Security and Liveness, Overview

[1]  Gian Luca Marcialis,et al.  Vitality Detection from Fingerprint Images: A Critical Survey , 2007, ICB.

[2]  Dario Maio,et al.  Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.

[3]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[4]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[5]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[6]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[7]  Stephanie Schuckers,et al.  Spoofing and Anti-Spoofing Measures , 2002, Inf. Secur. Tech. Rep..

[8]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[9]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[10]  L. Biel,et al.  ECG analysis: a new approach in human identification , 1999, IMTC/99. Proceedings of the 16th IEEE Instrumentation and Measurement Technology Conference (Cat. No.99CH36309).

[11]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[12]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[13]  Bruce Schneier,et al.  Practical cryptography , 2003 .