Conjugate 2DPalmHash code for secure palm-print-vein verification
暂无分享,去创建一个
[1] Muhammad Khurram Khan,et al. Two Dimensional PalmPhasor Enhanced by Multi-orientation Score Level Fusion , 2011, STA.
[2] Andrew Beng Jin Teoh,et al. A contactless biometric system using multiple hand features , 2012, J. Vis. Commun. Image Represent..
[3] Jiankun Hu,et al. Attacks via record multiplicity on cancelable biometrics templates , 2014, Concurr. Comput. Pract. Exp..
[4] Jiankun Hu,et al. Pair-polar coordinate-based cancelable fingerprint templates , 2011, Pattern Recognit..
[5] W. Gareth J. Howells,et al. Direct Template-Free Encryption Key Generation from Palm-Veins , 2012, 2012 Third International Conference on Emerging Security Technologies.
[6] Wei-Yun Yau,et al. Person recognition by fusing palmprint and palm vein images based on "Laplacianpalm" representation , 2008, Pattern Recognit..
[7] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[8] Andrew Beng Jin Teoh,et al. Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..
[9] Andrew Beng Jin Teoh,et al. Cancellable biometrics and user-dependent multi-state discretization in BioHash , 2009, Pattern Analysis and Applications.
[10] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[11] Lu Leng,et al. Palmhash Code for palmprint verification and protection , 2012, 2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[12] David Zhang,et al. A survey of palmprint recognition , 2009, Pattern Recognit..
[13] Ajay Kumar,et al. Human Identification Using Palm-Vein Images , 2011, IEEE Transactions on Information Forensics and Security.
[14] Xudong Jiang,et al. Exploiting global and local decisions for multimodal biometrics verification , 2004, IEEE Transactions on Signal Processing.
[15] Zhenhua Guo,et al. Online joint palmprint and palmvein verification , 2011, Expert Syst. Appl..
[16] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[17] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[18] Andy Adler. Cancelable Biometrics , 2015, Encyclopedia of Biometrics.
[19] David Zhang,et al. Three measures for secure palmprint identification , 2008, Pattern Recognit..
[20] Hengjian Li,et al. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..
[21] Ming Li,et al. A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion , 2014, Secur. Commun. Networks.
[22] L. Leng,et al. Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.
[23] B. Gomathi,et al. Biometric Cryptosystem Involving Two Traits And Palm Vein As Key , 2012 .
[24] Xiang Yu,et al. Personal authentication using finger vein pattern and finger-dorsa texture fusion , 2009, ACM Multimedia.
[25] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[26] A. Kannammal,et al. A secure cryptosystem from palm vein biometrics , 2009, ICIS.
[27] David Zhang,et al. An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.
[28] Lu Leng,et al. PalmHash Code vs. PalmPhasor Code , 2013, Neurocomputing.
[29] A. Kannammal,et al. Multimodal Biometric Cryptosystem Involving Face, Fingerprint and Palm Vein , 2011 .
[30] Modris Greitans,et al. Biohashing and Fusion of Palmprint and Palm Vein Biometric Data , 2011, 2011 International Conference on Hand-Based Biometrics.
[31] B. Prasanalakshmi,et al. Secure cryptosystem from palm vein biometrics in smart card , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[32] Muhammad Khurram Khan,et al. Dynamic weighted discrimination power analysis: A novel approach for face and palmprint recognition in DCT domain , 2010 .
[33] Hengjian Li,et al. Chaos-Based Cancelable Palmprint Authentication System , 2012 .