-
1
-
-
0141539639
-
Sample images can be independently restored from the face recognition templates'
-
Montral, QC, Canada
-
Adler, A. (2003) 'Sample images can be independently restored from the face recognition templates', Proc. Can. Conf. Elect. Comput. Eng. (CCECE), Montral, QC, Canada, pp.1163-1166.
-
(2003)
Proc. Can. Conf. Elect. Comput. Eng. (CCECE)
, pp. 1163-1166
-
-
Adler, A.1
-
2
-
-
33748110283
-
Fake finger detection by skin distortion analysis
-
DOI 10.1109/TIFS.2006.879289, 1673397
-
Antonelli, A., Capelli, R., Maio, D. and Maltoni, D. (2006) 'Fake finger detection by skin distortion analysis', IEEE Transactions on Information Forensics Security, Vol. 1, No. 3, pp.360-373. (Pubitemid 44304218)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.3
, pp. 360-373
-
-
Antonelli, A.1
Cappelli, R.2
Maio, D.3
Maltoni, D.4
-
3
-
-
85090970199
-
An analysis of data corruption in the storage space'
-
Bairavasundaram, L.N., Goodson, G.R., and Schroeder, B., Dusseau, A.C.A. and Dusseau, R.H.A. (2008) 'An analysis of data corruption in the storage space', Proc. 6th USENIX Conference on File and Storage Technologies, pp.223-238.
-
(2008)
Proc. 6th USENIX Conference on File and Storage Technologies
, pp. 223-238
-
-
Bairavasundaram, L.N.1
Goodson, G.R.2
Schroeder, B.3
Dusseau, A.C.A.4
Dusseau, R.H.A.5
-
4
-
-
33744961868
-
Fake fingerprint detection by odor analysis
-
Advances in Biometrics - International Conference, ICB 2006, Proceedings
-
Baldissera, D., Franco, A., Maio, D. and Maltoni, D. (2006) 'Fake fingerprint detection by odor analysis', Proc. International Conference on Biometric, ICB 2006, LNCS, Vol. 3832, pp.265-272. (Pubitemid 43856380)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3832 LNCS
, pp. 265-272
-
-
Baldisserra, D.1
Franco, A.2
Maio, D.3
Maltoni, D.4
-
5
-
-
0036887662
-
Biometric perils and patches'
-
Bolle, R.M., Connell, J.H. and Ratha, N.K. (2002) 'Biometric perils and patches', Pattern Recognition, Vol. 35, No. 12, pp.2727-2738.
-
(2002)
Pattern Recognition
, vol.35
, Issue.12
, pp. 2727-2738
-
-
Bolle, R.M.1
Connell, J.H.2
Ratha, N.K.3
-
6
-
-
34347337657
-
Audiovisual speech synchrony measure: Application to biometrics'
-
Article ID 70186
-
Bredin, H. and Chollet, G. (2007) 'Audiovisual speech synchrony measure: application to biometrics', EURASIP Journal on Advances in Signal Processing, Article ID 70186, pp.1-11.
-
(2007)
EURASIP Journal on Advances in Signal Processing
, pp. 1-11
-
-
Bredin, H.1
Chollet, G.2
-
7
-
-
80053577188
-
Arficial finger detection by spectrum analysis'
-
Chang, S., Secker, J., Xiao, Q., Reid, B., Bergeron, A. and Almuhtadi, W. (2011) 'Arficial finger detection by spectrum analysis', Int. J. Biometrics, Vol. 3, No. 4, pp.376-389.
-
(2011)
Int. J. Biometrics
, vol.3
, Issue.4
, pp. 376-389
-
-
Chang, S.1
Secker, J.2
Xiao, Q.3
Reid, B.4
Bergeron, A.5
Almuhtadi, W.6
-
9
-
-
33645837429
-
High security iris verification system based on random secret integration'
-
Chin, C.S., Jin, A.T.B. and Ling, D.N.C. (2006) 'High security iris verification system based on random secret integration', Computer Vision and Image Understanding, Vol. 102, pp.169-177.
