-
1
-
-
0037276932
-
Face recognition using kernel direct discriminant analysis algorithms
-
Jan.
-
J. Lu, K. N. Plataniotis, and A. N. Venetsanopoulos, "Face recognition using kernel direct discriminant analysis algorithms," IEEE Trans. Neural Netw., vol.14, no.1, pp. 117-126, Jan. 2003.
-
(2003)
IEEE Trans. Neural Netw.
, vol.14
, Issue.1
, pp. 117-126
-
-
Lu, J.1
Plataniotis, K.N.2
Venetsanopoulos, A.N.3
-
2
-
-
38749143022
-
MPCA: Multilinear principal component analysis of tensor objects
-
Jan.
-
H. Lu, K. N. Plataniotis, and A. N. Venetsanopoulos, "MPCA: Multilinear principal component analysis of tensor objects," IEEE Trans. Neural Netw., vol.19, no.1, pp. 18-39, Jan. 2008.
-
(2008)
IEEE Trans. Neural Netw.
, vol.19
, Issue.1
, pp. 18-39
-
-
Lu, H.1
Plataniotis, K.N.2
Venetsanopoulos, A.N.3
-
3
-
-
67650674467
-
Biometric identification promises fast and secure processing of airline passengers
-
R. Hietmeyer, "Biometric identification promises fast and secure processing of airline passengers," Int. Civil Aviation Org. J., vol.55, no.9, pp. 10-11, 2000.
-
(2000)
Int. Civil Aviation Org. J.
, vol.55
, Issue.9
, pp. 10-11
-
-
Hietmeyer, R.1
-
4
-
-
33947503752
-
Biometric encryption
-
Today, Mar.
-
A. Cavoukian and A. Stoianov, "Biometric encryption," Biometric Technol. Today, vol.15, no.3, p. 11, Mar. 2007.
-
(2007)
Biometric Technol
, vol.15
, Issue.3
, pp. 11
-
-
Cavoukian, A.1
Stoianov, A.2
-
5
-
-
38149030200
-
Biometric encryption: A positive sum technology that achieves strong authentication, security and privacy
-
Office of the Information and Privacy Commissioner of Ontario Mar.
-
A. Cavoukian and A. Stoianov, "Biometric encryption: A positive sum technology that achieves strong authentication, security and privacy," White Paper, Office of the Information and Privacy Commissioner of Ontario Mar. 2007.
-
(2007)
White Paper
-
-
Cavoukian, A.1
Stoianov, A.2
-
6
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Jun.
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol.92, no.6, pp. 948-960, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
8
-
-
8344236959
-
Biometric encryption
-
Mar.
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, "Biometric encryption," ICSA Guide to Cryptog., pp. 649-6750, Mar. 1999.
-
(1999)
ICSA Guide to Cryptog.
, pp. 649-6750
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
10
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication," in Proc. ACM Workshop on Biometrics: Methods and Applications, 2003, pp. 42-52.
-
(2003)
Proc. ACM Workshop on Biometrics: Methods and Applications
, pp. 42-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
11
-
-
50249133245
-
Fuzzy vault for face based cryptographic key generation
-
Sep.
-
Y. Wang and K. N. Plataniotis, "Fuzzy vault for face based cryptographic key generation," in Proc. Biometrics Symp., Sep. 2007, pp. 1-6.
-
(2007)
Proc. Biometrics Symp.
, pp. 1-6
-
-
Wang, Y.1
Plataniotis, K.N.2
-
12
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
May
-
G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Security and Privacy, May 1998, pp. 148-157.
-
(1998)
Proc. IEEE Symp. Security and Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
13
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
Oct.
-
T. A. M. Kevenaar, G. J. Schrijen, M. v. d. Veen, A. H. M. Akkermans, and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in Proc. IEEEWorkshop on Automatic Identification Advanced Technologies, Oct. 2005, pp. 21-26.
-
(2005)
Proc. IEEEWorkshop on Automatic Identification Advanced Technologies
, pp. 21-26
-
-
Kevenaar, T.A.M.1
Schrijen, G.J.2
Veen, M.V.D.3
Akkermans, A.H.M.4
Zuo, F.5
-
14
-
-
48649088535
-
Multi-bits biometric string generation based on the likelihood ratio
-
Sep.
-
C. Chen, R. N. J. Veldhuis, T. A. M. Kevenaar, and A. H. M. Akkermans, "Multi-bits biometric string generation based on the likelihood ratio," in Proc. IEEE Int. Conf. Biometrics: Theory, Applications, and Systems, Sep. 2007, pp. 1-6.
