CASIA OpenIR

浏览/检索结果: 共6条,第1-6条 帮助

限定条件                    
已选(0)清除 条数/页:   排序方式:
Helical optical projection tomography 期刊论文
OPTICS EXPRESS, 2013, 卷号: 21, 期号: 22, 页码: 25912-25925
作者:  Arranz, Alicia;  Dong, Di;  Zhu, Shouping;  Rudin, Markus;  Tsatsanis, Christos;  Tian, Jie;  Ripoll, Jorge;  Jorge Ripoll
浏览  |  Adobe PDF(3590Kb)  |  收藏  |  浏览/下载:407/89  |  提交时间:2015/08/12
Fluorescence Microscopy  Three-dimensional Microscopy  Image Reconstruction Techniques  Light Propagation In Tissues  
An effective biometric cryptosystem combining fingerprints with error correction codes 期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 卷号: 39, 期号: 7, 页码: 6562-6574
作者:  Li, Peng;  Yang, Xin;  Qiao, Hua;  Cao, Kai;  Liu, Eryun;  Tian, Jie
浏览  |  Adobe PDF(659Kb)  |  收藏  |  浏览/下载:411/101  |  提交时间:2015/08/12
Minutia Triplet  Binary Length-fixed Feature  Biometric Cryptosystem  Fuzzy Commitment Scheme  Ecc  Security  
Fingerprint Recognition with Identical Twin Fingerprints 期刊论文
PLOS ONE, 2012, 卷号: 7, 期号: 4, 页码: -
作者:  Tao, Xunqiang;  Chen, Xinjian;  Yang, Xin;  Tian, Jie
浏览  |  Adobe PDF(1474Kb)  |  收藏  |  浏览/下载:286/81  |  提交时间:2015/08/12
Fingerprint Recognition  
A key binding system based on n-nearest minutiae structure of fingerprint 期刊论文
PATTERN RECOGNITION LETTERS, 2011, 卷号: 32, 期号: 5, 页码: 666-675
作者:  Liu, Eryun;  Zhao, Heng;  Liang, Jimin;  Pang, Liaojun;  Xie, Min;  Chen, Hongtao;  Li, Yanhua;  Li, Peng;  Tian, Jie
浏览  |  Adobe PDF(1164Kb)  |  收藏  |  浏览/下载:268/67  |  提交时间:2015/08/12
Key Binding  Nearest Minutiae Structure  Wrap-around  Secure Sketch  Pinsketch  Shamir's Secret Sharing  
Minutiae and modified Biocode fusion for fingerprint-based key generation 期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 卷号: 33, 期号: 3, 页码: 221-235
作者:  Liu, Eryun;  Liang, Jimin;  Pang, Liaojun;  Xie, Min;  Tian, Jie
浏览  |  Adobe PDF(1868Kb)  |  收藏  |  浏览/下载:454/148  |  提交时间:2015/08/12
Key Generation  Secure Sketch  Feature Fusion  Fuzzy Extractor  Fingerprint Alignment  
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme 期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 卷号: 33, 期号: 3, 页码: 207-220
作者:  Li, Peng;  Yang, Xin;  Cao, Kai;  Tao, Xunqiang;  Wang, Ruifang;  Tian, Jie
浏览  |  Adobe PDF(2460Kb)  |  收藏  |  浏览/下载:307/108  |  提交时间:2015/08/12
Fingerprint Cryptosystem  Fuzzy Fingerprint Vault  Alignment-free  Minutia Descriptor  Minutia Local Structure  Security