NAVEN 发表于 2025-3-28 15:43:19

http://reply.papertrans.cn/19/1882/188163/188163_41.png

潜伏期 发表于 2025-3-28 22:28:15

https://doi.org/10.1057/9780230608764he high sensitivity of biometric data (whose manipulation could damage the system security or the users’ privacy), and the feeling of governmental control when central databases are used. The authors have been working in providing solutions to these problems, by promoting the idea of using tokens th

LATER 发表于 2025-3-28 23:47:30

https://doi.org/10.1057/9780230608764to hide challenge responses in a WSQ-compressed fingerprint image. In this paper, we extend the work to analyze the security holes in the data hiding method and enhance the hiding technique to thwart attacks on the system. We employ several proven IT security techniques to provide a secure method of

PAGAN 发表于 2025-3-29 06:20:51

https://doi.org/10.1007/b99174access control; architecture; bioinformatics; biometric authentication; biometric systems; biometrics; fin

纬度 发表于 2025-3-29 11:16:45

http://reply.papertrans.cn/19/1882/188163/188163_45.png

纬线 发表于 2025-3-29 12:32:08

http://reply.papertrans.cn/19/1882/188163/188163_46.png

GENRE 发表于 2025-3-29 18:54:26

Pose Invariant Face Recognition Under Arbitrary Unknown Lighting Using Spherical Harmonicsm robust pose and illumination invariant face recognition by using the recovered 3D faces. During training, given an image under arbitrary illumination, we first compute the shape parameters from a shape error estimated by the displacements of a set of feature points. Then we estimate the illuminati

Culpable 发表于 2025-3-29 20:31:36

http://reply.papertrans.cn/19/1882/188163/188163_48.png

雪上轻舟飞过 发表于 2025-3-30 00:34:19

http://reply.papertrans.cn/19/1882/188163/188163_49.png

coddle 发表于 2025-3-30 05:42:12

http://reply.papertrans.cn/19/1882/188163/188163_50.png
页: 1 2 3 4 [5] 6 7
查看完整版本: Titlebook: Biometric Authentication; ECCV 2004 Internatio Davide Maltoni,Anil K. Jain Conference proceedings 2004 Springer-Verlag Berlin Heidelberg 20