共 32 条
[21]
Monrose F, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P73, DOI 10.1145/319709.319720
[22]
Cryptographic key generation from voice
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:202-213
[23]
NGO CLD, 2004, FRONT VIEW FACIAL FE
[24]
The FERET evaluation methodology for face-recognition algorithms
[J].
1997 IEEE COMPUTER SOCIETY CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION, PROCEEDINGS,
1997,
:137-143
[25]
Savvides M., 2005, P INT C PATT REC, V3, P922
[26]
Soutar C., 1999, ICSA Guide to Cryptography, V22, P649
[29]
Tulyakov S, 2005, LECT NOTES COMPUT SC, V3687, P30