|
參考文獻 [1] M. Alkhathami, "Fingerprint Authentication Enhancement Using Combination of DWT and DCT," in IEEE 10th Conference on Industrial Electronics and Applications (ICIEA), 2015. [2] A. Vashistha and A. M Joshii, "Fingerprint based Biometric Watermarking Architecture using Integer DCT," in TENCON 2016 - 2016 IEEE Region 10 Conference, 2016. [3] A. Alsubari and R. J. Ramteke, "Extraction of Palmprint Texture Features using Combined DWT-DCT and Local Binary Pattern," in International Conference on Next Generation Computing Technologies (NGCT-2016), 2016. [4] K. Tewari and R. L. Kalakoti, "Fingerprint Recognition and Feature Extraction Using Transform Domain Techniques," in International Conference on Advances in Communication and Computing Technologies, 2014. [5] M. P. Dale and M. A. Joshi, "Fingerprint Matching Using Transform Features," in TENCON 2008 - 2008 IEEE Region 10 Conference, 2008. [6] A. Mori and H. Takano, "Rotation Immunity Characteristics of Non-contact Fingerprint Recognition Using Local Luminance Variation," in SICE Annual Conference 2012, 2012. [7] I. Bhardwaj and N. D. Londhe, "Feature Selection for Novel Fingerprint Dynamics Biometric Technique based on PCA," in International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016. [8] Y. C. Wang, Biometrics-A Study of Speaker and Fingerprint Identification, Department of Electrical Engineering, Tamkang University, PhD. thesis., 2002. [9] M. Sezgin and B. Sankur, "Survey over image thresholding techniques and quantitative performance evaluation," Journal of Electronic Imaging, vol. 13, no. 1, p. 146–165, 2004. [10] I. Jolliffe, Principal Component Analysis, Second Edition, 2002. [11] Yili Li and K. M. Wong, "Riemannian Distances for Signal Classification by Power Spectral Density," IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, vol. 4, Aug 2013. [12] C.F. Chien and T.T. Lin, "An Image Processing Method To Measure Overlapped Leaf Area Using Elliptical Hough Transform," Computer And Computing Technologies In Agriculture, Volume II, pp. 1427-1433, 2007. [13] Z. Y. X. ,. X. a. T. J. Z Ning, "Adaptive Orientation Model Fitting for Latent Overlapped Fingerprints Separation," IEEE Trans. Inf. Forensics Security, vol. 9, no. 10, Oct 2014. [14] F. Chen, J. Feng and J. Zhou, "On Separating Overlapped Fingerprints," in IEEE, 2010. [15] J.Moraleda, "Large scalability in document image matching using text retrieval," Pattern Recognition Letters, vol. 33, no. 7, pp. 863-871, 1 May 2012. [16] J. Feng, Y. Shi, and J. Zhou, "Robust and efficient algorithms forseparating latent overlapped fingerprints," IEEE Trans. Inf. ForensicsSecurity, vol. 7, no. 5, pp. 1498-1510, Oct. 2012. [17] "FVC2002: The Second International Fingerprint Verification Competition," [Online]. Available: http://bias.csr.unibo.it/fvc2002/. [18] J.Feng, "Robust and Efficient Algorithms for Separating Latent Overlapped Fingerprints," IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, vol. 7, no. 5, 2012.
|