1 |
R.M. Bolle, J.H. Connel and N.K. Ratha, "Biometric Perils and Patches," Pattern Recognition 35 (2002) pp. 2727-2738.
DOI
|
2 |
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel and J. You, "An Analysis of Biohashing and its variants," Pattern Recognition, vol. 39, pp. 1359-1368, 2006.
DOI
|
3 |
A. Lumini and L. Nanni, "An Improved Biohashing for Human Authentication," Pattern Recognition, vol. 40, pp. 1057-1065, 2007.
DOI
|
4 |
F. Samaria and A. Harter, "Parametrisation of a Stochastic Model for Human Face Identification," 2nd IEEE Workshop on Applications of Computer Vision, pp.138-142, 1994.
|
5 |
A.B.J. Teoh, D.C.L Ngo and A. Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenized Random Number," Pattern Recognition, vol. 37, pp. 2245-2255, 2004.
DOI
|
6 |
A.B.J. Teoh, A. Goh and D.C.L. Ngo, "Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs," IEEE transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, 2006.
|
7 |
A.B.J. Teoh and C.T. Yuang, "Cancelable Biometrics Realization with Multispace Random Projections," IEEE Transactions on Systems, Man, and Cybernetics-Part B: Cybernetics, vol. 37, no. 5, 2007.
|
8 |
M. Turk and A. Pentland, "Eigenfaces for Recognition, Journal of Cognitive," Neuroscience, vol. 3, no. 1, pp. 71-86, 1991.
DOI
|