On the Security of BioEncoding Based Cancelable Biometrics
暂无分享,去创建一个
[1] Norimichi Tsumura,et al. BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting IrisCodes , 2010, IEICE Trans. Inf. Syst..
[2] Libor Masek,et al. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .
[3] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[4] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[5] Alex Stoianov,et al. Chapter 26. Biometric Encryption: The New Breed of Untraceable Biometrics , 2009 .
[6] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[7] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[8] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[9] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Ton Kalker,et al. On the security of biohashing , 2010, Electronic Imaging.
[11] Anil K. Jain,et al. On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[12] Andy Adler,et al. Vulnerabilities in Biometric Encryption Systems , 2005, AVBPA.
[13] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[14] Luminita Vasiu,et al. Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.
[15] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[16] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[17] Arjan Kuijper,et al. Feature Correlation Attack on Biometric Privacy Protection Schemes , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[18] Ann Cavoukian,et al. Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.
[19] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[20] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[21] Konstantinos N. Plataniotis,et al. Biometric Encryption: The New Breed of Untraceable Biometrics , 2010 .