-
1
-
-
0036856989
-
Face recognition by independent component analysis
-
DOI 10.1109/TNN.2002.804287
-
M. S. Bartlett J. R. Movellan T. J. Sejnowski 2002 Face recognition by independent component analysis IEEE Transactions on Neural Networks 13 6 1450 1464 10.1109/TNN.2002.804287 (Pubitemid 35428531)
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, Issue.6
, pp. 1450-1464
-
-
Bartlett, M.S.1
Movellan, J.R.2
Sejnowski, T.J.3
-
2
-
-
54849403316
-
Understanding complex systems
-
Springer Berlin. 10.1007/978-3-540-77657-4-14 978-3-540-77656-7
-
Buciu, I., & Pitas, I. (2008). Understanding complex systems. In Organic computing (pp. 303-320). Berlin: Springer. ISBN 978-3-540-77656-7.
-
(2008)
Organic Computing
, pp. 303-320
-
-
Buciu, I.1
Pitas, I.2
-
3
-
-
27544464357
-
Robust representations for face recognition: The power of averages
-
DOI 10.1016/j.cogpsych.2005.06.003, PII S0010028505000447
-
A. M. Burton R. Jenkins P. J. B. Hancock D. White 2005 Robust representations for face recognition: the power of averages Cognitive Psychology 51 3 256 284 10.1016/j.cogpsych.2005.06.003 (Pubitemid 41536153)
-
(2005)
Cognitive Psychology
, vol.51
, Issue.3
, pp. 256-284
-
-
Burton, A.M.1
Jenkins, R.2
Hancock, P.J.B.3
White, D.4
-
4
-
-
11244340682
-
Biometrics-based cryptographic key generation
-
2004 IEEE International Conference on Multimedia and Expo (ICME)
-
Chang, Y.-J., Zhang, W., & Chen, T. (2004). Biometrics-based cryptographic key generation. In IEEE international conference on multimedia and expo, 2004. ICME 2004 (Vol. 3, pp. 2203-2206). (Pubitemid 40063504)
-
(2004)
2004 IEEE International Conference on Multimedia and Expo (ICME)
, vol.3
, pp. 2203-2206
-
-
Chang, Y.-J.1
Zhang, W.2
Chen, T.3
-
5
-
-
48649088535
-
Multi-bits biometric string generation based on the likelihood ratio
-
Chen, C., Veldhuis, R. N. J., Kevenaar, T. A. M., & Akkermans, A. H. M. (2007). Multi-bits biometric string generation based on the likelihood ratio. In First IEEE international conference on biometrics: theory, applications, and systems, BTAS.
-
(2007)
First IEEE International Conference on Biometrics: Theory, Applications, and Systems, BTAS
-
-
Chen, C.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
-
6
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
DOI 10.1109/18.923725, PII S0018944801028346
-
B. Chen G. W. Wornell 2001 Quantization index modulation: a class of provably good methods for digital watermarking and information embedding IEEE Transactions on Information Theory 47 4 1423 1443 10.1109/18.923725 (Pubitemid 32508483)
-
(2001)
IEEE Transactions on Information Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
7
-
-
33947411404
-
Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparisons
-
DOI 10.1109/JPROC.2006.884092
-
J. Daugman 2006 Probing the uniqueness and randomness of IrisCodes: results from 200 billion Iris pair comparisons Proceedings of the IEEE 94 11 1927 1935 10.1109/JPROC.2006.884092 (Pubitemid 46445563)
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.11
, pp. 1927-1934
-
-
Daugman, J.1
-
8
-
-
0035363672
-
From few to many: Illumination cone models for face recognition under variable lighting and pose
-
DOI 10.1109/34.927464
-
A. S. Georghiades P. N. Belhumeur D. J. Kriegman 2001 From few to many: illumination cone models for face recognition under variable lighting and pose IEEE Transactions on Pattern Analysis and Machine Intelligence 23 6 643 660 10.1109/34.927464 http://vision.ucsd.edu/~leekc/ExtYaleDatabase/ExtYaleB.html (Pubitemid 32585276)
-
(2001)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.23
, Issue.6
, pp. 643-660
-
-
Georghiades, A.S.1
Belhumeur, P.N.2
Kriegman, D.J.3
-
9
-
-
43749087125
-
Entropy analysis and new constructions of biometric key generation systems
-
DOI 10.1109/TIT.2008.920211
-
