Iris Biometric Cryptosystems
暂无分享,去创建一个
Andreas Uhl | Christian Rathgeb | Peter Wild | A. Uhl | C. Rathgeb | P. Wild | Peter Wild
[1] Paul A. Viola,et al. Robust Real-Time Face Detection , 2001, International Journal of Computer Vision.
[2] Yongwha Chung,et al. Analyzing the Secure and Energy Efficient Transmissions of Compressed Fingerprint Images using Encryption and Watermarking , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[3] A. Ross,et al. Segmenting Non-Ideal Irises Using Geodesic Active Contours , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[4] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[5] David J. Kriegman,et al. From Few to Many: Illumination Cone Models for Face Recognition under Variable Lighting and Pose , 2001, IEEE Trans. Pattern Anal. Mach. Intell..
[6] Hugo Proença,et al. Iris Recognition: A Method to Segment Visible Wavelength Iris Images Acquired On-the-Move and At-a-Distance , 2008, ISVC.
[7] Yide Ma,et al. A novel method for iris feature extraction based on intersecting cortical model network , 2008 .
[8] Andreas Uhl,et al. Image metric-based biometric comparators: A supplement to feature vector-based Hamming distance? , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[9] C. Newman. A life revealed , 2002 .
[10] Pengfei Shi,et al. PKI Key Generation Based on Iris Features , 2008, 2008 International Conference on Computer Science and Software Engineering.
[11] Richard P. Wildes,et al. Iris recognition: an emerging biometric technology , 1997, Proc. IEEE.
[12] Ajay Kumar,et al. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..
[13] Ingrid Verbauwhede,et al. Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[14] Sheila S. Hemami,et al. Natural image utility assessment using image contours , 2009, 2009 16th IEEE International Conference on Image Processing (ICIP).
[15] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[16] Mo Chen,et al. Modification of standard image compression methods for correlation-based pattern recognition , 2004 .
[17] Andreas Uhl,et al. Privacy Preserving Key Generation for Iris Biometrics , 2010, Communications and Multimedia Security.
[18] Ee-Chien Chang,et al. Robust, short and sensitive authentication tags using secure sketch , 2006, MM&Sec '06.
[19] Wen-Shiung Chen,et al. A novel personal biometric authentication technique using human iris based on fractal dimension features , 2003, 2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03)..
[20] J. Forrester,et al. The Eye: Basic Sciences in Practice , 2002 .
[21] Andrew Beng Jin Teoh,et al. Application-Specific Key Release Scheme from Biometrics , 2008, Int. J. Netw. Secur..
[22] Andreas Uhl,et al. Bit Reliability-driven Template Matching in Iris Recognition , 2010, 2010 Fourth Pacific-Rim Symposium on Image and Video Technology.
[23] Berk Sunar,et al. Differential template attacks on PUF enabled cryptographic devices , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[24] Muhammad Khurram Khan,et al. Robust Hiding of Fingerprint-Biometric Data into Audio Signals , 2007, ICB.
[25] Jana Dittmann,et al. Using adapted Levenshtein distance for on-line signature authentication , 2004, ICPR 2004.
[26] Andreas Uhl,et al. Computationally Efficient Serial Combination of Rotation-invariant and Rotation Compensating Iris Recognition Algorithms , 2010, VISAPP.
[27] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[28] A. Uhl,et al. An iris-based Interval-Mapping scheme for Biometric Key generation , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[29] Alan C. Bovik,et al. Image information and visual quality , 2006, IEEE Trans. Image Process..
[30] Ali M. Reza,et al. Realization of the Contrast Limited Adaptive Histogram Equalization (CLAHE) for Real-Time Image Enhancement , 2004, J. VLSI Signal Process..
[31] Jesús Angulo,et al. Robust iris segmentation on uncalibrated noisy images using mathematical morphology , 2010, Image Vis. Comput..
[32] Michele Nappi,et al. IS_IS: Iris Segmentation for Identification Systems , 2010, 2010 20th International Conference on Pattern Recognition.
[33] Tieniu Tan,et al. A fast and robust iris localization method based on texture segmentation , 2004, SPIE Defense + Commercial Sensing.
[34] Stephanie Schuckers,et al. Active shape models for effective iris segmentation , 2006, SPIE Defense + Commercial Sensing.
[35] Yair Frankel,et al. On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .
[36] Husrev T. Sencar,et al. A study of the robustness of PRNU-based camera identification , 2009, Electronic Imaging.
[37] Libor Masek,et al. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .
[38] Julian Fiérrez,et al. Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[39] Hugo Proença,et al. On the Role of Interpolation in the Normalization of Non-ideal Visible Wavelength Iris Images , 2009, 2009 International Conference on Computational Intelligence and Security.
[40] Fabio Scotti,et al. Noisy iris segmentation with boundary regularization and reflections removal , 2010, Image Vis. Comput..
[41] Ajay Kumar,et al. A palmprint-based cryptosystem using double encryption , 2008, SPIE Defense + Commercial Sensing.
[42] Ee-Chien Chang,et al. Hiding Secret Points Amidst Chaff , 2006, EUROCRYPT.
[43] Zeno J M H Geradts,et al. Source Camera Identification for Heavily JPEG Compressed Low Resolution Still Images * , 2009, Journal of forensic sciences.
[44] Arun Ross,et al. Exploring multispectral iris recognition beyond 900nm , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[45] Luca Bogoni,et al. Iris Recognition at a Distance , 2005, AVBPA.
[46] Chul-Hyun Park,et al. Extracting and Combining Multimodal Directional Iris Features , 2006, ICB.
[47] Yingzi Du,et al. Transforming Traditional Iris Recognition Systems to Work in Nonideal Situations , 2009, IEEE Transactions on Industrial Electronics.
[48] Deepa Kundur,et al. Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[49] J. Ortega-Garcia,et al. Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[50] H. Farid,et al. Image forgery detection , 2009, IEEE Signal Processing Magazine.
[51] Qi Li,et al. Using voice to generate cryptographic keys , 2001, Odyssey.
[52] Frank Bossen,et al. Digital signature of color images using amplitude modulation , 1997, Electronic Imaging.
[53] Andreas Uhl,et al. Robust watermarking in iris recognition: application scenarios and impact on recognition performance , 2011, SIAP.
[54] William A. Pearlman,et al. A new, fast, and efficient image codec based on set partitioning in hierarchical trees , 1996, IEEE Trans. Circuits Syst. Video Technol..
[55] Nasir D. Memon,et al. Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[56] Ralf Steinmetz,et al. Handwriting: Feature Correlation Analysis for Biometric Hashes , 2004, EURASIP J. Adv. Signal Process..
[57] Andrzej Napieralski,et al. Hardware Architecture Optimized for Iris Recognition , 2011, IEEE Transactions on Circuits and Systems for Video Technology.
[58] Zhang Tao,et al. Side-Channel Attack on Biometric Cryptosystem Based on Keystroke Dynamics , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[59] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[60] Andreas Uhl,et al. Weighted adaptive Hough and ellipsopolar transforms for real-time iris segmentation , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[61] Kevin W. Bowyer. The results of the NICE.II Iris biometrics competition , 2012, Pattern Recognit. Lett..
