Journal articles on the topic 'Minutiae-based templates'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 journal articles for your research on the topic 'Minutiae-based templates.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mon, Ei Ei, Sangsuree Vasupongayya, Montri Karnjanadecha, and Touchai Angchuan. "Evaluating biometrics fingerprint template protection for an emergency situation." Tehnički glasnik 13, no. 4 (December 11, 2019): 280–85. http://dx.doi.org/10.31803/tg-20191104190328.
Full textLee, Chulhan, and Jaihie Kim. "Cancelable fingerprint templates using minutiae-based bit-strings." Journal of Network and Computer Applications 33, no. 3 (May 2010): 236–46. http://dx.doi.org/10.1016/j.jnca.2009.12.011.
Full textPRASAD, MUNAGA V. N. K., P. SWATHI, C. R. RAO, and B. L. DEEKSHATULU. "MINIMUM SPANNING TREE (MST) BASED TECHNIQUES FOR GENERATION OF CANCELABLE FINGERPRINT TEMPLATES." International Journal of Pattern Recognition and Artificial Intelligence 28, no. 06 (September 2014): 1456013. http://dx.doi.org/10.1142/s0218001414560138.
Full textMoon, Daesung, Jang-Hee Yoo, and Mun-Kyu Lee. "Improved cancelable fingerprint templates using minutiae-based functional transform." Security and Communication Networks 7, no. 10 (May 17, 2013): 1543–51. http://dx.doi.org/10.1002/sec.788.
Full textChulhan Lee, Jeung-Yoon Choi, Kar-Ann Toh, and Sangyoun Lee. "Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 37, no. 4 (August 2007): 980–92. http://dx.doi.org/10.1109/tsmcb.2007.896999.
Full textShukla, Shivangi, and Sankita J. Patel. "Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment." IET Information Security 15, no. 3 (April 2021): 256–66. http://dx.doi.org/10.1049/ise2.12024.
Full textSharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (February 13, 2021): 458. http://dx.doi.org/10.3390/electronics10040458.
Full textArakala, Arathi, K. J. Horadam, Jason Jeffers, and Serdar Boztaş. "Protection of minutiae-based templates using biocryptographic constructs in the set difference metric." Security and Communication Networks 4, no. 5 (June 9, 2010): 563–76. http://dx.doi.org/10.1002/sec.205.
Full textWang, Bin Bin, Jian De Zheng, and Zhi Qiang Zheng. "Fingerprint Identification Scheme Based on Distribution Density." Applied Mechanics and Materials 539 (July 2014): 117–21. http://dx.doi.org/10.4028/www.scientific.net/amm.539.117.
Full textZHU, EN, JIAN-PING YIN, GUO-MIN ZHANG, and CHUN-FENG HU. "FINGERPRINT MINUTIAE RELATIONSHIP REPRESENTATION AND MATCHING BASED ON CURVE COORDINATE SYSTEM." International Journal of Image and Graphics 05, no. 04 (October 2005): 729–44. http://dx.doi.org/10.1142/s0219467805001987.
Full textUz, Tamer, George Bebis, Ali Erol, and Salil Prabhakar. "Minutiae-based template synthesis and matching for fingerprint authentication." Computer Vision and Image Understanding 113, no. 9 (September 2009): 979–92. http://dx.doi.org/10.1016/j.cviu.2009.04.002.
Full textRamírez Flores, Manuel, Gualberto Aguilar Torres, Gina Gallegos García, and Miguel Ángel García Licona. "Fingerprint verification using computational geometry." DYNA 83, no. 195 (February 23, 2016): 128–37. http://dx.doi.org/10.15446/dyna.v83n195.46323.
Full textWong, Wei Jing, Andrew B. J. Teoh, M. L. Dennis Wong, and Yau Hee Kho. "Enhanced multi-line code for minutiae-based fingerprint template protection." Pattern Recognition Letters 34, no. 11 (August 2013): 1221–29. http://dx.doi.org/10.1016/j.patrec.2013.03.039.
