Chaotic secure content-based hidden transmission of biometric templates
暂无分享,去创建一个
[1] Andrew Beng Jin Teoh,et al. Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..
[2] Zhi-Hong Guan,et al. Cryptosystem using chaotic keys , 2005 .
[3] A. Murat Tekalp,et al. Robust watermarking of busy images , 2001, IS&T/SPIE Electronic Imaging.
[4] Thierry Pun,et al. Secure hybrid robust watermarking resistant against tampering and copy attack , 2003, Signal Process..
[5] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[6] Ljupco Kocarev,et al. Analysis of some recently proposed chaos-based encryption algo-rithms , 2001 .
[7] Deepa Kundur,et al. Digital watermarking for telltale tamper proofing and authentication , 1999, Proc. IEEE.
[8] Stephan Katzenbeisser,et al. Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .
[9] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[10] Muhammad Khurram Khan,et al. Protecting Biometric Data for Personal Identification , 2004, SINOBIOMETRICS.
[11] Lei Tian,et al. A new watermarking method based on chaotic maps , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[12] Sharath Pankanti,et al. Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.
[13] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[14] G. Álvarez,et al. Cryptanalysis of an ergodic chaotic cipher , 2003 .
[15] Sharath Pankanti,et al. Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.
[16] Ed Dawson,et al. BAAI: biometric authentication and authorization infrastructure , 2003, International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003..
[17] A. Murat Tekalp,et al. Robust watermarking of fingerprint images , 2002, Pattern Recognit..
[18] Li Wenbo,et al. A chaos-based robust wavelet-domain watermarking algorithm , 2004 .
[19] Muhammad Khurram Khan,et al. Securing Biometric Templates for Reliable Identity Authentication , 2005, ICIC.
[20] D. Hitzl,et al. An exploration of the Hénon quadratic map , 1985 .
[21] J. Daugman,et al. Epigenetic randomness, complexity and singularity of human iris patterns , 2001, Proceedings of the Royal Society of London. Series B: Biological Sciences.
[22] G. Álvarez,et al. Cryptanalysis of a chaotic encryption system , 2000 .
[23] Gilbert L. Peterson,et al. A new blind method for detecting novel steganography , 2005, Digit. Investig..
[24] Intaek Kim,et al. A blind watermarking technique using wavelet transform , 2001, ISIE 2001. 2001 IEEE International Symposium on Industrial Electronics Proceedings (Cat. No.01TH8570).