1 |
Arun Ross, Anil Jain, Jian-Zhong Qian, : Information Fusion in Biometrics. Pattern Recognition Letters, vol. 24, issue 13, p2115-2125, 2003
DOI
ScienceOn
|
2 |
P. Belhumeur, J. Hespanha, D.Kriegman : Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection. IEEE Trans. on PAMI, Vol. 19, No. 7 p711-720, 1997
DOI
ScienceOn
|
3 |
박현애, 박강령 : 휴대폰에서의 홍채인식을 위한 고속 홍채검출에 관한 연구, 대한전자공학회 논문지, Vol. 43, SP, No. 2, p19-29, 2006. 3
과학기술학회마을
|
4 |
Dal-ho Cho, Kang Ryoung Park, Dae Woong Rhee, Yanggon Kim, Jonghoon Yang, : Pupil and Iris Localization for Iris Recognition in Mobile Phones, SNPD, Las Vegas Nevada, USA, June p19-20, 2006
|
5 |
장영균, 강병준, 박강령, 홍채 인식을 위한 포물 허프 변환 기반 눈꺼풀 영역 검출 알고리즘, 대한전자공학회 논문지, 제44권 SP편 제 1호, 2006년 1월
과학기술학회마을
|
6 |
http://land.anycall.com (accessed on 2007. 08. 31)
|
7 |
Byunjun Son, Yillbyung Lee : Biometric Authentication System Using Reduced Joint Feature Vetor of Iris and Face, Lecture Notes in Computer Science, LNCS 3546, pp.513-522, 2005
|
8 |
Song-yi Han, Kang Ryoung Park : Multi-modal Near-IR Face and Iris Recognition by Hierarchical SVM for Mobile Phone, Electronics Letters, Submitted
|
9 |
Hyun-Ae Park, Kang Ryoung Park, : Iris Recognition Based on Score Level Fusion by Using SVM. Pattern Recognition Letters, submitted
|
10 |
Ruud Bolle, Jonathan Connell, Sharanthchandra Pankanti, Nalini Ratha, Andrew Senior 'Guide to Biometrics' Springer Professional Computing. p20-21, 2003
|
11 |
F. Monrose, M.K. Reiter, Q. Li and S. Wetzel, :Cryptographic key generation from voice. Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001
|
12 |
M. Turk, A. Pentland : Eigenfaces for Recognition. Journal of Cognitive Neuroscience, Vol. 3 , No. 1 p71-86, 1991
DOI
ScienceOn
|
13 |
http://www.lge.com (accessed on 2007. 08. 31)
|
14 |
강병준, 박강령, : 속눈썹 추출 방법을 이용한 홍채 인식 성능 향상 연구, 한국정보처리학회 논문지 B, 제12-B권, 제3호, p. 233-238, 2005년 6월
과학기술학회마을
DOI
|
15 |
Fengling Han, Jiankun Hu, Xinhuo Yu, Yong Feng and Jie Zhou : A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications. ICB 2006, LNCS3832, p675-681, 2005
|
16 |
Feng Hao, Ross Anderson, John Daugman, : Combining Crypto with Biometrics Effectivel. IEEE Transactions on Computers archive, Volume55, p1081-1088, 2006
DOI
ScienceOn
|
17 |
J. G. Daugman : High Confidence Visual Recognition of Persons by a Test of Statistical Independence, IEEE Trans. Pattern Analysis and Machine Intelligence, Vol. 15, No. 11, p. 1148-1161, 1993
DOI
ScienceOn
|
18 |
이연주, 박강령, 김재희, : 퍼지볼트 기반의 암호키 생성을 위한 불변 홍채코드 추출, 2006년 대한전자공학회 하계학술대회, 제주롯데호텔, 2006. 6. p21-23
|
19 |
F. Monrose, M.K. Reiter and R. Wetzel, : Password hardening based on keystroke dynamics. Proceedings of sixth ACM Conference on Computer and Communications Security, CCCS, 1999
|
20 |
Wen-Hung Liao, Dai-Yun Li : Homomorphic processing techniques for near-infrared images. Proceedings of ICASSP, Vol.3 p461-464, 2003
|
21 |
K. H. Pun et al., : A Face Authentication System for Mobile Devices: Optimization Techniques, Proceedings of SPIE, Vol. 5684, p 265-273, 2005
DOI
|
22 |
M. S. Barlett, J. R. Movellan, T.J. Sejnowski : Face Recognition by Independent Component Analysis. IEEE Trans. on Neural Networks, Vol. 13, No. 6 p1450-1464, 2002
DOI
ScienceOn
|
23 |
Songyi Han, Hyun-Ae Park, Dal-ho Cho, Kang Ryoung Park : Face Recognition Based on Near-Infrared Light using Mobile Phone, Lecture Notes in Computer Science (ICANNGA'2007), Warsaw, Poland, April 11 ' 14, 2007, accepted for publication
|