Improving biometrics authentication with a multi-factor approach based on optical interference and chaotic maps
暂无分享,去创建一个
[1] Muhammad Rafiq Abuturab. Information authentication system using interference of two beams in gyrator transform domain. , 2013, Applied optics.
[2] T. Geisel,et al. Statistical properties of chaos in Chebyshev maps , 1984 .
[3] Muhammad Khurram Khan,et al. Multimodal face and fingerprint biometrics authentication on space-limited tokens , 2008, Neurocomputing.
[4] Peng Zhang,et al. Known-plaintext attack on optical encryption based on double random phase keys. , 2006, Optics letters.
[5] Jin Kwak,et al. Construction of a secure two-factor user authentication system using fingerprint information and password , 2014, J. Intell. Manuf..
[6] Mark Manulis,et al. A Modular Framework for Multi-Factor Authentication and Key Exchange , 2014, SSR.
[7] Muhammad Khurram Khan,et al. Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks , 2016, Comput. Networks.
[8] Wenqi He,et al. Multiple-image authentication with a cascaded multilevel architecture based on amplitude field random sampling and phase information multiplexing. , 2015, Applied optics.
[9] Ann Cavoukian,et al. Biometric Encryption Chapter from the Encyclopedia of Biometrics , 2009 .
[10] Tran Khanh Dang,et al. A Multi-factor Biometric Based Remote Authentication Using Fuzzy Commitment and Non-invertible Transformation , 2015, ICT-EurAsia/CONFENIS.
[11] Hua Zhang,et al. Novel image encryption/decryption based on quantum Fourier transform and double phase encoding , 2013, Quantum Inf. Process..
[12] B Javidi,et al. Optical image encryption based on input plane and Fourier plane random encoding. , 1995, Optics letters.
[13] H. Al-Assam,et al. Improving performance and security of biometrics using efficient and stable random projection techniques , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[14] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[15] Rong Li,et al. Optical image hiding with a modified Mach–Zehnder interferometer , 2014 .
[16] Di Xiao,et al. Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform , 2013 .
[17] Nirmala Saini,et al. Biometrics based key management of double random phase encoding scheme using error control codes , 2013 .
[18] Pong C. Yuen,et al. A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.
[19] Huaisheng Wang. A No Interference Method for Image Encryption and Decryption by an Optical System of a Fractional Fourier Transformation and a Fourier Transformation , 2011 .
[20] Muhammad Ali Akbar,et al. Secure biometric template generation for multi-factor authentication , 2015, Pattern Recognit..
[21] Xin Wang,et al. Multi-image encryption based on interference of computer generated hologram , 2014 .
[22] Lei Tian,et al. Chaotic secure content-based hidden transmission of biometric templates , 2007 .
[23] Yong Man Ro,et al. Multi-Factor Authentication Using Fingerprints and User-Specific Random Projection , 2010, 2010 12th International Asia-Pacific Web Conference.
[24] Lihua Gong,et al. Quantum image encryption based on generalized Arnold transform and double random-phase encoding , 2015, Quantum Information Processing.
[25] Anil K. Jain,et al. Multibiometric systems: fusion strategies and template security , 2008 .
[26] Hengjian Li,et al. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..
[27] Nam Kim,et al. Digital holographic security system based on random phase encoded reference beams and fingerprint identification , 2005 .
[28] Muhammad Rafiq Abuturab,et al. Color image security system based on discrete Hartley transform in gyrator transform domain , 2013 .
[29] Nirmala Saini,et al. Soft biometrics in conjunction with optics based biohashing , 2011 .
[30] Wenqi He,et al. Optical identity authentication scheme based on elliptic curve digital signature algorithm and phase retrieval algorithm. , 2013, Applied optics.
[31] KyungHee Lee,et al. Two-factor face authentication using matrix permutation transformation and a user password , 2014, Inf. Sci..
[32] 刘雪梅,et al. An optical authentication system based on encryption technique and multimodal biometrics , 2013 .
[33] Hongjun Liu,et al. Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..
[34] Naveen K Nishchal,et al. Known-plaintext attack-based optical cryptosystem using phase-truncated Fresnel transform. , 2013, Applied optics.
