Hybrid Multi-Biometric Template Protection Using Watermarking
暂无分享,去创建一个
Sanaa Ghouzali | Wadood Abdul | Qazi Emad-ul-Haq | Ohoud Nafea | S. Ghouzali | Wadood Abdul | Qazi Emad-ul-Haq | Ohoud Nafea
[1] Vitomir Struc,et al. Gabor-Based Kernel Partial-Least-Squares Discrimination Features for Face Recognition , 2009, Informatica.
[2] D. Aboutajdine,et al. Combining DCT and LBP Feature Sets For Efficient Face Recognition , 2008, 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications.
[3] Xiaoli Ma,et al. Eigenvector-based initial ranging process for OFDMA uplink systems , 2015, EURASIP Journal on Advances in Signal Processing.
[4] Gaoyun An,et al. Face Template Protection Using Chaotic Encryption , 2013 .
[5] Yanxiong Li,et al. A two -step hybrid approach for voiceprint-biometric template protection , 2012, 2012 International Conference on Machine Learning and Cybernetics.
[6] Yongqiang Yang,et al. Survey on Biometric Data Security and Chaotic Encryption Strategy with Bernoulli Mapping , 2014, 2014 International Conference on Medical Biometrics.
[7] Mita Paunwala,et al. Biometric template protection with DCT-based watermarking , 2013, Machine Vision and Applications.
[8] Abdulmotaleb El Saddik,et al. Combining cryptography and watermarking to secure revocable iris templates , 2011, 2011 IEEE International Instrumentation and Measurement Technology Conference.
[9] Jiankun Hu,et al. Mutual dependency of features in multimodal biometric systems , 2015 .
[10] Sanaa Ghouzali. Watermarking Based Multi-biometric Fusion Approach , 2015, C2SI.
[11] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[12] Cagatay Karabat,et al. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system , 2014, EURASIP Journal on Advances in Signal Processing.
[13] Shantanu Rane,et al. Standardization of Biometric Template Protection , 2014, IEEE MultiMedia.
[14] Jiankun Hu,et al. Generating cancelable biometrie templates using a projection line , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.
[15] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[16] Jiankun Hu,et al. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures , 2014, Pattern Recognit..
[17] Anthony Vetro,et al. Secure distortion computation among untrusting parties using homomorphic encryption , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[18] Yagiz Sutcu,et al. Template security in biometric systems , 2009 .
[19] Lifang Wu,et al. A Face Based Fuzzy Vault Scheme for Secure Online Authentication , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.
[20] Andrew Beng Jin Teoh,et al. Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault , 2015, Pattern Recognit..
[21] Sanaa Ghouzali,et al. Private chaotic biometric template protection algorithm , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).
[22] Kannan Karthik,et al. A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs , 2012, Pattern Recognit..
[23] Pianhui Wu,et al. Research on digital image watermark encryption based on hyperchaos , 2013 .
[24] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[25] Wen Yu,et al. SVM Classification for Large Data Sets by Considering Models of Classes Distribution , 2007, 2007 Sixth Mexican International Conference on Artificial Intelligence, Special Session (MICAI).
[26] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[27] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[28] Piyush Joshi,et al. A quality aware technique for biometric recognition , 2015, 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN).
[29] C. L. Philip Chen,et al. Optimization of Sensor Locations and Sensitivity Analysis for Engine Health Monitoring Using Minimum Interference Algorithms , 2007, 2007 IEEE International Conference on System of Systems Engineering.
[30] Vitomir Struc,et al. The Complete Gabor-Fisher Classifier for Robust Face Recognition , 2010, EURASIP J. Adv. Signal Process..
[31] Azadeh Mansouri,et al. Reversible Watermarking Using Statistical Information , 2010, EURASIP J. Adv. Signal Process..
[32] Sanaa Ghouzali,et al. Fingerprint shell: Secure representation of fingerprint template , 2014, Pattern Recognit. Lett..
[33] Malay Kishore Dutta,et al. An efficient & secure encryption scheme for biometric data using holmes map & singular value decomposition , 2014, 2014 International Conference on Medical Imaging, m-Health and Emerging Communication Systems (MedCom).
[34] Jiankun Hu,et al. A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement , 2014, IEEE Transactions on Information Forensics and Security.
[35] Jonathan Katz,et al. Threshold Cryptosystems Based on Factoring , 2002, ASIACRYPT.
[36] Song Wang,et al. A Hadamard transform-based method for the design of cancellable fingerprint templates , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).
[37] Priti P. Rege,et al. Reversible watermarking technique to enhance security of a biometric authentication system , 2013, 2013 Fourth National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics (NCVPRIPG).
[38] Bernadette Dorizzi,et al. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography , 2012, Synthesis Lectures on Information Security, Privacy, and Trust.
[39] Thirimachos Bourlai,et al. Securing multimodal biometric data through watermarking and steganography , 2013, 2013 IEEE International Conference on Technologies for Homeland Security (HST).
[40] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[41] Lrit. Spiral Cube for Biometric Template Protection , 2012 .
[42] Ke Xiong,et al. Is Fuzzy Vault Scheme Very Effective for Key Binding in Biometric Cryptosystems? , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[43] Surya Prakash,et al. Enhanced fingerprint shell , 2015, 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN).
[44] Vinod Chandran,et al. Biometric template security using Higher Order Spectra , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[45] Robert L. Devaney,et al. A piecewise linear model for the zones of instability of an area-preserving map , 1984 .
[46] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[47] Yong Zhang,et al. A Blind Image Watermarking Scheme Using Fast Hadamard Transform , 2010 .
[48] Zhenjun Tang,et al. Efficient image encryption with block shuffling and chaotic map , 2014, Multimedia Tools and Applications.
[49] Umut Uludag,et al. Secure biometric systems , 2006 .
[50] Li Yuan. Multimodal Cryptosystem Based on Fuzzy Commitment , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.
[51] Andreas Uhl,et al. Watermarking as a Means to Enhance Biometric Systems: A Critical Survey , 2011, Information Hiding.
[52] Bernadette Dorizzi,et al. Watermarking signal fusion in multimodal biometrics , 2014, International Image Processing, Applications and Systems Conference.