A robust embedded biometric authentication system based on fingerprint and chaotic encryption
暂无分享,去创建一个
Miguel Angel Murillo-Escobar | César Cruz-Hernández | M. A. Murillo-Escobar | Fausto Abundiz-Pérez | Rosa Martha López-Gutiérrez | C. Cruz-Hernández | R. López-Gutiérrez | F. Abundiz-Pérez | R. López-gutiérrez
[1] Alfred Menezes,et al. Handbook Of Applied Cryptography Crc Press , 2015 .
[2] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[3] L M Adleman,et al. Molecular computation of solutions to combinatorial problems. , 1994, Science.
[4] E. Canto,et al. Embedded security: New trends in personal recognition systems , 2007, 2007 Ph.D Research in Microelectronics and Electronics Conference.
[5] Lei Qin,et al. Asymmetric encryption and signature method with DNA technology , 2010, Science China Information Sciences.
[6] Olcay Taner Yildiz,et al. Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.
[7] Christoph Busch,et al. A Reference Framework for the Privacy Assessment of Keyless Biometric Template Protection Systems , 2010, BIOSIG.
[8] Milan Adamek,et al. Security of biometric systems , 2015 .
[9] Zhe Jin,et al. Fingerprint template protection with minutiae-based bit-string for security and privacy preserving , 2012, Expert Syst. Appl..
[10] Jia-Hong Dai,et al. An embedded fingerprint authentication system with reduced hardware resources requirement , 2005, Proceedings of the Ninth International Symposium on Consumer Electronics, 2005. (ISCE 2005)..
[11] Rui Liu,et al. Chaos-based fingerprint images encryption using symmetric cryptography , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.
[12] Monica Borda,et al. DNA secret writing techniques , 2010, 2010 8th International Conference on Communications.
[13] Safya Belghith,et al. Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .
[14] Guozhen Xiao,et al. New field of cryptography: DNA cryptography , 2006 .
[15] Muhammad Khurram Khan,et al. Securing Biometric Templates for Reliable Identity Authentication , 2005, ICIC.
[16] Yansheng Li,et al. A multilevel fingerprinting method for FPGA IP protection , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).
[17] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[18] Niels Ferguson,et al. A Simple Algebraic Representation of Rijndael , 2001, Selected Areas in Cryptography.
[19] S. Li,et al. Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption , 2009 .
[20] Wang Xiaomin,et al. Chaos-based biometrics template protection and secure authentication , 2011 .
[21] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[22] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[23] Xinghuo Yu,et al. Fingerprint images encryption via multi-scroll chaotic attractors , 2007, Appl. Math. Comput..
[24] Lei Tian,et al. Chaotic secure content-based hidden transmission of biometric templates , 2007 .
[25] E. Solak,et al. Cryptanalysis of a chaos-based image encryption algorithm , 2009 .
[26] Hisham Al-Assam,et al. A lightweight approach for biometric template protection , 2009, Defense + Commercial Sensing.
[27] Gonzalo Álvarez,et al. Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.
[28] R. M. López-Gutiérrez,et al. A RGB image encryption algorithm based on total plain image characteristics and chaos , 2015, Signal Process..
[29] Gonzalo Alvarez,et al. On the inadequacy of the logistic map for cryptographic applications , 2008 .
[30] Sunil Kumar,et al. Encryption of Biometric Templates using One Time Biometric Transform , 2009 .
[31] Hung-I Hsiao,et al. Fingerprint image cryptography based on multiple chaotic systems , 2015, Signal Process..
[32] Hengjian Li,et al. A High Performance and Secure Palmprint Template Protection Scheme , 2012, J. Softw..
[33] S. Li,et al. Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.
[34] Sanaa Ghouzali,et al. Fingerprint shell: Secure representation of fingerprint template , 2014, Pattern Recognit. Lett..
[35] Qiang Zhang,et al. A Summarization on Image Encryption , 2010 .
[36] X. Liao,et al. Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map , 2007 .
[37] Azizah Abdul Manaf,et al. Data Hiding Method Based on DNA Basic Characteristics , 2011, DEIS.
[38] Gaurav Bhatnagar,et al. A novel chaos-based secure transmission of biometric data , 2015, Neurocomputing.
[39] Andrew Beng Jin Teoh,et al. Biometric cryptosystem based on discretized fingerprint texture descriptors , 2013, Expert Syst. Appl..
[40] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[41] Muhammad Khurram Khan,et al. Protecting Biometric Data for Personal Identification , 2004, SINOBIOMETRICS.
[42] Zhang Jia-shu,et al. A novel chaotic stream cipher and its application to palmprint template protection , 2010 .
[43] Marius Iulian Mihailescu,et al. New Enrollment Scheme for Biometric Template Using Hash Chaos-based Cryptography , 2014 .
[44] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[45] Akira Otsuka,et al. Relations among security metrics for template protection algorithms , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[46] Hengjian Li,et al. A Secure and Efficient Fingerprint Images Encryption Scheme , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[47] Andrew Beng Jin Teoh,et al. Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.
[48] Munaga V. N. K. Prasad,et al. Fingerprint template protection using multiline neighboring relation , 2014, Expert Syst. Appl..
[49] Sanjeev Sofat,et al. Template and Database Security in Biometrics Systems: A Challenging Task , 2010 .
[50] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[51] Vincenzo Conti,et al. A Novel Embedded Fingerprints Authentication System Based on Singularity Points , 2008, 2008 International Conference on Complex, Intelligent and Software Intensive Systems.
[52] Sanaa Ghouzali,et al. Private chaotic biometric template protection algorithm , 2013, 2013 IEEE Second International Conference on Image Information Processing (ICIIP-2013).
[53] Ee-Chien Chang,et al. Robust Extraction of Secret Bits from Minutiae , 2007, ICB.
[54] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[55] Deepak Ranjan Nayak. A Novel Architecture for Embedded Biometric Authentication System , 2008, 2008 Second UKSIM European Symposium on Computer Modeling and Simulation.
[56] Kathy J. Horadam,et al. Fuzzy Extractors for Minutiae-Based Fingerprint Authentication , 2007, ICB.
[57] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[58] Robert M. May,et al. Simple mathematical models with very complicated dynamics , 1976, Nature.
[59] Gaurav Bhatnagar,et al. Chaos-Based Security Solution for Fingerprint Data During Communication and Transmission , 2012, IEEE Transactions on Instrumentation and Measurement.
[60] Loris Nanni,et al. State of the art in Biometrics , 2011 .
[61] Delong Cui. A Novel Fingerprint Encryption Algorithm Based on Chaotic System and Fractional Fourier Transform , 2010, 2010 International Conference on Machine Vision and Human-machine Interface.
[62] Dongju Li,et al. A novel SOC architecture embedded bit serial FPGA , 2004, The 2004 IEEE Asia-Pacific Conference on Circuits and Systems, 2004. Proceedings..
[63] Catherine Taylor Clelland,et al. Hiding messages in DNA microdots , 1999, Nature.
[64] N. Nagaraj,et al. Cryptanalysis of a Chaotic Image Encryption Algorithm , 2008, 0801.0276.
[65] Anil K. Jain,et al. Fingerprint Template Protection: From Theory to Practice , 2013, Security and Privacy in Biometrics.
[66] Wolfgang A. Halang,et al. Cryptanalysis of an image encryption scheme based on a compound chaotic sequence , 2007, Image Vis. Comput..