Operational bio-hash to preserve privacy of fingerprint minutiae templates
暂无分享,去创建一个
Christophe Rosenberger | Rima Belguechi | Estelle Cherrier | Samy Ait-Aoudia | C. Rosenberger | S. Ait-Aoudia | E. Cherrier | R. Belguechi
[1] Andrew Beng Jin Teoh,et al. Cancellable biometrics and annotations on BioHash , 2008, Pattern Recognit..
[2] Andrew Beng Jin Teoh,et al. Remarks on BioHash and its mathematical foundation , 2006, Inf. Process. Lett..
[3] Bart Preneel,et al. Criteria towards metrics for benchmarking template protection algorithms , 2012, 2012 5th IAPR International Conference on Biometrics (ICB).
[4] Nalini K. Ratha,et al. Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[5] Loris Nanni,et al. Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system , 2011 .
[6] Loris Nanni,et al. Local binary patterns for a hybrid fingerprint matcher , 2008, Pattern Recognit..
[7] S. Karthikeyan,et al. AN EVALUATION OF FINGERPRINT SECURITY USING NONINVERTIBLE BIOHASH , 2011 .
[8] Chulhan Lee,et al. Cancelable fingerprint templates using minutiae-based bit-strings , 2010, J. Netw. Comput. Appl..
[9] Jean-Paul M. G. Linnartz,et al. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates , 2003, AVBPA.
[10] Venu Govindaraju,et al. Combination of Symmetric Hash Functions for Secure Fingerprint Matching , 2010, 2010 20th International Conference on Pattern Recognition.
[11] John Daugman,et al. The importance of being random: statistical principles of iris recognition , 2003, Pattern Recognit..
[12] Venu Govindaraju,et al. K-plet and Coupled BFS: A Graph Based Fingerprint Representation and Matching Algorithm , 2006, ICB.
[13] Loris Nanni,et al. An improved BioHashing for human authentication , 2007, Pattern Recognit..
[14] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[15] B. V. K. Vijaya Kumar,et al. Cancelable biometric filters for face recognition , 2004, Proceedings of the 17th International Conference on Pattern Recognition, 2004. ICPR 2004..
[16] Chulhan Lee,et al. Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[17] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[18] Rama Chellappa,et al. Sectored Random Projections for Cancelable Iris Biometrics , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.
[19] Samuel Kaski,et al. Dimensionality reduction by random mapping: fast similarity computation for clustering , 1998, 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36227).
[20] Ibrahim Sogukpinar,et al. Classification Based Revocable Biometric Identity Code Generation , 2009, COST 2101/2102 Conference.
[21] Xudong Jiang,et al. Fingerprint Reference-Point Detection , 2005, EURASIP J. Adv. Signal Process..
[22] Raymond N. J. Veldhuis,et al. Spectral Minutiae Representations for Fingerprint Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[23] Sharath Pankanti,et al. Filterbank-based fingerprint matching , 2000, IEEE Trans. Image Process..
[24] Andrew Beng Jin Teoh,et al. An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number , 2004, ICBA.
[25] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[26] Zhe Jin,et al. Fingerprint template protection with minutiae-based bit-string for security and privacy preserving , 2012, Expert Syst. Appl..
[27] Terrance E. Boult,et al. Revocable fingerprint biotokens: accuracy and security analysis , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[28] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[29] Anil K. Jain,et al. FVC2002: Second Fingerprint Verification Competition , 2002, Object recognition supported by user interaction for service robots.
[30] Weiwei Zhang,et al. Core-based structure matching algorithm of fingerprint verification , 2002, Object recognition supported by user interaction for service robots.
[31] Anil K. Jain,et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates , 2010, Pattern Recognit. Lett..
[32] Christoph Busch,et al. Dynamic random projection for biometric template protection , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).
[33] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[34] Reihaneh Safavi-Naini,et al. Cancelable Key-Based Fingerprint Templates , 2005, ACISP.
[35] Pauli Kuosmanen,et al. Fingerprint Matching Using an Orientation-Based Minutia Descriptor , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[36] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[37] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[38] Sharath Pankanti,et al. On the Individuality of Fingerprints , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[39] Berrin A. Yanikoglu,et al. Realization of correlation attack against the fuzzy vault scheme , 2008, Electronic Imaging.
[40] Andrew Beng Jin Teoh,et al. Replaceable and securely hashed keys from online signatures , 2006, IEICE Electron. Express.
[41] Stark C. Draper,et al. Feature extraction for a Slepian-Wolf biometric system using LDPC codes , 2008, 2008 IEEE International Symposium on Information Theory.
[42] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[43] Andrew Beng Jin Teoh,et al. Cancellable biometrics and user-dependent multi-state discretization in BioHash , 2009, Pattern Analysis and Applications.
[44] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[45] Christophe Rosenberger,et al. Biohashing for Securing Minutiae Template , 2010, 2010 20th International Conference on Pattern Recognition.
[46] Anil K. Jain,et al. Hardening Fingerprint Fuzzy Vault Using Password , 2007, ICB.
[47] Loris Nanni,et al. Empirical tests on BioHashing , 2006, Neurocomputing.
[48] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[49] Anil K. Jain,et al. Biometric template transformation: a security analysis , 2010, Electronic Imaging.