A list of papers that included AdvancedSourceCode.Com in the references section:
- S.D. Thepade et al., “Multimodal Identification Technique Using Iris & Palmprint Traits With Matching Score Level In Various Color Spaces With BTC Of Bit Plane Slices,” ICIC International Conference on Industrial Instrumentation and Control, pp. 1469-1473 (2015)
- R. K. Bhondave et al., “Performance Assessment of Color Spaces in Multimodal Biometric Identification with Iris and Palmprint using Thepade's Sorted Ternary Block Truncation Coding,” IJICAR International Journal of Integrated Computer Applications & Research, Vol. 1, Issue 2, pp. 1-5 (2015)
- N. Anurakphanawan et al., “Fingerprint recognition performance with WSQ, CAWDR, and JPEG2000 compression,” IC-ICTES International Conference of Information and Communication Technology for Embedded Systems, pp. 1-6 (2015)
- K. Singh et al., “Fingerprint denoising using ridge orientation based clustered dictionaries,” Neurocomputing, Vol. 167, pp. 418-423 (2015)
- I. Giotis et al., “MED-NODE: A Computer-Assisted Melanoma Diagnosis System Using Non-Dermoscopic Images,” Expert Systems with Applications, Vol. 42, Issue 19, pp. 6578-6585 (2015)
- S. Ambadiyil et al., “Biometric Based Unique ID Generation and One to One Verification for Security Documents,” ICICT Proceedings of the International Conference on Information and Communication Technologies, Vol. 46, pp. 507-516 (2015)
- K. A. Buragga et al., “An Efficient Technique for Iris Recognition using Wavelets and Artificial Neural Networks ,” CATA International Conference on Computers and Their Applications (2015)
- Y. Suresh et al., “Feature Selection in Multimodal Authentication Using LU Factorization With CSEAM Model,” IJCSA International Journal on Computational Sciences & Applications, Vol. 5, No. 1, pp. 71-80 (2015)
- S.D. Thepade et al., “Bimodal Biometric Identification with Palmprint and Iris Traits Using Fractional Coefficients of Walsh, Haar and Kekre Transforms,” ICCICT International Conference on Communication, Information & Computing Technology, pp. 1-4 (2015)
- Sumana Kundu and Goutam Sarker, “A Modified SOM-Based RBFN for Rotation Invariant Clear and Occluded Fingerprint Recognition,” Intelligent Computing and Applications Advances in Intelligent Systems and Computing, Volume 343, pp. 11-18 (2015)
- Y. Suresh et al., “Pattern Recognition Using Context Dependent Memory Model (CDMM) in Multimodal Authentication System,” IJFCST International Journal in Foundations of Computer Science & Technology, Vol. 5, No. 1, pp. 47-57 (2015)
- M.K. Konstantakis and E.J. Yannakoudakis, “A Writer Identification System of Greek Historical Documents using MATLAB,” IJETAE International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 10, pp. 609-617 (2014)
- R.P. Ramachandran et al., “Vertical Integration of Biometrics Across the Curriculum: Case Study of Speaker, Face and Iris Recognition,” IEEE Circuits and Systems Magazine, Volume 14, Issue 3, pp. 55-69 (2014)
- Supriya Patil et al., “Voice Recognition Using Artificial Neural Network,” IJAFRC International Journal of Advance Foundation and Research in Computer, Volume 1, Issue 8, pp. 30-35 (2014)
- Poonam A. Katre, “Face Authentication /Recognition System For Forensic Application Using Sketch Based On The Sift Features Approach,” IJRIT International Journal of Research in Information Technology, Volume 2, Issue 4, pp. 185-195 (2014)
- Mahalinga V. Mandi et al., “Biometric Based Attendance Management System Using Wi-Fi,” IJETR International Journal of Emerging Technology & Research, Volume 1, Issue 5, pp. 32-36 (2014)
- Sumana Kundu, “A modified BP network using malsburg learning for rotation and location invariant fingerprint recognition and localization with and without occlusion,” IC3 International Conference on Contemporary Computing, pp. 617-623 (2014)
- J.V. Gorabal and D.H. Manjaiah, “Wavelet Energy Features For Fingerprint Identification,” IJGM International Journal of Graphics and Multimedia, Volume 5, Issue 2, pp. 1-13 (2014)
- Alka Yadav and Pawan Yadav, “Face Recognition Techniques and Neural Network,” International Journal of Engineering and Management Research, Volume 4, Issue 4, pp. 40-43 (2014)
- Sumana Kundu and Goutam Sarker, “An Efficient Multiple Classifier Based on Fast RBFN for Biometric Identification,” Smart Innovation, Systems and Technologies, Volume 27, pp. 473-482 (2014)
- Jovana Jojić et al., “Klasifikacija i prepoznavanje otisaka prstiju,” INFOTEH-JAHORINA, Vol. 13, pp. 676-681 (2014)
- Phil Libin, “Extracting Multiple Facial Photos From A Video Clip,” United States Patent Application 20140029859 (2014)
- Ahmad. M. Sarhan, “A WPD Scanning Technique for Iris Recognition,” International Journal of Computer Applications, Vol. 85, No. 14, pp. 6-12 (2014)
- S.D. Thepade et al., “Iris recognition using fractional coefficients of transforms, Wavelet Transforms and Hybrid Wavelet Transforms,” ICCCCM International Conference on Control Computing Communication & Materials, pp. 1-5 (2013)
- Anand Gupta et al., “Performance Analysis of Canny and DGW-Canny in Biometrics using Discrete Wavelet Transform (DWT),” ICSIP International Conference on Signal and Information Processing, pp. 86-95 (2013)
- Amin Dehghani et al., “Review of Human Recognition Based on Retinal Images,” Advances in Biometrics for Secure Human Authentication and Recognition (2013)
- Fitri Arnia et al., “Ordinal Measure of Discrete Cosine Transform (DCT) Coefficients And Its Application to Fingerprint Matching,” IJECE International Journal of Electrical and Computer Engineering, Vol. 3, No. 6, pp. 823-830 (2013)
- Purneet Kaur and Jaspreet Kaur, “Fingerprint Recognition Using Genetic Algorithm and Neural Network,” International Journal of Computational Engineering Research, Vol. 3, Issue 11, pp. 41-46 (2013)
- R. Savage, N.L. Clarke and F. Li, “Multimodal Biometric Surveillance using a Kinect Sensor,” Proceedings of the 12th Annual Security Conference, Las Vegas, USA, pp. 28-39 (2013)
- Steven L. Fernandes, Dr. G. Josemin Bala, “A comparative study on ICA and LPP based Face Recognition under varying illuminations and facial expressions,” IEEE Xplore archived International Conference on Signal Processing Image Processing & Pattern Recognition, Coimbatore, India, pp. 122-126 (2013)
- S. H. Davis et al., “A freshman level module in biometric systems,” ISCAS International Symposium on Circuits and Systems, pp. 2767-2770 (2013)
- Dr. Sudeep D. Thepade and Pooja Bidwai, “Iris Recognition using Fractional Coefficients of Cosine, Walsh, Haar, Slant, Kekre Transforms and Wavelet Transforms,” IJETCAS International Journal of Emerging Technologies in Computational and Applied Sciences, pp. 141-146 (2013)
- P.E.S.N. Krishna Prasad et al., “Fusion Based Multimodal Authentication In Biometrics Using Context-Sensitive Exponent Associative Memory Model : A Novel Approach,” CCSIT Computer Science & Information Technology, pp. 81-90 (2013)
- Pavan Kumar et al., “Feature Extraction using Sparse SVD for Biometric Fusion in Multimodal Authentication,” IJNSA International Journal of Network Security & Its Applications, Vol. 5, No. 4, pp. 83-94 (2013)
- Tomasz Marciniak et al., “Influence of low resolution of images on reliability of face detection and recognition,” Multimedia Tools and Applications (2013)
- Shilpa P.Kodgire and Anju Mohan, “Automatic Fingerprint Recognition Systems:A Review,” International Journal of Electronics,Communication and Soft Computing Science and Engineering, Volume 3, Issue 3, pp. 11-15 (2013)
- Dr.Sudeep D. Thepade and Pooja V. Bidwai, “Contemplation of Image Based Iris Recognition,” IJERA International Journal of Engineering Research and Applications, Vol. 3, Issue 2, pp. 1057-1066 (2013)
- G. Kanimozhiand and Dr.T.Chakravarthy, “Secure Biometric Authentication System Architecture Using Fingerprint Using FAR,” IJERT International Journal of Engineering Research & Technology, Vol. 2, Issue 2, pp. 1-6 (2013)
