A survey on biometrie template protection using cancelable biometric scheme
暂无分享,去创建一个
[1] Qiang Tang,et al. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.
[2] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[3] Arun Ross,et al. From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[4] A. Stoianov,et al. Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[5] Venu Govindaraju,et al. Robustness of multimodal biometric fusion methods against spoof attacks , 2009, J. Vis. Lang. Comput..
[6] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[7] Xudong Jiang,et al. Generating secure cancelable fingerprint templates using local and global features , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[8] C. Busch,et al. Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[9] Pong C. Yuen,et al. Protecting Face Biometric Data on Smartcard with Reed-Solomon Code , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[10] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[11] J. Fierrez-Aguilar,et al. Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.
[12] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[13] Farinaz Koushanfar,et al. Provably secure obfuscation of diverse watermarks for sequential circuits , 2010, 2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST).
[14] Bo Fu,et al. Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.
[15] Arun Ross,et al. Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.
[16] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[17] Jorge Guajardo,et al. Brand and IP protection with physical unclonable functions , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[18] Jiankun Hu,et al. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach , 2012, Pattern Recognit..
[19] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[20] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[21] Enrique Argones-Rúa,et al. Biometric Template Protection Using Universal Background Models: An Application to Online Signature , 2012, IEEE Transactions on Information Forensics and Security.
[22] Swarup Bhunia,et al. RTL Hardware IP Protection Using Key-Based Control and Data Flow Obfuscation , 2010, 2010 23rd International Conference on VLSI Design.
[23] Aboul Ella Hassanien,et al. A Hybrid Approach for Biometric Template Security , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[24] Debasis Samanta,et al. Comparable features and same cryptography key generation using biometric fingerprint image , 2016, 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB).
[25] Rama Chellappa,et al. Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[26] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[27] Nalini K. Ratha,et al. Privacy Protection in High Security Biometrics Applications , 2010, ICEB.
[28] K. P. Soman,et al. Towards generating irrevocable key for cryptography from cancelable fingerprints , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[29] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[30] Jarrod A. Roy,et al. EPIC: Ending Piracy of Integrated Circuits , 2008, 2008 Design, Automation and Test in Europe.
[31] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[32] Andrew Beng Jin Teoh,et al. Multimodal biometrics based bit extraction method for template security , 2011, 2011 6th IEEE Conference on Industrial Electronics and Applications.
[33] Kannan Karthik,et al. A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs , 2012, Pattern Recognit..