New Enrollment Scheme for Biometric Template Using Hash Chaos-based Cryptography
暂无分享,去创建一个
[1] S. Boccaletti,et al. The control of chaos: theory and applications , 2000 .
[2] Vinod Patidar,et al. Discrete chaotic cryptography using external key , 2003 .
[3] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[4] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[5] Donghui Guo,et al. A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks , 2004, Applied Intelligence.
[6] Dascalescu Ana Cristina,et al. A Method for Increasing the Randomness of Lagged Fibonacci Generators , 2010 .
[7] Xun Yi,et al. Hash function based on chaotic tent maps , 2005, IEEE Trans. Circuits Syst. II Express Briefs.
[8] Leon O. Chua,et al. Experimental Demonstration of Secure Communications via Chaotic Synchronization , 1992, Chua's Circuit.
[9] Wang Pu. One way Hash function construction based on chaotic mappings , 2000 .
[10] Despina Polemi,et al. Risk Analysis of Biometric Systems , 2004, WOSIS.
[11] Xiaofeng Liao,et al. A novel method for designing S-boxes based on chaotic maps , 2005 .
[12] Vinod Patidar,et al. Cryptography using multiple one-dimensional chaotic maps , 2005 .
[13] Chai Wah Wu,et al. A Simple Way to Synchronize Chaotic Systems with Applications to , 1993 .
[14] Ö. Morgül,et al. A chaotic masking scheme by using synchronized chaotic systems , 1999 .
[15] Iwao Sasase,et al. A Secret Key Cryptosystem by Iterating a Chaotic Map , 1991, EUROCRYPT.
[16] Ljupco Kocarev,et al. From chaotic maps to encryption schemes , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).
[17] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[18] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[19] Vinod Patidar,et al. Image encryption using chaotic logistic map , 2006, Image Vis. Comput..
[20] Wang Mei-qin,et al. The collision problem of one kind of methods for constructing one-way Hash function based on chaotic map , 2006 .
[21] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[22] Mariana Hentea,et al. Intelligent System for Information Security Management: Architecture and Design Issues , 2007 .
[23] Vinod Patidar,et al. A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing , 2009, Informatica.
[24] Alan V. Oppenheim,et al. Synchronization of Lorenz-based chaotic circuits with applications to communications , 1993 .
[25] Heinz G. Schuster,et al. Handbook of Chaos Control: SCHUSTER:HDBK.CHAOS CONTR O-BK , 1999 .
[26] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[27] L. Kocarev,et al. Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .