-
2
-
-
79551686544
-
"Video-Based Noncooperative Iris Image Segmentation, " Systems, Man, and Cybernetics, Part B: Cybernetics
-
Du Y, Arslanturk E, Zhou Z, and Belcher C. "Video-Based Noncooperative Iris Image Segmentation, " Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions 2011; 41: 64-74.
-
(2011)
IEEE Transactions
, vol.41
, pp. 64-74
-
-
Du, Y.1
Arslanturk, E.2
Zhou, Z.3
Belcher, C.4
-
4
-
-
33744779400
-
Biometrics: A tool for information security
-
Jain AK, Ross A, Pankanti S. Biometrics: A tool for information security. Information Forensics and Security, IEEE Transactions 2006; 1(2): 125-43.
-
(2006)
Information Forensics and Security, IEEE Transactions
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
5
-
-
68449101711
-
Transforming traditional iris recognition systems to work in nonideal situations. Industrial Electronics
-
Zhou Z, Du Y, Belcher C, Transforming traditional iris recognition systems to work in nonideal situations. Industrial Electronics, IEEE Transactions 2009; 56(8): 3203-13.
-
(2009)
IEEE Transactions
, vol.56
, Issue.8
, pp. 3203-3213
-
-
Zhou, Z.1
Du, Y.2
Belcher, C.3
-
6
-
-
35148835074
-
New methods in iris recognition
-
Daugman J. New methods in iris recognition. IEEE Transactions on Systems, Man, and Cybernetics, Part B, 2007; 37(5): 1167-75.
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics, Part B
, vol.37
, Issue.5
, pp. 1167-1175
-
-
Daugman, J.1
-
7
-
-
77954556974
-
Scale invariant gabor descriptor-based noncooperative iris recognition
-
936512
-
Du Y, Belcher C, Zhou Z. Scale invariant gabor descriptor-based noncooperative iris recognition. EURASIP J Advances Signal Processing 2010; 936512: 1-13.
-
(2010)
EURASIP J Advances Signal Processing
, pp. 1-13
-
-
Du, Y.1
Belcher, C.2
Zhou, Z.3
-
8
-
-
78951478727
-
Collaborative face recognition for improved face annotation in personal photo collections shared on online social networks. " Multimedia
-
Choi JY, De Neve W, Plataniotis KN, Ro YM. Collaborative face recognition for improved face annotation in personal photo collections shared on online social networks. " Multimedia, IEEE Transactions 2011; 13: 14-28.
-
(2011)
IEEE Transactions
, vol.13
, pp. 14-28
-
-
Choi, J.Y.1
de Neve, W.2
Plataniotis, K.N.3
Ro, Y.M.4
-
9
-
-
79551535264
-
Face recognition by exploring information jointly in space, scale and orientation, " Image Processing
-
Lei Z, Liao S, Pietikainen M, Li SZ. Face recognition by exploring information jointly in space, scale and orientation, " Image Processing. IEEE Transactions 2011; 20: 247-56.
-
(2011)
IEEE Transactions
, vol.20
, pp. 247-256
-
-
Lei, Z.1
Liao, S.2
Pietikainen, M.3
Li, S.Z.4
-
10
-
-
78650512455
-
Fingerprint Reconstruction: From minutiae to phase. pattern analysis and machine intelligence
-
Feng J, Jain AK. Fingerprint Reconstruction: From minutiae to phase. pattern analysis and machine intelligence. IEEE Transactions 2011; 33(2): 209-23.
-
(2011)
IEEE Transactions
, vol.33
, Issue.2
, pp. 209-223
-
-
Feng, J.1
Jain, A.K.2
-
12
-
-
76849109845
-
Improving biometric authentication performance from the user quality
-
Kumar A, Zhang D. Improving biometric authentication performance from the user quality. Instrumentation and Measurement, IEEE Transactions 2010; 59(3): 730-5.
-
(2010)
Instrumentation and Measurement, IEEE Transactions
, vol.59
, Issue.3
, pp. 730-735
-
-
Kumar, A.1
Zhang, D.2
-
14
-
-
69549126149
-
Palmprint recognition using 3-D information systems, Man, and Cybernetics, Part C: Applications and Reviews
-
Zhang D, Guangming L, Wei L, Lei Z, Nan L. Palmprint recognition using 3-D information systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions 2009; 39: 505-19.
