Feature Fusion Methods for Indexing and Retrieval of Biometric Data: Application to Face Recognition with Privacy Protection
暂无分享,去创建一个
Christoph Busch | Christian Rathgeb | Pawel Drozdowski | Dailé Osorio Roig | Fabian Stockhardt | Daile Osorio-Roig | C. Busch | C. Rathgeb | P. Drozdowski | Fabian Stockhardt
[1] Arun Ross,et al. What Else Does Your Biometric Data Reveal? A Survey on Soft Biometrics , 2016, IEEE Transactions on Information Forensics and Security.
[2] Joseph H. Silverman,et al. NTRU: A Ring-Based Public Key Cryptosystem , 1998, ANTS.
[3] Christoph Busch,et al. Unlinkable and irreversible biometric template protection based on bloom filters , 2016, Inf. Sci..
[4] Michele Nappi,et al. A Novel Cancelable FaceHashing Technique Based on Non-Invertible Transformation With Encryption and Decryption Template , 2020, IEEE Access.
[5] S. Shekhar,et al. Personal Identification Using Multibiometrics Rank-Level Fusion , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[6] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[7] Christoph Busch,et al. Finding the Suitable Doppelgänger for a Face Morphing Attack , 2020, 2020 IEEE International Joint Conference on Biometrics (IJCB).
[8] Ogechukwu N. Iloanusi. Fusion of finger types for fingerprint indexing using minutiae quadruplets , 2014, Pattern Recognit. Lett..
[9] Patrick Lacharme,et al. A Cryptanalysis of Two Cancelable Biometric Schemes Based on Index-of-Max Hashing , 2020, IEEE Transactions on Information Forensics and Security.
[10] Christian Gehrmann,et al. Metadata filtering for user-friendly centralized biometric authentication , 2019, EURASIP J. Inf. Secur..
[11] Jung Yeon Hwang,et al. Open-set face identification with index-of-max hashing by learning , 2020, Pattern Recognit..
[12] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[13] Eric Crockett,et al. A Low-Depth Homomorphic Circuit for Logistic Regression Model Training , 2020, IACR Cryptol. ePrint Arch..
[14] Feiyue Huang,et al. CurricularFace: Adaptive Curriculum Learning Loss for Deep Face Recognition , 2020, 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[15] Christoph Busch,et al. Bloom filter-based search structures for indexing and retrieving iris-codes , 2017, IET Biom..
[16] Tanja Lange,et al. Post-quantum cryptography , 2008, Nature.
[17] Qiuxia Wu,et al. Palm vein recognition based on multi-sampling and feature-level fusion , 2015, Neurocomputing.
[18] Lavinia Mihaela Dinca,et al. The Fall of One, the Rise of Many A Survey on Multi-Biometric Fusion Methods , 2017 .
[19] Vishnu Naresh Boddeti,et al. HERS: Homomorphically Encrypted Representation Search , 2022, IEEE Transactions on Biometrics, Behavior, and Identity Science.
[20] Masakazu Fujio,et al. Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification , 2019, IEEE Access.
[21] Christoph Busch,et al. Face Recognition Systems Under Morphing Attacks: A Survey , 2019, IEEE Access.
[22] Anil K. Jain,et al. Decision-Level Fusion in Fingerprint Verification , 2001, Multiple Classifier Systems.
[23] Andreas Uhl,et al. Is Warping-based Cancellable Biometrics (still) Sensible for Face Recognition? , 2020, 2020 IEEE International Joint Conference on Biometrics (IJCB).
[24] Arun Ross,et al. Quality based rank-level fusion in multibiometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[25] J. Olsen,et al. The European Commission , 2020, The European Union.
[26] Konstantinos N. Plataniotis,et al. Biometric Encryption: The New Breed of Untraceable Biometrics , 2010 .
[27] Tanuj Kanchan,et al. The Fingerprint Sourcebook , 2012 .
[28] Ilaiah Kavati,et al. Search Space Reduction in Biometric Databases: A Review , 2017 .
[29] Stark C. Draper,et al. A Theoretical Analysis of Authentication, Privacy, and Reusability Across Secure Biometric Systems , 2011, IEEE Transactions on Information Forensics and Security.
[30] Guy Gogniat,et al. Recent Advances in Homomorphic Encryption: A Possible Future for Signal Processing in the Encrypted Domain , 2013, IEEE Signal Processing Magazine.
[31] Stan Z. Li,et al. Near Infrared Face Based Biometric Key Binding , 2009, ICB.
[32] David Zhang,et al. Contactless and Pose Invariant Biometric Identification Using Hand Surface , 2011, IEEE Transactions on Image Processing.
[33] Role of Biometric Technology in Aadhaar Enrollment , 2012 .
[34] Sistema político,et al. Unique Identification Authority of India , 2011 .
[35] Christoph Busch,et al. Fuzzy Vault for 3D Face Recognition Systems , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[36] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[37] Harold W. Kuhn,et al. The Hungarian method for the assignment problem , 1955, 50 Years of Integer Programming.
[38] Kevin W. Bowyer,et al. Iris recognition technology evaluated for voter registration in Somaliland , 2015 .
[39] Christoph Busch,et al. Multi-Biometric Identification With Cascading Database Filtering , 2020, IEEE Transactions on Biometrics, Behavior, and Identity Science.