- S.H. Utami et al., “Simple Hashing for Core Point and Minutiae Based Fingerprint Identification,” Jurnal Sarjana ITB bidang Teknik Elektro dan Informatika, Vol. 1, No. 3 (2012)
- Firas I. Hazzaa, Seifedine Kadry and Oussama Kassem Zein, “Web-Based Voting System Using Fingerprint: Design and Implementation,” International Journal of Computer Applications in Engineering Sciences, Vol. 2, Issue 4, pp. 404-409 (2012)
- Rosario Arjona and Iluminada Baturone, “A hardware solution for real-time intelligent fingerprint acquisition,” Journal of Real-Time Image Processing (2012)
- Manal Abdullah, Mona Alkhozae and Mashaiel Alsowaiel, “Fingerprint Matching Approach Based onBifurcation Minutiae,” Journal of Information and Communication Technologies, Vol. 2, Issue 5, pp. 33-40 (2012)
- Shivani Garg and Ranjit Singh, “An Efficient Method for Digital Image Watermarking Based on PN Sequences,” IJCSE International Journal on Computer Science and Engineering, Vol. 4, No. 9, pp. 1550-1561 (2012)
- Md. Shahjahan Kabir, “Face Recognition System Using Principle Component Analysis and Genetic Algorithm,” International Conference on Statistical Data Mining for Bioinformatics Health Agriculture and Environment, pp. 585-590 (2012)
- P. Saveetha and S. Arumugam, “Study on Improvement in RSA Algorithm and its Implementation,” IJCCT International Journal of Computer & Communication Technology, Volume 3, Issue 6,7,8, pp. 61-66 (2012)
- G. Boato and F. G. B. De Natale, “Identify computer generated characters by analysing facial expressions variation,” WIFS International Workshop on Information Forensics and Security, pp. 252-257 (2012)
- M. Masoumi and S. Amiri, “Content Protection in Video Data Based on Robust Digital Watermarking Resistant to Intentional and Unintentional Attacks,” IAJIT The International Arab Journal of Information Technology, Vol. 11, No. 2 (2012)
- Usha Pal and Manish Verma, “Factors Affected to Image in Digital Watermarking,” International Journal of Computer Applications, Issue 2, Volume 5, pp. 96-101 (2012)
- Usha Pal and Dinesh Chandra, “Survey Of Digital Watermarking Using DCT,” IJCSE International Journal on Computer Science and Engineering, Volume 4, No. 9, pp. 1647-1649 (2012)
- Yang Zhang, Peng Xia, Junzhou Luo , Zhen Ling, Benyuan Liu and Xinwen Fu, “Fingerprint Attack against Touch-enabled Devices,” Proceedings of the 2nd Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM) conjunction with the 19th ACM Conference on Computer and Communications Security (CCS'12), Raleigh, NC, USA, pp.57-68 (2012)
- Firas Hazzaa and Seifedine Kadry, “New System of E-Voting Using Fingerprint,” International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 10, pp. 355-363 (2012)
- Meftah Ur Rahman, “A comparative study on face recognition techniques and neural network,” Department of Computer Science, George Mason University (2012)
- Dogan Ibrahim, “Human Emotion Recognition System,” I.J. Image, Graphics and Signal Processing, pp. 50-56 (2012)
- Peng Zhang et al., “Spatial Beam Dynamics Mediated by Hybrid Nonlinearity,” Nonlinear Photonics and Novel Optical Phenomena, Vol. 170, pp. 133-170 (2012)
- Nikhil J. Dhinagar, Ivan Glasgo, Mehmet Celenk and Mehmet A. Akinlar, “Cancerous Lesion Detection from Nevoscope Skin Surface Images via Parametric Color Clustering,” Communications in Computer and Information Science, Volume 321, Part 4, pp. 367-375 (2012)
- Dilbag Singh, “An educational text-dependent speaker recognition system,” International Journal of Electrical Engineering Education, Volume 49, Number 1, pp. 61-73 (2012)
- Maqsood Mahmud, Mohammad Waqar, Abdulrahman Abdulkarim Mirza and Abdul Hanan Bin Abdullah, “Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented Method,” Ninth International Conference on Information Technology - New Generations, pp. 635-639 (2012)
