Iris Biometric Cryptosystems

Biometric cryptosystems are designed to securely bind a digital key to a biometric or generate a digital key from a biometric [69]. The majority of biometric cryptosystems require the storage of biometric-dependent public information applied to retrieve or generate keys which is referred to as helper data [228]. Due to biometric variance it is not feasible for most biometric characteristics to extract cryptographic keys directly.

[1]  Paul A. Viola,et al.  Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.

[2]  Yongwha Chung,et al.  Analyzing the Secure and Energy Efficient Transmissions of Compressed Fingerprint Images using Encryption and Watermarking , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[3]  A. Ross,et al.  Segmenting Non-Ideal Irises Using Geodesic Active Contours , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[4]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[5]  David J. Kriegman,et al.  From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..

[6]  Hugo Proença,et al.  Iris Recognition: A Method to Segment Visible Wavelength Iris Images Acquired On-the-Move and At-a-Distance , 2008, ISVC.

[7]  Yide Ma,et al.  A novel method for iris feature extraction based on intersecting cortical model network , 2008 .

[8]  Andreas Uhl,et al.  Image metric-based biometric comparators: A supplement to feature vector-based Hamming distance? , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).

[9]  C. Newman A life revealed , 2002 .

[10]  Pengfei Shi,et al.  PKI Key Generation Based on Iris Features , 2008, 2008 International Conference on Computer Science and Software Engineering.

[11]  Richard P. Wildes,et al.  Iris recognition: an emerging biometric technology , 1997, Proc. IEEE.

[12]  Ajay Kumar,et al.  Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..

[13]  Ingrid Verbauwhede,et al.  Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..

[14]  Sheila S. Hemami,et al.  Natural image utility assessment using image contours , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).

[15]  Bart Preneel,et al.  Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[16]  Mo Chen,et al.  Modification of standard image compression methods for correlation-based pattern recognition , 2004 .

[17]  Andreas Uhl,et al.  Privacy Preserving Key Generation for Iris Biometrics , 2010, Communications and Multimedia Security.

[18]  Ee-Chien Chang,et al.  Robust, short and sensitive authentication tags using secure sketch , 2006, MM&Sec '06.

[19]  Wen-Shiung Chen,et al.  A novel personal biometric authentication technique using human iris based on fractal dimension features , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..

[20]  J. Forrester,et al.  The Eye: Basic Sciences in Practice , 2002 .

[21]  Andrew Beng Jin Teoh,et al.  Application-Specific Key Release Scheme from Biometrics , 2008, Int. J. Netw. Secur..

[22]  Andreas Uhl,et al.  Bit Reliability-driven Template Matching in Iris Recognition , 2010, 2010 Fourth Pacific-Rim Symposium on Image and Video Technology.

[23]  Berk Sunar,et al.  Differential template attacks on PUF enabled cryptographic devices , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[24]  Muhammad Khurram Khan,et al.  Robust Hiding of Fingerprint-Biometric Data into Audio Signals , 2007, ICB.

[25]  Jana Dittmann,et al.  Using adapted Levenshtein distance for on-line signature authentication , 2004, ICPR 2004.

[26]  Andreas Uhl,et al.  Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms , 2010, VISAPP.

[27]  Gérard D. Cohen,et al.  Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[28]  A. Uhl,et al.  An iris-based Interval-Mapping scheme for Biometric Key generation , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[29]  Alan C. Bovik,et al.  Image information and visual quality , 2006, IEEE Trans. Image Process..

[30]  Ali M. Reza,et al.  Realization of the Contrast Limited Adaptive Histogram Equalization (CLAHE) for Real-Time Image Enhancement , 2004, J. VLSI Signal Process..

[31]  Jesús Angulo,et al.  Robust iris segmentation on uncalibrated noisy images using mathematical morphology , 2010, Image Vis. Comput..

[32]  Michele Nappi,et al.  IS_IS: Iris Segmentation for Identification Systems , 2010, 2010 20th International Conference on Pattern Recognition.

[33]  Tieniu Tan,et al.  A fast and robust iris localization method based on texture segmentation , 2004, SPIE Defense + Commercial Sensing.

[34]  Stephanie Schuckers,et al.  Active shape models for effective iris segmentation , 2006, SPIE Defense + Commercial Sensing.

[35]  Yair Frankel,et al.  On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .

[36]  Husrev T. Sencar,et al.  A study of the robustness of PRNU-based camera identification , 2009, Electronic Imaging.

[37]  Libor Masek,et al.  MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .

[38]  Julian Fiérrez,et al.  Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[39]  Hugo Proença,et al.  On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris Images , 2009, 2009 International Conference on Computational Intelligence and Security.

[40]  Fabio Scotti,et al.  Noisy iris segmentation with boundary regularization and reflections removal , 2010, Image Vis. Comput..

[41]  Ajay Kumar,et al.  A palmprint-based cryptosystem using double encryption , 2008, SPIE Defense + Commercial Sensing.

[42]  Ee-Chien Chang,et al.  Hiding Secret Points Amidst Chaff , 2006, EUROCRYPT.

[43]  Zeno J M H Geradts,et al.  Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images * , 2009, Journal of forensic sciences.

[44]  Arun Ross,et al.  Exploring multispectral iris recognition beyond 900nm , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[45]  Luca Bogoni,et al.  Iris Recognition at a Distance , 2005, AVBPA.

[46]  Chul-Hyun Park,et al.  Extracting and Combining Multimodal Directional Iris Features , 2006, ICB.

[47]  Yingzi Du,et al.  Transforming Traditional Iris Recognition Systems to Work in Nonideal Situations , 2009, IEEE Transactions on Industrial Electronics.

[48]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[49]  J. Ortega-Garcia,et al.  Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[50]  H. Farid,et al.  Image forgery detection , 2009, IEEE Signal Processing Magazine.

[51]  Qi Li,et al.  Using voice to generate cryptographic keys , 2001, Odyssey.

[52]  Frank Bossen,et al.  Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.

[53]  Andreas Uhl,et al.  Robust watermarking in iris recognition: application scenarios and impact on recognition performance , 2011, SIAP.

[54]  William A. Pearlman,et al.  A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..

[55]  Nasir D. Memon,et al.  Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[56]  Ralf Steinmetz,et al.  Handwriting: Feature Correlation Analysis for Biometric Hashes , 2004, EURASIP J. Adv. Signal Process..

[57]  Andrzej Napieralski,et al.  Hardware Architecture Optimized for Iris Recognition , 2011, IEEE Transactions on Circuits and Systems for Video Technology.

[58]  Zhang Tao,et al.  Side-Channel Attack on Biometric Cryptosystem Based on Keystroke Dynamics , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[59]  Andrew Beng Jin Teoh,et al.  PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..

[60]  Andreas Uhl,et al.  Weighted adaptive Hough and ellipsopolar transforms for real-time iris segmentation , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[61]  Kevin W. Bowyer The results of the NICE.II Iris biometrics competition , 2012, Pattern Recognit. Lett..

[62]  A. Kannammal,et al.  A secure cryptosystem from palm vein biometrics , 2009, ICIS.

[63]  Pieter H. Hartel,et al.  Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.

[64]  Anil K. Jain,et al.  Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[65]  Mo Chen,et al.  Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Trans. Inf. Forensics Secur..

