Information Technology Reference
In-Depth Information
accurate. In a remarkable number of cases false rejection was due to non-linear distor-
tions, so we plan to introduce a new non-linear transformation of the challenge minu-
tia set that fits the usual distortions of the sample fingerprints. Finding the parameters
of this non-linear transformation will be an inspiring challenge for our further re-
search.
References
[1] Bodo, A.: Method of producing a digital signature with aid of biometric feature, German
Pat.
[2] Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: Biometric Encryption.
http://www.bioscrypt.com/assets/Biometric_Encryption.pdf
[3] Hefferman, S.: The Role of Biometrics within Document Security, TSSI Swindon, United
Kingdom. http://www.afb.org.uk/downloads/pisec.pdf (1999)
[4] Lewis, J.W.: Biometrics for Secure Identity Verification: Trends and Developments. Uni-
versity of Maryland. http://faculty.ed.umuc.edu/~meinkej/inss690/lewis.pdf (2001-2002)
[5] Secure Personal Identification Systems: Policy, Process and Technology Choices for a Pri-
vacy-Sensitive Solution, A Smart Card Alliance White Paper. http://www.ibia.org/ mem-
bersadmin/whitepapers/pdf/11/secure_id_white_paper.pdf (2002)
[6] Berrou, C., Glavieux, A., Thitimajshima, P.: Near Shannon limit error-correcting coding
and decoding: turbo codes. ICC Proceedings (1993)
[7] Ottoson, T., Agrell, E.: Deconding Convolutional Codes http://www.s2.chalmers.se/
graduate/courses/errctrlcoding/convcode_decoding.pdf (2003)
[8] Zhu, G.: Performance Evaluation of Turbo Codes. Queen's University, Kingston, Ontario,
Canada. http://markov.mast.queensu.ca/Papers/zhu_proj98.ps (1998)
 
Search WWH ::




Custom Search