Academic literature on the topic 'Biometrics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Biometrics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Biometrics"
Yaacob, Mohd Noorulfakhri, Syed Zulkarnain Syed Idrus, Wan Azani Wan Mustafa, Mohd Aminudin Jamlos, and Mohd Helmy Abd Wahab. "Identification of the Exclusivity of Individual’s Typing Style Using Soft Biometric Elements." Annals of Emerging Technologies in Computing 5, no. 5 (March 20, 2021): 10–26. http://dx.doi.org/10.33166/aetic.2021.05.002.
Full textB.R., Rohini, and Thippeswamy G. "BIOMETRICS-A PRELIMINARY APPROACH." International Journal of Research -GRANTHAALAYAH 5, no. 4RACSIT (April 30, 2017): 47–52. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3350.
Full textMichelsen, Lea Laura. "Thinking Beyond Biometrics." A Peer-Reviewed Journal About 7, no. 1 (July 6, 2018): 36–49. http://dx.doi.org/10.7146/aprja.v7i1.115063.
Full textMitianov, Z. O. "Compulsory and Voluntary Biometrics: Content and Distinction in Russian Law." Theoretical and Applied Law, no. 3 (October 8, 2024): 63–74. http://dx.doi.org/10.22394/3034-2813-2024-3-63-74.
Full textYang, Wencheng, Song Wang, Hui Cui, Zhaohui Tang, and Yan Li. "A Review of Homomorphic Encryption for Privacy-Preserving Biometrics." Sensors 23, no. 7 (March 29, 2023): 3566. http://dx.doi.org/10.3390/s23073566.
Full text., Himanshi, Trisha Gulati, and Yasha Hasija. "Biometrics in Healthcare." INTERNATIONAL JOURNAL OF ADVANCED PRODUCTION AND INDUSTRIAL ENGINEERING 3, no. 2 (April 15, 2018): 13–17. http://dx.doi.org/10.35121/ijapie201804223.
Full textSharma, Tushar, and Upinder Kaur. "Biometric Security: A Review to Future." Revista Gestão Inovação e Tecnologias 11, no. 4 (July 29, 2021): 3758–68. http://dx.doi.org/10.47059/revistageintec.v11i4.2405.
Full textShopon, Md, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, and Marina L. Gavrilova. "Biometric Systems De-Identification: Current Advancements and Future Directions." Journal of Cybersecurity and Privacy 1, no. 3 (August 31, 2021): 470–95. http://dx.doi.org/10.3390/jcp1030024.
Full textChoudhury, Bismita, Patrick Then, Biju Issac, Valliappan Raman, and Manas Kumar Haldar. "A Survey on Biometrics and Cancelable Biometrics Systems." International Journal of Image and Graphics 18, no. 01 (January 2018): 1850006. http://dx.doi.org/10.1142/s0219467818500067.
Full textSable, Harsh, and Divya Bajpai Tripathy. "A Review on Comparative Analysis on Different Sort of Physiological and Behavioral Biometric Framework." International Journal of Advance Research and Innovation 9, no. 2 (2021): 1–9. http://dx.doi.org/10.51976/ijari.922101.
Full textDissertations / Theses on the topic "Biometrics"
Janečka, Petr. "Multimodální biometrický systém kombinující duhovku a sítnici." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-234910.
Full textPereira, Tiago de Freitas 1985. "A comparative study of countermeasures to detect spoofing attacks in face authentication systems = Um estudo comparativo de contramedidas para detectar ataques de spoofing em sistemas de autenticação de faces." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/261478.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-23T20:06:41Z (GMT). No. of bitstreams: 1 Pereira_TiagodeFreitas_M.pdf: 17638731 bytes, checksum: 15a8d07214e3b31accd3218e5bde20cb (MD5) Previous issue date: 2013
Resumo: O Resumo poderá ser visualizado no texto completo da tese digital
Abstract: The complete Abstract is available with the full electronic document.
Mestrado
Engenharia de Computação
Mestre em Engenharia Elétrica
Hmani, Mohamed Amine. "Use of Biometrics for the Regeneration of Revocable Crypto-biometric Keys." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAS013.