-
(2007)
Proc. IEEE Int. Conf. Biometrics: Theory, Applications, and Systems
, pp. 1-6
-
-
Chen, C.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
-
16
-
-
76349117339
-
Constructing practical fuzzy extractors using QIM centre for telematics and information technology, University of twente, enschede
-
The Netherlands
-
I. Buhan, J. Doumen, P. Hartel, and R. Veldhuis, Constructing Practical Fuzzy Extractors Using QIM Centre for Telematics and Information Technology, University of Twente, Enschede, The Netherlands, Tech. Rep. TR-CTIT-07-52, 2007.
-
(2007)
Tech. Rep. TR-CTIT-07-52
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Veldhuis, R.4
-
17
-
-
56349109534
-
Non-intrusive liveness detection by face images
-
Feb.
-
K. Kollreider, H. Fronthalera, and J. Biguna, "Non-intrusive liveness detection by face images," Image and Vis. Comput.; Special Issue on Multimodal Biometrics, vol.27, no.3, pp. 233-244, Feb. 2009.
-
(2009)
Image and Vis. Comput.; Special Issue on Multimodal Biometrics
, vol.27
, Issue.3
, pp. 233-244
-
-
Kollreider, K.1
Fronthalera, H.2
Biguna, J.3
-
18
-
-
35248824645
-
Face recognition vendor test 2002 performance metrics
-
Jun.
-
P. Grother, R. J. Micheals, and P. J. Phillips, "Face recognition vendor test 2002 performance metrics," in Proc. Int. Conf. Audio and Video Based Biometric Person Authentication, Jun. 2003, pp. 937-945.
-
(2003)
Proc. Int. Conf. Audio and Video Based Biometric Person Authentication
, pp. 937-945
-
-
Grother, P.1
Micheals, R.J.2
Phillips, P.J.3
-
20
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology-EUROCRYPT 2004, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer, 2004, vol.3027, pp. 523-540.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
21
-
-
76349101976
-
-
Ph.D. dissertation, University of Toronto, Toronto, ON, Canada. [Online]. Available
-
H. Lu, "Multilinear Subspace Learning for Face and Gait Recognition" Ph.D. dissertation, University of Toronto, Toronto, ON, Canada, 2008 [Online]. Available: https://tspace.library.utoronto.ca/handle/ 1807/16750
-
(2008)
Multilinear Subspace Learning for Face and Gait Recognition
-
-
Lu, H.1
-
22
-
-
58649095928
-
Uncorrelated multilinear discriminant analysis with regularization and aggregation for tensor object recognition
-
Jan.
-
H. Lu, K. N. Plataniotis, and A. N. Venetsanopoulos, "Uncorrelated multilinear discriminant analysis with regularization and aggregation for tensor object recognition," IEEE Trans. Neural Netw., vol.20, no.1, pp. 103-123, Jan. 2009.
-
(2009)
IEEE Trans. Neural Netw.
, vol.20
, Issue.1
, pp. 103-123
-
-
Lu, H.1
Plataniotis, K.N.2
Venetsanopoulos, A.N.3
-
23
-
-
17044364467
-
Face recognition in subspaces
-
S. Z. Li and A. K. Jain, Eds. Berlin, Germany: Springer-Verlag
-
G. Shakhnarovich and B. Moghaddam, "Face recognition in subspaces," in Handbook of Face Recognition, S. Z. Li and A. K. Jain, Eds. Berlin, Germany: Springer-Verlag, 2004, pp. 141-168.
-
(2004)
Handbook of Face Recognition
, pp. 141-168
-
-
Shakhnarovich, G.1
Moghaddam, B.2
-
24
-
-
0026065565
-
Eigenfaces for recognition
-
M. Turk and A. Pentland, "Eigenfaces for recognition," J. Cog. Neurosci., vol.3, no.1, pp. 71-86, 1991.
-
(1991)
J. Cog. Neurosci.
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.1
Pentland, A.2
-
28
-
-
0033601681
-
Dither modulation: A new approach to digital watermarking and information embedding
-
Apr.
-
B. Chen and G. W. Wornell, "Dither modulation: A new approach to digital watermarking and information embedding," in Proc. SPIE Security and Watermarking of Multimedia Contents, Apr. 1999, vol.3657, pp. 342-353.
-
(1999)
Proc. SPIE Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 342-353
-
-
Chen, B.1
Wornell, G.W.2
-
30
-
-
0347380229
-
The CMU pose, illumination, and expression database
-
Dec.
-
T. Sim, S. Baker, and M. Bsat, "The CMU pose, illumination, and expression database," IEEE Trans. Pattern Anal. Mach. Intell., vol.25, no.12, pp. 1615-1618, Dec. 2003.
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.25
, Issue.12
, pp. 1615-1618
-
-
Sim, T.1
Baker, S.2
Bsat, M.3
|