Practical Biometric Authentication with Template Protection
暂无分享,去创建一个
Raymond N. J. Veldhuis | Anton H. M. Akkermans | Tom A. M. Kevenaar | Asker M. Bazen | Pim Tuyls | Geert Jan Schrijen | G. Schrijen | P. Tuyls | T. Kevenaar | A. Bazen | R. Veldhuis | A. Akkermans
[1] Asker M. Bazen,et al. Detection of Cores in Fingerprints with Improved Dimension Reduction , 2004 .
[2] Sharath Pankanti,et al. Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..
[3] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[4] Alfred C. Weaver,et al. Biometric authentication , 2006, Computer.
[5] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[6] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[7] Sabih H. Gerez,et al. Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[8] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[9] Daniel Willem Elisabeth Schobben,et al. Privacy-protected biometric templates: acoustic ear identification , 2004, SPIE Defense + Commercial Sensing.
[10] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[11] Bhagavatula Vijaya Kumar,et al. Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.
[12] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[13] Raymond N. J. Veldhuis,et al. Likelihood-ratio-based biometric verification , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[14] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[15] Anil K. Jain,et al. FVC2000: Fingerprint Verification Competition , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[16] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[17] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.