-
(2009)
IEEE Transactions
, vol.39
, pp. 505-519
-
-
Zhang, D.1
Guangming, L.2
Wei, L.3
Lei, Z.4
Nan, L.5
-
15
-
-
67349217721
-
Latent palmprint matching. Pattern Analysis and Machine Intelligence
-
Jain AK, Feng J. Latent palmprint matching. Pattern Analysis and Machine Intelligence. IEEE Transactions 2009; 31(6): 1032-47.
-
(2009)
IEEE Transactions
, vol.31
, Issue.6
, pp. 1032-1047
-
-
Jain, A.K.1
Feng, J.2
-
16
-
-
77950862657
-
Conic section function neural network circuitry for offline signature recognition
-
Erkmen B, Kahraman N, Vural RA, Yildirim T. Conic section function neural network circuitry for offline signature recognition. Neural Networks, IEEE Transactions 2010: 21: 667-72.
-
(2010)
Neural Networks, IEEE Transactions
, vol.21
, pp. 667-672
-
-
Erkmen, B.1
Kahraman, N.2
Vural, R.A.3
Yildirim, T.4
-
17
-
-
56049086396
-
Gaussian mixture modeling of keystroke patterns for biometric applications
-
Hosseinzadeh D, Krishnan S. Gaussian mixture modeling of keystroke patterns for biometric applications. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions 2008; 38(6): 816-26.
-
(2008)
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions
, vol.38
, Issue.6
, pp. 816-826
-
-
Hosseinzadeh, D.1
Krishnan, S.2
-
19
-
-
77954758834
-
Self-calibrating view-invariant gait biometrics. " Systems, Man, and Cybernetics, Part B: Cybernetics
-
Goffredo M, Bouchrika I, Carter JN, Nixon MS. Self-calibrating view-invariant gait biometrics. " Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions 2010; 40: 997-1008.
-
(2010)
IEEE Transactions
, vol.40
, pp. 997-1008
-
-
Goffredo, M.1
Bouchrika, I.2
Carter, J.N.3
Nixon, M.S.4
-
20
-
-
78650032498
-
"Feature extraction based on pitch-synchronous averaging for robust speech recognition, " Audio, Speech, and Language Processing
-
Morales-Cordovilla JA, Peinado AM, Sanchez V, Gonzalez JA. "Feature extraction based on pitch-synchronous averaging for robust speech recognition, " Audio, Speech, and Language Processing, IEEE Transactions 2011; 19: 640-51.
-
(2011)
IEEE Transactions
, vol.19
, pp. 640-651
-
-
Morales-Cordovilla, J.A.1
Peinado, A.M.2
Sanchez, V.3
Gonzalez, J.A.4
-
22
-
-
23944440664
-
Time-series detection of perspiration as a liveness test in fingerprint devices, " Systems, Man, and Cybernetics, Part C: Applications and Reviews
-
Parthasaradhi STV, Derakhshani R, Hornak LA, Schuckers SAC. Time-series detection of perspiration as a liveness test in fingerprint devices, " Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions 2005; 35: 335-343.
-
(2005)
IEEE Transactions
, vol.35
, pp. 335-343
-
-
Parthasaradhi, S.T.V.1
Derakhshani, R.2
Hornak, L.A.3
Schuckers, S.A.C.4
-
23
-
-
33748110283
-
Fake finger detection by skin distortion analysis. " Information Forensics and Security
-
Antonelli A, Cappelli R, Maio D, Maltoni D. Fake finger detection by skin distortion analysis. " Information Forensics and Security, IEEE Transactions 2006; 1: 360-73.
-
(2006)
IEEE Transactions
, vol.1
, pp. 360-373
-
-
Antonelli, A.1
Cappelli, R.2
Maio, D.3
Maltoni, D.4
-
24
-
-
23244463236
-
Multispectral fingerprint imaging for spoof detection
-
Nixon K, Rowe R. Multispectral fingerprint imaging for spoof detection. proceedings of SPIE, 2005.
-
(2005)
Proceedings of SPIE
-
-
Nixon, K.1
Rowe, R.2
-
25
-
-
79959268274
-
How to hack: An introduction
-
Seifried K. How to hack: An introduction. Sys Admin 2000; 9(11): 44-7.
-
(2000)
Sys Admin
, vol.9
, Issue.11
, pp. 44-47
-
-
Seifried, K.1
-
26
-
-
77950246678
-
Biometric system security
-
Adler A. Biometric system security. Handbook of Biometrics 2008; 381-402.
-
(2008)
Handbook of Biometrics
, pp. 381-402
-
-
Adler, A.1
-
27
-
-
85029482963
-
Freshness assurance of authentication protocols
-
Lam K, Gollmann D. Freshness assurance of authentication protocols. Computer Security-ESORICS 1992; 92: 259-71.
-
(1992)
Computer Security-ESORICS
, vol.92
, pp. 259-271
-
-
Lam, K.1
Gollmann, D.2
-
28
-
-
0345524303
-
Timely authentication in distributed systems
-
Lam K, Beth T. Timely authentication in distributed systems. Computer Security-ESORICS 1992; 92: 293-303.
-
(1992)
Computer Security-ESORICS
, vol.92
, pp. 293-303
-
-
Lam, K.1
Beth, T.2
-
30
-
-
0031238278
-
Biometrics: Privacy's foe or privacy's friend?
-
Woodward J. Biometrics: Privacy's foe or privacy's friend? Proc of the IEEE, 2002; 85(9): 1480-92.
-
(2002)
Proc of the IEEE
, vol.85
, Issue.9
, pp. 1480-1492
-
-
Woodward, J.1
-
35
-
-
33750533142
-
An improved BioHashing for human authentication
-
Lumini A, Nanni L. An improved BioHashing for human authentication. Pattern Recognition 2007; 40(3): 1057-65.
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
36
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
Jin, A., Ling D, Goh A. Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 2004; 37(11): 2245-55.
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.1
Ling, D.2
Goh, A.3
-
37
-
-
19744373363
-
Cancellable biometerics featuring with tokenised random number
-
Teoh, A. Ngo D. Cancellable biometerics featuring with tokenised random number. Pattern Recognition Lett 2005; 26(10): 1454-60.
-
(2005)
Pattern Recognition Lett
, vol.26
, Issue.10
, pp. 1454-1460
-
-
Teoh, A.1
Ngo, D.2
-
42
-
-
37849013877
-
Biometric key binding: Fuzzy vault based on iris images
-
Lee Y, Bae K, Lee S, Park K, Kim J. Biometric key binding: Fuzzy vault based on iris images. Advances in Biometrics 2007; 800-8.
-
(2007)
Advances in Biometrics
, pp. 800-808
-
-
Lee, Y.1
Bae, K.2
Lee, S.3
Park, K.4
Kim, J.5
-
47
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sutcu Y, Li Q, Memon N. Protecting biometric templates with sketch: Theory and practice. Information Forensics and Security, IEEE Transactions 2007; 2(3): 503-12.
-
(2007)
Information Forensics and Security, IEEE Transactions
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
51
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha N, Connell J, Bolle R. Enhancing security and privacy in biometrics-based authentication systems. IBM systems J 2001; 40(3): 614-34.
-
(2001)
IBM systems J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
56
-
-
79959260151
-
-
US7120607
-
Bolle, R.M., Connell, J.H., Ratha, N.K., Percello, L.J. Business System and Method Using A Distorted Biometrics. US7120607 (2006).
-
(2006)
Business System and Method Using A Distorted Biometrics
-
-
Bolle, R.M.1
Connell, J.H.2
Ratha, N.K.3
Percello, L.J.4
-
58
-
-
79959264145
-
-
US20090123034
-
Bolle, R.M., Ratha, N.K., Connell, J.H. Method, apparatus and computer program product implementing anonymous biometric matching. US20090123034 (2009).
-
(2009)
Method, apparatus and computer program product implementing anonymous biometric matching
-
-
Bolle, R.M.1
Ratha, N.K.2
Connell, J.H.3
|