-
1
-
-
76349114372
-
-
[Online]. Available
-
Spotlight on Biometrics [Online]. Available: http://www. unisyssecurityindex. com//
-
Spotlight on Biometrics
-
-
-
3
-
-
69749099895
-
Fingerprint verification using spectral minutiae representations
-
Sep.
-
H. Xu, R. Veldhuis, A. Bazen, T. Kevenaar, T. Akkermans, and B. Gokberk, "Fingerprint verification using spectral minutiae representations," IEEE Trans. Inf. Forensics Security, vol.4, no.3, pp. 397-409, Sep. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.3
, pp. 397-409
-
-
Xu, H.1
Veldhuis, R.2
Bazen, A.3
Kevenaar, T.4
Akkermans, T.5
Gokberk, B.6
-
4
-
-
26444507172
-
Practical biometric authentication with template protection
-
P. Tuyls, A. Akkermans, T. Kevenaar, G. Schrijen, A. Bazen, and R. Veldhuis, "Practical biometric authentication with template protection," in Proc. AVBPA, 2005 , pp. 436-446.
-
(2005)
Proc. AVBPA
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.4
Bazen, A.5
Veldhuis, R.6
-
5
-
-
84892298018
-
Fuzzy commitment
-
P. Tuyls, B. Skoric, and T. Kevenaar, Eds. : Springer, ch. 3
-
A. Juels, "Fuzzy commitment," in Security With Noisy Data-On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, P. Tuyls, B. Skoric, and T. Kevenaar, Eds. : Springer, 2007, ch. 3, pp. 45-56.
-
(2007)
Security with Noisy Data-On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
, pp. 45-56
-
-
Juels, A.1
-
6
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
Dec.
-
K. Nandakumar, A. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Security, vol.2, no.4, pp. 744-757, Dec. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.2
Pankanti, S.3
-
8
-
-
76349091011
-
-
U.S. Visitor and Immigrant Status Indicator Technology Program (USVISIT) [Online]. Available:
-
U.S. Visitor and Immigrant Status Indicator Technology Program (USVISIT) [Online]. Available: http://www.dhs.gov/us-visit
-
-
-
-
10
-
-
51849141886
-
Spectral minutiae: A fixed-length representation of a minutiae set
-
Anchorage, AK
-
H. Xu, R. N. J. Veldhuis, T. A. M. Kevenaar, A. H. M. Akkermans, and A. M. Bazen, "Spectral minutiae: A fixed-length representation of a minutiae set," in Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition-Workshop on Biometrics, Anchorage, AK, 2008.
-
(2008)
Proc. IEEE Computer Society Conference on Computer Vision and Pattern Recognition-Workshop on Biometrics
-
-
Xu, H.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
Bazen, A.M.5
-
12
-
-
0003443218
-
-
2nd ed. Upper Saddle River, NJ: Prentice-Hall
-
A. V. Oppenheim, A. S.Willsky, and S. H. Nawab, Signals & Systems, 2nd ed. Upper Saddle River, NJ: Prentice-Hall, 1996.
-
(1996)
Signals & Systems
-
-
Oppenheim, A.V.1
Willsky, A.S.2
Nawab, S.H.3
-
13
-
-
10744222590
-
MCYT baseline corpus: A bimodal biometric database
-
J. Ortega-Garca et al., "MCYT baseline corpus: A bimodal biometric database," IEE Proc. Vision, Image and Signal Processing, vol.150, no.6, pp. 395-401, 2003.
-
(2003)
IEE Proc. Vision, Image and Signal Processing
, vol.150
, Issue.6
, pp. 395-401
-
-
Ortega-Garca, J.1
-
14
-
-
33751580079
-
-
Aug.
-
D. Maio, D. Maltoni, R. Cappelli, J. Wayman, and A. Jain, FVC2002: Second Fingerprint Verification Competition vol. 3, pp. 811-814, Aug. 2002.
-
(2002)
FVC2002: Second Fingerprint Verification Competition
, vol.3
, pp. 811-814
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.4
Jain, A.5
-
15
-
-
78650413794
-
-
[Online]. Available
-
VeriFinger SDK [Online]. Available: http://www.neurotechnologija. com/
-
VeriFinger SDK
-
-
-
16
-
-
84873433835
-
Fuzzy extractors
-
P. Tuyls, B. Skoric, and T. Kevenaar, Eds. New York: Springer ch. 3
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors," in SecurityWith Noisy Data-On Private Biometrics, Secure Key Storage and Anti-Counterfeiting, P. Tuyls, B. Skoric, and T. Kevenaar, Eds. New York: Springer, 2007, ch. 3, pp. 45-56.
-
(2007)
SecurityWith Noisy Data-On Private Biometrics, Secure Key Storage and Anti-Counterfeiting
, pp. 45-56
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
17
-
-
0742290132
-
How iris recognition works
-
Jan.
-
J. Daugman, "How iris recognition works," IEEE Trans. Circuits Syst. Video Technol., vol.14, no.1, pp. 21-30, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
18
-
-
52049107821
-
Biometric binary string generation with detection rate optimized bit allocation
-
Anchorage, AK
-
C. Chen, R. Veldhuis, A. Akkermans, and T. Kevenaar, "Biometric binary string generation with detection rate optimized bit allocation," in Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition-Workshop on Biometrics, Anchorage, AK, 2008.
-
(2008)
Proc. IEEE Computer Society Conf. Computer Vision and Pattern Recognition-Workshop on Biometrics
-
-
Chen, C.1
Veldhuis, R.2
Akkermans, A.3
Kevenaar, T.4
|