Fingerprint Combination for Privacy Protection
暂无分享,去创建一个
[1] Berrin Yanikoglu,et al. Combining multiple biometrics to protect privacy , 2004 .
[2] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[3] Josef Bigün,et al. Localization of corresponding points in fingerprints by complex filtering , 2003, Pattern Recognit. Lett..
[4] Arun Ross,et al. Mixing fingerprints for generating virtual identities , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[5] Nalini K. Ratha,et al. Impact of singular point detection on fingerprint matching performance , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[6] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[7] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[8] Craig I. Watson,et al. Neural Network Fingerprint Classification , 1994 .
[9] Alessandra Lumini,et al. Fingerprint Image Reconstruction from Standard Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[10] Arun Ross,et al. Mixing fingerprints for template security and privacy , 2011, 2011 19th European Signal Processing Conference.
[11] Yi Chen,et al. Extended feature set and touchless imaging for fingerprint matching , 2009 .
[12] Alisher Kholmatov,et al. Multi-biometric templates using fingerprint and voice , 2008, SPIE Defense + Commercial Sensing.
[13] Alex ChiChung Kot,et al. A novel system for fingerprint privacy protection1 , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[14] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Alex ChiChung Kot,et al. Privacy Protection of Fingerprint Database , 2011, IEEE Signal Processing Letters.
[16] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[17] Alex ChiChung Kot,et al. Attack using reconstructed fingerprint , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[18] Anil K. Jain,et al. Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Dario Maio,et al. Synthetic fingerprint-image generation , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[20] Anil K. Jain,et al. Fingerprint Image Enhancement: Algorithm and Performance Evaluation , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[21] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[22] Kieran G Larkin,et al. A coherent framework for fingerprint analysis: are fingerprints Holograms? , 2007, Optics express.
[23] Jiankun Hu,et al. Global Ridge Orientation Modeling for Partial Fingerprint Identification , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[24] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[25] Xudong Jiang,et al. Fingerprint minutiae matching based on the local and global structures , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[26] Umut Uludag,et al. Secure biometric systems , 2006 .