-
(2006)
Computer Vision and Image Understanding
, vol.102
, pp. 169-177
-
-
Chin, C.S.1
Jin, A.T.B.2
Ling, D.N.C.3
-
10
-
-
84937704662
-
Secure smartcard-based fingerprint authentication'
-
Clancy, T.C., Kiyavash, N. and Lin, D.J. (2003) 'Secure smartcard-based fingerprint authentication', Proc. 2003 ACM SIGMM Workshop Biometrics Method and Application (WBMA), pp.1-10.
-
(2003)
Proc. 2003 ACM SIGMM Workshop Biometrics Method and Application (WBMA)
, pp. 1-10
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
11
-
-
34748927161
-
Power spectrum-based fingerprint vitality detection
-
DOI 10.1109/AUTOID.2007.380614, 4263235, 2007 IEEE Workshop on Automatic Identification Advanced Technologies - Proceedings
-
Coli, P., Marcialis, G.L. and Roli, F. (2007) 'Power spectrum-based fingerprint vitality detection', Proc. IEEE Workshop on Automatic Identification Advanced Technologies, AutoID, pp.169-173. (Pubitemid 47487113)
-
(2007)
2007 IEEE Workshop on Automatic Identification Advanced Technologies - Proceedings
, pp. 169-173
-
-
Coli, P.1
Marcialis, G.L.2
Rolo, F.3
-
12
-
-
0002736715
-
Recognizing persons by their iris patterns: Countermeasures against subterfuge
-
in Jain, A.K., Bolle, R. and Pankanti, S. (Eds.) Kluwer, Cambridge University, Cambridge
-
Daugman, J. (1999) 'Recognizing persons by their iris patterns: countermeasures against subterfuge', in Jain, A.K., Bolle, R. and Pankanti, S. (Eds.): Biometrics: Personal Identification in Networked Society, Kluwer, Cambridge University, Cambridge.
-
(1999)
Biometrics: Personal Identification in Networked Society
-
-
Daugman, J.1
-
14
-
-
80052791591
-
A high performance fingerprint liveness detection method based on quality related features'
-
Galbally, J., Alonso-Fernandez, F., Fierrez, J. and Ortega-Garcia, J. (2012) 'A high performance fingerprint liveness detection method based on quality related features', Future Generation Computer Systems, Vol. 28, No. 1, pp.311-321.
-
(2012)
Future Generation Computer Systems
, vol.28
, Issue.1
, pp. 311-321
-
-
Galbally, J.1
Alonso-Fernandez, F.2
Fierrez, J.3
Ortega-Garcia, J.4
-
15
-
-
84877283124
-
-
available at (accessed on June 2011)
-
Gray, J. (2001) 'Functionality, availability, agility, manageability, scalability -the new priorities of application design', available at http://www.research.microsoft.com/(accessed on June 2011).
-
(2001)
Functionality, availability, agility, manageability, scalability-The new priorities of application design'
-
-
Gray, J.1
-
16
-
-
76549130781
-
The fundamentals of software aging'
-
Grottke, M., Matias, R. and Trivedi, K.S. (2008) 'the fundamentals of software aging', Proc. IEEE Int'l. Symposium on Software Reliability Engineering, pp.1-6.
-
(2008)
Proc. IEEE Int'l. Symposium on Software Reliability Engineering
, pp. 1-6
-
-
Grottke, M.1
Matias, R.2
Trivedi, K.S.3
-
17
-
-
0036037919
-
Private key generation from online handwritten signatures'
-
Hao, F. and Chan, C.W. (2002) 'Private key generation from online handwritten signatures', Information Management & Computer Security, Vol. 10, No. 2, pp.159-164.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 159-164
-
-
Hao, F.1
Chan, C.W.2
-
18
-
-
33747624401
-
Combining crypto with biometrics effectively
-
DOI 10.1109/TC.2006.138
-
Hao, F., anderson, R. and Daugman, J. (2006) 'Combining crypto with biometrics effectively', IEEE Trans. on Computers, Vol. 55, No. 9, pp.1081-1088. (Pubitemid 44263808)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
19
-
-
0003019863
-
Speaker verification using randomized phrase prompting'
-
Higgins, A., Bahler, L. and Porter, J. (1991) 'Speaker verification using randomized phrase prompting', Digital Signal Process., Vol. 1, pp.89-106.
