X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (47) 47
Newspaper Article (32) 32
Conference Proceeding (25) 25
Book Chapter (16) 16
Patent (9) 9
Dissertation (7) 7
Web Resource (7) 7
Book / eBook (5) 5
Book Review (1) 1
Government Document (1) 1
Reference (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
computer science (24) 24
pattern recognition (20) 20
image processing and computer vision (17) 17
biometrics (16) 16
computer imaging, vision, pattern recognition and graphics (16) 16
data encryption (16) 16
data structures, cryptology and information theory (16) 16
multimedia information systems (16) 16
index medicus (12) 12
biometric identification (9) 9
biometry (9) 9
cryptography (9) 9
fingerprint recognition (9) 9
analysis (8) 8
authentication (8) 8
humans (8) 8
cancer (7) 7
engineering, electrical & electronic (7) 7
physics (7) 7
research (7) 7
acoustics (6) 6
animals (6) 6
databases (6) 6
musical instruments (6) 6
privacy (6) 6
speech analysis or synthesis (6) 6
speech or audio coding or decoding (6) 6
speech or voice processing (6) 6
speech recognition (6) 6
chemotherapy (5) 5
computer science, artificial intelligence (5) 5
computer science, theory & methods (5) 5
doxorubicin (5) 5
electricity (5) 5
female (5) 5
fingerprints (5) 5
health aspects (5) 5
memory (5) 5
pharmacology & pharmacy (5) 5
algorithms (4) 4
chemobrain (4) 4
cognitive ability (4) 4
episodic memory (4) 4
feature extraction (4) 4
fuzzy vault (4) 4
iris (4) 4
nanoparticles (4) 4
performance (4) 4
recognition (4) 4
rodents (4) 4
systems (4) 4
verification (4) 4
access control (3) 3
animal cognition (3) 3
apoptosis (3) 3
basic electric elements (3) 3
biochemistry & molecular biology (3) 3
biometrie (3) 3
breast cancer (3) 3
calculating (3) 3
care and treatment (3) 3
chemistry, medicinal (3) 3
complications and side effects (3) 3
computing (3) 3
counting (3) 3
data security (3) 3
decoding (3) 3
electric digital data processing (3) 3
electric solid state devices not otherwise provided for (3) 3
face (3) 3
fingerprint (3) 3
fusion (3) 3
image databases (3) 3
information security (3) 3
neurotoxicity (3) 3
neyman-pearson theorem (3) 3
oxidative stress (3) 3
pattern recognition systems (3) 3
polynomials (3) 3
rats (3) 3
security (3) 3
semiconductor devices (3) 3
studies (3) 3
template security (3) 3
toxicity (3) 3
usage (3) 3
accuracy (2) 2
acid (2) 2
alzheimers disease (2) 2
anthracyclines (2) 2
apoptosis - drug effects (2) 2
bioinformatics (2) 2
biology (2) 2
biomedical engineering (2) 2
biometric authentication (2) 2
biometric person authentication (2) 2
biometría (2) 2
blockchain (2) 2
breast-cancer (2) 2
cancer therapies (2) 2
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Eurasip Journal on Advances in Signal Processing, ISSN 1687-6172, 2008, Volume 2008, Issue 1, p. 579416
Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of... 
IMAGE | FINGERPRINT | AUTHENTICATION | VAULT | SYSTEMS | VERIFICATION | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 02/2012, Volume 7, Issue 1, pp. 255 - 268
Multibiometric systems are being increasingly de- ployed in many large-scale biometric applications (e.g., FBI-IAFIS, UIDAI system in India) because they have... 
Biometric cryptosystem | fusion | multibiometrics | Databases | fuzzy commitment | fuzzy vault | Polynomials | Error correction codes | Decoding | Cryptography | template security | Iris recognition | COMPUTER SCIENCE, THEORY & METHODS | ENGINEERING, ELECTRICAL & ELECTRONIC | Studies | Biometrics | Fuzzy logic | Fingerprints | Fuzzy set theory | Fuzzy | Security | Sketches
Journal Article
Pattern Recognition Letters, ISSN 0167-8655, 08/2016, Volume 79, pp. 80 - 105
Biometric recognition refers to the automated recognition of individuals based on their biological and behavioral characteristics such as fingerprint, face,... 
Biometrics | Iris | Privacy | Fingerprints | Forensics | Face | Security | PERFORMANCE | FACE RECOGNITION | REPRESENTATION | PATTERNS | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | DEVICES | SYSTEMS | Computer science | Algorithms | Analysis | Biometry
Journal Article
Computer, ISSN 0018-9162, 11/2012, Volume 45, Issue 11, pp. 87 - 92
While biometric systems aren't foolproof, the research community has made significant strides to identify vulnerabilities and develop measures to counter them. 
Biometrics | Network security | Privacy | biometric authentication | identity sciences | Authentication | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | Electronic security systems | Data security | Analysis | Security systems | Biometry | Computer security
Journal Article
Pattern Recognition, ISSN 0031-3203, 2005, Volume 38, Issue 12, pp. 2270 - 2285
Journal Article
IEEE Signal Processing Magazine, ISSN 1053-5888, 09/2015, Volume 32, Issue 5, pp. 88 - 100
Biometric recognition is an integral component of modern identity management and access control systems. Due to the strong and permanent link between... 
Feature extraction | Biometrics (access control) | Cryptography | Authentication | Biomedical imaging | Iris recognition | Biometrics | Access control | Algorithms | Degradation | Bridging | Passwords | Estimating | Invariants | Recognition
Journal Article
Web Resource
2008, AD-a488 585.
Multibiometric systems are gaining popularity because they are able to overcome limitations such as non-universality, noisy sensor data and susceptibility to... 
data fusion | iris | neyman-pearson theorem | likelihood ratio tests | templates | identification systems | multibiometric systems | theses | cryptosystems | biometric security | fingerprint recognition | verification | fuzzy vaults
Government Document
01/2010, International Series on Biometrics Ser., ISBN 9781280613333
Annotation Reliable human authentication schemes are of paramount importance in our highly networked society. Advances in biometrics help address the myriad of... 
Web Resource
Clinical and Experimental Pharmacology and Physiology, ISSN 0305-1870, 06/2016, Volume 43, Issue 6, pp. 644 - 646
Journal Article
Computer, ISSN 0018-9162, 02/2010, Volume 43, Issue 2, pp. 36 - 44
Journal Article
IEEE Transactions on Industrial Informatics, ISSN 1551-3203, 08/2018, Volume 14, Issue 8, pp. 3733 - 3744
Journal Article
Proceedings of SPIE, ISSN 0277-786X, 01/2010, Volume 7541, Issue 1, pp. 75410O - 75410O-15
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on... 
Biometrics | Template security | Template transformation | Biohashing | Cancelable templates | Databases | Fingerprints | Passwords | Transformations | Security | Strength | Complexity
Conference Proceeding
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 12/2007, Volume 2, Issue 4, pp. 744 - 757
Journal Article
IEEE Transactions on Pattern Analysis and Machine Intelligence, ISSN 0162-8828, 02/2008, Volume 30, Issue 2, pp. 342 - 347
Journal Article
Pattern Recognition Letters, ISSN 0167-8655, 2010, Volume 31, Issue 8, pp. 733 - 741
Security concerns regarding the stored biometric data is impeding the widespread public acceptance of biometric technology. Though a number of bio-crypto... 
Biometrics | Template security | Fuzzy vault | Minutiae descriptors | FEATURE-SELECTION | IMAGE | PERFORMANCE | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.