Performance Based Revocable Biometrics
暂无分享,去创建一个
Chulhan Lee | Jeung-Yoon Choi | Jaihie Kim | Kar-Ann Toh | K. Toh | Jeung-Yoon Choi | Chulhan Lee | Jaihie Kim
[1] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[2] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[3] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[4] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[5] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[6] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[7] Daesung Moon,et al. Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.
[8] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[9] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[10] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[11] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[12] Anil K. Jain,et al. Hiding Fingerprint Minutiae in Images , 2002 .
[13] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[14] KyungHee Lee,et al. Two Factor Face Authentication Scheme with Cancelable Feature , 2005, IWBRS.
[15] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[16] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[17] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[18] Andrew Beng Jin Teoh,et al. Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..
[19] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[20] Arun Ross,et al. Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.
[21] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[22] K.-A. Toh,et al. Learning from Target Knowledge Approximation , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.
[23] Ingrid Verbauwhede,et al. Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[24] David G. Stork,et al. Pattern Classification , 1973 .
[25] Sangyoun Lee,et al. Robust Face Recognition by Fusion of Visual and Infrared Cues , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.
[26] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.