-
(1991)
Digital Signal Process.
, vol.1
, pp. 89-106
-
-
Higgins, A.1
Bahler, L.2
Porter, J.3
-
20
-
-
84877261740
-
Guide to quality control'
-
2nd ed., White Plains, New York
-
Ishikawa, K. (1986) 'Guide to quality control', Asian Productivity Organization, 2nd ed., White Plains, New York.
-
(1986)
Asian Productivity Organization
-
-
Ishikawa, K.1
-
21
-
-
43949116287
-
Biometric template security'
-
Article ID 579416, pp.1-17
-
Jain, A.K., Nandkumar, K. and Nagar, A. (2008) 'Biometric template security', EURASIP Journal of Advances in Signal Processing, Article ID 579416, pp.1-17.
-
(2008)
EURASIP Journal of Advances in Signal Processing
-
-
Jain, A.K.1
Nandkumar, K.2
Nagar, A.3
-
22
-
-
43949119276
-
Liveness detection for embedded face recognition system'
-
Jee, H.K., Jung, S.U. and Yoo, J.H. (2006) 'Liveness detection for embedded face recognition system', International Journal of Biomedical Sciences, Vol. 1, No. 4, pp.235-238.
-
(2006)
International Journal of Biomedical Sciences
, vol.1
, Issue.4
, pp. 235-238
-
-
Jee, H.K.1
Jung, S.U.2
Yoo, J.H.3
-
23
-
-
0036350106
-
A fuzzy vault scheme'
-
Lausanne, Switzerland, 408p
-
Juels, A. and Sudan, M. (2002) 'A fuzzy vault scheme', ISIT 2002, Lausanne, Switzerland, 408p.
-
(2002)
ISIT
, vol.2002
-
-
Juels, A.1
Sudan, M.2
-
24
-
-
33845545401
-
Detector for recognizing the living character of a finger in a fingerprint recognizing apparatus'
-
Kallo, P., Kiss, I., Podmaniczky, A. and Talosi, J. (2001) 'Detector for recognizing the living character of a finger in a fingerprint recognizing apparatus', Dermo Corporation, U.S. Patent No. 6,175,64.
-
(2001)
Dermo Corporation, U.S. Patent No.
, vol.6
, Issue.175
, pp. 64
-
-
Kallo, P.1
Kiss, I.2
Podmaniczky, A.3
Talosi, J.4
-
25
-
-
33750962696
-
Evaluating liveness by face images and the structure tensor'
-
Kollreider, K., Fronthaler, H. and Bigun, J. (2005) 'Evaluating liveness by face images and the structure tensor', Proc. Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pp.17-18.
-
(2005)
Proc. Fourth IEEE Workshop on Automatic Identification Advanced Technologies
, pp. 17-18
-
-
Kollreider, K.1
Fronthaler, H.2
Bigun, J.3
-
26
-
-
12344308304
-
Basic concepts and taxonomy of dependable and secure computing
-
DOI 10.1109/TDSC.2004.2
-
Laprie, A.J.C., Randell, B. and Landwehr, C. (2004) 'Basic concepts and taxonomy of dependable and secure computing', IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 1, pp.11-33. (Pubitemid 40134576)
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.1
, pp. 11-33
-
-
Avizienis, A.1
Laprie, J.-C.2
Randell, B.3
Landwehr, C.4
-
27
-
-
33845540206
-
Anti-fraud biometric sensor that accurately detects blood flow'
-
US Patent #5, 737
-
Lapsley, P., Less, J., Pare, D. and Hoffman, N. (1998) 'Anti-fraud biometric sensor that accurately detects blood flow', SmartTouch, LLC, US Patent #5,737,439.
