<--- Back to Details
First PageDocument Content
Biometrics / Cryptography / Identification / Fingerprints / Fingerprinting algorithms / Security / Fingerprint recognition / Fingerprint / Sonification / Public key fingerprint / Minutiae
Date: 2013-11-17 20:57:28
Biometrics
Cryptography
Identification
Fingerprints
Fingerprinting algorithms
Security
Fingerprint recognition
Fingerprint
Sonification
Public key fingerprint
Minutiae

Microsoft Word - ACMMM2012_20120413v25BHan_ch4title.docx

Add to Reading List

Source URL: yoonchunghan.com

Download Document from Source Website

File Size: 366,14 KB

Share Document on Facebook

Similar Documents

Debauched Minutiae - www.persephonehazard.co.uk Allow me to introduce myself... The first contribution to something like this always feels a little

DocID: 1u3vs - View Document

Biometrics / Cryptography / Identification / Fingerprints / Fingerprinting algorithms / Security / Fingerprint recognition / Fingerprint / Sonification / Public key fingerprint / Minutiae

Microsoft Word - ACMMM2012_20120413v25BHan_ch4title.docx

DocID: 1q3gA - View Document

To Appear in ICB2013 A Generative Model for Fingerprint Minutiae Qijun Zhao, Yi Zhang Sichuan University

DocID: 1mp27 - View Document

To appear at the International Conf. on Biometrics (ICB), JuneBeyond Minutiae: A Fingerprint Individuality Model with Pattern, Ridge and Pore Features Yi Chen1,2 and Anil. K. Jain1 1

DocID: 1mgxO - View Document

2010 23rd SIBGRAPI - Conference on Graphics, Patterns and Images Latent Fingerprint Matching: Fusion of Manually Marked and Derived Minutiae Jianjiang Feng Department of Automation Tsinghua University

DocID: 1m7wf - View Document