These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
23. A new method for generating an invariant iris private key based on the fuzzy vault system. Lee YJ; Park KR; Lee SJ; Bae K; Kim J IEEE Trans Syst Man Cybern B Cybern; 2008 Oct; 38(5):1302-13. PubMed ID: 18784013 [TBL] [Abstract][Full Text] [Related]
25. Technology. Hospitals now use palm readers for patient identification. Registration may be streamlined, but some wonder if it's worth the cost. McKinney M Hosp Health Netw; 2007 Sep; 81(9):30. PubMed ID: 17926604 [No Abstract] [Full Text] [Related]
26. Body of evidence. Hawkins D US News World Rep; 2002 Feb; 132(5):60-2. PubMed ID: 11859535 [No Abstract] [Full Text] [Related]
27. Readers' perspective. "By 2010 biometric security technology will be commonly used to protect patient information". Altee K; McLaughlin N; Corkhill E; Beavans I; Broderick M; Green M Health Data Manag; 2004 Jan; 12(1):64. PubMed ID: 14725112 [No Abstract] [Full Text] [Related]
28. Recognizable-image selection for fingerprint recognition with a mobile-device camera. Lee D; Choi K; Choi H; Kim J IEEE Trans Syst Man Cybern B Cybern; 2008 Feb; 38(1):233-43. PubMed ID: 18270094 [TBL] [Abstract][Full Text] [Related]
29. "Don't I know you? I'd recognize that fingerprint anywhere". Keener RE Health Manag Technol; 1999 Aug; 20(7):8-9. PubMed ID: 10620995 [No Abstract] [Full Text] [Related]
30. Biometric technology verifies patients' identity. BayCare Health Systems implements palm-vein recognition technology to streamline and secure patient processing. Health Manag Technol; 2010 Mar; 31(3):20-1. PubMed ID: 20405756 [No Abstract] [Full Text] [Related]
31. Pore sub-features reproducibility in direct microscopic and Livescan images--their reliability in personal identification. Gupta A; Sutton R J Forensic Sci; 2010 Jul; 55(4):970-5. PubMed ID: 20487153 [TBL] [Abstract][Full Text] [Related]
32. European securitization and biometric identification: the uses of genetic profiling. Johnson P; Williams R Ann Ist Super Sanita; 2007; 43(1):36-43. PubMed ID: 17536152 [TBL] [Abstract][Full Text] [Related]
33. High-tech identification. Indiana hospital uses fingerprints to track patients. Gray C Mod Healthc; 1998 Apr; 28(14):92. PubMed ID: 10178308 [No Abstract] [Full Text] [Related]
34. From template to image: reconstructing fingerprints from minutiae points. Ross A; Shah J; Jain AK IEEE Trans Pattern Anal Mach Intell; 2007 Apr; 29(4):544-60. PubMed ID: 17299213 [TBL] [Abstract][Full Text] [Related]
35. Identity in the palm of your hand. McBride M Health Manag Technol; 2009 Jan; 30(1):16-9. PubMed ID: 19181081 [No Abstract] [Full Text] [Related]
36. Performance evaluation of fingerprint verification systems. Cappelli R; Maio D; Maltoni D; Wayman JL; Jain AK IEEE Trans Pattern Anal Mach Intell; 2006 Jan; 28(1):3-18. PubMed ID: 16402615 [TBL] [Abstract][Full Text] [Related]
37. Determination of new European biometric equations for the calibration of in vivo lung counting systems using the Livermore phantom. Pierrat N; Prulhiere G; de Carlan L; Franck D Radiat Prot Dosimetry; 2007; 125(1-4):449-55. PubMed ID: 17502311 [TBL] [Abstract][Full Text] [Related]
38. Biometrics and international migration. Redpath J Ann Ist Super Sanita; 2007; 43(1):27-35. PubMed ID: 17536151 [TBL] [Abstract][Full Text] [Related]
39. Using fingerprint image quality to improve the identification performance of the U.S. Visitor and Immigrant Status Indicator Technology Program. Wein LM; Baveja M Proc Natl Acad Sci U S A; 2005 May; 102(21):7772-5. PubMed ID: 15894628 [TBL] [Abstract][Full Text] [Related]