PalmHashing: a novel approach for cancelable biometrics
暂无分享,去创建一个
Andrew Beng Jin Teoh | David Chek Ling Ngo | Connie Tee | Michael Goh Kah Ong | A. Teoh | D. Ngo | M. G. K. Ong | C. Tee
[1] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[2] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[3] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[4] Randall K. Nichols. ICSA guide to cryptography , 1998 .
[5] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[6] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[7] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[8] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[9] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.