BEAT – biometrics evaluation and testing

Identity management using biometrics is a reality. E-passports incorporate biometric technology, and biometric technology has also become more prevalent on personal computers. Applications that will recognise nomadic users through biometrics are also emerging, as mobile devices are equipped with more sensors.

[1]  Vladimir Kolesnikov,et al.  Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.

[2]  Mauro Barni,et al.  eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.

[3]  Benny Pinkas,et al.  Secure Hamming Distance Based Computation and Its Applications , 2009, ACNS.

[4]  George W. Quinn,et al.  Report on the Evaluation of 2D Still-Image Face Recognition Algorithms , 2011 .

[5]  Claus Vielhauer,et al.  Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.

[6]  Ivan Damgård,et al.  Homomorphic encryption and secure comparison , 2008, Int. J. Appl. Cryptogr..

[7]  Lars Nolle,et al.  Towards a Best Linear Combination for Multimodal Biometric Fusion , 2010, 2010 20th International Conference on Pattern Recognition.

[8]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[9]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[10]  Josef Kittler,et al.  Extracting discriminative information from cohort models , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[11]  Julien Bringer,et al.  Fuzzy Vault for Multiple Users , 2012, AFRICACRYPT.

[12]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[13]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[14]  Haiping Lu,et al.  Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.

[15]  Christophe Rosenberger,et al.  How to Evaluate Transformation Based Cancelable Biometric Systems , 2012 .

[16]  Chun Chen,et al.  Binary Biometric Representation through Pairwise Polar Quantization , 2009, ICB.

[17]  Ahmad-Reza Sadeghi,et al.  Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..

[18]  E. Parzen On Estimation of a Probability Density Function and Mode , 1962 .

[19]  Cagatay Karabat,et al.  Error-Correcting Output Codes Guided Quantization for Biometric Hashing , 2012, IEICE Trans. Inf. Syst..

[20]  Andy Harter,et al.  Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.

[21]  Terence Sim,et al.  The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[22]  David J. Kriegman,et al.  From few to many: generative models for recognition under variable pose and illumination , 2000, Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580).

[23]  K.W. Bowyer,et al.  All Iris Code Bits are Not Created Equal , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[24]  Miguel Angel Ferrer-Ballester,et al.  A novel hand reconstruction approach and its application to vulnerability assessment , 2014, Inf. Sci..

[25]  Wen Gao,et al.  Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.

[26]  Margarita Osadchy,et al.  Illumination invariant representation for privacy preserving face identification , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.

[27]  Samy Bengio,et al.  User authentication via adapted statistical models of face images , 2006, IEEE Transactions on Signal Processing.

[28]  Anil K. Jain,et al.  Biometric Systems: Technology, Design and Performance Evaluation , 2004 .

[29]  Cagatay Karabat,et al.  Information theoretic capacity analysis for biometric hashing methods , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).

[30]  Matti Pietikäinen,et al.  Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..

[31]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[32]  Stephanie Schuckers,et al.  Multimodal fusion vulnerability to non-zero effort (spoof) imposters , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[33]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[34]  Julien Bringer,et al.  SHADE: Secure HAmming DistancE Computation from Oblivious Transfer , 2013, Financial Cryptography Workshops.

[35]  Manuel Blum,et al.  An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information , 1985, CRYPTO.

[36]  Pong C. Yuen,et al.  A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.

[37]  David Zhang,et al.  An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.

[38]  P. Jonathon Phillips,et al.  Evaluation Methods in Face Recognition , 2011, Handbook of Face Recognition.

[39]  John Daugman How iris recognition works , 2004 .

[40]  Benny Pinkas,et al.  Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..

[41]  Javier Garrido Salas,et al.  BiosecurID: a multimodal biometric database , 2009, Pattern Analysis and Applications.

[42]  Julian Fiérrez,et al.  Biosec baseline corpus: A multimodal biometric database , 2007, Pattern Recognit..

[43]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[44]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[45]  Julien Bringer,et al.  An Authentication Protocol with Encrypted Biometric Data , 2008, AFRICACRYPT.

[46]  Yehuda Lindell,et al.  A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.

[47]  Josef Kittler,et al.  On using error bounds to optimize cost-sensitive multimodal biometric authentication , 2008, 2008 19th International Conference on Pattern Recognition.

[48]  Arun Ross,et al.  Generating Synthetic Irises by Feature Agglomeration , 2006, 2006 International Conference on Image Processing.

[49]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[50]  Luís A. Alexandre,et al.  The UBIRIS.v2: A Database of Visible Wavelength Iris Images Captured On-the-Move and At-a-Distance , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[51]  Sabih H. Gerez,et al.  Fingerprint matching by thin-plate spline modelling of elastic deformations , 2003, Pattern Recognit..

