Practical security and privacy attacks against biometric hashing using sparse recovery

[1]  Pong C. Yuen,et al.  Masquerade attack on transform-based binary-template protection based on perceptron learning , 2014, Pattern Recognit..

[2]  Christophe Rosenberger,et al.  Preimage attack on BioHashing , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[3]  Xuebing Zhou,et al.  Privacy and Security Assessment of Biometric Template Protection , 2012, it Inf. Technol..

[4]  Yaniv Plan,et al.  One‐Bit Compressed Sensing by Linear Programming , 2011, ArXiv.

[5]  Laurent Jacques,et al.  Robust 1-Bit Compressive Sensing via Binary Stable Embeddings of Sparse Vectors , 2011, IEEE Transactions on Information Theory.

[6]  Dimitrios Hatzinakos,et al.  LBP-based biometric hashing scheme for human authentication , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.

[7]  Andreas Uhl,et al.  Iris-Biometric Hash Generation for Biometric Database Indexing , 2010, 2010 20th International Conference on Pattern Recognition.

[8]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[9]  Alejandro F. Frangi,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. , 2022 .

[10]  Jana Dittmann,et al.  Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction , 2010, Communications and Multimedia Security.

[11]  Ton Kalker,et al.  On the security of biohashing , 2010, Electronic Imaging.

[12]  Christoph Busch,et al.  Robust minutiae hash for fingerprint template protection , 2010, Electronic Imaging.

[13]  Cagatay Karabat,et al.  A Cancelable Biometric Hashing for Secure Biometric Verification System , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[14]  Kiyoung Moon,et al.  Inverse operation and preimage attack on BioHashing , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.

[15]  Mike E. Davies,et al.  Iterative Hard Thresholding for Compressed Sensing , 2008, ArXiv.

[16]  E.J. Candes,et al.  An Introduction To Compressive Sampling , 2008, IEEE Signal Processing Magazine.

[17]  Richard G. Baraniuk,et al.  1-Bit compressive sensing , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[18]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[19]  Andrew Beng Jin Teoh,et al.  Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization , 2006, EURASIP J. Adv. Signal Process..

[20]  Andrew Beng Jin Teoh,et al.  Biometric hash: high-confidence face recognition , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Oded Goldreich Foundations of Cryptography: Volume 1 , 2006 .

[22]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[23]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[24]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[25]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[26]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[27]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, Proceedings Eighth IEEE International Conference on Computer Vision. ICCV 2001.

[28]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[29]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[30]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[31]  David Zhang,et al.  An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.

[32]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[33]  Anil K. Jain,et al.  Audio- and Video-based Biometric Person Authentication , 1997, Lecture Notes in Computer Science.

[34]  M. Turk,et al.  Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.