A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition
暂无分享,去创建一个
Haiping Lu | Dimitrios Hatzinakos | Konstantinos N. Plataniotis | Karl Martin | Francis Minhthang Bui | K. Plataniotis | Haiping Lu | D. Hatzinakos | K. Martin | F. Bui
[1] Konstantinos N. Plataniotis,et al. Face recognition using kernel direct discriminant analysis algorithms , 2003, IEEE Trans. Neural Networks.
[2] R. Morelos-Zaragoza. The art of error correcting coding , 2002 .
[3] Terence Sim,et al. The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[5] Yongjin Wang,et al. Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.
[6] Anton H. M. Akkermans,et al. Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[7] R.N.J. Veldhuis,et al. Multi-Bits Biometric String Generation based on the Likelihood Ratio , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[8] Josef Bigün,et al. Non-intrusive liveness detection by face images , 2009, Image Vis. Comput..
[9] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[10] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[11] P. Jonathon Phillips,et al. Face Recognition Vendor Test 2002 Performance Metrics , 2003, AVBPA.
[12] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[13] William H. Press,et al. Numerical Recipes in C, 2nd Edition , 1992 .
[14] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[15] Robert H. Morelos-Zaragoza,et al. The Art of Error Correcting Coding: Morelos-Zaragoza/The Art of Error Correcting Coding, Second Edition , 2006 .
[16] Gregory Shakhnarovich,et al. Face Recognition in Subspaces , 2011, Handbook of Face Recognition.
[17] Ann Cavoukian. Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .
[18] Joan Daemen,et al. AES Proposal : Rijndael , 1998 .
[19] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[20] Pieter H. Hartel,et al. Constructing practical Fuzzy Extractors using QIM , 2007 .
[21] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[22] Haiping Lu,et al. Uncorrelated Multilinear Discriminant Analysis With Regularization and Aggregation for Tensor Object Recognition , 2009, IEEE Transactions on Neural Networks.
[23] William H. Press,et al. Numerical recipes in C , 2002 .
[24] Gregory W. Wornell,et al. Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.
[25] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[26] Haiping Lu,et al. Multilinear Subspace Learning for Face and Gait Recognition , 2009 .
[27] Ann Cavoukian,et al. Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.
[28] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[29] Haiping Lu,et al. MPCA: Multilinear Principal Component Analysis of Tensor Objects , 2008, IEEE Transactions on Neural Networks.