Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities
暂无分享,去创建一个
[1] Masakatsu Nishigaki,et al. A Signature Scheme with a Fuzzy Private Key , 2015, ACNS.
[2] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[3] Miguel Angel Murillo-Escobar,et al. A robust embedded biometric authentication system based on fingerprint and chaotic encryption , 2015, Expert Syst. Appl..
[4] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[5] Christoph Busch,et al. Biometric template protection for speaker recognition based on universal background models , 2015, IET Biom..
[6] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[7] Munaga V. N. K. Prasad,et al. A Bio-cryptosystem for Fingerprints Using Delaunay Neighbor Structures(DNS) and Fuzzy Commitment Scheme , 2015, SIRS.
[8] Juan J. Igarza,et al. MCYT baseline corpus: a bimodal biometric database , 2003 .
[9] Wang Yao,et al. A new fuzzy fingerprint vault using multivariable linear function based on Lorenz Chaotic System , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).
[10] Julian Fiérrez,et al. Variable-length template protection based on homomorphic encryption with application to signature biometrics , 2016, 2016 4th International Conference on Biometrics and Forensics (IWBF).
[11] Xiaoli Ma,et al. Eigenvector-based initial ranging process for OFDMA uplink systems , 2015, EURASIP Journal on Advances in Signal Processing.
[12] Andreas Uhl,et al. Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.
[13] Andrew Beng Jin Teoh,et al. Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault , 2015, Pattern Recognit..
[14] Kannan Karthik,et al. A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs , 2012, Pattern Recognit..
[15] Christoph Busch,et al. Preventing the cross-matching attack in Bloom filter-based cancelable biometrics , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).
[16] Kar-Ann Toh,et al. A Method to Enhance Face Biometric Security , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[17] Christoph Busch,et al. Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..
[18] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[19] Jiankun Hu,et al. A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.
[20] Loris Nanni,et al. Combining local, regional and global matchers for a template protected on-line signature verification system , 2010, Expert Syst. Appl..
[21] Anoop M. Namboodiri,et al. Secure hamming distance based biometric authentication , 2013, 2013 International Conference on Biometrics (ICB).
[22] Andrew Beng Jin Teoh,et al. Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion , 2014, Inf. Fusion.
[23] Munaga V. N. K. Prasad,et al. Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators , 2018, Pattern Analysis and Applications.
[24] Raymond N. J. Veldhuis,et al. Maximum Key Size and Classification Performance of Fuzzy Commitment for Gaussian Modeled Biometric Sources , 2012, IEEE Transactions on Information Forensics and Security.
[25] Andrew Beng Jin Teoh,et al. Replaceable and securely hashed keys from online signatures , 2006, IEICE Electron. Express.
[26] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[27] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[28] Jiankun Hu,et al. A blind system identification approach to cancelable fingerprint templates , 2016, Pattern Recognit..
[29] Julian Fiérrez,et al. Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[30] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[31] J. Ortega-Garcia,et al. Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[32] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[33] Andrew Beng Jin Teoh,et al. Analysis of correlation of 2DPalmHash Code and orientation range suitable for transposition , 2014, Neurocomputing.
[34] Munaga V. N. K. Prasad,et al. Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme , 2017, Int. J. Pattern Recognit. Artif. Intell..
[35] Mou Ling Dennis Wong,et al. Multi-line code: A low complexity revocable fingerprint template for cancelable biometrics , 2013 .
[36] Axel Munk,et al. Security Considerations in Minutiae-Based Fuzzy Vaults , 2015, IEEE Transactions on Information Forensics and Security.
[37] Andrew Beng Jin Teoh,et al. Enhanced multi-line code for minutiae-based fingerprint template protection , 2013, Pattern Recognit. Lett..
[38] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[39] Kenta Takahashi,et al. Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[40] Alessandro Neri,et al. Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[41] Davide Maltoni,et al. A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[42] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[43] Christoph Busch,et al. On application of bloom filters to iris biometrics , 2014, IET Biom..
[44] Kenta Takahashi,et al. Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.
[45] Barbara Kitchenham,et al. Procedures for Performing Systematic Reviews , 2004 .
[46] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[47] Xuehu Yan,et al. A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system , 2015, Signal Image Video Process..
[48] Patrizio Campisi,et al. Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.
[49] Munaga V. N. K. Prasad,et al. Cancelable Fingerprint Cryptosystem Based on Convolution Coding , 2015, SIRS.
[50] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[51] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[52] Jan Camenisch,et al. Efficient group signature schemes for large groups , 1997 .
[53] Tao Li,et al. Cancelable Voiceprint Templates Based on Knowledge Signatures , 2008, 2008 International Symposium on Electronic Commerce and Security.
[54] Norimichi Tsumura,et al. Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.
[55] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[56] Chulhan Lee,et al. Cancelable fingerprint templates using minutiae-based bit-strings , 2010, J. Netw. Comput. Appl..
