Evaluation of Biometric Template Protection Schemes based on a Transformation
暂无分享,去创建一个
[1] B. S. Manjunath,et al. Texture Features for Browsing and Retrieval of Image Data , 1996, IEEE Trans. Pattern Anal. Mach. Intell..
[2] Christophe Rosenberger,et al. Biohashing for Securing Minutiae Template , 2010, 2010 20th International Conference on Pattern Recognition.
[3] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[4] Bart Preneel,et al. Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[5] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[6] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[7] Jiankun Hu,et al. Design of alignment-free cancelable fingerprint templates via curtailed circular convolution , 2014, Pattern Recognit..
[8] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[9] Nirmala Saini,et al. Soft biometrics in conjunction with optics based biohashing , 2011 .
[10] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[11] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[12] Naohisa Komatsu,et al. Security performance evaluation for biometric template protection techniques , 2013, Int. J. Biom..
[13] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[14] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[15] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[16] Julien Bringer,et al. GSHADE: faster privacy-preserving distance computation and biometric identification , 2014, IH&MMSec '14.
[17] Himanshu Tyagi,et al. A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing , 2014, IACR Cryptol. ePrint Arch..
[18] Chulhan Lee,et al. Cancelable fingerprint templates using minutiae-based bit-strings , 2010, J. Netw. Comput. Appl..
[19] Athanasios V. Vasilakos,et al. Secure Biometric-Based Authentication Scheme Using Chebyshev Chaotic Map for Multi-Server Environment , 2018, IEEE Transactions on Dependable and Secure Computing.
[20] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[21] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[22] Christophe Rosenberger,et al. Comparative study on texture features for fingerprint recognition: application to the BioHashing template protection scheme , 2016, J. Electronic Imaging.
[23] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[24] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..