Author:
Dwivedi Rudresh,Dey Somnath,Singh Ramveer,Prasad Aditya
Subject
Law,General Computer Science
Reference31 articles.
1. Theoretical and practical boundaries of binary secure sketches;Bringer;IEEE Trans Inf Forensics Security,2008
2. Robust extraction of secret bits from minutiae;Chang,2007
3. How iris recognition works;Daugman,2002
4. Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters;Daugman;J Opt Soc Am A,1985
5. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data;Dodis,2004
Cited by
44 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献