Mathematical Model of the Biometric System of Fingerprint Authentication for Modern Web-Services
暂无分享,去创建一个
Tetiana Ivko | Tetiana Kuznetsova | Iryna Chepurko | Mykhaylo Bagmut | Sergey Rassomakhin | Kate Budianska | Mykhaylo Bagmut | T. Kuznetsova | T. Ivko | Iryna Chepurko | Sergey Rassomakhin | Kate Budianska
[1] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[2] Sergii Kavun,et al. Code-based cryptosystems from NIST PQC , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).
[3] Nishant Doshi,et al. A Novel Approach for Biometric Based Remote User Authentication Scheme using Smart Card , 2018, 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[4] Alexandr Kuznetsov,et al. Improved Method of Determining the Alternative Set of Numbers in Residue Number System , 2018 .
[5] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[6] Venu Govindaraju,et al. A chaincode based scheme for fingerprint feature extraction , 2006, Pattern Recognit. Lett..
[7] Zilong Chen,et al. Fingerprint Image Enhancement Method based on Adaptive Median Filter , 2018, 2018 24th Asia-Pacific Conference on Communications (APCC).
[8] Driss Aboutajdine,et al. Application of new alteration attack on biometric authentication systems , 2015, 2015 First International Conference on Anti-Cybercrime (ICACC).
[9] Zulfiqar Ali Memon,et al. Biometric authentication technique using smartphone sensor , 2016, 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST).
[10] Jacqueline Speir,et al. Frequency filtering to suppress background noise in fingerprint evidence: quantifying the fidelity of digitally enhanced fingerprint images. , 2014, Forensic science international.
[11] Shi-Qiong Xi,et al. Fast Algorithm of Fingerprint Singularity Region Enhancement , 2018, 2018 IEEE 3rd International Conference on Image, Vision and Computing (ICIVC).
[12] R. D. Hughes. Probability Theory and Mathematical Statistics for Engineers , 1985 .
[13] Archana S. Shinde,et al. An Embedded Fingerprint Authentication System , 2015, 2015 International Conference on Computing Communication Control and Automation.
[14] Liu Wei,et al. Fingerprint Based Identity Authentication for Online Examination System , 2010, 2010 Second International Workshop on Education Technology and Computer Science.
[15] Duncan J. McCarthy,et al. Expertise in Fingerprint Identification , 2013, Journal of forensic sciences.
[16] Aloysius George,et al. FBFET: Fuzzy based fingerprint enhancement technique based on adaptive thresholding , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[17] S. Patil Sandip,et al. Selective review of fingerprint enhancement, classification and matching techniques , 2015, 2015 IEEE Bombay Section Symposium (IBSS).
[18] Frans M. J. Willems,et al. Privacy-leakage codes for biometric authentication systems , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[19] A. Kuznetsov,et al. NIST PQC: CODE-BASED CRYPTOSYSTEMS , 2018, Telecommunications and Radio Engineering.
[20] Alexandru-Cosmin Grivei. Touch based biometric authentication for Android devices , 2015, 2015 7th International Conference on Electronics, Computers and Artificial Intelligence (ECAI).
[21] Christoph Busch,et al. A novel approach used for measuring fingerprint orientation of arch fingerprint , 2014, 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[22] Alexandr Kuznetsov,et al. Heuristic Methods of Hill Climbing of Cryptographic Boolean Functions , 2018, 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[24] Alexandr Kuznetsov,et al. New Code Based Fuzzy Extractor for Biometric Cryptography , 2018, 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[25] K. Prasanth,et al. Fingerprint based authentication system with keystroke dynamics for realistic user , 2014, Second International Conference on Current Trends In Engineering and Technology - ICCTET 2014.
[26] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[27] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[28] Pang Liaojun,et al. A Novel Biometric-Based Authentication Scheme with Privacy Protection , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[29] Alexandr Kuznetsov,et al. Experimental Studies Of The Modern Symmetric Stream Ciphers , 2018, 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T).
[30] K Madhavi,et al. Rectification of distortion in single rolled fingerprint , 2016, 2016 International Conference on Circuits, Controls, Communications and Computing (I4C).
[31] Michael D. Garris,et al. Characterization of Latent Print Lights-Out Modes for Automated Fingerprint Identification Systems (AFIS) | NIST , 2014 .
[32] Alexandr Kuznetsov,et al. Mathematical Model for the Probabilistic Minutia Distribution in Biometric Fingerprint Images , 2018, 2018 IEEE Second International Conference on Data Stream Mining & Processing (DSMP).
[33] Anil K. Jain,et al. Universal 3D Wearable Fingerprint Targets: Advancing Fingerprint Reader Evaluations , 2017, IEEE Transactions on Information Forensics and Security.
[34] Alexandr Kuznetsov,et al. Code-based electronic digital signature , 2018, 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT).