Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
暂无分享,去创建一个
[1] John Daugman,et al. Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.
[2] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[3] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[4] Douglas A. Reynolds,et al. SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .
[5] Naoto Miura,et al. Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles , 2007, MVA.
[6] John Daugman. How iris recognition works , 2004 .
[7] Naoto Miura,et al. Feature extraction of finger vein patterns based on iterative line tracking and its application to personal identification , 2004 .
[8] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.