-
1
-
-
0036887662
-
Biometrics Perils and Patches
-
R.M. Bolle, J.H. Connel, and N.K. Ratha, “Biometrics Perils and Patches,” Pattern Recognition, vol. 35, no. 12, pp. 2727–2738, 2002.
-
(2002)
Pattern Recognition
, vol.35
, Issue.12
, pp. 2727-2738
-
-
Bolle, R.M.1
Connel, J.H.2
Ratha, N.K.3
-
2
-
-
1342275940
-
Handbook of Fingerprint Recognition
-
Springer
-
D. Maltoni, D. Maio, A.K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, pp. 301–307. Springer, 2003.
-
(2003)
, pp. 301-307
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
3
-
-
0031651014
-
On Enabling Secure Applications through Off-Line Biometrics Identification
-
G. Davida, Y. Frankel, and B.J. Matt, “On Enabling Secure Applications through Off-Line Biometrics Identification,” Proc. Symp. Privacy and Security, pp. 148–157, 1998.
-
(1998)
Proc. Symp. Privacy and Security
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.J.3
-
4
-
-
0027700869
-
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
-
Nov.
-
J. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148–1161, Nov. 1993.
-
(1993)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.1
-
7
-
-
84937704662
-
Secure Smartcard-Based Fingerprint Authentication
-
T.C. Clancy, N. Kiyavashand, and D.J. Lin, “Secure Smartcard-Based Fingerprint Authentication,” Proc. ACM SIGMM 2993 Multimedia, Biometrics Methods, and Applications Workshop, pp. 45-52,2003.
-
(2003)
Proc. ACM SIGMM 2993 Multimedia, Biometrics Methods, and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavashand, N.2
Lin, D.J.3
-
8
-
-
33744911734
-
Automatic Alignment of Fingerprint Features for Fuzzy Finger-print Vault
-
Y.W. Chung, D. Moon, S.J. Lee, S.H. Jung, T.H. Kim, and D.S. Ahn, “Automatic Alignment of Fingerprint Features for Fuzzy Finger-print Vault,” Proc. First SKLOIS Conf. Information Security and Cryptology (CISC 2005), pp. 358–369, 2005.
-
(2005)
Proc. First SKLOIS Conf. Information Security and Cryptology (CISC 2005)
, pp. 358-369
-
-
Chung, Y.W.1
Moon, D.2
Lee, S.J.3
Jung, S.H.4
Kim, T.H.5
Ahn, D.S.6
-
9
-
-
0033281372
-
Password Hardening Based on Keystroke Dynamics
-
F. Monrose, M.K. Reiter, and S. Wetzel, “Password Hardening Based on Keystroke Dynamics,” Proc. Sixth ACM Conf. Computer and Comm. Security, pp. 73–82, 1999.
-
(1999)
Proc. Sixth ACM Conf. Computer and Comm. Security
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
10
-
-
0034829626
-
Cryptographic Key Generation from Voice
-
F. Monrose, M.K. Reiter, Q. Li, and S. Wetzel, “Cryptographic Key Generation from Voice,” Proc. IEEE Symp. Security and Privacy, pp. 202–213, 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
11
-
-
8344236959
-
Biometrics Encryption
-
C. Soutar, D. Roberge, A.R. Stoianov, G. Gilroy, and V. Kumar, “Biometrics Encryption,” ICSA Guide to Cryptography, pp. 649–675, 1999.
-
(1999)
ICSA Guide to Cryptography
, pp. 649-675
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.R.3
Gilroy, G.4
Kumar, V.5
-
12
-
-
27244453175
-
Symmetric Hash Functions for Fingerprint Minutiae
-
S. Tulyakov, V.S. Chavan, and V. Govindaraju, “Symmetric Hash Functions for Fingerprint Minutiae,” Proc. Int'l Workshop Pattern Recognition for Crime Prevention, Security, and Surveillance, pp. 30–38, 2005.
