A Real-Time Matching System for Large Fingerprint Databases
IEEE Transactions on Pattern Analysis and Machine Intelligence
Authentication via keystroke dynamics
Proceedings of the 4th ACM conference on Computer and communications security
Computer Vision Algorithms on Reconfigurable Logic Arrays
IEEE Transactions on Parallel and Distributed Systems
Communications of the ACM
Biometric Identification through Hand Geometry Measurements
IEEE Transactions on Pattern Analysis and Machine Intelligence
Face Recognition Using Line Edge Map
IEEE Transactions on Pattern Analysis and Machine Intelligence
Hand Recognition Using Implicit Polynomials and Geometric Features
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
User Authentication via Neural Network
AIMSA '00 Proceedings of the 9th International Conference on Artificial Intelligence: Methodology, Systems, and Applications
Recent Advances in Fingerprint Verification
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
ICAPR '01 Proceedings of the Second International Conference on Advances in Pattern Recognition
Technology and Health Care
Biometrics break-ins and band-aids
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Combining implicit polynomials and geometric features for hand recognition
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Biometrics for security in E-commerce
Payment technologies for E-commerce
Java-Based Internet Biometric Authentication System
IEEE Transactions on Pattern Analysis and Machine Intelligence
Biometric identification systems
Signal Processing
Image Mosaicing for Rolled Fingerprint Construction
ICPR '98 Proceedings of the 14th International Conference on Pattern Recognition-Volume 2 - Volume 2
Effect of Controlled Image Acquisition of Fingerprint Matching
ICPR '98 Proceedings of the 14th International Conference on Pattern Recognition-Volume 2 - Volume 2
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Recent advances in visual and infrared face recognition: a review
Computer Vision and Image Understanding
A review of information security issues and respective research contributions
ACM SIGMIS Database
Secure fingerprint-based authentication for Lotus Notes®
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Enhanced password authentication through keystroke typing characteristics
AIAP'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications
Text-dependent speaker verification using genetic algorithm and competitive learning neural network
SPPR'07 Proceedings of the Fourth conference on IASTED International Conference: Signal Processing, Pattern Recognition, and Applications
Fingerprint singular point detection algorithm by Poincaré index
WSEAS TRANSACTIONS on SYSTEMS
Using empirical mode decomposition for iris recognition
Computer Standards & Interfaces
A survey of biometric technology based on hand shape
Pattern Recognition
Palmprint Verification Using Circular Gabor Filter
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Iris Recognition Using 3D Co-occurrence Matrix
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
An efficient algorithm for the implementation of fingerprint authentication on smartcards
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
A novel technique for palmprint classification and authentication
International Journal of Biometrics
Text-dependent speaker verification using genetic algorithm and competitive learning neural network
SPPRA '07 Proceedings of the Fourth IASTED International Conference on Signal Processing, Pattern Recognition, and Applications
Toward user patterns for online security: Observation time and online user identification
Decision Support Systems
Model-guided deformable hand shape recognition without positioning aids
Pattern Recognition
Palmprint verification using hierarchical decomposition
Pattern Recognition
Personal verification using palmprint and hand geometry biometric
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
A novel approach for iris recognition using local edge patterns
ISVC'07 Proceedings of the 3rd international conference on Advances in visual computing - Volume Part II
Recognizing human iris by modified empirical mode decomposition
PSIVT'07 Proceedings of the 2nd Pacific Rim conference on Advances in image and video technology
Autenticação biométrica on-line de usuários em aplicações web de Ensino a distância
Companion Proceedings of the XIV Brazilian Symposium on Multimedia and the Web
Review Article: Biometric personal authentication using keystroke dynamics: A review
Applied Soft Computing
Feature extraction and classification of fingerprints using a novel fuzzy neural network
SSIP'05 Proceedings of the 5th WSEAS international conference on Signal, speech and image processing
An integration of biometrics and mobile computing for personal identification
ICAPR'05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II
Iris recognition using fourier-wavelet features
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Iris recognition based on bidimensional empirical mode decomposition and fractal dimension
Information Sciences: an International Journal
Using lexicometry and vocabulary analysis techniques to detect a signature for web profile
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
A novel hand reconstruction approach and its application to vulnerability assessment
Information Sciences: an International Journal
Hi-index | 0.11 |
Biometrics is emerging as the most foolproof method of automated personal identification in demand in an ever more automated world. Biometric systems are automated methods of verifying or recognizing the identity of a living person on the basis of some physiological characteristic, like a fingerprint or iris pattern, or some aspect of behavior, like handwriting or keystroke patterns. This paper describes the range of biometric systems in development or on the market including: handwriting; fingerprints; iris patterns; human faces; and speech