-
1
-
-
81155146634
-
-
Working Document on Biometrics, 2003. Available at. Retrieved on May 24
-
Article 29 - Data Protection Working Party. Working Document on Biometrics, 2003. Available at http://ec.europa.eu/justice-home/fsj/privacy/ docs/wpdocs/2003/wp80-en.pdf. Retrieved on May 24, 2008.
-
(2008)
Article 29 - Data Protection Working Party
-
-
-
3
-
-
81155156799
-
-
BBC News Retrieved on May 2
-
BBC News. Plastic card fraud goes back up (March 2008). Available at http://news.bbc.co.uk/2/hi/business/7289856.stm. Retrieved on May 2, 2011.
-
(2011)
Plastic Card Fraud Goes Back Up (March 2008)
-
-
-
4
-
-
38549116017
-
The unbearable lightness of PIN cracking
-
Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers
-
Berkman, O.; and Ostrovsky, O. M. The unbearable lightness of PIN cracking. In Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security, FC'07/USEC'07, Berlin, Heidelberg, 2007, Springer-Verlag, 224-238. ISBN: 3-540-77365-7, 978-3-540-77365-8. Available at http://portal.acm.org/citation.cfm?id=1785594. 1785622. (Pubitemid 351153055)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4886
, pp. 224-238
-
-
Berkman, O.1
Ostrovsky, O.M.2
-
6
-
-
34147132425
-
Evaluation techniques for biometrics-based authentication systems (FRR)
-
doi.
-
Bolle, R. M.; Pankanti, S.; and Ratha, N. K. Evaluation techniques for biometrics-based authentication systems (FRR). International Conference on Pattern Recognition, 2:2831, 2000. doi: http://doi.ieeecomputersociety.org/10. 1109/ICPR.2000.906204.
-
(2000)
International Conference on Pattern Recognition
, vol.2
, pp. 2831
-
-
Bolle, R.M.1
Pankanti, S.2
Ratha, N.K.3
-
7
-
-
81155145286
-
-
January 2006. Retrieved on January 15
-
Boyle, M. Let your fingers do the paying. Available at http://money.cnn.com/2006/01/24/magazines/fortune/pluggedinfortunebiometrics/? cnn=yes, January 2006. Retrieved on January 15, 2010.
-
(2010)
Let Your Fingers Do the Paying
-
-
Boyle, M.1
-
8
-
-
84873903909
-
A reference architecture for biometric template protection based on pseudo identities
-
Darmstadt, Germany
-
Breebaart, J.; Busch, C.; Grave, J.; and Kindt, E. A reference architecture for biometric template protection based on pseudo identities. In Proceedings of the BIOSIG, Darmstadt, Germany, 2008, 25-38.
-
(2008)
Proceedings of the BIOSIG
, pp. 25-38
-
-
Breebaart, J.1
Busch, C.2
Grave, J.3
Kindt, E.4
-
9
-
-
70350155262
-
Intersubject differences in false nonmatch rates for a fingerprint-based authentication system
-
Article ID 896383, 2009
-
Breebaart, J.; Akkermans, T.; and Kelkboom, E. Intersubject differences in false nonmatch rates for a fingerprint-based authentication system. EURASIP Journal on Advances in Signal Processing, 2009, Article ID 896383, 2009, 1-9.
-
(2009)
EURASIP Journal on Advances in Signal Processing
, pp. 1-9
-
-
Breebaart, J.1
Akkermans, T.2
Kelkboom, E.3
-
10
-
-
81155145284
-
3D face recognition for unattended border control
-
Busch, C.; Nouak, A.; Zhou, X.; Suchier, J.-M.; Kelkboom, E. J. C.; and Kevenaar, T. 3D face recognition for unattended border control. In Proc. Net-ID 2008 Conference, 2008, 126-136.