-
(2005)
Proc. Int'l Workshop Pattern Recognition for Crime Prevention, Security, and Surveillance
, pp. 30-38
-
-
Tulyakov, S.1
Chavan, V.S.2
Govindaraju, V.3
-
13
-
-
26444448320
-
Cancelable Key-Based Fingerprint Templates
-
July
-
R. Ang, S.N. Rei, and L. McAven, “Cancelable Key-Based Fingerprint Templates,” Proc. 10th Australasian Conf. Information Security and Privacy (ACISP '05), pp. 242–252, July 2005.
-
(2005)
Proc. 10th Australasian Conf. Information Security and Privacy (ACISP '05)
, pp. 242-252
-
-
Ang, R.1
Rei, S.N.2
McAven, L.3
-
14
-
-
10044284550
-
Cancellable Biometrics Filters for Face Recognition
-
M. Savvides, B.V.K.V. Kumar, and P.K. Khosla, “Cancellable Biometrics Filters for Face Recognition,” Proc. Int'l Conf. Pattern Recognition, vol. 3, pp. 922–925, 2005.
-
(2005)
Proc. Int'l Conf. Pattern Recognition
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.V.K.V.2
Khosla, P.K.3
-
15
-
-
35248868841
-
Computation of Cryptographic Keys from Face Biometrics
-
A. Goh and C.L.D. Ngo, “Computation of Cryptographic Keys from Face Biometrics,” Lecture Notes in Computer Science, vol. 2828, pp. 1–13, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2828
, pp. 1-13
-
-
Goh, A.1
Ngo, C.L.D.2
-
16
-
-
19744373363
-
Cancellable Biometrics Featuring with Tokenised Random Number
-
B.J.A. Teoh and C.L.D. Ngo, “Cancellable Biometrics Featuring with Tokenised Random Number,” Pattern Recognition Letters, vol. 26, no. 10, pp. 1454–1460, 2005.
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.10
, pp. 1454-1460
-
-
Teoh, B.J.A.1
Ngo, C.L.D.2
-
17
-
-
8344273612
-
Personalised Cryptographic Key Generation Based on FaceHashing
-
B.J.A. Teoh, C.L.D. Ngo, and A. Goh, “Personalised Cryptographic Key Generation Based on FaceHashing,” Computers and Security J., vol. 23, no. 7, pp. 606–614, 2004.
-
(2004)
Computers and Security J.
, vol.23
, Issue.7
, pp. 606-614
-
-
Teoh, B.J.A.1
Ngo, C.L.D.2
Goh, A.3
-
18
-
-
0026065565
-
Eigenfaces for Recognition
-
M. Turk and A. Pentland, “Eigenfaces for Recognition,” J. Cognitive NeuroScience, vol. 3, no. 1, pp. 71–86, 1991.
-
(1991)
J. Cognitive NeuroScience
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.1
Pentland, A.2
-
19
-
-
0031185845
-
Eigenfaces versus Fisherfaces: Recognition Using Class Specific Linear Projection
-
July
-
P.N. Belhumeur, J.P. Hespanha, and D.J. Kriegman, “Eigenfaces versus Fisherfaces: Recognition Using Class Specific Linear Projection,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711–720, July 1997.
-
(1997)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.19
, Issue.7
, pp. 711-720
-
-
Belhumeur, P.N.1
Hespanha, J.P.2
Kriegman, D.J.3
-
20
-
-
33750947671
-
Cryptographic Keys from Dynamic Handsignatures with Biometric Secrecy Preservation and Replaceability
-
Oct.
-
W.K. Yip, A. Goh, B.J.A. Teoh, and C.L.D. Ngo, “Cryptographic Keys from Dynamic Handsignatures with Biometric Secrecy Preservation and Replaceability,” Proc. Fourth IEEE Workshop Automatic Identification Advanced Technologies (AutoID '05), pp. 27–32, Oct. 2005.
