Privacy protection based on binary fingerprint compression
暂无分享,去创建一个
Sheng Li | Xin Chen | Jiajun Su | Zichi Wang
[1] Munaga V. N. K. Prasad,et al. k-Nearest Neighborhood Structure (k-NNS) based alignment-free method for fingerprint template protection , 2015, 2015 International Conference on Biometrics (ICB).
[2] Anil K. Jain,et al. Biometric Recognition : An Overview , 2012 .
[3] N. Otsu. A threshold selection method from gray level histograms , 1979 .
[4] Xinpeng Zhang,et al. Toward Construction-Based Data Hiding: From Secrets to Fingerprint Images , 2019, IEEE Transactions on Image Processing.
[5] Zhenxing Qian,et al. Key Based Artificial Fingerprint Generation for Privacy Protection , 2020, IEEE Transactions on Dependable and Secure Computing.
[6] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[7] Arun Ross,et al. On Mixing Fingerprints , 2013, IEEE Transactions on Information Forensics and Security.
[8] Jiankun Hu,et al. A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures , 2016, IEEE Transactions on Information Forensics and Security.
[9] Anil K. Jain,et al. Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[10] Alex ChiChung Kot,et al. Fingerprint Combination for Privacy Protection , 2013, IEEE Transactions on Information Forensics and Security.
[11] Xinpeng Zhang,et al. Towards Robust Image Steganography , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Xinpeng Zhang,et al. Flexible Lossy Compression for Selective Encrypted Image With Image Inpainting , 2019, IEEE Transactions on Circuits and Systems for Video Technology.
[13] Davide Maltoni,et al. Noninvertible Minutia Cylinder-Code Representation , 2012, IEEE Transactions on Information Forensics and Security.
[14] Solomon W. Golomb,et al. Run-length encodings (Corresp.) , 1966, IEEE Trans. Inf. Theory.
[15] Chin-Chen Chang,et al. A Novel Joint Data-Hiding and Compression Scheme Based on SMVQ and Image Inpainting , 2014, IEEE Transactions on Image Processing.
[16] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[17] Rohit M. Thanki,et al. Biometric Watermarking Technique Based on CS Theory and Fast Discrete Curvelet Transform for Face and Fingerprint Protection , 2015, SIRS.
[18] M. K. Haldar,et al. Cancelable iris Biometrics based on data hiding schemes , 2016, 2016 IEEE Student Conference on Research and Development (SCOReD).
[19] Zhe Jin,et al. Fingerprint template protection with minutiae-based bit-string for security and privacy preserving , 2012, Expert Syst. Appl..
[20] Davide Maltoni,et al. A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).