Securing templates in a face recognition system using Error-Correcting Output Code and chaos theory
暂无分享,去创建一个
[1] C. Thomaz,et al. A new ranking method for principal components analysis and its application to face image analysis , 2010, Image Vis. Comput..
[2] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[3] R. R. Deshmukh,et al. Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment , 2016, ICTCS '16.
[4] Mohammad Shahram Moin,et al. A face template protection approach using chaos and GRP permutation , 2016, Secur. Commun. Networks.
[5] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[6] Yoram Singer,et al. Reducing Multiclass to Binary: A Unifying Approach for Margin Classifiers , 2000, J. Mach. Learn. Res..
[7] Nasir D. Memon,et al. Secure Sketches for Protecting Biometric Templates , 2013, Security and Privacy in Biometrics.
[8] S. Mazloom,et al. Color image encryption based on Coupled Nonlinear Chaotic Map , 2009 .
[9] Raymond N. J. Veldhuis,et al. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.
[10] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[11] Terence Sim,et al. The CMU Pose, Illumination, and Expression Database , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[12] Pong C. Yuen,et al. Vulnerabilities in binary face template , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[13] David J. Kriegman,et al. Acquiring linear subspaces for face recognition under variable lighting , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[14] Sergio Escalera,et al. On the Decoding Process in Ternary Error-Correcting Output Codes , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[16] Borko Furht,et al. Short Paper: Enhanced 1-D Chaotic Key-Based Algorithm for Image Encryption , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[17] Pong C. Yuen,et al. A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.
[18] Luis Hernández Encinas,et al. A crypto-biometric scheme based on iris-templates with fuzzy extractors , 2012, Inf. Sci..
[19] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[20] J. Yorke,et al. Chaotic behavior of multidimensional difference equations , 1979 .
[21] Hamidreza Rashidy Kanan,et al. Cancelable face using Chaos permutation , 2014, 7'th International Symposium on Telecommunications (IST'2014).
[22] David J. Kriegman,et al. Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection , 1996, ECCV.
[23] Pong C. Yuen,et al. Binary Discriminant Analysis for Generating Binary Face Template , 2012, IEEE Transactions on Information Forensics and Security.
[24] Anton H. M. Akkermans,et al. Face biometrics with renewable templates , 2006, Electronic Imaging.