BEAT – biometrics evaluation and testing
暂无分享,去创建一个
[1] Vladimir Kolesnikov,et al. Improved Garbled Circuit: Free XOR Gates and Applications , 2008, ICALP.
[2] Mauro Barni,et al. eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.
[3] Benny Pinkas,et al. Secure Hamming Distance Based Computation and Its Applications , 2009, ACNS.
[4] George W. Quinn,et al. Report on the Evaluation of 2D Still-Image Face Recognition Algorithms , 2011 .
[5] Claus Vielhauer,et al. Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.
[6] Ivan Damgård,et al. Homomorphic encryption and secure comparison , 2008, Int. J. Appl. Cryptogr..
[7] Lars Nolle,et al. Towards a Best Linear Combination for Multimodal Biometric Fusion , 2010, 2010 20th International Conference on Pattern Recognition.
[8] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[9] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[10] Josef Kittler,et al. Extracting discriminative information from cohort models , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[11] Julien Bringer,et al. Fuzzy Vault for Multiple Users , 2012, AFRICACRYPT.
[12] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[13] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[14] Haiping Lu,et al. Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.
[15] Christophe Rosenberger,et al. How to Evaluate Transformation Based Cancelable Biometric Systems , 2012 .
[16] Chun Chen,et al. Binary Biometric Representation through Pairwise Polar Quantization , 2009, ICB.
[17] Ahmad-Reza Sadeghi,et al. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima , 2009, IACR Cryptol. ePrint Arch..
[18] E. Parzen. On Estimation of a Probability Density Function and Mode , 1962 .
[19] Cagatay Karabat,et al. Error-Correcting Output Codes Guided Quantization for Biometric Hashing , 2012, IEICE Trans. Inf. Syst..
[20] Andy Harter,et al. Parameterisation of a stochastic model for human face identification , 1994, Proceedings of 1994 IEEE Workshop on Applications of Computer Vision.
[21] Terence Sim,et al. The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[22] David J. Kriegman,et al. From few to many: generative models for recognition under variable pose and illumination , 2000, Proceedings Fourth IEEE International Conference on Automatic Face and Gesture Recognition (Cat. No. PR00580).
[23] K.W. Bowyer,et al. All Iris Code Bits are Not Created Equal , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[24] Miguel Angel Ferrer-Ballester,et al. A novel hand reconstruction approach and its application to vulnerability assessment , 2014, Inf. Sci..
[25] Wen Gao,et al. Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition , 2005, Tenth IEEE International Conference on Computer Vision (ICCV'05) Volume 1.
[26] Margarita Osadchy,et al. Illumination invariant representation for privacy preserving face identification , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.
[27] Samy Bengio,et al. User authentication via adapted statistical models of face images , 2006, IEEE Transactions on Signal Processing.
[28] Anil K. Jain,et al. Biometric Systems: Technology, Design and Performance Evaluation , 2004 .
[29] Cagatay Karabat,et al. Information theoretic capacity analysis for biometric hashing methods , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).
[30] Matti Pietikäinen,et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[31] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[32] Stephanie Schuckers,et al. Multimodal fusion vulnerability to non-zero effort (spoof) imposters , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[33] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[34] Julien Bringer,et al. SHADE: Secure HAmming DistancE Computation from Oblivious Transfer , 2013, Financial Cryptography Workshops.
[35] Manuel Blum,et al. An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information , 1985, CRYPTO.
[36] Pong C. Yuen,et al. A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.
[37] David Zhang,et al. An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.
[38] P. Jonathon Phillips,et al. Evaluation Methods in Face Recognition , 2011, Handbook of Face Recognition.
[39] John Daugman. How iris recognition works , 2004 .
[40] Benny Pinkas,et al. Secure Two-Party Computation is Practical , 2009, IACR Cryptol. ePrint Arch..
[41] Javier Garrido Salas,et al. BiosecurID: a multimodal biometric database , 2009, Pattern Analysis and Applications.
[42] Julian Fiérrez,et al. Biosec baseline corpus: A multimodal biometric database , 2007, Pattern Recognit..
[43] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[44] Arun Ross,et al. Score normalization in multimodal biometric systems , 2005, Pattern Recognit..
[45] Julien Bringer,et al. An Authentication Protocol with Encrypted Biometric Data , 2008, AFRICACRYPT.
[46] Yehuda Lindell,et al. A Proof of Security of Yao’s Protocol for Two-Party Computation , 2009, Journal of Cryptology.
[47] Josef Kittler,et al. On using error bounds to optimize cost-sensitive multimodal biometric authentication , 2008, 2008 19th International Conference on Pattern Recognition.
