Multi-instance iris remote authentication using private multi-class perceptron on malicious cloud server
暂无分享,去创建一个
Mahesh Kumar Morampudi | U. S. N. Raju | Munaga V. N. K. Prasad | Sowmya Veldandi | M. Prasad | Sowmya Veldandi
[1] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[2] Craig Gentry,et al. Packed Ciphertexts in LWE-Based Homomorphic Encryption , 2013, Public Key Cryptography.
[3] Takeshi Koshiba,et al. New packing method in somewhat homomorphic encryption and its applications , 2015, Secur. Commun. Networks.
[4] Rosario Gennaro,et al. Fully Homomorphic Message Authenticators , 2013, IACR Cryptol. ePrint Arch..
[5] Oded Regev,et al. The Learning with Errors Problem (Invited Survey) , 2010, 2010 IEEE 25th Annual Conference on Computational Complexity.
[6] Patrizio Campisi,et al. Hill-Climbing Attacks on Multibiometrics Recognition Systems , 2015, IEEE Transactions on Information Forensics and Security.
[7] Jian Liu,et al. Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage , 2015, IEEE Transactions on Information Forensics and Security.
[8] Craig Gentry,et al. Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.
[9] Yan Liu,et al. A new method of feature fusion and its application in image recognition , 2005, Pattern Recognit..
[10] J. Fierrez-Aguilar,et al. Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[11] Christoph Busch,et al. Unlinkable improved multi-biometric iris fuzzy vault , 2016, EURASIP J. Inf. Secur..
[12] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[13] Zijing Zhao,et al. A deep learning based unified framework to detect, segment and recognize irises using spatially corresponding features , 2019, Pattern Recognit..
[14] Stanley S. Ipson,et al. A multi-biometric iris recognition system based on a deep learning approach , 2017, Pattern Analysis and Applications.
[15] Frederik Vercauteren,et al. Somewhat Practical Fully Homomorphic Encryption , 2012, IACR Cryptol. ePrint Arch..
[16] Frederik Vercauteren,et al. Fully homomorphic SIMD operations , 2012, Designs, Codes and Cryptography.
[17] Weixin Xie,et al. Private Machine Learning Classification Based on Fully Homomorphic Encryption , 2020, IEEE Transactions on Emerging Topics in Computing.
[18] Julian Fiérrez,et al. Multi-biometric template protection based on Homomorphic Encryption , 2017, Pattern Recognit..
[19] Ali Noruzi,et al. Iris recognition in unconstrained environment on graphic processing units with CUDA , 2019, Artificial Intelligence Review.
[20] Chris Peikert,et al. On Ideal Lattices and Learning with Errors over Rings , 2010, JACM.
[21] Ajay Kumar,et al. Comparison and combination of iris matchers for reliable personal authentication , 2010, Pattern Recognit..
[22] Sambit Bakshi,et al. Iris recognition with tunable filter bank based feature , 2017, Multimedia Tools and Applications.
[23] Srinath T. V. Setty,et al. Making argument systems for outsourced computation practical (sometimes) , 2012, NDSS.
[24] David P. Anderson,et al. SETI@home: an experiment in public-resource computing , 2002, CACM.
[25] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[26] O. Regev. The Learning with Errors problem , 2010 .
[27] Bala Srinivasan,et al. Privacy-preserving biometrics authentication systems using fully homomorphic encryption , 2015, Int. J. Pervasive Comput. Commun..
[28] Marios Savvides,et al. How to Generate Spoofed Irises From an Iris Code Template , 2011, IEEE Transactions on Information Forensics and Security.
[29] J. Daugman,et al. Epigenetic randomness, complexity and singularity of human iris patterns , 2001, Proceedings of the Royal Society of London. Series B: Biological Sciences.
[30] Craig Gentry,et al. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.
[31] RegevOded,et al. On Ideal Lattices and Learning with Errors over Rings , 2013 .
[32] Jian Yang,et al. Feature fusion: parallel strategy vs. serial strategy , 2003, Pattern Recognit..
[33] Chengjun Liu,et al. A shape- and texture-based enhanced Fisher classifier for face recognition , 2001, IEEE Trans. Image Process..
[34] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[35] Ahmad-Reza Sadeghi,et al. Privacy-Preserving ECG Classification With Branching Programs and Neural Networks , 2011, IEEE Transactions on Information Forensics and Security.
[36] YasudaMasaya,et al. New packing method in somewhat homomorphic encryption and its applications , 2015 .
[37] Marina Blanton,et al. Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.
[38] Arun Ross,et al. Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.
[39] Andreas Uhl,et al. Design Decisions for an Iris Recognition SDK , 2016 .
[40] Sushmita Mitra,et al. Iris localization using rough entropy and CSA: A soft computing approach , 2018, Appl. Soft Comput..
[41] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[42] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[43] Abdenour Hadid,et al. Biometrics Systems Under Spoofing Attack: An evaluation methodology and lessons learned , 2015, IEEE Signal Processing Magazine.
[44] Kang Ryoung Park,et al. FRED-Net: Fully residual encoder-decoder network for accurate iris segmentation , 2019, Expert Syst. Appl..
[45] Mauro Barni,et al. Oblivious Neural Network Computing via Homomorphic Encryption , 2007, EURASIP J. Inf. Secur..
[46] Michael Naehrig,et al. ML Confidential: Machine Learning on Encrypted Data , 2012, ICISC.
[47] Michele Mosca,et al. Cybersecurity in an Era with Quantum Computers: Will We Be Ready? , 2017, IEEE Security & Privacy.
[48] Mohamed Abdel-Mottaleb,et al. Discriminant Correlation Analysis: Real-Time Feature Level Fusion for Multimodal Biometric Recognition , 2016, IEEE Transactions on Information Forensics and Security.
[49] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[50] V. A. Bharadi,et al. Multi-Instance Iris Recognition , 2018, 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA).