Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
暂无分享,去创建一个
Bernadette Dorizzi | Dijana Petrovska-Delacrétaz | Sanjay Ganesh Kanade | B. Dorizzi | D. Petrovska-Delacrétaz | S. Kanade
[1] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[2] Anton H. M. Akkermans,et al. Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[3] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[4] Alessandro Neri,et al. Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system , 2011, 2011 IEEE International Systems Conference.
[5] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[6] J. Ortega-Garcia,et al. Cancelable Biometrics for HMM-based Signature Recognition , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[7] Nasir D. Memon,et al. Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[8] Loris Nanni,et al. Random subspace for an improved BioHashing for face authentication , 2008, Pattern Recognit. Lett..
[9] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[10] Michael K. Reiter,et al. The Practical Subtleties of Biometric Key Generation , 2008, USENIX Security Symposium.
[11] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[12] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[13] Loris Nanni,et al. Combining local, regional and global matchers for a template protected on-line signature verification system , 2010, Expert Syst. Appl..
[14] S. Kanade,et al. Multi-biometrics based cryptographic key regeneration scheme , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[15] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[16] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[17] Alessandro Neri,et al. Template protection for HMM-based on-line signature authentication , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[18] J. Jeffers,et al. Minutiae-Based Structures for A Fuzzy Vault , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.
[19] Gérard D. Cohen,et al. Theoretical and Practical Boundaries of Binary Secure Sketches , 2008, IEEE Transactions on Information Forensics and Security.
[20] Ann Cavoukian. Biometric Encryption : A Positive-Sum Technology that Achieves Strong Authentication , Security AND Privacy , 2007 .
[21] Nalini K. Ratha,et al. Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[22] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[23] Ingrid Verbauwhede,et al. Secure IRIS Verification , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[24] Hervé Sibert,et al. Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes , 2007, ICB.
[25] Chulhan Lee,et al. Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[26] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[27] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[28] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[29] Michael K. Reiter,et al. Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.
[30] Yair Frankel,et al. On enabling secure applications through off-line biometric identification , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[31] Mohamed Abid,et al. Towards a secure E-passport protocol based on biometrics , 2009 .
[32] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[33] P. Jonathon Phillips,et al. Face Recognition Grand Challenge , 2004 .
[34] H. Vincent Poor,et al. Privacy–Security Trade-Offs in Biometric Security Systems—Part I: Single Use Case , 2011, IEEE Transactions on Information Forensics and Security.
[35] Bernadette Dorizzi,et al. Generating and sharing biometrics based session keys for secure cryptographic applications , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[36] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[37] Eric Rescorla,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.
[38] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[39] Sharath Pankanti,et al. Error analysis of pattern recognition systems - the subsets bootstrap , 2004, Comput. Vis. Image Underst..
[40] Ray A. Perlner,et al. Electronic Authentication Guideline , 2014 .
[41] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[42] Bernadette Dorizzi,et al. Guide to Biometric Reference Systems and Performance Evaluation , 2009 .
[43] Chun Chen,et al. Biometric binary string generation with detection rate optimized bit allocation , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[44] Nalini K. Ratha,et al. Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.
[45] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[46] Arun Ross,et al. Image versus feature mosaicing: a case study in fingerprints , 2006, SPIE Defense + Commercial Sensing.
[47] Pong C. Yuen,et al. A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.
[48] Alessandro Neri,et al. User adaptive fuzzy commitment for signature template protection and renewability , 2008, J. Electronic Imaging.
[49] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[50] Qi Han,et al. A Novel Template Protection Algorithm for Iris Recognition , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.
[51] Ann Cavoukian,et al. Biometric Encryption , 2011, Encyclopedia of Cryptography and Security.
[52] Irving S. Reed,et al. Reed-Solomon Codes , 1999 .
[53] Weiguo Sheng,et al. Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering , 2008, IEEE Transactions on Information Forensics and Security.
[54] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[55] Nalini K. Ratha,et al. Physics-based revocable face recognition , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[56] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[57] Alessandra Lumini,et al. Can Fingerprints be Reconstructed from ISO Templates? , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.
[58] Nalini K. Ratha,et al. Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics , 2008, 2008 19th International Conference on Pattern Recognition.
[59] Umut Uludag,et al. Secure biometric systems , 2006 .
