These are the sources and citations used to research Biometrics Presentation. This bibliography was generated on Cite This For Me on
In-text: (Palm Scanner, 2014)
Your Bibliography: 2014. Palm Scanner. [image] Available at: <http://www.phirelight.com/wp-content/uploads/2014/08/avuc.jpg> [Accessed 13 February 2015].
In-text: (Abhyankar and Schuckers, 2006)
Your Bibliography: Abhyankar, A. and Schuckers, S., 2006. Fingerprint Liveness Detection Using Local Ridge Frequencies and Multiresolution Texture Analysis Techniques. 2006 International Conference on Image Processing, [online] p.1. Available at: <http://www.clarkson.edu/biosal/pdf/fingerprintl.pdf> [Accessed 15 February 2015].
In-text: (Can Stock Photo, 2010)
Your Bibliography: Can Stock Photo, 2010. ATM Machine. [image] Available at: <http://madmonkeyhostels.com/wp-content/uploads/2014/05/ATM-Machine.jpg> [Accessed 13 February 2015].
In-text: (Chant, 2013)
Your Bibliography: Chant, T., 2013. Biometrics and the Future of Identification. [online] NOVA Next. Available at: <http://www.pbs.org/wgbh/nova/next/tech/biometrics-and-the-future-of-identification/> [Accessed 15 February 2015].
In-text: (Biometrics Background | IBIA, 2014)
Your Bibliography: Ibia.org. 2014. Biometrics Background | IBIA. [online] Available at: <https://www.ibia.org/biometrics/> [Accessed 15 February 2015].
In-text: (Johnson, Scheirer and Boult, 2012)
Your Bibliography: Johnson, R., Scheirer, W. and Boult, T., 2012. Vaulted Voice Verification - Enrollment Process.. [image] Available at: <http://arxiv.org/pdf/1212.0042.pdf> [Accessed 13 February 2015].
In-text: (Johnson, Scheirer and Boult, 2013)
Your Bibliography: Johnson, R., Scheirer, W. and Boult, T., 2013. Secure voice-based authentication for mobile devices: vaulted voice verification. Biometric and Surveillance Technology for Human and Activity Identification X, [online] pp.1-12. Available at: <http://arxiv.org/abs/1212.0042> [Accessed 15 February 2015].
In-text: (Schuckers et al., 2002)
Your Bibliography: Schuckers, S., Hornak, L., Norman, T., Derakhshani, R. and Parthasaradhi, S., 2002. Issues for Liveness Detection in Biometrics. 1st ed. [ebook] New York: Center for Identification Technology Research, West Virginia University, Michigan State University, Marshall University, San Jose State University, pp.1-25. Available at: <http://www.biometrics.org/bc2002/2_bc0130_DerakhshabiBrief.pdf> [Accessed 15 February 2015].
In-text: (Tilton, 2014)
Your Bibliography: Tilton, C., 2014. Identity Authentication Technologies An Overview and Comparison. 1st ed. [ebook] Fairfax, VA: Daon Standards & Technology, pp.15-28, 53-55, 89, 93, 99, 110-120. Available at: <http://www.biometrics.org/bc2014/presentations/Mon_1516_Tilton_1400.pdf> [Accessed 15 February 2015].
In-text: (Uchill, 2015)
Your Bibliography: Uchill, J., 2015. Biometrics researchers race to stay one step ahead of hackers. [online] The Christian Science Monitor. Available at: <http://www.csmonitor.com/World/Passcode/2015/0113/Biometrics-researchers-race-to-stay-one-step-ahead-of-hackers> [Accessed 15 February 2015].
10,587 students joined last month!