-
(2008)
Proc. Net-ID 2008 Conference
, pp. 126-136
-
-
Busch, C.1
Nouak, A.2
Zhou, X.3
Suchier, J.-M.4
Kelkboom, E.J.C.5
Kevenaar, T.6
-
11
-
-
33644816032
-
Performance evaluation of fingerprint verification systems
-
R. Cappelli, D. Maio, D. Maltoni, J.L. Wayman, and A.K. Jain Performance evaluation of fingerprint verification systems IEEE Transactions on Pattern Analysis and Machine Intelligence 28 1 2006 3 18
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.1
, pp. 3-18
-
-
Cappelli, R.1
Maio, D.2
Maltoni, D.3
Wayman, J.L.4
Jain, A.K.5
-
12
-
-
48649088535
-
Multi-bits biometric string generation based on the likelihood ratio
-
K.W. Bowyer, P.J. Flynn, V. Govindaraju, N. Ratha, University of Notre Dame Washington, DC
-
C. Chen, R.N.J. Veldhuis, T.A.M. Kevenaar, and A.H.M. Akkermans Multi-bits biometric string generation based on the likelihood ratio K.W. Bowyer, P.J. Flynn, V. Govindaraju, N. Ratha, IEEE Conference on Biometrics: Theory, Applications and Systems 2007 University of Notre Dame Washington, DC 1 6
-
(2007)
IEEE Conference on Biometrics: Theory, Applications and Systems
, pp. 1-6
-
-
Chen, C.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
-
13
-
-
52049107821
-
Biometric binary string generation with detection rate optimized bit allocation
-
Workshop on Biometrics, Anchorage, Alaska, June 2008
-
Chen, C.; Veldhuis, R.; Kevenaar, T.; and Akkermans, A. Biometric binary string generation with detection rate optimized bit allocation. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition. Workshop on Biometrics, Anchorage, Alaska, June 2008, 1-7.
-
IEEE Computer Society Conference on Computer Vision and Pattern Recognition
, pp. 1-7
-
-
Chen, C.1
Veldhuis, R.2
Kevenaar, T.3
Akkermans, A.4
-
14
-
-
68949091963
-
Biometric quantization through detection rate optimized bit allocation
-
Article ID 784834
-
Chen, C.; Veldhuis, R. N. J.; Kevenaar, T. A. M.; and Akkermans, A. H. M. Biometric quantization through detection rate optimized bit allocation. EURASIP Journal on advances in signal processing, Article ID 784834, 2009, 1-16.
-
(2009)
EURASIP Journal on Advances in Signal Processing
, pp. 1-16
-
-
Chen, C.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
-
15
-
-
0037699592
-
Usability and biometric verification at the ATM interface
-
Ft. Lauderdale, FL, April 5-10
-
Coventry, L.; De Angeli, A.; and Johnson, G. Usability and biometric verification at the ATM interface. In Computer Human Interfaces, Ft. Lauderdale, FL, April 5-10, 2003, 153160.
-
(2003)
Computer Human Interfaces
, pp. 153-160
-
-
Coventry, L.1
De Angeli, A.2
Johnson, G.3
-
16
-
-
37849041688
-
Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation
-
Doddington, G.; Liggett, W.; Martin, A.; Przybocki, M.; and Reynolds, D. Sheep, goats, lambs and wolves a statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation. In International Conference on Spoken Language Processing, 1998.
-
(1998)
International Conference on Spoken Language Processing
-
-
Doddington, G.1
Liggett, W.2
Martin, A.3
Przybocki, M.4
Reynolds, D.5
-
17
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
C. Cachin, and J. Camenisch (eds.) Springer, Berlin, Heidelberg
-
Dodis, Y.; Reyzin, L.; and Smith, A. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In C. Cachin, and J. Camenisch (eds.), Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science, Vol. 3027, Springer, Berlin, Heidelberg, 2004, 523-540.