[57] Ming Li,et al. A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion , 2014, Secur. Commun. Networks.
[58] Yongjin Wang,et al. Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.
[59] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[60] N.K. Ratha,et al. Generating Registration-free Cancelable Fingerprint Templates , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[61] Yong Xiang,et al. Protection of Privacy in Biometric Data , 2016, IEEE Access.
[62] A. Uhl,et al. An iris-based Interval-Mapping scheme for Biometric Key generation , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[63] Frans M. J. Willems,et al. Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[64] KyungHee Lee,et al. Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features , 2007, HCI.
[65] Kenta Takahashi,et al. Optimal sequential fusion for multibiometric cryptosystems , 2016, Inf. Fusion.
[66] Anil K. Jain,et al. Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.
[67] Li Yuan. Multimodal Cryptosystem Based on Fuzzy Commitment , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.
[68] Pong C. Yuen,et al. A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.
[69] C. Raghavendra Rao,et al. Minimum Spanning Tree (MST) Based Techniques for Generation of Cancelable Fingerprint Templates , 2014, Int. J. Pattern Recognit. Artif. Intell..
[70] Bhagavatula Vijaya Kumar,et al. Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.
[71] Chulhan Lee,et al. Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[72] Alessandro Neri,et al. User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.
[73] S. K. Singh,et al. Improved and innovative key generation algorithms for biometric cryptosystems , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[74] Munaga V. N. K. Prasad,et al. k-Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection , 2015, 2015 International Conference on Biometrics (ICB).
[75] Anthony Vetro,et al. Secure distortion computation among untrusting parties using homomorphic encryption , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[76] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[77] Andreas Uhl,et al. Secure Iris Recognition Based on Local Intensity Variations , 2010, ICIAR.
[78] Zhe Jin,et al. A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template , 2014, Pattern Recognit. Lett..
[79] Andreas Uhl,et al. Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).
[80] Rama Chellappa,et al. Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[81] Jiankun Hu,et al. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures , 2014, Pattern Recognit..
[82] Jiankun Hu,et al. A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures , 2016, IEEE Transactions on Information Forensics and Security.
[83] Yajun Ha,et al. Improved chaff point generation for vault scheme in bio-cryptosystems , 2013, IET Biom..
[84] Ajay Kumar,et al. A Cell-Array-Based Multibiometric Cryptosystem , 2016, IEEE Access.
[85] Peng Li,et al. An effective biometric cryptosystem combining fingerprints with error correction codes , 2012, Expert Syst. Appl..
[86] Carlisle M. Adams,et al. You are the key: Generating cryptographic keys from voice biometrics , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[87] Andrew Beng Jin Teoh,et al. Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.
[88] Jiankun Hu,et al. A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement , 2014, IEEE Transactions on Information Forensics and Security.
[89] Andrew Teoh Beng Jin,et al. High security Iris verification system based on random secret integration , 2006 .
[90] Munaga V. N. K. Prasad,et al. Fingerprint template protection using multiline neighboring relation , 2014, Expert Syst. Appl..
[91] Andrew Beng Jin Teoh,et al. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization , 2006, EURASIP J. Adv. Signal Process..
[92] Andreas Uhl,et al. Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.
[93] Andreas Uhl,et al. Iris-Biometric Fuzzy Commitment Schemes under Signal Degradation , 2012, ICISP.
[94] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[95] Norimichi Tsumura,et al. BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes , 2010, IEICE Trans. Inf. Syst..
[96] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[97] Ke Xiong,et al. A Hybrid Approach to Protect Palmprint Templates , 2014, TheScientificWorldJournal.
[98] Andreas Uhl,et al. Reliability-balanced feature level fusion for fuzzy commitment scheme , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[99] Santanu Chaudhury,et al. A Robust Online Signature Based Cryptosystem , 2014, 2014 14th International Conference on Frontiers in Handwriting Recognition.
[100] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[101] Haiping Lu,et al. Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.
[102] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[103] Zhe Jin,et al. Fingerprint template protection with Minutia Vicinity Decomposition , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[104] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[105] Vincenzo Piuri,et al. A privacy-compliant fingerprint recognition system based on homomorphic encryption and Fingercode templates , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[106] Jian Zhao,et al. Anonymous Biometric Access Control , 2009, EURASIP J. Inf. Secur..
[107] Stan Z. Li,et al. Near Infrared Face Based Biometric Key Binding , 2009, ICB.
[108] Jiankun Hu,et al. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach , 2012, Pattern Recognit..
[109] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[110] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[111] Karthik Nandakumar,et al. A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[112] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[113] Sanaa Ghouzali,et al. Fingerprint shell: Secure representation of fingerprint template , 2014, Pattern Recognit. Lett..
[114] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[115] Rama Chellappa,et al. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[116] Lu Leng,et al. PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.
[117] Zhe Jin,et al. Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation , 2016, Pattern Recognit..