Full textVibert, Benoit, Jean-Marie Le Bars, Christophe Charrier, and Christophe Rosenberger. "Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems." Sensors 20, no. 18 (September 21, 2020): 5410. http://dx.doi.org/10.3390/s20185410.
Full textOlatubosun, Olabode, and Fasoranbaku O.A. "Fingerprint Image Enhancement Algorithms for Identification in an Electoral Process." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 2 (December 13, 2014): 5453–63. http://dx.doi.org/10.24297/ijct.v14i2.2090.
Full textYang, Yijun, Jianping Yu, Peng Zhang, and Shulan Wang. "A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication." Computational and Mathematical Methods in Medicine 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/673867.
Full textWong, Wei Jing, Andrew B. J. Teoh, Yau Hee Kho, and M. L. Dennis Wong. "Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template." Pattern Recognition 51 (March 2016): 197–208. http://dx.doi.org/10.1016/j.patcog.2015.09.032.
Full textJin, Zhe, Bok-Min Goi, Andrew Teoh, and Yong Haur Tay. "A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template." Security and Communication Networks 7, no. 11 (August 19, 2013): 1691–701. http://dx.doi.org/10.1002/sec.865.
Full textSandhya, Mulagala, and Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 04 (February 2, 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.
Full textHUI, Yan, and Xuefeng ZHANG. "A fingerprint-template-generating method based on the 3D mapping of local minutiae." SCIENTIA SINICA Informationis 49, no. 1 (January 1, 2019): 42–56. http://dx.doi.org/10.1360/n112018-00018.
Full textJin, Zhe, Andrew Beng Jin Teoh, Thian Song Ong, and Connie Tee. "Fingerprint template protection with minutiae-based bit-string for security and privacy preserving." Expert Systems with Applications 39, no. 6 (May 2012): 6157–67. http://dx.doi.org/10.1016/j.eswa.2011.11.091.
Full textKrivokuća, Vedrana, and Waleed Abdulla. "Cancellability and diversity analysis of fingerprint template protection scheme based on compact minutiae pattern." Information Security Journal: A Global Perspective 25, no. 1-3 (April 4, 2016): 109–23. http://dx.doi.org/10.1080/19393555.2016.1179375.
Full textKrivokuća, Vedrana, and Waleed Abdulla. "Fingerprint template protection scheme based on partial minutiae patterns: a comprehensive non-invertibility analysis." International Journal of Biometrics 7, no. 4 (2015): 326. http://dx.doi.org/10.1504/ijbm.2015.076136.
Full textLi, Mengxing, Quan Feng, Jian Zhao, Mei Yang, Lijun Kang, and Lili Wu. "Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/525387.
Full textSaquib, Zia, Santosh Kumar Soni, Sweta Suhasaria, and Anamika Singh. "Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions." International Journal of Computer and Communication Technology, January 2014, 8–15. http://dx.doi.org/10.47893/ijcct.2014.1212.
Full textBasha, S. Shanawaz, and N. Musrat Sultana. "Spectral Minutiae Fingerprint Recognition System." International Journal of Computer and Communication Technology, April 2014, 103–8. http://dx.doi.org/10.47893/ijcct.2014.1228.
Full textLahmidi, Ayoub, Khalid Minaoui, Chouaib Moujahdi, and Mohammed Rziza. "Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons." Computer Journal, August 5, 2021. http://dx.doi.org/10.1093/comjnl/bxab111.
Full textKant, Chander. "NEW APPROACH TOWARDS EFFICIENT BIOMETRIC SYSTEMS." International Journal of Computing, December 20, 2011, 108–13. http://dx.doi.org/10.47839/ijc.10.2.741.
Full text"Fingerprint verification using the traveling salesman problem solution and decomposition of the vicinity of the minutiae." Computer Science and Cybersecurity, no. 2 (2020). http://dx.doi.org/10.26565/2519-2310-2020-2-03.
Full text