Biometric template protection using cancelable biometrics and visual cryptography techniques
暂无分享,去创建一个
[1] Kiyoung Moon,et al. One-Time Templates for Face Authentication , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[2] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[3] Julian Fiérrez,et al. Cancelable Templates for Sequence-Based Biometrics with Application to On-line Signature Recognition , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[4] Yong Man Ro,et al. Biometric authentication using augmented face and random projection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[5] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[6] Andrew Beng Jin Teoh,et al. Remarks on BioHash and its mathematical foundation , 2006, Inf. Process. Lett..
[7] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[8] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[9] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[10] Rama Chellappa,et al. Sparse representations and Random Projections for robust and cancelable biometrics , 2010, 2010 11th International Conference on Control Automation Robotics & Vision.
[11] Bart Preneel,et al. Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[12] Nalini K. Ratha,et al. Cancelable iris biometric , 2008, 2008 19th International Conference on Pattern Recognition.
[13] W. Z. Gandhare,et al. Secure Iris Authentication Using Visual Cryptography , 2010, ArXiv.
[14] J. Fierrez-Aguilar,et al. Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[15] Arun Ross,et al. Mixing fingerprints for generating virtual identities , 2011, 2011 IEEE International Workshop on Information Forensics and Security.
[16] Gérard D. Cohen,et al. Optimal Iris Fuzzy Sketches , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[17] Andy Adler,et al. Biometric System Security , 2008 .
[18] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[19] P. Muhammed. A Secured Approach to Visual Cryptographic Biometric Template , 2011 .
[20] Christophe Rosenberger,et al. Preimage attack on BioHashing , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[21] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Jiankun Hu,et al. Attacks via record multiplicity on cancelable biometrics templates , 2014, Concurr. Comput. Pract. Exp..
[23] P. Babu Anto,et al. Tamperproof transmission of fingerprints using visual cryptography schemes , 2010, Biometrics Technology.
[24] Nalini K. Ratha,et al. Biometric perils and patches , 2002, Pattern Recognit..
[25] Bhagavatula Vijaya Kumar,et al. Biometric Encryption using image processing , 1998, Electronic Imaging.
[26] Hengjian Li,et al. Chaos-Based Cancelable Palmprint Authentication System , 2012 .
[27] Carsten Rust. TURBINE: Trusted revocable biometric identities , 2009 .
[28] Sunil V. K. Gaddam,et al. Efficient Cancelable Biometric Key Generation Scheme for Cryptography , 2010, Int. J. Netw. Secur..
[29] Arun Ross,et al. Mixing fingerprints for template security and privacy , 2011, 2011 19th European Signal Processing Conference.
[30] Bruce Schneier,et al. Inside risks: the uses and abuses of biometrics , 1999, CACM.
[31] Nalini K. Ratha,et al. Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[32] Xi Chen,et al. Chaotic Random Projection for Cancelable Biometric Key Generation , 2012, IScIDE.
[33] Daesung Moon,et al. Dictionary Attack on Functional Transform‐Based Cancelable Fingerprint Templates , 2009 .
[34] Arun Ross,et al. Visual cryptography for face privacy , 2010, Defense + Commercial Sensing.
[35] Christophe Rosenberger,et al. Texture based fingerprint BioHashing: Attacks and robustness , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[36] Shu-Hua Hsiao,et al. The Association of Stock Index among the market of China, US., and Japan , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[37] Yanxiong Li,et al. A two -step hybrid approach for voiceprint-biometric template protection , 2012, 2012 International Conference on Machine Learning and Cybernetics.
[38] Nasir D. Memon,et al. A secure biometric authentication scheme based on robust hashing , 2005, MM&Sec '05.
[39] Kiyoung Moon,et al. Inverse operation and preimage attack on BioHashing , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.
[40] J. Bringer,et al. Anonymous identification with cancelable biometrics , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[41] Kar-Ann Toh,et al. A Method to Enhance Face Biometric Security , 2007, 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems.
[42] Christoph Busch,et al. Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..
[43] Claus Vielhauer,et al. Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.
[44] David Zhang,et al. An Analysis on Invertibility of Cancelable Biometrics based on BioHashing , 2005, CISST.
[45] Hao Feng,et al. Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..
[46] Quan Feng,et al. Cancelable fingerprint fuzzy vault scheme: Cancelable fingerprint fuzzy vault scheme , 2008 .
[47] Yasushi Yamaguchi,et al. Extended Visual Cryptography for Natural Images , 2002, WSCG.
[48] N. Dey,et al. BioHash code generation from electrocardiogram features , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[49] Andrew Teoh Beng Jin,et al. High security Iris verification system based on random secret integration , 2006 .
[50] K. P. Soman,et al. An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancelable Fingerprint Biometrics , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.
[51] V. Vaithiyanathan,et al. Sheltered iris attestation by means of Visual Cryptography (SIA-VC) , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[52] Su Fei,et al. Cracking Cancelable Fingerprint Template of Ratha , 2008, ISCSCT.
[53] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[54] Loris Nanni,et al. Empirical tests on BioHashing , 2006, Neurocomputing.
[55] Loris Nanni,et al. Cancellable Biometrics: Problems and Solutions for Improving Accuracy , 2010 .
[56] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[57] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[58] Richard T. Watson,et al. Teledemocracy in local government , 1999, CACM.
[59] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[60] Venu Govindaraju,et al. Symmetric Hash Functions for Fingerprint Minutiae , 2005, ICAPR.
[61] Andrew Beng Jin Teoh,et al. Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and Discretization , 2006, EURASIP J. Adv. Signal Process..
