-
1
-
-
4544365541
-
Palmprint classification using principle lines
-
X. Wu, D. Zhang, K. Wang and B. Huang, "Palmprint classification using principle lines," Pattern Recognition, Vol. 37, No. 10, pp 1987-1998, 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.10
, pp. 1987-1998
-
-
Wu, X.1
Zhang, D.2
Wang, K.3
Huang, B.4
-
2
-
-
34547230779
-
-
Palmprint database from Biometric Research Center, Polytechnic University. Available
-
Palmprint database from Biometric Research Center, The Hong Kong Polytechnic University. Available:http://www4.comp.polyu.edu.hk/~biometrics/
-
The Hong Kong
-
-
-
3
-
-
50549093430
-
On watermarking/fingerprinting for copyright protection
-
Hans Georg Schaathun, "On watermarking/fingerprinting for copyright protection," Proc. of First International Conference on Innovative Computing, Information and Control (ICICIC '06), Vol. 3, pp. 50-53, 2006.
-
(2006)
Proc. of First International Conference on Innovative Computing, Information and Control (ICICIC '06)
, vol.3
, pp. 50-53
-
-
Georg Schaathun, H.1
-
4
-
-
0003437939
-
Verification Watermarks on Fingerprint Recognition and Retrieval
-
Yeung M. and Pankanti S., "Verification Watermarks on Fingerprint Recognition and Retrieval," Journal of Electronic Imaging, vol. 9, no. 4, pp.468-476, 2000.
-
(2000)
Journal of Electronic Imaging
, vol.9
, Issue.4
, pp. 468-476
-
-
Yeung, M.1
Pankanti, S.2
-
5
-
-
0032117545
-
Invisible watermarking for image verification
-
M.M. Yeung and F.C. Mintzer, "Invisible watermarking for image verification," Journal of Electronic Imaging, Vol. 7(03), pp. 578-591, 1998.
-
(1998)
Journal of Electronic Imaging
, vol.7
, Issue.3
, pp. 578-591
-
-
Yeung, M.M.1
Mintzer, F.C.2
-
8
-
-
35048831971
-
FVC2004: Third Fingerprint Verification Competition
-
Hong Kong
-
Maio, D. Maltoni, R. Cappelli, J. L. Wayman and A. K. Jain, "FVC2004: Third Fingerprint Verification Competition," Proc. International Conference on Biometric Authentication (ICBA), pp. 1-7, Hong Kong, 2004.
-
(2004)
Proc. International Conference on Biometric Authentication (ICBA)
, pp. 1-7
-
-
Maio1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
9
-
-
8844269323
-
Biometric System Security
-
Available
-
Soutar, "Biometric System Security," Secure No. 5, pp. 46-49, 2002. Available: http://www.silicontrust.com/pdf/secure_5/46_techno_4.pdf
-
(2002)
Secure
, Issue.5
, pp. 46-49
-
-
Soutar1
-
12
-
-
34548074162
-
Protecting Biometric Templates with Sketch: Theory and Practice
-
Y. Sutcu, Q. Li and N. Memon, "Protecting Biometric Templates with Sketch: Theory and Practice," IEEE Trans. on Information Forensics and Security, vol. 2, pp. 503-512, 2007.
-
(2007)
IEEE Trans. on Information Forensics and Security
, vol.2
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
13
-
-
34548022830
-
-
S.W. Sun, C.S. Lu, and P.C. Chang, Biometric Template Protection: a Key-Mixed Template Approach, Proc. IEEE Intl. Conf. Consumer Electronics 2007, pp. 1-2, Las Vegas, NV, 2007.
-
S.W. Sun, C.S. Lu, and P.C. Chang, "Biometric Template Protection: a Key-Mixed Template Approach," Proc. IEEE Intl. Conf. Consumer Electronics 2007, pp. 1-2, Las Vegas, NV, 2007.
-
-
-
-
14
-
-
57349135860
-
-
Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, and B.V.K. Vijaya Kumar Biometric Encryption™, Bioscrypt Inc. , ICSA Guide to Cryptography, edited by Randall K. Nichols, McGraw-Hill (1999), chapter 22.
-
Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, and B.V.K. Vijaya Kumar "Biometric Encryption™," Bioscrypt Inc. , ICSA Guide to Cryptography, edited by Randall K. Nichols, McGraw-Hill (1999), chapter 22.
-
-
-
-
16
-
-
33947177191
-
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
-
A.B.J. Teoh, A. Goh and D.C.L. Ngo, "Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs," IEEE Trans. on PAMI, Vol. 28, No. 12, pp. 1892-1901, 2006.
-
(2006)
IEEE Trans. on PAMI
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.B.J.1
Goh, A.2
Ngo, D.C.L.3
|