Cancelable fingerprint templates using minutiae-based bit-strings
暂无分享,去创建一个
[1] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[2] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[3] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[4] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[5] Alisher Kholmatov,et al. Multi-biometric templates using fingerprint and voice , 2008, SPIE Defense + Commercial Sensing.
[6] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[7] Chulhan Lee,et al. Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[8] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[9] Mohamed Aissani,et al. Fingerprint Matching Using Minutiae Coordinate Systems , 2005, IbPRIA.
[10] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[11] Berrin Yanikoglu,et al. Combining multiple biometrics to protect privacy , 2004 .
[12] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[13] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[14] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[15] Chulhan Lee,et al. Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[16] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[17] Fei Su,et al. A Biometric Key-Binding and Template Protection Framework Using Correlation Filters , 2009, ICB.
[18] Wei Wang,et al. Fingerprint Minutiae Matching Based on Coordinate System Bank and Global Optimum Alignment , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[19] Sudeep Sarkar,et al. A Non-Iterative Approach to Reconstruct Face Templates from Match Scores , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[20] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[21] Loris Nanni,et al. Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004 , 2005, Neurocomputing.
[22] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[23] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[24] Daesung Moon,et al. Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.
[25] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[26] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[27] Nalini K. Ratha,et al. Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[28] Ee-Chien Chang,et al. Robust Extraction of Secret Bits from Minutiae , 2007, ICB.
[29] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[30] Peng Li,et al. Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae's Local Ridge Information , 2009, ICB.
[31] Anthony Vetro. CHAPTER 11 – Securing Biometric Data , 2009 .
[32] Loris Nanni,et al. Local binary patterns for a hybrid fingerprint matcher , 2008, Pattern Recognit..
[33] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[34] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[35] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[36] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[37] Abhijit S. Pandya,et al. Simulation and experimental studies on fuzzy vault fingerprint cryptography , 2008, Int. J. Knowl. Based Intell. Eng. Syst..
[38] Loris Nanni,et al. Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..
[39] Loris Nanni,et al. Descriptors for image-based fingerprint matchers , 2009, Expert Syst. Appl..
[40] Barry G. Sherlock,et al. A model for interpreting fingerprint topology , 1993, Pattern Recognit..
[41] Kenta Takahashi,et al. Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.
[42] Ahmad Hussein. SECURING BIOMETRIC DATA , 2010 .
[43] 金出 武雄,et al. Audio- and Video-Based Biometric Person Authentication : 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, USA, July 20-22, 2005. Proceedings , 2005 .
[44] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[45] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[46] Kathy J. Horadam,et al. Fuzzy Extractors for Minutiae-Based Fingerprint Authentication , 2007, ICB.
[47] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[48] Bernadette Dorizzi,et al. Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, CVPR.
[49] Arun Ross,et al. From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[50] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[51] Stark C. Draper,et al. Using Distributed Source Coding to Secure Fingerprint Biometrics , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[52] Yair Frankel,et al. On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .
[53] Xuebing Zhou. Template protection and its implementation in 3D face recognition systems , 2007, SPIE Defense + Commercial Sensing.
[54] Lakhmi C. Jain,et al. Network and information security: A computational intelligence approach: Special Issue of Journal of Network and Computer Applications , 2007, J. Netw. Comput. Appl..
[55] Qi Li,et al. Using voice to generate cryptographic keys , 2001, Odyssey.
[56] Kang Ryoung Park,et al. A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[57] Arun Ross,et al. Toward reconstructing fingerprints from minutiae points , 2005, SPIE Defense + Commercial Sensing.
[58] Chris J. Hill,et al. Risk of Masquerade Arising from the Storage of Biometrics , 2001 .
[59] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[60] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[61] Pong C. Yuen,et al. Protecting Face Biometric Data on Smartcard with Reed-Solomon Code , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[62] Ingrid Verbauwhede,et al. Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..