Improved fuzzy commitment scheme
暂无分享,去创建一个
[1] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[2] Christoph Busch,et al. Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters , 2014, Comput. Secur..
[3] Boris Skoric,et al. The Spammed Code Offset Method , 2014, IEEE Transactions on Information Forensics and Security.
[4] Yevgeniy Dodis,et al. Correcting errors without leaking partial information , 2005, STOC '05.
[5] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[6] Christoph Busch,et al. Comparing Binary Iris Biometric Templates Based on Counting Bloom Filters , 2013, CIARP.
[7] Julien Bringer,et al. Security analysis of Bloom filter-based iris biometric template protection , 2015, 2015 International Conference on Biometrics (ICB).
[8] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[9] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[10] Rafail Ostrovsky,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, SIAM J. Comput..
[11] Christoph Busch,et al. Towards generating protected fingerprint templates based on bloom filters , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).
[12] Kenta Takahashi,et al. Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[13] Sonam Chauhan,et al. Fuzzy Commitment Scheme based on Reed Solomon Codes , 2016, SIN.
[14] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[15] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[16] Naser Damer,et al. Helper data scheme for 2D cancelable face recognition using bloom filters , 2014, IWSSIP 2014 Proceedings.
[17] Bart Preneel,et al. Privacy Weaknesses in Biometric Sketches , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[18] Sharath Pankanti,et al. Fuzzy Vault for Fingerprints , 2005, AVBPA.
[19] Christoph Busch,et al. Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).
[20] Terrance E. Boult,et al. Robust distance measures for face-recognition supporting revocable biometric tokens , 2006, 7th International Conference on Automatic Face and Gesture Recognition (FGR06).
[21] Rama Chellappa,et al. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[22] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[23] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[24] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[25] Christoph Busch,et al. Towards cancelable multi-biometrics based on bloom filters: a case study on feature level fusion of face and iris , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).
[26] Huiqi Lu,et al. A Novel Logarithmic Mapping Algorithm for the Human IRIS Recognition using a MACH Filter , 2007, 2007 IEEE 15th Signal Processing and Communications Applications.
[27] Andreas Uhl,et al. Adaptive fuzzy commitment scheme based on iris-code error analysis , 2010, 2010 2nd European Workshop on Visual Information Processing (EUVIP).
[28] Rama Chellappa,et al. Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[29] Kenta Takahashi,et al. Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[30] Kenta Takahashi,et al. Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching , 2009, ICB.
[31] Haiping Lu,et al. Fuzzy Key Binding Strategies Based on Quantization Index Modulation (QIM) for Biometric Encryption (BE) Applications , 2010, IEEE Transactions on Information Forensics and Security.
[32] Yu-Jin Zhang,et al. Multimodal biometrics fusion using Correlation Filter Bank , 2008, 2008 19th International Conference on Pattern Recognition.
[33] Andrew Beng Jin Teoh,et al. PalmHashing: a novel approach for cancelable biometrics , 2005, Inf. Process. Lett..
[34] Christoph Busch,et al. Preventing the cross-matching attack in Bloom filter-based cancelable biometrics , 2015, 3rd International Workshop on Biometrics and Forensics (IWBF 2015).
[35] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[36] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[37] Nasir D. Memon,et al. Secure Sketch for Biometric Templates , 2006, ASIACRYPT.
[38] Sonam Chauhan,et al. Securing Fuzzy Commitment Scheme Against Decodability Attack-Based Cross-Matching , 2018 .
[39] Ee-Chien Chang,et al. Robust, short and sensitive authentication tags using secure sketch , 2006, MM&Sec '06.
[40] Christoph Busch,et al. Towards Bloom filter-based indexing of iris biometric data , 2015, 2015 International Conference on Biometrics (ICB).
[41] Plamen Petrov,et al. Kernel-based face detection and tracking with adaptive control by Kalman filtering , 2009, 2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
[42] Ingrid Verbauwhede,et al. Automatic secure fingerprint verification system based on fuzzy vault scheme , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[43] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[44] Julian Fiérrez,et al. Protected Facial Biometric Templates Based on Local Gabor Patterns and Adaptive Bloom Filters , 2014, 2014 22nd International Conference on Pattern Recognition.
[45] Christoph Busch,et al. On application of bloom filters to iris biometrics , 2014, IET Biom..
[46] Andrew Beng Jin Teoh,et al. Cancelable Biometrics Realization With Multispace Random Projections , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[47] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[48] Narishige Abe,et al. Irreversible fingerprint template using Minutiae Relation Code with Bloom Filter , 2015, 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[49] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[50] Ee-Chien Chang,et al. Robust Extraction of Secret Bits from Minutiae , 2007, ICB.
[51] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..