[66]  Siwei Luo,et al.  An efficient iris recognition system , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[67]  Andreas Uhl,et al.  Comparison of compression algorithms' impact on iris recognition accuracy II: revisiting JPEG , 2008, Electronic Imaging.

[68]  Terrance E. Boult,et al.  Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).

[69]  Iuon-Chang Lin,et al.  Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..

[70]  Yu Liang,et al.  A Method for Face and Iris Feature Fusion in Identity Authentication , 2006 .

[71]  Kostas E. Bekris,et al.  A Proposed Digital Rights Management System for 3D Graphics Using Biometric Watermarks , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[72]  Emanuele Maiorana,et al.  Secure Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography , 2007 .

[73]  Raymond N. J. Veldhuis,et al.  Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.

[74]  Babak Nadjar Araabi,et al.  Iris Recognition for Partially Occluded Images: Methodology and Sensitivity Analysis , 2007, EURASIP J. Adv. Signal Process..

[75]  Alan Hanjalic,et al.  Eye localization for face matching: is it always useful and under what conditions? , 2008, CIVR '08.

[76]  Daniel P. Lopresti,et al.  Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices , 2002, USENIX Security Symposium.

[77]  Venu Govindaraju,et al.  Symmetric hash functions for secure fingerprint biometric systems , 2007, Pattern Recognit. Lett..

[78]  Sokratis K. Katsikas,et al.  Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices , 2006, Int. J. Netw. Secur..

[79]  John Daugman How iris recognition works , 2004 .

[80]  Shree K. Nayar,et al.  Eyes for relighting , 2004, SIGGRAPH 2004.

[81]  Naphtali Rishe,et al.  A highly accurate and computationally efficient approach for unconstrained iris segmentation , 2010, Image Vis. Comput..

[82]  Christopher M. Bishop,et al.  Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .

[83]  Christoph Busch,et al.  A Reference Architecture for Biometric Template Protection based on Pseudo Identities , 2008, BIOSIG.

[84]  Andreas Uhl,et al.  Rotation-invariant Iris Recognition - Boosting 1D Spatial-domain Signatures to 2D , 2008, ICINCO-SPSMC.

[85]  Su Fei,et al.  Cracking Cancelable Fingerprint Template of Ratha , 2008, ISCSCT.

[86]  Richa Singh,et al.  Enhancing security of fingerprints through contextual biometric watermarking. , 2007, Forensic science international.

[87]  James J. Filliben,et al.  Robust Iris Recognition Baseline for the Grand Challenge , 2011 .

[88]  Jessica J. Fridrich,et al.  Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.

[89]  Randy P. Broussard,et al.  Effects of image compression on iris recognition system performance , 2008, J. Electronic Imaging.

[90]  Raymond N. J. Veldhuis,et al.  Pseudo Identities Based on Fingerprint Characteristics , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[91]  Andrew Beng Jin Teoh,et al.  Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..

[92]  Kai Wang,et al.  Fast and accurate iris segmentation based on linear basis function and RANSAC , 2011, 2011 18th IEEE International Conference on Image Processing.

[93]  Wanqing Li,et al.  Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[94]  Nasir D. Memon,et al.  How to protect biometric templates , 2007, Electronic Imaging.

[95]  Ping-Sing Tsai,et al.  JPEG: Still Image Compression Standard , 2005 .

[96]  Valérie Fiolet,et al.  Optimization of an Hough transform algorithm for the search of a center , 2008, Pattern Recognit..

[97]  Yongdong Wu,et al.  Transforming a pattern identifier into biometric key generators , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[98]  Yingzi Du,et al.  Iris Recognition: The Consequences of Image Compression , 2010, EURASIP J. Adv. Signal Process..

[99]  Jean-Paul M. G. Linnartz,et al.  New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.

[100]  David Chek Ling Ngo,et al.  Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.

[101]  Amjad Zaim Automatic segmentation of iris images for the purpose of identification , 2005, IEEE International Conference on Image Processing 2005.

[102]  Mo Chen,et al.  Sensor noise camera identification: countering counter-forensics , 2010, Electronic Imaging.

[103]  Babak Nadjar Araabi,et al.  Robust Iris Verification Based on Local and Global Variations , 2010, EURASIP J. Adv. Signal Process..

[104]  James S. Duncan,et al.  Game-Theoretic Integration for Image Segmentation , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[105]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.

[106]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[107]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[108]  John Daugman,et al.  Effect of Severe Image Compression on Iris Recognition Performance , 2008, IEEE Transactions on Information Forensics and Security.

[109]  Michael K. Reiter,et al.  Towards practical biometric key generation with randomized biometric templates , 2008, CCS.

[110]  Umut Uludag,et al.  A Spatial Method for Watermarking of Fingerprint Images , 2001, PRIS.

[111]  B. Dorizzi,et al.  A new probabilistic Iris Quality Measure for comprehensive noise detection , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[112]  Chulhan Lee,et al.  Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[113]  Alessandro Neri,et al.  User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.

[114]  Yongdong Zhang,et al.  Visual security evaluation for video encryption , 2010, ACM Multimedia.

[115]  Shin'ichi Satoh,et al.  A hybrid classifier for precise and robust eye detection , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[116]  A. Uhl,et al.  The State-of-the-Art in Iris Biometric Cryptosystems , 2011 .

[117]  Jie Yang,et al.  A robust method for eye features extraction on color image , 2005, Pattern Recognit. Lett..

[118]  Xiaobo Zhang,et al.  Noisy iris image matching by using multiple cues , 2012, Pattern Recognit. Lett..

[119]  Stan Z. Li,et al.  Near Infrared Face Based Biometric Key Binding , 2009, ICB.

[120]  Raymond N. J. Veldhuis,et al.  Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source , 2010, Defense + Commercial Sensing.

[121]  Ee-Chien Chang,et al.  Fuzzy extractors for asymmetric biometric representations , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[122]  Jinyu Zuo,et al.  An Automatic Algorithm for Evaluating the Precision of Iris Segmentation , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[123]  Raymond N. J. Veldhuis,et al.  Practical Biometric Authentication with Template Protection , 2005, AVBPA.

[124]  T.E. Boult,et al.  Bio-cryptographic protocols with bipartite biotokens , 2008, 2008 Biometrics Symposium.

[125]  Andreas Uhl,et al.  Parallel versus Serial Classifier Combination for Multibiometric Hand-Based Identification , 2009, ICB.

[126]  Touradj Ebrahimi,et al.  JJ2000: The JPEG 2000 Reference Implementation in Java , 2003 .

[127]  Santanu Chaudhury,et al.  Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[128]  Stephanie Schuckers,et al.  Iris quality assessment and bi-orthogonal wavelet based encoding for recognition , 2009, Pattern Recognit..

[129]  Frans M. J. Willems,et al.  Identification and secret-key binding in binary-symmetric template-protected biometric systems , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[130]  Pieter H. Hartel,et al.  Constructing practical Fuzzy Extractors using QIM , 2007 .

[131]  Timothy F. Cootes,et al.  A Multi-Stage Approach to Facial Feature Detection , 2004, BMVC.

[132]  A. Uhl,et al.  Evolutionary optimization of JPEG quantization tables for compressing iris polar images in iris recognition systems , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[133]  Yingzi Du,et al.  Using 2D Log-Gabor spatial filters for iris recognition , 2006, SPIE Defense + Commercial Sensing.

