A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping
暂无分享,去创建一个
Aditya Prasad | Somnath Dey | Rudresh Dwivedi | Ramveer Singh | Ramveer Singh | S. Dey | Rudresh Dwivedi | Aditya Prasad
[1] Rama Chellappa,et al. Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[2] Zhe Jin,et al. A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template , 2014, Secur. Commun. Networks.
[3] Loris Nanni,et al. Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system , 2011 .
[4] David Zhang,et al. A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.
[5] K.W. Bowyer,et al. The Best Bits in an Iris Code , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[7] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[8] Tee Connie,et al. Remarks on BioHashing based cancelable biometrics in verification system , 2006 .
[9] Norimichi Tsumura,et al. Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.
[10] Andreas Uhl,et al. Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.
[11] Muhammad Ali Akbar,et al. Secure biometric template generation for multi-factor authentication , 2015, Pattern Recognit..
[12] Norimichi Tsumura,et al. Securing BioEncoded IrisCodes against Correlation Attacks , 2011, 2011 IEEE International Conference on Communications (ICC).
[13] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[14] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[15] Andreas Uhl,et al. Cancelable iris-templates using key-dependent wavelet transforms , 2013, 2013 International Conference on Biometrics (ICB).
[16] Libor Masek,et al. Recognition of Human Iris Patterns for Biometric Identification , 2003 .
[17] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[18] Christoph Busch,et al. Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..
[19] Somnath Dey,et al. Cancelable iris template generation using look-up table mapping , 2015, 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN).
[20] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[21] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[22] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[23] Kai Yang,et al. Key Incorporation Scheme for Cancelable Biometrics , 2011, J. Information Security.
[24] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[25] Nalini K. Ratha,et al. Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.
[26] J. Daugman. Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. , 1985, Journal of the Optical Society of America. A, Optics and image science.
[27] K.W. Bowyer,et al. The Iris Challenge Evaluation 2005 , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[28] Christoph Busch,et al. Comparison Score Fusion Towards an Optimal Alignment for Enhancing Cancelable Iris Biometrics , 2013, 2013 Fourth International Conference on Emerging Security Technologies.
[29] Ee-Chien Chang,et al. Robust Extraction of Secret Bits from Minutiae , 2007, ICB.
[30] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[31] I. R. Babu,et al. Performance of Iris Based Hard Fuzzy Vault , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.