Review of key-binding-based biometric data protection schemes
暂无分享,去创建一个
Sanjay Kumar Singh | Debanjan Sadhya | Bodhi Chakraborty | S. Singh | Debanjan Sadhya | Bodhi Chakraborty
[1] Peng Li,et al. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..
[2] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[3] M. Sabrigiriraj,et al. Palm and hand vein-based fuzzy vault generation scheme for multibiometric cryptosystem , 2015 .
[4] Raymond N. J. Veldhuis,et al. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.
[5] Helen C. Shen,et al. Personal authentication using hand images , 2006, Pattern Recognit. Lett..
[6] Ann Cavoukian,et al. Keynote Paper: Biometric Encryption: Technology for Strong Authentication, Security and Privacy , 2008 .
[7] Dwijendra K. Ray-Chaudhuri,et al. Binary mixture flow with free energy lattice Boltzmann methods , 2022, arXiv.org.
[8] Kenneth Stephenson,et al. A circle packing algorithm , 2003, Comput. Geom..
[9] Axel Munk,et al. Security Considerations in Minutiae-Based Fuzzy Vaults , 2015, IEEE Transactions on Information Forensics and Security.
[10] John Daugman. How iris recognition works , 2004 .
[11] Jianjiang Feng,et al. Combining minutiae descriptors for fingerprint matching , 2008, Pattern Recognit..
[12] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[13] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[14] Kang Ryoung Park,et al. A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[15] Yajun Ha,et al. Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints , 2015, IET Biom..
[16] Lifang Wu,et al. A Fuzzy Vault Scheme for Ordered Biometrics , 2011, J. Commun..
[17] Farid Benhammadi,et al. Password hardened fuzzy vault for fingerprint authentication system , 2014, Image Vis. Comput..
[18] Andrew Beng Jin Teoh,et al. Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.
[19] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[20] Patrizio Campisi,et al. Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.
[21] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[22] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[23] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[24] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[25] Anil K. Jain,et al. Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.
[26] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[27] Robert Sabourin,et al. A bio-cryptographic system based on offline signature images , 2014, Inf. Sci..
[28] Anil K. Jain,et al. Latent Palmprint Matching , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[29] Yajun Ha,et al. Improved chaff point generation for vault scheme in bio-cryptosystems , 2013, IET Biom..
[30] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[31] Muhammad N. Marsono,et al. Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm , 2013, Future Gener. Comput. Syst..
[32] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[33] Frans M. J. Willems,et al. Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.