Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Ballan M, “Directional Fingerprint Processing”, proceedings of Fourth International Conference on Communication, Networking & Broadcasting, pp. 1064- 1067, 12-16 Oct. 1998. 
    2. Mohamed Suliman M and Henry O Nyongesa, “Automatic Fingerprint Classification System Using Fuzzy Neural Techniques”, proceedings of IEEE International Conference on Computing & Processing (Hardware/Software), pp. 12-17, May 2002.
    3. Hanaa M. A. Salman, “Fuzzy Bio-Cryptography Key Generation”, proceedings of the 13th International ACIT 2012, Dec. 10-13.
    4. Kai Xi and Jiankun Hu, Bio-Cryptography - Handbook of Information and Communication Security, pp. 129-157, 2004
    5. Ratha., N. K., Chikkerur., S. Connell., J. H. Bolle., R.M., "Generating Cancelable Fingerprint Templates", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp.561 - 572, 2007.
    6. B. Prasanalakshmi, A. Kannammal, "A secure cryptosystem from palm vein biometrics", In proceedings of the ACM International, Seoul, Korea, pp. 1401-1405, 2009.
    7. H. A. Garcia-Baleon, V. Alarcon-Aquino, O. Starostenko, "K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation", proceedings of the 14th Iberoamerican Conference on Pattern Recognition, pp. 85 – 94, 2009.
    8. B. Chen, V. Chandran, "Biometric Based Cryptographic Key Generation from Faces", In Proceedings of the 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp. 394-401, 2007.
    9. Sangram Bana, and Dr. Davinder Kaur, “Fingerprint Recognition using Image Segmentation”, International Journal of Advanced Engineering Sciences and Technologies, vol. 5, pp. 012 – 023, 2011.
    10. Sozan Abdullah Mahmood, “Fingerprint identification Based on Skeleton Minutiae extraction”, proceeding of ICGST AIML Conference, pp. 161 -165, 2011.
    11. Marius Tico, Eero Immonen, Pauli Ramo, Pauli Kuosmanen, and Jukka Saarinen, “Finger print recognition using wavelet features”, proceeding of IEEE International Symposium on Communication, pp. 21- 24, 2001.
    12. Jyoti Rajharia, and P.C. Gupta, “A New and Effective Approach for Fingerprint Recognition by using Feed Forward Back Propagation Neural Network”, International Journal of Computer Applications, vol 52, pp. 020-028, 2012.
    13. Rajib Paul, Mustafa Sarwar Nasif, and S. M. Farhad, “Fingerprint recognition by Chain Coded String Matching technique”, proceeding of International Conference on Information and Communication Technology, pp. 64-67, 2007.
    14. Ravi J, K.B. Raja, and Venugopal K.R, “Finger Print Recognition using Minutia Score Matching”, International Journal of Engineering Science and Technology, vol.1, no. 2, pp. 35-42, 2009.
    15. L. O’Gorman, “Overview of fingerprint verification technologies”, Elsevier Information Security Technical Report, vol. 3, 1998.
    16. Roli Bansal, Priti Sehgaland, Punam Bedi, Minutiae Extraction from Fingerprint Images - a Review, IJCSI International Journal of Computer Science Issues, vol. 8, Issue 5, No 3, 2011.
    17. Peter Stavroulakis, Mark Stamp, “Handbook of Information and Communication Security”, Springer, ISBN 978-3-642-04116-7, 2010.
    18. A. Juels, M. Wallenberg, “A Fuzzy Commitment Scheme”, In Proceeding of Sixth ACM Conference on Computer and Communications Security, Singapore, pp. 28-36, 1999.
    19. A. Juels, M. Sudan, “ A Fuzzy Vault Scheme”, In Proceeding of the IEEE International Symposium on Information Theory, Lau-sanne, pp. 408, 2002.
    20. Y.J. Chang, W. Zhang, T. Chen, “ Biometrics Based Cryptographic Key Generation”, In Proceeding of the IEEE Conference on Multimedia and Expo, Taipei, pp. 2203-2206, 2001.
    21. C. Vielhauer, R. Stcinmctz, A. Maycrhofcr, “Biomctric Hash Based on Statistical Features of Online Signatures”, In Proceeding of the 16th International Conference on Pattern Recognition, Quebec, pp.123-126, 2002.
    22. Y. Dodis, R. Ostrovsky, L. Reyzin, A. Smith, “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data”, SIAM Journal on Computing, vol. 38, no. 1, pp.97–139, 2008.
    23. Kushal veer singh, “application of neural networks in fingerprint identification”, thesis, 2010. [25] K. Venkateshwarlu, “Image Enhancement using Fuzzy Inference System”, thesis, June 2010.
    24. Lin Hong, “Automatic Personal Identification Using Fingerprints”, Ph.D. Thesis, 1998.
    25. Maria Cristina Floreno, Giovanni Novelli, “Implementingfuzzy polynomial interpolation (FPI) and fuzzy linear regression (LFR)”. http://www.dmi.unict.it/ojs/index.php/lematematiche/articl e/view/426 
    26. http://bias.csr.unibo.it/fvc2004

Recent Article