[62] A. Kannammal,et al. A secure cryptosystem from palm vein biometrics , 2009, ICIS.
[63] Pieter H. Hartel,et al. Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.
[64] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[65] Mo Chen,et al. Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification , 2011, IEEE Trans. Inf. Forensics Secur..
[66] Siwei Luo,et al. An efficient iris recognition system , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.
[67] Andreas Uhl,et al. Comparison of compression algorithms' impact on iris recognition accuracy II: revisiting JPEG , 2008, Electronic Imaging.
[68] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[69] Iuon-Chang Lin,et al. Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..
[70] Yu Liang,et al. A Method for Face and Iris Feature Fusion in Identity Authentication , 2006 .
[71] Kostas E. Bekris,et al. A Proposed Digital Rights Management System for 3D Graphics Using Biometric Watermarks , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.
[72] Emanuele Maiorana,et al. Secure Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography , 2007 .
[73] Raymond N. J. Veldhuis,et al. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.
[74] Babak Nadjar Araabi,et al. Iris Recognition for Partially Occluded Images: Methodology and Sensitivity Analysis , 2007, EURASIP J. Adv. Signal Process..
[75] Alan Hanjalic,et al. Eye localization for face matching: is it always useful and under what conditions? , 2008, CIVR '08.
[76] Daniel P. Lopresti,et al. Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices , 2002, USENIX Security Symposium.
[77] Venu Govindaraju,et al. Symmetric hash functions for secure fingerprint biometric systems , 2007, Pattern Recognit. Lett..
[78] Sokratis K. Katsikas,et al. Side Channel Analysis on Biometric-based Key Generation Algorithms on Resource Constrained Devices , 2006, Int. J. Netw. Secur..
[79] John Daugman. How iris recognition works , 2004 .
[80] Shree K. Nayar,et al. Eyes for relighting , 2004, SIGGRAPH 2004.
[81] Naphtali Rishe,et al. A highly accurate and computationally efficient approach for unconstrained iris segmentation , 2010, Image Vis. Comput..
[82] Christopher M. Bishop,et al. Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .
[83] Christoph Busch,et al. A Reference Architecture for Biometric Template Protection based on Pseudo Identities , 2008, BIOSIG.
[84] Andreas Uhl,et al. Rotation-invariant Iris Recognition - Boosting 1D Spatial-domain Signatures to 2D , 2008, ICINCO-SPSMC.
[85] Su Fei,et al. Cracking Cancelable Fingerprint Template of Ratha , 2008, ISCSCT.
[86] Richa Singh,et al. Enhancing security of fingerprints through contextual biometric watermarking. , 2007, Forensic science international.
[87] James J. Filliben,et al. Robust Iris Recognition Baseline for the Grand Challenge , 2011 .
[88] Jessica J. Fridrich,et al. Large scale test of sensor fingerprint camera identification , 2009, Electronic Imaging.
[89] Randy P. Broussard,et al. Effects of image compression on iris recognition system performance , 2008, J. Electronic Imaging.
[90] Raymond N. J. Veldhuis,et al. Pseudo Identities Based on Fingerprint Characteristics , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[91] Andrew Beng Jin Teoh,et al. Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..
[92] Kai Wang,et al. Fast and accurate iris segmentation based on linear basis function and RANSAC , 2011, 2011 18th IEEE International Conference on Image Processing.
[93] Wanqing Li,et al. Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[94] Nasir D. Memon,et al. How to protect biometric templates , 2007, Electronic Imaging.
[95] Ping-Sing Tsai,et al. JPEG: Still Image Compression Standard , 2005 .
[96] Valérie Fiolet,et al. Optimization of an Hough transform algorithm for the search of a center , 2008, Pattern Recognit..
[97] Yongdong Wu,et al. Transforming a pattern identifier into biometric key generators , 2010, 2010 IEEE International Conference on Multimedia and Expo.
[98] Yingzi Du,et al. Iris Recognition: The Consequences of Image Compression , 2010, EURASIP J. Adv. Signal Process..
[99] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[100] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[101] Amjad Zaim. Automatic segmentation of iris images for the purpose of identification , 2005, IEEE International Conference on Image Processing 2005.
[102] Mo Chen,et al. Sensor noise camera identification: countering counter-forensics , 2010, Electronic Imaging.
[103] Babak Nadjar Araabi,et al. Robust Iris Verification Based on Local and Global Variations , 2010, EURASIP J. Adv. Signal Process..
[104] James S. Duncan,et al. Game-Theoretic Integration for Image Segmentation , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[105] Bhagavatula Vijaya Kumar,et al. Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.
[106] Mauro Barni,et al. Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..
[107] Arun Ross,et al. Handbook of Biometrics , 2007 .
[108] John Daugman,et al. Effect of Severe Image Compression on Iris Recognition Performance , 2008, IEEE Transactions on Information Forensics and Security.
[109] Michael K. Reiter,et al. Towards practical biometric key generation with randomized biometric templates , 2008, CCS.
[110] Umut Uludag,et al. A Spatial Method for Watermarking of Fingerprint Images , 2001, PRIS.
[111] B. Dorizzi,et al. A new probabilistic Iris Quality Measure for comprehensive noise detection , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[112] Chulhan Lee,et al. Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[113] Alessandro Neri,et al. User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.
[114] Yongdong Zhang,et al. Visual security evaluation for video encryption , 2010, ACM Multimedia.
[115] Shin'ichi Satoh,et al. A hybrid classifier for precise and robust eye detection , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[116] A. Uhl,et al. The State-of-the-Art in Iris Biometric Cryptosystems , 2011 .
[117] Jie Yang,et al. A robust method for eye features extraction on color image , 2005, Pattern Recognit. Lett..
[118] Xiaobo Zhang,et al. Noisy iris image matching by using multiple cues , 2012, Pattern Recognit. Lett..
[119] Stan Z. Li,et al. Near Infrared Face Based Biometric Key Binding , 2009, ICB.
[120] Raymond N. J. Veldhuis,et al. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source , 2010, Defense + Commercial Sensing.
[121] Ee-Chien Chang,et al. Fuzzy extractors for asymmetric biometric representations , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[122] Jinyu Zuo,et al. An Automatic Algorithm for Evaluating the Precision of Iris Segmentation , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[123] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[124] T.E. Boult,et al. Bio-cryptographic protocols with bipartite biotokens , 2008, 2008 Biometrics Symposium.
[125] Andreas Uhl,et al. Parallel versus Serial Classifier Combination for Multibiometric Hand-Based Identification , 2009, ICB.
[126] Touradj Ebrahimi,et al. JJ2000: The JPEG 2000 Reference Implementation in Java , 2003 .
[127] Santanu Chaudhury,et al. Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[128] Stephanie Schuckers,et al. Iris quality assessment and bi-orthogonal wavelet based encoding for recognition , 2009, Pattern Recognit..
[129] Frans M. J. Willems,et al. Identification and secret-key binding in binary-symmetric template-protected biometric systems , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[130] Pieter H. Hartel,et al. Constructing practical Fuzzy Extractors using QIM , 2007 .
[131] Timothy F. Cootes,et al. A Multi-Stage Approach to Facial Feature Detection , 2004, BMVC.
