Design Aspects of Secure Biometric Systems and Biometrics in the Encrypted Domain
暂无分享,去创建一个
Stefan Katzenbeisser | Jana Dittmann | Claus Vielhauer | S. Katzenbeisser | C. Vielhauer | J. Dittmann
[1] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[2] Franz Pichler,et al. Advances in Cryptology — EUROCRYPT’ 85 , 2000, Lecture Notes in Computer Science.
[3] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[4] Stefan Katzenbeisser,et al. Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing , 2007, EURASIP J. Inf. Secur..
[5] Claus Vielhauer,et al. Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting , 2010, MM&Sec '10.
[6] Jana Dittmann,et al. Trust in E-Technologies , 2006 .
[7] Kevin W. Bowyer,et al. Analysis of template aging in iris biometrics , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[8] Alessandra Lumini,et al. Fake fingertip generation from a minutiae template , 2008, 2008 19th International Conference on Pattern Recognition.
[9] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[10] Stefan Katzenbeisser,et al. Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.
[11] Matt Bishop. Introduction to Computer Security , 2004 .
[12] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[13] Mauro Barni,et al. eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics , 2010, MM&Sec '10.
[14] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[15] Ahmad-Reza Sadeghi,et al. Efficient Privacy-Preserving Face Recognition , 2009, ICISC.
[16] Jana Dittmann,et al. Printed fingerprints: a framework and first results towards detection of artificially printed latent fingerprints for forensics , 2011, Electronic Imaging.
[17] Andreas Pfitzmann,et al. Networks Without User Observability: Design Options , 1985, EUROCRYPT.
[18] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[19] Ralf Steinmetz,et al. Biometric hash based on statistical features of online signatures , 2002, Object recognition supported by user interaction for service robots.
[20] Claus Vielhauer. Biometric User Authentication for it Security - From Fundamentals to Handwriting , 2006, Advances in Information Security.
[21] Lech J. Janczewski,et al. Cyber Warfare and Cyber Terrorism , 2007 .
[22] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.
[23] Mauro Barni,et al. Composite Signal Representation for Fast and Storage-Efficient Processing of Encrypted Signals , 2010, IEEE Transactions on Information Forensics and Security.
[24] John W. Carls. A Framework for Analyzing Biometric Template Aging and Renewal Prediction , 2012 .
[25] Qi Li,et al. Using voice to generate cryptographic keys , 2001, Odyssey.
[26] Julian Fiérrez,et al. Bayesian Hill-Climbing Attack and Its Application to Signature Verification , 2007, ICB.
[27] Bernadette Dorizzi,et al. Enhancing Information Security and Privacy by Combining Biometrics with Cryptography , 2012, Synthesis Lectures on Information Security, Privacy, and Trust.
[28] Klara Nahrstedt,et al. Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..
[29] Satoshi Hoshino,et al. Impact of artificial "gummy" fingers on fingerprint systems , 2002, IS&T/SPIE Electronic Imaging.
[30] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[31] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[32] Dong Hoon Lee,et al. Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers , 2010, ICISC.
[33] Jana Dittmann,et al. Proceedings of the 10th ACM workshop on Multimedia and security , 2008 .
[34] U K Gupta,et al. Dermatoglyphics: a study of finger tip patterns in bronchial asthma and its genetic disposition. , 2003, Kathmandu University medical journal.
[35] Matt Bishop,et al. Computer Security: Art and Science , 2002 .
[36] Mehdi Khosrow-Pour,et al. Encyclopedia of E-commerce, E-government and Mobile Commerce , 2006 .
[37] J. Bringer,et al. Anonymous identification with cancelable biometrics , 2009, 2009 Proceedings of 6th International Symposium on Image and Signal Processing and Analysis.
[38] Nasir D. Memon,et al. Protecting Biometric Templates With Sketch: Theory and Practice , 2007, IEEE Transactions on Information Forensics and Security.
[39] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[40] Claus Vielhauer,et al. Biometric Hash Algorithm for Dynamic Handwriting Embedded on a Java Card , 2011, BIOID.
[41] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .