暂无分享,去创建一个
[1] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[2] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[4] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[5] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[6] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.
[7] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[8] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[9] Zahid Akhtar Shabbeer Ahmad Momin. Security of multimodal biometric systems against spoof attacks , 2012 .
[10] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[11] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[12] Pong C. Yuen,et al. A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.
[13] Nguyen Minh Duc. Your face is NOT your password Face Authentication ByPassing Lenovo – Asus – Toshiba , 2009 .
[14] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[15] Pong C. Yuen,et al. Vulnerabilities in binary face template , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[16] Ee-Chien Chang,et al. Robust Extraction of Secret Bits from Minutiae , 2007, ICB.
[17] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[18] Pong C. Yuen,et al. Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection , 2007, ICB.
[19] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[20] Anton H. M. Akkermans,et al. Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[21] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[22] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[23] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[24] L. O'Gorman,et al. Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.
[25] Pong C. Yuen,et al. Binary Discriminant Analysis for Face Template Protection , 2010, 2010 20th International Conference on Pattern Recognition.
[26] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[27] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[28] Norimichi Tsumura,et al. Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.
[29] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[30] Andrew Beng Jin Teoh,et al. Biometric hash: high-confidence face recognition , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[31] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[32] A. Adler,et al. Images can be regenerated from quantized biometric match score data , 2004, Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat. No.04CH37513).
[33] Pong C. Yuen,et al. A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.
[34] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[35] Norimichi Tsumura,et al. BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes , 2010, IEICE Trans. Inf. Syst..
[36] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[37] David J. Kriegman,et al. Recognition using class specific linear projection , 1997 .
[38] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[39] Nasir D. Memon,et al. A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.
[40] Yongjin Wang,et al. Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.
[41] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[42] Pong C. Yuen,et al. Class-Distribution Preserving Transform for Face Biometric Data Security , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.