<--- Back to Details
First PageDocument Content
Biometrics / Cryptography / Security / Access control / Identification / Fingerprints / Fingerprinting algorithms / Fingerprint recognition / Surveillance / Fingerprint / Public key fingerprint / Privacy
Date: 2011-02-20 12:09:41
Biometrics
Cryptography
Security
Access control
Identification
Fingerprints
Fingerprinting algorithms
Fingerprint recognition
Surveillance
Fingerprint
Public key fingerprint
Privacy

Preprint of paper for WIFS2010. 1 INTRODUCTION

Add to Reading List

Source URL: www.vast.uccs.edu

Download Document from Source Website

File Size: 2,27 MB

Share Document on Facebook

Similar Documents

Sound / Consciousness / Hearing / Qualia / Sound recording / Automatic identification and data capture / Acoustic fingerprint / Fingerprint / Speech recognition / Stereophonic sound / Acoustics

Indoor Localization without Infrastructure using the Acoustic Background Spectrum Stephen P. Tarzia∗ ∗ Peter A. Dinda∗

DocID: 1rcb5 - View Document

Software / Humancomputer interaction / User interface techniques / Computing / Gesture recognition / Gesture / Multi-touch / Glove / Posture / Surface computing / Tangible user interface / Fingerprint

Microsoft Word - touchid_camera-ready_v10_SB.doc

DocID: 1qXBU - View Document

Biometrics / Fingerprints / Feature detection / Surveillance / Security / Fingerprint recognition / Image processing / Access control / Fingerprint Verification Competition / Fingerprint / Speeded up robust features / Integrated Automated Fingerprint Identification System

Issues in rotational (non-)invariance and image preprocessing Lalit Jain1 , Michael J. Wilber1,2 , Terrance E. Boult1,2 1 VAST Lab, University of Colorado Colorado Springs 2 Securics Inc {ljain2 | mwilber | tboult} @vast

DocID: 1qT3E - View Document

Biometrics / Cryptography / Security / Access control / Identification / Fingerprints / Fingerprinting algorithms / Fingerprint recognition / Surveillance / Fingerprint / Public key fingerprint / Privacy

Preprint of paper for WIFS2010. 1 INTRODUCTION

DocID: 1qe1I - View Document

Biometrics / Cryptography / Identification / Fingerprints / Fingerprinting algorithms / Security / Fingerprint recognition / Fingerprint / Sonification / Public key fingerprint / Minutiae

Microsoft Word - ACMMM2012_20120413v25BHan_ch4title.docx

DocID: 1q3gA - View Document