Multibiometric Cryptosystems Based on Feature-Level Fusion
暂无分享,去创建一个
[1] Anton H. M. Akkermans,et al. Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[2] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[3] Pietro Perona,et al. A Bayesian hierarchical model for learning natural scene categories , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[4] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[5] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[6] Patrizio Campisi,et al. Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.
[7] Anil K. Jain,et al. On-line fingerprint verification , 1996, Proceedings of 13th International Conference on Pattern Recognition.
[8] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[9] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[11] Elwyn R. Berlekamp,et al. Algebraic coding theory , 1984, McGraw-Hill series in systems science.
[12] Raymond N. J. Veldhuis,et al. Spectral minutiae: A fixed-length representation of a minutiae set , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[13] Nasir D. Memon,et al. Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[14] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[15] J. I. Hall,et al. Notes on Coding Theory , 2003 .
[16] Ingrid Verbauwhede,et al. Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[17] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[18] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[19] Nalini K. Ratha,et al. Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[20] Rainer Plaga,et al. Biometric keys: suitable use cases and achievable information content , 2009, International Journal of Information Security.
[21] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[22] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[23] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[24] Bo Fu,et al. Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.
[25] John Daugman,et al. Recognising persons by their iris patterns , 2004, Defense + Commercial Sensing.
[26] Anthony Vetro,et al. Privacy and security of features extracted from minutiae aggregates , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[27] Douglas L. T. Rohde,et al. Methods for Binary Multidimensional Scaling , 2002, Neural Computation.
[28] J. Fierrez-Aguilar,et al. Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.
[29] Stelvio Cimato,et al. Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[30] C. Busch,et al. Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[31] Pong C. Yuen,et al. Protecting Face Biometric Data on Smartcard with Reed-Solomon Code , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[32] Chengfang Fang,et al. Secure Sketch for Multiple Secrets , 2010, ACNS.
[33] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[34] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[35] Chun Chen,et al. Biometric Quantization through Detection Rate Optimized Bit Allocation , 2009, EURASIP J. Adv. Signal Process..
[36] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[37] T.E. Boult,et al. Bio-cryptographic protocols with bipartite biotokens , 2008, 2008 Biometrics Symposium.
[38] Alexandr Andoni,et al. Near-Optimal Hashing Algorithms for Approximate Nearest Neighbor in High Dimensions , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[39] Anil K. Jain,et al. On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[40] Ee-Chien Chang,et al. Finding the original point set hidden among chaff , 2006, ASIACCS '06.
[41] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[42] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[43] Venu Govindaraju,et al. Robustness of multimodal biometric fusion methods against spoof attacks , 2009, J. Vis. Lang. Comput..
[44] Chun Chen,et al. Binary Biometric Representation through Pairwise Polar Quantization , 2009, ICB.
[45] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[46] Andrew Beng Jin Teoh,et al. 2Ns Discretisation of BioPhasor in Cancellable Biometrics , 2007, ICB.