-
1
-
-
0026821209
-
A method for registration of 3-d shapes
-
February 5
-
P. Besl and N. McKay. A method for registration of 3-d shapes. IEEE Trans. PAMI, 14(2):239-256, February 1992. 5
-
(1992)
IEEE Trans. PAMI
, vol.14
, Issue.2
, pp. 239-256
-
-
Besl, P.1
McKay, N.2
-
2
-
-
33744911734
-
Automatic alignment of fingerprint features for fuzzy fingerprint vault
-
2
-
Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim, and D. Ahn. Automatic alignment of fingerprint features for fuzzy fingerprint vault. In Proc. CISC 2005, First SKLOIS Conference on Information Security and Cryptology, pages 358-369, 2005. 2
-
(2005)
Proc. CISC 2005, First SKLOIS Conference on Information Security and Cryptology
, pp. 358-369
-
-
Chung, Y.1
Moon, D.2
Lee, S.3
Jung, S.4
Kim, T.5
Ahn, D.6
-
3
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
2
-
T. C. Clancy, N. Kiyavash, and D. J. Lin. Secure smartcard-based fingerprint authentication. In Proc. ACM SIGMM Multimedia, Biometrics Methods and Applications Workshop, pages 45-52, 2003. 2
-
(2003)
Proc. ACM SIGMM Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
5
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
November 2
-
J. G. Daugman. High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(11): 1148-1161, November 1993. 2
-
(1993)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.G.1
-
7
-
-
8844234621
-
On the relation of error correction and cryptography to an offline biometric based identification scheme
-
2
-
G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta. On the relation of error correction and cryptography to an offline biometric based identification scheme. In Proc. Workshop on Coding and Cryptography (WCC), pages 129-138, 1999. 2
-
(1999)
Proc. Workshop on Coding and Cryptography (WCC)
, pp. 129-138
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
9
-
-
0036350106
-
A fuzzy vault scheme
-
A. Lapidoth and E. Teletar, editors, 1, 2, 3
-
A. Juels and M. Sudan. A fuzzy vault scheme. In A. Lapidoth and E. Teletar, editors, Proc. IEEE Int. Symp. Information Theory, page 408, 2002. 1, 2, 3
-
(2002)
Proc. IEEE Int. Symp. Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
10
-
-
0003476270
-
-
Pearson Prentice Hall, New Jersey, Second edition
-
S. Lin and D. J. Costello. Error Control Coding. Pearson Prentice Hall, New Jersey, Second edition, 2004.
-
(2004)
Error Control Coding
-
-
Lin, S.1
Costello, D.J.2
-
12
-
-
1342275940
-
-
Springer, New York, 1, 7
-
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar. Handbook of Fingerprint Recognition. Springer, New York, 2003. 1, 7
-
(2003)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
13
-
-
0034829626
-
Cryptographic key generation from voice
-
2
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel. Cryptographic key generation from voice. In Proc. IEEE Symp. Security and Privacy, pages 202-213, 2001. 2
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
15
-
-
0004161838
-
-
Cambridge University Press, Cambridge, Second edition, 3
-
W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery. Numerical Recipes in C. Cambridge University Press, Cambridge, Second edition, 1992. 3
-
(1992)
Numerical Recipes in C
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
-
17
-
-
0036229042
-
ICP registration using invariant features
-
January 5
-
G. Sharp, S. Lee, and D. Wehe. ICP registration using invariant features. IEEE Trans. PAMI, 24(1):90-102, January 2002. 5
-
(2002)
IEEE Trans. PAMI
, vol.24
, Issue.1
, pp. 90-102
-
-
Sharp, G.1
Lee, S.2
Wehe, D.3
-
18
-
-
8344236959
-
Biometric encryption
-
R. K. Nichols, editor, Mc-Graw Hill, 1
-
C. Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. K. V. Kumar. Biometric encryption. In R. K. Nichols, editor, ICSA Guide to Cryptography. Mc-Graw Hill, 1999. 1
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
19
-
-
26444525625
-
Fuzzy vault for fingerprints
-
2, 7
-
U. Uludag, S. Pankanti, and A. Jain. Fuzzy vault for fingerprints. In Proc. AVBPA 2005, 5. International Conference on Audio- and Video-Based Biometric Person Authentication, pages 310-319, 2005. 2, 7
-
(2005)
Proc. AVBPA 2005, 5. International Conference on Audio- and Video-Based Biometric Person Authentication
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.3
-
20
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
June 1
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE, 92(6):948-960, June 2004. 1
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
|