Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor
暂无分享,去创建一个
[1] Qing Yang,et al. Secure, Fast, and Energy-Efficient Outsourced Authentication for Smartphones , 2016, IEEE Transactions on Information Forensics and Security.
[2] Julian Fiérrez,et al. Multi-biometric template protection based on Homomorphic Encryption , 2017, Pattern Recognit..
[3] Balasubramanian Raman,et al. Generation of Cancelable Iris Templates via Randomized Bit Sampling , 2019, IEEE Transactions on Information Forensics and Security.
[4] Hakan Erdogan,et al. Fixed-length asymmetric binary hashing for fingerprint verification through GMM-SVM based representations , 2019, Pattern Recognit..
[5] Munaga V. N. K. Prasad,et al. Privacy-preserving iris authentication using fully homomorphic encryption , 2020, Multimedia Tools and Applications.
[6] J. Fierrez-Aguilar,et al. Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[7] Saeed Mozaffari,et al. Face authentication in encrypted domain based on correlation filters , 2018, Multimedia Tools and Applications.
[8] Enrique Argones-Rúa,et al. Efficient Verifiable Computation of XOR for Biometric Authentication , 2016, CANS.
[9] Ahmed Ben Jmaa,et al. 2DPCA fractal features and genetic algorithm for efficient face representation and recognition , 2011, EURASIP J. Inf. Secur..
[10] Hui Li,et al. Efficient and Privacy-preserving Online Fingerprint Authentication Scheme Over Outsourced Data , 2018 .
[11] Yen-Lung Lai,et al. Cancellable iris template generation based on Indexing-First-One hashing , 2017, Pattern Recognit..
[12] Chunming Tang,et al. Privacy-preserving face recognition with outsourced computation , 2016, Soft Comput..
[13] Tanja Lange,et al. The new SHA-3 software shootout , 2012, IACR Cryptol. ePrint Arch..
[14] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[15] Qian Wang,et al. Outsourced Biometric Identification With Privacy , 2018, IEEE Transactions on Information Forensics and Security.
[16] Abdenour Hadid,et al. Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned , 2015, IEEE Signal Processing Magazine.
[17] Jian Ren,et al. PassBio: Privacy-Preserving User-Centric Biometric Authentication , 2017, IEEE Transactions on Information Forensics and Security.
[18] Hongxun Yao,et al. Auto-encoder based dimensionality reduction , 2016, Neurocomputing.
[19] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[20] Arun Ross,et al. Handbook of Biometrics , 2007 .
[21] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[22] Ajay Kumar,et al. Comparison and combination of iris matchers for reliable personal authentication , 2010, Pattern Recognit..
[23] Julien Bringer,et al. A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems , 2012, IEEE Transactions on Information Forensics and Security.
[24] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[25] Fernando Pérez-González,et al. Fully Private Noninteractive Face Verification , 2013, IEEE Transactions on Information Forensics and Security.
[26] S. Sasikala,et al. Generation of Cancelable Iris Template Using Bi-level Transformation , 2017, ICBBS.
[27] Andreas Uhl,et al. Customisation of Paillier homomorphic encryption for efficient binary biometric feature vector matching , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[28] Saman A. Zonouz,et al. CloudID: Trustworthy cloud-based and cross-enterprise biometric identification , 2015, Expert Syst. Appl..
[29] K. Srinathan,et al. Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.
[30] Jung Hee Cheon,et al. Instant Privacy-Preserving Biometric Authentication for Hamming Distance , 2018, IACR Cryptol. ePrint Arch..
[31] Aditya Prasad,et al. A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping , 2017, Comput. Secur..
[32] John Daugman. How iris recognition works , 2004 .
[33] Raphael C.-W. Phan,et al. Facial Expression Recognition in the Encrypted Domain Based on Local Fisher Discriminant Analysis , 2013, IEEE Transactions on Affective Computing.
[34] Frans M. J. Willems,et al. Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[35] Tao Xiang,et al. Towards efficient privacy-preserving face recognition in the cloud , 2019, Signal Process..
[36] Rupinder Saini,et al. COMPARISON OF VARIOUS BIOMETRIC METHODS , 2014 .
[37] Marios Savvides,et al. How to Generate Spoofed Irises From an Iris Code Template , 2011, IEEE Transactions on Information Forensics and Security.
[38] Amit Kumar Singh,et al. Privacy preserving security using biometrics in cloud computing , 2018, Multimedia Tools and Applications.
[39] A. Abhyankar,et al. Novel Canonical Correlation Analysis Based Feature Level Fusion Algorithm for Multimodal Recognition in Biometric Sensor Systems , 2019, Sensor Letters.
[40] Ramachandra Raghavendra,et al. Multi-biometric template protection based on bloom filters , 2018, Inf. Fusion.
[41] Montse Pardàs,et al. Deleted DOI: Audiovisual Head Orientation Estimation with Particle Filtering in Multisensor Scenarios , 2008 .
[42] Fathi E. Abd El-Samie,et al. Cancelable Iris recognition system based on comb filter , 2019, Multimedia Tools and Applications.
[43] Geoffrey E. Hinton,et al. Reducing the Dimensionality of Data with Neural Networks , 2006, Science.
[44] Junbeom Hur,et al. Efficient and privacy-preserving biometric identification in cloud , 2016, ICT Express.
[45] Alex X. Liu,et al. FPGA Resource Pooling in Cloud Computing , 2018, IEEE Transactions on Cloud Computing.
[46] Mauro Barni,et al. SEMBA: SEcure multi-biometric authentication , 2018, IET Biom..
[47] Patrizio Campisi,et al. Hill-Climbing Attacks on Multibiometrics Recognition Systems , 2015, IEEE Transactions on Information Forensics and Security.
[48] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[49] Munaga V. N. K. Prasad,et al. BMIAE: blockchain-based multi-instance Iris authentication using additive ElGamal homomorphic encryption , 2020, IET Biom..
[50] Takeshi Koshiba,et al. New packing method in somewhat homomorphic encryption and its applications , 2015, Secur. Commun. Networks.
[51] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[52] Vishnu Naresh Boddeti. Secure Face Matching Using Fully Homomorphic Encryption , 2018, 2018 IEEE 9th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[53] Kiran S. Balagani,et al. Secure Outsourced Biometric Authentication With Performance Evaluation on Smartphones , 2015, IEEE Transactions on Information Forensics and Security.
[54] Yilong Yin,et al. SDUMLA-HMT: A Multimodal Biometric Database , 2011, CCBR.
[55] Ayman El-Sayed,et al. Iris Recognition Using Multi-Algorithmic Approaches for Cognitive Internet of things (CIoT) Framework , 2018, Future Gener. Comput. Syst..
[56] Andreas Uhl,et al. Design Decisions for an Iris Recognition SDK , 2016 .
[57] Gurjit Singh Walia,et al. Secure multimodal biometric system based on diffused graphs and optimal score fusion , 2019, IET Biom..
[58] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.