[132] A. Uhl,et al. Evolutionary optimization of JPEG quantization tables for compressing iris polar images in iris recognition systems , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[133] Yingzi Du,et al. Using 2D Log-Gabor spatial filters for iris recognition , 2006, SPIE Defense + Commercial Sensing.
[134] Natalia A. Schmid,et al. Image quality assessment for iris biometric , 2006, SPIE Defense + Commercial Sensing.
[135] Stelvio Cimato,et al. A Multi-biometric Verification System for the Privacy Protection of Iris Templates , 2008, CISIS.
[136] Boualem Boashash,et al. A human identification technique using images of the iris and wavelet transform , 1998, IEEE Trans. Signal Process..
[137] F. Dufaux,et al. The JPEG XR image coding standard [Standards in a Nutshell] , 2009, IEEE Signal Processing Magazine.
[138] Tieniu Tan,et al. Toward Accurate and Fast Iris Segmentation for Iris Biometrics , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[139] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[140] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[141] Fouad Khelifi,et al. An Efficient Watermarking Technique for the Protection of Fingerprint Images , 2008, EURASIP J. Inf. Secur..
[142] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[143] P.V.C. Hough,et al. Machine Analysis of Bubble Chamber Pictures , 1959 .
[144] Kazuyoshi Itoh,et al. Wavelength- and Time-Selective Reconfigurable Optical Add/Drop Multiplexer Using Time-Frequency Domain Processing , 2010, EURASIP J. Adv. Signal Process..
[145] Jun Kong,et al. A novel image hiding approach based on correlation analysis for secure multimodal biometrics , 2010, J. Netw. Comput. Appl..
[146] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[147] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[148] John Daugman,et al. Iris Recognition at Airports and Border-Crossings , 2009, Encyclopedia of Biometrics.
[149] Carmen C. Y. Poon,et al. A fast key generation method based on dynamic biometrics to secure wireless body sensor networks for p-health , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[150] Jamal Ahmad Dargham,et al. Iris recognition using self-organizing neural network , 2002, Student Conference on Research and Development.
[151] Claus Vielhauer,et al. Biometric hashing for handwriting: entropy-based feature selection and semantic fusion , 2008, Electronic Imaging.
[152] Arun Ross,et al. Iris Recognition: The Path Forward , 2010, Computer.
[153] Yingzi Du,et al. Video-Based Noncooperative Iris Image Segmentation , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[154] Pengfei Shi,et al. A Robust and Accurate Method for Pupil Features Extra , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[155] Christoph Busch,et al. Renewable Minutiae Templates with Tunable Size and Security , 2010, 2010 20th International Conference on Pattern Recognition.
[156] Andrew Beng Jin Teoh,et al. Fusion of LSB and DWT Biometric Watermarking Using Offline Handwritten Signature for Copyright Protection , 2009, ICB.
[157] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[158] A. Uhl,et al. Experimental study on lossless compression of biometric sample data , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[159] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.
[160] Ching-Han Chen,et al. High performance iris recognition based on LDA and LPCC , 2005, 17th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'05).
[161] Daesung Moon,et al. Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems , 2005, CIS.
[162] D. Monro,et al. Pupil Shape Description Using Fourier Series , 2007 .
[163] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[164] Chih-Ming Hsieh,et al. Personal Identification with Human Iris Recognition based on Wavelet Transform , 2005, MVA.
[165] Andreas Uhl,et al. An effective and efficient visual quality index based on local edge gradients , 2011, 3rd European Workshop on Visual Information Processing.
[166] Ching Y. Suen,et al. Segmentation of Unideal Iris Images Using Game Theory , 2010, 2010 20th International Conference on Pattern Recognition.
[167] Kevin W. Bowyer,et al. Experimental evidence of a template aging effect in iris biometrics , 2011, 2011 IEEE Workshop on Applications of Computer Vision (WACV).
[168] Andreas Uhl,et al. Secure Iris Recognition Based on Local Intensity Variations , 2010, ICIAR.
[169] John Daugman,et al. Statistical Richness of Visual Phase Information: Update on Recognizing Persons by Iris Patterns , 2001, International Journal of Computer Vision.
[170] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[171] P. Jonathon Phillips,et al. An Automated Video-Based System for Iris Recognition , 2009, ICB.
[172] Nalini Ratha,et al. SLIC: Short-length iris codes , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[173] George W. Quinn,et al. IREX III: Performance of Iris Identification Algorithms , 2012 .
[174] Wayne J. Ryan,et al. Adapting Starburst for Elliptical Iris Segmentation , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[175] Arun Ross,et al. Protecting Iris Images through Asymmetric Digital Watermarking , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.
[176] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[177] Jutta Hämmerle-Uhl,et al. Improving Compressed Iris Recognition Accuracy Using JPEG2000 RoI Coding , 2009, ICB.
[178] P. Kronfeld. The Gross Anatomy and Embryology of the Eye , 1962 .
[179] Luís A. Alexandre,et al. Toward Covert Iris Biometric Recognition: Experimental Results From the NICE Contests , 2012, IEEE Transactions on Information Forensics and Security.
[180] Kar-Ann Toh,et al. Secure biometric-key generation with biometric helper , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.
[181] Andreas Uhl,et al. Effects of JPEG XR Compression Settings on Iris Recognition Systems , 2011, CAIP.
[182] Xianghua Yao,et al. Iris recognition based on multialgorithmic fusion , 2007 .
[183] Paul A. Viola,et al. Rapid object detection using a boosted cascade of simple features , 2001, Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001.
[184] Julien Bringer,et al. Binary feature vector fingerprint representation from minutiae vicinities , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[185] Liu Hui,et al. Wavelet Tree Quantization-Based Biometric Watermarking for Offline Handwritten Signature , 2009, 2009 International Asia Symposium on Intelligent Interaction and Affective Computing.
[186] Peter Kovesi,et al. Image Features from Phase Congruency , 1995 .
[187] Andreas Uhl,et al. Experiments on improving lossless compression of biometric iris sample data , 2011, 2011 18th International Conference on Systems, Signals and Image Processing.
[188] Dexin Zhang,et al. Personal Identification Based on Iris Texture Analysis , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[189] Frans M. J. Willems,et al. Achieving Secure Fuzzy Commitment Scheme for Optical PUFs , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[190] Xiaobo Zhang,et al. Texture removal for adaptive level set based iris segmentation , 2010, 2010 IEEE International Conference on Image Processing.
[191] Kenta Takahashi,et al. Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.
[192] David Zhang,et al. Accurate iris segmentation based on novel reflection and eyelash detection model , 2001, Proceedings of 2001 International Symposium on Intelligent Multimedia, Video and Speech Processing. ISIMP 2001 (IEEE Cat. No.01EX489).
[193] Javier Ortega-Garcia,et al. Iris recognition based on SIFT features , 2009, 2009 First IEEE International Conference on Biometrics, Identity and Security (BIdS).
[194] Andreas Uhl,et al. Transforming Rectangular and Polar Iris Images to Enable Cancelable Biometrics , 2010, ICIAR.
[195] Andreas Uhl,et al. Combining Face with Face-Part Detectors under Gaussian Assumption , 2012, ICIAR.