-
(2004)
Advances in Cryptology - EUROCRYPT 2004, Lecture Notes in Computer Science
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
18
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith Fuzzy extractors: How to generate strong keys from biometrics and other noisy data SIAM Journal on Computing 38 1 2008 97 139
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
22
-
-
81155145281
-
-
Europay, Mastercard, VISA (EMVCo). Emv 4.2, June 2008
-
Europay, Mastercard, VISA (EMVCo). Emv 4.2, June 2008. Available at www.emvco.com/specifications.aspx.
-
-
-
-
25
-
-
78751489986
-
Consumer sentinel network data book for January-December 2008
-
Federal Trade Commission February
-
Federal Trade Commission. Consumer sentinel network data book for January-December 2008. Technical report, Federal Trade Commission, February 2009.
-
(2009)
Technical Report, Federal Trade Commission
-
-
-
26
-
-
0027615231
-
Protecting poorly chosen secrets from guessing attacks
-
L. Gong, M.A. Lomas, R.M. Needham, and J.H. Saltzer Protecting poorly chosen secrets from guessing attacks IEEE Journal on Selected Areas in Communications 11 5 1993 648 656
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 648-656
-
-
Gong, L.1
Lomas, M.A.2
Needham, R.M.3
Saltzer, J.H.4
-
27
-
-
81155145279
-
-
Identity Theft Resource Center June
-
Identity Theft Resource Center. Identity theft: The aftermath 2008, June 2009. Available at www.idtheftcenter.org/artman2/uploads/1/Aftermath-2008- 20090520.pdf.
-
(2009)
Identity Theft: The Aftermath 2008
-
-
-
32
-
-
81155145273
-
Banking on vein at the ATM
-
P. Jones Banking on vein at the ATM Biometric Technology Today 14 5 2006 8 9
-
(2006)
Biometric Technology Today
, vol.14
, Issue.5
, pp. 8-9
-
-
Jones, P.1
-
34
-
-
30844458593
-
A fuzzy vault scheme
-
DOI 10.1007/s10623-005-6343-z
-
A. Juels, and M. Sudan A fuzzy vault scheme Designs, Codes and Cryptography 38 2006 237 257 (Pubitemid 43102559)
-
(2006)
Designs, Codes, and Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
35
-
-
0033281339
-
A fuzzy commitment scheme
-
ACM Press, New York, NY
-
Juels, A.; and Wattenberg, M. A fuzzy commitment scheme. In Proceedings of the 6th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, 1999, 28-36.
-
(1999)
Proceedings of the 6th ACM Conference on Computer and Communications Security
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
36
-
-
84873924992
-
Multi-sample fusion with template protection
-
A. Brömme, C. Busch, and D. Hühnlein (eds.) Bonn, Germany, September 17-18
-
Kelkboom, E.; Breebaart, J.; Veldhuis, R.; Zhou, X.; and Busch, C. Multi-sample fusion with template protection. In A. Brömme, C. Busch, and D. Hühnlein (eds.), Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, Bonn, Germany, September 17-18, 2009a, 55-67.
-
(2009)
Proceedings of the Special Interest Group on Biometrics and Electronic Signatures
, pp. 55-67
-
-
Kelkboom, E.1
Breebaart, J.2
Veldhuis, R.3
Zhou, X.4
Busch, C.5
-
37
-
-
37849002150
-
3D face: Biometric template protection for 3D face recognition
-
Seoul, Korea
-
Kelkboom, E. J. C.; Gökberk, B.; Kevenaar, T. A. M.; Akkermans, A. H. M.; and van der Veen, M. 3D face: Biometric template protection for 3D face recognition. In Proceedings of the International Conference on Biometrics, Seoul, Korea, 2007, 566-573.
-
(2007)
Proceedings of the International Conference on Biometrics
, pp. 566-573
-
-
Kelkboom, E.J.C.1
Gökberk, B.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
Van Der Veen, M.5
-
38
-
-
71749099592
-
Pitfall of the detection rate optimized bit allocation within template protection and a remedy
-
Washington, DC
-
Kelkboom, E. J. C.; de Groot, K. T. J.; Chen, C.; Breebaart, J.; and Veldhuis, R. N. J. Pitfall of the detection rate optimized bit allocation within template protection and a remedy. In IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems, Washington, DC, 2009b, 1-8.
