Biometric template security: an overview
暂无分享,去创建一个
[1] Nasir D. Memon,et al. A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.
[2] Stan Z. Li,et al. Near Infrared Face Based Biometric Key Binding , 2009, ICB.
[3] Takeshi Fujino,et al. A stable key generation from PUF responses with a Fuzzy Extractor for cryptographic authentications , 2013, 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE).
[4] Carmen Sánchez Ávila,et al. Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation , 2005, Pattern Recognit..
[5] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Karthik Nandakumar,et al. A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[7] Marina Blanton,et al. On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting , 2011, Proceedings of the International Conference on Security and Cryptography.
[8] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[9] Alessandro Neri,et al. User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.
[10] Ajay Kumar,et al. A palmprint-based cryptosystem using double encryption , 2008, SPIE Defense + Commercial Sensing.
[11] I. R. Babu,et al. Performance of Iris Based Hard Fuzzy Vault , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[12] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[13] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[14] Andreas Uhl,et al. Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.
[15] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[16] Kevin Beaver. Hacking for Dummies , 2004 .
[17] Václav Matyás,et al. Toward Reliable User Authentication through Biometrics , 2003, IEEE Secur. Priv..
[18] Jiankun Hu,et al. An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm , 2011, 2011 6th IEEE Conference on Industrial Electronics and Applications.
[19] Robert Sabourin,et al. An adaptive classification system for video-based face recognition , 2012, Inf. Sci..
[20] Jiankun Hu,et al. A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[21] Hengjian Li,et al. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..
[22] Andreas Uhl,et al. Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).
[23] Yongjin Wang,et al. Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.
[24] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[25] Andrew Beng Jin Teoh,et al. Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..
[26] Andrew Beng Jin Teoh,et al. Application-Specific Key Release Scheme from Biometrics , 2008, Int. J. Netw. Secur..
[27] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[28] Ralf Steinmetz,et al. Biometric applications based on handwriting , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.
[29] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[30] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[31] Andrew Beng Jin Teoh,et al. Biometric hash: high-confidence face recognition , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[32] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[33] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[34] Wanqing Li,et al. Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[35] Ajay Kumar,et al. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..
[36] B. Jayaram,et al. Retinal Biometrics based Authentication and Key Exchange System , 2011 .
[37] Kuldip K. Paliwal,et al. Information fusion for robust speaker verification , 2001, INTERSPEECH.
[38] Andrew Beng Jin Teoh,et al. Iris Authentication Using Privatized Advanced Correlation Filter , 2006, ICB.
[39] Yohei Hori,et al. Cryptographie key generation from PUF data using efficient fuzzy extractors , 2014, 16th International Conference on Advanced Communication Technology.
[40] Tran Khanh Dang,et al. Combining Fuzzy Extractor in Biometric-Kerberos Based Authentication Protocol , 2015, 2015 International Conference on Advanced Computing and Applications (ACOMP).
[41] Lucas Ballard,et al. Evaluating the Security of Handwriting Biometrics , 2006 .
[42] Andreas Uhl,et al. Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.
[43] Claudia Picardi,et al. User authentication through keystroke dynamics , 2002, TSEC.
[44] Berrin A. Yanikoglu,et al. Biometric Cryptosystem Using Online Signatures , 2006, ISCIS.
[45] Srinivas Devadas,et al. Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions , 2017, IEEE Transactions on Dependable and Secure Computing.
[46] David Zhang,et al. A cryptosystem based on palmprint feature , 2008, 2008 19th International Conference on Pattern Recognition.
[47] C. Rathgeb,et al. Context-based texture analysis for secure revocable iris-biometric key generation , 2009, ICDP.
[48] David Zhang,et al. Tongue shape classification by geometric features , 2010, Inf. Sci..
[49] Nazatul Haque Sultan,et al. PairVoting: A secure online voting scheme using Pairing-Based Cryptography and Fuzzy Extractor , 2015, 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS).
[50] Dongdai Lin,et al. Optional multi-biometric cryptosystem based on fuzzy extractor , 2014, 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[51] Lifang Wu,et al. A Fuzzy Vault Scheme for Ordered Biometrics , 2011, J. Commun..
[52] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[53] Loris Nanni,et al. Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..
[54] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[55] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[56] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[57] Kar-Ann Toh,et al. Secure biometric-key generation with biometric helper , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.
[58] Marina Blanton,et al. Analysis of Reusability of Secure Sketches and Fuzzy Extractors , 2013, IEEE Transactions on Information Forensics and Security.
[59] David Zhang,et al. A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.
[60] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[61] Haiping Lu,et al. Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.
[62] Arun Ross,et al. Fingerprint matching using minutiae and texture features , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[63] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[64] Patrizio Campisi,et al. Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.
[65] Arun Ross,et al. Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.
[66] Rama Chellappa,et al. Identification of humans using gait , 2004, IEEE Transactions on Image Processing.
[67] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[68] Nalini K. Ratha,et al. Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.
[69] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[70] Robert Sabourin,et al. A bio-cryptographic system based on offline signature images , 2014, Inf. Sci..
[71] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[72] Václav Matyás,et al. Biometric authentication - security and usability , 2002, Communications and Multimedia Security.
[73] Jiankun Hu,et al. A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures , 2016, IEEE Transactions on Information Forensics and Security.
[74] Andrew Beng Jin Teoh,et al. Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.
[75] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[76] Andrew Teoh Beng Jin,et al. High security Iris verification system based on random secret integration , 2006 .
[77] Juergen Luettin,et al. Speaker identification by lipreading , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.