Full textThis thesis aims to regenerate crypto-biometric keys (cryptographic keys obtained with biometric data) that are resistant to quantum cryptanalysis methods. The challenge is to obtain keys with high entropy to have a high level of security, knowing that the entropy contained in biometric references limits the entropy of the key. Our choice was to exploit facial biometrics.We first created a state-of-the-art face recognition system based on public frameworks and publicly available data based on DNN embedding extractor architecture and triplet loss function. We participated in two H2020 projects. For the SpeechXRays project, we provided implementations of classical and cancelable face biometrics. For the H2020 EMPATHIC project, we created a face verification REST API. We also participated in the NIST SRE19 multimedia challenge with the final version of our classical face recognition system.In order to obtain crypto-biometric keys, it is necessary to have binary biometric references. To obtain the binary representations directly from face images, we proposed an original method, leveraging autoencoders and the previously implemented classical face biometrics. We also exploited the binary representations to create a cancelable face verification system.Regarding our final goal, to generate crypto-biometric keys, we focused on symmetric keys. Symmetric encryption is threatened by the Groover algorithm because it reduces the complexity of a brute force attack on a symmetric key from 2N à 2(N/2). To mitigate the risk introduced by quantum computing, we need to increase the size of the keys. To this end, we tried to make the binary representation longer and more discriminative. For the keys to be resistant to quantum computing, they should have double the length.We succeeded in regenerating crypto-biometric keys longer than 400bits (with low false acceptance and false rejection rates) thanks to the quality of the binary embeddings. The crypto-biometric keys have high entropy and are resistant to quantum cryptanalysis, according to the PQCrypto project, as they satisfy the length requirement. The keys are regenerated using a fuzzy commitment scheme leveraging BCH codes
Holeksa, David. "Návrh audio-vizuální databáze pro extrakci sekundárních biometrických a ne-biometrických znaků." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220544.
Full textGancarčík, Lukáš. "Vicefaktorová autentizace elektronických dokumentů." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224008.
Full textSamangooei, Sina. "Semantic biometrics." Thesis, University of Southampton, 2010. https://eprints.soton.ac.uk/153901/.
Full textVaradinov, Petr. "Účel a implementace snímání otisků prstů v osobních počítačích." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162689.
Full textFerreira, Iuri Emmanuel de Paula [UNESP]. "Delineamentos D-ótimos para os modelos de Michaelis-Menten e de Hill." Universidade Estadual Paulista (UNESP), 2010. http://hdl.handle.net/11449/87920.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Os resultados de muitos experimentos em áreas da biologia, como a farmacologia, a bioquímica e a agronomia, geralmente são analisados por ajustes de modelos não-lineares através dos quais pretende-se explicar a resposta através dos fatores pré-especificados no experimento. As estimações dos parâmetros ou das funções de interesse podem ser imprecisas se os níveis dos fatores não forem adequadamente escolhidos, impossibilitando ao pesquisador a obtenção da informação desejada sobre o objeto de estudo. A construção de um delineamento ótimo, que maximize a informação sobre algum aspecto de interesse, é crucial para o sucesso da prática experimental. O objetivo deste trabalho foi a obtenção de delineamentos D-ótimos exatos para modelos não-lineares utilizados para estudar cinética enzimática e transporte de minerais no organismo, como o de Michaelis-Menten e o de RiU. Para este fim, duas abordagens foram consideradas, a saber, a de delineamentos localmente ótimos e a pseudo-Bayesiana. Com o auxílio dos algoritmos genético e exchange foi possível obter delineamentos D-ótimos exatos para o modelo de Michaelis-Menten, para o modelo de RiU e para ambos, considerando-se valores diferentes e distribuições com diversos coeficientes de variação como informação a priori
The results of many experiments in biological fields, as pharmacology, biochemistry and agriculture, usually are analyzed by fitting nonlinear models, which are supposed to describe well the resp'onse to the pre-specified factors in the experiment. The estimates of the parameters or of their functions of interest could be imprecise if the factor levels are not adequately chosen. The construction of an optimum design, which maximizes the information about some aspect of interest, is crucial for the success of the experimental practice. The aim of this work was constructing exact D-optimal designs for nonlinear models usually used in studies of enzyme kinetics and mineral transport in organisms, such as the Michaelis-Menten and RiU models. Two approaches were considered, the locally optimal and pseudo- Bayesian designs. Genetic and Exchange algorithms were used for getting exact designs aiming at the Michaelis-Menten model, aiming at the RiU model, each one separately, and aiming at both models when considering a composite criterion. Different values and probability distributions with several variation coefficients were considered as prior information