-
(2009)
IEEE 3rd International Conference on Biometrics: Theory, Applications and Systems
, pp. 1-8
-
-
Kelkboom, E.J.C.1
De Groot, K.T.J.2
Chen, C.3
Breebaart, J.4
Veldhuis, R.N.J.5
-
39
-
-
79751506206
-
Analytical template protection performance and maximum key size given a gaussian modeled biometric source
-
Orlando, FL, April
-
Kelkboom, E. J. C.; Breebaart, J.; Buhan, I.; and Veldhuis, R. N. J. Analytical template protection performance and maximum key size given a gaussian modeled biometric source. In Proceedings of the SPIE Defense, Security and Sensing, Orlando, FL, April 2010.
-
(2010)
Proceedings of the SPIE Defense, Security and Sensing
-
-
Kelkboom, E.J.C.1
Breebaart, J.2
Buhan, I.3
Veldhuis, R.N.J.4
-
40
-
-
8844225798
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J. Kittler, M. Nixon, Springer Berlin, Heidelberg
-
J.P. Linnartz, and P. Tuyls New shielding functions to enhance privacy and prevent misuse of biometric templates J. Kittler, M. Nixon, Audio and Video-based Biometric Person Authentication, Lecture Notes in Computer Science, 2688 2003 Springer Berlin, Heidelberg 1059
-
(2003)
Audio and Video-based Biometric Person Authentication, Lecture Notes in Computer Science, 2688
, pp. 1059
-
-
Linnartz, J.P.1
Tuyls, P.2
-
42
-
-
70350154686
-
IBG comparative biometric testing - Round 6
-
Middlesex, UK
-
Maio, D.; Maltoni, D.; Cappelli, R.; Wayman, J. L.; and Jain, A. K. IBG comparative biometric testing - Round 6. Technical report, International Biometric Group, Middlesex, UK, 2006.
-
(2006)
Technical Report, International Biometric Group
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
43
-
-
0003644836
-
-
National Physics Laboratory, Middlesex, UK
-
Mansfield, T.; Kelly, G.; Chandler, D.; and Kane, J. Biometric product testing: Final report. Technical report, Centre for Mathematics and Scientific Computing, National Physics Laboratory, Middlesex, UK, 2001.
-
(2001)
Biometric Product Testing: Final Report. Technical Report, Centre for Mathematics and Scientific Computing
-
-
Mansfield, T.1
Kelly, G.2
Chandler, D.3
Kane, J.4
-
44
-
-
65749094416
-
Biometrics: A fad or the future?
-
D.B. McIntosch Biometrics: a fad or the future? Biometric Technology Today 17 5 2009 9 11
-
(2009)
Biometric Technology Today
, vol.17
, Issue.5
, pp. 9-11
-
-
McIntosch, D.B.1
-
47
-
-
77955217681
-
Chip and PIN is broken
-
Oakland, CA, May
-
Murdoch, S. J.; Drimer, S.; Anderson, R.; and Bond, M. Chip and PIN is broken. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2010.
-
(2010)
IEEE Symposium on Security and Privacy
-
-
Murdoch, S.J.1
Drimer, S.2
Anderson, R.3
Bond, M.4
-
48
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
DOI 10.1109/TIFS.2007.908165
-
Nandakumar, K.; Jain, A. K.; and Pankanti, S. Fingerprint-based fuzzy vault: Implementation and performance. In IEEE Transactions on Information Forensics and Security, 2007, 744-757. (Pubitemid 350157947)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
49
-
-
81155149388
-
Interoperability of biometric transactions in Japanese bank systems
-
Bangkok, Thailand, June
-
Ogata, H. Interoperability of biometric transactions in Japanese bank systems. In 1st ASEAN-FBI Meeting, Bangkok, Thailand, June 2009.
