Author:
Krishnaswamy Manoj,Hemantha Kumar G.
Reference16 articles.
1. Civil Liberties and Facial Recognition Software. About.com, The New York Times Company. pp. pp. 2, Archived from the original on 2006-03-01, Retrieved 2007-09-17 (2007)
2. Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40:614–634
3. Tulyakov S, Farooq F, Govindaraju V (2005) Symmetric hash functions for fingerprint minutiae. In: Proceedings of int’l workshop pattern recognition for crime prevention, security, and surveillance, pp 30–38
4. Teoh ABJ, Goh A, Ngo DCL (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28:1892–1901
5. Savvides M, Kumar BVKV, Khosla PK (2004) Corefaces- robust shift invariant PCA based correlation filter for illumination tolerant face recognition. Paper presented at IEEE computer society conference on computer vision and pattern recognition (CVPR’04)