Have a personal or library account? Click to login
By:
Open Access
|Dec 2014

References

  1. N. S. Nourabadi, K. G. Dizaji, and S. A. Seyyedsalehi. “Face pose normalization for identity recognition using 3D information by means of neural networks,” 5th Conference on Information and Knowledge Technology, 2013, pp. 432 – 437, doi: 10.1109/IKT.2013.6620106.10.1109/IKT.2013.6620106
  2. C. Ching-Kun, L. Chun-Liang, L. Shyan-Lung Lin, C. Yen-Ming, and C. Cheng-Tang. “A Chaotic Theorectical Approach to ECG-Based Identity Recognition,” IEEE Computational Intelligence Magazine, 2014, vol. 9, pp. 53 – 63, doi: 10.1109/MCI.2013.2291691.10.1109/MCI.2013.2291691
  3. L. Jiwen Lu, W. Gang Wang, and P. Moulin. “Human Identity and Gender Recognition From Gait Sequences With Arbitrary Walking Directions,” IEEE Transactions on Information Forensics and Security, 2014, vol. 9, pp. 51 – 61, doi: 10.1109/TIFS.2013.2291969.10.1109/TIFS.2013.2291969
  4. L. Feng Liu, D. Zhang and G. Zhenhua. “Distal-Interphalangeal-Crease-Based User Authentication System,” IEEE Transactions on Information Forensics and Security, 2013, vol. 8, pp. 1446 – 1455, doi: 10.1109/TIFS.2013.2272787.10.1109/TIFS.2013.2272787
  5. M. S. Umar and M. Q. Rafiq. “Select-to-Spawn: A novel recognition-based graphical user authentication scheme,” 2012 IEEE International Conference on Signal Processing, Computing and Control, 2012, pp. 1 – 5, doi: 10.1109/ISPCC.2012.6224382.10.1109/ISPCC.2012.6224382
  6. A. Drosou, D. Tzovaras, K. Moustakas, and M. Petrou. “Systematic Error Analysis for the Enhancement of Biometric Systems Using Soft Biometrics,” IEEE Signal Processing Letters, 2012, vol. 19, pp. 833 – 836, doi: 10.1109/LSP.2012.2221701.10.1109/LSP.2012.2221701
  7. P. Tsai, M. K. Khan, J. Pan, and B, Liao. “Interactive Artificial Bee Colony Supported Passive Continuous Authentication System,” Systems Journal, 2014, pp. 395 – 405, doi: 10.1109/JSYST.2012.22 08153.
  8. N. Erdogmus, N and J. L. Dugelay. “3D Assisted Face Recognition: Dealing With Expression Variations,” IEEE Transactions on Information Forensics and Security, 2014, vol. 9, pp. 826 – 838, doi: 10.1109/TIFS.2014.2309851.10.1109/TIFS.2014.2309851
  9. S. J. Elliott, S. A. Massie, and M. J. Sutton. “The Perception of Biometric Technology: A Survey,” 2007 IEEE Workshop on Automatic Identification Advanced Technologies, 2007, pp. 259 – 264, doi: 10.1109/AUTOID.2007.380630.10.1109/AUTOID.2007.380630
  10. R. A. Rashid, N. H. Mahalin, M. A. Sarijari, and A. A. Abdul. “Security system using biometric technology: Design and implementation of Voice Recognition System (VRS),” International Conference on Computer and Communication Engineering, 2008, pp. 898 – 902, doi: 10.1109/ICCCE.2008.4580735.10.1109/ICCCE.2008.4580735
  11. L. Simon and M. Silverman. “A practical guide to biometric security technology,” IT Professional, 2001, vol. 3, pp. 27 – 32, doi: 10.1109 /6294.899930.10.1109/6294.899930
  12. D. C. Leonard, A. P. Pons, and S. S. Asfour. “Realization of a Universal Patient Identifier for Electronic Medical Records Through Biometric Technology,” IEEE Transactions on Information Technology in Biomedicine, 2009, vol. 13, pp. 494 – 500, doi: 10.1 109/TITB.2008.926438.10.1109/TITB.2008.92643819273015
  13. M. C. Fairhurst. “Signature verification revisited: promoting practical exploitation of biometric technology,” Electronics & Communication Engineering Journal, 1997, vol. 9, pp. 273 – 280, doi: 10.104 9/ecej:19970606.10.1049/ecej:19970606
  14. M. Zaied, O. Jemai, and C. Ben Amar. “Training of the Beta wavelet networks by the frames theory: Application to face recognition,” Workshops on Image Processing Theory, Tools and Applications, 2008, pp. 1 - 6, doi: 10.1109/IPTA.2008.4743756.10.1109/IPTA.2008.4743756
  15. B. Knight B and A. Johnston. “The role of movement in face recognition,” IEEE Transactions on Pattern Analysisand Machine Intelligence, 1994, vol. 4, pp. 265 – 273.10.1080/713756764
  16. T. F. Cootes, G. J. Edwards, and C. J. Taylor. “Active Appearance Models,” Proceedings of the European Conference on Computer Vision, 1998, vol. 2, pp. 484 – 498.10.1007/BFb0054760
  17. I. T. tJolliffe. “Principal Component Analysis (2nd Hd.)” Springer, 2002.
  18. T. Jing Yi, Y. H. Tay, and L. Phooi Yee Lau. “One-dimensional Grey-level Co-occurrence Matrices for texture classification,” International Symposium on Information Technology, 2008, vol. 3, pp. 1 – 6, doi: 10.1109/ITSIM.2008.4631992.10.1109/ITSIM.2008.4631992
  19. A. Juraiza Ishak, M. M. Mustafa, and A. Hussain. “Gradient Field Distribution and Grey Level Co-occurrence Matrix techniques for automatic weed classification,” International Symposium on Mechatronics and Its Applications, 2008, pp. 1 – 5, doi: 10.1109/ISM A.2008.4648846.
  20. S. A. Banday, A. H. Mir, and F. Khursheed. “Multi-unit iris biometric fusion using gray level co-occurrence matrix features,” International Conference on Advanced Electronic Systems, 2013, pp. 225 – 229, doi: 10.1109/ICAES.2013.6659397.10.1109/ICAES.2013.6659397
  21. G.Sengupta, T.A.Win, C.Messom, S.Demidenko and S.C. Mukhopadhyay, “Defect analysis of grit-blasted or spray printed surface using vision sensing technique”, Proceedings of Image and Vision Computing NZ, Nov. 26-28, 2003, Palmerston North, pp. 18-23.
  22. Yanmin LUO, Peizhong LIU and Minghong LIAO, AN ARTIFICIAL IMMUNE NETWORK CLUSTERING ALGORITHM FOR MANGROVES REMOTE SENSING, IMAGE,International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp. 116 – 134, 2014.10.21307/ijssis-2017-648
  23. G. Sen Gupta, S.C. Mukhopadhyay, S. Demidenko and C.H. Messom, “Master-slave Control of a Teleoperated Anthropomorphic Robotic Arm with Gripping Force Sensing”, IEEE Transactions on Instrumentation and Measurement, Vol. 55, No. 6, pp. 2136-2145, December 2006.
  24. Daode Zhang et al., RESEARCH ON CHIPS’ DEFECT EXTRACTION BASED ON IMAGE-MATCHING, International Journal on Smart Sensing and Intelligent Systems, VOL. 7, NO. 1, pp.321 – 336, 2014.10.21307/ijssis-2017-658
Language: English
Page range: 1493 - 1515
Submitted on: Jul 3, 2014
Accepted on: Oct 15, 2014
Published on: Dec 1, 2014
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2014 Shiliang Yan, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.