Human Authentication with Earprint for Secure Telephone System
暂无分享,去创建一个
[1] Pillem Ramesh,et al. New Palm Print Authentication System by Using Wavelet Based Method , 2011 .
[2] A. E. Hassanien. Hiding iris data for authentication of digital images using wavelet theory , 2006, Pattern Recognition and Image Analysis.
[3] Ju Cheng Yang,et al. Fingerprint Verification Based on Invariant Moment Features and Nonlinear BPNN , 2008 .
[4] Laurene V. Fausett,et al. Fundamentals Of Neural Networks , 1993 .
[5] Phalguni Gupta,et al. A Simple Geometric Approach for Ear Recognition , 2006, 9th International Conference on Information Technology (ICIT'06).
[6] B. Moreno,et al. On the use of outer ear images for personal identification in security applications , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).
[7] Laheeb Ibrahim,et al. Encrypted Data Hiding & Retrieval of an Image using LSB Based on RBF Network , 2010 .
[8] Raid R. Al-nima,et al. Design a Biometric Identification System Based on the Fusion of Hand Geometry and Backhand Patterns , 2009 .
[9] B. Jayaram,et al. Retinal Biometrics based Authentication and Key Exchange System , 2011 .
[10] Hui Chen,et al. Human Ear Recognition by Computer , 2008, Advances in Pattern Recognition.
[11] Sudeep Sarkar,et al. Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[12] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[13] Fadwa S. Mustafa. Face Recognition Using Invariant Moments Features , 2009 .
[14] Mazin Khalil,et al. Personal Identification with Iris Patterns , 2009 .
[15] A. Basit,et al. Ear Recognition Using Wavelets , 2007 .
[16] Sudeep Sarkar,et al. An evaluation of face and ear biometrics , 2002, Object recognition supported by user interaction for service robots.