( Making templates compatible for template protection ) Biometric Feature-Type Transformation
暂无分享,去创建一个
[1] Anton H. M. Akkermans,et al. Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[2] Chun Chen,et al. Biometric Quantization through Detection Rate Optimized Bit Allocation , 2009, EURASIP J. Adv. Signal Process..
[3] Andrew Beng Jin Teoh,et al. A Novel Encoding Scheme for Effective Biometric Discretization: Linearly Separable Subcode , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[4] Stark C. Draper,et al. Feature extraction for a Slepian-Wolf biometric system using LDPC codes , 2008, 2008 IEEE International Symposium on Information Theory.
[5] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[6] Raymond N. J. Veldhuis,et al. Spectral minutiae: A fixed-length representation of a minutiae set , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[7] Mauro Barni,et al. Encrypted signal processing for privacy protection: Conveying the utility of homomorphic encryption and multiparty computation , 2013, IEEE Signal Processing Magazine.
[8] Davide Maltoni,et al. Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[9] Andrew Beng Jin Teoh,et al. An efficient dynamic reliability-dependent bit allocation for biometric discretization , 2012, Pattern Recognit..
[10] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[11] Alexandr Andoni,et al. Beyond Locality-Sensitive Hashing , 2013, SODA.
[12] Nalini K. Ratha,et al. Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[13] Andrew Beng Jin Teoh,et al. Dynamic Detection-Rate-Based Bit Allocation With Genuine Interval Concealment for Binary Biometric Representation , 2013, IEEE Transactions on Cybernetics.
[14] Lu Tian,et al. OSRI: A Rotationally Invariant Binary Descriptor , 2014, IEEE Transactions on Image Processing.
[15] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[16] Andrew Beng Jin Teoh,et al. Non-user-Specific Multivariate Biometric Discretization with Medoid-Based Segmentation , 2011, CCBR.
[17] Julien Bringer,et al. Binary feature vector fingerprint representation from minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[18] Vincent Lepetit,et al. BRIEF: Computing a Local Binary Descriptor Very Fast , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Gary R. Bradski,et al. ORB: An efficient alternative to SIFT or SURF , 2011, 2011 International Conference on Computer Vision.
[20] Karthik Nandakumar,et al. A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[21] Anthony Vetro,et al. Privacy and security of features extracted from minutiae aggregates , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[22] David Zhang,et al. Hand-Geometry Recognition Using Entropy-Based Discretization , 2007, IEEE Transactions on Information Forensics and Security.
[23] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[24] Yongjin Wang,et al. Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.
[25] Jiankun Hu,et al. Generating cancelable biometrie templates using a projection line , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.
[26] Chun Chen,et al. Binary Biometric Representation through Pairwise Adaptive Phase Quantization , 2011, EURASIP J. Inf. Secur..
[27] Julien Bringer,et al. Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.
[28] Pong C. Yuen,et al. Fingerprint Geometric Hashing Based on Binary Minutiae Cylinder Codes , 2014, 2014 22nd International Conference on Pattern Recognition.
[29] Anil K. Jain,et al. Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.
[30] Kang Ryoung Park,et al. A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[31] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[32] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[33] Andrew Beng Jin Teoh,et al. A secure biometric discretization scheme for face template protection , 2012, Future Gener. Comput. Syst..