- Tomasz Marciniak, Adam Dabrowski, Agata Chmielewska and Radosław Weychan, “Face Recognition from Low Resolution Images,” Communications in Computer and Information Science, Volume 287, Pages 220-229 (2012)
- Maha Bellaaj, “Comparative analysis of audio watermarking technique in MDCT domain with other references in spectral domain,” SSD International Multi-Conference on Systems, Signals and Devices, pp. 1-6 (2012)
- H. B. Kekre, Sudeep D. Thepade and Donovan Pereira Kiran Rohra, “Effect of Tiling in Row Mean of Column Transformed Image as Feature Vector for Iris Recognition with Cosine, Hadamard, Fourier and Sine Transforms,” International Journal of Computer Applications, Vol. 40, No. 12, pp. 14-18 (2012)
- Vijay V. Chaudhary and S.R. Suralkar, “An Efficient Hybrid Method for Fingerprint Matching for Noisy Images,” International Journal of Computer Science and Communication, Vol. 3, No. 1, pp. 113-117 (2012)
- Nikhil J. Dhinagar and Mehmet Celenk, “Non-invasive detection and classification of skin cancer from visual and cross-sectional images,” ISABEL International Symposium on Applied Sciences in Biomedical and Communication Technologies (2011)
- Shouyuan Yang, Zhanjie Song and Jong Hyuk Park, “A High-Capacity CDMA Watermarking Scheme Based on Orthogonal Pseudorandom Sequence Subspace Projection,” MUE Multimedia and Ubiquitous Engineering, Pages 33-38 (2011)
- Samuel A. Isaacson, Robert M. Kirby, “Numerical Solution of Linear Volterra Integral Equations of the Second Kind with Sharp Gradients,” Journal of Computational and Applied Mathematics, Volume 235, Issue 14, Pages 4283-4301 (2011)
- N. J. Dhinagar, “Power spectra based classification of cancerous nevoscope skin images,” ICCAIE 2011 Computer Applications and Industrial Electronics, Pages 278-283 (2011)
- Kamta Nath Mishra, Anupam Agrawal, Prakash Srivastava, Vivek Tripathi and Vishal Gupta, “An Efficient Eigen Values Based Technique for Online Iris Image Compression and Identification,” International Journal of Information Acquisition, Vol. 8, No. 2, Pages 133-152 (2011)
- A. Sankaran, T.I. Dhamecha, M. Vatsa and R. Singh, “On Matching Latent to Latent Fingerprints,” IJCB 2011 International Joint Conference on Biometrics (2011)
- H. B. Kekre, S. D. Thepade, J. Jain and N. Agrawal, “Iris recognition using texture features extracted from Walshlet pyramid,” ACM International Conference and Workshop on Emerging Trends in Technology ICWET (2011)
- B. Kekre, Sudeep D. Thepade, Juhi Jain and Naman Agrawal, “Performance Comparison of IRIS Recognition Techniques using Wavelet Pyramids of Walsh, Haar and Kekre Wavelet Transforms,” IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology, (2):20-26 (2011)
- Moaz Abdulfattah Ahmad, Rasheed M. El Awady, “Wavelet-Neural Networks Based Phonetic Recognition System of Arabic Alphabet letters,” IJCSNS International Journal of Computer Science and Network Security, Vol. 10, No. 12, pp. 106-114 (2010)
- K. Aboutammam, A. Tamtaoui, M. A. Kbir, “Content based image watermarking using multi-level decomposition and CDMA technique,” ISVC Communications and Mobile Network (2010)
- Dr. H. B. Kekre, Sudeep D. Thepade, Juhi Jain, Naman Agrawal, “IRIS Recognition using Texture Features Extracted from Haarlet Pyramid,” International Journal of Computer Applications, Volume 11, No. 12 (2010)
- Mary Lourde R and Dushyant Khosla, “Fingerprint Identification in Biometric Security Systems,” International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, pp. 852-855 (2010)
- H. B. Veena, S. Krishna, P. D. Shenoy, “SURF: Steganalysis using random forests,” ISDA Intelligent Systems Design and Applications, pp. 373-378 (2010)
- Tomáš Petr´icek, Tomáš Svoboda, “Matching by Normalized Cross-Correlation—Reimplementation, Comparison to Invariant Features,” Czech Technical University, Center For Machine Perception (2010)