[134]  Natalia A. Schmid,et al.  Image quality assessment for iris biometric , 2006, SPIE Defense + Commercial Sensing.

[135]  Stelvio Cimato,et al.  A Multi-biometric Verification System for the Privacy Protection of Iris Templates , 2008, CISIS.

[136]  Boualem Boashash,et al.  A human identification technique using images of the iris and wavelet transform , 1998, IEEE Trans. Signal Process..

[137]  F. Dufaux,et al.  The JPEG XR image coding standard [Standards in a Nutshell] , 2009, IEEE Signal Processing Magazine.

[138]  Tieniu Tan,et al.  Toward Accurate and Fast Iris Segmentation for Iris Biometrics , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[139]  Ralf Steinmetz,et al.  Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.

[140]  Andy Adler Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).

[141]  Fouad Khelifi,et al.  An Efficient Watermarking Technique for the Protection of Fingerprint Images , 2008, EURASIP J. Inf. Secur..

[142]  Sharath Pankanti,et al.  Guide to Biometrics , 2003, Springer Professional Computing.

[143]  P.V.C. Hough,et al.  Machine Analysis of Bubble Chamber Pictures , 1959 .

[144]  Kazuyoshi Itoh,et al.  Wavelength- and Time-Selective Reconfigurable Optical Add/Drop Multiplexer Using Time-Frequency Domain Processing , 2010, EURASIP J. Adv. Signal Process..

[145]  Jun Kong,et al.  A novel image hiding approach based on correlation analysis for secure multimodal biometrics , 2010, J. Netw. Comput. Appl..

[146]  Anil K. Jain,et al.  Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.

[147]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..

[148]  John Daugman,et al.  Iris Recognition at Airports and Border-Crossings , 2009, Encyclopedia of Biometrics.

[149]  Carmen C. Y. Poon,et al.  A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[150]  Jamal Ahmad Dargham,et al.  Iris recognition using self-organizing neural network , 2002, Student Conference on Research and Development.

[151]  Claus Vielhauer,et al.  Biometric hashing for handwriting: entropy-based feature selection and semantic fusion , 2008, Electronic Imaging.

[152]  Arun Ross,et al.  Iris Recognition: The Path Forward , 2010, Computer.

[153]  Yingzi Du,et al.  Video-Based Noncooperative Iris Image Segmentation , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[154]  Pengfei Shi,et al.  A Robust and Accurate Method for Pupil Features Extra , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[155]  Christoph Busch,et al.  Renewable Minutiae Templates with Tunable Size and Security , 2010, 2010 20th International Conference on Pattern Recognition.

[156]  Andrew Beng Jin Teoh,et al.  Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection , 2009, ICB.

[157]  B. V. K. Vijaya Kumar,et al.  Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..

[158]  A. Uhl,et al.  Experimental study on lossless compression of biometric sample data , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[159]  Pim Tuyls,et al.  Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.

[160]  Ching-Han Chen,et al.  High performance iris recognition based on LDA and LPCC , 2005, 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05).

[161]  Daesung Moon,et al.  Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems , 2005, CIS.

[162]  D. Monro,et al.  Pupil Shape Description Using Fourier Series , 2007 .

[163]  Madhu Sudan,et al.  A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..

[164]  Chih-Ming Hsieh,et al.  Personal Identification with Human Iris Recognition based on Wavelet Transform , 2005, MVA.

[165]  Andreas Uhl,et al.  An effective and efficient visual quality index based on local edge gradients , 2011, 3rd European Workshop on Visual Information Processing.

[166]  Ching Y. Suen,et al.  Segmentation of Unideal Iris Images Using Game Theory , 2010, 2010 20th International Conference on Pattern Recognition.

[167]  Kevin W. Bowyer,et al.  Experimental evidence of a template aging effect in iris biometrics , 2011, 2011 IEEE Workshop on Applications of Computer Vision (WACV).

[168]  Andreas Uhl,et al.  Secure Iris Recognition Based on Local Intensity Variations , 2010, ICIAR.

[169]  John Daugman,et al.  Statistical Richness of Visual Phase Information: Update on Recognizing Persons by Iris Patterns , 2001, International Journal of Computer Vision.

[170]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..

[171]  P. Jonathon Phillips,et al.  An Automated Video-Based System for Iris Recognition , 2009, ICB.

[172]  Nalini Ratha,et al.  SLIC: Short-length iris codes , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[173]  George W. Quinn,et al.  IREX III: Performance of Iris Identification Algorithms , 2012 .

[174]  Wayne J. Ryan,et al.  Adapting Starburst for Elliptical Iris Segmentation , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[175]  Arun Ross,et al.  Protecting Iris Images through Asymmetric Digital Watermarking , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[176]  Arun Ross,et al.  Information fusion in biometrics , 2003, Pattern Recognit. Lett..

[177]  Jutta Hämmerle-Uhl,et al.  Improving Compressed Iris Recognition Accuracy Using JPEG2000 RoI Coding , 2009, ICB.

[178]  P. Kronfeld The Gross Anatomy and Embryology of the Eye , 1962 .

[179]  Luís A. Alexandre,et al.  Toward Covert Iris Biometric Recognition: Experimental Results From the NICE Contests , 2012, IEEE Transactions on Information Forensics and Security.

[180]  Kar-Ann Toh,et al.  Secure biometric-key generation with biometric helper , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.

[181]  Andreas Uhl,et al.  Effects of JPEG XR Compression Settings on Iris Recognition Systems , 2011, CAIP.

[182]  Xianghua Yao,et al.  Iris recognition based on multialgorithmic fusion , 2007 .

[183]  Paul A. Viola,et al.  Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.

[184]  Julien Bringer,et al.  Binary feature vector fingerprint representation from minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[185]  Liu Hui,et al.  Wavelet Tree Quantization-Based Biometric Watermarking for Offline Handwritten Signature , 2009, 2009 International Asia Symposium on Intelligent Interaction and Affective Computing.

[186]  Peter Kovesi,et al.  Image Features from Phase Congruency , 1995 .

[187]  Andreas Uhl,et al.  Experiments on improving lossless compression of biometric iris sample data , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.

[188]  Dexin Zhang,et al.  Personal Identification Based on Iris Texture Analysis , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[189]  Frans M. J. Willems,et al.  Achieving Secure Fuzzy Commitment Scheme for Optical PUFs , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[190]  Xiaobo Zhang,et al.  Texture removal for adaptive level set based iris segmentation , 2010, 2010 IEEE International Conference on Image Processing.

[191]  Kenta Takahashi,et al.  Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.

[192]  David Zhang,et al.  Accurate iris segmentation based on novel reflection and eyelash detection model , 2001, Proceedings of 2001 International Symposium on Intelligent Multimedia, Video and Speech Processing. ISIMP 2001 (IEEE Cat. No.01EX489).

[193]  Javier Ortega-Garcia,et al.  Iris recognition based on SIFT features , 2009, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS).

[194]  Andreas Uhl,et al.  Transforming Rectangular and Polar Iris Images to Enable Cancelable Biometrics , 2010, ICIAR.

[195]  Andreas Uhl,et al.  Combining Face with Face-Part Detectors under Gaussian Assumption , 2012, ICIAR.

