A fingerprint key binding algorithm based on vector quantization and error correction
暂无分享,去创建一个
[1] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[2] Xudong Jiang,et al. Fingerprint Reference-Point Detection , 2005, EURASIP J. Adv. Signal Process..
[3] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[4] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[5] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[6] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[7] Xin Yang,et al. Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment , 2006, Journal of Computer Science and Technology.
[8] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[9] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[10] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[11] Charles Pugh,et al. A generalized poincaré index formula , 1968 .
[12] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.