[48] Arun Ross,et al. Generating Synthetic Irises by Feature Agglomeration , 2006, 2006 International Conference on Image Processing.
[49] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[50] Luís A. Alexandre,et al. The UBIRIS.v2: A Database of Visible Wavelength Iris Images Captured On-the-Move and At-a-Distance , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[51] Sabih H. Gerez,et al. Fingerprint matching by thin-plate spline modelling of elastic deformations , 2003, Pattern Recognit..
[52] Bruce A. Draper,et al. Overview of the Multiple Biometrics Grand Challenge , 2009, ICB.
[53] Patrick J. Flynn,et al. Preliminary Face Recognition Grand Challenge Results , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[54] Koby Crammer,et al. On the Algorithmic Implementation of Multiclass Kernel-based Vector Machines , 2002, J. Mach. Learn. Res..
[55] Norbert Krüger,et al. Face Recognition by Elastic Bunch Graph Matching , 1997, IEEE Trans. Pattern Anal. Mach. Intell..
[56] Jana Dittmann,et al. Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction , 2010, Communications and Multimedia Security.
[57] Josef Kittler,et al. A Unified Framework for Biometric Expert Fusion Incorporating Quality Measures , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[58] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[59] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[60] Rabia Jafri,et al. A Survey of Face Recognition Techniques , 2009, J. Inf. Process. Syst..
[61] Rolf Ingold,et al. MYIDEA - MULTIMODAL BIOMETRICS DATABASE, DESCRIPTION OF ACQUISITION PROTOCOLS , 2005 .
[62] Neil Yager,et al. Worms, Chameleons, Phantoms and Doves: New Additions to the Biometric Menagerie , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
[63] Jonathan Warrell,et al. Tied Factor Analysis for Face Recognition across Large Pose Differences , 2008, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[64] Tal Hassner,et al. The One-Shot similarity kernel , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[65] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[66] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[67] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[68] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[69] Arjan Kuijper,et al. Quantifying privacy and security of biometric fuzzy commitment , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[70] Anil K. Jain,et al. Goal-Directed Evaluation of Binarization Methods , 1995, IEEE Trans. Pattern Anal. Mach. Intell..
[71] George W. Quinn,et al. IREX I: Performance of Iris Recognition Algorithms on Standard Images | NIST , 2009 .
[72] Anoop M. Namboodiri,et al. Secure hamming distance based biometric authentication , 2013, 2013 International Conference on Biometrics (ICB).
[73] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.
[74] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[75] Sébastien Marcel,et al. Inter-session variability modelling and joint factor analysis for face authentication , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[76] Albert Ali Salah,et al. Benchmarking Quality-Dependent and Cost-Sensitive Score-Level Multimodal Biometric Fusion Algorithms , 2009, IEEE Transactions on Information Forensics and Security.
[77] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[78] Qiang Tang,et al. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.
[79] Frans M. J. Willems,et al. Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[80] Qiang Tang,et al. Extended Private Information Retrieval and Its Application in Biometrics Authentications , 2007, CANS.
[81] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[82] Josef Kittler,et al. Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions , 2010, 2010 20th International Conference on Pattern Recognition.
[83] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[84] Julien Bringer,et al. The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..
[85] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[86] Chi-Ho Chan,et al. An Evaluation of Video-to-Video Face Verification , 2010, IEEE Transactions on Information Forensics and Security.
[87] Dexin Zhang,et al. DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[88] Jonathan Katz,et al. Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets , 2006, CRYPTO.
[89] Julian Fiérrez,et al. Bayesian Hill-Climbing Attack and Its Application to Signature Verification , 2007, ICB.
[90] David Pointcheval,et al. Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries , 1999, ASIACRYPT.
[91] Julien Bringer,et al. A fuzzy sketch with trapdoor , 2006, IEEE Transactions on Information Theory.
[92] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[93] Michael J. Lyons,et al. Coding facial expressions with Gabor wavelets , 1998, Proceedings Third IEEE International Conference on Automatic Face and Gesture Recognition.
[94] Frans M. J. Willems,et al. Secret rate - Privacy leakage in biometric systems , 2009, 2009 IEEE International Symposium on Information Theory.
[95] Yehuda Lindell,et al. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries , 2008, SCN.
[96] Xuebing Zhou,et al. Privacy and Security Assessment of Biometric Template Protection , 2012, it Inf. Technol..
[97] Azriel Rosenfeld,et al. Face recognition: A literature survey , 2003, CSUR.
[98] C. Barral,et al. A Protection Scheme for MOC-Enabled Smart Cards , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[99] Donald Beaver,et al. Precomputing Oblivious Transfer , 1995, CRYPTO.
