Privacy and Security Assessment of Biometric Systems
暂无分享,去创建一个
[1] Christophe Rosenberger,et al. Preimage attack on BioHashing , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[2] Masaki Hashiyada,et al. Development of biometric DNA ink for authentication security. , 2004, The Tohoku journal of experimental medicine.
[3] Arun Ross,et al. Handbook of Multibiometrics , 2006, The Kluwer international series on biometrics.
[4] Andy Adler. Sample images can be independently restored from face recognition templates , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[5] Anil K. Jain,et al. Beyond Minutiae: A Fingerprint Individuality Model with Pattern, Ridge and Pore Features , 2009, ICB.
[6] Julian Fiérrez,et al. Bayesian Hill-Climbing Attack and Its Application to Signature Verification , 2007, ICB.
[7] Assia Tria,et al. Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin , 2009, Formal to Practical Security.
[8] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[9] Julian Fiérrez,et al. Face verification put to test: A hill-climbing attack based on the uphill-simplex algorithm , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[10] Despina Polemi,et al. Application of Multi-criteria Analysis for the Creation of a Risk Assessment Knowledgebase for Biometric Systems , 2004, ICBA.
[11] Christophe Rosenberger,et al. GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[12] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[13] J. Fierrez-Aguilar,et al. Hill-Climbing and Brute-Force Attacks on Biometric Systems: A Case Study in Match-on-Card Fingerprint Verification , 2006, Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology.
[14] Chris Roberts,et al. Biometric attack vectors and defences , 2007, Comput. Secur..
[15] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[16] Václav Matyás,et al. Biometric authentication - security and usability , 2002, Communications and Multimedia Security.
[17] Julian Fiérrez,et al. On the Vulnerability of Iris-Based Systems to a Software Attack Based on a Genetic Algorithm , 2012, CIARP.
[18] Sébastien Marcel,et al. On the vulnerability of face verification systems to hill-climbing attacks , 2010, Pattern Recognit..
[19] Christophe Rosenberger,et al. Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[20] Nalini K. Ratha,et al. An Analysis of Minutiae Matching Strength , 2001, AVBPA.
[21] Andy Adler,et al. Biometric System Security , 2008 .
[22] Julian Fiérrez,et al. An evaluation of indirect attacks and countermeasures in fingerprint verification systems , 2011, Pattern Recognit. Lett..
[23] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[24] Shan Juan Xie,et al. New Trends and Developments in Biometrics , 2012 .
[25] Jean-Luc Dugelay,et al. On the vulnerability of face recognition systems to spoofing mask attacks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[26] Christophe Rosenberger,et al. Security EvaBio: An analysis tool for the security evaluation of biometric authentication systems , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[27] Christophe Rosenberger,et al. An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates , 2013, Comput. Secur..
[28] Douglas A. Reynolds,et al. SHEEP, GOATS, LAMBS and WOLVES A Statistical Analysis of Speaker Performance in the NIST 1998 Speaker Recognition Evaluation , 1998 .
[29] Julian Fiérrez,et al. Direct Attacks Using Fake Images in Iris Verification , 2008, BIOID.
[30] Anil K. Jain,et al. Attacks on biometric systems: a case study in fingerprints , 2004, IS&T/SPIE Electronic Imaging.
[31] Alessandra Lumini,et al. An evaluation of direct attacks using fake fingers generated from ISO templates , 2010, Pattern Recognit. Lett..
[32] Artur Rot. IT Risk Assessment: Quantitative and Qualitative Approach , 2008 .
[33] Ann Cavoukian,et al. Biometric Encryption Chapter from the Encyclopedia of Biometrics , 2009 .
[34] Ton van der Putte,et al. Biometrical Fingerprint Recognition: Don't Get Your Fingers Burned , 2001, CARDIS.
[35] Julian Fiérrez,et al. Author's Personal Copy Future Generation Computer Systems a High Performance Fingerprint Liveness Detection Method Based on Quality Related Features , 2022 .
[36] Sharath Pankanti,et al. Biometrics: a grand challenge , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[37] Marina Blanton,et al. On the (non-)reusability of fuzzy sketches and extractors and security in the computational setting , 2011, Proceedings of the International Conference on Security and Cryptography.