[62] Anand Sharma,et al. Visual cryptography improvises the security of tongue as a biometric in banking system , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[63] Wen-Guey Tzeng,et al. Cheating Prevention in Visual Cryptography , 2007, IEEE Transactions on Image Processing.
[64] David Zhang,et al. An Iris Cryptosystem for Information Security , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[65] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[66] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[67] David Chek Ling Ngo,et al. Computation of Cryptographic Keys from Face Biometrics , 2003, Communications and Multimedia Security.
[68] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[69] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[70] David Zhang,et al. An Analysis on Accuracy of Cancelable Biometrics Based on BioHashing , 2005, KES.
[71] Pong C. Yuen,et al. A hybrid approach for face template protection , 2008, SPIE Defense + Commercial Sensing.
[72] Arun Ross,et al. Visual Cryptography for Biometric Privacy , 2011, IEEE Transactions on Information Forensics and Security.
[73] Ee-Chien Chang,et al. Robust, short and sensitive authentication tags using secure sketch , 2006, MM&Sec '06.
[74] Wenhua Xu,et al. Cancelable Voiceprint Template Based on Chaff-Points-Mixture Method , 2008, 2008 International Conference on Computational Intelligence and Security.
[75] Anil K. Jain,et al. On the security of non-invertible fingerprint template transforms , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[76] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[77] Andrew Beng Jin Teoh,et al. Biophasor: Token Supplemented Cancellable Biometrics , 2006, 2006 9th International Conference on Control, Automation, Robotics and Vision.
[78] Jiankun Hu,et al. Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures , 2013, CSS.
[79] Anne M. P. Canuto,et al. Ensemble systems and cancellable transformations for multibiometric-based identification , 2014, IET Biom..
[80] Chulhan Lee,et al. Cancelable fingerprint templates using minutiae-based bit-strings , 2010, J. Netw. Comput. Appl..
[81] Yongjin Wang,et al. Face Based Biometric Authentication with Changeable and Privacy Preservable Templates , 2007, 2007 Biometrics Symposium.
[82] L. Leng,et al. Cancelable PalmCode generated from randomized Gabor Filters for palmprint protection , 2010, 2010 25th International Conference of Image and Vision Computing New Zealand.
[83] Dacheng Xu,et al. A scheme for cancelable fingerprint fuzzy vault based on chaotic sequence , 2010, 2010 IEEE International Conference on Mechatronics and Automation.
[84] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[85] Alessandro Neri,et al. Bioconvolving: Cancelable templates for a multi-biometrics signature recognition system , 2011, 2011 IEEE International Systems Conference.
[86] N. Kiyavash,et al. Secure Smartcard-Based Fingerprint Authentication ∗ , 2003 .
[87] Rohit Nalavade,et al. Biometric Data Security using Recursive Visual Cryptography , 2012 .
[88] Ibrahim Sogukpinar,et al. Classification Based Revocable Biometric Identity Code Generation , 2009, COST 2101/2102 Conference.
[89] T. Charles Clancy,et al. Secure smartcardbased fingerprint authentication , 2003, WBMA '03.
[90] L. Latha,et al. Efficient Approach for Retinal Biometric Template Security and Person Authentication using Noninvertible Constructions , 2013 .
[91] Kenta Takahashi,et al. Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.
[92] Tao Li,et al. Cancelable Voiceprint Templates Based on Knowledge Signatures , 2008, 2008 International Symposium on Electronic Commerce and Security.
[93] Alfredo De Santis,et al. Extended capabilities for visual cryptography , 2001, Theor. Comput. Sci..
[94] Marina L. Gavrilova,et al. Multimodal biometric approach for cancelable face template generation , 2012, Defense + Commercial Sensing.
[95] Alessandro Neri,et al. Cancellable Biometrics for On-line Signature Recognition , 2011 .
[96] Julien Bringer,et al. The best of both worlds: Applying secure sketches to cancelable biometrics , 2008, Sci. Comput. Program..
[97] Bin-Chang Chieu,et al. Robust copyright-protection scheme based on visual secret sharing and Bose–Chaudhuri–Hocquenghem code techniques , 2012, J. Electronic Imaging.
[98] Kenta Takahashi,et al. Parameter management schemes for cancelable biometrics , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[99] Henk D. L. Hollmann,et al. XOR-based Visual Cryptography Schemes , 2005, Des. Codes Cryptogr..
[100] Christophe Rosenberger,et al. Evaluation of Cancelable Biometric Systems: Application to Finger-Knuckle-Prints , 2011, 2011 International Conference on Hand-Based Biometrics.
[101] Andreas Uhl,et al. Cancelable Iris Biometrics Using Block Re-mapping and Image Warping , 2009, ISC.
[102] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[103] Marina L. Gavrilova,et al. A Novel Cross Folding Algorithm for Multimodal Cancelable Biometrics , 2012, Int. J. Softw. Sci. Comput. Intell..
[104] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[105] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[106] Marina L. Gavrilova,et al. Situation awareness of cancelable biometric system , 2013, The Visual Computer.
[107] Takato Hirano,et al. Homomorphic encryption based cancelable biometrics secure against replay and its related attack , 2012, 2012 International Symposium on Information Theory and its Applications.
[108] Arun Ross,et al. An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.
[109] Pong C. Yuen,et al. A Hybrid Approach for Generating Secure and Discriminating Face Template , 2010, IEEE Transactions on Information Forensics and Security.
[110] Chulhan Lee,et al. Changeable Biometrics for Appearance Based Face Recognition , 2006, 2006 Biometrics Symposium: Special Session on Research at the Biometric Consortium Conference.