[29-1] المراجـع

المراجع:

[1] V. C. Subbarayudu and M. V. N. K. Prasad, "Multimodal Biometric System," presented at the First International Conference on Emerging Trends in Engineering and Technology.
[2] (11/03/2019). Advantages of Multi-biometric Systems over Unibiometric Systems. Available: http://techbiometric.com/articles/advantages-of-multi-biometric-systems-over-unibiometric-systems/
[3] Uludag, U., S. Pankanti, et al. (2004). "Biometric cryptosystems: issues and challenges." Proceedings of the IEEE 92(6): 948
[4] ( 25/01/2019). Cryptography. Available: http://x5.net/faqs/crypto/q103.html
[5] A. Shamir. “How to Share a Secret”. Commun. ACM,22(11):612–613, 1979.
[6] (26/02/2019). What are some secret sharing schemes? Available: http://www.rsa.com/rsalabs/node.asp?id=2259
[7] A. Jain, L. Hong, and Y. Kulkarni, "A multimodal biometric system using fingerprint, face and speech ".
[8] J. Bigun, J. Fierrez-Aguilar, J. Ortega-Garcia, and J. Gonzalez-Rodriguez, "Multimodal biometric authentication using quality signals in mobile communications," in Image Analysis and Processing, 2003.Proceedings. 12th International Conference on, 2003, pp. 2-11.
[9] C. Rathgeb, "Iris Based Biometric Cryptosystems," pp. 17-58, 2008.
[10] C.Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. K. Vijaya Kumar, “Biometric encryption using image processing,” in Proc.SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178–188, 1998.
[11] G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta, “On the relation of error correction and cryptography to an offline biometric based identification scheme,” in Proc. Workshop Coding and Cryptography (WCC’99), pp. 129–138.
[12] T. C. Clancy, N. Kiyavash, and D. J. Lin, “Secure smartcard-based fingerprint authentication,” in Proc. ACMSIGMM ,Multimedia, Biometrics Methods and Applications Workshop, pp. 45–52, 2003.
[13] A. B. J. Teoh, D. C. L. Ngo, and A. Goh. “Personalised cryptographic key generation based on Face Hashing”. Computer& Security, 23:606–614, 2004.
[14] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” in Proc. Eurocrypt, 2004, pp. 523–540.
[15] ( 29/03/2019). Face Recognition using Eigenface. Available: http://chrisdecoro.com/eigenfaces/index.html
[16] M. A. Turk and A. P. Pentland, "Face recognition using eigenfaces," in Computer Vision and Pattern Recognition, 1991. Proceedings CVPR '91., IEEE Computer Society Conference on, 1991, pp. 586-591.
[17] A. K. Jain, B. Klare, and U. Park, "Face recognition: Some challenges in forensics," in Automatic Face & Gesture Recognition and Workshops (FG 2011), 2011 IEEE International Conference on, 2011, pp. 726-733.
[18] D. Maltoni, "A Tutorial on Fingerprint Recognition Advanced Studies in Biometrics." vol. 3161, M. Tistarelli, J. Bigun, and E. Grosso, Eds., ed: Springer Berlin / Heidelberg, 2005, pp. 121-138.
[19] J. Daugman, "How iris recognition works," in Image Processing. 2002. Proceedings. 2002 International Conference on, 2002, pp. I-33-I-36 vol.1.
[20] R. P. Wildes, "Iris recognition: an emerging biometric technology," Proceedings of the IEEE, vol. 85, pp. 1348-1363, 1997.
[21] ( 06/04/2019). MATLAB The Language of Technical Computing. Available: https://www.mathworks.com/products/matlab.html
[23] ALMualla, M. “UAE Iris Expellee Tracking System” 2001.
[24] M. R. Freire, J. Fierrez, J. Galbally, and J. Ortega-Garcia, \Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures," International Conference on Biometrics '07 (LNCS: 4642), pp. 1134-1143, 2007.
[25] N. K. Ratha, J. H. Connell, and R. M. Bolle, \Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, pp. 614-634, 2001.
[26] C. Rathgeb, "Iris Based Biometric Cryptosystems," pp. 17-58, 2008.
[27] T. Matsumoto, H. Matsumoto, K. Yamada and S. Hoshino, “Impact of Artificial Gummy Fingers on Fingerprint Systems,” Proceedings of SPIE, Vol. 4677
[28] L. Thalheim, J. Krissler, P.-M. Ziegler. Body Check: Biometric Access Protection Devices and their Programs Put to the Test. Heise Online.
[29] "Contact-Free Palm-Vein Recognition Based on Local Invariant Features"
Wenxiong Kang1*, Yang Liu1, Qiuxia Wu2, Xishun Yue1