Establishing User Authentication using Face Geometry
暂无分享,去创建一个
Gautam Sanyal | Indradip Banerjee | Souvik Bhattacharyya | Dipankar Chatterjee | D. Chatterjee | Souvik Bhattacharyya | G. Sanyal | Dr. Indradip Banerjee
[1] Kazuhiko Ohnuma,et al. Novel biometrics based on nose pore recognition , 2009 .
[2] Anil K. Jain,et al. Face Matching and Retrieval Using Soft Biometrics , 2010, IEEE Transactions on Information Forensics and Security.
[3] D. O'Shaughnessy,et al. Speaker recognition , 1986, IEEE ASSP Magazine.
[4] Ravindra C. Thool,et al. SURVEY OF BIOMETRIC RECOGNITION SYSTEMS AND THEIR APPLICATIONS , 2010 .
[5] D. Levicky,et al. Using of Hand Geometry in Biometric Security Systems , 2007 .
[6] Panos M. Pardalos,et al. Handbook of Massive Data Sets , 2002, Massive Computing.
[7] Ajay Kumar,et al. Personal authentication using hand vein triangulation , 2008, SPIE Defense + Commercial Sensing.
[8] Hong Chang,et al. SVC2004: First International Signature Verification Competition , 2004, ICBA.
[9] Anil K. Jain,et al. Biometrics of Next Generation: An Overview , 2010 .
[10] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[11] M. R. Spiegel. E and M , 1981 .
[12] Sung Bum Pan,et al. A Survey and Proposed Framework on the Soft Biometrics Technique for Human Identification in Intelligent Video Surveillance System , 2012, Journal of biomedicine & biotechnology.
[13] Gerard Salton,et al. Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..
[14] Natalia A. Schmid,et al. Performance prediction methodology for biometric systems using a large deviations approach , 2004, IEEE Transactions on Signal Processing.
[15] Elena Deza,et al. Encyclopedia of Distances , 2014 .
[16] Phalguni Gupta,et al. A Skin-Color and Template Based Technique for Automatic Ear Detection , 2009, 2009 Seventh International Conference on Advances in Pattern Recognition.
[17] Miroslav Bača,et al. Basic Principles and Trends in Hand Geometry and Hand Shape Biometrics , 2012 .
[18] Subhra Mazumdar,et al. Biometric Security Using Finger Print Recognition , 2008 .
[19] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[20] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[21] Alfred C. Weaver,et al. Biometric authentication , 2006, Computer.
[22] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[23] Miguel A. Patricio,et al. Privacy and Legal Requirements for Developing Biometric Identification Software in Context-Based Applications 13 , 2010 .
[24] Roberto Brunelli,et al. Template Matching Techniques in Computer Vision: Theory and Practice , 2009 .
[25] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[26] J. Kruskal. Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis , 1964 .
[27] G. Leedham,et al. Infrared imaging of hand vein patterns for biometric purposes , 2007 .
[28] Melvyn L. Smith,et al. Using Photometric Stereo for Face Recognition , 2011 .
[29] Shan Juan Xie,et al. New Trends and Developments in Biometrics , 2012 .
[30] M.K. Khan,et al. An effective iris recognition system for identification of humans , 2004, 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004..
[31] Daniel Riccio,et al. Biometric Authentication , 2014, Lecture Notes in Computer Science.
[32] John Daugman,et al. Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.