Enhancements to DTW and VQ decision algorithms for speaker recognition
Speech Communication - Speech science and technology: a selection from the papers presented at the Fourth International Conference in Speech Science and Technology (SST-92)
Biometrics, access control, smart cards: a not so simple combination
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
Denial of Access in Biometrics-Based Authentication Systems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Data-driven spectral basis functions for automatic speech recognition
Speech Communication
Error Control Coding: From Theory to Practice
Error Control Coding: From Theory to Practice
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 2 - Volume 02
An analysis of BioHashing and its variants
Pattern Recognition
Security analysis of smartcard to card reader communications for biometric cardholder authentication
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
Revealing the secret of facehashing
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Secure Biometric Authentication with Improved Accuracy
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
This article describes a complete original biometric system named Tactim based on the skin reaction coupled with security concepts Even if the experiments showed that there is much work left, our approach has many advantages Security and biometry are strongly linked together, the biometric features are original and strongly depend of the user's will, it can be easily interfaced to existing systems, so we finally propose a way to integrate this system in a Service Oriented Architecture and analyze its advantages and drawbacks.