A crypto-biometric scheme based on iris-templates with fuzzy extractors
暂无分享,去创建一个
Luis Hernández Encinas | Fernando Hernández Álvarez | R. Álvarez Mariño | L. H. Encinas | F. Álvarez | R. Mariño
[1] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[2] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[3] Sharath Pankanti,et al. Biometrics: Personal Identification in Networked Society , 2013 .
[4] Robert Sabourin,et al. An adaptive classification system for video-based face recognition , 2012, Inf. Sci..
[5] Xuebing Zhou. Template protection and its implementation in 3D face recognition systems , 2007, SPIE Defense + Commercial Sensing.
[6] Byoungcheon Lee,et al. New receipt-free voting scheme using double-trapdoor commitment , 2011, Inf. Sci..
[7] Xavier Boyen,et al. Reusable cryptographic fuzzy extractors , 2004, CCS '04.
[8] Pieter H. Hartel,et al. Fuzzy extractors for continuous distributions , 2006, ASIACCS '07.
[9] Leonid Reyzin,et al. Fuzzy Extractors ∗ , 2007 .
[10] Pieter H. Hartel,et al. Secure Ad-hoc Pairing with Biometrics: SAfE , 2007 .
[11] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[12] Elaine B. Barker,et al. Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher , 2004 .
[13] Arun Ross,et al. Fingerprint matching using minutiae and texture features , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[14] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[15] Rafail Ostrovsky,et al. Secure Remote Authentication Using Biometric Data , 2005, EUROCRYPT.
[16] Kang Ryoung Park,et al. Biometric Key Binding: Fuzzy Vault Based on Iris Images , 2007, ICB.
[17] B. Chen,et al. Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).
[18] Duncan S. Wong,et al. Signcryption from randomness recoverable public key encryption , 2010, Inf. Sci..
[19] Fabien Laguillaumie,et al. Time-selective convertible undeniable signatures with short conversion receipts , 2010, Inf. Sci..
[20] Hervé Sibert,et al. Biometric Fuzzy Extractors Made Practical: A Proposal Based on FingerCodes , 2007, ICB.
[21] Oscar Castillo,et al. Type-1 and Type-2 Fuzzy Inference Systems as Integration Methods in Modular Neural Networks for Multimodal Biometry and Its Optimization with Genetic Algorithms , 2009, Soft Computing for Hybrid Intelligent Systems.
[22] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[23] Sharath Pankanti,et al. Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society , 1998 .
[24] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[25] David Zhang,et al. Tongue shape classification by geometric features , 2010, Inf. Sci..
[26] Hengjian Li,et al. Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes , 2010, Inf. Sci..
[27] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[28] Kathy J. Horadam,et al. Fuzzy Extractors for Minutiae-Based Fingerprint Authentication , 2007, ICB.
[29] David K. Smith. Theory of Linear and Integer Programming , 1987 .
[30] Zhoujun Li,et al. Provably secure identity-based authenticated key agreement protocols with malicious private key generators , 2011, Inf. Sci..
[31] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[32] Rong Hao,et al. Forward-secure identity-based signature: Security notions and construction , 2011, Inf. Sci..
[33] Luis Hernández Encinas,et al. Security Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates , 2009, CISIS.
[34] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[35] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[36] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[37] Yi Mu,et al. Certificateless threshold signature scheme from bilinear maps , 2010, Inf. Sci..
[38] Heejo Lee,et al. Activity-oriented access control to ubiquitous hospital information and services , 2010, Inf. Sci..
[39] Nasir D. Memon,et al. Secure Biometric Templates from Fingerprint-Face Features , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[40] Carmen Sánchez Ávila,et al. Two different approaches for iris recognition using Gabor filters and multiscale zero-crossing representation , 2005, Pattern Recognit..