-
1
-
-
0742290133
-
An introduction to biometric recognition
-
Jan.
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. Circuits Syst. Video Technol., vol.14, no.1, pp. 4-20, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
2
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
Mar./Apr.
-
S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: Security and privacy concerns," IEEE Security Privacy, vol.1, no.2, pp. 33-42, Mar./Apr. 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
3
-
-
82055208335
-
An analysis of minutiae matching strength
-
Halmstad, Sweden, Jun.
-
N. Ratha, J. H. Connell, and R. M. Bolle, "An analysis of minutiae matching strength," in Proc. Int. Conf. Audio- Video-Based Biometric Person Authentication, Halmstad, Sweden, Jun. 2001, pp. 223-228.
-
(2001)
Proc. Int. Conf. Audio- Video-Based Biometric Person Authentication
, pp. 223-228
-
-
Ratha, N.1
Connell, J.H.2
Bolle, R.M.3
-
4
-
-
58149122861
-
Combined handwriting and speech modalities for user authentication
-
Jan.
-
A. Humm, J. Hennebert, and R. Ingold, "Combined handwriting and speech modalities for user authentication," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol.39, no.1, pp. 25-35, Jan. 2009.
-
(2009)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.39
, Issue.1
, pp. 25-35
-
-
Humm, A.1
Hennebert, J.2
Ingold, R.3
-
5
-
-
35148827336
-
HMM-based on-line signature verification: Feature extraction and signature modeling
-
DOI 10.1016/j.patrec.2007.07.012, PII S0167865507002395
-
J. Fierrez, J. Ortega-Garcia, D. Ramos, and J. Gonzalez-Rodriguez, "HMM-based on-line signature verification: Feature extraction and signature modeling," Pattern Recognit. Lett., vol.28, no.16, pp. 2325-2334, Dec. 2007. (Pubitemid 47538786)
-
(2007)
Pattern Recognition Letters
, vol.28
, Issue.16
, pp. 2325-2334
-
-
Fierrez, J.1
Ortega-Garcia, J.2
Ramos, D.3
Gonzalez-Rodriguez, J.4
-
7
-
-
33947521876
-
Biometrics from brain electrical activity: A machine learning approach
-
Apr.
-
R. Palaniappan and D. P. Mandic, "Biometrics from brain electrical activity: A machine learning approach," IEEE Trans. Pattern Anal. Mach. Intell., vol.29, no.4, pp. 738-742, Apr. 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.4
, pp. 738-742
-
-
Palaniappan, R.1
Mandic, D.P.2
-
8
-
-
2142713919
-
Local intensity variation analysis for iris recognition
-
DOI 10.1016/j.patcog.2004.02.001, PII S0031320304000469
-
L. Ma, T. Tan, Y. Wang, and D. Zhang, "Local intensity variation analysis for iris recognition," Pattern Recognit., vol.37, no.6, pp. 1287-1298, Jun. 2004. (Pubitemid 38549826)
-
(2004)
Pattern Recognition
, vol.37
, Issue.6
, pp. 1287-1298
-
-
Ma, L.1
Tan, T.2
Wang, Y.3
Zhang, D.4
-
9
-
-
33751585800
-
Biometric hash based on statistical features of online signatures
-
C. Vielhauer, R. Steinmetz, and A. Mayerhöfer, "Biometric hash based on statistical features of online signatures," in Proc. ICPR, 2002, vol.1, pp. 123-126.
-
(2002)
Proc. ICPR
, vol.1
, pp. 123-126
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhöfer, A.3
-
10
-
-
51849116466
-
Template protection for HMM-based on-line signature authentication
-
Anchorage, AK, Jun.
-
E. Maiorana, M. Martinez-Diaz, P. Campisi, J. Ortega-Garcia, and A. Neri, "Template protection for HMM-based on-line signature authentication," in Proc. Workshop Biometrics CVPR Conf., Anchorage, AK, Jun. 2008, pp. 1-6.
-
(2008)
Proc. Workshop Biometrics CVPR Conf.
, pp. 1-6
-
-
Maiorana, E.1
Martinez-Diaz, M.2
Campisi, P.3
Ortega-Garcia, J.4
Neri, A.5
-
11
-
-
67549140582
-
Cancelable biometrics for HMM-based signature recognition
-
Washington, DC
-
E. Maiorana, P. Campisi, J. Ortega-Garcia, and A. Neri, "Cancelable biometrics for HMM-based signature recognition," in Proc. IEEE 2nd Int. Conf. BTAS, Washington, DC, 2008, pp. 1-6.
-
(2008)
Proc. IEEE 2nd Int. Conf. BTAS
, pp. 1-6
-
-
Maiorana, E.1
Campisi, P.2
Ortega-Garcia, J.3
Neri, A.4
-
13
-
-
53349159971
-
-
San Mateo, CA: Morgan Kaufmann
-
I. Cox, M. Miller, J. Bloom, M. Miller, and J. Fridrich, Digital Watermarking and Steganography. San Mateo, CA: Morgan Kaufmann, 2007.
-
(2007)
Digital Watermarking and Steganography
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Miller, M.4
Fridrich, J.5
-
14
-
-
0442296538
-
Hiding biometric data
-
Nov.
-
A. K. Jain and U. Uludag, "Hiding biometric data," IEEE Trans. Pattern Anal. Mach. Intell., vol.25, no.11, pp. 1494-1498, Nov. 2003.
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.25
, Issue.11
, pp. 1494-1498
-
-
Jain, A.K.1
Uludag, U.2
-
15
-
-
50249183581
-
Biometric signature authentication using Radon transform-based watermarking techniques
-
Baltimore, MD, Sep.
-
E. Maiorana, P. Campisi, and A. Neri, "Biometric signature authentication using Radon transform-based watermarking techniques," in Proc. IEEE Biometric Symp., Baltimore, MD, Sep. 2007, pp. 1-6.
-
(2007)
Proc. IEEE Biometric Symp.
, pp. 1-6
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
16
-
-
0034809453
-
Enhancing security and privacy of biometric-based authentication systems
-
Mar.
-
N. K. Ratha, J. H. Connell, and R. Bolle, "Enhancing security and privacy of biometric-based authentication systems," IBM Syst. J., vol.40, no.3, pp. 614-634, Mar. 2001.
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.3
-
17
-
-
33744742101
-
Can images be regenerated from biometric templates?
-
Arlington, VA, USA, Sep.
-
A. Adler, "Can images be regenerated from biometric templates?" in Biometrics Consortium Conference, Arlington, VA, USA, Sep. 2003.
-
(2003)
Biometrics Consortium Conference
-
-
Adler, A.1
-
18
-
-
34548118752
-
Fingerprint image reconstruction from standard templates
-
Sep.
-
R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, "Fingerprint image reconstruction from standard templates," IEEE Trans. Pattern Anal. Mach. Intell., vol.29, no.9, pp. 1489-1503, Sep. 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.9
, pp. 1489-1503
-
-
Cappelli, R.1
Lumini, A.2
Maio, D.3
Maltoni, D.4
-
20
-
-
43949116287
-
Biometric template security
-
Jan.
-
A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Adv. Signal Process., vol.2008, p. 113, Jan. 2008.
-
(2008)
EURASIP J. Adv. Signal Process.
, vol.2008
, pp. 113
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
21
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Jun.
-
U. Uludag, S. Pankanti, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol.92, no.6, pp. 948-960, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
23
-
-
30844458593
-
A fuzzy vault scheme
-
Feb.
-
A. Juels andM. Sudan, "A fuzzy vault scheme," Designs Codes Cryptogr., vol.38, no.2, pp. 237-257, Feb. 2006.
-
(2006)
Designs Codes Cryptogr.
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
24
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
Dec.
-
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Security, vol.2, no.4, pp. 744-757, Dec. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
25
-
-
33645656961
-
Face biometrics with renewable templates
-
M. Van der Veen, T. Kevenaar, G.-J. Schrijen, T. H. Akkermans, and F. Zuo, "Face biometrics with renewable templates," in Proc. SPIE Security, Steganography, Watermarking Multimed. Contents, 2006, vol.6072.
-
(2006)
Proc. SPIE Security, Steganography, Watermarking Multimed. Contents
, vol.6072
-
-
Veen Der M.Van1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.H.4
Zuo, F.5
-
27
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sep.
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics Security, vol.2, no.3, pp. 503-512, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
28
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs
-
Dec.
-
A. B. J. Teoh, D. C. L. Ngo, and A. Goh, "Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs," IEEE Trans. Pattern Anal. Mach. Intell., vol.28, no.12, pp. 1892-1901, Dec. 2006.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
29
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla, "Cancelable biometric filters for face recognition," in Proc. Int. Conf. Pattern Recog., 2004, pp. 922-925.
-
(2004)
Proc. Int. Conf. Pattern Recog.
, pp. 922-925
-
-
Savvides, M.1
Vijaya Kumar, B.V.K.2
Khosla, P.K.3
-
31
-
-
0001966565
-
Multimodal decision-level fusion for person authentication
-
Nov.
-
V. Chatzis, A. G. Bors, and I. Pitas, "Multimodal decision-level fusion for person authentication," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol.29, no.6, pp. 674-680, Nov. 1999.
-
(1999)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.29
, Issue.6
, pp. 674-680
-
-
Chatzis, V.1
Bors, A.G.2
Pitas, I.3
-
32
-
-
0036887662
-
Biometrics perils and patches
-
Dec.
-
R. M. Bolle, J. H. Connell, and K. K. Ratha, "Biometrics perils and patches," Pattern Recognit., vol.35, no.12, pp. 2727-2738, Dec. 2002.
-
(2002)
Pattern Recognit.
, vol.35
, Issue.12
, pp. 2727-2738
-
-
Bolle, R.M.1
Connell, J.H.2
Ratha, K.K.3
-
33
-
-
26444448320
-
Cancelable key-based fingerprint templates
-
Jul.
-
R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable key-based fingerprint templates," in Proc. 10th Australian Conf. Inf. Security Privacy, Jul. 2005, pp. 242-252.
-
(2005)
Proc. 10th Australian Conf. Inf. Security Privacy
, pp. 242-252
-
-
Ang, R.1
Safavi-Naini, R.2
McAven, L.3
-
34
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Apr.
-
N. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell., vol.29, no.4, pp. 561-572, Apr. 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
35
-
-
34948865766
-
Revocable fingerprint biotokens: Accuracy and security analysis
-
T. E. Boult, W. J. Schreirer, and R. Woodworth, "Revocable fingerprint biotokens: Accuracy and security analysis," in Proc. IEEE Conf. Comput. Vis. Pattern Recog., 2007, pp. 17-22.
-
(2007)
Proc. IEEE Conf. Comput. Vis. Pattern Recog.
, pp. 17-22
-
-
Boult, T.E.1
Schreirer, W.J.2
Woodworth, R.3
-
36
-
-
62349084871
-
Cracking cancelable fingerprint template of Ratha
-
Dec.
-
F. Quan, S. Fei, C. Anni, and Z. Feifei, "Cracking cancelable fingerprint template of Ratha," in Proc. ISCSCT, Dec. 2008, vol.2, pp. 572-575.
-
(2008)
Proc. ISCSCT
, vol.2
, pp. 572-575
-
-
Quan, F.1
Fei, S.2
Anni, C.3
Feifei, Z.4
-
37
-
-
67549112548
-
Generating registration-free cancelable fingerprint templates
-
Sep. 29-Oct.
-
S. Chikkerur, N. K. Ratha, J. H. Connell, and R. M. Bolle, "Generating registration-free cancelable fingerprint templates," in Proc. IEEE BTAS Conf., Sep. 29-Oct. 1, 2008, pp. 1-6.
-
(2008)
Proc. IEEE BTAS Conf.
, vol.1
, pp. 1-6
-
-
Chikkerur, S.1
Ratha, N.K.2
Connell, J.H.3
Bolle, R.M.4
-
38
-
-
54049133294
-
Cancelable voiceprint templates based on knowledge signatures
-
Aug.
-
W. Xu, Q. He, Y. Li, and T. Li, "Cancelable voiceprint templates based on knowledge signatures," in Proc. Int. Symp. Electron. Commerce Security, Aug. 2008, pp. 412-415.
-
(2008)
Proc. Int. Symp. Electron. Commerce Security
, pp. 412-415
-
-
Xu, W.1
He, Q.2
Li, Y.3
Li, T.4
-
41
-
-
46649099649
-
A novel hybrid model framework to blind color image deconvolution
-
Jul.