-
(2009)
1st ASEAN-FBI Meeting
-
-
Ogata, H.1
-
51
-
-
10744222590
-
Mcyt baseline corpus: A bimodal biometric database
-
December
-
Ortega-Garcia, J.; Fierrez-Aguilar, J.; Simon, D.; Gonzalez, M. F. J.; Espinosa, V.; Satue, A.; Hernaez, I.; Igarza, J. J.; Vivaracho, C.; Escudero, D.; and Moro, Q. I. Mcyt baseline corpus: A bimodal biometric database. IEEE Proceedings Vision, Image and Signal Processing, Special Issue on Biometrics on the Internet, 150, 6, December 2003, 395-401.
-
(2003)
IEEE Proceedings Vision, Image and Signal Processing, Special Issue on Biometrics on the Internet
, vol.150
, Issue.6
, pp. 395-401
-
-
Ortega-Garcia, J.1
Fierrez-Aguilar, J.2
Simon, D.3
Gonzalez, M.F.J.4
Espinosa, V.5
Satue, A.6
Hernaez, I.7
Igarza, J.J.8
Vivaracho, C.9
Escudero, D.10
Moro, Q.I.11
-
52
-
-
33745164328
-
Overview of the face recognition grand challenge
-
DOI 10.1109/CVPR.2005.268, 1467368, Proceedings - 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2005
-
Phillips, P. J.; Flynn, P. J.; Scruggs, T.; Bowyer, K. W.; Chang, J.; Hoffman, K.; Marques, J.; Min, J.; and Worek, W. Overview of the face recognition grand challenge. In IEEE Conference on Computer Vision and Pattern Recognition, 2005, 947-954. (Pubitemid 43897294)
-
(2005)
Proceedings - 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, CVPR 2005
, vol.1
, pp. 947-954
-
-
Phillips, P.J.1
Flynn, P.J.2
Scruggs, T.3
Bowyer, K.W.4
Chang, J.5
Hoffman, K.6
Marques, J.7
Min, J.8
Worek, W.9
-
53
-
-
37149000901
-
FRVT 2006 and ICE 2006: Large-scale results
-
Phillips, P. J.; Scruggs, W. T.; O'Toole, A. J.; Flynn, P. J.; Bowyer, K. W.; Schott, C. L.; and Sharpe, M. FRVT 2006 and ICE 2006: Large-scale results. Technical report IR 7408, NIST National Institute of Standards and Technology, 2007.
-
(2007)
Technical Report IR 7408, NIST National Institute of Standards and Technology
-
-
Phillips, P.J.1
Scruggs, W.T.2
O'Toole, A.J.3
Flynn, P.J.4
Bowyer, K.W.5
Schott, C.L.6
Sharpe, M.7
-
54
-
-
0344271898
-
Minutiae-based enhanced fingerprint verification assessment on image quality factors
-
September
-
Simon-Zorita, D.; Ortega-Garcia, J.; Sanchez-Asenjo, M.; and Gonzales Rodriguez, J. Minutiae-based enhanced fingerprint verification assessment on image quality factors. In Proceedings of the 2003 International Conference on Image Processing (ICIP), 2, September 2003, 891-894.
-
(2003)
Proceedings of the 2003 International Conference on Image Processing (ICIP)
, vol.2
, pp. 891-894
-
-
Simon-Zorita, D.1
Ortega-Garcia, J.2
Sanchez-Asenjo, M.3
Gonzales Rodriguez, J.4
-
57
-
-
75149172126
-
-
The UK Payments Association March
-
The UK Payments Association. 2008 fraud figures announced by APACS, March 2009. Available at www.ukpayments.org.uk/media-centre/press-releases/-/page/ 685/.
-
(2009)
2008 Fraud Figures Announced by APACS
-
-
-
59
-
-
70350144415
-
Latest biometric test results - Performance, quality and interoperability
-
Toth, B.; and Mansfield, T. Latest biometric test results - Performance, quality and interoperability. Technical report, Deloitte, 2006.
-
(2006)
Technical Report, Deloitte
-
-
Toth, B.1
Mansfield, T.2
-
60
-
-
26444507172
-
Practical biometric authentication with template protection
-
Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
-
Tuyls, P.; Akkermans, A. H. M.; Kevenaar, T. A. M.; Schrijen, G. J.; Bazen, A. M.; and Veldhuis, R. N. J. Practical biometric authentication with template protection. In Audio and Videobased Biometric Person Authentication, Springer, Berlin, Germany, 2005, 436-446. (Pubitemid 41423060)
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
63
-
-
80054922210
-
Biometric authentication in relation to payment systems and ATMs
-
G.A. von Graevenitz Biometric authentication in relation to payment systems and ATMs Datenschutz und Datensicherheit 31 9 2007 681 683
-
(2007)
Datenschutz und Datensicherheit
, vol.31
, Issue.9
, pp. 681-683
-
-
Von Graevenitz, G.A.1
-
65
-
-
33845513531
-
Empirical studies of the existence of the biometric menagerie in the FRGC 2.0 color image corpus
-
Wittman, M.; Davis, P.; and Flynn, P. Empirical studies of the existence of the biometric menagerie in the FRGC 2.0 color image corpus. Computer Vision and Pattern Recognition Workshop, 0, 33, 2006.
-
(2006)
Computer Vision and Pattern Recognition Workshop
, vol.33
-
-
Wittman, M.1
Davis, P.2
Flynn, P.3
-
66
-
-
73849124889
-
Spectral representations of fingerprint minutiae subsets
-
IEEE Computer Society Press, Los Alamitos, CA, October
-
Xu, H.; and Veldhuis, R. N. J. Spectral representations of fingerprint minutiae subsets. In Proceedings of the 2009 2nd International Congress on Image and Signal Processing. IEEE Computer Society Press, Los Alamitos, CA, October 2009.
-
(2009)
Proceedings of the 2009 2nd International Congress on Image and Signal Processing
-
-
Xu, H.1
Veldhuis, R.N.J.2
-
67
-
-
69749099895
-
Fingerprint verification using spectral minutiae representations
-
H. Xu, R.N.J. Veldhuis, A.M. Bazen, T.A.M. Kevenaar, T.A.H.M. Akkermans, and B. Gökberk Fingerprint verification using spectral minutiae representations IEEE Transactions on Information Forensics and Security 4 3 2009 397 409
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.3
, pp. 397-409
-
-
Xu, H.1
Veldhuis, R.N.J.2
Bazen, A.M.3
Kevenaar, T.A.M.4
Akkermans, T.A.H.M.5
Gökberk, B.6
-
68
-
-
76349107830
-
A fast minutiae-based fingerprint recognition system
-
H. Xu, R.N.J. Veldhuis, T.A.M. Kevenaar, and T.A.H.M. Akkermans A fast minutiae-based fingerprint recognition system IEEE Systems Journal 3 4 2009 418 427
-
(2009)
IEEE Systems Journal
, vol.3
, Issue.4
, pp. 418-427
-
-
Xu, H.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, T.A.H.M.4
-
69
-
-
34748908452
-
Worms, chameleons, phantoms and doves: New additions to the biometrie menagerie
-
DOI 10.1109/AUTOID.2007.380583, 4263204, 2007 IEEE Workshop on Automatic Identification Advanced Technologies - Proceedings
-
Yager, N.; and Dunstone, T. Worms, chameleons, phantoms and doves: New additions to the biometric menagerie. In IEEE Workshop on Automatic Identification Advanced Technologies, Alghero, Italy, 2007, 1-6. (Pubitemid 47487082)
-
(2007)
2007 IEEE Workshop on Automatic Identification Advanced Technologies - Proceedings
, pp. 1-6
-
-
Yager, N.1
Dunstone, T.2
|