A Novel Blockchain Scheme Combining Prime Numbers and Iris for Encrypting Coding
暂无分享,去创建一个
Gerardo Iovane | Michele Nappi | Aniello Castiglione | Silvio Barra | Alfredo Petrosino | Marta Chinnici | Aniello Castiglione | A. Petrosino | M. Chinnici | M. Nappi | Silvio Barra | G. Iovane
[1] Lucien Wald,et al. Some terms of reference in data fusion , 1999, IEEE Trans. Geosci. Remote. Sens..
[2] John Daugman,et al. Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.
[3] Gabriel Taubin,et al. Estimation of Planar Curves, Surfaces, and Nonplanar Space Curves Defined by Implicit Equations with Applications to Edge and Range Image Segmentation , 1991, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Oleg Ushmaev,et al. Biometric Fusion : Robust Approach , 2006 .
[5] Libor Machala,et al. Human eye iris recognition using the mutual information , 2004 .
[6] Alan N. Steinberg,et al. Rethinking the JDL Data Fusion Levels , 2005 .
[7] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Bernadette Dorizzi,et al. Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.
[9] Sriyankar Acharyya,et al. Image cryptography: The genetic algorithm approach , 2011, 2011 IEEE International Conference on Computer Science and Automation Engineering.
[10] Stefano Ricciardi,et al. Ubiquitous iris recognition by means of mobile devices , 2015, Pattern Recognit. Lett..
[11] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[12] Abdulrahman Alqahtani. Evaluation of the Reliability of Iris Recognition Biometric Authentication Systems , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).
[13] Michele Nappi,et al. Mobile Iris Challenge Evaluation (MICHE)-I, biometric iris dataset and protocols , 2015, Pattern Recognit. Lett..
[14] Erik Blasch,et al. JDL level 5 fusion model: user refinement issues and applications in group tracking , 2002, SPIE Defense + Commercial Sensing.
[15] James Llinas,et al. Revisiting the JDL Data Fusion Model II , 2004 .
[16] Gerardo Iovane,et al. An Encryption Approach Using Information Fusion Techniques Involving Prime Numbers and Face Biometrics , 2020, IEEE Transactions on Sustainable Computing.
[17] Pieter H. Hartel,et al. Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.
[18] Andrea F. Abate,et al. What are you doing while answering your smartphone? , 2018, 2018 24th International Conference on Pattern Recognition (ICPR).
[19] Neyire Deniz Sarier. Multimodal biometric Identity Based Encryption , 2018, Future Gener. Comput. Syst..
[20] Jiankun Hu,et al. A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.
[21] Gil Melfe Mateus Santos,et al. Fusing iris and periocular information for cross-sensor recognition , 2015, Pattern Recognit. Lett..
[22] Jos B. T. M. Roerdink,et al. The Watershed Transform: Definitions, Algorithms and Parallelization Strategies , 2000, Fundam. Informaticae.
[23] Kim-Kwang Raymond Choo,et al. Context Aware Ubiquitous Biometrics in Edge of Military Things , 2017, IEEE Cloud Computing.
[24] Alan N. Steinberg,et al. Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.
[25] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[26] Michal Haindl,et al. Unsupervised detection of non-iris occlusions , 2015, Pattern Recognit. Lett..
[27] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[28] Rajiv Ranjan,et al. Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications , 2018, IEEE Cloud Comput..
[29] Michele Nappi,et al. IS_IS: Iris Segmentation for Identification Systems , 2010, 2010 20th International Conference on Pattern Recognition.
[30] A. Tragha,et al. ICIGA: Improved Cryptography Inspired by Genetic Algorithms , 2006, 2006 International Conference on Hybrid Information Technology.
[31] Gerardo Iovane,et al. Electronic access key based on innovative Information Fusion technique involving prime numbers and biometric data , 2011 .
[32] Andrea F. Abate,et al. BIRD: Watershed Based IRis Detection for mobile devices , 2015, Pattern Recognit. Lett..
[33] Hugo Proença,et al. Insights into the results of MICHE I - Mobile Iris CHallenge Evaluation , 2018, Pattern Recognit..
[34] Yang Hu,et al. Improving colour iris segmentation using a model selection technique , 2015, Pattern Recognit. Lett..
[35] Michele Nappi,et al. WIRE: Watershed based iris recognition , 2016, Pattern Recognit..
[36] Luís A. Alexandre,et al. UBIRIS: A Noisy Iris Image Database , 2005, ICIAP.
[37] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[38] Kim-Kwang Raymond Choo,et al. Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond , 2018, IEEE Cloud Computing.
[39] Elmo Benedetto,et al. An Information Fusion approach based on prime numbers coming from RSA algorithm and Fractals for secure coding , 2015 .
[40] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[41] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[42] Raymond N. J. Veldhuis,et al. Hybrid fusion for biometrics: Combining score-level and decision-level fusion , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.