[52]  Bruce A. Draper,et al.  Overview of the Multiple Biometrics Grand Challenge , 2009, ICB.

[53]  Patrick J. Flynn,et al.  Preliminary Face Recognition Grand Challenge Results , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[54]  Koby Crammer,et al.  On the Algorithmic Implementation of Multiclass Kernel-based Vector Machines , 2002, J. Mach. Learn. Res..

[55]  Norbert Krüger,et al.  Face Recognition by Elastic Bunch Graph Matching , 1997, IEEE Trans. Pattern Anal. Mach. Intell..

[56]  Jana Dittmann,et al.  Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction , 2010, Communications and Multimedia Security.

[57]  Josef Kittler,et al.  A Unified Framework for Biometric Expert Fusion Incorporating Quality Measures , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[58]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[59]  Ahmad-Reza Sadeghi,et al.  TASTY: tool for automating secure two-party computations , 2010, CCS '10.

[60]  Rabia Jafri,et al.  A Survey of Face Recognition Techniques , 2009, J. Inf. Process. Syst..

[61]  Rolf Ingold,et al.  MYIDEA - MULTIMODAL BIOMETRICS DATABASE, DESCRIPTION OF ACQUISITION PROTOCOLS , 2005 .

[62]  Neil Yager,et al.  Worms, Chameleons, Phantoms and Doves: New Additions to the Biometric Menagerie , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[63]  Jonathan Warrell,et al.  Tied Factor Analysis for Face Recognition across Large Pose Differences , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[64]  Tal Hassner,et al.  The One-Shot similarity kernel , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[65]  Yehuda Lindell,et al.  Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..

[66]  Rafail Ostrovsky,et al.  Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.

[67]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[68]  Marwan Mattar,et al.  Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .

[69]  Arjan Kuijper,et al.  Quantifying privacy and security of biometric fuzzy commitment , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[70]  Anil K. Jain,et al.  Goal-Directed Evaluation of Binarization Methods , 1995, IEEE Trans. Pattern Anal. Mach. Intell..

[71]  George W. Quinn,et al.  IREX I: Performance of Iris Recognition Algorithms on Standard Images | NIST , 2009 .

[72]  Anoop M. Namboodiri,et al.  Secure hamming distance based biometric authentication , 2013, 2013 International Conference on Biometrics (ICB).

[73]  Pim Tuyls,et al.  Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.

[74]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[75]  Sébastien Marcel,et al.  Inter-session variability modelling and joint factor analysis for face authentication , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[76]  Albert Ali Salah,et al.  Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal Biometric Fusion Algorithms , 2009, IEEE Transactions on Information Forensics and Security.

[77]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[78]  Qiang Tang,et al.  An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.

[79]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[80]  Qiang Tang,et al.  Extended Private Information Retrieval and Its Application in Biometrics Authentications , 2007, CANS.

[81]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[82]  Josef Kittler,et al.  Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions , 2010, 2010 20th International Conference on Pattern Recognition.

[83]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[84]  Julien Bringer,et al.  The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..

[85]  Oded Goldreich,et al.  A randomized protocol for signing contracts , 1985, CACM.

[86]  Chi-Ho Chan,et al.  An Evaluation of Video-to-Video Face Verification , 2010, IEEE Transactions on Information Forensics and Security.

[87]  Dexin Zhang,et al.  DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[88]  Jonathan Katz,et al.  Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets , 2006, CRYPTO.

[89]  Julian Fiérrez,et al.  Bayesian Hill-Climbing Attack and Its Application to Signature Verification , 2007, ICB.

[90]  David Pointcheval,et al.  Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.

[91]  Julien Bringer,et al.  A fuzzy sketch with trapdoor , 2006, IEEE Transactions on Information Theory.

[92]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[93]  Michael J. Lyons,et al.  Coding facial expressions with Gabor wavelets , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.

[94]  Frans M. J. Willems,et al.  Secret rate - Privacy leakage in biometric systems , 2009, 2009 IEEE International Symposium on Information Theory.

[95]  Yehuda Lindell,et al.  Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.

[96]  Xuebing Zhou,et al.  Privacy and Security Assessment of Biometric Template Protection , 2012, it Inf. Technol..

[97]  Azriel Rosenfeld,et al.  Face recognition: A literature survey , 2003, CSUR.

[98]  C. Barral,et al.  A Protection Scheme for MOC-Enabled Smart Cards , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[99]  Donald Beaver,et al.  Precomputing Oblivious Transfer , 1995, CRYPTO.

[100]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[101]  Arthur P. Dempster,et al.  A Generalization of Bayesian Inference , 1968, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[102]  Tanya Ignatenko,et al.  Secret-Key Rates and Privacy Leakage in Biometric Systems , 2007 .

[103]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[104]  Ivan Damgård,et al.  A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.

[105]  Berrin A. Yanikoglu,et al.  Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.

[106]  Sébastien Marcel,et al.  Local binary patterns as an image preprocessing for face authentication , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[107]  Josef Kittler,et al.  A multimodal biometric test bed for quality-dependent, cost-sensitive and client-specific score-level fusion algorithms , 2010, Pattern Recognit..

[108]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[109]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[110]  Adam D. Smith,et al.  Maintaining secrecy when information leakage is unavoidable , 2004 .

[111]  Matti Pietikäinen,et al.  Face Recognition with Local Binary Patterns , 2004, ECCV.

[112]  Juan J. Igarza,et al.  MCYT baseline corpus: a bimodal biometric database , 2003 .

[113]  Cagatay Karabat,et al.  A face image hashing method based on optimal linear transform under colored Gaussian noise assumption , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).

[114]  Mitsutoshi Himaga,et al.  Finger Vein Authentication Technology and Financial Applications , 2008 .

[115]  Hyeonjoon Moon,et al.  The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[116]  David Pointcheval,et al.  An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication , 2008, IWSEC.

[117]  Cagatay Karabat,et al.  Discriminative Projection Selection Based Face Image Hashing , 2012, IEICE Trans. Inf. Syst..

[118]  Pramod K. Varshney,et al.  Adaptive multimodal biometric fusion algorithm using particle swarm , 2003, SPIE Defense + Commercial Sensing.

[119]  A. Stoianov,et al.  Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[120]  Hyeran Byun,et al.  Performance Evaluation of Face Recognition Algorithms on the Asian Face Database, KFDB , 2003, AVBPA.

[121]  Samy Bengio,et al.  The Expected Performance Curve , 2003, ICML 2003.

[122]  Rolf P. Würtz,et al.  Face Recognition with Disparity Corrected Gabor Phase Differences , 2012, ICANN.

[123]  Pieter H. Hartel,et al.  The state of the art in abuse of biometrics , 2005 .

[124]  Ee-Chien Chang,et al.  Finding the original point set hidden among chaff , 2006, ASIACCS '06.

[125]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[126]  Alvin F. Martin,et al.  The NIST speaker recognition evaluation program , 2005 .

[127]  Matti Pietikäinen,et al.  Pixelwise Local Binary Pattern Models of Faces Using Kernel Density Estimation , 2009, ICB.

[128]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[129]  Julien Bringer,et al.  A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems , 2012, IEEE Transactions on Information Forensics and Security.

[130]  Jonathan Katz,et al.  Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.

[131]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[132]  Andrew Beng Jin Teoh,et al.  2Ns Discretisation of BioPhasor in Cancellable Biometrics , 2007, ICB.

[133]  Bart Preneel,et al.  Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[134]  T. Elgamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.

[135]  Moni Naor,et al.  Privacy preserving auctions and mechanism design , 1999, EC '99.

[136]  Chi-Ho Chan Multi-scale local Binary Pattern Histogram for Face Recognition , 2007, ICB.

[137]  Sébastien Marcel,et al.  MOBIO Database for the ICPR 2010 Face and Speech Competition , 2009 .

[138]  Douglas A. Reynolds,et al.  Comparison of background normalization methods for text-independent speaker verification , 1997, EUROSPEECH.

[139]  Tieniu Tan,et al.  Robust Encoding of Local Ordinal Measures: A General Framework of Iris Recognition , 2004, ECCV Workshop BioAW.

[140]  Pong C. Yuen,et al.  Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection , 2007, ICB.

[141]  Samy Bengio,et al.  Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication , 2006, Pattern Recognit..

[142]  Annette J. Dobson,et al.  An introduction to generalized linear models , 1991 .

[143]  Bart Preneel,et al.  Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[144]  Natalia A. Schmid,et al.  On Generation and Analysis of Synthetic Iris Images , 2007, IEEE Transactions on Information Forensics and Security.

[145]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[146]  Sébastien Marcel,et al.  Face Authentication Using Adapted Local Binary Pattern Histograms , 2006, ECCV.

[147]  Jiri Matas,et al.  XM2VTSDB: The Extended M2VTS Database , 1999 .

[148]  Ivan Damgård,et al.  Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.

[149]  Kuldip K. Paliwal,et al.  Fast feature extraction method for robust face verification , 2002 .

[150]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.