[196] Andreas Uhl,et al. Iris-biometric comparators: Exploiting comparison scores towards an optimal alignment under Gaussian assumption , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[197] Tung-Shou Chen,et al. A simple and efficient watermark technique based on JPEG2000 Codec , 2004, Multimedia Systems.
[198] Bojan Cukic,et al. An automated method for predicting iris segmentation failures , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[199] Yongjin Wang,et al. Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.
[200] Tsuhan Chen,et al. Optimal thresholding for key generation based on biometrics , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[201] Luís A. Alexandre,et al. Toward Noncooperative Iris Recognition: A Classification Approach Using Multiple Signatures , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[202] Richard P. Wildes,et al. Reliable and fast eye finding in close-up images , 2002, Object recognition supported by user interaction for service robots.
[203] Ira S. Moskowitz,et al. Composite signature based watermarking for fingerprint authentication , 2005, MM&Sec '05.
[204] Raymond N. J. Veldhuis,et al. Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[205] Ferhaoui Chafia,et al. A biometric crypto-system for authentication , 2010, 2010 International Conference on Machine and Web Intelligence.
[206] Qiu-Liang Xu,et al. An Improved Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).
[207] Andreas Uhl,et al. On Combining Selective Best Bits of Iris-Codes , 2011, BIOID.
[208] Loris Nanni,et al. Combining Face and Eye Detectors in a High- Performance Face-Detection System , 2012, IEEE MultiMedia.
[209] Frans M. J. Willems,et al. Information Leakage in Fuzzy Commitment Schemes , 2010, IEEE Transactions on Information Forensics and Security.
[210] Ali M. Al-Khouri,et al. Iris recognition and the challenge of homeland and border control security in UAE , 2008, Telematics Informatics.
[211] Randy P. Broussard,et al. Using Artificial Neural Networks and Feature Saliency Techniques for Improved Iris Segmentation , 2007, 2007 International Joint Conference on Neural Networks.
[212] Luís A. Alexandre,et al. The UBIRIS.v2: A Database of Visible Wavelength Iris Images Captured On-the-Move and At-a-Distance , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[213] Richa Singh,et al. Robust biometric image watermarking for fingerprint and face template protection , 2006, IEICE Electron. Express.
[214] Kang Ryoung Park,et al. A Study on Iris Feature Watermarking on Face Data , 2007, ICANNGA.
[215] A. Uhl,et al. Recognition impact of JPEG2000 Part 2 wavelet packet subband structures in polar iris image compression , 2012, 2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP).
[216] John Daugman,et al. New Methods in Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[217] Pengfei Shi,et al. A new segmentation approach for iris recognition based on hand-held capture device , 2007, Pattern Recognit..
[218] Sung-Hyuk Cha,et al. Enhancing Binary Feature Vector Similarity Measures , 2006 .
[219] Won-gyum Kim,et al. Multimodal biometric image watermarking using two-stage integrity verification , 2009, Signal Process..
[220] J. Daugman. Uncertainty relation for resolution in space, spatial frequency, and orientation optimized by two-dimensional visual cortical filters. , 1985, Journal of the Optical Society of America. A, Optics and image science.
[221] Qiang Ji,et al. Automatic Eye Detection and Its Validation , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Workshops.
[222] Randy P. Broussard,et al. Iris image segmentation and sub-optimal images , 2010, Image Vis. Comput..
[223] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[224] Narendra Ahuja,et al. A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[225] Arun Ross,et al. Biometric template security: Challenges and solutions , 2005, 2005 13th European Signal Processing Conference.
[226] Mihran Tuceryan,et al. Moment based texture segmentation , 1992, Proceedings., 11th IAPR International Conference on Pattern Recognition. Vol. III. Conference C: Image, Speech and Signal Analysis,.
[227] Rui Wang,et al. Fusion of Near Infrared Face and Iris Biometrics , 2007, ICB.
[228] David Zhang,et al. A cryptosystem based on palmprint feature , 2008, 2008 19th International Conference on Pattern Recognition.
[229] M.Y. Javed,et al. Iris localization via intensity gradient and recognition through bit planes , 2007, 2007 International Conference on Machine Vision.
[230] Michael K. Reiter,et al. The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.
[231] Amar Singh,et al. FUSION OF IRIS AND FINGERPRINT BIOMETRIC FOR RECOGNITION , 2013 .
[232] Bernadette Dorizzi,et al. Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, CVPR.
[233] Andreas Uhl,et al. Custom JPEG Quantization for Improved Iris Recognition Accuracy , 2009, SEC.
[234] Min Wu,et al. Security evaluation for communication-friendly encryption of multimedia , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[235] Arun Ross,et al. From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[236] Hyun-Sik Ahn,et al. JPEG Quantization Table Design for Face Images and Its Application to Face Recognition , 2006, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[237] Andreas Uhl,et al. Attack against Robust Watermarking-Based Multimodal Biometric Recognition Systems , 2011, BIOID.
[238] Richa Singh,et al. Feature based RDWT watermarking for multimodal biometric system , 2009, Image Vis. Comput..
[239] A. Stoianov,et al. Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[240] Norimichi Tsumura,et al. BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes , 2010, IEICE Trans. Inf. Syst..
[241] Andreas Uhl,et al. Watermarking as a Means to Enhance Biometric Systems: A Critical Survey , 2011, Information Hiding.
[242] Bruce A. Draper,et al. Overview of the Multiple Biometrics Grand Challenge , 2009, ICB.
[243] Andreas Uhl,et al. Survey of wavelet-domain watermarking algorithms , 2001, IS&T/SPIE Electronic Imaging.
[244] Nicolas H. Younan,et al. An image-adaptive watermark based on a redundant wavelet transform , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[245] Luís A. Alexandre,et al. Iris segmentation methodology for non-cooperative recognition , 2006 .
[246] Andreas Uhl,et al. Comparison of Compression Algorithms' Impact on Iris Recognition Accuracy , 2007, ICB.
[247] S. Kanade,et al. Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[248] Nasir D. Memon,et al. Secure Sketch for Biometric Templates , 2006, ASIACRYPT.
[249] Andreas Uhl,et al. Iris-Biometric Hash Generation for Biometric Database Indexing , 2010, 2010 20th International Conference on Pattern Recognition.
[250] Kang Ryoung Park,et al. A Study on Iris Image Restoration , 2005, AVBPA.
[251] Pong C. Yuen,et al. A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.
[252] Mo Chen,et al. Determining Image Origin and Integrity Using Sensor Noise , 2008, IEEE Transactions on Information Forensics and Security.
[253] K. P. Soman,et al. Irrevocable Cryptographic Key Generation from Cancelable Fingerprint Templates: An Enhanced and Effective Scheme , 2009 .
[254] Josef Bigün,et al. Orientation Scanning to Improve Lossless Compression of Fingerprint Images , 2003, AVBPA.
[255] Christoph Busch,et al. Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[256] Richa Singh,et al. Comparison of iris recognition algorithms , 2004, International Conference on Intelligent Sensing and Information Processing, 2004. Proceedings of.
[257] David Zhang,et al. A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.
[258] R.W. Ives,et al. Iris recognition using histogram analysis , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[259] Mo Chen,et al. Source digital camcorder identification using sensor photo response non-uniformity , 2007, Electronic Imaging.