[196]  Andreas Uhl,et al.  Iris-biometric comparators: Exploiting comparison scores towards an optimal alignment under Gaussian assumption , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[197]  Tung-Shou Chen,et al.  A simple and efficient watermark technique based on JPEG2000 Codec , 2004, Multimedia Systems.

[198]  Bojan Cukic,et al.  An automated method for predicting iris segmentation failures , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[199]  Yongjin Wang,et al.  Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.

[200]  Tsuhan Chen,et al.  Optimal thresholding for key generation based on biometrics , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[201]  Luís A. Alexandre,et al.  Toward Noncooperative Iris Recognition: A Classification Approach Using Multiple Signatures , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[202]  Richard P. Wildes,et al.  Reliable and fast eye finding in close-up images , 2002, Object recognition supported by user interaction for service robots.

[203]  Ira S. Moskowitz,et al.  Composite signature based watermarking for fingerprint authentication , 2005, MM&Sec '05.

[204]  Raymond N. J. Veldhuis,et al.  Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[205]  Ferhaoui Chafia,et al.  A biometric crypto-system for authentication , 2010, 2010 International Conference on Machine and Web Intelligence.

[206]  Qiu-Liang Xu,et al.  An Improved Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[207]  Andreas Uhl,et al.  On Combining Selective Best Bits of Iris-Codes , 2011, BIOID.

[208]  Loris Nanni,et al.  Combining Face and Eye Detectors in a High- Performance Face-Detection System , 2012, IEEE MultiMedia.

[209]  Frans M. J. Willems,et al.  Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.

[210]  Ali M. Al-Khouri,et al.  Iris recognition and the challenge of homeland and border control security in UAE , 2008, Telematics Informatics.

[211]  Randy P. Broussard,et al.  Using Artificial Neural Networks and Feature Saliency Techniques for Improved Iris Segmentation , 2007, 2007 International Joint Conference on Neural Networks.

[212]  Luís A. Alexandre,et al.  The UBIRIS.v2: A Database of Visible Wavelength Iris Images Captured On-the-Move and At-a-Distance , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[213]  Richa Singh,et al.  Robust biometric image watermarking for fingerprint and face template protection , 2006, IEICE Electron. Express.

[214]  Kang Ryoung Park,et al.  A Study on Iris Feature Watermarking on Face Data , 2007, ICANNGA.

[215]  A. Uhl,et al.  Recognition impact of JPEG2000 Part 2 wavelet packet subband structures in polar iris image compression , 2012, 2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP).

[216]  John Daugman,et al.  New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[217]  Pengfei Shi,et al.  A new segmentation approach for iris recognition based on hand-held capture device , 2007, Pattern Recognit..

[218]  Sung-Hyuk Cha,et al.  Enhancing Binary Feature Vector Similarity Measures , 2006 .

[219]  Won-gyum Kim,et al.  Multimodal biometric image watermarking using two-stage integrity verification , 2009, Signal Process..

[220]  J. Daugman Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. , 1985, Journal of the Optical Society of America. A, Optics and image science.

[221]  Qiang Ji,et al.  Automatic Eye Detection and Its Validation , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.

[222]  Randy P. Broussard,et al.  Iris image segmentation and sub-optimal images , 2010, Image Vis. Comput..

[223]  Anil K. Jain,et al.  Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.

[224]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[225]  Arun Ross,et al.  Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.

[226]  Mihran Tuceryan,et al.  Moment based texture segmentation , 1992, Proceedings., 11th IAPR International Conference on Pattern Recognition. Vol. III. Conference C: Image, Speech and Signal Analysis,.

[227]  Rui Wang,et al.  Fusion of Near Infrared Face and Iris Biometrics , 2007, ICB.

[228]  David Zhang,et al.  A cryptosystem based on palmprint feature , 2008, 2008 19th International Conference on Pattern Recognition.

[229]  M.Y. Javed,et al.  Iris localization via intensity gradient and recognition through bit planes , 2007, 2007 International Conference on Machine Vision.

[230]  Michael K. Reiter,et al.  The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.

[231]  Amar Singh,et al.  FUSION OF IRIS AND FINGERPRINT BIOMETRIC FOR RECOGNITION , 2013 .

[232]  Bernadette Dorizzi,et al.  Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, CVPR.

[233]  Andreas Uhl,et al.  Custom JPEG Quantization for Improved Iris Recognition Accuracy , 2009, SEC.

[234]  Min Wu,et al.  Security evaluation for communication-friendly encryption of multimedia , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[235]  Arun Ross,et al.  From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[236]  Hyun-Sik Ahn,et al.  JPEG Quantization Table Design for Face Images and Its Application to Face Recognition , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[237]  Andreas Uhl,et al.  Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems , 2011, BIOID.

[238]  Richa Singh,et al.  Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..

[239]  A. Stoianov,et al.  Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).

[240]  Norimichi Tsumura,et al.  BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes , 2010, IEICE Trans. Inf. Syst..

[241]  Andreas Uhl,et al.  Watermarking as a Means to Enhance Biometric Systems: A Critical Survey , 2011, Information Hiding.

[242]  Bruce A. Draper,et al.  Overview of the Multiple Biometrics Grand Challenge , 2009, ICB.

[243]  Andreas Uhl,et al.  Survey of wavelet-domain watermarking algorithms , 2001, IS&T/SPIE Electronic Imaging.

[244]  Nicolas H. Younan,et al.  An image-adaptive watermark based on a redundant wavelet transform , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[245]  Luís A. Alexandre,et al.  Iris segmentation methodology for non-cooperative recognition , 2006 .

[246]  Andreas Uhl,et al.  Comparison of Compression Algorithms' Impact on Iris Recognition Accuracy , 2007, ICB.

[247]  S. Kanade,et al.  Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[248]  Nasir D. Memon,et al.  Secure Sketch for Biometric Templates , 2006, ASIACRYPT.

[249]  Andreas Uhl,et al.  Iris-Biometric Hash Generation for Biometric Database Indexing , 2010, 2010 20th International Conference on Pattern Recognition.

[250]  Kang Ryoung Park,et al.  A Study on Iris Image Restoration , 2005, AVBPA.

[251]  Pong C. Yuen,et al.  A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.

[252]  Mo Chen,et al.  Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.

[253]  K. P. Soman,et al.  Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme , 2009 .

[254]  Josef Bigün,et al.  Orientation Scanning to Improve Lossless Compression of Fingerprint Images , 2003, AVBPA.

[255]  Christoph Busch,et al.  Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[256]  Richa Singh,et al.  Comparison of iris recognition algorithms , 2004, International Conference on Intelligent Sensing and Information Processing, 2004. Proceedings of.

[257]  David Zhang,et al.  A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.

[258]  R.W. Ives,et al.  Iris recognition using histogram analysis , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[259]  Mo Chen,et al.  Source digital camcorder identification using sensor photo response non-uniformity , 2007, Electronic Imaging.

[260]  Kang Ryoung Park,et al.  A new iris segmentation method for non-ideal iris images , 2010, Image Vis. Comput..

[261]  Luís A. Alexandre,et al.  Iris recognition: Analysis of the error rates regarding the accuracy of the segmentation stage , 2010, Image Vis. Comput..

[262]  Richard Bowden,et al.  Detection and Tracking of Humans by Probabilistic Body Part Assembly , 2005, BMVC.

