Biometric Encryption: Creating a Privacy-Preserving 'Watch-List' Facial Recognition System
暂无分享,去创建一个
Konstantinos N. Plataniotis | Karl Martin | Ann Cavoukian | Michelle Chibba | Alex Stoianov | Soren Frederiksen | Tom Marinelli | Les DeSouza | K. Plataniotis | A. Cavoukian | S. Frederiksen | K. Martin | Tom Marinelli | A. Stoianov | M. Chibba | L. DeSouza
[1] Pieter H. Hartel,et al. Constructing practical Fuzzy Extractors using QIM , 2007 .
[2] Xingzhao Liu,et al. Nonlinear Frequency Scaling Algorithm for High Squint Spotlight SAR Data Processing , 2008, EURASIP J. Adv. Signal Process..
[3] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[4] George W. Quinn,et al. Report on the Evaluation of 2D Still-Image Face Recognition Algorithms , 2011 .
[5] Haiping Lu,et al. Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.
[6] Gregory W. Wornell,et al. Quantization Index Modulation Methods for Digital Watermarking and Information Embedding of Multimedia , 2001, J. VLSI Signal Process..
[7] Alex Pentland,et al. Face recognition using eigenfaces , 1991, Proceedings. 1991 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[8] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[9] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Anil K. Jain,et al. Multibiometric Template Security Using Fuzzy Vault , 2008, 2008 IEEE Second International Conference on Biometrics: Theory, Applications and Systems.
[11] Terence Sim,et al. The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[12] V. Bruce,et al. Recognition of unfamiliar faces , 2000, Trends in Cognitive Sciences.
[13] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[14] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[15] Richard Youmaran,et al. Towards a Measure of Biometric Information , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[16] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[17] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.
[18] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[19] Alex Stoianov,et al. Chapter 26. Biometric Encryption: The New Breed of Untraceable Biometrics , 2009 .
[20] Boris Skoric,et al. Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting , 2007 .
[21] Yong Wang,et al. ISAR Imaging of Rotating Target with Equal Changing Acceleration Based on the Cubic Phase Function , 2008, EURASIP J. Adv. Signal Process..
[22] Alice J. O'Toole,et al. FRVT 2006 and ICE 2006 large-scale results , 2007 .
[23] Lynette I. Millett,et al. Biometric Recognition: Challenges and Opportunities , 2010 .
[24] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[25] R.N.J. Veldhuis,et al. Multi-Bits Biometric String Generation based on the Likelihood Ratio , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[26] Raymond N. J. Veldhuis,et al. Pseudo Identities Based on Fingerprint Characteristics , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[27] Raymond N. J. Veldhuis,et al. Practical Biometric Authentication with Template Protection , 2005, AVBPA.
[28] Julien Bringer,et al. Biometric Identification over Encrypted Data Made Feasible , 2009, ICISS.
[29] Haiping Lu,et al. A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition , 2009, IEEE Systems Journal.
[30] Thomas B. Moeslund,et al. Long-Term Occupancy Analysis Using Graph-Based Optimisation in Thermal Imagery , 2013, 2013 IEEE Conference on Computer Vision and Pattern Recognition.