FE-SViT
暂无分享,去创建一个
[1] O. Khan,et al. ACM Transactions on Embedded Computing Systems continued on back cover , 2018 .
[2] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[3] Jiankun Hu,et al. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system , 2011, 2011 6th IEEE Conference on Industrial Electronics and Applications.
[4] Boris Skoric,et al. Key Extraction From General Nondiscrete Signals , 2010, IEEE Transactions on Information Forensics and Security.
[5] Xudong Jiang,et al. Fingerprint minutiae matching based on the local and global structures , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[6] Jiankun Hu,et al. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach , 2012, Pattern Recognit..
[7] Marina Blanton,et al. On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting , 2012, IACR Cryptol. ePrint Arch..
[8] Jiankun Hu,et al. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures , 2014, Pattern Recognit..
[9] Jiankun Hu,et al. A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement , 2014, IEEE Transactions on Information Forensics and Security.
[10] Jiankun Hu,et al. Dual Layer Structure Check (DLSC) fingerprint verification scheme designed for biometric mobile template protection , 2009, 2009 4th IEEE Conference on Industrial Electronics and Applications.
[11] Govinda R. Poudel,et al. The multi-modal Australian ScienceS Imaging and Visualization Environment (MASSIVE) high performance computing infrastructure: applications in neuroscience and neuroinformatics research , 2014, Front. Neuroinform..
[12] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[13] Peng Li,et al. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..
[14] Shaogang Gong,et al. Audio- and Video-based Biometric Person Authentication , 1997, Lecture Notes in Computer Science.
[15] Bir Bhanu,et al. Fingerprint Indexing Based on Novel Features of Minutiae Triplets , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[16] Jiankun Hu,et al. Pair-polar coordinate-based cancelable fingerprint templates , 2011, Pattern Recognit..
[17] Emanuele Maiorana,et al. Secure Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography , 2007 .
[18] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[19] Peng Li,et al. An effective biometric cryptosystem combining fingerprints with error correction codes , 2012, Expert Syst. Appl..
[20] Pieter H. Hartel,et al. Constructing practical Fuzzy Extractors using QIM , 2007 .
[21] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[22] Jiankun Hu,et al. An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm , 2011, 2011 6th IEEE Conference on Industrial Electronics and Applications.
[23] Jiankun Hu,et al. A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[24] Jiankun Hu,et al. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment , 2011, Secur. Commun. Networks.
[25] Kathy J. Horadam,et al. Fuzzy Extractors for Minutiae-Based Fingerprint Authentication , 2007, ICB.
[26] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[27] Luis Hernández Encinas,et al. A crypto-biometric scheme based on iris-templates with fuzzy extractors , 2012, Inf. Sci..
[28] J. Jeffers,et al. Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[29] Peng Li,et al. A key binding system based on n-nearest minutiae structure of fingerprint , 2011, Pattern Recognit. Lett..
[30] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[31] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[32] Weiwei Zhang,et al. Core-based structure matching algorithm of fingerprint verification , 2002, Object recognition supported by user interaction for service robots.
[33] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[34] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[35] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[36] Cagatay Karabat,et al. Biohashing with fingerprint spectral minutiae , 2013, 2013 International Conference of the BIOSIG Special Interest Group (BIOSIG).
[37] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[38] V Evelyn Brindha,et al. Multi-Modal Biometric Template Security: Fingerprint and Palmprint Based Fuzzy Vault , 2012 .