[40] Christoph Busch,et al. Computational workload in biometric identification systems: an overview , 2019, IET Biom..
[41] Julien Bringer,et al. Security analysis and improvement of some biometric protected templates based on Bloom filters , 2017, Image Vis. Comput..
[42] Kim-Sau Chung,et al. On the Existence of Stable Roommate Matchings , 2000, Games Econ. Behav..
[43] Boris G. Pittel,et al. An Upper Bound for the Solvability Probability of a Random Stable Roommates Instance , 2006 .
[44] Christoph Busch,et al. Stable Hash Generation for Efficient Privacy-Preserving Face Identification , 2022, IEEE Transactions on Biometrics, Behavior, and Identity Science.
[45] Christoph Busch,et al. Signal-level Fusion for Indexing and Retrieval of Facial Biometric Data , 2021, IET Biom..
[46] Vishnu Naresh Boddeti,et al. On the Intrinsic Dimensionality of Image Representations , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[47] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[48] Jung Hee Cheon,et al. Homomorphic Encryption for Arithmetic of Approximate Numbers , 2017, ASIACRYPT.
[49] Yongjin Wang,et al. Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.
[50] John Daugman,et al. Biometric decision landscapes , 2000 .
[51] Chin-Seng Chua,et al. PCA-based image recombination for multimodal 2D + 3D face recognition , 2011, Image Vis. Comput..
[52] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[53] Donghoon Chang,et al. Privacy-Preserving Indexing of Iris-Codes with Cancelable Bloom Filter-based Search Structures , 2018, 2018 26th European Signal Processing Conference (EUSIPCO).
[54] Jascha Kolberg,et al. Efficiency Analysis of Post-quantum-secure Face Template Protection Schemes based on Homomorphic Encryption , 2020, 2020 International Conference of the Biometrics Special Interest Group (BIOSIG).
[55] Christoph Busch,et al. Turning a Vulnerability into an Asset: Accelerating Facial Identification with Morphing , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).
[56] Christoph Busch,et al. A Fingerprint Indexing Algorithm on Encrypted Domain , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[57] Arun Ross,et al. Fingerprint mosaicking , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[58] C. Rathgeb,et al. On the Application of Homomorphic Encryption to Face Identification , 2019, 2019 International Conference of the Biometrics Special Interest Group (BIOSIG).
[59] Arun Ross,et al. A coding scheme for indexing multimodal biometric databases , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[60] Pong C. Yuen,et al. SecureFace: Face Template Protection , 2021, IEEE Transactions on Information Forensics and Security.
[61] Christoph Busch,et al. Benchmarking Binarisation Schemes for Deep Face Templates , 2018, 2018 25th IEEE International Conference on Image Processing (ICIP).
[62] Marta Gomez-Barrero,et al. General Framework to Evaluate Unlinkability in Biometric Template Protection Systems , 2018, IEEE Transactions on Information Forensics and Security.
[63] Arun Ross,et al. Index Codes for Multibiometric Pattern Retrieval , 2012, IEEE Transactions on Information Forensics and Security.
[64] Karl Ricanek,et al. MORPH: a longitudinal image database of normal adult age-progression , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[65] Phalguni Gupta,et al. Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion , 2008, ICISS.
[66] Jean-Luc Dugelay,et al. Recent Advances in Biometric Technology for Mobile Devices , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[67] Jascha Kolberg,et al. Template Protection based on Homomorphic Encryption: Computationally Efficient Application to Iris-Biometric Verification and Identification , 2019, 2019 IEEE International Workshop on Information Forensics and Security (WIFS).
[68] Christoph Busch,et al. Multi-iris indexing and retrieval: Fusion strategies for bloom filter-based search structures , 2017, 2017 IEEE International Joint Conference on Biometrics (IJCB).
[69] Nalini Ratha,et al. An efficient, two-stage iris recognition system , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[70] Johannes Merkle,et al. Deep Face Fuzzy Vault: Implementation and Performance , 2021, Comput. Secur..
[71] Masakazu Fujio,et al. Cancelable Indexing Based on Low-rank Approximation of Correlation-invariant Random Filtering for Fast and Secure Biometric Identification , 2018, Pattern Recognit. Lett..
[72] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[73] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[74] Stefanos Zafeiriou,et al. ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[75] Hai Huang,et al. Secure Outsourced Computation of Matrix Determinant Based on Fully Homomorphic Encryption , 2021, IEEE Access.
[76] Marina L. Gavrilova,et al. Decision Fusion for Multimodal Biometrics Using Social Network Analysis , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[77] Arun Ross,et al. A Comprehensive Overview of Biometric Fusion , 2019, Inf. Fusion.
[78] Christoph Busch,et al. Binarization of spectral histogram models: An application to efficient biometric identification , 2015, 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF).
[79] Christian Rathgeb,et al. Efficient two-stage speaker identification based on universal background models , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[80] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[81] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[82] Vishnu Naresh Boddeti. Secure Face Matching Using Fully Homomorphic Encryption , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[83] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[84] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[85] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[86] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[87] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[88] Yiu-Ming Cheung,et al. Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[89] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[90] Mauro Conti,et al. A Survey on Homomorphic Encryption Schemes: Theory and Implementation , 2017 .
[91] Alan Mink,et al. Multimodal biometrics: issues in design and testing , 2003, ICMI '03.