Secure fingerprint fuzzy vault using hadamard transformation to defy correlation attack
暂无分享,去创建一个
[1] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[2] Song Wang,et al. A Hadamard transform-based method for the design of cancellable fingerprint templates , 2013, 2013 6th International Congress on Image and Signal Processing (CISP).
[3] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[4] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[5] Axel Munk,et al. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.
[6] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[7] G. Padmavathi,et al. Security Analysis of Multimodal Biometric Fuzzy Vault , 2009 .
[8] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[9] Axel Munk,et al. Security Considerations in Minutiae-Based Fuzzy Vaults , 2015, IEEE Transactions on Information Forensics and Security.
[10] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[11] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[12] Dongho Won,et al. The Vulnerabilities Analysis of Fuzzy Vault Using Password , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[13] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[14] G. Padmavathi,et al. Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault , 2009 .
[15] Arun Ross,et al. Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.
[16] Nalini K. Ratha,et al. Biometrics break-ins and band-aids , 2003, Pattern Recognit. Lett..
[17] Cengiz Örencik,et al. Securing fuzzy vault schemes through biometric hashing , 2010 .
[18] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[19] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[20] Anil K. Jain,et al. Multibiometric systems: fusion strategies and template security , 2008 .
[21] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[22] Christoph Busch,et al. Enhanced template protection with passwords for fingerprint recognition , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).
[23] Arun Ross,et al. Handbook of Biometrics , 2007 .
[24] G. Armah,et al. Application of residue number system (RNS) to image processing using orthogonal transformation , 2015, 2015 IEEE International Conference on Communication Software and Networks (ICCSN).
[25] Farid Benhammadi,et al. Password hardened fuzzy vault for fingerprint authentication system , 2014, Image Vis. Comput..