-
(2005)
Proc. Fourth IEEE Workshop Automatic Identification Advanced Technologies (AutoID '05)
, pp. 27-32
-
-
Yip, W.K.1
Goh, A.2
Teoh, B.J.A.3
Ngo, C.L.D.4
-
21
-
-
33947164757
-
Improved Error Bounds for Underdetermineded System Solvers
-
Technical Report CS-90-113, Computer Science Dept., Univ. of Tennessee, Knoxville, Aug.
-
J.W. Demmel and N.J. Higham, “Improved Error Bounds for Underdetermineded System Solvers,” Technical Report CS-90-113, Computer Science Dept., Univ. of Tennessee, Knoxville, Aug. 1990.
-
(1990)
-
-
Demmel, J.W.1
Higham, N.J.2
-
22
-
-
0011478306
-
Biometrics Decision Landscapes
-
Technical Report no. 482, Computer Laboratory, Cambridge Univ.
-
J. Daugman, “Biometrics Decision Landscapes,” Technical Report no. 482, Computer Laboratory, Cambridge Univ., 2002.
-
(2002)
-
-
Daugman, J.1
-
26
-
-
0024776757
-
Iterative Algorithms for Gram-Schmidt Orthogonalization
-
W. Hoffmann, “Iterative Algorithms for Gram-Schmidt Orthogonalization,” Computing, vol. 41, no. 4, pp. 335–348, 1989.
-
(1989)
Computing
, vol.41
, Issue.4
, pp. 335-348
-
-
Hoffmann, W.1
-
27
-
-
0031625017
-
Dimensionality Reduction by Random Mapping
-
S. Kaski, “Dimensionality Reduction by Random Mapping,” Proc. Int'l Joint Conf. Neural Networks, vol. 1, pp. 413–418, 1998.
-
(1998)
Proc. Int'l Joint Conf. Neural Networks
, vol.1
, pp. 413-418
-
-
Kaski, S.1
-
28
-
-
0242501774
-
The Moments of the z and F Distributions
-
F.N. David, “The Moments of the z and F Distributions,” Biometrika, vol. 36, pp. 394–403, 1949.
-
(1949)
Biometrika
, vol.36
, pp. 394-403
-
-
David, F.N.1
-
29
-
-
0036487317
-
The Importance of Being Random: Statistical Principles of Iris Recognition
-
J. Daugman, “The Importance of Being Random: Statistical Principles of Iris Recognition,” Pattern Recognition, vol. 36, no. 2, pp. 279–291, 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
-
30
-
-
0000744902
-
Binomial and Negative Binomial Analogues under Correlated Bernoulli Trials
-
R. Viveros, K. Balasubramanian, and N. Balakrishnan, “Binomial and Negative Binomial Analogues under Correlated Bernoulli Trials,” Am. Statististics, vol. 48, no. 3, pp. 243–247, 1984.
-
(1984)
Am. Statististics
, vol.48
, Issue.3
, pp. 243-247
-
-
Viveros, R.1
Balasubramanian, K.2
Balakrishnan, N.3
-
31
-
-
0030689145
-
The FERET Database and Evaluation Methodology for Face Recognition Algorithms
-
P. Phillips, H. Moon, P. Rauss, and S. Rizvi, “The FERET Database and Evaluation Methodology for Face Recognition Algorithms,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 137–143, 1997.
-
(1997)
Proc. IEEE Conf. Computer Vision and Pattern Recognition
, pp. 137-143
-
-
Phillips, P.1
Moon, H.2
Rauss, P.3
Rizvi, S.4
-
32
-
-
33947124209
-
Front-View Facial Feature Extraction Using Dynamic Symmetry
-
technical report, Multimedia Univ.
-
C.L.D. Ngo, A. Goh, and B.J.A. Teoh, “Front-View Facial Feature Extraction Using Dynamic Symmetry,” technical report, Multimedia Univ., 2004.
-
(2004)
-
-
Ngo, C.L.D.1
Goh, A.2
Teoh, B.J.A.3
|