[260] Kang Ryoung Park,et al. A new iris segmentation method for non-ideal iris images , 2010, Image Vis. Comput..
[261] Luís A. Alexandre,et al. Iris recognition: Analysis of the error rates regarding the accuracy of the segmentation stage , 2010, Image Vis. Comput..
[262] Richard Bowden,et al. Detection and Tracking of Humans by Probabilistic Body Part Assembly , 2005, BMVC.
[263] K.W. Bowyer,et al. The Best Bits in an Iris Code , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[264] K.W. Bowyer,et al. The Iris Challenge Evaluation 2005 , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[265] Alessandro Neri,et al. Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[266] J. Jeffers,et al. Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[267] Loris Nanni,et al. Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..
[268] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1991, CACM.
[269] N. Lalithamani,et al. An Effective Scheme for Generating Irrevocable Cryptographic Key from Cancelable Fingerprint Templates , 2009 .
[270] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[271] Andreas Uhl,et al. Reliability-balanced feature level fusion for fuzzy commitment scheme , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[272] Natalia A. Schmid,et al. On Techniques for Angle Compensation in Nonideal Iris Recognition , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[273] Natalia A. Schmid,et al. On a Methodology for Robust Segmentation of Nonideal Iris Images , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[274] Nasir D. Memon,et al. A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.
[275] Axel Munk,et al. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.
[276] David Zhang,et al. An Iris Cryptosystem for Information Security , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[277] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[278] Ajith Abraham,et al. Spiking neural network and wavelets for hiding iris data in digital images , 2009, Soft Comput..
[279] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[280] Zhoufeng Liu,et al. Protecting Hidden Transmission of Biometrics Using Authentication Watermarking , 2010, 2010 WASE International Conference on Information Engineering.
[281] Lennart Berggren. Iridology: A critical reveiw , 2009 .
[282] Sheng-Wen Shih,et al. Iris Recognition with Multi-Scale Edge-Type Matching , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[283] Kar-Ann Toh,et al. A Method to Enhance Face Biometric Security , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[284] Andreas Uhl,et al. Experimental study on the impact of robust watermarking on iris recognition accuracy , 2010, SAC '10.
[285] Haiping Lu,et al. Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.
[286] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[287] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[288] Dexin Zhang,et al. Efficient iris recognition by characterizing key local variations , 2004, IEEE Transactions on Image Processing.
[289] Emanuele Maiorana,et al. Biometric cryptosystem using function based on-line signature recognition , 2010, Expert Syst. Appl..
[290] Arun Ross,et al. Iris Segmentation Using Geodesic Active Contours , 2009, IEEE Transactions on Information Forensics and Security.
[291] Jiri Matas,et al. On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[292] Tieniu Tan,et al. Combining Face and Iris Biometrics for Identity Verification , 2003, AVBPA.
[293] Daesung Moon,et al. Secure Remote Fingerprint Verification Using Dual Watermarks , 2005, DRMTICS.
[294] A. Arakala. SECURE AND PRIVATE FINGERPRINT-BASED AUTHENTICATION , 2009, Bulletin of the Australian Mathematical Society.
[295] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[296] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[297] Yong Wang,et al. ISAR Imaging of Rotating Target with Equal Changing Acceleration Based on the Cubic Phase Function , 2008, EURASIP J. Adv. Signal Process..
[298] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[299] Dat Tran,et al. Remote multimodal biometric authentication using bit priority-based fragile watermarking , 2008, 2008 19th International Conference on Pattern Recognition.
[300] Karthik Nandakumar,et al. A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[301] A. Murat Tekalp,et al. Robust watermarking of fingerprint images , 2002, Pattern Recognit..
[302] Deepa Kundur. Watermarking with Diversity: Insights and Implications , 2001, IEEE Multim..
[303] Thad Welch,et al. A new approach to iris pattern recognition , 2004, SPIE Security + Defence.
[304] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[305] Mariusz Zubert,et al. A reliable iris recognition algorithm based on reverse biorthogonal wavelet transform , 2012, Pattern Recognit. Lett..
[306] Andrew Beng Jin Teoh,et al. Replaceable and securely hashed keys from online signatures , 2006, IEICE Electron. Express.
[307] R. Belaroussi,et al. Multi-stage fusion for face localization , 2005, 2005 7th International Conference on Information Fusion.
[308] Patrick J. Flynn,et al. A Survey of Iris Biometrics Research: 2008-2010 , 2013, Handbook of Iris Recognition.
[309] Tieniu Tan,et al. Robust Encoding of Local Ordinal Measures: A General Framework of Iris Recognition , 2004, ECCV Workshop BioAW.
[310] Gonzalo R. Arce,et al. Joint wavelet compression and authentication watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[311] Babak Nadjar Araabi,et al. Shape Analysis of Stroma for Iris Recognition , 2007, ICB.
[312] R. Sanchez-Reillo,et al. Iris recognition for biometric identification using dyadic wavelet transform zero-crossing , 2001, Proceedings IEEE 35th Annual 2001 International Carnahan Conference on Security Technology (Cat. No.01CH37186).
[313] Baba C. Vemuri,et al. Shape Modeling with Front Propagation: A Level Set Approach , 1995, IEEE Trans. Pattern Anal. Mach. Intell..
[314] Tieniu Tan,et al. Robust Biometric Key Extraction Based on Iris Cryptosystem , 2009, ICB.
[315] Naphtali Rishe,et al. A computational efficient iris extraction approach in unconstrained environments , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[316] Andreas Uhl,et al. Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).
[317] Rama Chellappa,et al. Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[318] Kyoil Chung,et al. A Novel and Efficient Feature Extraction Method for Iris Recognition , 2007 .
[319] N.B. Puhan,et al. Robust eyeball segmentation in noisy iris images using fourier spectral density , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.
[320] Andreas Uhl,et al. Single-sensor multi-instance fingerprint and eigenfinger recognition using (weighted) score combination methods , 2009, Int. J. Biom..
[321] J. Bringer,et al. Anonymous identification with cancelable biometrics , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[322] Loris Nanni,et al. State of the art in Biometrics , 2011 .
[323] P. Perona,et al. Face Localization via Shape Statistics , 1995 .
[324] John Daugman,et al. High Confidence Visual Recognition of Persons by a Test of Statistical Independence , 1993, IEEE Trans. Pattern Anal. Mach. Intell..
[325] Richa Singh,et al. Improving biometric recognition accuracy and robustness using DWT and SVM watermarking , 2005, IEICE Electron. Express.
[326] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[327] Andrew Beng Jin Teoh,et al. Secure speech template protection in speaker verification system , 2010, Speech Commun..
[328] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[329] George W. Quinn,et al. IREX I: Performance of Iris Recognition Algorithms on Standard Images | NIST , 2009 .
[330] Sung Bum Pan,et al. Hiding Biometric Data for Secure Transmission , 2005, KES.
[331] Jana Dittmann,et al. Digital watermarking of biometric speech references: impact to the EER system performance , 2007, Electronic Imaging.
[332] Jitendra Malik,et al. Scale-Space and Edge Detection Using Anisotropic Diffusion , 1990, IEEE Trans. Pattern Anal. Mach. Intell..
