A survey of image registration techniques
ACM Computing Surveys (CSUR)
Design patterns: elements of reusable object-oriented software
Design patterns: elements of reusable object-oriented software
Patterns in Java, volume 1: a catalog of reusable design patterns illustrated with UML
Patterns in Java, volume 1: a catalog of reusable design patterns illustrated with UML
Client/server survival guide (3rd ed.)
Client/server survival guide (3rd ed.)
Multilocal creaseness based on the level-set extrinsic curvature
Computer Vision and Image Understanding - Special issue on analysis of volumetric image
Programming Web Services with XML-RPC
Programming Web Services with XML-RPC
AVBPA '97 Proceedings of the First International Conference on Audio- and Video-Based Biometric Person Authentication
Hi-index | 0.00 |
Traditional authentication systems, employed to gain access to a private area in a building or to data stored in a computer, are based on something the user has (an authentication card, a magnetic key) or something the user knows (a password, an identification code). But emerging technologies allow for more reliable and comfortable for the user, authentication methods, most of them based on biometric parameters. Much work could be found in literature about biometric based authentication, using parameters like iris, voice, fingerprints, face characteristics, and others. We have developed a new methodology for personal authentication, where the biometric parameter employed for the authentication is the retinal vessel tree, acquired through a retinal angiography. It has already been asserted by expert clinicians that the configuration of the retinal vessels is unique for each individual and that it does not vary in his life, so it is a very well suited identification characteristic. In this work we will present the design and implementation stages of an application which allows for a reliable personal authentication in high security environments based on the retinal authentication method.