[60] Frans M. J. Willems,et al. Biometric Systems: Privacy and Secrecy Aspects , 2009, IEEE Transactions on Information Forensics and Security.
[61] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[62] Stelvio Cimato,et al. Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System , 2008, 2008 Annual Computer Security Applications Conference (ACSAC).
[63] Berk Gökberk,et al. "3D Face": Biometric Template Protection for 3D Face Recognition , 2007, ICB.
[64] Huaxiong Wang,et al. An On-Line Secure E-Passport Protocol , 2008, ISPEC.
[65] C. Busch,et al. Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[66] Wanqing Li,et al. Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[67] Axel Munk,et al. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.
[68] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[69] Anil K. Jain,et al. Fuzzy Fingerprint Vault , 2004 .
[70] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[71] Joachim von zur Gathen,et al. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes , 2010 .
[72] Qi Li,et al. Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[73] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[74] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[75] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[76] Bernadette Dorizzi,et al. Multi-biometrics based crypto-biometric session key generation and sharing protocol , 2011, MM&Sec '11.
[77] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[78] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[79] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[80] Chun-I Fan,et al. Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics , 2009, IEEE Transactions on Information Forensics and Security.
[81] K. Srinathan,et al. Blind Authentication: A Secure Crypto-Biometric Verification Protocol , 2010, IEEE Transactions on Information Forensics and Security.
[82] Pieter H. Hartel,et al. Secure Ad-hoc Pairing with Biometrics: SAfE , 2007 .
[83] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[84] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[85] Andreas Uhl,et al. Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.
[86] Anil K. Jain,et al. On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[87] David Zhang,et al. A Novel Cryptosystem Based on Iris Key Generation , 2008, 2008 Fourth International Conference on Natural Computation.
[88] Christophe Rosenberger,et al. A Study on the Convergence of FingerHashing and a Secured Biometric System , 2009, CIIA.
[89] Arun Ross,et al. An introduction to multibiometrics , 2007, 2007 15th European Signal Processing Conference.
[90] Alvin F. Martin,et al. The DET curve in assessment of detection task performance , 1997, EUROSPEECH.
[91] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[92] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[93] Claude Barral. Biometrics & [and] Security , 2010 .
[94] S. Yang,et al. Secure fuzzy vault based fingerprint verification system , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
[95] Haiping Lu,et al. Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.
[96] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[97] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[98] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[99] K. Srinathan,et al. Efficient Biometric Verification in Encrypted Domain , 2009, ICB.
[100] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[101] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[102] F. Hao,et al. On using fuzzy data in security mechanisms , 2007 .
[103] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[104] Julian Fiérrez,et al. Dynamic signature verification with template protection using helper data , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[105] Vincenzo Piuri,et al. Privacy-preserving fingercode authentication , 2010, MM&Sec '10.
[106] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.
[107] Patrizio Campisi,et al. Fuzzy Commitment for Function Based Signature Template Protection , 2010, IEEE Signal Processing Letters.
[108] L. Hong,et al. Can multibiometrics improve performance , 1999 .
[109] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[110] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[111] Nasir D. Memon,et al. Secure Sketch for Biometric Templates , 2006, ASIACRYPT.
[112] Anil K. Jain,et al. Multibiometric systems: fusion strategies and template security , 2008 .
[113] Bernadette Dorizzi,et al. Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, CVPR.
[114] Arun Ross,et al. From Template to Image: Reconstructing Fingerprints from Minutiae Points , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[115] A. Stoianov,et al. Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[116] Yair Frankel,et al. On the Relation of Error Correction and Cryptography to an Off Line Biometric Based Identification S , 1999 .
[117] Julian Fiérrez,et al. Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[118] Ee-Chien Chang,et al. Hiding Secret Points Amidst Chaff , 2006, EUROCRYPT.
[119] Kouichi Sakurai,et al. A Proposal of One-Time Biometric Authentication , 2006, Security and Management.
[120] Xuebing Zhou. Template protection and its implementation in 3D face recognition systems , 2007, SPIE Defense + Commercial Sensing.
[121] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[122] Arun Ross,et al. Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.
[123] Julien Bringer,et al. The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..
[124] Patrick J. Flynn,et al. Overview of the face recognition grand challenge , 2005, 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05).