[333] Terrance E. Boult,et al. Bipartite Biotokens: Definition, Implementation, and Analysis , 2009, ICB.
[334] Andreas Uhl,et al. Iris Recognition in Image Domain: Quality-Metric Based Comparators , 2012, ISVC.
[335] K. Srinathan,et al. Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[336] Ralf Steinmetz,et al. Approaches to biometric watermarks for owner authentification , 2001, IS&T/SPIE Electronic Imaging.
[337] Peng Li,et al. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..
[338] Arun Ross,et al. Information fusion in fingerprint authentication , 2003 .
[339] Wade Trappe,et al. Introduction to Cryptography with Coding Theory (2nd Edition) , 2005 .
[340] Tieniu Tan,et al. Iris Localization via Pulling and Pushing , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[341] D. Mumford,et al. Optimal approximations by piecewise smooth functions and associated variational problems , 1989 .
[342] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[343] Mayank Vatsa,et al. Reducing the False Rejection Rate of Iris Recognition Using Textural and Topological Features , 2008 .
[344] Zhang Weidong,et al. Key Binding Based on Biometric Shielding Functions , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[345] Chun-Wei Tan,et al. Automated segmentation of iris images using visible wavelength face images , 2011, CVPR 2011 WORKSHOPS.
[346] Gabriel Taubin,et al. Estimation of Planar Curves, Surfaces, and Nonplanar Space Curves Defined by Implicit Equations with Applications to Edge and Range Image Segmentation , 1991, IEEE Trans. Pattern Anal. Mach. Intell..
[347] G. Padmavathi,et al. Security Analysis of Password Hardened Multimodal Biometric Fuzzy Vault , 2009 .
[348] Sudeep D. Thepade,et al. Iris recognition using texture features extracted from Walshlet pyramid , 2011, ICWET.
[349] Hamid R. Tizhoosh,et al. IRIS Segmentation: Detecting Pupil, Limbus and Eyelids , 2006, 2006 International Conference on Image Processing.
[350] Bernadette Dorizzi,et al. Application of Biometrics to Obtain High Entropy Cryptographic Keys , 2009 .
[351] Phalguni Gupta,et al. An efficient indexing scheme for binary feature based biometric database , 2007, SPIE Defense + Commercial Sensing.
[352] Donald M. Monro,et al. Effects of Sampling and Compression on Human IRIS Verification , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[353] Sangyoun Lee,et al. Biometric Image Authentication using Watermarking , 2006, 2006 SICE-ICASE International Joint Conference.
[354] Zhenan Sun,et al. Coarse Iris Classification by Learned Visual Dictionary , 2007, ICB.
[355] Bülent Sankur,et al. Comparative evaluation of semifragile watermarking algorithms , 2004, J. Electronic Imaging.
[356] Nalini K. Ratha,et al. Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.
[357] Eero P. Simoncelli,et al. Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.
[358] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[359] C. Rathgeb,et al. Context-based texture analysis for secure revocable iris-biometric key generation , 2009, ICDP.
[360] M. Milgram,et al. Fusion of multiple detectors for face and eyes localization , 2005, ISPA 2005. Proceedings of the 4th International Symposium on Image and Signal Processing and Analysis, 2005..
[361] Andreas Uhl,et al. Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.
[362] Xiaomin Wang,et al. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices , 2008 .
[363] Ee-Chien Chang,et al. Finding the original point set hidden among chaff , 2006, ASIACCS '06.
[364] Nalini Ratha,et al. An efficient, two-stage iris recognition system , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[365] J. E. Bresenham,et al. Algorithm for computer control of a digital plotter , 1965, IBM Syst. J..
[366] Jaihie Kim,et al. A Novel Method to Extract Features for Iris Recognition System , 2003, AVBPA.
[367] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[368] Nalini K. Ratha,et al. A new approach for iris segmentation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[369] Andrew Beng Jin Teoh,et al. Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.
[370] Edward J. Delp,et al. A wavelet watermarking algorithm based on a tree structure , 2004, IS&T/SPIE Electronic Imaging.
[371] Sharath Pankanti,et al. Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.
[372] L. R. Rabiner,et al. A comparative study of several dynamic time-warping algorithms for connected-word recognition , 1981, The Bell System Technical Journal.
[373] J. Daugman. Two-dimensional spectral analysis of cortical receptive field profiles , 1980, Vision Research.
[374] Andreas Uhl,et al. Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems , 2010, ICIAR.
[375] C. Tappert,et al. A Survey of Binary Similarity and Distance Measures , 2010 .
[376] Andreas Uhl,et al. Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy , 2009, ICB.
[377] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[378] P. Campisi,et al. Biometric Signature Authentication Using Radon Transform-Based Watermarking Techniques , 2007, 2007 Biometrics Symposium.
[379] George Wolberg,et al. Image morphing: a survey , 1998, The Visual Computer.
[380] Andrew Beng Jin Teoh,et al. Iris Authentication Using Privatized Advanced Correlation Filter , 2006, ICB.
[381] Andreas Uhl,et al. Lossless Compression of Polar Iris Image Data , 2011, IbPRIA.
[382] Natalia A. Schmid,et al. Performance evaluation of iris-based recognition system implementing PCA and ICA encoding techniques , 2005, SPIE Defense + Commercial Sensing.
[383] Bin Ma,et al. Protecting Biometric Templates Using Authentication Watermarking , 2010, PCM.
[384] Andrew Beng Jin Teoh,et al. Biometric hash: high-confidence face recognition , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[385] Libor Masek,et al. Recognition of Human Iris Patterns for Biometric Identification , 2003 .
[386] John Daugman,et al. Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.
[387] Eckhard Koch,et al. Towards Robust and Hidden Image Copyright Labeling , 1995 .
[388] James L. Wayman,et al. Technical Testing and Evaluation of Biometric Identification Devices , 1996 .
[389] Andreas Uhl,et al. Iris-biometric comparators: Minimizing trade-offs costs between computational performance and recognition accuracy , 2011, ICDP.
[390] Andreas Uhl,et al. Iris-sensor authentication using camera PRNU fingerprints , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[391] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[392] Alice J. O'Toole,et al. FRVT 2006 and ICE 2006 large-scale results , 2007 .
[393] Tieniu Tan,et al. Efficient and robust segmentation of noisy iris images for non-cooperative iris recognition , 2010, Image Vis. Comput..
[394] Mark J. Burge,et al. Handbook of Iris Recognition , 2013, Advances in Computer Vision and Pattern Recognition.
[395] Rui Chen,et al. Iris segmentation for non-cooperative recognition systems , 2011 .
[396] Ali Miri,et al. A collusion attack on the fuzzy vault scheme , 2009, ISC Int. J. Inf. Secur..
[397] Berrin A. Yanikoglu,et al. Biometric Cryptosystem Using Online Signatures , 2006, ISCIS.
[398] Vincenzo Piuri,et al. Agent-based image iris segmentation and multiple views boundary refining , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[399] J. Fridrich,et al. Digital image forensics , 2009, IEEE Signal Processing Magazine.
[400] Edward J. Delp,et al. Multi-angle sclera recognition system , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[401] Dr.K. Duraiswamy,et al. Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature , 2010 .