- Veena H. Bhat, Krishna S., P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik, “JPEG Steganalysis Using HBCL Statistics and FR Index,” Intelligence and Security Informatics, Pacific Asia Workshop, PAISI, pp. 105-112 (2010)
- Veena H. Bhat, Krishna S., P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik, “HUBFIRE — A multi-class SVM based JPEG steganalysis using HBCL statistics and Fr Index,” SECRYPT Proceedings of the 2010 International Conference on Security and Cryptography, pp. 1-6 (2010)
- U. Polishchuk, A. Tkachenko, Y. Tsymbal, “Image Compression,” National University "Lviv Polytechnic", Department of Automated Control Systems (2010)
- Abdullah Sharaf Alghamdi and Hanif Ullah, “A Secure Iris Image Encryption Technique Using Bio-Chaotic Algorithm,” International Journal of Computer and Network Security, Vol. 2, No. 4 (2010)
- Mohamed Lamine Toure and Zou Beiji, “Intelligent Sensor for Image Control Point of Eigenfaces for Face Recognition,” Journal of Computer Science 6 (5): 519-526 (2010)
- Samuel Isaacson, “The Reaction-Diffusion Master Equation as an Asymptotic Approximation of Diffusion to a Small Target,” SIAM J. Appl. Math. Volume 70, Issue 1, pp. 77-111 (2009)
- Sally Thompson, Gabriel Katul, John Terborgh, Patricia Alvarez-Loayza, “Spatial organization of vegetation arising from non-local excitation with local inhibition in tropical rainforests,” Physica. D, vol. 238, no. 13, pp. 1061-1067 (2009)
- Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan, “Bio-chaotic Stream Cipher-Based Iris Image Encryption,” CSE, vol. 2, pp.739-744, International Conference on Computational Science and Engineering (2009)
- Clarke N.L., Karatzouni S., Furnell S.M., “Flexible and Transparent User Authentication for Mobile Devices,” Proceedings of the 24th IFIP TC 11 International Information Security Conference, Pafos, Cyprus, Pages 1-12 (2009)
- P. Zhang, S. Liu, C. Lou, Y. Gao, J. Zhao , J. Xu and Z. Chen, “Hybrid nonlinearity supported by nonconventionally biased photorefractive crystals,” Applied Physics B: Lasers and Optics, Volume 95, Number 3, Pages 559-563 (2009)
- Stephen Secules and Jonas Braasch, “Testing the Limits – Quantifying the Degradation of Automatic Speech Recognition in Reverberant Environments,” Journal of the Acoustical Society of America, Volume 126, Issue 4, Pages 2218 (2009)
- Lisa Coffey, “WEB-SKILLS: Web Design and Web Development Principles,” Irish Internet Association (2009)
- Ghazaleh Sarbishaei and Saied Hosseini Khayat, “Template Protection and Performance Improvement of Biometric Authentication Systems Using Watermarking,” International Review on Computers & Software, Vol. 4, Issue 3, pp. 351-358 (2009)
- Punsawad Y. and Wongsawat Y., “Palmprint image enhancement using phase congruency,” IEEE International Conference on Robotics and Biomimetics, Bangkok, Thailand, Pages 1643-1646 (2009)
- Hataikan Poncharoensil and Seri Pansang, “Automatic Pixel Boosting for Face Enhancement in Dim Light,” The 23rd International Technical Conference on Circuits/Systems, Computers and Communications (2008)
- Vitali Müller, “Singular Value Decomposition,” Fraunhofer SCAI (2008)
- Sally Thompson, Gabriel Katul, and Sean M. McMahon, “Role of biomass spread in vegetation pattern formation within arid ecosystems,” Water Resour. Res., Vol. 44, W10421 (2008)
- Alvise Sommariva, “Sistemi lineari sovradeterminati e SVD,” University of Padova, Department of Pure and Applied Mathematics (2008)
- A. S. Abdul-Ahad, Baran Çürüklü, and Waleed A. Mahmoud, “Robust Distance-Based Watermarking for Digital Image,” International Conference on Security and Management (2008)
- Nathan Clarke, “Transparent User Authentication: Biometrics, Rfid and Behavioural Profiling,” Springer (2008)
- Junichi Sakamoto, Stephen Miller, “Hybrid Fingerprint Recognition,” Aim8 Product Development (2008)
- B. Purna Kumaria, V.P. Subramanyam Rallabandi, “Modified patchwork-based watermarking scheme for satellite imagery,” Signal Processing, Volume 88, Issue 4, Pages 891-904 (2008)