J. D. Golic M. Baltatu 2008 Entropy analysis and new constructions of biometric key generation systems IEEE Transactions on Information Theory 54 5 2026 2040 10.1109/TIT.2008.920211 (Pubitemid 351689546)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.5
, pp. 2026-2040
-
-
Golic, J.D.1
Baltatu, M.2
-
10
-
-
40349106309
-
A non-uniform quantizing approach to protect biometrie templates
-
DOI 10.1109/IIH-MSP.2006.265096, 4041816, Proceedings - 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006
-
Han, Q., Wang, Z., & Xiamu, N. (2006). A non-uniform quantizing approach to protect biometric templates. In International conference on intelligent information hiding and multimedia signal processing, IIH-MSP '06 (pp. 693-698). (Pubitemid 351337237)
-
(2006)
Proceedings - 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006
, pp. 693-698
-
-
Han, Q.1
Wang, Z.2
Niu, X.3
-
11
-
-
38549083617
-
100% Accuracy in automatic face recognition
-
DOI 10.1126/science.1149656
-
R. Jenkins A. M. Burton 2008 100% accuracy in automatic face recognition Science 319 5862 435 10.1126/science.1149656 (Pubitemid 351160569)
-
(2008)
Science
, vol.319
, Issue.5862
, pp. 435
-
-
Jenkins, R.1
Burton, A.M.2
-
12
-
-
33646095185
-
An analysis of biohashing and its variants
-
10.1016/j.patcog.2005.10.025
-
B. Kong K. Cheung D. Zhang M. Kamel J. You 2006 An analysis of biohashing and its variants Pattern Recognition 39 7 1359 1368 10.1016/j.patcog.2005.10. 025
-
(2006)
Pattern Recognition
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, B.1
Cheung, K.2
Zhang, D.3
Kamel, M.4
You, J.5
-
14
-
-
0033592606
-
Learning the parts of objects by non-negative matrix factorization
-
DOI 10.1038/44565
-
D. D. Lee H. S. Seung 1999 Learning the parts of objects by non-negative matrix factorization Nature 401 788 791 10.1038/44565 (Pubitemid 29512513)
-
(1999)
Nature
, vol.401
, Issue.6755
, pp. 788-791
-
-
Lee, D.D.1
Seung, H.S.2
-
15
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Linnartz, J.-P., & Tuyls, P. (2003). New shielding functions to enhance privacy and prevent misuse of biometric templates. In AVBPA (pp. 393-402).
-
(2003)
AVBPA
, pp. 393-402
-
-
Linnartz, J.-P.1
Tuyls, P.2
-
16
-
-
33750533142
-
An improved BioHashing for human authentication
-
DOI 10.1016/j.patcog.2006.05.030, PII S0031320306002482
-
A. Lumini L. Nanni 2007 An improved BioHashing for human authentication Pattern Recognition 40 3 1057 1065 10.1016/j.patcog.2006.05.030 (Pubitemid 44667748)
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
17
-
-
79958150533
-
Multihashing, human authentication featuring biometrics data and tokenized random number: A case study
-
Maio, D., & Nanni, L. (2004). Multihashing, human authentication featuring biometrics data and tokenized random number: A case study. In FVC2004.
-
(2004)
FVC2004
-
-
Maio, D.1
Nanni, L.2
-
18
-
-
48149110492
-
Local binary patterns for a hybrid fingerprint matcher
-
10.1016/j.patcog.2008.05.013
-
L. Nanni A. Lumini 2008 Local binary patterns for a hybrid fingerprint matcher Pattern Recognition 41 11 3461 3466 10.1016/j.patcog.2008.05.013
-
(2008)
Pattern Recognition
, vol.41
, Issue.11
, pp. 3461-3466
-
-
Nanni, L.1
Lumini, A.2
-
19
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha J. Connell R. Bolle 2001 Enhancing security and privacy in biometrics-based authentication systems IBM Systems Journal 40 3 614 634 10.1147/sj.403.0614 (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
20
-
-
85024264226
-
Inside risks: The uses and abuses of biometrics
-
10.1145/310930.310988
-
B. Schneier 1999 Inside risks: the uses and abuses of biometrics Communications of the ACM 42 8 136 10.1145/310930.310988
-
(1999)
Communications of the ACM
, vol.42
, Issue.8
, pp. 136
-
-
Schneier, B.1
-
21
-
-
0347380229
-
The CMU pose, illumination, and expression database
-
10.1109/TPAMI.2003.1251154
-
T. Sim S. Baker M. Bsat 2003 The CMU pose, illumination, and expression database IEEE Transactions on Pattern Analysis and Machine Intelligence 25 12 1615 1618 10.1109/TPAMI.2003.1251154
-
