Fuzzy Vault Scheme Based on Fixed-Length Templates Applied to Dynamic Signature Verification
暂无分享,去创建一个
Raul Sanchez-Reillo | Judith Liu-Jimenez | Wendy Ponce-Hernandez | Ramon Blanco-Gonzalo | R. Sánchez-Reillo | J. Liu-Jimenez | Ramón Blanco-Gonzalo | Wendy Ponce-Hernandez
[1] Julian Fiérrez,et al. Preprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification , 2015, IEEE Access.
[2] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[3] Yongjin Wang,et al. Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.
[4] Julian Fiérrez,et al. Implementation of Fixed-Length Template Protection Based on Homomorphic Encryption with Application to Signature Biometrics , 2016, 2016 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW).
[5] Somnath Dey,et al. A fingerprint based crypto-biometric system for secure communication , 2018, J. Ambient Intell. Humaniz. Comput..
[6] Raul Sanchez-Reillo,et al. Forensic Validation of Biometrics Using Dynamic Handwritten Signatures , 2018, IEEE Access.
[7] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[8] Julian Fiérrez,et al. Variable-length template protection based on homomorphic encryption with application to signature biometrics , 2016, 2016 4th International Conference on Biometrics and Forensics (IWBF).
[9] Réjean Plamondon,et al. Automatic Signature Verification: The State of the Art - 1989-1993 , 1994, Int. J. Pattern Recognit. Artif. Intell..
[10] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[11] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[12] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[13] Berrin A. Yanikoglu,et al. Biometric Cryptosystem Using Online Signatures , 2006, ISCIS.
[14] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[15] Ana Fred,et al. A Behavioural Biometric System Based on Human Computer Interaction , 2004 .
[16] Julien Bringer,et al. Privacy-Preserving Biometric Identification Using Secure Multiparty Computation: An Overview and Recent Trends , 2013, IEEE Signal Processing Magazine.
[17] Anil K. Jain,et al. Biometric Authentication: System Security and User Privacy , 2012, Computer.
[18] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[19] Julian Fiérrez,et al. Dynamic signature verification with template protection using helper data , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[20] Enrique Argones-Rúa,et al. Biometric Template Protection Using Universal Background Models: An Application to Online Signature , 2012, IEEE Transactions on Information Forensics and Security.
[21] Samiran Chattopadhyay,et al. A Secure Authentication Protocol for Multi-Server-Based E-Healthcare Using a Fuzzy Commitment Scheme , 2019, IEEE Access.
[22] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[23] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[24] Ajay Kumar,et al. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..
[25] Samiran Chattopadhyay,et al. Provably Secure Multi-Server Authentication Protocol Using Fuzzy Commitment , 2018, IEEE Access.
[26] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[27] Bart Preneel,et al. Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[28] Guy Gogniat,et al. Recent Advances in Homomorphic Encryption , 2013 .
[29] Sargur N. Srihari,et al. On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[30] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[31] Anil K. Jain,et al. Fingerprint Template Protection: From Theory to Practice , 2013, Security and Privacy in Biometrics.
[32] Anil K. Jain,et al. On-line signature verification, , 2002, Pattern Recognit..
[33] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[34] Alessandro Neri,et al. Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[35] Alejandro F. Frangi,et al. This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. , 2022 .
[36] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[37] J. Fierrez-Aguilar,et al. Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.
[38] Julian Fiérrez,et al. Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[39] MARTA GOMEZ-BARRERO,et al. Privacy-Preserving Comparison of Variable-Length Data With Application to Biometric Template Protection , 2017, IEEE Access.
[40] Emilio Mordini,et al. Second Generation Biometrics: The Ethical, Legal and Social Context , 2012 .
[41] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[42] Juan J. Igarza,et al. MCYT baseline corpus: a bimodal biometric database , 2003 .
[43] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[44] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[45] Tero Kivinen,et al. More Modular Exponential (MODP) Diffie-Hellman groups for Internet Key Exchange (IKE) , 2003, RFC.
[46] Judith Liu-Jimenez,et al. Performance evaluation of handwritten signature recognition in mobile environments , 2014, IET Biom..