[263]  K.W. Bowyer,et al.  The Best Bits in an Iris Code , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[264]  K.W. Bowyer,et al.  The Iris Challenge Evaluation 2005 , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[265]  Alessandro Neri,et al.  Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[266]  J. Jeffers,et al.  Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[267]  Loris Nanni,et al.  Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..

[268]  Gregory K. Wallace,et al.  The JPEG still picture compression standard , 1991, CACM.

[269]  N. Lalithamani,et al.  An Effective Scheme for Generating Irrevocable Cryptographic Key from Cancelable Fingerprint Templates , 2009 .

[270]  Reihaneh Safavi-Naini,et al.  Cancelable Key-Based Fingerprint Templates , 2005, ACISP.

[271]  Andreas Uhl,et al.  Reliability-balanced feature level fusion for fuzzy commitment scheme , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[272]  Natalia A. Schmid,et al.  On Techniques for Angle Compensation in Nonideal Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[273]  Natalia A. Schmid,et al.  On a Methodology for Robust Segmentation of Nonideal Iris Images , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[274]  Nasir D. Memon,et al.  A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.

[275]  Axel Munk,et al.  The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.

[276]  David Zhang,et al.  An Iris Cryptosystem for Information Security , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[277]  Sharath Pankanti,et al.  Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.

[278]  Ajith Abraham,et al.  Spiking neural network and wavelets for hiding iris data in digital images , 2009, Soft Comput..

[279]  Andrew Beng Jin Teoh,et al.  Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..

[280]  Zhoufeng Liu,et al.  Protecting Hidden Transmission of Biometrics Using Authentication Watermarking , 2010, 2010 WASE International Conference on Information Engineering.

[281]  Lennart Berggren Iridology: A critical reveiw , 2009 .

[282]  Sheng-Wen Shih,et al.  Iris Recognition with Multi-Scale Edge-Type Matching , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[283]  Kar-Ann Toh,et al.  A Method to Enhance Face Biometric Security , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.

[284]  Andreas Uhl,et al.  Experimental study on the impact of robust watermarking on iris recognition accuracy , 2010, SAC '10.

[285]  Haiping Lu,et al.  Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.

[286]  Gérard D. Cohen,et al.  Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.

[287]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[288]  Dexin Zhang,et al.  Efficient iris recognition by characterizing key local variations , 2004, IEEE Transactions on Image Processing.

[289]  Emanuele Maiorana,et al.  Biometric cryptosystem using function based on-line signature recognition , 2010, Expert Syst. Appl..

[290]  Arun Ross,et al.  Iris Segmentation Using Geodesic Active Contours , 2009, IEEE Transactions on Information Forensics and Security.

[291]  Jiri Matas,et al.  On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..

[292]  Tieniu Tan,et al.  Combining Face and Iris Biometrics for Identity Verification , 2003, AVBPA.

[293]  Daesung Moon,et al.  Secure Remote Fingerprint Verification Using Dual Watermarks , 2005, DRMTICS.

[294]  A. Arakala SECURE AND PRIVATE FINGERPRINT-BASED AUTHENTICATION , 2009, Bulletin of the Australian Mathematical Society.

[295]  Nalini K. Ratha,et al.  Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[296]  Anil K. Jain,et al.  Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[297]  Yong Wang,et al.  ISAR Imaging of Rotating Target with Equal Changing Acceleration Based on the Cubic Phase Function , 2008, EURASIP J. Adv. Signal Process..

[298]  Xavier Boyen,et al.  Reusable cryptographic fuzzy extractors , 2004, CCS '04.

[299]  Dat Tran,et al.  Remote multimodal biometric authentication using bit priority-based fragile watermarking , 2008, 2008 19th International Conference on Pattern Recognition.

[300]  Karthik Nandakumar,et al.  A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[301]  A. Murat Tekalp,et al.  Robust watermarking of fingerprint images , 2002, Pattern Recognit..

[302]  Deepa Kundur Watermarking with Diversity: Insights and Implications , 2001, IEEE Multim..

[303]  Thad Welch,et al.  A new approach to iris pattern recognition , 2004, SPIE Security + Defence.

[304]  Nalini K. Ratha,et al.  An Analysis of Minutiae Matching Strength , 2001, AVBPA.

[305]  Mariusz Zubert,et al.  A reliable iris recognition algorithm based on reverse biorthogonal wavelet transform , 2012, Pattern Recognit. Lett..

[306]  Andrew Beng Jin Teoh,et al.  Replaceable and securely hashed keys from online signatures , 2006, IEICE Electron. Express.

[307]  R. Belaroussi,et al.  Multi-stage fusion for face localization , 2005, 2005 7th International Conference on Information Fusion.

[308]  Patrick J. Flynn,et al.  A Survey of Iris Biometrics Research: 2008-2010 , 2013, Handbook of Iris Recognition.

[309]  Tieniu Tan,et al.  Robust Encoding of Local Ordinal Measures: A General Framework of Iris Recognition , 2004, ECCV Workshop BioAW.

[310]  Gonzalo R. Arce,et al.  Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[311]  Babak Nadjar Araabi,et al.  Shape Analysis of Stroma for Iris Recognition , 2007, ICB.

[312]  R. Sanchez-Reillo,et al.  Iris recognition for biometric identification using dyadic wavelet transform zero-crossing , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).

[313]  Baba C. Vemuri,et al.  Shape Modeling with Front Propagation: A Level Set Approach , 1995, IEEE Trans. Pattern Anal. Mach. Intell..

[314]  Tieniu Tan,et al.  Robust Biometric Key Extraction Based on Iris Cryptosystem , 2009, ICB.

[315]  Naphtali Rishe,et al.  A computational efficient iris extraction approach in unconstrained environments , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[316]  Andreas Uhl,et al.  Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).

[317]  Rama Chellappa,et al.  Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[318]  Kyoil Chung,et al.  A Novel and Efficient Feature Extraction Method for Iris Recognition , 2007 .

[319]  N.B. Puhan,et al.  Robust eyeball segmentation in noisy iris images using fourier spectral density , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.

[320]  Andreas Uhl,et al.  Single-sensor multi-instance fingerprint and eigenfinger recognition using (weighted) score combination methods , 2009, Int. J. Biom..

[321]  J. Bringer,et al.  Anonymous identification with cancelable biometrics , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.

[322]  Loris Nanni,et al.  State of the art in Biometrics , 2011 .

[323]  P. Perona,et al.  Face Localization via Shape Statistics , 1995 .

[324]  John Daugman,et al.  High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..

[325]  Richa Singh,et al.  Improving biometric recognition accuracy and robustness using DWT and SVM watermarking , 2005, IEICE Electron. Express.

[326]  T. Charles Clancy,et al.  Secure smartcardbased fingerprint authentication , 2003, WBMA '03.

[327]  Andrew Beng Jin Teoh,et al.  Secure speech template protection in speaker verification system , 2010, Speech Commun..

[328]  Nasir D. Memon,et al.  Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.

[329]  George W. Quinn,et al.  IREX I: Performance of Iris Recognition Algorithms on Standard Images | NIST , 2009 .

[330]  Sung Bum Pan,et al.  Hiding Biometric Data for Secure Transmission , 2005, KES.

[331]  Jana Dittmann,et al.  Digital watermarking of biometric speech references: impact to the EER system performance , 2007, Electronic Imaging.