Martins, Andréa Camila dos Santos [UNESP]. "O método de pontos interiores no planejamento da radioterapia." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/95056.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Um tratamento do câncer por radioterapia tem como objetivo a eliminação das células do tumor e preservação das células saudáveis, obtendo assim uma melhor homo-geneização da dose administrada e menor possibilidade de complicações clínicas durante o tratamento. O sucesso do tratamento depende de um bom planejamento. Para um planejamento ótimo, técnicas matemáticas estão sendo utilizadas com o objetivo de maximizar a radiação no tumor e minimizar a radiação nas regiões vizinhas, com isto modelos de programação linear têm sido ótimas ferramentas para auxiliar a construção dos planos de tratamento por radioterapia. Assim, este trabalho visa: estudar os principais conceitos envolvidos no planejamento do tratamento do câncer por radioterapia; estudar modelos de programação linear (PL) aplicados ao planejamento ótimo; fazer um amplo estudo sobre a técnica de pontos interiores para PL e apresentar uma aplicação desta técnica para resolução de um problema de planejamento ótimo para o tratamento do câncer por radioterapia
A cancer treatment by radiotherapy aims to eliminate tumor cells and preservation of healthy cells, thus getting a better homogenization of the administered dose and fewer chances of complications during treatment. Treatment success depends on good planning. For an optimal planning, mathematical techniques are being used in order to maximize radiation at tumor and minimize radiation in the surrounding regions, thus linear programming models has been great tools to assist the construction of treatment plans for radiation therapy. Thus, this work aims: studying the key concepts involved in planning the treatment of cancer by radiotherapy; study the models the linear program- ming (PL) applied to optimal planning; make a broad study on the technique of interior point for PL and present an enforcement of this technique for solving a problem of optimal planning for cancer treatment by radiotherapy
Brobeck, Stefan, and Tobias Folkman. "Biometrics : Attitudes and factors influencing a breakthrough in Sweden." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-148.
Full textBiometrics is a collection of methods for identifying and authorizing individuals with something they are, or do. It is considered to be one of the most secure technologies for security, both physical and logical. Security is something very important for organizations today, but yet there has been a low interest in investing in biometrics for security in Sweden.
The purpose of this thesis has been to establish factors to why biometrics has not been implementedto any large extent, even though the technology has been around for long. We have evaluated the attitudes and views of individuals, as well as company leaders. Problem and questions with biometrics that often are discussed are privacy concerns, costs and ROI (return on investment) and user acceptance. Foremost there is a concern about the costs of implementing such a solution, although some claim that money can be saved by avoiding the costs in more traditional security methods, such as password administration and in security cards.
There is a range of different technologies to use, such as facial-scan, voice-scan and the most mature and well known technique, finger-scan which has been around for a long time, especially for identifying criminals. All these techniques have there positive and negative sides, often measured in different levels of universality, uniqueness, permanence and collectability, e.g. eye-scan has a high uniqueness, facial-scan has a high universability and signature-scan has a low permanence level.
We have collected our data through interviews with companies and suppliers of biometric systems as well as a questionnaire given to private persons. By interpreting the data in a qualitative way we have made our analysis and reached a conclusion.
Our result shows that a cost related to biometric solutions is the largest reason why investments have been absent. This verifies the results of other authors, that the cost is the largest obstacle. Another important factor is that companies believe that biometrics is for organizations with a very high security need. Further our result show that individuals are positive towards biometrics.
Biometri är ett samlingsnamn för tekniker som identifierar och auktoriserar individer, antingen något de är eller gör. Biometri anses vara en av de säkraste teknologierna för säkerhet, både fysisk och logisk. Säkerhet är något som är mycket viktigt för organisationer i dagens läge, men än så länge så har investeringar i biometriska säkerhetslösningar i Sverige uteblivit. Syftet med denna magisteruppsats har varit att fastställa faktorer som bidrar till att biometriska lösningar inte har blivit implementerade i någon större utsträckning, trots att teknologin har funnits länge. Vi har utvärderat individers samt företagsledares attityder och synsätt angående biometri.
Frågor och problem som ofta relateras till biometri är personligintegritet, kostnader och avkastning på investering samt användaracceptans. Framförallt är det osäkerheten kring kostnaderna av en implementering av en biometrisklösning. Det finns även de som hävdar att biometriska lösningar kan spara pengar jämfört med traditionella system därför att man undviker till exempel lösenordsadministration och passerkort.
Det finns en rad olika tekniker att använda, exempelvis ansiktsavläsning, röstigenkänning och den mest mogna och kända tekniken, fingeravtrycksläsning som har existerat en längre tid, framförallt för att identifiera kriminella. Det finns positiva och negativa sidor med alla dessa tekniker, de mäts oftast i olika nivåer av hur många som kan använda det, hur unikt biometrin är, beständighet och hur biometrin samlas in.
Genom intervjuer med företag och leverantörer av biometriska lösningar samt en utdelad enkät till privat personer har vi samlat in data. Vi har sedan tolkat data kvalitativt och utfört vår analys och slutligen kommit fram till ett resultat.
