Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems †
暂无分享,去创建一个
[1] Jun Li,et al. Combining singular points and orientation image information for fingerprint classification , 2008, Pattern Recognit..
[2] Anil K. Jain,et al. A Multichannel Approach to Fingerprint Classification , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[3] Raffaele Cappelli,et al. SFinGe : an Approach to Synthetic Fingerprint Generation , 2004 .
[4] Baptiste Hemery,et al. Computation EvaBio: A Tool for Performance Evaluation in Biometrics , 2011 .
[5] Christophe Rosenberger,et al. EvaBio platform for the evaluation biometric system: Application to the optimization of the enrollment process for fingerprints devices , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).
[6] Arun Ross,et al. 50 years of biometric research: Accomplishments, challenges, and opportunities , 2016, Pattern Recognit. Lett..
[7] Kenneth Ko,et al. User's Guide to NIST Biometric Image Software (NBIS) , 2007 .
[8] Massimo Tistarelli,et al. MCC: A baseline algorithm for fingerprint verification in FVC-onGoing , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.
[9] Yilong Yin,et al. A Fingerprint Matching Algorithm Based On Delaunay Triangulation Net , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).
[10] Christophe Rosenberger,et al. Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[11] Congying Han,et al. A novel fingerprint classification method based on deep learning , 2016, 2016 23rd International Conference on Pattern Recognition (ICPR).
[12] K JainAnil,et al. 50 years of biometric research , 2016 .
[13] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[14] Francisco Herrera,et al. A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation , 2019, IEEE Access.
[15] Christophe Rosenberger,et al. Fingerprint Class Recognition for Securing EMV Transaction , 2017, ICISSP.
[16] Benoît Vibert,et al. Contributions à l'évaluation de systèmes biométriques embarqués. (Contributions to the evaluation of embedded biometric systems) , 2017 .
[17] A. Ganson. Fingerprint Classification , 1970, Nature.
[18] Mineichi Kudo,et al. Comparison of algorithms that select features for pattern classifiers , 2000, Pattern Recognit..
[19] J. Fierrez-Aguilar,et al. Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[20] Chih-Jen Lin,et al. A comparison of methods for multiclass support vector machines , 2002, IEEE Trans. Neural Networks.
[21] Jasmine Banks,et al. Minutiae Triangle Graphs: A New Fingerprint Representation with Invariance Properties , 2019, 2019 International Conference on Image and Vision Computing New Zealand (IVCNZ).
[22] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[23] Arun Ross,et al. Toward reconstructing fingerprints from minutiae points , 2005, SPIE Defense + Commercial Sensing.
[24] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[25] Andy Adler,et al. Biometric System Security , 2008 .
[26] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[27] Yiguang Liu,et al. A 3D Surface Reconstruction Method Based on Delaunay Triangulation , 2019, ICIG.
[28] Christophe Charrier,et al. A Machine Learning Regression scheme to design a FR-Image Quality Assessment Algorithm , 2012, CGIV.
[29] Christophe Rosenberger,et al. In What Way Is It Possible to Impersonate You Bypassing Fingerprint Sensors? , 2016, 2016 International Conference of the Biometrics Special Interest Group (BIOSIG).
[30] Franz Aurenhammer,et al. Voronoi diagrams—a survey of a fundamental geometric data structure , 1991, CSUR.
[31] Anil K. Jain,et al. FVC2004: Third Fingerprint Verification Competition , 2004, ICBA.
[32] Edward Richard Henry,et al. Classification and uses of finger prints , 1928 .
[33] Jie Tian,et al. Fingerprint classification by a hierarchical classifier , 2013, Pattern Recognit..
[34] Loris Nanni,et al. Combining Multiple Matchers for Fingerprint Verification: A Case Study in FVC2004 , 2005, ICIAP.
[35] Robert L. Scot Drysdale,et al. A comparison of sequential Delaunay triangulation algorithms , 1995, SCG '95.
[36] Jean-Philippe Pons,et al. Efficient Multi-View Reconstruction of Large-Scale Scenes using Interest Points, Delaunay Triangulation and Graph Cuts , 2007, 2007 IEEE 11th International Conference on Computer Vision.
[37] Jonathan Richard Shewchuk,et al. Delaunay refinement algorithms for triangular mesh generation , 2002, Comput. Geom..
[38] Meenakshisundaram Gopi,et al. Surface Reconstruction based on Lower Dimensional Localized Delaunay Triangulation , 2000, Comput. Graph. Forum.
[39] Kai Huang,et al. Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges , 2001, VIP.