A survey on biometric cryptosystems and cancelable biometrics
暂无分享,去创建一个
[1] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[2] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[3] Huibin Wang,et al. Authentication and Key Establishment Scheme Based on Token for Mobile Commerce , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[4] Raymond N. J. Veldhuis,et al. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.
[5] Christoph Busch,et al. A Reference Architecture for Biometric Template Protection based on Pseudo Identities , 2008, BIOSIG.
[6] Pengfei Shi,et al. PKI Key Generation Based on Iris Features , 2008, 2008 International Conference on Computer Science and Software Engineering.
[7] Ingrid Verbauwhede,et al. Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[8] Andrew Beng Jin Teoh,et al. Application-Specific Key Release Scheme from Biometrics , 2008, Int. J. Netw. Secur..
[9] Berk Sunar,et al. Differential template attacks on PUF enabled cryptographic devices , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[10] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[11] A. Uhl,et al. An iris-based Interval-Mapping scheme for Biometric Key generation , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[12] Yair Frankel,et al. On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .
[13] Julian Fiérrez,et al. Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[14] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[15] Andreas Uhl,et al. Privacy Preserving Key Generation for Iris Biometrics , 2010, Communications and Multimedia Security.
[16] Ajay Kumar,et al. A palmprint-based cryptosystem using double encryption , 2008, SPIE Defense + Commercial Sensing.
[17] Ee-Chien Chang,et al. Hiding Secret Points Amidst Chaff , 2006, EUROCRYPT.
[18] Norimichi Tsumura,et al. BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes , 2010, IEICE Trans. Inf. Syst..
[19] K. P. Soman,et al. Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme , 2009 .
[20] David Zhang,et al. A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.
[21] Qi Li,et al. Using voice to generate cryptographic keys , 2001, Odyssey.
[22] K. Srinathan,et al. Efficient Biometric Verification in Encrypted Domain , 2009, ICB.
[23] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[24] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[25] Haiping Lu,et al. Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.
[26] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[27] Zhang Tao,et al. Side-Channel Attack on Biometric Cryptosystem Based on Keystroke Dynamics , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[28] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[29] A. Kannammal,et al. A secure cryptosystem from palm vein biometrics , 2009, ICIS.
[30] Randall K. Nichols. ICSA guide to cryptography , 1998 .
[31] Nasir D. Memon,et al. A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.
[32] Axel Munk,et al. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.
[33] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[34] Kar-Ann Toh,et al. A Method to Enhance Face Biometric Security , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[35] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[36] A. Arakala. SECURE AND PRIVATE FINGERPRINT-BASED AUTHENTICATION , 2009, Bulletin of the Australian Mathematical Society.
[37] Sergey Yekhanin,et al. Secure Biometrics Via Syndromes , 2005 .
[38] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[39] C. Rathgeb,et al. Context-based texture analysis for secure revocable iris-biometric key generation , 2009, ICDP.
[40] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[41] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.
[42] Patrizio Campisi,et al. Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.
[43] Sharath Pankanti,et al. Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.
[44] Arun Ross,et al. Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.
[45] Andreas Uhl,et al. Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.
[46] Stefan Katzenbeisser,et al. Signal Processing in the Encrypted Domain , 2007 .
[47] Xiaomin Wang,et al. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices , 2008 .
[48] Ee-Chien Chang,et al. Finding the original point set hidden among chaff , 2006, ASIACCS '06.
[49] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[50] Claus Vielhauer. Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.
[51] Andrew Beng Jin Teoh,et al. Replaceable and securely hashed keys from online signatures , 2006, IEICE Electron. Express.
[52] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[53] Andrew Beng Jin Teoh,et al. Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.
[54] Nasir D. Memon,et al. Secure Sketch for Biometric Templates , 2006, ASIACRYPT.
[55] Andreas Uhl,et al. Iris-Biometric Hash Generation for Biometric Database Indexing , 2010, 2010 20th International Conference on Pattern Recognition.
[56] Bernadette Dorizzi,et al. Application of Biometrics to Obtain High Entropy Cryptographic Keys , 2009 .
[57] David Zhang,et al. Multiscale competitive code for efficient palmprint recognition , 2008, 2008 19th International Conference on Pattern Recognition.
[58] Nalini K. Ratha,et al. Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.
[59] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[60] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[61] Claus Vielhauer,et al. Biometric hashing for handwriting: entropy-based feature selection and semantic fusion , 2008, Electronic Imaging.
[62] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[63] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[64] Terrance E. Boult,et al. Bipartite Biotokens: Definition, Implementation, and Analysis , 2009, ICB.
[65] K. Srinathan,et al. Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[66] Peng Li,et al. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..
[67] Kenta Takahashi,et al. Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[68] David Zhang,et al. A cryptosystem based on palmprint feature , 2008, 2008 19th International Conference on Pattern Recognition.
[69] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[70] Michael K. Reiter,et al. The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.
[71] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[72] K. Srinathan,et al. Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.
[73] Andrew Beng Jin Teoh,et al. Biometric hash: high-confidence face recognition , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[74] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[75] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[76] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[77] Kar-Ann Toh,et al. Secure biometric-key generation with biometric helper , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.
[78] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[79] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[80] Tsuhan Chen,et al. Biometrics : Challenges arising from Theory to Practice , 2004 .
[81] Jorge Guajardo,et al. Efficient strategies to play the indistinguishability game for fuzzy sketches , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[82] Mingwu Zhang,et al. Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor , 2011, Int. J. Netw. Secur..
[83] Haiping Lu,et al. Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.
[84] Frans M. J. Willems,et al. Achieving Secure Fuzzy Commitment Scheme for Optical PUFs , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[85] Andreas Uhl,et al. Transforming Rectangular and Polar Iris Images to Enable Cancelable Biometrics , 2010, ICIAR.
[86] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[87] Dongho Won,et al. The Vulnerabilities Analysis of Fuzzy Vault Using Password , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[88] Kwok-Yan Lam,et al. Key Management Using Biometrics , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[89] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[90] Alex Stoianov,et al. Chapter 26. Biometric Encryption: The New Breed of Untraceable Biometrics , 2009 .
[91] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[92] Stark C. Draper,et al. Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes , 2007 .
[93] Zhang Weidong,et al. Key Binding Based on Biometric Shielding Functions , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[94] G. Padmavathi,et al. Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault , 2009 .
[95] Ajay Kumar,et al. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..
[96] Ee-Chien Chang,et al. Robust, short and sensitive authentication tags using secure sketch , 2006, MM&Sec '06.
[97] Andreas Uhl,et al. Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).
[98] Rama Chellappa,et al. Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[99] Evgeny Verbitskiy,et al. RELIABLE BIOMETRIC AUTHENTICATION WITH PRIVACY PROTECTION , 2007 .
[100] S. Kanade,et al. Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[101] Christoph Busch,et al. Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[102] Bhagavatula Vijaya Kumar,et al. Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.
[103] Alessandro Neri,et al. Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[104] J. Jeffers,et al. Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[105] Chulhan Lee,et al. Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[106] Alessandro Neri,et al. User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.
[107] Andreas Uhl,et al. Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.
[108] Claus Vielhauer,et al. Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.
[109] Anton H. M. Akkermans,et al. A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem , 2009, DPM/SETOP.
[110] Andrew Beng Jin Teoh,et al. Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.
[111] Andrew Teoh Beng Jin,et al. High security Iris verification system based on random secret integration , 2006 .
[112] Kwok-Yan Lam,et al. A Quick Algorithmfor Reduction of Attribute in Information Systems , 2007 .
[113] Andrew Beng Jin Teoh,et al. High security Iris verification system based on random secret integration , 2006, Comput. Vis. Image Underst..
[114] Lucas Ballard,et al. On the Requirements of Biometric Key Generators Technical Report TR-JHU-SPAR-BKMR-090707 , 2007 .
[115] Arun Ross,et al. Proceedings of SPIE- The International Society for Optical Engineering: Introduction , 2008 .
[116] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[117] Albert Levi,et al. Secret sharing using biometric traits , 2006, SPIE Defense + Commercial Sensing.
[118] Arun Ross,et al. From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[119] A. Stoianov,et al. Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[120] Pong C. Yuen,et al. A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.
[121] I. R. Babu,et al. Performance of Iris Based Hard Fuzzy Vault , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[122] Colin Pattinson,et al. A schema for cryptographic keys generation using hybrid biometrics , 2006 .
[123] Sushil Jajodia,et al. BIOMETRIC USER AUTHENTICATION FOR IT SECURITY From Fundamentals to Handwriting by Claus Vielhauer Universitdt , 2006 .
[124] Julien Bringer,et al. The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..
[125] K. P. Soman,et al. Towards generating irrevocable key for cryptography from cancelable fingerprints , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[126] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[127] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[128] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[129] Raymond N. J. Veldhuis,et al. Pseudo Identities Based on Fingerprint Characteristics , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[130] Andrew Beng Jin Teoh,et al. Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..
[131] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[132] Stelvio Cimato,et al. Privacy in biometrics , 2009 .
[133] Wanqing Li,et al. Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[134] Ee-Chien Chang,et al. Fuzzy extractors for asymmetric biometric representations , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[135] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[136] T.E. Boult,et al. Bio-cryptographic protocols with bipartite biotokens , 2008, 2008 Biometrics Symposium.
[137] Sunil V. K. Gaddam,et al. Efficient Cancelable Biometric Key Generation Scheme for Cryptography , 2010, Int. J. Netw. Secur..
[138] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[139] Ann Cavoukian,et al. Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.
[140] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[141] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[142] Stan Z. Li,et al. Near Infrared Face Based Biometric Key Binding , 2009, ICB.
[143] Raymond N. J. Veldhuis,et al. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source , 2010, Defense + Commercial Sensing.
[144] Santanu Chaudhury,et al. Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[145] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[146] Christoph Busch,et al. Renewable Minutiae Templates with Tunable Size and Security , 2010, 2010 20th International Conference on Pattern Recognition.
[147] W. Gareth J. Howells,et al. Evaluating Biometric Encryption Key Generation Using Handwritten Signatures , 2008, 2008 Bio-inspired, Learning and Intelligent Systems for Security.
[148] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[149] Ee-Chien Chang,et al. Robust Extraction of Secret Bits from Minutiae , 2007, ICB.
[150] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[151] Daesung Moon,et al. Dictionary Attack on Functional Transform‐Based Cancelable Fingerprint Templates , 2009 .
[152] Ingrid Verbauwhede,et al. Secure IRIS Verification , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[153] Hervé Sibert,et al. Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes , 2007, ICB.
[154] Frans M. J. Willems,et al. Identification and secret-key binding in binary-symmetric template-protected biometric systems , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[155] Pieter H. Hartel,et al. Constructing practical Fuzzy Extractors using QIM , 2007 .
[156] Stelvio Cimato,et al. A Multi-biometric Verification System for the Privacy Protection of Iris Templates , 2008, CISIS.
[157] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[158] Andreas Uhl,et al. Secure Iris Recognition Based on Local Intensity Variations , 2010, ICIAR.
[159] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[160] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[161] Jeng-Shyang Pan,et al. Information Hiding and Multimedia Signal Processing , 2008, J. Digit. Inf. Manag..
[162] Karthik Nandakumar,et al. A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[163] Nasir D. Memon,et al. How to protect biometric templates , 2007, Electronic Imaging.
[164] Yongdong Wu,et al. Transforming a pattern identifier into biometric key generators , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[165] Michael K. Reiter,et al. Towards practical biometric key generation with randomized biometric templates , 2008, CCS.
[166] Konstantinos N. Plataniotis,et al. Biometric Encryption: The New Breed of Untraceable Biometrics , 2010 .
[167] Chulhan Lee,et al. Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[168] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[169] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).
[170] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[171] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[172] Anil K. Jain,et al. Fuzzy Fingerprint Vault , 2004 .
[173] Andreas Uhl,et al. Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems , 2010, ICIAR.
[174] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[175] Andrew Beng Jin Teoh,et al. Iris Authentication Using Privatized Advanced Correlation Filter , 2006, ICB.
[176] J. Ortega-Garcia,et al. Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[177] Nasir D. Memon,et al. Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[178] Ralf Steinmetz,et al. Handwriting: Feature Correlation Analysis for Biometric Hashes , 2004, EURASIP J. Adv. Signal Process..
[179] Daniel P. Lopresti,et al. Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices , 2002, USENIX Security Symposium.
[180] Venu Govindaraju,et al. Symmetric hash functions for secure fingerprint biometric systems , 2007, Pattern Recognit. Lett..
[181] Sokratis K. Katsikas,et al. Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices , 2006, Int. J. Netw. Secur..
[182] Loris Nanni,et al. Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..
[183] N. Lalithamani,et al. An Effective Scheme for Generating Irrevocable Cryptographic Key from Cancelable Fingerprint Templates , 2009 .
[184] David Zhang,et al. An Iris Cryptosystem for Information Security , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[185] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[186] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[187] Ali Miri,et al. A collusion attack on the fuzzy vault scheme , 2009, ISC Int. J. Inf. Secur..
[188] Berrin A. Yanikoglu,et al. Biometric Cryptosystem Using Online Signatures , 2006, ISCIS.
[189] Dr.K. Duraiswamy,et al. Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature , 2010 .
[190] Julien Bringer,et al. Binary feature vector fingerprint representation from minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[191] Kenta Takahashi,et al. Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.
[192] Colin Boyd,et al. A Multiple-Control Fuzzy Vault , 2008, 2008 Sixth Annual Conference on Privacy, Security and Trust.
[193] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[194] A. Shanmugam,et al. GENERATE A KEY FOR AES USING BIOMETRIC FOR VOIP NETWORK SECURITY , 2009 .
[195] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[196] Andrew Beng Jin Teoh,et al. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization , 2006, EURASIP J. Adv. Signal Process..
[197] Andreas Uhl,et al. Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.
[198] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[199] Paul A. Watters,et al. A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).
[200] Mauro Barni,et al. eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.
[201] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[202] Raymond N. J. Veldhuis,et al. Binary Representations of Fingerprint Spectral Minutiae Features , 2010, 2010 20th International Conference on Pattern Recognition.
[203] Boris Skoric,et al. Key Extraction From General Nondiscrete Signals , 2010, IEEE Transactions on Information Forensics and Security.
[204] Daesung Moon,et al. Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.
[205] Daesung Moon,et al. Fuzzy fingerprint vault using multiple polynomials , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.
[206] Norimichi Tsumura,et al. Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.
[207] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[208] Ying Luo,et al. Anonymous Biometric Access Control based on homomorphic encryption , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[209] Yongjin Wang,et al. Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.
[210] Raymond N. J. Veldhuis,et al. Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[211] Ferhaoui Chafia,et al. A biometric crypto-system for authentication , 2010, 2010 International Conference on Machine and Web Intelligence.
[212] Qiu-Liang Xu,et al. An Improved Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[213] Frans M. J. Willems,et al. Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[214] Pieter H. Hartel,et al. Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.
[215] J. van Leeuwen,et al. Audio- and Video-Based Biometric Person Authentication , 2001, Lecture Notes in Computer Science.
[216] Tieniu Tan,et al. Robust Biometric Key Extraction Based on Iris Cryptosystem , 2009, ICB.
[217] Gevorg Margarov,et al. Biometrics Based Secret Sharing Using Fuzzy Vault , 2009 .
[218] J. Bringer,et al. Anonymous identification with cancelable biometrics , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[219] Andrew Beng Jin Teoh,et al. Secure speech template protection in speaker verification system , 2010, Speech Commun..
[220] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[221] Edward J. Delp,et al. Front Matter: Volume , 2008 .
[222] Yonghong Peng,et al. Effective features based on normal linear structures for detecting microcalcifications in mammograms , 2008, 2008 19th International Conference on Pattern Recognition.