Discriminative binary feature learning and quantization in biometric key generation
暂无分享,去创建一个
[1] Wen Gao,et al. Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.
[2] Alex Pentland,et al. Bayesian face recognition , 2000, Pattern Recognit..
[3] Yi-Ping Phoebe Chen,et al. Cell morphology based classification for red cells in blood smear images , 2014, Pattern Recognit. Lett..
[4] Weiguo Sheng,et al. A Biometric Key Generation Method Based on Semisupervised Data Clustering , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[5] Wen Gao,et al. Histogram of Gabor Phase Patterns (HGPP): A Novel Object Representation Approach for Face Recognition , 2007, IEEE Transactions on Image Processing.
[6] Raymond N. J. Veldhuis,et al. Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[7] Chengjun Liu,et al. Gabor feature based classification using the enhanced fisher linear discriminant model for face recognition , 2002, IEEE Trans. Image Process..
[8] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[9] Chulhan Lee,et al. Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[10] Mohammed Yakoob Siyal,et al. A Noisy Channel Tolerant Image Encryption Scheme , 2014, Wireless Personal Communications.
[11] Hamed Haddadi,et al. A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics , 2017, IEEE Internet of Things Journal.
[12] Domingo Mery,et al. Face Recognition with Decision Tree-Based Local Binary Patterns , 2010, ACCV.
[13] Pascal Vincent,et al. Contractive Auto-Encoders: Explicit Invariance During Feature Extraction , 2011, ICML.
[14] Andy Harter,et al. Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.
[15] Xudong Jiang,et al. Noise-Resistant Local Binary Pattern With an Embedded Error-Correction Mechanism , 2013, IEEE Transactions on Image Processing.
[16] David J. Kriegman,et al. From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[17] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).
[18] Adil Masood Siddiqui,et al. Chaotic substitution for highly autocorrelated data in encryption algorithm , 2014, Commun. Nonlinear Sci. Numer. Simul..
[19] Simon Lucey,et al. Convolutional Sparse Coding for Trajectory Reconstruction , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[20] Hyeonjoon Moon,et al. The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[21] Yoshua Bengio,et al. Greedy Layer-Wise Training of Deep Networks , 2006, NIPS.
[22] Matti Pietikäinen,et al. Learning Discriminant Face Descriptor , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[23] Francisco Javier González-Serrano,et al. Training Support Vector Machines with privacy-protected data , 2017, Pattern Recognit..
[24] Yi-Ping Phoebe Chen,et al. GHT-based associative memory learning and its application to Human action detection and classification , 2013, Pattern Recognit..
[25] David G. Lowe,et al. Distinctive Image Features from Scale-Invariant Keypoints , 2004, International Journal of Computer Vision.
[26] Paul A. Watters,et al. A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).
[27] Ming Yang,et al. DeepFace: Closing the Gap to Human-Level Performance in Face Verification , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.
[28] Josef Kittler,et al. 3D Assisted Face Recognition: A Survey of 3D Imaging, Modelling and Recognition Approachest , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.
[29] Fawad Ahmed,et al. Hash-Based Authentication of Digital Images in Noisy Channels , 2015 .
[30] Marios Savvides,et al. Spartans: Single-Sample Periocular-Based Alignment-Robust Recognition Technique Applied to Non-Frontal Scenarios , 2015, IEEE Transactions on Image Processing.
[31] Stan Z. Li,et al. Face Recognition with Local Gabor Textons , 2007, ICB.
[32] Yee Whye Teh,et al. A Fast Learning Algorithm for Deep Belief Nets , 2006, Neural Computation.
[33] Vitaly Shmatikov,et al. Privacy-preserving deep learning , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[34] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[35] Matti Pietikäinen,et al. A comparative study of texture measures with classification based on featured distributions , 1996, Pattern Recognit..
[36] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[37] Frédéric Jurie,et al. Face Recognition using Local Quantized Patterns , 2012, BMVC.
[38] Michael K. Reiter,et al. The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.
[39] David Zhang,et al. Hand-Geometry Recognition Using Entropy-Based Discretization , 2007, IEEE Transactions on Information Forensics and Security.
[40] Andrew Beng Jin Teoh,et al. An efficient dynamic reliability-dependent bit allocation for biometric discretization , 2012, Pattern Recognit..
[41] S. Agaian,et al. NPCR and UACI Randomness Tests for Image Encryption , 2011 .
[42] Weiguo Sheng,et al. Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering , 2008, IEEE Transactions on Information Forensics and Security.
[43] Mohammed Yakoob Siyal,et al. Novel biometric digital signatures for Internet-based applications , 2001, Inf. Manag. Comput. Secur..
[44] Gang Hua,et al. Labeled Faces in the Wild: A Survey , 2016 .
[45] Baochang Zhang,et al. Local Derivative Pattern Versus Local Binary Pattern: Face Recognition With High-Order Local Pattern Descriptor , 2010, IEEE Transactions on Image Processing.
[46] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[47] Alice Caplier,et al. Enhanced Patterns of Oriented Edge Magnitudes for Face Recognition and Image Matching , 2012, IEEE Transactions on Image Processing.
[48] Yongsheng Gao,et al. Low-rank double dictionary learning from corrupted data for robust image classification , 2017, Pattern Recognit..
[49] Lior Wolf,et al. Using Biologically Inspired Features for Face Processing , 2007, International Journal of Computer Vision.
[50] Ngoc-Son Vu,et al. Exploring Patterns of Gradient Orientations and Magnitudes for Face Recognition , 2013, IEEE Transactions on Information Forensics and Security.
[51] Matti Pietikäinen,et al. Face Recognition by Exploring Information Jointly in Space, Scale and Orientation , 2011, IEEE Transactions on Image Processing.
[52] Ibrahim A. Al-Kadit. Origins of Cryptology: the Arab Contributions , 1992, Cryptologia.
[53] Josef Kittler,et al. Class-Specific Kernel Fusion of Multiple Descriptors for Face Verification Using Multiscale Binarised Statistical Image Features , 2014, IEEE Transactions on Information Forensics and Security.
[54] Libor Spacek,et al. Distinctive Descriptions for Face Processing , 1997, BMVC.
[55] Domingo Mery,et al. Learning discriminative local binary patterns for face recognition , 2011, Face and Gesture 2011.
[56] Wen Gao,et al. Local Visual Primitives (LVP) for Face Modelling and Recognition , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[57] Jiwen Lu,et al. Learning Compact Binary Face Descriptor for Face Recognition , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[58] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[59] Zheng-Hua Tan,et al. Privacy protection performance of De-identified face images with and without background , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[60] Peyman Milanfar,et al. Face Verification Using the LARK Representation , 2011, IEEE Transactions on Information Forensics and Security.
[61] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[62] Mohammed Yakoob Siyal,et al. A secure and robust hash-based scheme for image authentication , 2010, Signal Process..
[63] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..