Algorithms for Processing Biometric Data Oriented to Privacy Protection and Preservation of Significant Parameters
暂无分享,去创建一个
[1] Yuliyan Velchev,et al. Face and ECG Based Multi-Modal Biometric Authentication , 2011 .
[2] Evgueni A. Haroutunian,et al. Information Theory and Statistics , 2011, International Encyclopedia of Statistical Science.
[3] Debnath Bhattacharyya,et al. Biometric Authentication: A Review , 2009 .
[4] Sergio Verdú,et al. Approximation theory of output statistics , 1993, IEEE Trans. Inf. Theory.
[5] Taras Holotyak,et al. Information-Theoretic Analysis of Privacy Protection for Noisy Identification Based on Soft Fingerprinting , 2011 .
[6] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.
[7] Vladimir B. Balakirsky,et al. Biometric Authentication Based on Significant Parameters , 2011, BIOID.
[8] Leonid A. Levin,et al. The Tale of One-Way Functions , 2000, Probl. Inf. Transm..
[9] Sviatoslav Voloshynovskiy,et al. Private content identification based on soft fingerprinting , 2011, Electronic Imaging.
[10] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[11] Vladimir B. Balakirsky,et al. Mathematical model for constructing passwords from biometrical data , 2009, Secur. Commun. Networks.
[12] Rudolf Ahlswede,et al. Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.
[13] Vladimir B. Balakirsky,et al. A Simple Scheme for Constructing Fault-Tolerant Passwords from Biometric Data , 2010, EURASIP J. Inf. Secur..
[14] Hideki Imai,et al. Theoretical framework for constructing matching algorithms in biometric authentication systems , 2009, ICB.
[15] Vladimir B. Balakirsky,et al. Testing the Independence of Two Non-Stationary Random Processes with Applications to Biometric Authentication , 2007, 2007 IEEE International Symposium on Information Theory.
[16] F.M.J. Willems,et al. Privacy leakage in biometric secrecy systems , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[17] Marios Savvides,et al. How to Generate Spoofed Irises From an Iris Code Template , 2011, IEEE Transactions on Information Forensics and Security.