Login / Signup
Fingerprint Verification Using Perturbation Method.
Satoshi Otaka
Yoshihisa Nishiyama
Takahiro Hatano
Toru Wakahara
Published in:
MVA (2007)
Keyphrases
</>
perturbation method
fingerprint verification
data perturbation
fingerprint recognition
personal identification
fusion scheme
privacy preserving
fingerprint images
privacy preserving data mining
database
peer to peer
low dimensional
statistical databases
fingerprint matching