Vårt resultat har visat att kostnader relaterade till biometriska system är det största skälet till varför investeringar har uteblivit. Detta bekräftar vad många andra författare tidigare har funnit, att kostnaderna är det största hindret. En annan viktig faktor är att företag anser att biometri är något för verksamheter som kräver den allra högsta säkerheten. Vidare har individer en positiv inställning till biometri.
Books on the topic "Biometrics"
Boulgouris, Nikolaos V., Konstantinos N. Plataniotis, and Evangelia Micheli-Tzanakou, eds. Biometrics. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2009. http://dx.doi.org/10.1002/9780470522356.
Full textJain, Anil K., Ruud Bolle, and Sharath Pankanti, eds. Biometrics. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/b117227.
Full textKeith, McLennan, Chilvers Simon, ARTE France, Films d'ici (Firm), and Films for the Humanities & Sciences (Firm), eds. Biometrics. Princeton, NJ: Films for the Humanities & Sciences, 2008.
Find full textR, Wilson Susan, and Burden Conrad John, eds. Biometrics. Oxford, U.K: Eolss Publishers, 2009.
Find full textR, Wilson Susan, and Burden Conrad John, eds. Biometrics. Oxford, U.K: Eolss Publishers, 2009.
Find full textAshbourn, Julian. Practical Biometrics. London: Springer London, 2004. http://dx.doi.org/10.1007/978-0-85729-406-7.
Full textNait-ali, Amine, ed. Hidden Biometrics. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-13-0956-4.
Full textKumar, Santosh, Sanjay Kumar Singh, Rishav Singh, and Amit Kumar Singh. Animal Biometrics. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-7956-6.
Full textRattani, Ajita, Reza Derakhshani, and Arun Ross, eds. Selfie Biometrics. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26972-2.
Full textBook chapters on the topic "Biometrics"
Ding, Sophia, Emilia Nunes, Pascal Bettendorff, and Weyde Lin. "Biometrics." In Trends in Data Protection and Encryption Technologies, 121–28. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_22.
Full textMordini, Emilio. "Biometrics." In Handbook of Global Bioethics, 505–26. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-2512-6_101.
Full textKizza, Joseph Migga. "Biometrics." In Texts in Computer Science, 277–89. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-038-0_14.
Full textIslam, M. Nazrul. "Biometrics." In Encyclopedia of Security and Emergency Management, 1–7. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_10-1.
Full textWayman, James L. "Biometrics." In Handbook of Computer Networks, 539–52. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch34.
Full textMoallem, Abbas. "Biometrics." In Understanding Cybersecurity Technologies, 27–38. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003038429-4.
Full textSkågeby, Jörgen. "Biometrics." In Encyclopedia of Big Data, 118–20. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-32010-6_26.
Full textten Have, Henk, and Maria do Céu Patrão Neves. "Biometrics." In Dictionary of Global Bioethics, 187. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-54161-3_90.
Full textIslam, M. Nazrul. "Biometrics." In Encyclopedia of Security and Emergency Management, 29–35. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_10.
Full textSkågeby, Jörgen. "Biometrics." In Encyclopedia of Big Data, 1–2. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32001-4_26-1.
Full textConference papers on the topic "Biometrics"
Chaudhari, Archana Y., Jagannath Kulkarni, Ujjwala Dube, Atharva Ghorpade, Shivam Sakore, and Anil Kumar Gupta. "A Biometric Authentication System By Embedding Biometrics in QR Codes." In 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), 1–6. IEEE, 2024. https://doi.org/10.1109/icbds61829.2024.10837214.
Full textÖzgür, Hafızullah, and Yunus Emre Selçuk. "Authentication in ATM/ITM Machines using Iris Recognition Biometrics." In 10th International Conference on Artificial Intelligence & Applications. Academy & Industry Research Collaboration Center, 2023. http://dx.doi.org/10.5121/csit.2023.131901.
Full textGaipov, J. B. "DIGITAL PAYMENT TECHNOLOGIES WITH BIOMETRICS." In НОВЫЕ БИЗНЕС-МОДЕЛИ ЦИФРОВОЙ ЭКОНОМИКИ В СУБЪЕКТАХ РФ. ХГУЭП, 2022. http://dx.doi.org/10.38161/978-5-7823-0753-0-2022-131-134.
Full textJackson, Aldrewvonte, Kofi Kyei, Yasmin Eady, Brian Dowtin, Bernard Aldrich, Albert Esterline, and Joseph Shelton. "Biometric Authentication for the Mitigation of Human Risk on a Social Network." In 15th International Conference on Applied Human Factors and Ergonomics (AHFE 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004763.
