Comparing Passwords, Tokens, and Biometrics for User Authentication, Proceedings of the IEEE, pp.2021-2040, 2003. ,
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, SIAM Journal on Computing, vol.38, issue.1, pp.97-139, 2008. ,
DOI : 10.1137/060651380
Biometric Systems: Technology, Design and Performance Evaluation, 2005. ,
DOI : 10.1007/b138151
Eigenfaces for Recognition, Journal of Cognitive Neuroscience, vol.10, issue.9, pp.71-86, 1991. ,
DOI : 10.1007/BF00239352
Two-dimensional pca: a new approach to appearance-based face representation and recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.26, issue.1, pp.131-137, 2004. ,
DOI : 10.1109/TPAMI.2004.1261097
Face Recognition with Local Binary Patterns, ECCV 2004, pp.469-481, 2004. ,
DOI : 10.1007/978-3-540-24670-1_36
A fuzzy commitment scheme, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.28-36, 1999. ,
DOI : 10.1145/319709.319714
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.40.763
Information fusion in biometrics, Pattern Recognition Letters, vol.24, issue.13, pp.2115-2125, 2003. ,
DOI : 10.1016/S0167-8655(03)00079-5
A comparative study of texture measures with classification based on featured distributions, Pattern Recognition, vol.29, issue.1, pp.51-59, 1996. ,
DOI : 10.1016/0031-3203(95)00067-4