11.07.2015 Views

Detección de vida vía software en imágenes de iris ... - ATVS

Detección de vida vía software en imágenes de iris ... - ATVS

Detección de vida vía software en imágenes de iris ... - ATVS

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

[15] J. Daugman. How <strong>iris</strong> recognition works. IEEE Trans. On Circuits and Systems forVi<strong>de</strong>o Technology, 14:21–30, 2004.3[16] J. Daugman. Iris recognition and anti-spoofing countermeasures. In Proc. Int.Biometrics Conf. (IBC), 2004[17] Y. Du, C. Belcher, et al. Feature correlation evaluation approach for <strong>iris</strong> featurequality measure. Signal Processing, 90:1176–1187, 2010. 4[18] J. Fierrez, J. Ortega-Garcia, et al. BioSec baseline corpus: A multimodal biometricdatabase. Pattern Recognition, 40:1389–1392, 2007. 5[19] A. K. Jain and D. Zongker. Feature selection: evaluation, application, and smallsample performance. IEEE Trans. on Pattern Analysis and Machine Intellig<strong>en</strong>ce, 19:153–158, 1997. 4[20] R. A. Jarvis. Focus optimization criteria for computer image processing. Microscope,24:163–180, 1976. 3[21] N. Kalka, J. Zou, et al. Image quality assessm<strong>en</strong>t for <strong>iris</strong> biometric. In Proc. SPIEBTHI III, volume 6202, pages 61020D1–61020D11, 2005. 3[22] M. Kanematsu, H. Takano, and K. Nakamura. Highly reliable liv<strong>en</strong>ess <strong>de</strong>tectionmethod for <strong>iris</strong> recognition. In Proc. SICE ICICIT, pages 361–364, 2007. 1[23] E. C. Lee, K. R. Park, and J. Kim. Fake <strong>iris</strong> <strong>de</strong>tection by using purkinje image. InProc. IAPR ICB, pages 397–403, 2006. 1[24] A. Lefohn, B. Budge, et al. An ocularists approach to human <strong>iris</strong> synthesis. IEEETrans. On Computer Graphics and Applications, 23:70–75, 2003. 1[25] M. Martinez-Diaz, J. Fierrez, et al. An evaluation of indirect attacks andcountermeasures in fingerprint verification systems. Pattern Recognition Letters. Toappear. 1[26] N. Poh, T. Bourlai, et al. B<strong>en</strong>chmarking quality-<strong>de</strong>p<strong>en</strong><strong>de</strong>nt and cost-s<strong>en</strong>sitive scorelevelmultimodal biometric fusion algorithms. IEEE Trans. on Information For<strong>en</strong>sicsandSecurity, 4:849–866, 2009. 1[27] P. Pudil, J. Novovicova, and J. Kittler. Flotating search methods in feature selection.Pattern Recognition Letters, pages 1119–1125, 1994. 2, 4[28] U. C. von Seel<strong>en</strong>. Countermeasures against <strong>iris</strong> spoofing with contact l<strong>en</strong>ses.Technical report, Iridian Tech., 2005. 1[29] J. Zou and N. A. Schmid. Global and local quality measures for nir <strong>iris</strong> vi<strong>de</strong>o. InProc. IEEE WCVPR, pages 120–125, 2009. 3, 464

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!