-
Y. He, K. H. Yap, L. Chen, and L. P. Chau, "A novel hybrid model framework to blind color image deconvolution," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol.38, no.4, pp. 867-880, Jul. 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. A, Syst., Humans
, vol.38
, Issue.4
, pp. 867-880
-
-
He, Y.1
Yap, K.H.2
Chen, L.3
Chau, L.P.4
-
42
-
-
0002377851
-
Automatic signature verification: The state of the art 1989-1993
-
F. Leclerc and R. Plamondon, "Automatic signature verification: The state of the art 1989-1993," Int. J. Pattern Recognit. Artif. Intell., vol.8, no.3, pp. 643-659, 1994.
-
(1994)
Int. J. Pattern Recognit. Artif. Intell.
, vol.8
, Issue.3
, pp. 643-659
-
-
Leclerc, F.1
Plamondon, R.2
-
43
-
-
18044370447
-
Recent advancements in automatic signature verification
-
Oct. 26-29
-
G. Dimauro, S. Impedovo, M. G. Lucchese, R. Modugno, and G. Pirlo, "Recent advancements in automatic signature verification," in Proc. 9th Int. Workshop Frontiers Handwriting Recog., Oct. 26-29, 2004, pp. 179-184.
-
(2004)
Proc. 9th Int. Workshop Frontiers Handwriting Recog.
, pp. 179-184
-
-
Dimauro, G.1
Impedovo, S.2
Lucchese, M.G.3
Modugno, R.4
Pirlo, G.5
-
44
-
-
69949166251
-
On-line signature verification
-
A. K. Jain, A. Ross, and P. Flynn, Eds. Berlin, Germany: Springer-Verlag
-
J. Fierrez and J. Ortega-Garcia, "On-line signature verification," in Handbook of Biometrics, A. K. Jain, A. Ross, and P. Flynn, Eds. Berlin, Germany: Springer-Verlag, 2008, pp. 189-209.
-
(2008)
Handbook of Biometrics
, pp. 189-209
-
-
Fierrez, J.1
Ortega-Garcia, J.2
-
45
-
-
2942592700
-
Handwriting: Feature correlation analysis for biometric hashes
-
Jan.
-
C. Vielhauer and R. Steinmetz, "Handwriting: Feature correlation analysis for biometric hashes," EURASIP J. Appl. Signal Process., vol.2004, no.4, pp. 542-558, Jan. 2004.
-
(2004)
EURASIP J. Appl. Signal Process.
, vol.2004
, Issue.4
, pp. 542-558
-
-
Vielhauer, C.1
Steinmetz, R.2
-
46
-
-
25844484205
-
Identity authentication using improved online signature verification method
-
DOI 10.1016/j.patrec.2005.04.017, PII S0167865505001376
-
A. Kholmatov and B. Yanikoglu, "Identity authentication using improved online signature verification method," Pattern Recognit. Lett., vol.26, no.15, pp. 2400-2408, Nov. 2005. (Pubitemid 41394296)
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.15
, pp. 2400-2408
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
47
-
-
0029246903
-
Application of hidden Markov models for signature verification
-
L. Yang, B. W. Widjaja, and R. Prasad, "Application of hidden Markov models for signature verification," Pattern Recognit., vol.28, no.2, pp. 161-170, 1995.
-
(1995)
Pattern Recognit.
, vol.28
, Issue.2
, pp. 161-170
-
-
Yang, L.1
Widjaja, B.W.2
Prasad, R.3
-
48
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
DOI 10.1108/09685220210436949
-
H. Feng and C.W. Chan, "Private key generation from on-line handwritten signatures," Inf. Manage. Comput. Security, vol.10, no.4, pp. 159-164, 2002. (Pubitemid 35010220)
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.4
, pp. 159-164
-
-
Feng, H.1
Wah, C.C.2
-
49
-
-
33747674301
-
Cryptographic key generation using handwritten signature
-
DOI 10.1117/12.665875, Biometric Technology for Human Identification III
-
M. Freire-Santos, J. Fierrez-Aguilar, and J. Ortega-Garcia, "Cryptographic key generation using handwritten signature," in Proc. SPIE, Defense Security Symp., Biometric Technol. Human Identification, 2006, vol.6202, pp. 225-231. (Pubitemid 44271134)
-
(2006)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.6202
-
-
Freire-Santos, M.1
Fierrez-Aguilar, J.2
Ortega-Garcia, J.3
-
50
-
-
33744964385
-
Generation of replaceable cryptographic keys from dynamic handwritten signatures
-
W. K. Yip, A. Goh, D. C. L. Ngo, and A. B. J. Teoh, "Generation of replaceable cryptographic keys from dynamic handwritten signatures," in Proc. ICB, 2006, pp. 509-515.