[332]  Jitendra Malik,et al.  Scale-Space and Edge Detection Using Anisotropic Diffusion , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[333]  Terrance E. Boult,et al.  Bipartite Biotokens: Definition, Implementation, and Analysis , 2009, ICB.

[334]  Andreas Uhl,et al.  Iris Recognition in Image Domain: Quality-Metric Based Comparators , 2012, ISVC.

[335]  K. Srinathan,et al.  Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[336]  Ralf Steinmetz,et al.  Approaches to biometric watermarks for owner authentification , 2001, IS&T/SPIE Electronic Imaging.

[337]  Peng Li,et al.  An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..

[338]  Arun Ross,et al.  Information fusion in fingerprint authentication , 2003 .

[339]  Wade Trappe,et al.  Introduction to Cryptography with Coding Theory (2nd Edition) , 2005 .

[340]  Tieniu Tan,et al.  Iris Localization via Pulling and Pushing , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[341]  D. Mumford,et al.  Optimal approximations by piecewise smooth functions and associated variational problems , 1989 .

[342]  Feng Hao,et al.  Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.

[343]  Mayank Vatsa,et al.  Reducing the False Rejection Rate of Iris Recognition Using Textural and Topological Features , 2008 .

[344]  Zhang Weidong,et al.  Key Binding Based on Biometric Shielding Functions , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[345]  Chun-Wei Tan,et al.  Automated segmentation of iris images using visible wavelength face images , 2011, CVPR 2011 WORKSHOPS.

[346]  Gabriel Taubin,et al.  Estimation of Planar Curves, Surfaces, and Nonplanar Space Curves Defined by Implicit Equations with Applications to Edge and Range Image Segmentation , 1991, IEEE Trans. Pattern Anal. Mach. Intell..

[347]  G. Padmavathi,et al.  Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault , 2009 .

[348]  Sudeep D. Thepade,et al.  Iris recognition using texture features extracted from Walshlet pyramid , 2011, ICWET.

[349]  Hamid R. Tizhoosh,et al.  IRIS Segmentation: Detecting Pupil, Limbus and Eyelids , 2006, 2006 International Conference on Image Processing.

[350]  Bernadette Dorizzi,et al.  Application of Biometrics to Obtain High Entropy Cryptographic Keys , 2009 .

[351]  Phalguni Gupta,et al.  An efficient indexing scheme for binary feature based biometric database , 2007, SPIE Defense + Commercial Sensing.

[352]  Donald M. Monro,et al.  Effects of Sampling and Compression on Human IRIS Verification , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[353]  Sangyoun Lee,et al.  Biometric Image Authentication using Watermarking , 2006, 2006 SICE-ICASE International Joint Conference.

[354]  Zhenan Sun,et al.  Coarse Iris Classification by Learned Visual Dictionary , 2007, ICB.

[355]  Bülent Sankur,et al.  Comparative evaluation of semifragile watermarking algorithms , 2004, J. Electronic Imaging.

[356]  Nalini K. Ratha,et al.  Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.

[357]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[358]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[359]  C. Rathgeb,et al.  Context-based texture analysis for secure revocable iris-biometric key generation , 2009, ICDP.

[360]  M. Milgram,et al.  Fusion of multiple detectors for face and eyes localization , 2005, ISPA 2005. Proceedings of the 4th International Symposium on Image and Signal Processing and Analysis, 2005..

[361]  Andreas Uhl,et al.  Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.

[362]  Xiaomin Wang,et al.  Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices , 2008 .

[363]  Ee-Chien Chang,et al.  Finding the original point set hidden among chaff , 2006, ASIACCS '06.

[364]  Nalini Ratha,et al.  An efficient, two-stage iris recognition system , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[365]  J. E. Bresenham,et al.  Algorithm for computer control of a digital plotter , 1965, IBM Syst. J..

[366]  Jaihie Kim,et al.  A Novel Method to Extract Features for Iris Recognition System , 2003, AVBPA.

[367]  Andy Adler,et al.  Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.

[368]  Nalini K. Ratha,et al.  A new approach for iris segmentation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[369]  Andrew Beng Jin Teoh,et al.  Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.

[370]  Edward J. Delp,et al.  A wavelet watermarking algorithm based on a tree structure , 2004, IS&T/SPIE Electronic Imaging.

[371]  Sharath Pankanti,et al.  Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.

[372]  L. R. Rabiner,et al.  A comparative study of several dynamic time-warping algorithms for connected-word recognition , 1981, The Bell System Technical Journal.

[373]  J. Daugman Two-dimensional spectral analysis of cortical receptive field profiles , 1980, Vision Research.

[374]  Andreas Uhl,et al.  Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems , 2010, ICIAR.

[375]  C. Tappert,et al.  A Survey of Binary Similarity and Distance Measures , 2010 .

[376]  Andreas Uhl,et al.  Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy , 2009, ICB.

[377]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[378]  P. Campisi,et al.  Biometric Signature Authentication Using Radon Transform-Based Watermarking Techniques , 2007, 2007 Biometrics Symposium.

[379]  George Wolberg,et al.  Image morphing: a survey , 1998, The Visual Computer.

[380]  Andrew Beng Jin Teoh,et al.  Iris Authentication Using Privatized Advanced Correlation Filter , 2006, ICB.

[381]  Andreas Uhl,et al.  Lossless Compression of Polar Iris Image Data , 2011, IbPRIA.

[382]  Natalia A. Schmid,et al.  Performance evaluation of iris-based recognition system implementing PCA and ICA encoding techniques , 2005, SPIE Defense + Commercial Sensing.

[383]  Bin Ma,et al.  Protecting Biometric Templates Using Authentication Watermarking , 2010, PCM.

[384]  Andrew Beng Jin Teoh,et al.  Biometric hash: high-confidence face recognition , 2006, IEEE Transactions on Circuits and Systems for Video Technology.

[385]  Libor Masek,et al.  Recognition of Human Iris Patterns for Biometric Identification , 2003 .

[386]  John Daugman,et al.  Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.

[387]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[388]  James L. Wayman,et al.  Technical Testing and Evaluation of Biometric Identification Devices , 1996 .

[389]  Andreas Uhl,et al.  Iris-biometric comparators: Minimizing trade-offs costs between computational performance and recognition accuracy , 2011, ICDP.

[390]  Andreas Uhl,et al.  Iris-sensor authentication using camera PRNU fingerprints , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).

[391]  Andrew Beng Jin Teoh,et al.  Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[392]  Alice J. O'Toole,et al.  FRVT 2006 and ICE 2006 large-scale results , 2007 .

[393]  Tieniu Tan,et al.  Efficient and robust segmentation of noisy iris images for non-cooperative iris recognition , 2010, Image Vis. Comput..

[394]  Mark J. Burge,et al.  Handbook of Iris Recognition , 2013, Advances in Computer Vision and Pattern Recognition.

[395]  Rui Chen,et al.  Iris segmentation for non-cooperative recognition systems , 2011 .

[396]  Ali Miri,et al.  A collusion attack on the fuzzy vault scheme , 2009, ISC Int. J. Inf. Secur..

[397]  Berrin A. Yanikoglu,et al.  Biometric Cryptosystem Using Online Signatures , 2006, ISCIS.

[398]  Vincenzo Piuri,et al.  Agent-based image iris segmentation and multiple views boundary refining , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[399]  J. Fridrich,et al.  Digital image forensics , 2009, IEEE Signal Processing Magazine.

