Pattern recognition by embedded reduced number of angles fingerprint algorithm in biometric machines augments security
暂无分享,去创建一个
[1] Anil K. Jain,et al. Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[2] Thomas Engel,et al. Website fingerprinting in onion routing based anonymization networks , 2011, WPES.
[3] Andrew P. Witkin,et al. Analyzing Oriented Patterns , 1985, IJCAI.
[4] Anil K. Jain,et al. Combining multiple matchers for a high security fingerprint verification system , 1999, Pattern Recognit. Lett..
[5] Chin-Chen Chang,et al. An Improved Biometrics-based User Authentication Scheme without Concurrency System , 2010, International Journal of Intelligent Information Processing.
[6] M. S. Kumbhar,et al. An Identity-Authentication System Using Fingerprints , 2012 .
[7] Wei-Chi Ku,et al. Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards , 2005 .
[8] G. Geetha,et al. Implementing RNA-FINNT in Ideal Password Authentication Scheme results in Fortification of Transport Layer Security Protocol , 2012, IAIT 2012.
[9] Rosalind W. Picard,et al. Restoration and enhancement of fingerprint images using M-lattice-a novel nonlinear dynamical system , 1994, Proceedings of the 12th IAPR International Conference on Pattern Recognition, Vol. 3 - Conference C: Signal Processing (Cat. No.94CH3440-5).
[10] Bahram Sadeghi Bigham,et al. Fingerprint Matching Using an Onion Layer Algorithm of Computational Geometry Based on Level 3 Features , 2011, DICTAP.
[11] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .
[12] Marc Joye,et al. Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis , 2000, IEEE Trans. Computers.
[13] Anil K. Jain,et al. On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[14] Anil K. Jain,et al. A Multichannel Approach to Fingerprint Classification , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[15] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[16] Kee-Young Yoo,et al. ID-based password authentication scheme using smart cards and fingerprints , 2003, OPSR.
[17] Wilson S. Geisler,et al. Multichannel Texture Analysis Using Localized Spatial Filters , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[18] Miguel A. Patricio,et al. Privacy and Legal Requirements for Developing Biometric Identification Software in Context-Based Applications 13 , 2010 .
[19] Craig I. Watson,et al. PCASYS- A Pattern-Level Classification Automation System for Fingerprints | NIST , 1995 .
[20] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[21] Richard O. Duda,et al. Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.
[22] J. K. Lee,et al. Fingerprint-based remote user authentication scheme using smart cards , 2002 .
[23] Gang Qu,et al. Fingerprint - Iris Fusion Based Identification System Using a Single Hamming Distance Matcher , 2009, 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security.
[24] Chun-Ta Li,et al. An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..
[25] Qiang Tong,et al. Research of improved gabor based on fingerprint image enhanced algorithm in wavelet domain , 2012, 2012 International Conference on Computational Problem-Solving (ICCP).
[26] Younghwa An,et al. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards , 2012, Journal of biomedicine & biotechnology.
[27] Akio Tojo,et al. Fingerprint pattern classification , 1984, Pattern Recognit..
[28] Ramesh C. Jain,et al. Computerized Flow Field Analysis: Oriented Texture Fields , 1992, IEEE Trans. Pattern Anal. Mach. Intell..
[29] Bryanna Hahn Fox,et al. Federal Bureau of Investigation (FBI) , 2015 .
[30] Robert H. Sloan,et al. Examining Smart-Card Security under the Threat of Power Analysis Attacks , 2002, IEEE Trans. Computers.
[31] Sharath Pankanti,et al. Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..
[32] Tsuhan Chen,et al. Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[33] Ali Mohades,et al. Fingerprint Matching and Classification using an Onion Layer algorithm of Computational Geometry , 2007 .
[34] Kevin W. Bowyer,et al. Combination of Multiple Classifiers Using Local Accuracy Estimates , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[35] A. R. Rao,et al. A Taxonomy for Texture Description and Identification , 1990, Springer Series in Perception Engineering.
[36] Anil K. Jain,et al. Adaptive flow orientation-based feature extraction in fingerprint images , 1995, Pattern Recognit..
[37] G. Aguilar,et al. Multimodal biometric system using fingerprint , 2007, 2007 International Conference on Intelligent and Advanced Systems.
[38] Steven Gold,et al. A Graduated Assignment Algorithm for Graph Matching , 1996, IEEE Trans. Pattern Anal. Mach. Intell..
[39] Ashok Kumar Das,et al. Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards , 2011, IET Inf. Secur..
[40] Qiang Wang,et al. Structural fingerprint based hierarchical filtering in song identification , 2011, 2011 IEEE International Conference on Multimedia and Expo.
[41] John F. Canny,et al. A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[42] Michael Scott,et al. Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints , 2004, OPSR.
[43] Babu M. Mehtre,et al. Segmentation of fingerprint images using the directional image , 1987, Pattern Recognit..
[44] M. Omair Ahmad,et al. A multilevel structural technique for fingerprint representation and matching , 2013, Signal Process..
[45] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[46] Dario Maio,et al. Direct Gray-Scale Minutiae Detection In Fingerprints , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[47] M. Ramakrishnan,et al. A NEW APPROACH OF ALTERED FINGERPRINTS DETECTION ON THE ALTERED AND NORMAL FINGERPRINT DATABASE , 2013 .
[48] B. Sherlock,et al. Fingerprint enhancement by directional Fourier filtering , 1994 .
[49] Safwat G. Zaky,et al. Fingerprint identification using graph matching , 1986, Pattern Recognit..
[50] Muhammad Khurram Khan,et al. An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards , 2006, ISPEC.
[51] K. Kaur,et al. Fortification of Transport Layer Security Protocol , 2011 .
[52] Kuljeet Kaur,et al. Fortification of Transport Layer Security Protocol by using Password and Fingerprint as Identity Authentication Parameters , 2012 .
[53] Sharath Pankanti,et al. Fingerprint enhancement , 1996, Proceedings Third IEEE Workshop on Applications of Computer Vision. WACV'96.
[54] Quan-Sen Sun,et al. Fingerprint matching using local alignment based on multiple pairs of reference minutiae , 2009, J. Electronic Imaging.
[55] Anil K. Jain,et al. Unsupervised texture segmentation using Gabor filters , 1990, 1990 IEEE International Conference on Systems, Man, and Cybernetics Conference Proceedings.
[56] James A. McHugh,et al. Automated fingerprint recognition using structural matching , 1990, Pattern Recognit..
[57] John Berry,et al. History and Development of Fingerprinting , 2001 .
[58] Geetha Ganesan,et al. Diminution in Error Approximation by Identity Authentication with IPAS for FTLSP to Enhance Network Security , 2013 .
[59] Lawrence O'Gorman,et al. An approach to fingerprint filter design , 1989, Pattern Recognit..
[60] Johan Wiklund,et al. Multidimensional Orientation Estimation with Applications to Texture Analysis and Optical Flow , 1991, IEEE Trans. Pattern Anal. Mach. Intell..
[61] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[62] Craig I. Watson,et al. Neural Network Fingerprint Classification , 1994 .