[402] Zhengyou Zhang,et al. A Survey of Recent Advances in Face Detection , 2010 .
[403] Richa Singh,et al. Improving Iris Recognition Performance Using Segmentation, Quality Enhancement, Match Score Fusion, and Indexing , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[404] Vladimir I. Levenshtein,et al. Binary codes capable of correcting deletions, insertions, and reversals , 1965 .
[405] J. Daugman,et al. Epigenetic randomness, complexity and singularity of human iris patterns , 2001, Proceedings of the Royal Society of London. Series B: Biological Sciences.
[406] Patrick J. Flynn,et al. Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..
[407] Kurt Horvath,et al. Optimisation of JPEG XR Quantisation Settings in Iris Recognition Systems , 2012 .
[408] Andrew W. Fitzgibbon,et al. Direct Least Square Fitting of Ellipses , 1999, IEEE Trans. Pattern Anal. Mach. Intell..
[409] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[410] A. Shanmugam,et al. GENERATE A KEY FOR AES USING BIOMETRIC FOR VOIP NETWORK SECURITY , 2009 .
[411] M. Dobes,et al. Human eye localization using the modified Hough transform , 2006 .
[412] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[413] Andrew Beng Jin Teoh,et al. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization , 2006, EURASIP J. Adv. Signal Process..
[414] Andreas Uhl,et al. Systematic Construction of Iris-Based Fuzzy Commitment Schemes , 2009, ICB.
[415] Jinyu Zuo,et al. A Robust IRIS Segmentation Procedure for Unconstrained Subject Presentation , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[416] Anil K. Jain,et al. Hiding Biometric Data , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[417] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[418] Cicero F. F. Costa Filho,et al. Iris segmentation exploring color spaces , 2010, 2010 3rd International Congress on Image and Signal Processing.
[419] Paul A. Watters,et al. A Novel Face Hashing Method with Feature Fusion for Biometric Cryptosystems , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).
[420] Sudeep D. Thepade,et al. IRIS Recognition using Texture Features Extracted from Haarlet Pyramid , 2010 .
[421] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[422] Andreas Uhl,et al. Security analysis of a cancelable iris recognition system based on block remapping , 2011, 2011 18th IEEE International Conference on Image Processing.
[423] Jian-ping Li,et al. A Novel Biometric Image Integrity Authentication Using Fragile Watermarking and Arnold Transform , 2008 .
[424] Lahouari Ghouti,et al. Protecting Fingerprint Data Using Watermarking , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).
[425] Pedro de Almeida,et al. A knowledge-based approach to the iris segmentation problem , 2010, Image Vis. Comput..
[426] Carlos Hitoshi Morimoto,et al. Automatic Iris Segmentation Using Active Near Infra Red Lighting , 2005, XVIII Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI'05).
[427] Carmen Sánchez Ávila,et al. Biometric Fuzzy Extractor Scheme for Iris Templates , 2009, Security and Management.
[428] T. Satonaka. Biometric watermark authentication with multiple verification rule , 2002, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing.
[429] Tassos Dimitriou,et al. Protecting Biometric Templates with Image Watermarking Techniques , 2007, ICB.
[430] Jessica J. Fridrich,et al. Managing a large database of camera fingerprints , 2010, Electronic Imaging.
[431] Chulhan Lee,et al. Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[432] James A. Storer. Image and Text Compression , 2012 .
[433] Rainer Lienhart,et al. Empirical Analysis of Detection Cascades of Boosted Classifiers for Rapid Object Detection , 2003, DAGM-Symposium.
[434] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[435] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[436] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).
[437] Peihua Li,et al. Iris recognition in non-ideal imaging conditions , 2012, Pattern Recognit. Lett..
[438] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[439] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[440] Jing Dong,et al. Effects of watermarking on iris recognition performance , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.
[441] Andreas Uhl,et al. Multi-stage Visible Wavelength and Near Infrared Iris Segmentation Framework , 2012, ICIAR.
[442] S. Demea,et al. Interface of an Iris Detection Program , 2007, 2007 30th International Spring Seminar on Electronics Technology (ISSE).
[443] Donald M. Monro,et al. An Evaluation of Image Sampling and Compression for Human Iris Recognition , 2007, IEEE Transactions on Information Forensics and Security.
[444] Yingzi Du,et al. Transforming traditional iris recognition systems to work on non-ideal situations , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.
[445] Yingzi Du,et al. Region-based SIFT approach to iris recognition , 2009 .
[446] I. R. Babu,et al. Performance of Iris Based Hard Fuzzy Vault , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[447] Julien Bringer,et al. The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..
[448] Robert W. Ives,et al. Binary Morphology and Local Statistics Applied to Iris Segmentation for Recognition , 2006, 2006 International Conference on Image Processing.
[449] Richard P. Wildes,et al. A machine-vision system for iris recognition , 2005, Machine Vision and Applications.
[450] Fouad Khelifi,et al. Region-Based Watermarking of Biometric Images: Case Study in Fingerprint Images , 2008, Int. J. Digit. Multim. Broadcast..
[451] Dexin Zhang,et al. DCT-Based Iris Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[452] Andreas Uhl,et al. Context-based biometric key generation for Iris , 2011 .
[453] W. Gareth J. Howells,et al. Evaluating Biometric Encryption Key Generation Using Handwritten Signatures , 2008, 2008 Bio-inspired, Learning and Intelligent Systems for Security.
[454] Vutipong Areekul,et al. Efficient Iris Recognition Using Adaptive Quotient Thresholding , 2006, ICB.
[455] Hiroshi Nakajima,et al. A Phase-Based Iris Recognition Algorithm , 2006, ICB.
[456] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[457] Florence Rossant,et al. Iris features extraction using wavelet packets , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[458] F.W. Wheeler,et al. Stand-off Iris Recognition System , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[459] Daesung Moon,et al. Dictionary Attack on Functional Transform‐Based Cancelable Fingerprint Templates , 2009 .
[460] John Daugman,et al. Biometric decision landscapes , 2000 .
[461] Ingrid Verbauwhede,et al. Secure IRIS Verification , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[462] Peihua Li,et al. Robust and accurate iris segmentation in very noisy iris images , 2010, Image Vis. Comput..
[463] Hervé Sibert,et al. Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes , 2007, ICB.
[464] Tieniu Tan,et al. Improving iris recognition accuracy via cascaded classifiers , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[465] Sharath Pankanti,et al. Verification watermarks on fingerprint recognition and retrieval , 1999, Electronic Imaging.
[466] Nalini K. Ratha,et al. A Secure Protocol for Data Hiding in Compressed Fingerprint Images , 2004, ECCV Workshop BioAW.
[467] David Zhang,et al. A Novel Method for Coarse Iris Classification , 2006, ICB.
[468] Yuqing He,et al. A fast iris image quality evaluation method based on weighted entropy , 2007, Applied Optics and Photonics China.
[469] Hugo Proença,et al. Iris Recognition: On the Segmentation of Degraded Images Acquired in the Visible Wavelength , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[470] Kenta Takahashi,et al. Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[471] Luís A. Alexandre,et al. A Method for the Identification of Noisy Regions in Normalized Iris Images , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[472] Lionel Torres,et al. Person Identification Technique Using Human Iris Recognition , 2002 .
