Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication
暂无分享,去创建一个
Bernadette Dorizzi | Dijana Petrovska-Delacrétaz | Sanjay Ganesh Kanade | B. Dorizzi | D. Petrovska-Delacrétaz | S. Kanade
[1] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[2] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[3] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[4] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[5] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[6] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[7] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[8] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[9] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[10] Joachim M. Buhmann,et al. Distortion Invariant Object Recognition in the Dynamic Link Architecture , 1993, IEEE Trans. Computers.
[11] S. Kanade,et al. Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[12] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[13] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[15] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[16] Bernadette Dorizzi,et al. Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[17] Michael Boyd,et al. Iris Recognition , 2006 .
[18] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[19] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[20] Ray A. Perlner,et al. Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology (Special Publication 800-63-1) , 2012 .
[21] Ann Cavoukian. Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .
[22] S. Kanade,et al. Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.
[23] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[24] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[25] Bruce A. Draper,et al. The CSU Face Identification Evaluation System , 2005, Machine Vision and Applications.
[26] Arun Ross,et al. Handbook of Multibiometrics (International Series on Biometrics) , 2006 .
[27] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[28] Ann Cavoukian,et al. Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.
[29] P. Jonathon Phillips,et al. Face Recognition Grand Challenge , 2004 .
[30] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.