Measuring privacy and security of iris fuzzy commitment
暂无分享,去创建一个
[1] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[2] David Zhang,et al. An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.
[3] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[4] Libor Masek,et al. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .
[5] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[6] Anthony Vetro. CHAPTER 11 – Securing Biometric Data , 2009 .
[7] Koen Simoens,et al. A Survey of the Security and Privacy Measures for Anonymous Biometric Authentication Systems , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[8] Tanya Ignatenko,et al. Secret-Key Rates and Privacy Leakage in Biometric Systems , 2007 .
[9] Pim Tuyls,et al. Capacity and Examples of Template-Protecting Biometric Authentication Systems , 2004, ECCV Workshop BioAW.
[10] Xuebing Zhou,et al. Privacy and Security Assessment of Biometric Template Protection , 2012, it Inf. Technol..
[11] Daniel Willem Elisabeth Schobben,et al. Privacy-protected biometric templates: acoustic ear identification , 2004, SPIE Defense + Commercial Sensing.
[12] Ahmad Hussein. SECURING BIOMETRIC DATA , 2010 .
[13] Bhagavatula Vijaya Kumar,et al. Biometric Encryption: enrollment and verification procedures , 1998, Defense + Commercial Sensing.
[14] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[15] Arjan Kuijper,et al. Quantifying privacy and security of biometric fuzzy commitment , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[16] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[17] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[18] Ross J. Anderson,et al. Combining cryptography with biometrics effectively , 2005 .
[19] Christoph Busch,et al. Privacy enhancing technology for a 3D-face recognition system , 2007, BIOSIG.
[20] Pieter H. Hartel,et al. Embedding Renewable Cryptographic Keys into Continuous Noisy Data , 2008, ICICS.
[21] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..