- N.L.Clarke, S.M.Furnell and S.Karatzouni, “Applicable Authentication Methods for Mobile Devices and Services,” Information Security & Network Research Group, University of Plymouth (2007)
- P. Zhang, J. Zhao, C. Lou, X. Tan, Y. Gao, Q. Liu, D. Yang, J. Xu, and Z. Chen, “Elliptical solitons in nonconventionally biased photorefractive crystals,” Opt. Express 15, 536-544 (2007)
- A. Pierangelo, E. DelRe, A. Ciattoni, G. Biagi, E. Palange, and A. Agranat, “Separating polarization components through the electro-optic read-out of photorefractive solitons,” Opt. Express 15, 14283-14288 (2007)
- C. Crognale, V. Ricchiuti, S. Caputo, S. Saracino, “Preserving signal integrity in a SOA-based de-multiplexer used in OTDM interconnections,” IEEE Workshop on Signal Propagation on Interconnects, Pages 135-138 (2007)
- Mirosław Łazoryszczak and Piotr Boryszek, “Odporność graficznych znaków wodnych na wybrane ataki,” Metody Informatyki Stosowanej, Kwartalnik Komisji Informatyki Polskiej Akademii Nauk Oddział w Gdansku (2007)
- J. Al-Muhtadi, “Augmenting Smart Spaces with Intelligent Robots,” ICPCA 2007 2nd International Conference on Pervasive Computing and Applications, Pages 505-510 (2007)
- Chaudhari, Jayashri Cheung, Sen-ching S. Venkatesh, M. Vijay, “Privacy Protection for Life-log Video,” Signal Processing Applications for Public Security and Forensics (2007)
- Chang Wen Chen, Dan Schonfeld, Jiebo Luo, “Comparison of compression algorithms' impact on fingerprint and face recognition accuracy,” Proceedings of SPIE -- Volume 6508, Visual Communications and Image Processing (2007)
- A.S.Abdul-Ahad, W.A.Mahmoud, R.S.Qahwaji, “Distance-Based Watermarking for Wave Audio Files,” IEEE 2nd International Conference on Information & Communications Technologies: from Theory to Applications, Syria, vol. I, pp. 1963 – 1967 (2006)
- Laura Florian Cruz and Fredy Carranza Athó, “Reconocimiento del iris,” Tópicos Especiales en Procesamiento Gráfico, Escuela Académico Profesional de Informática; Universidad Nacional de Trujillo (2006)
- Speech Processing & Biometrics Group Signal Processing Institute Swiss Federal Institute of Technology, “Fingerprint recognition using FingerCodes,” Biometrics Lectures (2006)
- Damien Dessimoz, Jonas Richiardi, Prof. Christophe Champod and Dr. Andrzej Drygajlo, “MBioID Multimodal Biometrics for Identity Documents,” Forensic Science International, Volume 167, Issue 2-3, Pages 154-159, (2006)
- Luciano R. Costa, Rafael R. Obelheiro and Joni S. Fraga, “Introduçăo ŕ Biometria,” Departamento de Automaçăo e Sistemas Universidade Federal de Santa Catarina (2006)
- Robert Steinhoff, Ahmad Gallon, Chattam Smith III, Naphtali Rishe and Andriy Selivonenko, “Improving Eigenface Face Recognition by using Image Registration Preprocessing Methods,” Proceedings of The 2nd International Conference on Cybernetics and Information Technologies, Systems and Applications, CITSA 2005, p. 93, vol. II (2005)
- Sarit Shwartz, Michael Zibulevsky and Yoav Y. Schechner, “Fast kernel entropy estimation and optimization,” Signal Processing, Vol. 85, No. 5, pp. 1045-1058 (2005)
- Porwik P., Wrobel K., “The New Algorithm of Fingerprint Reference Point Location Based on Identification Masks,” 4th Int. Conf. on Comp. Recognition Systems CORES'05. Advances in Soft Computing. Springer-Verlag, pp. 807-814, ISSN 1434-9922 (2005)
- Sarit Shwartz, Michael Zibulevsky and Yoav Y. Schechner, “ICA using kernel entropy estimation with NlogN complexity,” Proc. ICA - Int. Conf. on Independent Component Analysis and Blind Signal Separation, pp. 422-429 (2004)
- Piotr Porwik, Lukasz Wieclaw, “A new approach to reference point location in fingerprint recognition,” IEICE International Journal Electronics Express Vol. 1, No. 18, pp. 575-581, Japan (2004)
If you have written a paper where our software is cited in the references list please email us and your work will be published at our web site.