Preventing the cross-matching attack in Bloom filter-based cancelable biometrics
暂无分享,去创建一个
Christoph Busch | Christian Rathgeb | Benjamin Tams | Johannes Wagner | C. Busch | C. Rathgeb | Benjamin Tams | J. Wagner
[1] Libor Masek,et al. Recognition of Human Iris Patterns for Biometric Identification , 2003 .
[2] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[3] Kang Ryoung Park,et al. A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[4] Andreas Uhl,et al. Weighted adaptive Hough and ellipsopolar transforms for real-time iris segmentation , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[5] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometric codes , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).
[6] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[7] Julian Fiérrez,et al. Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters , 2014, 2014 22nd International Conference on Pattern Recognition.
[8] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[9] Dexin Zhang,et al. Efficient iris recognition by characterizing key local variations , 2004, IEEE Transactions on Image Processing.
[10] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[11] R. Roth,et al. Efficient decoding of Reed-Solomon codes beyond half the minimum distance , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[12] Johannes Merkle,et al. Security of the Improved Fuzzy Vault Scheme in the Presence of Record Multiplicity (Full Version) , 2013, ArXiv.
[13] Peter Trifonov. Efficient Interpolation in the Guruswami–Sudan Algorithm , 2010, IEEE Transactions on Information Theory.
[14] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[15] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[16] Patrick J. Flynn,et al. Image understanding for iris biometrics: A survey , 2008, Comput. Vis. Image Underst..
[17] Bart Mennink,et al. When a Bloom filter is a Doom filter: Security assessment of a novel iris biometric template protection system , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[18] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[19] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[20] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[21] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[22] Christoph Busch,et al. Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).