[35] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[36] Jean-Pierre Seifert,et al. Fault Based Cryptanalysis of the Advanced Encryption Standard (AES) , 2003, Financial Cryptography.
[37] Robert H. Deng,et al. A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems , 2011, IEEE Transactions on Parallel and Distributed Systems.
[38] Mohammad Eshghi,et al. Chaotic image encryption system using phase-magnitude transformation and pixel substitution , 2011, Telecommunication Systems.
[39] Hoon-Jae Lee,et al. Multi-Factor Authentication Process Using More than One Token with Watermark Security , 2013 .
[40] Nirmala Saini,et al. Optics based biometric encryption using log polar transform , 2010 .
[41] Safya Belghith,et al. OCML-based colour image encryption , 2009 .
[42] Naveen K Nishchal,et al. An optical encryption and authentication scheme using asymmetric keys. , 2014, Journal of the Optical Society of America. A, Optics, image science, and vision.
[43] Jun Li,et al. Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography , 2012 .
[44] Junbin Gao,et al. Fingerprint Matching using A Hybrid Shape and Orientation Descriptor , 2011 .
[45] Liansheng Sui,et al. Color image encryption based on gyrator transform and Arnold transform , 2013 .
[46] Todd Mozer,et al. Assessing biometric authentication: a holistic approach to accuracy , 2015 .
[47] Lu Leng,et al. Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security , 2011, J. Netw. Comput. Appl..
[48] Xiaoling Wang,et al. Multiple-image hiding based on interference principle , 2012 .
[49] Ming Li,et al. A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion , 2014, Secur. Commun. Networks.
[50] L. Leng,et al. Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.
[51] B. Javidi,et al. Optical Security System with Fourier Plane encoding. , 1998, Applied optics.
[52] Bahram Javidi,et al. Fully phase encoded key and biometrics for security verification , 1997 .
[53] Ayman Alfalou,et al. Double random phase encryption scheme to multiplex and simultaneous encode multiple images. , 2009, Applied optics.
[54] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[55] Hai Yu,et al. Analysis and improvement of a double-image encryption scheme using pixel scrambling technique in gyrator domains , 2015 .
[56] Wen Chen,et al. Optical binary image encryption using aperture-key and dual wavelengths. , 2014, Optics express.
[57] Wenqi He,et al. Optical hierarchical authentication based on interference and hash function. , 2012, Applied optics.
[58] Wen Chen,et al. Optical information authentication using compressed double-random-phase-encoded images and quick-response codes. , 2015, Optics express.
[59] Zhengjun Liu,et al. A novel double-image encryption scheme based on cross-image pixel scrambling in gyrator domains. , 2014, Optics express.
[60] Lu Leng,et al. PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.
[61] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[62] Naveen K. Nishchal,et al. Fresnel domain nonlinear optical image encryption scheme based on Gerchberg-Saxton phase-retrieval algorithm. , 2014, Applied optics.
[63] Y. Mu,et al. Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase Encoding , 2013, Journal of Lightwave Technology.
[64] Bahram Javidi,et al. Optical encryption using a joint transform correlator architecture , 2000 .
[65] Zhengjun Liu,et al. Image encryption algorithm by using fractional Fourier transform and pixel scrambling operation based on double random phase encoding , 2013 .
[66] Jingjuan Zhang,et al. A lensless optical security system based on computer-generated phase only masks , 2004 .
[67] Kehar Singh,et al. Optical image encryption using a jigsaw transform for silhouette removal in interference-based methods and decryption with a single spatial light modulator. , 2011, Applied optics.
[68] Junbin Gao,et al. Fingerprint Matching using Enhanced Shape Context , 2006 .
[69] Bo Wang,et al. Optical image encryption based on interference. , 2008, Optics letters.
[70] Ahmed Ben Jmaa,et al. 2DPCA fractal features and genetic algorithm for efficient face representation and recognition , 2011, EURASIP J. Inf. Secur..
[71] Jun Li,et al. Image encryption with two-step-only quadrature phase-shifting digital holography , 2012 .
[72] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..