-
(1998)
SmartTouch, LLC
, pp. 439
-
-
Lapsley, P.1
Less, J.2
Pare, D.3
Hoffman, N.4
-
28
-
-
8844241609
-
Live face detection based on the analysis of fourier spectra'
-
Orlando, Fla, US
-
Li, J., Wang, Y., Tan, T. and Jain, A.K. (2004) 'Live face detection based on the analysis of Fourier spectra', Biometric Technology for Human Identification, Vol. 5404 of Proceedings of SPIE, Orlando, Fla, USA, pp.296-303.
-
(2004)
Biometric Technology for Human Identification 5404 of Proceedings of SPIE
, pp. 296-303
-
-
Li, J.1
Wang, Y.2
Tan, T.3
Jain, A.K.4
-
29
-
-
1342275940
-
-
2nd ed., Springer Professional Computing
-
Maltoni, D., Maio, D., Jain, A.K. and Prabhakar, S. (2009) Handbook of Fingerprint Recognition, 2nd ed., Springer Professional Computing.
-
(2009)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
30
-
-
79959265863
-
An evaluation of indirect attacks and countermeasures in fingerprint verification systems'
-
Martinez-Diaz, M., Fierrez, J., Galbally, J. and Ortega-Garcia, J. (2011) 'An evaluation of indirect attacks and countermeasures in fingerprint verification systems', Pattern Recognition Letters, Vol. 32, No. 12, pp.1643-1651.
-
(2011)
Pattern Recognition Letters
, vol.32
, Issue.12
, pp. 1643-1651
-
-
Martinez-Diaz, M.1
Fierrez, J.2
Galbally, J.3
Ortega-Garcia, J.4
-
31
-
-
37549029284
-
Artificial fingers and irises: Importance of vulnerability analysis'
-
London
-
Matsumoto, T. (2004) 'Artificial fingers and irises: importance of vulnerability analysis', Proc. 7th Int'l. Biometrics Conference, London.
-
(2004)
Proc. 7th Int'l. Biometrics Conference
-
-
Matsumoto, T.1
-
32
-
-
84877297119
-
Assessing the security of advanced biometric systems: Finger, vein and iris'
-
London
-
Matsumoto, T. (2007) 'Assessing the security of advanced biometric systems: finger, vein and iris', Proc. 10th Int'l. Biometrics Conference, London.
-
(2007)
Proc. 10th Int'l. Biometrics Conference
-
-
Matsumoto, T.1
-
33
-
-
0036030112
-
Impact of artificial "gummy" fingers on fingerprint systems
-
DOI 10.1117/12.462719
-
Matsumoto, T., Matsumoto, H., Yamada, K. and Hoshino, S. (2002) 'Impact of artificial gummy fingers on fingerprint systems', Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques IV, San Jose, USA, Vol. 4677, pp.275-89. (Pubitemid 35229811)
-
(2002)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4677
, pp. 275-289
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
34
-
-
27144470400
-
Wavelet based liveness detection'
-
Moon, Y.S., Chen, J.S., Chan, K.C., So, K. and Woo, K.C. (2005) 'Wavelet based liveness detection', Electronics Letters, Vol. 41, No. 20, pp.1112-1113.
