Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
Biometrics: Personal Identification in Networked SocietyOctober 2005
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-28539-9
Published:01 October 2005
Skip Bibliometrics Section
Reflects downloads up to 29 Nov 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Diaz M, Ferrer M and Vessio G (2024). Explainable offline automatic signature verifier to support forensic handwriting examiners, Neural Computing and Applications, 36:5, (2411-2427), Online publication date: 1-Feb-2024.
  2. Ghosh S, Dhall A, Hayat M, Knibbe J and Ji Q (2024). Automatic Gaze Analysis: A Survey of Deep Learning Based Approaches, IEEE Transactions on Pattern Analysis and Machine Intelligence, 46:1, (61-84), Online publication date: 1-Jan-2024.
  3. Ruan S, Li Y and Qin H (2024). LSFM: Light Style and Feature Matching for Efficient Cross-Domain Palmprint Recognition, IEEE Transactions on Information Forensics and Security, 19, (9598-9612), Online publication date: 1-Jan-2024.
  4. Zhang L, Tan S, Chen Y and Yang J (2023). A Phoneme Localization Based Liveness Detection for Text-Independent Speaker Verification, IEEE Transactions on Mobile Computing, 22:10, (5611-5624), Online publication date: 1-Oct-2023.
  5. Chen X, Zhang L and Liu J (2023). Verifiable Homomorphic Secret Sharing for Low Degree Polynomials, IEEE Transactions on Dependable and Secure Computing, 20:4, (2882-2895), Online publication date: 1-Jul-2023.
  6. Chen X and Zhang L (2023). Publicly Verifiable Homomorphic Secret Sharing for Polynomial Evaluation, IEEE Transactions on Information Forensics and Security, 18, (4609-4624), Online publication date: 1-Jan-2023.
  7. Acar A, Aksu H, Uluagac A and Akkaya K (2021). A Usable and Robust Continuous Authentication Framework Using Wearables, IEEE Transactions on Mobile Computing, 20:6, (2140-2153), Online publication date: 1-Jun-2021.
  8. Yousefi F, Kolivand H and Baker T (2021). SaS-BCI: a new strategy to predict image memorability and use mental imagery as a brain-based biometric authentication, Neural Computing and Applications, 33:9, (4283-4297), Online publication date: 1-May-2021.
  9. Chaudhary G and Srivastava S (2019). A robust 2D-Cochlear transform-based palmprint recognition, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:3, (2311-2328), Online publication date: 1-Feb-2020.
  10. ACM
    Gui Q, Ruiz-Blondet M, Laszlo S and Jin Z (2019). A Survey on Brain Biometrics, ACM Computing Surveys, 51:6, (1-38), Online publication date: 30-Nov-2019.
  11. ACM
    Wan C, Wang L and Phoha V (2018). A Survey on Gait Recognition, ACM Computing Surveys, 51:5, (1-35), Online publication date: 30-Sep-2019.
  12. Sawant M and Bhurchandi K (2019). Age invariant face recognition, Artificial Intelligence Review, 52:2, (981-1008), Online publication date: 1-Aug-2019.
  13. ACM
    Hu H, Chen D and Zheng J Online Handwriting Signature Verification Based on Template Clustering Proceedings of the 2019 3rd International Workshop on Education, Big Data and Information Technology, (129-135)
  14. Youbi Z, Boubchir L and Boukrouche A (2019). Human ear recognition based on local multi-scale LBP features with city-block distance, Multimedia Tools and Applications, 78:11, (14425-14441), Online publication date: 1-Jun-2019.
  15. Traore I, Alshahrani M and Obaidat M (2019). State of the art and perspectives on traditional and emerging biometrics, Security and Privacy, 1:6, Online publication date: 1-Jan-2019.
  16. Douglas M, Bailey K, Leeney M and Curran K (2018). An overview of steganography techniques applied to the protection of biometric data, Multimedia Tools and Applications, 77:13, (17333-17373), Online publication date: 1-Jul-2018.
