A face template protection approach using chaos and GRP permutation
暂无分享,去创建一个
[1] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[2] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[3] Haiping Lu,et al. Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.
[4] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[5] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[6] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[7] J. I. Hall,et al. Notes on Coding Theory , 2003 .
[8] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[9] Pong C. Yuen,et al. Binary Discriminant Analysis for Generating Binary Face Template , 2012, IEEE Transactions on Information Forensics and Security.
[10] Nur Izura Udzir,et al. Face Recognition and Template Protection with Shielding Function , 2015 .
[11] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[12] Ming-Hsuan Yang,et al. Kernel Eigenfaces vs. Kernel Fisherfaces: Face recognition using kernel methods , 2002, Proceedings of Fifth IEEE International Conference on Automatic Face Gesture Recognition.
[13] S. Mazloom,et al. Color image encryption based on Coupled Nonlinear Chaotic Map , 2009 .
[14] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[15] Raymond N. J. Veldhuis,et al. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.
[16] Xin Zhang,et al. A new chaotic algorithm for image encryption , 2006 .
[17] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[18] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[19] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[20] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[21] David Zhang,et al. Combination of two novel LDA-based methods for face recognition , 2007, Neurocomputing.
[22] Pong C. Yuen,et al. A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.
[23] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[24] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[25] Xi Chen,et al. Chaotic Random Projection for Cancelable Biometric Key Generation , 2012, IScIDE.
[26] H. M. Ebied. Feature extraction using PCA and Kernel-PCA for face recognition , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).
[27] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[28] Andreas Uhl,et al. Secure Iris Recognition Based on Local Intensity Variations , 2010, ICIAR.
[29] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[30] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[31] Elwyn R. Berlekamp,et al. Algebraic coding theory , 1984, McGraw-Hill series in systems science.
[32] B. Scholkopf,et al. Fisher discriminant analysis with kernels , 1999, Neural Networks for Signal Processing IX: Proceedings of the 1999 IEEE Signal Processing Society Workshop (Cat. No.98TH8468).
[33] Andreas Uhl,et al. Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.
[34] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[35] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[36] Andrew Beng Jin Teoh,et al. Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.
[37] Sébastien Marcel,et al. On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..