Privacy Enhancing Technologies in Biometrics
暂无分享,去创建一个
[1] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[2] Stefan Katzenbeisser,et al. Signal Processing in the Encrypted Domain , 2007 .
[3] Andy Adler,et al. Biometric System Security , 2008 .
[4] Emilio Mordini,et al. Biometrics, Human Body, and Medicine: A Controversial History , 2008 .
[5] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[6] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[7] Mauro Barni,et al. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications , 2007 .
[8] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[9] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[11] Andrew Teoh Beng Jin,et al. High security Iris verification system based on random secret integration , 2006 .
[12] J. Ortega-Garcia,et al. Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[13] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[14] Chong Lee Ying,et al. Probabilistic random projections and speaker verification , 2007 .
[15] John D. Woodward. The Law and the Use of Biometrics , 2008 .
[16] Ingrid Verbauwhede,et al. Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[17] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[18] Julian Fiérrez,et al. Biometric Hashing Based on Genetic Selection and Its Application to On-Line Signatures , 2007, ICB.
[19] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[20] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[21] Julian Fierrez,et al. On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction , 2007 .
[22] Jongsun Kim,et al. Changeable Face Representations Suitable for Human Recognition , 2007, ICB.
[23] Yongjin Wang,et al. Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.
[24] Berk Gökberk,et al. "3D Face": Biometric Template Protection for 3D Face Recognition , 2007, ICB.
[25] Yair Frankel,et al. On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .
[26] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[27] Julian Fiérrez,et al. Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[28] Marcos Faundez-Zanuy. Privacy Issues on Biometric Systems , 2005 .
[29] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[30] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[31] Ralf Steinmetz,et al. Handwriting: Feature Correlation Analysis for Biometric Hashes , 2004, EURASIP J. Adv. Signal Process..
[32] Pong C. Yuen,et al. Protecting Face Biometric Data on Smartcard with Reed-Solomon Code , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[33] KyungHee Lee,et al. Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features , 2007, HCI.
[34] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[35] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[36] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[37] J. Fierrez-Aguilar,et al. Cryptographic key generation using handwritten signature , 2006, SPIE Defense + Commercial Sensing.
[38] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[39] Dimitrios Hatzinakos,et al. Data hiding for multimodal biometric recognition , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[40] Andrew Beng Jin Teoh,et al. Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[41] B. V. K. Vijaya Kumar,et al. Hiding phase-quantized biometrics: a case of steganography for reduced-complexity correlation filter classifiers , 2005, IS&T/SPIE Electronic Imaging.
[42] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[43] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[44] Daniel Willem Elisabeth Schobben,et al. Privacy-protected biometric templates: acoustic ear identification , 2004, SPIE Defense + Commercial Sensing.
[45] Alessandro Neri,et al. User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.
[46] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[47] Ee-Chien Chang,et al. Finding the original point set hidden among chaff , 2006, ASIACCS '06.
[48] Sharath Pankanti,et al. Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.
[49] Alessandro Neri,et al. Adaptive and distributed cryptography for signature biometrics protection , 2007, Electronic Imaging.
[50] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[51] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[52] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[53] Richa Singh,et al. Digital watermarking based secure multimodal biometric system , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[54] Alessandro Neri,et al. Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[55] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[56] Anil K. Jain,et al. Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.
[57] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[58] Alessandro Neri,et al. Multi-level signature based biometric authentication using watermarking , 2007, SPIE Defense + Commercial Sensing.
[59] Marcos Faundez-Zanuy. Technological evaluation of two AFIS systems , 2005, IEEE Aerospace and Electronic Systems Magazine.
[60] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[61] Nalini K. Ratha,et al. Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.
[62] Sharath Pankanti,et al. Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..
[63] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[64] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[65] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[66] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[67] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[68] P. Campisi,et al. Biometric Signature Authentication Using Radon Transform-Based Watermarking Techniques , 2007, 2007 Biometrics Symposium.