. Appl..
[27] Arto Meriläinen. Adapting a Gaze Tracking System to Mobile Environments , 2012 .