Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking
暂无分享,去创建一个
[1] Richa Singh,et al. Enhancing security of fingerprints through contextual biometric watermarking. , 2007, Forensic science international.
[2] Muhammad Khurram Khan,et al. Robust Hiding of Fingerprint-Biometric Data into Audio Signals , 2007, ICB.
[3] Arun Ross,et al. Protecting Iris Images through Asymmetric Digital Watermarking , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
[4] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[5] Ralf Steinmetz,et al. Approaches to biometric watermarks for owner authentification , 2001, IS&T/SPIE Electronic Imaging.
[6] Anil K. Jain,et al. Hiding Fingerprint Minutiae in Images , 2002 .
[7] Daesung Moon,et al. Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems , 2005, CIS.
[8] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[9] Andreas Uhl,et al. Watermarking as a Means to Enhance Biometric Systems: A Critical Survey , 2011, Information Hiding.
[10] Jing Dong,et al. Effects of watermarking on iris recognition performance , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.
[11] Stan Z. Li,et al. Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings , 2007, ICB.
[12] Md. Rajibul Islam,et al. Biometric template protection using watermarking with hidden password encryption , 2008, 2008 International Symposium on Information Technology.
[13] Elisardo González-Agulla,et al. Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth , 2008, Electronic Imaging.
[14] Jana Dittmann,et al. Biometrics and ID Management , 2011, Lecture Notes in Computer Science.
[15] Jana Dittmann,et al. Digital watermarking of biometric speech references: impact to the EER system performance , 2007, Electronic Imaging.
[16] Jian-ping Li,et al. A Novel Biometric Image Integrity Authentication Using Fragile Watermarking and Arnold Transform , 2008 .
[17] T. Satonaka. Biometric watermark authentication with multiple verification rule , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.
[18] Jan Wessnitzer,et al. A Model of Non-elemental Associative Learning in the Mushroom Body Neuropil of the Insect Brain , 2007, ICANNGA.
[19] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[20] Sharath Pankanti,et al. Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.
[21] Anil K. Jain,et al. Hiding a face in a fingerprint image , 2002, Object recognition supported by user interaction for service robots.
[22] Andreas Uhl,et al. Experimental study on the impact of robust watermarking on iris recognition accuracy , 2010, SAC '10.
[23] Kang Ryoung Park,et al. A Study on Iris Feature Watermarking on Face Data , 2007, ICANNGA.
[24] Andreas Uhl,et al. Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems , 2011, BIOID.