Evaluation of Biometric Systems
暂无分享,去创建一个
[1] D. Scheuermann,et al. On security evaluation of fingerprint recognition systems , 2010 .
[2] Despina Polemi,et al. Application of Multi-criteria Analysis for the Creation of a Risk Assessment Knowledgebase for Biometric Systems , 2004, ICBA.
[3] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[4] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[5] Julian Fiérrez,et al. A Comparative Study of Fingerprint Image-Quality Estimation Methods , 2007, IEEE Transactions on Information Forensics and Security.
[6] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[7] Touradj Ebrahimi,et al. A new analysis method for paired comparison and its application to 3D quality assessment , 2011, ACM Multimedia.
[8] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[9] Chulhan Lee,et al. Model-Based Quality Estimation of Fingerprint Images , 2006, ICB.
[10] Baptiste Hemery,et al. Computation EvaBio: A Tool for Performance Evaluation in Biometrics , 2011 .
[11] Stan Z. Li,et al. Face Image Quality Evaluation for ISO/IEC Standards 19794-5 and 29794-5 , 2009, ICB.
[12] Alexander P. Pons,et al. Understanding user perspectives on biometric technology , 2008, CACM.
[13] Mary F. Theofanos,et al. Usability Testing of Ten-Print Fingerprint Capture | NIST , 2007 .
[14] Natalia A. Schmid,et al. Image quality assessment for iris biometric , 2006, SPIE Defense + Commercial Sensing.
[15] Alfred C. Weaver,et al. Biometric authentication , 2006, Computer.
[16] Christophe Rosenberger,et al. Biohashing for securing fingerprint minutiae templates , 2010, ICPR 2010.
[17] Alberto Del Bimbo,et al. A Set of Selected SIFT Features for 3D Facial Expression Recognition , 2010, 2010 20th International Conference on Pattern Recognition.
[18] Mary F. Theofanos,et al. Usability Testing of Ten-Print Fingerprint Capture , 2007 .
[19] Hong Chang,et al. SVC2004: First International Signature Verification Competition , 2004, ICBA.
[20] Angela Sasse,et al. Humans in the Loop Human – Computer Interaction and Security , 2022 .
[21] Baptiste Hemery,et al. Evaluation of biometric systems: a study of users' acceptance and satisfaction , 2012, Int. J. Biom..
[22] LinLin Shen,et al. Quality Measures of Fingerprint Images , 2001, AVBPA.
[23] Václav Matyás,et al. Biometric authentication - security and usability , 2002, Communications and Multimedia Security.
[24] Josef Kittler,et al. A multimodal biometric test bed for quality-dependent, cost-sensitive and client-specific score-level fusion algorithms , 2010, Pattern Recognit..
[25] Josef Kittler,et al. Quality-Based Score Normalization With Device Qualitative Information for Multimodal Biometric Fusion , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[26] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[27] Baptiste Hemery,et al. A SVM-based model for the evaluation of biometric sample quality , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[28] B. Dorizzi,et al. A new probabilistic Iris Quality Measure for comprehensive noise detection , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[29] Doug Mahar,et al. Perceived acceptability of biometric security systems , 1995, Comput. Secur..
[30] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[31] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[32] Daniel Riccio,et al. Biometric Authentication , 2014, Lecture Notes in Computer Science.
[33] G LoweDavid,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004 .
[34] Bruce A. Draper,et al. Overview of the Multiple Biometrics Grand Challenge , 2009, ICB.
[35] Christophe Rosenberger,et al. Keystroke dynamics authentication for collaborative systems , 2009, 2009 International Symposium on Collaborative Technologies and Systems.
[36] Qian He,et al. A hierarchical model for the evaluation of biometric sample quality , 2008, 2008 19th International Conference on Pattern Recognition.
[37] Rohit Miri,et al. A Fuzzy Approach to Multimodal Biometric Authentication , 2012 .
[38] Christophe Rosenberger,et al. Analysis of template update strategies for keystroke dynamics , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[39] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[40] Mary F. Theofanos,et al. Usability Testing of Height and Angles of Ten-Print Fingerprint Capture , 2008 .
[41] Elham Tabassi,et al. Performance of Biometric Quality Measures , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[42] Anil K. Jain,et al. Fingerprint Quality Indices for Predicting Authentication Performance , 2005, AVBPA.
[43] Stephen J. Elliott,et al. The Perception of Biometric Technology: A Survey , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
[44] Christophe Rosenberger,et al. Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[45] Janette Moody. Public Perceptions of Biometric Devices: The Effect of Misinformation on Acceptance and Use , 2004 .
[46] Li Zi-qing. Standardization of Face Image Sample Quality , 2009 .
[47] Charles L. Wilson,et al. A novel approach to fingerprint image quality , 2005, IEEE International Conference on Image Processing 2005.
[48] Annie I. Antón,et al. Towards understanding user perceptions of authentication technologies , 2007, WPES '07.
[49] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[50] Anil K. Jain,et al. Localized Iris Image Quality Using 2-D Wavelets , 2006, ICB.
[51] James P. Egan,et al. Signal detection theory and ROC analysis , 1975 .
[52] Baptiste Hemery,et al. A study of users' acceptance and satisfaction of biometric systems , 2010, 44th Annual 2010 IEEE International Carnahan Conference on Security Technology.
[53] Antonella De Angeli,et al. Honest, it’s me! Self-service verification , 2003 .
[54] Christophe Rosenberger,et al. Biohashing for Securing Minutiae Template , 2010, 2010 20th International Conference on Pattern Recognition.
[55] Bernadette Dorizzi,et al. Guide to Biometric Reference Systems and Performance Evaluation , 2009 .
[56] Albert Ali Salah,et al. Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal Biometric Fusion Algorithms , 2009, IEEE Transactions on Information Forensics and Security.
[57] Christophe Rosenberger,et al. Evaluation of Cancelable Biometric Systems: Application to Finger-Knuckle-Prints , 2011, 2011 International Conference on Hand-Based Biometrics.
[58] Yunhong Wang,et al. Asymmetry-Based Quality Assessment of Face Images , 2009, ISVC.
[59] Ton van der Putte,et al. Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned , 2001, CARDIS.
[60] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[61] Baptiste Hemery,et al. Towards the Security Evaluation of Biometric Authentication Systems , 2011 .
[62] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.