[400]  Edward J. Delp,et al.  Multi-angle sclera recognition system , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[401]  Dr.K. Duraiswamy,et al.  Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature , 2010 .

[402]  Zhengyou Zhang,et al.  A Survey of Recent Advances in Face Detection , 2010 .

[403]  Richa Singh,et al.  Improving Iris Recognition Performance Using Segmentation, Quality Enhancement, Match Score Fusion, and Indexing , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[404]  Vladimir I. Levenshtein,et al.  Binary codes capable of correcting deletions, insertions, and reversals , 1965 .

[405]  J. Daugman,et al.  Epigenetic randomness, complexity and singularity of human iris patterns , 2001, Proceedings of the Royal Society of London. Series B: Biological Sciences.

[406]  Patrick J. Flynn,et al.  Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..

[407]  Kurt Horvath,et al.  Optimisation of JPEG XR Quantisation Settings in Iris Recognition Systems , 2012 .

[408]  Andrew W. Fitzgibbon,et al.  Direct Least Square Fitting of Ellipses , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[409]  Terrance E. Boult,et al.  Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[410]  A. Shanmugam,et al.  GENERATE A KEY FOR AES USING BIOMETRIC FOR VOIP NETWORK SECURITY , 2009 .

[411]  M. Dobes,et al.  Human eye localization using the modified Hough transform , 2006 .

[412]  Venu Govindaraju,et al.  Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.

[413]  Andrew Beng Jin Teoh,et al.  Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization , 2006, EURASIP J. Adv. Signal Process..

[414]  Andreas Uhl,et al.  Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.

[415]  Jinyu Zuo,et al.  A Robust IRIS Segmentation Procedure for Unconstrained Subject Presentation , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.

[416]  Anil K. Jain,et al.  Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..

[417]  Anil K. Jain,et al.  A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..

[418]  Cicero F. F. Costa Filho,et al.  Iris segmentation exploring color spaces , 2010, 2010 3rd International Congress on Image and Signal Processing.

[419]  Paul A. Watters,et al.  A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).

[420]  Sudeep D. Thepade,et al.  IRIS Recognition using Texture Features Extracted from Haarlet Pyramid , 2010 .

[421]  Bhagavatula Vijaya Kumar,et al.  Biometric Encryption using image processing , 1998, Electronic Imaging.

[422]  Andreas Uhl,et al.  Security analysis of a cancelable iris recognition system based on block remapping , 2011, 2011 18th IEEE International Conference on Image Processing.

[423]  Jian-ping Li,et al.  A Novel Biometric Image Integrity Authentication Using Fragile Watermarking and Arnold Transform , 2008 .

[424]  Lahouari Ghouti,et al.  Protecting Fingerprint Data Using Watermarking , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).

[425]  Pedro de Almeida,et al.  A knowledge-based approach to the iris segmentation problem , 2010, Image Vis. Comput..

[426]  Carlos Hitoshi Morimoto,et al.  Automatic Iris Segmentation Using Active Near Infra Red Lighting , 2005, XVIII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'05).

[427]  Carmen Sánchez Ávila,et al.  Biometric Fuzzy Extractor Scheme for Iris Templates , 2009, Security and Management.

[428]  T. Satonaka Biometric watermark authentication with multiple verification rule , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.

[429]  Tassos Dimitriou,et al.  Protecting Biometric Templates with Image Watermarking Techniques , 2007, ICB.

[430]  Jessica J. Fridrich,et al.  Managing a large database of camera fingerprints , 2010, Electronic Imaging.

[431]  Chulhan Lee,et al.  Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[432]  James A. Storer Image and Text Compression , 2012 .

[433]  Rainer Lienhart,et al.  Empirical Analysis of Detection Cascades of Boosted Classifiers for Rapid Object Detection , 2003, DAGM-Symposium.

[434]  Chris Roberts,et al.  Biometric attack vectors and defences , 2007, Comput. Secur..

[435]  Kang Ryoung Park,et al.  Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.

[436]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[437]  Peihua Li,et al.  Iris recognition in non-ideal imaging conditions , 2012, Pattern Recognit. Lett..

[438]  Anil K. Jain,et al.  Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.

[439]  Yair Frankel,et al.  On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[440]  Jing Dong,et al.  Effects of watermarking on iris recognition performance , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.

[441]  Andreas Uhl,et al.  Multi-stage Visible Wavelength and Near Infrared Iris Segmentation Framework , 2012, ICIAR.

[442]  S. Demea,et al.  Interface of an Iris Detection Program , 2007, 2007 30th International Spring Seminar on Electronics Technology (ISSE).

[443]  Donald M. Monro,et al.  An Evaluation of Image Sampling and Compression for Human Iris Recognition , 2007, IEEE Transactions on Information Forensics and Security.

[444]  Yingzi Du,et al.  Transforming traditional iris recognition systems to work on non-ideal situations , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.

[445]  Yingzi Du,et al.  Region-based SIFT approach to iris recognition , 2009 .

[446]  I. R. Babu,et al.  Performance of Iris Based Hard Fuzzy Vault , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.

[447]  Julien Bringer,et al.  The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..

[448]  Robert W. Ives,et al.  Binary Morphology and Local Statistics Applied to Iris Segmentation for Recognition , 2006, 2006 International Conference on Image Processing.

[449]  Richard P. Wildes,et al.  A machine-vision system for iris recognition , 2005, Machine Vision and Applications.

[450]  Fouad Khelifi,et al.  Region-Based Watermarking of Biometric Images: Case Study in Fingerprint Images , 2008, Int. J. Digit. Multim. Broadcast..

[451]  Dexin Zhang,et al.  DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[452]  Andreas Uhl,et al.  Context-based biometric key generation for Iris , 2011 .

[453]  W. Gareth J. Howells,et al.  Evaluating Biometric Encryption Key Generation Using Handwritten Signatures , 2008, 2008 Bio-inspired, Learning and Intelligent Systems for Security.

[454]  Vutipong Areekul,et al.  Efficient Iris Recognition Using Adaptive Quotient Thresholding , 2006, ICB.

[455]  Hiroshi Nakajima,et al.  A Phase-Based Iris Recognition Algorithm , 2006, ICB.

[456]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[457]  Florence Rossant,et al.  Iris features extraction using wavelet packets , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[458]  F.W. Wheeler,et al.  Stand-off Iris Recognition System , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.

[459]  Daesung Moon,et al.  Dictionary Attack on Functional Transform‐Based Cancelable Fingerprint Templates , 2009 .

[460]  John Daugman,et al.  Biometric decision landscapes , 2000 .

[461]  Ingrid Verbauwhede,et al.  Secure IRIS Verification , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.

[462]  Peihua Li,et al.  Robust and accurate iris segmentation in very noisy iris images , 2010, Image Vis. Comput..

[463]  Hervé Sibert,et al.  Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes , 2007, ICB.

[464]  Tieniu Tan,et al.  Improving iris recognition accuracy via cascaded classifiers , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[465]  Sharath Pankanti,et al.  Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.

[466]  Nalini K. Ratha,et al.  A Secure Protocol for Data Hiding in Compressed Fingerprint Images , 2004, ECCV Workshop BioAW.

[467]  David Zhang,et al.  A Novel Method for Coarse Iris Classification , 2006, ICB.

