Biometric Recognition : An Overview
暂无分享,去创建一个
[1] Jongmoo Choi,et al. Identifying Noncooperative Subjects at a Distance Using Face Images and Inferred Three-Dimensional Face Models , 2009, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[2] Anil K. Jain,et al. On matching latent fingerprints , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[3] Dario Maio,et al. Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.
[4] Henry T. F. b. Rhodes,et al. Alphonse Bertillon, Father of Scientific Detection , 2013 .
[5] Anil K. Jain,et al. A Multispectral Whole-Hand Biometric Authentication System , 2007, 2007 Biometrics Symposium.
[6] Fabio Roli,et al. Dynamic Score Selection for Fusion of Multiple Biometric Matchers , 2007, 14th International Conference on Image Analysis and Processing (ICIAP 2007).
[7] Anil K. Jain,et al. Latent Palmprint Matching , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] Tieniu Tan,et al. Ordinal palmprint represention for personal identification [represention read representation] , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[9] Andrea F. Abate,et al. 2D and 3D face recognition: A survey , 2007, Pattern Recognit. Lett..
[10] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[11] Leszek Wojnar,et al. An Automatic Recognition of the Frontal Sinus in X-Ray Images of Skull , 2009, IEEE Transactions on Biomedical Engineering.
[12] Luís A. Alexandre,et al. The UBIRIS.v2: A Database of Visible Wavelength Iris Images Captured On-the-Move and At-a-Distance , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[14] Yusuke Tamura,et al. Verification of Individual Identification Method Using Bioelectric Potential of Plant during Human Walking , 2007 .
[15] Lior Shamir,et al. Biometric identification using knee X-rays , 2009, Int. J. Biom..
[16] Damon L. Woodard,et al. Finger surface as a biometric identifier , 2005, Comput. Vis. Image Underst..
[17] J. Fierrez-Aguilar,et al. Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.
[18] Sharath Pankanti,et al. On the Individuality of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[19] Anil K. Jain,et al. On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[20] R. English. The United States Congress , 2003 .
[21] George W. Quinn,et al. ELFT phase II :: an evaluation of automated latent fingerprint identification technologies , 2009 .
[22] Andreas Uhl,et al. Footprint-based biometric verification , 2008, J. Electronic Imaging.
[23] Venu Govindaraju,et al. Efficient search and retrieval in biometric databases , 2005, SPIE Defense + Commercial Sensing.
[24] Arun Ross,et al. Fusion in Multibiometric Identification Systems: What about the Missing Data? , 2009, ICB.
[25] Arun Ross,et al. From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[26] David Zhang,et al. Online Palmprint Identification , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[27] Matti Pietikäinen,et al. Dynamic Texture Based Gait Recognition , 2009, ICB.
[28] Bhaskar D. Kulkarni,et al. Arterial Pulse Rate Variability analysis for diagnoses , 2008, 2008 19th International Conference on Pattern Recognition.
[29] Ajay Kumar,et al. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..
[30] Ajay Kumar,et al. Personal Authentication Using Hand Vein Triangulation and Knuckle Shape , 2009, IEEE Transactions on Image Processing.
[31] Ashim K. Datta. Advances in Fingerprint Technology , 2001 .
[32] A.K. Jain,et al. Scars, marks and tattoos (SMT): Soft biometric for suspect and victim identification , 2008, 2008 Biometrics Symposium.
[33] Jeremy Wickins,et al. The ethics of biometrics: the risk of social exclusion from the widespread use of electronic identification , 2007, Sci. Eng. Ethics.
[34] Arun Ross,et al. Enhancement and Registration Schemes for Matching Conjunctival Vasculature , 2009, ICB.
[35] Anil K. Jain,et al. Automatic personal identification using fingerprints , 1998 .
[36] Anil K. Jain,et al. Can soft biometric traits assist user recognition? , 2004, SPIE Defense + Commercial Sensing.
[37] Ajay Kumar,et al. Incorporating Cohort Information for Reliable Palmprint Authentication , 2008, 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing.
[38] Jeremy Pinel. Iris Recognition Immigration System (IRIS) , 2009, Encyclopedia of Biometrics.
