Face recognition with renewable and privacy preserving binary templates
暂无分享,去创建一个
Anton H. M. Akkermans | Tom A. M. Kevenaar | Geert Jan Schrijen | Michiel van der Veen | Fei Zuo | G. Schrijen | T. Kevenaar | M. V. D. Veen | F. Zuo | A. Akkermans
[1] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[2] Hyeonjoon Moon,et al. The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[3] Pim Tuyls,et al. Information-theoretic approach to privacy protection of biometric templates , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[4] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[5] Peter H. N. de With,et al. Fast facial feature extraction using a deformable shape model with Haar-wavelet based local texture attributes , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[6] Soren Bisgaard,et al. Statistics for Engineering Problem Solving , 1995 .
[7] Michael Purser. Introduction to error-correcting codes , 1994 .
[8] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[9] Peter H. N. de With,et al. Toward fast feature adaptation and localization for real-time face recognition systems , 2003, Visual Communications and Image Processing.
[10] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[11] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[12] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[13] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[14] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[15] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[16] Yevgeniy Dodis,et al. Fuzzy Extractors and Cryptography, or How to Use Your Fingerprints , 2003 .
[17] Stephen B. Vardeman,et al. Statistics for Engineering Problem Solving. , 1996 .
[18] Norbert Krüger,et al. Face Recognition by Elastic Bunch Graph Matching , 1997, CAIP.