-
(2005)
Electronics Letters
, vol.41
, Issue.20
, pp. 1112-1113
-
-
Moon, Y.S.1
Chen, J.S.2
Chan, K.C.3
So, K.4
Woo, K.C.5
-
35
-
-
10044293457
-
Comparing passwords, tokens, and biometrics for user authentication
-
DOI 10.1109/JPROC.2003.819611, Electronic Textiles: A Platform for Pervasive Computing
-
O'Gorman, L. (2003) 'Comparing passwords, tokens, and biometrics for user authentication', Proceedings of the IEEE, Vol. 91 No. 12, pp.2021-2040. (Pubitemid 40890781)
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'Gorman, L.1
-
36
-
-
23944440664
-
Time-series detection of perspiration as a liveness test in fingerprint devices
-
DOI 10.1109/TSMCC.2005.848192
-
Parthasaradhi, S.T.V., Derakhshani, R., Hornak, L.A. and Schuckers, S.A.C. (2005) 'Time-series detection of perspiration as a liveness test in fingerprint devices', IEEE Transactions on Systems Man and Cybernetics C, Vol. 35, No. 3, pp.335-343. (Pubitemid 41194746)
-
(2005)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.35
, Issue.3
, pp. 335-343
-
-
Parthasaradhi, S.T.V.1
Derakhshani, R.2
Hornak, L.A.3
Schuckers, S.A.C.4
-
37
-
-
0032045780
-
The FERET database and evaluation procedure for face-recognition algorithms
-
PII S026288569700070X
-
Phillips, P.J., Wechsler, H., Huang, J. and Rauss, P.J. (1998) 'the FERET database and evaluation procedure for face recognition algorithms', Image and Vision Computing Journal, Vol. 16, No. 5, pp.295-306. (Pubitemid 128393579)
-
(1998)
Image and Vision Computing
, vol.16
, Issue.5
, pp. 295-306
-
-
Phillips, P.J.1
Wechsler, H.2
Huang, J.3
Rauss, P.J.4
-
38
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
Ratha, N.K., Chikkerur, S., Connell, J.H. and Bolle, R.M. (2007) 'Generating cancelable fingerprint templates', IEEE Trans. Pattern Analysis and Machine Intell., Vol. 29, No. 4, pp.561-572. (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
39
-
-
0442319139
-
An analysis of minutiae matching strength'
-
June, Halmstad, Sweden
-
Ratha, N.K., Connell, J.H. and Bolle, R.M. (2001) 'An analysis of minutiae matching strength', Paper presented at the International Conference of Audio and Video based Biometric Authentication, 6-8 June, Halmstad, Sweden.
-
(2001)
Paper presented at the International Conference of Audio and Video based Biometric Authentication
, pp. 6-8
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
40
-
-
57049151789
-
A new antispoofing approach for biometric devices'
-
Reddy, P.V., Kumar, A., Rahman, S.M.K. and Mundra, T.S. (2008) 'A new antispoofing approach for biometric devices', IEEE Transactions on Biomedical Circuits and Systems, Vol. 2, No. 4, pp.328-337.
-
(2008)
IEEE Transactions on Biomedical Circuits and Systems
, vol.2
, Issue.4
, pp. 328-337
-
-
Reddy, P.V.1
Kumar, A.2
Rahman, S.M.K.3
Mundra, T.S.4
-
41
-
-
33846817469
-
Biometric attack vectors and defenses'
-
Roberts, C. (2007) 'Biometric attack vectors and defenses', Computers and Security, Vol. 26, No. 1, pp.14-25.
-
(2007)
Computers and Security
, vol.26
, Issue.1
, pp. 14-25
-
-
Roberts, C.1
-
42
-
-
85024264226
-
The uses and abuses of biometrics'
-
Schneier, B. (1999) 'the uses and abuses of biometrics', Communication to ACM, Vol. 42, No. 8, 136p.
-
(1999)
Communication to ACM
, vol.42
, Issue.8
-
-
Schneier, B.1
-
44
-
-
84877277707
-
The challenges of uid environment'
-
Lucknow
-
Singh, Y.N. (2011) 'the challenges of UID environment', Proc. of National Conference UID-2011, Impact of Aadhaar in Governance, Computer Society of India, Lucknow, pp.153-161.
-
(2011)
Proc. of National Conference UID-2011, Impact of Aadhaar in Governance, Computer Society of India
, pp. 153-161
-
-
Singh, Y.N.1
-
45
-
-
69949148053
-
Biometric method for human identification using electrocardiogram'
-
Singh, Y.N. and Gupta, P. (2009) 'Biometric method for human identification using electrocardiogram', Proceedings of ICB 2009, Lecture Notes of Computer Science, Vol. 5558, pp.1270-1279.
-
(2009)
Proceedings of ICB 2009, Lecture Notes of Computer Science
, vol.5558
, pp. 1270-1279
-
-
Singh, Y.N.1
Gupta, P.2
-
46
-
-
79951771128
-
Correlation-based classification of heartbeats for individual identification'
-
Springer
-
Singh, Y.N. and Gupta, P. (2011) 'Correlation-based classification of heartbeats for individual identification', Journal of Soft Computing, Vol. 15, No. 3, pp.449-460, Springer.