-
(2006)
Proc. ICB
, pp. 509-515
-
-
Yip, W.K.1
Goh, A.2
Ngo, D.C.L.3
Teoh, A.B.J.4
-
51
-
-
67549130623
-
User adaptive fuzzy commitment for signature templates protection and renewability
-
Mar.
-
E. Maiorana, P. Campisi, and A. Neri, "User adaptive fuzzy commitment for signature templates protection and renewability," J. Electron. Imag., vol.17, no.1, p. 011 011, Mar. 2008.
-
(2008)
J. Electron. Imag.
, vol.17
, Issue.1
, pp. 011011
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
52
-
-
71349086903
-
On-line signature based authentication: Template security issues and countermeasures
-
N. V. Boulgouris, K. N. Plataniotis, and E. Micheli-Tzanakou, Eds. New York: Wiley
-
P. Campisi, E. Maiorana, and A. Neri, "On-line signature based authentication: Template security issues and countermeasures," in Biometrics: Theory, Methods, and Applications, N. V. Boulgouris, K. N. Plataniotis, and E. Micheli-Tzanakou, Eds. New York: Wiley, 2009.
-
(2009)
Biometrics: Theory, Methods, and Applications
-
-
Campisi, P.1
Maiorana, E.2
Neri, A.3
-
53
-
-
36049036567
-
Multi-level signature based biometric authentication using watermarking
-
E. Maiorana, P. Campisi, and A. Neri, "Multi-level signature based biometric authentication using watermarking," in Proc. SPIE Defense Security, Mobile Multimedia/Image Process. Military Security Appl., 2007, vol.6579, pp. 657 90J.1-657 90J.12.
-
(2007)
Proc. SPIE Defense Security, Mobile Multimedia/Image Process. Military Security Appl.
, vol.6579
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
54
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb.
-
L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol.77, no.2, pp. 257-286, Feb. 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
55
-
-
35148845492
-
On using the Viterbi path along with HMM likelihood information for online signature verification
-
DOI 10.1109/TSMCB.2007.895323, Special Issue on Recent Advances in Biometric Systems
-
B. L. Van, S. Garcia Salicetti, and B. Dorizzi, "On using the Viterbi path along with HMM likelihood information for online signature verification," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol.37, no.5, pp. 1237-1247, Oct. 2007. (Pubitemid 47534589)
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.37
, Issue.5
, pp. 1237-1247
-
-
Van, B.L.1
Garcia-Salicetti, S.2
Dorizzi, B.3
-
56
-
-
37849026158
-
A new forgery scenario based on regaining dynamics of signature
-
J. Hennebert, R. Loeffel, A. Humm, and R. Ingold, "A new forgery scenario based on regaining dynamics of signature," in Proc. IEEE ICB, 2007, pp. 366-375.
-
(2007)
Proc. IEEE ICB
, pp. 366-375
-
-
Hennebert, J.1
Loeffel, R.2
Humm, A.3
Ingold, R.4
-
57
-
-
10744222590
-
MCYT baseline corpus: A bimodal biometric database
-
Dec.
-
J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. Faundez-Zanuy, V. Espinosa, A. Satue, I. Hernaez, J.-J. Igarza, C. Vivaracho, D. Escudero, and Q.-I. Moro, "MCYT baseline corpus: A bimodal biometric database," Proc. Inst. Elect. Eng.-Vision, Image Signal Process., vol.150, no.6, pp. 395-401, Dec. 2003.
-
(2003)
Proc. Inst. Elect. Eng.-Vision, Image Signal Process.
, vol.150
, Issue.6
, pp. 395-401
-
-
Ortega-Garcia, J.1
Fierrez-Aguilar, J.2
Simon, D.3
Gonzalez, J.4
Faundez-Zanuy, M.5
Espinosa, V.6
Satue, A.7
Hernaez, I.8
Igarza, J.-J.9
Vivaracho, C.10
Escudero, D.11
Moro, Q.-I.12
|