CASIA OpenIR

浏览/检索结果: 共24条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Coarse to Fine Minutiae-Based Latent Palmprint Matching 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2013, 卷号: 35, 期号: 10, 页码: 2307-2322
作者:  Liu, Eryun;  Jain, Anil K.;  Tian, Jie
浏览  |  Adobe PDF(4127Kb)  |  收藏  |  浏览/下载:247/69  |  提交时间:2015/08/12
Palmprint  Latent Palmprint Matching  Minutiae Clustering  Minutia Descriptor  Match Propagation  
Minutia handedness: A novel global feature for minutiae-based fingerprint matching 期刊论文
PATTERN RECOGNITION LETTERS, 2012, 卷号: 33, 期号: 10, 页码: 1411-1421
作者:  Cao, Kai;  Yang, Xin;  Chen, Xinjian;  Tao, Xunqiang;  Zang, Yali;  Liang, Jimin;  Tian, Jie
浏览  |  Adobe PDF(2416Kb)  |  收藏  |  浏览/下载:273/53  |  提交时间:2015/08/12
Fingerprint Matching  Minutia  Minutia Handedness  Reference Point  Global Feature  
An effective biometric cryptosystem combining fingerprints with error correction codes 期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2012, 卷号: 39, 期号: 7, 页码: 6562-6574
作者:  Li, Peng;  Yang, Xin;  Qiao, Hua;  Cao, Kai;  Liu, Eryun;  Tian, Jie
浏览  |  Adobe PDF(659Kb)  |  收藏  |  浏览/下载:406/101  |  提交时间:2015/08/12
Minutia Triplet  Binary Length-fixed Feature  Biometric Cryptosystem  Fuzzy Commitment Scheme  Ecc  Security  
Random local region descriptor (RLRD): A new method for fixed-length feature representation of fingerprint image and its application to template protection 期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2012, 卷号: 28, 期号: 1, 页码: 236-243
作者:  Liu, Eryun;  Zhao, Heng;  Liang, Jimin;  Pang, Liaojun;  Chen, Hongtao;  Tian, Jie
Adobe PDF(1249Kb)  |  收藏  |  浏览/下载:154/0  |  提交时间:2015/08/12
Fixed-length Feature  Cancelable Biometric  Fingerprint Recognition  Random Local Region Descriptor (Rlrd)  
A novel ant colony optimization algorithm for large-distorted fingerprint matching 期刊论文
PATTERN RECOGNITION, 2012, 卷号: 45, 期号: 1, 页码: 151-161
作者:  Cao, Kai;  Yang, Xin;  Chen, Xinjian;  Zang, Yali;  Liang, Jimin;  Tian, Jie
Adobe PDF(2527Kb)  |  收藏  |  浏览/下载:299/97  |  提交时间:2015/08/12
Distortion  Fingerprint Matching  Minutiae Pairing  Minutia Similarity  Ant Colony Optimization  
A key binding system based on n-nearest minutiae structure of fingerprint 期刊论文
PATTERN RECOGNITION LETTERS, 2011, 卷号: 32, 期号: 5, 页码: 666-675
作者:  Liu, Eryun;  Zhao, Heng;  Liang, Jimin;  Pang, Liaojun;  Xie, Min;  Chen, Hongtao;  Li, Yanhua;  Li, Peng;  Tian, Jie
浏览  |  Adobe PDF(1164Kb)  |  收藏  |  浏览/下载:261/66  |  提交时间:2015/08/12
Key Binding  Nearest Minutiae Structure  Wrap-around  Secure Sketch  Pinsketch  Shamir's Secret Sharing  
Minutiae and modified Biocode fusion for fingerprint-based key generation 期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 卷号: 33, 期号: 3, 页码: 221-235
作者:  Liu, Eryun;  Liang, Jimin;  Pang, Liaojun;  Xie, Min;  Tian, Jie
浏览  |  Adobe PDF(1868Kb)  |  收藏  |  浏览/下载:450/148  |  提交时间:2015/08/12
Key Generation  Secure Sketch  Feature Fusion  Fuzzy Extractor  Fingerprint Alignment  
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme 期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 卷号: 33, 期号: 3, 页码: 207-220
作者:  Li, Peng;  Yang, Xin;  Cao, Kai;  Tao, Xunqiang;  Wang, Ruifang;  Tian, Jie
浏览  |  Adobe PDF(2460Kb)  |  收藏  |  浏览/下载:298/104  |  提交时间:2015/08/12
Fingerprint Cryptosystem  Fuzzy Fingerprint Vault  Alignment-free  Minutia Descriptor  Minutia Local Structure  Security  
Combining features for distorted fingerprint matching 期刊论文
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 卷号: 33, 期号: 3, 页码: 258-267
作者:  Cao, Kai;  Yang, Xin;  Tao, Xunqiang;  Li, Peng;  Zang, Yali;  Tian, Jie
浏览  |  Adobe PDF(1937Kb)  |  收藏  |  浏览/下载:325/76  |  提交时间:2015/08/12
Distorted Fingerprint Matching  Ridge Compatibility  Local Feature  Finger Placement Direction  
Biometric template protection 期刊论文
Ruan Jian Xue Bao/Journal of Software, 2009, 卷号: 20, 期号: 6, 页码: 1553-1573
作者:  Li, Peng;  Tian, Jie;  Yang, Xin;  Shi, Peng;  Zhang, Yang-Yang
浏览  |  Adobe PDF(2180Kb)  |  收藏  |  浏览/下载:682/116  |  提交时间:2015/08/12
Biometric  Template Protection  Key  Helper Data  Biohashing  Fuzzy Vault