Author:
Kumar Naresh,Sharma Aditi
Reference28 articles.
1. Phillips, P.J., Grother, P., Micheals, R.J., Blackburn, D.M., Tabassi, E., Bone, M., Face, R.V.T.: Evaluation report. Facial Recognition. Vendor Test 2002, (2003)
2. Jain, A.K., Ross, A., Pankanti, S.: Biometrics: a tool for information security. IEEE Trans. Inf. Forensics Secur. 1(2), 125–143 (2006)
3. Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4–20 (2004)
4. Ross, A., Othman, A.: Visual cryptography for biometric privacy. IEEE Trans. Inf. Forensics Secur. 6(1), 70–81 (2011)
5. Grother, P.J., Quinn, G.W., Phillips, P.J.: Report on the evaluation of 2D still-image face recognition algorithms. NIST interagency report, 7709, 106, (2010)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Blockchain Based Security Enabled Smart Contract for Energy Management;2023 16th International Conference on Security of Information and Networks (SIN);2023-11-20
2. Utilizing high computational ML model for lung cancer prediction with accurate data analysis;MACHINE LEARNING AND INFORMATION PROCESSING: PROCEEDINGS OF ICMLIP 2023;2023
3. Mechanism Incorporating Secure Mutual Validation and Key Spreading Organization in Intelligent Transport System;2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP);2022-11-23
4. Prediction of Flight-fare using machine learning;2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP);2022-11-23
5. Evolution and comparative analysis of different Cloud Access Security Brokers in current era;2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP);2022-11-23