-
2
-
-
2942592700
-
Handwriting: Feature correlation analysis for biometric hashes
-
claus.vielhauer@iti.cs.uni-magdeburg.de ralf.steinmetz@kom.tu-darmstadt. de. special issue on Biometric Signal Processing
-
C. Vielhauer claus.vielhauer@iti.cs.uni-magdeburg.de R. Steinmetz ralf.steinmetz@kom.tu-darmstadt.de Handwriting: feature correlation analysis for biometric hashes. EURASIP Journal on Applied Signal Processing 2004 4 2004 542 558 special issue on Biometric Signal Processing
-
(2004)
EURASIP Journal on Applied Signal Processing
, vol.2004
, Issue.4
, pp. 542-558
-
-
Vielhauer, C.1
Steinmetz, R.2
-
3
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
H. Feng C. W. Chan Private key generation from on-line handwritten signatures. Information Management & Computer Security 10 4 159 164 2002
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.4
, pp. 159-164
-
-
Feng, H.1
Chan, C.W.2
-
5
-
-
0032224440
-
Biometric encryption using image processing
-
San Jose, Calif, USAProceedings of SPIE 3314
-
C. Soutar D. Roberge A. Stoianov R. Gilroy B. V. Kumar Biometric encryption using image processing. Optical Security and Counterfeit Deterrence Techniques II San Jose, Calif, USA Proceedings of SPIE 3314 3314 1998 178 188
-
(1998)
Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
10
-
-
33744964385
-
Generation of replaceable cryptographic keys from dynamic handwritten signatures
-
david.ngo@mmu.edu.my alwyn@corentix.com yip.wai.kuan04@mmu.edu.my bjteoh@mmu.edu.my Hong KongLecture Notes in Computer Science
-
W.-K. Yip yip.wai.kuan04@mmu.edu.my A. Goh alwyn@corentix.com D.-C. L. Ngo david.ngo@mmu.edu.my A.-B. J. Teoh bjteoh@mmu.edu.my Generation of replaceable cryptographic keys from dynamic handwritten signatures. Proceedings of International Conference on Advances in Biometrics (ICB '06) Hong Kong Lecture Notes in Computer Science 3832 2006 509 515
-
(2006)
Proceedings of International Conference on Advances in Biometrics (ICB '06)
, vol.3832
, pp. 509-515
-
-
Yip, W.-K.1
Goh, A.2
Ngo, D.-C.L.3
Teoh, A.-B.J.4
-
11
-
-
33750947671
-
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
-
david.ngo@mmu.edu.my alwyn@corentix.com yip.wai.kuan04@mmu.edu.my bjteoh@mmu.edu.my Buffalo, NY, USA
-
W.-K. Yip yip.wai.kuan04@mmu.edu.my A. Goh alwyn@corentix.com D.-C. L. Ngo david.ngo@mmu.edu.my A.-B. J. Teoh bjteoh@mmu.edu.my Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability. Proceedings of the 4th IEEE on Automatic Identification Advanced Technologies (AutoID '05) Buffalo, NY, USA 2005 27 32
-
(2005)
Proceedings of the 4th IEEE on Automatic Identification Advanced Technologies (AutoID '05)
, pp. 27-32
-
-
Yip, W.-K.1
Goh, A.2
Ngo, D.-C.L.3
Teoh, A.-B.J.4
-
12
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
hillol@cs.umbc.edu kunliul@cs.umbc.edu jryan4@cs.umbc.edu
-
K. Liu kunliul@cs.umbc.edu H. Kargupta hillol@cs.umbc.edu J. Ryan jryan4@cs.umbc.edu Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Transactions on Knowledge and Data Engineering 18 1 2006 92 106
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
14
-
-
0142088895
-
Online signature verification using a new extreme points warping technique
-
haofeng@pmailntu.edu.sg ecwchan@ntu.edu.sg
-
H. Feng haofeng@pmailntu.edu.sg C. W. Chan ecwchan@ntu.edu.sg Online signature verification using a new extreme points warping technique. Pattern Recognition Letters 24 16 2003 2943 2951
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.16
, pp. 2943-2951
-
-
Feng, H.1
Chan, C.W.2
-
16
-
-
0013451410
-
A model for signature verification
-
Charlottesville, VA, USA
-
T. Hastie E. Kishon M. Clark J. Fan A model for signature verification. Proceedings of IEEE International Conference on Systems, Man, and Cybernetics 1 Charlottesville, VA, USA 1991 191 196
-
(1991)
Proceedings of IEEE International Conference on Systems, Man, and Cybernetics
, vol.1
, pp. 191-196
-
-
Hastie, T.1
Kishon, E.2
Clark, M.3
Fan, J.4
-
21
-
-
0024858506
-
Signature recognition through spectral analysis
-
C. F. Lam D. Kamins Signature recognition through spectral analysis. Pattern Recognition 22 1 1989 39 44
-
(1989)
Pattern Recognition
, vol.22
, Issue.1
, pp. 39-44
-
-
Lam, C.F.1
Kamins, D.2
-
25
-
-
84890522850
-
Communication Theory of Secrecy Systems
-
C. E. Shannon Communication Theory of Secrecy Systems. Bell Systems Technical Journal 28 1949 656 715
-
(1949)
Bell Systems Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
|