Security Of Biometric Systems
暂无分享,去创建一个
[1] H.V. Poor,et al. Privacy-security tradeoffs in biometric security systems , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[2] Julien Bringer,et al. An Authentication Protocol with Encrypted Biometric Data , 2008, AFRICACRYPT.
[3] John Daugman,et al. Recognising persons by their iris patterns , 2004, Defense + Commercial Sensing.
[4] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[5] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[6] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[7] David A. Wagner,et al. Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[8] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[9] Robert K. Rowe,et al. Multispectral fingerprint imaging for spoof detection , 2005, SPIE Defense + Commercial Sensing.
[10] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[11] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[12] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[13] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[14] Bo Fu,et al. Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.
[15] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[16] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[17] Tieniu Tan,et al. Live face detection based on the analysis of Fourier spectra , 2004, SPIE Defense + Commercial Sensing.
[18] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[19] Pieter H. Hartel,et al. Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.
[20] Pieter H. Hartel,et al. The state of the art in abuse of biometrics , 2005 .
[21] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[22] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[23] C. Busch,et al. Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[24] Pong C. Yuen,et al. A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.
[25] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[26] Nasir D. Memon,et al. How to Measure Biometric Information? , 2010, 2010 20th International Conference on Pattern Recognition.
[27] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[28] Kang Ryoung Park,et al. Fake Iris Detection by Using Purkinje Image , 2006, ICB.
[29] Dario Maio,et al. Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.
[30] Nalini K. Ratha,et al. Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.
[31] A. Stoianov. Cryptographically secure biometrics , 2010, Defense + Commercial Sensing.
[32] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[33] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[34] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..