[118] Christoph Busch,et al. Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).
[119] Ke Xiong,et al. Palmprint Based Multidimensional Fuzzy Vault Scheme , 2014, TheScientificWorldJournal.
[120] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[121] Davide Maltoni,et al. Noninvertible Minutia Cylinder-Code Representation , 2012, IEEE Transactions on Information Forensics and Security.
[122] Nalini K. Ratha,et al. Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.
[123] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[124] Sanaa Ghouzali,et al. Spiral Cube for Biometric Template Protection , 2012, ICISP.
[125] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[126] Bart Preneel,et al. Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[127] Andreas Uhl,et al. Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.
[128] Eryun Liu,et al. Minutiae and modified Biocode fusion for fingerprint-based key generation , 2010, J. Netw. Comput. Appl..
[129] Anil K. Jain,et al. On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[130] Andrew Beng Jin Teoh,et al. Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.
[131] Kang Ryoung Park,et al. A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[132] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[133] Yajun Ha,et al. Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints , 2015, IET Biom..
[134] Munaga V. N. K. Prasad,et al. Fingerprint Template Protection Using Multiple Spiral Curves , 2016 .
[135] C. Rathgeb,et al. Statistical attack against fuzzy commitment scheme , 2012, IET Biom..
[136] Andrew Beng Jin Teoh,et al. Biometric cryptosystem based on discretized fingerprint texture descriptors , 2013, Expert Syst. Appl..
[137] Andrew Beng Jin Teoh,et al. Secure speech template protection in speaker verification system , 2010, Speech Commun..
[138] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[139] Julien Bringer,et al. Security analysis of Bloom filter-based iris biometric template protection , 2015, 2015 International Conference on Biometrics (ICB).
[140] Sanjeev Sofat,et al. Fingerprint fuzzy vault using hadamard transformation , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[141] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[142] Xudong Jiang,et al. Generating secure cancelable fingerprint templates using local and global features , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[143] Jan Camenisch,et al. Efficient Group Signature Schemes for Large Groups (Extended Abstract) , 1997, CRYPTO.
[144] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[145] Andrew Beng Jin Teoh,et al. Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template , 2016, Pattern Recognit..
[146] Norimichi Tsumura,et al. On the Security of BioEncoding Based Cancelable Biometrics , 2011, IEICE Trans. Inf. Syst..
[147] Arjan Kuijper,et al. Retrieving secrets from iris fuzzy commitment , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[148] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[149] Robert Sabourin,et al. Improving Signature-Based Biometric Cryptosystems Using Cascaded Signature Verification-Fuzzy Vault (SV-FV) Approach , 2014, 2014 14th International Conference on Frontiers in Handwriting Recognition.
[150] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[151] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[152] Munaga V. N. K. Prasad,et al. Generating cancellable fingerprint templates based on Delaunay triangle feature set construction , 2016, IET Biom..
[153] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[154] W. Gareth J. Howells,et al. Evaluating Biometric Encryption Key Generation Using Handwritten Signatures , 2008, 2008 Bio-inspired, Learning and Intelligent Systems for Security.
[155] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[156] Driss Aboutajdine,et al. Vulnerabilities of fuzzy vault schemes using biometric data with traces , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[157] Christoph Busch,et al. Enhanced template protection with passwords for fingerprint recognition , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).
[158] Lifang Wu,et al. A novel key generation cryptosystem based on face features , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.
[159] Arjan Kuijper,et al. Quantifying privacy and security of biometric fuzzy commitment , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[160] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[161] Zhe Jin,et al. A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template , 2014, Secur. Commun. Networks.
[162] Christoph Busch,et al. Improved Fuzzy Vault Scheme for Alignment-Free Fingerprint Features , 2015, 2015 International Conference of the Biometrics Special Interest Group (BIOSIG).
[163] Andreas Uhl,et al. Transforming Rectangular and Polar Iris Images to Enable Cancelable Biometrics , 2010, ICIAR.
[164] Christoph Busch,et al. Measuring privacy and security of iris fuzzy commitment , 2012, 2012 IEEE International Carnahan Conference on Security Technology (ICCST).
[165] Davide Maltoni,et al. Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[166] Stark C. Draper,et al. Secure Biometrics: Concepts, Authentication Architectures, and Challenges , 2013, IEEE Signal Processing Magazine.
[167] Robert Sabourin,et al. Offline signature-based fuzzy vault: A review and new results , 2014, 2014 IEEE Symposium on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[168] Jiankun Hu,et al. Pair-polar coordinate-based cancelable fingerprint templates , 2011, Pattern Recognit..
[169] Jiankun Hu,et al. Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures , 2013, CSS.
[170] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[171] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[172] C. Busch,et al. Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[173] Cagatay Karabat,et al. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system , 2014, EURASIP Journal on Advances in Signal Processing.
[174] Wanqing Li,et al. Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).