[39] James R. Bergen,et al. Iris Recognition in Less Constrained Environments , 2008 .
[40] Hassen Drira,et al. Nasal Region Contribution in 3D Face Biometrics Using Shape Analysis Framework , 2009, ICB.
[41] Hui Chen,et al. Human Ear Recognition by Computer , 2008, Advances in Pattern Recognition.
[42] James R. Matey,et al. Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments , 2006, Proceedings of the IEEE.
[43] Ping Yan,et al. Biometric Recognition Using 3D Ear Shape , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[44] Anil K. Jain,et al. FM Model Based Fingerprint Reconstruction from Minutiae Template , 2009, ICB.
[45] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[46] John Daugman,et al. IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE , 2004 .
[47] Anil K. Jain,et al. Periocular biometrics in the visible spectrum: A feasibility study , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[48] Jeffrey G. Andrews,et al. Mode Switching for the Multi-Antenna Broadcast Channel Based on Delay and Channel Quantization , 2008, EURASIP J. Adv. Signal Process..
[49] David Zhang,et al. A New Framework for Adaptive Multimodal Biometrics Management , 2010, IEEE Transactions on Information Forensics and Security.
[50] Patrick J. Flynn,et al. Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..
[51] Tieniu Tan,et al. A study of multibiometric traits of identical twins , 2010, Defense + Commercial Sensing.
[52] Stark C. Draper,et al. Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[53] Josef Kittler,et al. Challenges and Research Directions for Adaptive Biometric Recognition Systems , 2009, ICB.
[54] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[55] Kanya Tanaka,et al. Footprint-based personal recognition , 2000, IEEE Transactions on Biomedical Engineering.
[56] S. Rahman,et al. A New Antispoofing Approach for Biometric Devices , 2008, IEEE Transactions on Biomedical Circuits and Systems.
[57] Jeffrey P. Cohn,et al. Keeping an Eye on School Security: The Iris Recognition Project in New Jersey Schools: (538032006-003) , 2006 .
[58] Craig I. Watson,et al. NIST IR 7477, Revision II, MINEX II Performance of Fingerprint Match-on-Card Algorithms - Phase IV Report , 2011 .
[59] Ajay Kumar,et al. Human identification using KnuckleCodes , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[60] J. Wayman,et al. ANALYSIS OF SECURITY VULNERABILITIES IN BIOMETRIC SYSTEMS , 2009 .
[61] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[62] Henry C. Lee,et al. Advances in Fingerprint Technology, Second Edition , 2001 .
[63] Anil K. Jain,et al. Soft Biometric Traits for Personal Recognition Systems , 2004, ICBA.
[64] Pong C. Yuen,et al. Protecting Face Biometric Data on Smartcard with Reed-Solomon Code , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[65] KumarAjay,et al. Personal authentication using finger knuckle surface , 2009 .
[66] Anil K. Jain,et al. Facial marks: Soft biometric for face recognition , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[67] W. Todd Scruggs,et al. eigenPulse: Robust human identification from cardiovascular function , 2008, Pattern Recognit..
[68] Xuelong Li,et al. General Tensor Discriminant Analysis and Gabor Features for Gait Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[69] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[70] Aparecido Nilceu Marana,et al. Frontal sinus recognition for human identification , 2008, SPIE Defense + Commercial Sensing.
[71] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[72] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[73] Richa Singh,et al. Online learning in biometrics: A case study in face classifier update , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[74] Kazuhiko Ohnuma,et al. Novel biometrics based on nose pore recognition , 2009 .
[75] SUMMARY OF NIST STANDARDS FOR BIOMETRIC ACCURACY, TAMPER RESISTANCE, AND INTEROPERABILITY , 2002 .
[76] A. Adler,et al. Images can be regenerated from quantized biometric match score data , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[77] Pramod K. Varshney,et al. An adaptive multimodal biometric management algorithm , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[78] H Eichenbaum,et al. Neural Correlates of Olfactory Recognition Memory in the Rat Orbitofrontal Cortex , 2000, The Journal of Neuroscience.