[125] Ajay Kumar,et al. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault , 2009, EURASIP J. Adv. Signal Process..
[126] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[127] Bernadette Dorizzi,et al. Obtaining cryptographic keys using feature level fusion of iris and face biometrics for secure user authentication , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition - Workshops.
[128] Tsuhan Chen,et al. Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).
[129] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[130] Andrew Beng Jin Teoh,et al. Remarks on BioHashing based cancelable biometrics in verification system , 2006, Neurocomputing.
[131] Shigeo Tsujii,et al. Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures , 2004, International Journal of Information Security.
[132] Loris Nanni,et al. Empirical tests on BioHashing , 2006, Neurocomputing.
[133] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[134] Andrew Beng Jin Teoh,et al. Personalised cryptographic key generation based on FaceHashing , 2004, Comput. Secur..
[135] Bruce A. Draper,et al. The CSU Face Identification Evaluation System , 2005, Machine Vision and Applications.
[136] Ee-Chien Chang,et al. Fuzzy extractors for asymmetric biometric representations , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[137] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[138] T.E. Boult,et al. Bio-cryptographic protocols with bipartite biotokens , 2008, 2008 Biometrics Symposium.
[139] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[140] Santanu Chaudhury,et al. Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[141] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[142] Elaine B. Barker,et al. SP 800-56A. Recommendation for Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (Revised) , 2007 .
[143] Alex Stoianov,et al. Security of Error Correcting Code for biometric Encryption , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[144] Andrew Beng Jin Teoh,et al. Cancellable biometerics featuring with tokenised random number , 2005, Pattern Recognit. Lett..
[145] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[146] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[147] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[148] Karthik Nandakumar,et al. A fingerprint cryptosystem based on minutiae phase spectrum , 2010, 2010 IEEE International Workshop on Information Forensics and Security.
[149] Joachim M. Buhmann,et al. Distortion Invariant Object Recognition in the Dynamic Link Architecture , 1993, IEEE Trans. Computers.
[150] Jana Dittmann,et al. Advanced Studies on Reproducibility of Biometric Hashes , 2008, BIOID.
[151] Fei Su,et al. A Biometric Key-Binding and Template Protection Framework Using Correlation Filters , 2009, ICB.
[152] Terrance E. Boult,et al. Bipartite Biotokens: Definition, Implementation, and Analysis , 2009, ICB.
[153] Peng Li,et al. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..
[154] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[155] Benoit Geller,et al. Blind estimation of timing and carrier frequency offsets in OFDM systems , 2007, 2009 17th European Signal Processing Conference.
[156] Bo Fu,et al. Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.
[157] Ileana Buhan,et al. Cryptographic keys from noisy data, theory and applications , 2008 .
[158] Ying Luo,et al. Anonymous Biometric Access Control based on homomorphic encryption , 2009, 2009 IEEE International Conference on Multimedia and Expo.
[159] Michael G. Strintzis,et al. A Channel Coding Approach for Human Authentication From Gait Sequences , 2009, IEEE Transactions on Information Forensics and Security.
[160] Bernadette Dorizzi,et al. Iris based authentication mechanism for e-Passports , 2010, 2010 2nd International Workshop on Security and Communication Networks (IWSCN).
[161] Qiang Tang,et al. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.
[162] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[163] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[164] Christoph Busch,et al. A Novel Privacy Enhancing Algorithm for Biometric System , 2008, BIOSIG.
[165] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[166] Andrew Teoh Beng Jin,et al. High security Iris verification system based on random secret integration , 2006 .
[167] Anne M. P. Canuto,et al. Enhancing Performance of Cancellable Fingerprint Biometrics Using Classifier Ensembles , 2010, 2010 Eleventh Brazilian Symposium on Neural Networks.
[168] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[169] Raymond N. J. Veldhuis,et al. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.
[170] Ingrid Verbauwhede,et al. Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[171] Boris Skoric. Security with Noisy Data - (Extended Abstract of Invited Talk) , 2010, Information Hiding.
[172] S. Kanade,et al. Three factor scheme for biometric-based cryptographic key regeneration using iris , 2008, 2008 Biometrics Symposium.
[173] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[174] N.K. Ratha,et al. Generating Registration-free Cancelable Fingerprint Templates , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.