|
[1] H.-F. Yang, K. Lin, and C.-S. Chen, “Supervised learning of semanticspreserving hash via deep convolutional neural networks,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017. [2] Improving Inception and Image Classification in TensorFlow, https: //research.googleblog.com/2016/08/improving-inception-and-image.html, 2017. [3] K. Simonyan and A. Zisserman, “Very deep convolutional networks for largescale image recognition,” arXiv preprint arXiv:1409.1556, 2014. [4] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 1–9. [5] C. Szegedy, S. Ioffe, V. Vanhoucke, and A. A. Alemi, “Inception-v4, inceptionresnet and the impact of residual connections on learning.” in AAAI, 2017, pp. 4278–4284. [6] D. Maltoni, D. Maio, A. Jain, and S. Prabhakar, Handbook of fingerprint recognition. Springer Science & Business Media, 2009. [7] R. Cappelli, M. Ferrara, and D. Maltoni, “Minutia cylinder-code: A new representation and matching technique for fingerprint recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 32, no. 12, pp. 2128–2141, 2010. [8] T.-T. Chu and C.-T. Chiu, “A cost-effective minutiae disk code for fingerprint recognition and its implementation,” in Acoustics, Speech and Signal Processing (ICASSP), 2016 IEEE International Conference on. IEEE, 2016, pp. 981–985. [9] A. Nagar, S. Rane, and A. Vetro, “Privacy and security of features extracted from minutiae aggregates,” in Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on. IEEE, 2010, pp. 1826– 1829. [10] E. Liu, H. Zhao, J. Liang, L. Pang, H. Chen, and J. Tian, “Random local region descriptor (rlrd): A new method for fixed-length feature representation of fingerprint image and its application to template protection,” Future Generation Computer Systems, vol. 28, no. 1, pp. 236–243, 2012. [11] Z. Jin, M.-H. Lim, A. B. J. Teoh, B.-M. Goi, and Y. H. Tay, “Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication,” IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 46, no. 10, pp. 1415–1428, 2016. [12] F. Farooq, R. M. Bolle, T.-Y. Jea, and N. Ratha, “Anonymous and revocable fingerprint recognition,” in Computer Vision and Pattern Recognition, 2007. CVPR’07. IEEE Conference on. IEEE, 2007, pp. 1–7. [13] Z. Jin, A. B. J. Teoh, T. S. Ong, and C. Tee, “A revocable fingerprint template for security and privacy preserving.” KSII Transactions on Internet & Information Systems, vol. 4, no. 6, 2010. [14] H. Xu, R. N. Veldhuis, A. M. Bazen, T. A. Kevenaar, T. A. Akkermans, and B. Gokberk, “Fingerprint verification using spectral minutiae representations,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 3, pp. 397–409, 2009. [15] K. Nandakumar, “A fingerprint cryptosystem based on minutiae phase spectrum,” in Information Forensics and Security (WIFS), 2010 IEEE International Workshop on. IEEE, 2010, pp. 1–6. [16] Y. Tang, F. Gao, and J. Feng, “Latent fingerprint minutia extraction using fully convolutional network,” arXiv preprint arXiv:1609.09850, 2016. [17] L. Jiang, T. Zhao, C. Bai, A. Yong, and M. Wu, “A direct fingerprint minutiae extraction approach based on convolutional neural networks,” in Neural Networks (IJCNN), 2016 International Joint Conference on. IEEE, 2016, pp. 571–578. [18] H.-R. Su, K.-Y. Chen, W. J. Wong, and S.-H. Lai, “A deep learning approach towards pore extraction for high-resolution fingerprint recognition,” in Acoustics, Speech and Signal Processing (ICASSP), 2017 IEEE International Conference on. IEEE, 2017, pp. 2057–2061. [19] R. D. Labati, A. Genovese, E. Muñoz, V. Piuri, and F. Scotti, “A novel pore extraction method for heterogeneous fingerprint images using convolutional neural networks,” Pattern Recognition Letters, 2017. [20] K. Lin, J. Lu, C.-S. Chen, and J. Zhou, “Learning compact binary descriptors with unsupervised deep neural networks,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2016, pp. 1183–1192. [21] V. Erin Liong, J. Lu, G. Wang, P. Moulin, and J. Zhou, “Deep hashing for compact binary codes learning,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 2475–2483. [22] R. Xia, Y. Pan, H. Lai, C. Liu, and S. Yan, “Supervised hashing for image retrieval via image representation learning.” in AAAI, vol. 1, 2014, pp. 2156– 2162. [23] F. Zhao, Y. Huang, L. Wang, and T. Tan, “Deep semantic ranking based hashing for multi-label image retrieval,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 1556–1564. [24] R. Zhang, L. Lin, R. Zhang, W. Zuo, and L. Zhang, “Bit-scalable deep hashing with regularized similarity learning for image retrieval and person reidentification,” IEEE Transactions on Image Processing, vol. 24, no. 12, pp. 4766–4779, 2015. [25] H. Lai, Y. Pan, Y. Liu, and S. Yan, “Simultaneous feature learning and hash coding with deep neural networks,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 3270–3278. [26] W.-J. Li, S. Wang, and W.-C. Kang, “Feature learning based deep supervised hashing with pairwise labels,” arXiv preprint arXiv:1511.03855, 2015. [27] H. Zhu, M. Long, J. Wang, and Y. Cao, “Deep hashing network for efficient similarity retrieval.” in AAAI, 2016, pp. 2415–2421. [28] T. Yao, F. Long, T. Mei, and Y. Rui, “Deep semantic-preserving and rankingbased hashing for image retrieval.” in IJCAI, 2016, pp. 3931–3937. [29] W. Liu, H. Ma, H. Qi, D. Zhao, and Z. Chen, “Deep learning hashing for mobile visual search,” EURASIP Journal on Image and Video Processing, vol. 2017, no. 1, p. 17, 2017. [30] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional neural networks,” in Advances in neural information processing systems, 2012, pp. 1097–1105. [31] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 770–778. [32] F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recognition and clustering,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 815–823. [33] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,” arXiv preprint arXiv:1412.6572, 2014. [34] Y. Bengio, J. Louradour, R. Collobert, and J. Weston, “Curriculum learning,” in Proceedings of the 26th annual international conference on machine learning. ACM, 2009, pp. 41–48. [35] M. Abadi, A. Agarwal, P. Barham, E. Brevdo, Z. Chen, C. Citro, G. S. Corrado, A. Davis, J. Dean, M. Devin et al., “Tensorflow: Large-scale machine learning on heterogeneous distributed systems,” arXiv preprint arXiv: 1603.04467, 2016. [36] T. Tieleman and G. Hinton, “Rmsprop: Divide the gradient by a running average of its recent magnitude. coursera: Neural networks for machine learning,” Technical report, 2012. 31, Tech. Rep., 2012. [37] Fingerprint Verification Competition (FVC2000), http://bias.csr.unibo.it/ fvc2000/databases.asp. [38] Fingerprint Verification Competition (FVC2002), http://bias.csr.unibo.it/ fvc2002/databases.asp. [39] Fingerprint Verification Competition (FVC2004), http://bias.csr.unibo.it/ fvc2004/databases.asp. [40] Fingerprint Verification Competition (FVC2006), http://bias.csr.unibo.it/ fvc2006/databases.asp. [41] R. Cappelli, D. Maio, and D. Maltoni, “Sfinge: an approach to synthetic fingerprint generation,” in International Workshop on Biometric Technologies (BT2004), 2004, pp. 147–154. |