In What Way Is It Possible to Impersonate You Bypassing Fingerprint Sensors?
暂无分享,去创建一个
Christophe Rosenberger | Benoît Vibert | Jean-Marie Le Bars | Christophe Charrier | C. Rosenberger | C. Charrier | J. L. Bars | Benoît Vibert
[1] J. Fierrez-Aguilar,et al. Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[2] Sébastien Marcel,et al. BEAT – biometrics evaluation and testing , 2013 .
[3] Kai Huang,et al. Fingerprint Classification Based on Extraction and Analysis of Singularities and Pseudoridges , 2001, VIP.
[4] Davide Maltoni,et al. Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[5] Raffaele Cappelli,et al. SFinGe : an Approach to Synthetic Fingerprint Generation , 2004 .
[6] Kenneth Ko,et al. Users Guide to Export Controlled Distribution of NIST Biometric Image Software (NBIS-EC) , 2007 .
[7] Christophe Rosenberger,et al. EvaBio Platform for the Evaluation Biometric System , 2015, ICISS 2015.
[8] Christophe Rosenberger,et al. Security and performance evaluation platform of biometric match on card , 2013, 2013 World Congress on Computer and Information Technology (WCCIT).
[9] Christophe Rosenberger,et al. EvaBio a New Modular Platform to Evaluate Biometric System , 2015, ICISSP.
[10] Anil K. Jain,et al. A Multichannel Approach to Fingerprint Classification , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[11] Anil K. Jain,et al. FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.
[12] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[13] Craig I. Watson,et al. NIST IR 7477, Revision II, MINEX II Performance of Fingerprint Match-on-Card Algorithms - Phase IV Report , 2011 .
[14] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[15] Colin Soutar. Implementation of Biometric Systems - Security and Privacy Considerations , 2002, Inf. Secur. Tech. Rep..