Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization
暂无分享,去创建一个
[1] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[4] Tsuhan Chen,et al. Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[5] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[6] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[7] Ralf Steinmetz,et al. Handwriting: Feature Correlation Analysis for Biometric Hashes , 2004, EURASIP J. Adv. Signal Process..
[8] J.C. Martinez,et al. A low-cost system for signature recognition , 1999, 42nd Midwest Symposium on Circuits and Systems (Cat. No.99CH36356).
[9] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[10] D. Z. Lejtman,et al. On-line handwritten signature verification using wavelets and back-propagation neural networks , 2001, Proceedings of Sixth International Conference on Document Analysis and Recognition.
[11] Yutaka Fukui,et al. On-line signature verification method utilizing feature extraction based on DWT , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[12] Andrew Beng Jin Teoh,et al. Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[13] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[14] K. Zimmermann,et al. Signature recognition through spectral analysis , 1987, ICASSP '87. IEEE International Conference on Acoustics, Speech, and Signal Processing.
[15] Andrew Beng Jin Teoh,et al. Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures , 2006, ICB.
[16] Hao Feng,et al. Online signature verification using a new extreme points warping technique , 2003, Pattern Recognit. Lett..
[17] Berrin A. Yanikoglu,et al. Biometric Authentication Using Online Signatures , 2004, ISCIS.
[18] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[19] Hong Chang,et al. SVC2004: First International Signature Verification Competition , 2004, ICBA.
[20] Hong-Yuan Mark Liao,et al. Wavelet-Based Off-Line Handwritten Signature Verification , 1999, Comput. Vis. Image Underst..
[21] Kun Liu,et al. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining , 2006, IEEE Transactions on Knowledge and Data Engineering.
[22] Andréa Vergara da Silva,et al. Wavelet-Based Compared to Function-Based On-Line Signature Verification , 2002, SIBGRAPI.
[23] Trevor Hastie,et al. A model for signature verification , 1991, Conference Proceedings 1991 IEEE International Conference on Systems, Man, and Cybernetics.
[24] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..