Full textTalabi, A. A., O. B. Longe, A. A. Muhammad, and K. Olusanya. "Cybersecurity Risk Management in Identity Systems using Biometric-based Multimodal Authentication." In 28th iSTEAMS Multidisciplinary Research Conference AIUWA The Gambia. Society for Multidisciplinary and Advanced Research Techniques - Creative Research Publishers, 2021. http://dx.doi.org/10.22624/aims/isteams-2021/v28n2p5.
Full textEmeršič, Žiga, Gregor Hrastnik, Nataša Meh Peer, and Peter Peer. "AIM@VET-Inspired University Level Education Strategies for Teaching Comp-Uter Vision and Biometrics." In Strokovna konferenca ROSUS 2025: Računalniška obdelava slik in njena uporaba v Sloveniji 2025, 55–64. Univerza v Mariboru, Univerzitetna založba, 2025. https://doi.org/10.18690/um.feri.2.2025.4.
Full textPahuja, Gunjan, and T. N. Nagabhushan. "Biometric authentication & identification through behavioral biometrics: A survey." In 2015 International Conference on Cognitive Computing and Information Processing (CCIP). IEEE, 2015. http://dx.doi.org/10.1109/ccip.2015.7100681.
Full textYazdanpanah, Ali Pour, Karim Faez, and Rasoul Amirfattahi. "Multimodal biometric system using face, ear and gait biometrics." In 2010 10th International Conference on Information Sciences, Signal Processing and their Applications (ISSPA). IEEE, 2010. http://dx.doi.org/10.1109/isspa.2010.5605477.
Full textGilady, Erez, Dale Lindskog, and Shaun Aghili. "Intent Biometrics: An Enhanced Form of Multimodal Biometric Systems." In 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2014. http://dx.doi.org/10.1109/waina.2014.133.
Full textBashir, Faisal, David Usher, Pablo Casaverde, and Marc Friedman. "Video Surveillance for Biometrics: Long-Range Multi-biometric System." In 2008 IEEE Fifth International Conference on Advanced Video and Signal Based Surveillance (AVSS). IEEE, 2008. http://dx.doi.org/10.1109/avss.2008.28.
Full textReports on the topic "Biometrics"
Moore, Brad, and Michaela Iorga. Biometrics testing. Gaithersburg, Md.: National Institute of Standards and Technology, July 2009. http://dx.doi.org/10.6028/nist.hb.150-25.
Full textBIOMETRICS TASK FORCE ARLINGTON VA. Biometrics Task Force. Fort Belvoir, VA: Defense Technical Information Center, January 2009. http://dx.doi.org/10.21236/ada517637.
Full textJohnston, R., and W. Grace. Bartus Iris biometrics. Office of Scientific and Technical Information (OSTI), July 1996. http://dx.doi.org/10.2172/262980.
Full textGarris, Michael D., and Charles L. Wilson. NIST biometrics evaluations and developments. Gaithersburg, MD: National Institute of Standards and Technology, 2005. http://dx.doi.org/10.6028/nist.ir.7204.
Full textChoong, Yee-Yin, Mary Theofanos, Brian Stanton, and Patrick Hofmann. Symbols representing biometrics in use. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7645.
Full textKang, George S., and Yvette Lee. Voice Biometrics for Information Assurance Applications. Fort Belvoir, VA: Defense Technical Information Center, December 2002. http://dx.doi.org/10.21236/ada408449.
Full textSchulz, Robert Jr H. Prospects of Biometrics at-a-Distance. Fort Belvoir, VA: Defense Technical Information Center, September 2015. http://dx.doi.org/10.21236/ad1009318.
Full textMilley, Mark A., Gerald B. O'Keefe, Timothy J. Leahy, Willard III M. Burleson, S. A. Stearney, David G. Throop, and R. Jr B. Turner. Biometrics: Multi-Service Tactics, Techniques, and Procedures for Tactical Employment of Biometrics in Support of Operations. Fort Belvoir, VA: Defense Technical Information Center, May 2016. http://dx.doi.org/10.21236/ad1013627.
Full textFrenzen, Christopher L. Convolution Methods for Mathematical Problems in Biometrics. Fort Belvoir, VA: Defense Technical Information Center, January 1999. http://dx.doi.org/10.21236/ada359925.
Full textPhillips, P. J., H. A. Sahibzada, Patrick J. Flynn, K. W. Bowyer, A. O'Toole, S. Weimer, J. R. Beveridge, et al. Overview of the multiple biometrics grand challenge. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.ir.7607.
Full text