The Community for Technology Leaders
RSS Icon
Issue No.04 - July/August (2002 vol.22)
pp: 16-21
<p>Biometrics is the science of recognizing a person on the basis of physical or behavioral characteristics. Things you can carry, such as keys or ID badges, can of course be lost, stolen, or duplicated. The same goes for things that you know, such as passwords or personal ID numbers. Biometrics relies on who you are--on one of any number of unique characteristics that you can't lose or forget.</p>
Kirk L. Kroeker, "Graphics and Security: Exploring Visual Biometrics", IEEE Computer Graphics and Applications, vol.22, no. 4, pp. 16-21, July/August 2002, doi:10.1109/MCG.2002.1016693
1. H. Wechsler et al., Face Recognition: From Theory to Application, Springer-Verlag, Berlin, 1998.
2. P.J. Phillips et al., The Feret Evaluation Methodology for Face-Recognition Algorithms, NISTIR 6264, Nat'l Inst. of Standards and Technology, Gaithersburg, Md., 1998, .
3. A.K. Jain et al., "An Identity-Authentication System Using Fingerprints," Proc. EuroSpeech 97, IEEE CS Press, Los Alamitos, Calif., 1997, pp. 1348-1388.
4. N. Ratha, K. Karu, S. Chen, and A.K. Jain, "A Real-Time Matching System for Large Fingerprint Databases," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 18, no. 8, pp. 799-813, Aug. 1996.
5. K. Karu and A.K. Jain,"Fingerprint Classification," Pattern Recognition, vol. 29, no. 3, 1996, pp. 389-404.
6. L. Flom and A. Safir,Iris Recognition System, US patent 4,641,349, Patent and Trademark Office, Washington, D.C., 1987.
7. J.G. Daugman,“High confidence visual recognition of persons by a test of statistical independence,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1,148-1,161, Nov. 1993.
8. D. Gabor,"Theory of Communication," J. Institute of Electrical Engineers, vol. 93, no. 26, Nov. 1946, pp. 429-457.
9. B. Schneier,"Cryptographic Design Vulnerabilities," Computer, vol. 31, no. 9, Sept. 1998, pp. 29-33.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool