Fingerprint Hardening with Randomly Selected Chaff Minutiae
暂无分享,去创建一个
[1] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[2] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[3] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[4] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[5] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[6] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[7] Venu Govindaraju,et al. K-plet and Coupled BFS: A Graph Based Fingerprint Representation and Matching Algorithm , 2006, ICB.
[8] Qi Li,et al. Using voice to generate cryptographic keys , 2001, Odyssey.
[9] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[10] Venu Govindaraju,et al. Fingerprint enhancement using STFT analysis , 2007, Pattern Recognit..
[11] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[12] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[13] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[14] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[15] S. Chikkerur,et al. K-plet and CBFS : A Graph based Fingerprint Representation and Matching Algorithm , 2005 .
[16] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[17] Andrew Beng Jin Teoh,et al. Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..
[18] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[19] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..