A secure cryptosystem from palm vein biometrics
暂无分享,去创建一个
[1] Eduard Sojka. A New and Efficient Algorithm for Detecting the Corners in Digital Images , 2002, DAGM-Symposium.
[2] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[3] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[4] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[5] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[6] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[7] Lingyu Wang,et al. Minutiae feature analysis for infrared hand vein pattern biometrics , 2008, Pattern Recognit..
[8] Ahmed M. Badawi,et al. Biometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns , 2008 .
[9] Santanu Chaudhury,et al. Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[10] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .
[11] Lingyu Wang,et al. A Thermal Hand Vein Pattern Verification System , 2005, ICAPR.
[12] Soo-Won Kim,et al. An biometric identification system by extracting hand vein patterns , 2001 .
[13] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).