1 |
Biometrics Research Group, http://biometrics.cse.msu.edu/, 2014년.
|
2 |
Apple, "iOS Security Guide," https://www.apple.com/br/privacy/docs/iOS_Security_Guide_Oct_2014.pdf
|
3 |
FIDO Alliance, "UAF Specifications," https://fidoalliance.org/specifications/download
|
4 |
Biometrics Research Group, "Banking and Biometrics White Paper," http://www.biometricupdate.com/201412/special-report-biometrics-and-banking
|
5 |
Financial Services Commission, Financial Services Commission 2015 work plan, http://www.fsc.go.kr/info/ntc_bref_view.jsp?menu=7210200&bbsid=BBS0029&no=30558
|
6 |
Arun Ross, "From Template to Image : Reconstructing Fingerprint from Minutiae Points, IEEE Transaction on pattern analysis and machine intelligence," pp.544-560, VOL. 29, No. 4, April 2007.
DOI
|
7 |
ISO/IEC JTC1 SC27 WG5 International Standard 24745, "Biometric Information protection," 2011.
|
8 |
Yong-Nuyo Shin, "Biometric and Identity Reference Protection," Journal of Korean Institute of Intelligent Systems, p.160-167, VOL. 19, No. 2, April 2009.
DOI
|
9 |
Yong Nyuo Shin and Woo Chang Shin, "A Security Reference Model for the Construction of Mobile Banking Services based on Smart Phones," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT SYSTEMS Vol.11 No.4, pp 229-237, DEC 2011.
DOI
|
10 |
NIST Special Publication 800-63-2, "Electronic Authentication Guideline," 2013.
|
11 |
YTN, "Silicon fingerprint forgery Japan to help illegal entry," http://search.ytn.co.kr/ytn_2008/view.php?s_mcd=0103&key=201005061206516637&q=%B5%B7, May.2010.
|
12 |
Hacker News, "Hacker Clones German Defense Minister's Fingerprint Using Just her Photos," Dec.2014, http://thehackernews.com/2014/12/hacker-clone-fingerprint-scanner.html
|
13 |
TTA(TTAR-12.0006), Technical Report on Fake Fingerprints Detection, 2010.11.
|
14 |
T. Shimamura, H. Morimura, N. Shimoyama, T. Sakata, S. Shigematsu, K. Machida, and M. Mamoru, "A Fingerprint Sensor with Impedance Sensing for Fraud Detection," presented at IEEE International Solid-State Circuits Conference (ISSCC), 2008.
|