-
(2011)
Journal of Soft Computing
, vol.15
, Issue.3
, pp. 449-460
-
-
Singh, Y.N.1
Gupta, P.2
-
48
-
-
84892162179
-
Bioelectrical signals as emerging biometrics: Issues and challenges'
-
Article ID 712032 doi:10.5402/2012/712032
-
Singh, Y.N. and Singh, S.K. (2012) 'Bioelectrical signals as emerging biometrics: issues and challenges', ISRN Signal Processing, Article ID 712032, 13p, doi:10.5402/2012/712032.
-
(2012)
ISRN Signal Processing
-
-
Singh, Y.N.1
Singh, S.K.2
-
49
-
-
84865577334
-
Fusion of electrocardiogram with unobtrusive biometrics: An efficient individual authentication system'
-
Singh, Y.N., Singh, S.K. and Gupta, P. (2012) 'Fusion of electrocardiogram with unobtrusive biometrics: an efficient individual authentication system', Pattern Recognition Letters, Vol. 33, pp.1932-1941.
-
(2012)
Pattern Recognition Letters
, vol.33
, pp. 1932-1941
-
-
Singh, Y.N.1
Singh, S.K.2
Gupta, P.3
-
50
-
-
19444368925
-
Biometric encryption: Enrollment and verification procedures'
-
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R. and Kumar, B.V. (1998) 'Biometric encryption: enrollment and verification procedures', Proc. SPIE, Optical Pattern Recognition IX, Vol. 3386, pp.24-35.
-
(1998)
Proc. SPIE, Optical Pattern Recognition IX
, vol.3386
, pp. 24-35
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
51
-
-
70449095873
-
Secure speech template protection in speaker verification system'
-
Teoh, A.B.J. and Chong, L.Y. (2010) 'Secure speech template protection in speaker verification system', Speech Communication, Vol. 52, pp.150-163.
-
(2010)
Speech Communication
, vol.52
, pp. 150-163
-
-
Teoh, A.B.J.1
Chong, L.Y.2
-
52
-
-
38349055942
-
Biometric liveness detection'
-
Toth, B. (2005) 'Biometric liveness detection', Information Security Bulletin, Vol. 10, pp.291-297.
-
(2005)
Information Security Bulletin
, vol.10
, pp. 291-297
-
-
Toth, B.1
-
53
-
-
8844228915
-
Attacks on biometric systems: A case study in fingerprints'
-
18-22 January, San Jose, CA
-
Uludag, U. and Jain, A.K. (2004) 'Attacks on biometric systems: a case study in fingerprints', Paper presented at the SPIE-EI Security, Steganography and Watermarking of Multimedia Contents VI, 18-22 January, San Jose, CA.
-
(2004)
Paper presented at the SPIE-EI Security, Steganography and Watermarking of Multimedia Contents
, vol.7
-
-
Uludag, U.1
Jain, A.K.2
-
54
-
-
12344281169
-
-
US Department Of Transportation ( Report AV-1998-1123
-
US Department of Transportation (1998) 'Audit report: advance automation system', Report AV-1998-113.
-
(1998)
Audit report: advance automation system'
-
-
-
56
-
-
71149090310
-
Sorted index numbers for privacy preserving face recognition'
-
Article ID 260148
-
Wang, Y. and Hatzinakos, D. (2009) 'Sorted index numbers for privacy preserving face recognition', EURASIP Journal on Advances in Signal Processing, Article ID 260148, pp.1-16.
-
(2009)
EURASIP Journal on Advances in Signal Processing
, pp. 1-16
-
-
Wang, Y.1
Hatzinakos, D.2
-
57
-
-
34948888840
-
Biometrics: Easy to steal, hard to regain identity'
-
Watson, A. (2007) 'Biometrics: easy to steal, hard to regain identity', Nature, Vol. 449, 535p.
-
(2007)
Nature
, vol.449
-
-
Watson, A.1
|