暂无分享,去创建一个
[1] Vaibhava Goel,et al. Random Maxout Features , 2015, ArXiv.
[2] Jay Yagnik,et al. The power of comparative reasoning , 2011, 2011 International Conference on Computer Vision.
[3] Julian Fiérrez,et al. Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters , 2014, 2014 22nd International Conference on Pattern Recognition.
[4] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[5] Heikki Mannila,et al. Random projection in dimensionality reduction: applications to image and text data , 2001, KDD '01.
[6] Davide Maltoni,et al. A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[7] Jiankun Hu,et al. A blind system identification approach to cancelable fingerprint templates , 2016, Pattern Recognit..
[8] Bart Preneel,et al. Reversing protected minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[9] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[10] Christoph Busch,et al. On application of bloom filters to iris biometrics , 2014, IET Biom..
[11] Leonard J. Schulman,et al. Dimensionality reduction: beyond the Johnson-Lindenstrauss bound , 2011, SODA '11.
[12] Narishige Abe,et al. Irreversible fingerprint template using Minutiae Relation Code with Bloom Filter , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[13] Yen-Lung Lai,et al. Cancellable iris template generation based on Indexing-First-One hashing , 2017, Pattern Recognit..
[14] Andrew Beng Jin Teoh,et al. High security Iris verification system based on random secret integration , 2006, Comput. Vis. Image Underst..
[15] Chris J. Hill,et al. Risk of Masquerade Arising from the Storage of Biometrics , 2001 .
[16] Alan M. Frieze,et al. Improved approximation algorithms for MAXk-CUT and MAX BISECTION , 1995, Algorithmica.
[17] Bart Mennink,et al. When a Bloom filter is a Doom filter: Security assessment of a novel iris biometric template protection system , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[18] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[20] Davide Maltoni,et al. Noninvertible Minutia Cylinder-Code Representation , 2012, IEEE Transactions on Information Forensics and Security.
[21] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[22] Shree K. Nayar,et al. Ordinal measures for visual correspondence , 1996, Proceedings CVPR IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[23] Zhe Jin,et al. Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[24] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[25] Julien Bringer,et al. Security analysis of Bloom filter-based iris biometric template protection , 2015, 2015 International Conference on Biometrics (ICB).
[26] Bian Yang,et al. Parameterized geometric alignment for minutiae-based fingerprint template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[27] Davide Maltoni,et al. Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[28] Kristen Grauman,et al. Kernelized Locality-Sensitive Hashing , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[29] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[30] Moses Charikar,et al. Similarity estimation techniques from rounding algorithms , 2002, STOC '02.
[31] Christoph Busch,et al. Towards generating protected fingerprint templates based on bloom filters , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).
[32] Christoph Busch,et al. Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[33] R. Graham,et al. Spearman's Footrule as a Measure of Disarray , 1977 .
[34] Anil K. Jain,et al. Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[35] Kien A. Hua,et al. Rank Subspace Learning for Compact Hash Codes , 2015, ArXiv.
[36] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[37] Axel Munk,et al. Security Considerations in Minutiae-Based Fuzzy Vaults , 2015, IEEE Transactions on Information Forensics and Security.
[38] Andrew Beng Jin Teoh,et al. Enhanced multi-line code for minutiae-based fingerprint template protection , 2013, Pattern Recognit. Lett..