-
1
-
-
70349849871
-
-
Adler A (2005) Vulnerabilities in biometric encryption systems. Audio- and Video-based Biometric Person Auth. Tarrytown, NY, USA
-
Adler A (2005) Vulnerabilities in biometric encryption systems. Audio- and Video-based Biometric Person Auth. Tarrytown, NY, USA.
-
-
-
-
2
-
-
70349874695
-
-
Adler A, Youmaran R, Loyka S (2005) Information content of biometric features. In: Biometrics consortium conference, Washington, DC, USA
-
Adler A, Youmaran R, Loyka S (2005) Information content of biometric features. In: Biometrics consortium conference, Washington, DC, USA.
-
-
-
-
3
-
-
0034730140
-
Singular value decomposition for genome-wide expression data processing and modeling
-
Alter O, Brown PO, Botstein D (2000) Singular value decomposition for genome-wide expression data processing and modeling. Proc Natl Acad Sci 97:10101-10106.
-
(2000)
Proc Natl Acad Sci
, vol.97
, pp. 10101-10106
-
-
Alter, O.1
Brown, P.O.2
Botstein, D.3
-
7
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
Daugman J (2003) The importance of being random: Statistical principles of iris recognition. Pattern Recognit 36:279-291.
-
(2003)
Pattern Recognit
, vol.36
, pp. 279-291
-
-
Daugman, J.1
-
8
-
-
70349880297
-
-
Doddington G, Liggett W, Martin A, Przybocki M, Reynolds D (1998) Sheep, goats, lambs and wolves: an analysis of individual differences in speaker recognition performance. In: Proceedings of international conference in auditory-visual speech processing. Sidney, Australia
-
Doddington G, Liggett W, Martin A, Przybocki M, Reynolds D (1998) Sheep, goats, lambs and wolves: an analysis of individual differences in speaker recognition performance. In: Proceedings of international conference in auditory-visual speech processing. Sidney, Australia.
-
-
-
-
9
-
-
70349873734
-
-
Dodis Y, Reyzin L, Smith A (2004) Fuzzy Extractors and cryptography, or how to use your fingerprints. In: Proceedings of Eurocrypt'04
-
Dodis Y, Reyzin L, Smith A (2004) Fuzzy Extractors and cryptography, or how to use your fingerprints. In: Proceedings of Eurocrypt'04, http://eprint.iacr.org/2003/235/.
-
-
-
-
12
-
-
70349850259
-
-
Grother P (2000) Software tools for an eigenface implementation, National Institute of Standards and Technology
-
Grother P (2000) Software tools for an eigenface implementation, National Institute of Standards and Technology. http://www.nist.gov/humanid/feret/.
-
-
-
-
13
-
-
70349873122
-
-
Li S, Jain A (eds) (2005) Handbook of face recognition. Springer, Heidelberg
-
Li S, Jain A (eds) (2005) Handbook of face recognition. Springer, Heidelberg.
-
-
-
-
14
-
-
70349852976
-
-
Lee TW (1999) Nonlinear approaches to independent component analysis. Proc American Institute of Physics
-
Lee TW (1999) Nonlinear approaches to independent component analysis. Proc American Institute of Physics.
-
-
-
-
15
-
-
4043125365
-
Fusion of appearance-based face recognition algorithms
-
Marcialis GL, Roli F (2004) Fusion of appearance-based face recognition algorithms. Pattern Anal Appl 7:151-163.
-
(2004)
Pattern Anal Appl
, vol.7
, pp. 151-163
-
-
Marcialis, G.L.1
Roli, F.2
-
18
-
-
70349886480
-
-
Phillips PJ, Grother P, Micheals RJ, Blackburn DM, Tabassi E, Bone JM (2003) FRVT 2002: Evaluation Report, NIST, March 2003
-
Phillips PJ, Grother P, Micheals RJ, Blackburn DM, Tabassi E, Bone JM (2003) FRVT 2002: Evaluation Report, NIST, March 2003. http://www.frvt.org/DLs/FRVT_2002_Evaluation_Report.pdf.
-
-
-
-
19
-
-
70349859573
-
-
Phillips PJ, Scruggs TW, O'Toole AJ, Flynn PJ, Bowyer KW, Svhott CL, Sharpe M (2007) FRVT 2006: Evaluation Report, NIST, March 2007
-
Phillips PJ, Scruggs TW, O'Toole AJ, Flynn PJ, Bowyer KW, Svhott CL, Sharpe M (2007) FRVT 2006: Evaluation Report, NIST, March 2007. http://www.frvt.org/FRVT2006/docs/FRVT2006andICE2006LargeScaleReport.pdf.
-
-
-
-
20
-
-
0038343934
-
Information fusion in biometrics
-
Ross A, Jain A (2003) Information fusion in biometrics. Pattern Recognit Lett 24:2115-2125.
-
(2003)
Pattern Recognit Lett
, vol.24
, pp. 2115-2125
-
-
Ross, A.1
Jain, A.2
-
21
-
-
0032224440
-
Biometric encryption using image processing
-
Soutar C, Roberge D, Stoianov A, Gilroy R, Vijaya B (1998) Biometric encryption using image processing. Proc SPIE Int Soc Opt Eng 3314:178-188.
-
(1998)
Proc SPIE Int Soc Opt Eng
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya, B.5
-
22
-
-
0034345987
-
Combined classifiers for invariant face recognition
-
Tolba AS, Abu-Rezq AN (2000) Combined classifiers for invariant face recognition. Pattern Anal Appl 3:289-302.
-
(2000)
Pattern Anal Appl
, vol.3
, pp. 289-302
-
-
Tolba, A.S.1
Abu-Rezq, A.N.2
-
25
-
-
70349876180
-
-
Wayman JS (2004) The cotton ball problem. In: Biometrics Conference. Washington, DC, USA
-
Wayman JS (2004) The cotton ball problem. In: Biometrics Conference. Washington, DC, USA.
-
-
-
-
26
-
-
11244321551
-
-
Xiang C, Fan XA, Lee TH (2004) Face recognition using recursive Fisher linear discriminant. In: Communications, Circuits and Systems international Conference on 27-29 2004
-
Xiang C, Fan XA, Lee TH (2004) Face recognition using recursive Fisher linear discriminant. In: Communications, Circuits and Systems international Conference on 27-29 2004.
-
-
-
-
27
-
-
0038472104
-
A generalised K-L expansion method which can deal with small sample size and high-dimensional problems
-
Yang J, Zhang D, Yang J-Y (2003) A generalised K-L expansion method which can deal with small sample size and high-dimensional problems. Pattern Analysis and Applications 6:47-54.
-
(2003)
Pattern Anal Appl
, vol.6
, pp. 47-54
-
-
Yang, J.1
Zhang, D.2
Yang, J.-Y.3
|