(2003)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.25
, Issue.12
, pp. 1615-1618
-
-
Sim, T.1
Baker, S.2
Bsat, M.3
-
22
-
-
33747604157
-
Remarks on BioHash and its mathematical foundation
-
DOI 10.1016/j.ipl.2006.06.010, PII S0020019006002080
-
A. B. J. Teoh T. Connie D. Ngo C. Ling 2006 Remarks on BioHash and its mathematical foundation Information Processing Letters 100 4 145 150 10.1016/j.ipl.2006.06.010 (Pubitemid 44262353)
-
(2006)
Information Processing Letters
, vol.100
, Issue.4
, pp. 145-150
-
-
Teoh, A.1
Jin, B.2
Connie, T.3
Ngo, D.4
Ling, C.5
-
23
-
-
33947177191
-
Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs
-
10.1109/TPAMI.2006.250
-
A. B. J. Teoh A. Goh D. Ngo C. Ling 2006 Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs IEEE Transactions on Pattern Analysis and Machine Intelligence 28 12 1892 1901 10.1109/TPAMI.2006.250
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.B.J.1
Goh, A.2
Ngo, D.3
Ling, C.4
-
24
-
-
38949203738
-
Cancellable biometrics and annotations on BioHash
-
10.1016/j.patcog.2007.12.002
-
A. B. J. Teoh Y. W. Kuan S. Lee 2008 Cancellable biometrics and annotations on BioHash Pattern Recognition 41 6 2034 2044 10.1016/j.patcog.2007. 12.002
-
(2008)
Pattern Recognition
, vol.41
, Issue.6
, pp. 2034-2044
-
-
Teoh, A.B.J.1
Kuan, Y.W.2
Lee, S.3
-
25
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
DOI 10.1016/j.patcog.2004.04.011, PII S0031320304001876
-
A. Teoh D. Ngo A. Goh 2004 Biohashing: two factor authentication featuring fingerprint data and tokenised random number Pattern Recognition 37 11 2245 2255 10.1016/j.patcog.2004.04.011 (Pubitemid 40134555)
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
27
-
-
0026065565
-
Eigenfaces for recognition
-
10.1162/jocn.1991.3.1.71
-
M. A. Turk A. P. Pentland 1991 Eigenfaces for recognition Cognitive Neuroscience 3 1 71 86 10.1162/jocn.1991.3.1.71
-
(1991)
Cognitive Neuroscience
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.A.1
Pentland, A.P.2
-
28
-
-
26444507172
-
Practical biometric authentication with template protection
-
Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
-
Tuyls, P., Akkermans, A. H. M., Kevenaar, T. A. M., Schrijen, G. J., Bazen, A. M., & Veldhuis, R. N. J. (2005). Practical biometric authentication with template protection. In International conference on audio- and video-based biometric person authentication, AVBPA (Vol. 3546, pp. 436-446). (Pubitemid 41423060)
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
29
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
DOI 10.1109/JPROC.2004.827372, Enabling Security Technologies for Digital Richts Management
-
U. Uludag S. Pankanti S. Prabhakar A. K. Jain 2004 Biometric cryptosystems: issues and challenges Proceedings of the IEEE 92 6 948 960 10.1109/JPROC.2004.827372 (Pubitemid 40890723)
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-959
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
30
-
-
2942592700
-
Handwriting: Feature correlation analysis for biometric hashes
-
10.1155/S1110865704309248 Special issue on Biometric Signal Processing
-
C. Vielhauer R. Steinmetz 2004 Handwriting: feature correlation analysis for biometric hashes EURASIP Journal on Applied Signal Processing 2004 4 542 558 10.1155/S1110865704309248 Special issue on Biometric Signal Processing
-
(2004)
EURASIP Journal on Applied Signal Processing
, vol.2004
, Issue.4
, pp. 542-558
-
-
Vielhauer, C.1
Steinmetz, R.2
-
31
-
-
33846224825
-
Secure hashing of dynamic hand signatures using wavelet-Fourier compression with BioPhasor mixing and 2N discretization
-
W. K. Yip A. B. J. Teoh D. C. L. Ngo 2007 Secure hashing of dynamic hand signatures using wavelet-Fourier compression with BioPhasor mixing and 2N discretization EURASIP Journal on Advances in Signal Processing 2007 59125 8 pages
-
(2007)
EURASIP Journal on Advances in Signal Processing
, pp. 8
-
-
Yip, W.K.1
Teoh, A.B.J.2
Ngo, D.C.L.3
|