Gaussian Random Projection Based Non-invertible Cancelable Biometric Templates
暂无分享,去创建一个
[1] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[2] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[3] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[4] A. Teoh,et al. Palmprint Recognition with PCA and ICA , 2003 .
[5] H. B. Kekre,et al. An effectual method for extraction of ROI of palmprints , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).
[6] Heikki Mannila,et al. Random projection in dimensionality reduction: applications to image and text data , 2001, KDD '01.
[7] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[8] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[9] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[10] Chulhan Lee,et al. Cancelable fingerprint templates using minutiae-based bit-strings , 2010, J. Netw. Comput. Appl..
[11] Alex Pentland,et al. Face recognition using eigenfaces , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[12] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[13] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[14] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[15] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[16] S. Mendelson,et al. Empirical processes and random projections , 2005 .
[17] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[18] Kiyoung Moon,et al. Inverse operation and preimage attack on BioHashing , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.
[19] Marian Stewart Bartlett,et al. Face recognition by independent component analysis , 2002, IEEE Trans. Neural Networks.
[20] J. Matousek,et al. On variants of the Johnson–Lindenstrauss lemma , 2008 .
[21] Nalini K. Ratha,et al. Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[22] Nasir D. Memon,et al. A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.
[23] Sanjoy Dasgupta,et al. Learning mixtures of Gaussians , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[24] Andrew Beng Jin Teoh,et al. Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.