[473] Elisardo González-Agulla,et al. Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth , 2008, Electronic Imaging.
[474] Andreas Uhl,et al. Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking , 2011, Communications and Multimedia Security.
[475] Patrick J. Flynn,et al. Comments on the CASIA version 1.0 Iris Data Set , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[476] D. Denton. The Royal Society of London , 1965, Nature.
[477] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[478] Andreas Uhl,et al. Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.
[479] Shing-Chow Chan,et al. Designing JPEG quantization matrix using rate-distortion approach and human visual system model , 1997, Proceedings of ICC'97 - International Conference on Communications.
[480] John Daugman,et al. IRIS RECOGNITION BORDER-CROSSING SYSTEM IN THE UAE , 2004 .
[481] Simon Lucey,et al. Face alignment through subspace constrained mean-shifts , 2009, 2009 IEEE 12th International Conference on Computer Vision.
[482] Jorge Guajardo,et al. Efficient strategies to play the indistinguishability game for fuzzy sketches , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[483] Md. Rajibul Islam,et al. Biometric template protection using watermarking with hidden password encryption , 2008, 2008 International Symposium on Information Technology.
[484] Karel J. Zuiderveld,et al. Contrast Limited Adaptive Histogram Equalization , 1994, Graphics Gems.
[485] Arun Ross,et al. Multispectral Iris Analysis: A Preliminary Study51 , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[486] Yanggon Kim,et al. Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).
[487] Anil K. Jain,et al. Localized Iris Image Quality Using 2-D Wavelets , 2006, ICB.
[488] Yingzi Du,et al. A Selective Feature Information Approach for Iris Image-Quality Measure , 2008, IEEE Transactions on Information Forensics and Security.
[489] Andreas Uhl,et al. Semi-fragile Watermarking in Biometric Systems: Template Self-Embedding , 2011, CAIP.
[490] Andreas Uhl,et al. Shifting score fusion: on exploiting shifting variation in iris recognition , 2011, SAC '11.
[491] Zhe-Ming Lu,et al. A Joint Biometrics and Watermarking Based Framework for Fingerprinting, Copyright Protection, Proof of Ownership, and Security Applications , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).
[492] K. P. Soman,et al. Towards generating irrevocable key for cryptography from cancelable fingerprints , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[493] Wayne J. Salamon,et al. IREX II - IQCE :: iris quality calibration and evaluation : performance of iris image quality assessment algorithms , 2011 .
[494] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[495] Mariusz Zubert,et al. Reliable algorithm for iris segmentation in eye image , 2010, Image Vis. Comput..
[496] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[497] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[498] Andreas Uhl,et al. Incremental iris recognition: A single-algorithm serial fusion strategy to optimize time complexity , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[499] Claus Vielhauer,et al. Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.
[500] Anton H. M. Akkermans,et al. A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem , 2009, DPM/SETOP.
[501] R.W. Ives,et al. Effect of Image Compression on Iris Recognition , 2005, 2005 IEEE Instrumentationand Measurement Technology Conference Proceedings.
[502] Andrew Beng Jin Teoh,et al. Secure biometric template protection in fuzzy commitment scheme , 2007, IEICE Electron. Express.
[503] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[504] Matthew N. Dailey,et al. Iris recognition performance enhancement using weighted majority voting , 2008, 2008 15th IEEE International Conference on Image Processing.
[505] David J. Kriegman,et al. Localizing parts of faces using a consensus of exemplars , 2011, CVPR.
[506] Andrew Teoh Beng Jin,et al. High security Iris verification system based on random secret integration , 2006 .
[507] Andreas Uhl,et al. Enhancing Iris Matching Using Levenshtein Distance with Alignment Constraints , 2010, ISVC.
[508] Lu Wang,et al. A robust segmentation approach to iris recognition based on video , 2008, 2008 37th IEEE Applied Imagery Pattern Recognition Workshop.
[509] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 1999, CCS '99.
[510] Gin-Der Wu,et al. Image Watermarking Using Structure Based Wavelet Tree Quantization , 2007, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007).
[511] Sridha Sridharan,et al. Fusing shrinking and expanding active contour models for robust iris segementation , 2010, 10th International Conference on Information Science, Signal Processing and their Applications (ISSPA 2010).
[512] Mauro Barni,et al. eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.
[513] Venu Govindaraju,et al. A Robust Iris Localization Method Using an Active Contour Model and Hough Transform , 2010, 2010 20th International Conference on Pattern Recognition.
[514] Michael W. Marcellin,et al. JPEG2000 - image compression fundamentals, standards and practice , 2013, The Kluwer international series in engineering and computer science.
[515] Nalini K. Ratha,et al. Secure data hiding in wavelet compressed fingerprint images , 2000, MULTIMEDIA '00.
[516] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[517] Randy P. Broussard,et al. Using artificial neural networks and feature saliency to identify iris measurements that contain the most discriminatory information for iris segmentation , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.
[518] Tieniu Tan,et al. A new iris segmentation method for recognition , 2004, ICPR 2004.
[519] Raymond N. J. Veldhuis,et al. Binary Representations of Fingerprint Spectral Minutiae Features , 2010, 2010 20th International Conference on Pattern Recognition.
[520] Robyn A. Owens,et al. Location of the pupil-iris border in slit-lamp images of the cornea , 1999, Proceedings 10th International Conference on Image Analysis and Processing.
[521] Daesung Moon,et al. Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault , 2005, CISC.
[522] Daesung Moon,et al. Fuzzy fingerprint vault using multiple polynomials , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.
[523] Patrick J. Flynn,et al. Experiments with an improved iris segmentation algorithm , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[524] James R. Matey,et al. Iris on the Move: Acquisition of Images for Iris Recognition in Less Constrained Environments , 2006, Proceedings of the IEEE.
[525] Norimichi Tsumura,et al. Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes , 2010, 2010 20th International Conference on Pattern Recognition.
[526] Guillermo Sapiro,et al. The LOCO-I lossless image compression algorithm: principles and standardization into JPEG-LS , 2000, IEEE Trans. Image Process..
[527] Josef Kittler,et al. Proceedings of the 4th international conference on Audio- and video-based biometric person authentication , 2003 .
[528] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[529] Parham Aarabi,et al. Face detection using information fusion , 2007, 2007 10th International Conference on Information Fusion.
[530] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[531] Tony F. Chan,et al. Active contours without edges , 2001, IEEE Trans. Image Process..
[532] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[533] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[534] Dongho Won,et al. The Vulnerabilities Analysis of Fuzzy Vault Using Password , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[535] Kai Yang,et al. A multi-stage approach for non-cooperative iris recognition , 2011, 2011 IEEE International Conference on Systems, Man, and Cybernetics.
[536] James R. Cooper,et al. Locating the Iris: A First Step to Registration and Identification , 2003, SIP.
[537] Tom E. Bishop,et al. Blind Image Restoration Using a Block-Stationary Signal Model , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[538] Alex Stoianov,et al. Chapter 26. Biometric Encryption: The New Breed of Untraceable Biometrics , 2009 .