Effectiveness of authenticating users with randomly constructed fingerprint templates
暂无分享,去创建一个
[1] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[2] J.H.A.M. Grijpink,et al. Two barriers to realizing the benefits of biometrics: a chain perspective on biometrics and identity fraud as biometrics' real challenge , 2004, IS&T/SPIE Electronic Imaging.
[3] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[4] Alexander M. Bronstein,et al. Biometrics was no match for hair-raising tricks , 2002, Nature.
[5] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[7] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[8] Craig I. Watson,et al. Studies of Fingerprint Matching Using the NIST Verification Test Bed (VTB) | NIST , 2003 .
[9] Andrew Beng Jin Teoh,et al. FuzzyHash: A Secure Biometric Template Protection Technique , 2007, 2007 Frontiers in the Convergence of Bioscience and Information Technologies.
[10] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[11] Justas Kranauskas,et al. Fingerprint Minutiae Matching without Global Alignment Using Local Structures , 2022 .
[12] Meredith Wadman. Biometrics group counters privacy fears , 1999, Nature.
[13] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[14] Hee-seung Choi,et al. Fingerprint Image Mosaicking by Recursive Ridge Mapping , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[15] Hakil Kim,et al. Super-template Generation Using Successive Bayesian Estimation for Fingerprint Enrollment , 2005, AVBPA.
[16] Weiguo Sheng,et al. Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering , 2008, IEEE Transactions on Information Forensics and Security.
[17] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[18] Chris J. Hill,et al. Risk of Masquerade Arising from the Storage of Biometrics , 2001 .
[19] Julien Bringer,et al. Identification with Encrypted Biometric Data Made Feasible , 2009, ArXiv.
[20] Romany F. Mansour,et al. A New Technique to Fingerprint Recognition Based on Partial Window , 2012 .
[21] Pieter H. Hartel,et al. The state of the art in abuse of biometrics , 2005 .
[22] Venu Govindaraju,et al. A minutia-based partial fingerprint recognition system , 2005, Pattern Recognit..
[23] Krzysztof Kryszczuk,et al. Study of the Distinctiveness of Level 2 and Level 3 Features in Fragmentary Fingerprint Comparison , 2004, ECCV Workshop BioAW.
[24] Ann Cavoukian. Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .
[25] Yi Chen,et al. Dots and Incipients: Extended Features for Partial Fingerprint Matching , 2007, 2007 Biometrics Symposium.
[26] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[27] Andreas Dresen. An Authentication Protocol with encrypted Biometric Data , 2010 .
[28] Jiankun Hu,et al. Global Ridge Orientation Modeling for Partial Fingerprint Identification , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[29] Venu Govindaraju,et al. Symmetric hash functions for secure fingerprint biometric systems , 2007, Pattern Recognit. Lett..
[30] Su Fei,et al. Cracking Cancelable Fingerprint Template of Ratha , 2008, ISCSCT.
[31] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[32] J.H.A.M. Grijpink. Two barriers to realizing the benefits of biometrics - A chain perspective on biometrics, and identity fraud , 2005, Comput. Law Secur. Rev..