  17. ACM
    Blue L, Vargas L and Traynor P Hello, Is It Me You're Looking For? Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, (123-133)
  18. ACM
    Liu S, Xu G, Zhang Y and Li W A Study of Temporal Stability on Finger-Vein Recognition Accuracy Using a Steady-State Model Proceedings of the 2018 10th International Conference on Bioinformatics and Biomedical Technology, (7-12)
  19. ACM
    Kumar M, Prasad M and Raju U Iris Template Protection using Discrete Logarithm Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, (43-49)
  20. ACM
    Kumar M, Prasad M and Raju U Cancellable Fingerprint Template Generation Using Rectangle-Based Adjoining Minutiae Pairs Proceedings of the 2018 2nd International Conference on Biometric Engineering and Applications, (30-37)
  21. Dai H, Pears N and Smith W A Data-Augmented 3D Morphable Model of the Ear 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018), (404-408)
  22. Loukhaoukha K, Refaey A, Zebbiche K and Shami A (2018). Efficient and secure cryptosystem for fingerprint images in wavelet domain, Multimedia Tools and Applications, 77:8, (9325-9339), Online publication date: 1-Apr-2018.
  23. Banerjee A, Basu S, Basu S and Nasipuri M (2018). ARTeM, Multimedia Tools and Applications, 77:5, (5857-5884), Online publication date: 1-Mar-2018.
  24. Neha and Chatterjee K (2017). An Efficient Biometric Based Remote User Authentication Technique for Multi-server Environment, Wireless Personal Communications: An International Journal, 97:3, (4729-4745), Online publication date: 1-Dec-2017.
  25. Chandra S and Maheshkar S (2017). Verification of static signature pattern based on random subspace, REP tree and bagging, Multimedia Tools and Applications, 76:18, (19139-19171), Online publication date: 1-Sep-2017.
  26. Huang P, Li B, Guo L, Jin Z and Chen Y A Robust and Reusable ECG-Based Authentication and Data Encryption Scheme for eHealth Systems 2016 IEEE Global Communications Conference (GLOBECOM), (1-6)
  27. Peralta D, Triguero I, García S, Herrera F and Benitez J (2016). DPD-DFF, Information Fusion, 32:PA, (40-51), Online publication date: 1-Nov-2016.
  28. ACM
    Zhang L, Tan S, Yang J and Chen Y VoiceLive Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1080-1091)
  29. Awad A (2016). From classical methods to animal biometrics, Computers and Electronics in Agriculture, 123:C, (423-435), Online publication date: 1-Apr-2016.
  30. ACM
    Hayashi E, Maas M and Hong J Wave to me Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (3453-3462)
  31. Meraoumia A, Chitroub S and Bouridane A Efficient person identification by fusion of multiple palmprint representations Proceedings of the 4th international conference on Image and signal processing, (182-191)
  32. Janes R, Brandão A and Dias E (2010). A study on the available biometric technologies used in order to control security in physical access, WSEAS Transactions on Systems and Control, 5:6, (393-402), Online publication date: 1-Jun-2010.
  33. Radhika K, Sheela S, Venkatesha M and Sekhar G Multi-modal authentication using continuous dynamic programming Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication, (228-235)
  34. Azizi A and Pourreza H A novel and efficient method to extract features and vector creation in iris recognition system Proceedings of the 32nd annual German conference on Advances in artificial intelligence, (114-122)
  35. Velisavljevic V (2009). Low-complexity iris coding and recognition based on directionlets, IEEE Transactions on Information Forensics and Security, 4:3, (410-417), Online publication date: 1-Sep-2009.
  36. Hwang S, Lee H and Cho S (2009). Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication, Expert Systems with Applications: An International Journal, 36:7, (10649-10656), Online publication date: 1-Sep-2009.
  37. Chang C, Lee J, Su Y, Huang P and Tu T (2009). Using empirical mode decomposition for iris recognition, Computer Standards & Interfaces, 31:4, (729-739), Online publication date: 1-Jun-2009.
  38. Amayeh G, Bebis G, Erol A and Nicolescu M (2009). Hand-based verification and identification using palm-finger segmentation and fusion, Computer Vision and Image Understanding, 113:4, (477-501), Online publication date: 1-Apr-2009.
  39. Abhyankar A and Schuckers S (2009). Integrating a wavelet based perspiration liveness check with fingerprint recognition, Pattern Recognition, 42:3, (452-464), Online publication date: 1-Mar-2009.