[468]  Yuqing He,et al.  A fast iris image quality evaluation method based on weighted entropy , 2007, Applied Optics and Photonics China.

[469]  Hugo Proença,et al.  Iris Recognition: On the Segmentation of Degraded Images Acquired in the Visible Wavelength , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[470]  Kenta Takahashi,et al.  Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[471]  Luís A. Alexandre,et al.  A Method for the Identification of Noisy Regions in Normalized Iris Images , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[472]  Lionel Torres,et al.  Person Identification Technique Using Human Iris Recognition , 2002 .

[473]  Elisardo González-Agulla,et al.  Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth , 2008, Electronic Imaging.

[474]  Andreas Uhl,et al.  Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking , 2011, Communications and Multimedia Security.

[475]  Patrick J. Flynn,et al.  Comments on the CASIA version 1.0 Iris Data Set , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[476]  D. Denton The Royal Society of London , 1965, Nature.

[477]  T.E. Boult,et al.  Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.

[478]  Andreas Uhl,et al.  Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.

[479]  Shing-Chow Chan,et al.  Designing JPEG quantization matrix using rate-distortion approach and human visual system model , 1997, Proceedings of ICC'97 - International Conference on Communications.

[480]  John Daugman,et al.  IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE , 2004 .

[481]  Simon Lucey,et al.  Face alignment through subspace constrained mean-shifts , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[482]  Jorge Guajardo,et al.  Efficient strategies to play the indistinguishability game for fuzzy sketches , 2010, 2010 IEEE International Workshop on Information Forensics and Security.

[483]  Md. Rajibul Islam,et al.  Biometric template protection using watermarking with hidden password encryption , 2008, 2008 International Symposium on Information Technology.

[484]  Karel J. Zuiderveld,et al.  Contrast Limited Adaptive Histogram Equalization , 1994, Graphics Gems.

[485]  Arun Ross,et al.  Multispectral Iris Analysis: A Preliminary Study51 , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[486]  Yanggon Kim,et al.  Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[487]  Anil K. Jain,et al.  Localized Iris Image Quality Using 2-D Wavelets , 2006, ICB.

[488]  Yingzi Du,et al.  A Selective Feature Information Approach for Iris Image-Quality Measure , 2008, IEEE Transactions on Information Forensics and Security.

[489]  Andreas Uhl,et al.  Semi-fragile Watermarking in Biometric Systems: Template Self-Embedding , 2011, CAIP.

[490]  Andreas Uhl,et al.  Shifting score fusion: on exploiting shifting variation in iris recognition , 2011, SAC '11.

[491]  Zhe-Ming Lu,et al.  A Joint Biometrics and Watermarking Based Framework for Fingerprinting, Copyright Protection, Proof of Ownership, and Security Applications , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[492]  K. P. Soman,et al.  Towards generating irrevocable key for cryptography from cancelable fingerprints , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[493]  Wayne J. Salamon,et al.  IREX II - IQCE :: iris quality calibration and evaluation : performance of iris image quality assessment algorithms , 2011 .

[494]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[495]  Mariusz Zubert,et al.  Reliable algorithm for iris segmentation in eye image , 2010, Image Vis. Comput..

[496]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[497]  John Daugman,et al.  The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..

[498]  Andreas Uhl,et al.  Incremental iris recognition: A single-algorithm serial fusion strategy to optimize time complexity , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[499]  Claus Vielhauer,et al.  Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.

[500]  Anton H. M. Akkermans,et al.  A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem , 2009, DPM/SETOP.

[501]  R.W. Ives,et al.  Effect of Image Compression on Iris Recognition , 2005, 2005 IEEE Instrumentationand Measurement Technology Conference Proceedings.

[502]  Andrew Beng Jin Teoh,et al.  Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.

[503]  Yevgeniy Dodis,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.

[504]  Matthew N. Dailey,et al.  Iris recognition performance enhancement using weighted majority voting , 2008, 2008 15th IEEE International Conference on Image Processing.

[505]  David J. Kriegman,et al.  Localizing parts of faces using a consensus of exemplars , 2011, CVPR.

[506]  Andrew Teoh Beng Jin,et al.  High security Iris verification system based on random secret integration , 2006 .

[507]  Andreas Uhl,et al.  Enhancing Iris Matching Using Levenshtein Distance with Alignment Constraints , 2010, ISVC.

[508]  Lu Wang,et al.  A robust segmentation approach to iris recognition based on video , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.

[509]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[510]  Gin-Der Wu,et al.  Image Watermarking Using Structure Based Wavelet Tree Quantization , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).

[511]  Sridha Sridharan,et al.  Fusing shrinking and expanding active contour models for robust iris segementation , 2010, 10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010).

[512]  Mauro Barni,et al.  eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.

[513]  Venu Govindaraju,et al.  A Robust Iris Localization Method Using an Active Contour Model and Hough Transform , 2010, 2010 20th International Conference on Pattern Recognition.

[514]  Michael W. Marcellin,et al.  JPEG2000 - image compression fundamentals, standards and practice , 2013, The Kluwer international series in engineering and computer science.

[515]  Nalini K. Ratha,et al.  Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.

[516]  Rafail Ostrovsky,et al.  Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..

[517]  Randy P. Broussard,et al.  Using artificial neural networks and feature saliency to identify iris measurements that contain the most discriminatory information for iris segmentation , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.

[518]  Tieniu Tan,et al.  A new iris segmentation method for recognition , 2004, ICPR 2004.

[519]  Raymond N. J. Veldhuis,et al.  Binary Representations of Fingerprint Spectral Minutiae Features , 2010, 2010 20th International Conference on Pattern Recognition.

[520]  Robyn A. Owens,et al.  Location of the pupil-iris border in slit-lamp images of the cornea , 1999, Proceedings 10th International Conference on Image Analysis and Processing.

[521]  Daesung Moon,et al.  Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.

[522]  Daesung Moon,et al.  Fuzzy fingerprint vault using multiple polynomials , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.

[523]  Patrick J. Flynn,et al.  Experiments with an improved iris segmentation algorithm , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[524]  James R. Matey,et al.  Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments , 2006, Proceedings of the IEEE.

[525]  Norimichi Tsumura,et al.  Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.

[526]  Guillermo Sapiro,et al.  The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS , 2000, IEEE Trans. Image Process..

[527]  Josef Kittler,et al.  Proceedings of the 4th international conference on Audio- and video-based biometric person authentication , 2003 .

[528]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[529]  Parham Aarabi,et al.  Face detection using information fusion , 2007, 2007 10th International Conference on Information Fusion.

[530]  Andrew Beng Jin Teoh,et al.  Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[531]  Tony F. Chan,et al.  Active contours without edges , 2001, IEEE Trans. Image Process..

[532]  Nalini K. Ratha,et al.  Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[533]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[534]  Dongho Won,et al.  The Vulnerabilities Analysis of Fuzzy Vault Using Password , 2008, 2008 Second International Conference on Future Generation Communication and Networking.

[535]  Kai Yang,et al.  A multi-stage approach for non-cooperative iris recognition , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.

[536]  James R. Cooper,et al.  Locating the Iris: A First Step to Registration and Identification , 2003, SIP.

[537]  Tom E. Bishop,et al.  Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[538]  Alex Stoianov,et al.  Chapter 26. Biometric Encryption: The New Breed of Untraceable Biometrics , 2009 .