[100] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[101] Arthur P. Dempster,et al. A Generalization of Bayesian Inference , 1968, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[102] Tanya Ignatenko,et al. Secret-Key Rates and Privacy Leakage in Biometric Systems , 2007 .
[103] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[104] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[105] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[106] Sébastien Marcel,et al. Local binary patterns as an image preprocessing for face authentication , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[107] Josef Kittler,et al. A multimodal biometric test bed for quality-dependent, cost-sensitive and client-specific score-level fusion algorithms , 2010, Pattern Recognit..
[108] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[109] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[110] Adam D. Smith,et al. Maintaining secrecy when information leakage is unavoidable , 2004 .
[111] Matti Pietikäinen,et al. Face Recognition with Local Binary Patterns , 2004, ECCV.
[112] Juan J. Igarza,et al. MCYT baseline corpus: a bimodal biometric database , 2003 .
[113] Cagatay Karabat,et al. A face image hashing method based on optimal linear transform under colored Gaussian noise assumption , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).
[114] Mitsutoshi Himaga,et al. Finger Vein Authentication Technology and Financial Applications , 2008 .
[115] Hyeonjoon Moon,et al. The FERET Evaluation Methodology for Face-Recognition Algorithms , 2000, IEEE Trans. Pattern Anal. Mach. Intell..
[116] David Pointcheval,et al. An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication , 2008, IWSEC.
[117] Cagatay Karabat,et al. Discriminative Projection Selection Based Face Image Hashing , 2012, IEICE Trans. Inf. Syst..
[118] Pramod K. Varshney,et al. Adaptive multimodal biometric fusion algorithm using particle swarm , 2003, SPIE Defense + Commercial Sensing.
[119] A. Stoianov,et al. Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[120] Hyeran Byun,et al. Performance Evaluation of Face Recognition Algorithms on the Asian Face Database, KFDB , 2003, AVBPA.
[121] Samy Bengio,et al. The Expected Performance Curve , 2003, ICML 2003.
[122] Rolf P. Würtz,et al. Face Recognition with Disparity Corrected Gabor Phase Differences , 2012, ICANN.
[123] Pieter H. Hartel,et al. The state of the art in abuse of biometrics , 2005 .
[124] Ee-Chien Chang,et al. Finding the original point set hidden among chaff , 2006, ASIACCS '06.
[125] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[126] Alvin F. Martin,et al. The NIST speaker recognition evaluation program , 2005 .
[127] Matti Pietikäinen,et al. Pixelwise Local Binary Pattern Models of Faces Using Kernel Density Estimation , 2009, ICB.
[128] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[129] Julien Bringer,et al. A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems , 2012, IEEE Transactions on Information Forensics and Security.
[130] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[131] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[132] Andrew Beng Jin Teoh,et al. 2Ns Discretisation of BioPhasor in Cancellable Biometrics , 2007, ICB.
[133] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[134] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[135] Moni Naor,et al. Privacy preserving auctions and mechanism design , 1999, EC '99.
[136] Chi-Ho Chan. Multi-scale local Binary Pattern Histogram for Face Recognition , 2007, ICB.
[137] Sébastien Marcel,et al. MOBIO Database for the ICPR 2010 Face and Speech Competition , 2009 .
[138] Douglas A. Reynolds,et al. Comparison of background normalization methods for text-independent speaker verification , 1997, EUROSPEECH.
[139] Tieniu Tan,et al. Robust Encoding of Local Ordinal Measures: A General Framework of Iris Recognition , 2004, ECCV Workshop BioAW.
[140] Pong C. Yuen,et al. Selection of Distinguish Points for Class Distribution Preserving Transform for Biometric Template Protection , 2007, ICB.
[141] Samy Bengio,et al. Database, protocols and tools for evaluating score-level fusion algorithms in biometric authentication , 2006, Pattern Recognit..
[142] Annette J. Dobson,et al. An introduction to generalized linear models , 1991 .
[143] Bart Preneel,et al. Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[144] Natalia A. Schmid,et al. On Generation and Analysis of Synthetic Iris Images , 2007, IEEE Transactions on Information Forensics and Security.
[145] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[146] Sébastien Marcel,et al. Face Authentication Using Adapted Local Binary Pattern Histograms , 2006, ECCV.
[147] Jiri Matas,et al. XM2VTSDB: The Extended M2VTS Database , 1999 .
[148] Ivan Damgård,et al. Secure Multiparty Computation Goes Live , 2009, Financial Cryptography.
[149] Kuldip K. Paliwal,et al. Fast feature extraction method for robust face verification , 2002 .
[150] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.