-
5
-
-
54049150418
-
Biometric systems and data protection legislation in germany
-
Harbin, China, IEEE Computer Society
-
M. Meints, H. Biermann, M. Bromba, C. Busch, G. Hornung, and G. Quiring-Kock. Biometric systems and data protection legislation in germany. In IIH-MSP '08: Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pages 1088-1093, Harbin, China, 2008. IEEE Computer Society.
-
(2008)
IIH-MSP '08: Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 1088-1093
-
-
Meints, M.1
Biermann, H.2
Bromba, M.3
Busch, C.4
Hornung, G.5
Quiring-Kock, G.6
-
6
-
-
10044227498
-
Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification
-
N. Miura, A. Nagasaka, and T. Miyatake. Feature extraction of finger-vein patterns based on repeated line tracking and its application to personal identification. Mach. Vision Appl., 15(4):194-203, 2004.
-
(2004)
Mach. Vision Appl
, vol.15
, Issue.4
, pp. 194-203
-
-
Miura, N.1
Nagasaka, A.2
Miyatake, T.3
-
7
-
-
62549113317
-
Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles
-
N. MIURA, A. NAGASAKA, and T. MIYATAKE. Extraction of Finger-Vein Patterns Using Maximum Curvature Points in Image Profiles. IEICE Trans Inf Syst, E90-D(8):1185-1194, 2007.
-
(2007)
IEICE Trans Inf Syst
, vol.E90-D
, Issue.8
, pp. 1185-1194
-
-
MIURA, N.1
NAGASAKA, A.2
MIYATAKE, T.3
-
8
-
-
84868067582
-
-
Nanyang Technological University, mar 2009
-
Nanyang Technological University. http://www.ntu.edu.sg, mar 2009.
-
-
-
-
9
-
-
0034809453
-
Enhancing security and privacy of biometric-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy of biometric-based authentication systems. IBM Systems Journal, 40, 2001.
-
(2001)
IBM Systems Journal
, vol.40
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
10
-
-
26444507172
-
Practical biometric authentication with template protection
-
Audio- and Video-Based Biometric Person Authentication, of, Springer Belin, Heidelberg, June
-
P. Tuyls, A. M. Akkermans, T. Kevenaar, G.J.Schrijen, A.M.Bazen, and R.N.J.Veldhuis. Practical biometric authentication with template protection. In Audio- and Video-Based Biometric Person Authentication, volume 3546 of Lecture Notes in Computer Science, pages 436-446. Springer Belin / Heidelberg, June 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.M.2
Kevenaar, T.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
11
-
-
37249045521
-
Infrared imaging of hand vein patterns for biometric purposes
-
December
-
L. Wang, G. Leedham, and D. Cho. Infrared imaging of hand vein patterns for biometric purposes. Computer Vision IET, 1(3-4):113-122, December 2007.
-
(2007)
Computer Vision IET
, vol.1
, Issue.3-4
, pp. 113-122
-
-
Wang, L.1
Leedham, G.2
Cho, D.3
-
14
-
-
34147183214
-
Multiscale feature extraction of finger-vein patterns based on curvelets and local interconnection structure neural network
-
Washington, DC, USA, IEEE Computer Society
-
Z. Zhang, S. Ma, and X. Han. Multiscale feature extraction of finger-vein patterns based on curvelets and local interconnection structure neural network. In ICPR '06: Proceedings of the 18th International Conference on Pattern Recognition, pages 145-148, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ICPR '06: Proceedings of the 18th International Conference on Pattern Recognition
, pp. 145-148
-
-
Zhang, Z.1
Ma, S.2
Han, X.3
-
15
-
-
84873884975
-
-
X. Zhou, T. Kevenaar, E. Kelkboom, C. Busch, M. van der Veen, and A. Nouak. Privacy enhancing technology for a 3d-face recognition system. In BIOSIG 2007: Biometrics and Electronic Signatures, P-108 of Lecture Notes in Informatics, pages 3-14. GI-Edition, July 2007.
-
X. Zhou, T. Kevenaar, E. Kelkboom, C. Busch, M. van der Veen, and A. Nouak. Privacy enhancing technology for a 3d-face recognition system. In BIOSIG 2007: Biometrics and Electronic Signatures, volume P-108 of Lecture Notes in Informatics, pages 3-14. GI-Edition, July 2007.
-
-
-
|