Biometric Identification Criminal, Terrorist, and individual Identification System It's a New Wine & Taste
暂无分享,去创建一个
[1] Debnath Bhattacharyya,et al. Biometric Authentication: A Review , 2009 .
[2] C. Champod,et al. Multimodal biometrics for identity documents ( ) , 2007 .
[3] A. Dhillon,et al. Review on: Approaches for Finding Correlation Between Fingerprints and Footprints of a Person , 2014 .
[4] Aboul Ella Hassanien,et al. Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues , 2014, Bio-inspiring Cyber Security and Cloud Services.
[5] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[6] Ramakant Nevatia,et al. Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity , 2014, J. Inf. Process. Syst..
[7] E. Kirubakaran,et al. A Study on Cyber Crimes and protection , 2011 .
[8] O. A. Idowu. Development of Attendance Management System using Biometrics. , 2012 .
[9] Anil K. Jain,et al. Bridging the gap: from biometrics to forensics , 2015, Philosophical Transactions of the Royal Society B: Biological Sciences.
[10] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[11] Rong Wang,et al. Fingerprint Identification , 2008, Wiley Encyclopedia of Computer Science and Engineering.
[12] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[13] Helen C. Shen,et al. Personal Verification Using Palmprint and Hand Geometry Biometric , 2003, AVBPA.
[14] Chin Seng Chua,et al. Point Signatures: A New Representation for 3D Object Recognition , 1997, International Journal of Computer Vision.
[15] Azriel Rosenfeld,et al. Face recognition: A literature survey , 2003, CSUR.
[16] Vishal Shrivastav. Performance of Gabor Mean Feature Extraction Techniques for Ear Biometrics Recognition , 2015 .
[17] Anil K. Jain,et al. Biometrics of Next Generation: An Overview , 2010 .
[18] Anil K. Jain,et al. A Case Study on Unconstrained Facial Recognition Using the Boston Marathon Bombings Suspects , 2013 .
[19] Raymond N. J. Veldhuis,et al. Biometric Authentication System on Mobile Personal Devices , 2010, IEEE Transactions on Instrumentation and Measurement.