  40. ACM
    Kekre H and Bharadi V Adaptive feature set updating algorithm for multimodal biometrics Proceedings of the International Conference on Advances in Computing, Communication and Control, (277-282)
  41. Vatsa M, Singh R and Noore A (2009). Unification of evidence-theoretic fusion algorithms, IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 39:1, (47-56), Online publication date: 1-Jan-2009.
  42. Vivaracho-Pascual C, Faundez-Zanuy M and Pascual J (2009). An efficient low cost approach for on-line signature recognition based on length normalization and fractional distances, Pattern Recognition, 42:1, (183-193), Online publication date: 1-Jan-2009.
  43. Fíbregas J and Faundez-Zanuy M (2008). Biometric dispersion matcher, Pattern Recognition, 41:11, (3412-3426), Online publication date: 1-Nov-2008.
  44. Bevilacqua V, Cariello L, Columbo D, Daleno D, Dellisanti Fabiano M, Giannini M, Mastronardi G and Castellano M Retinal Fundus Biometric Analysis for Personal Identifications Proceedings of the 4th international conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications - with Aspects of Artificial Intelligence, (1229-1237)
  45. Chen C and Peter Ho P (2008). Statistical pattern recognition in remote sensing, Pattern Recognition, 41:9, (2731-2741), Online publication date: 1-Sep-2008.
  46. Jain A, Nandakumar K and Nagar A (2008). Biometric template security, EURASIP Journal on Advances in Signal Processing, 2008, (1-17), Online publication date: 1-Jan-2008.
  47. Sirlantzis K, Hoque S and Fairhurst M (2008). Diversity in multiple classifier ensembles based on binary feature quantisation with application to face recognition, Applied Soft Computing, 8:1, (437-445), Online publication date: 1-Jan-2008.
  48. Choras R Feature extraction for CBIR and biometrics applications Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7, (1-9)
  49. Sun L, Pan G, Wu Z and Lao S Blinking-based live face detection using conditional random fields Proceedings of the 2007 international conference on Advances in Biometrics, (252-260)
  50. Atanassov K, Boumbarov O, Gluhchev G, Hadjitodorov S, Shannon A and Vassilev V A generalized net model of biometric access-control system Proceedings of the 9th WSEAS international conference on Automatic control, modelling and simulation, (78-81)
  51. Bengio S and Mariéthoz J Biometric person authentication is a multiple classifier problem Proceedings of the 7th international conference on Multiple classifier systems, (513-522)
  52. Buddharaju P, Pavlidis I, Tsiamyrtzis P and Bazakos M (2007). Physiology-Based Face Recognition in the Thermal Infrared Spectrum, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29:4, (613-626), Online publication date: 1-Apr-2007.
  53. Faundez-Zanuy M (2007). On-line signature recognition based on VQ-DTW, Pattern Recognition, 40:3, (981-992), Online publication date: 1-Mar-2007.
  54. Poursaberi A and Araabi B (2007). Iris recognition for partially occluded images, EURASIP Journal on Advances in Signal Processing, 2007:1, (20-20), Online publication date: 1-Jan-2007.
  55. Dagher I, Kobersy W and Nader W (2007). Human hand recognition using IPCA-ICA algorithm, EURASIP Journal on Advances in Signal Processing, 2007:1, (77-77), Online publication date: 1-Jan-2007.
  56. Zhou J, Su G, Jiang C, Deng Y and Li C (2007). A face and fingerprint identity authentication system based on multi-route detection, Neurocomputing, 70:4-6, (922-931), Online publication date: 1-Jan-2007.
  57. Kong A, Zhang D and Kamel M (2006). Palmprint identification using feature-level fusion, Pattern Recognition, 39:3, (478-487), Online publication date: 1-Mar-2006.
  58. Chin C, Jin A and Ling D Iris verification based on Iris feature and secret pseudo-random number Proceedings of the 4th WSEAS International Conference on Electronic, Signal Processing and Control, (1-6)
  59. Hong L and Jain A (1998). Integrating Faces and Fingerprints for Personal Identification, IEEE Transactions on Pattern Analysis and Machine Intelligence, 20:12, (1295-1307), Online publication date: 1-Dec-1998.
Contributors
  • Michigan State University
  • IBM Thomas J. Watson Research Center
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations