CHAPTER 11 – Securing Biometric Data
暂无分享,去创建一个
[1] Libor Masek,et al. Recognition of Human Iris Patterns for Biometric Identification , 2003 .
[2] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[3] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[4] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[5] Stark C. Draper,et al. Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[6] Bernd Girod,et al. Image Authentication Based on Distributed Source Coding , 2007, 2007 IEEE International Conference on Image Processing.
[7] Koichi Sasakawa,et al. Fingerprint Authentication Based on Matching Scores with Other Data , 2006, ICB.
[8] S. Yang,et al. Secure fuzzy vault based fingerprint verification system , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[9] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, ICPR 2004.
[10] Anil K. Jain,et al. FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.
[11] Thomas M. Cover,et al. A Proof of the Data Compression Theorem of Slepian and Wolf for Ergodic Sources , 1971 .
[12] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] Stark C. Draper,et al. Feature extraction for a Slepian-Wolf biometric system using LDPC codes , 2008, 2008 IEEE International Symposium on Information Theory.
[14] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[15] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[16] X. Jin. Factor graphs and the Sum-Product Algorithm , 2002 .
[17] Sergey Yekhanin,et al. Secure Biometrics Via Syndromes , 2005 .
[18] R. A. McDonald,et al. Noiseless Coding of Correlated Information Sources , 1973 .
[19] Anton H. M. Akkermans,et al. Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[20] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[21] Jack K. Wolf,et al. Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.
[22] Stark C. Draper,et al. Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes , 2007 .
[23] Rüdiger L. Urbanke,et al. Design of capacity-approaching irregular low-density parity-check codes , 2001, IEEE Trans. Inf. Theory.
[24] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[25] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[26] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[27] Anil K. Jain,et al. Multibiometric systems: fusion strategies and template security , 2008 .
[28] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[29] Brendan J. Frey,et al. Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.
[30] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[31] Anil K. Jain,et al. On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[32] Stark C. Draper,et al. Feature transformation of biometric templates for secure biometric systems based on error correcting codes , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[33] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.