Secure Chaff-less Fuzzy Vault for Face Identification Systems
暂无分享,去创建一个
Jung Yeon Hwang | Sangrae Cho | Xingbo Dong | Soohyong Kim | Zhe Jin | Andrew Beng Jin Teoh | A. Teoh | J. Hwang | Zhe Jin | Xingbo Dong | Sangrae Cho | Soohyong Kim
[1] Carlisle M. Adams,et al. Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents , 2016, Recent Advances in Computational Intelligence in Defense and Security.
[2] Anil K. Jain,et al. IARPA Janus Benchmark - C: Face Dataset and Protocol , 2018, 2018 International Conference on Biometrics (ICB).
[3] Jiankun Hu,et al. A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures , 2016, IEEE Transactions on Information Forensics and Security.
[4] Yevgeniy Dodis,et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data , 2004, EUROCRYPT.
[5] John Daugman,et al. Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.
[6] Dae-Jong Lee,et al. Real Fuzzy Vault for Protecting Face Template , 2013 .
[7] Yongjin Wang,et al. Fuzzy Vault for Face Based Cryptographic Key Generation , 2007, 2007 Biometrics Symposium.
[8] T.E. Boult,et al. Cracking Fuzzy Vaults and Biometric Encryption , 2007, 2007 Biometrics Symposium.
[9] Zhe Jin,et al. Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing , 2017, IEEE Transactions on Information Forensics and Security.
[10] Jian Cheng,et al. NormFace: L2 Hypersphere Embedding for Face Verification , 2017, ACM Multimedia.
[11] James Philbin,et al. FaceNet: A unified embedding for face recognition and clustering , 2015, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[12] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[13] Lifang Wu,et al. A Face Based Fuzzy Vault Scheme for Secure Online Authentication , 2010, 2010 Second International Symposium on Data, Privacy, and E-Commerce.
[14] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[15] Tancrède Lepoint,et al. SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems , 2019, Future Gener. Comput. Syst..
[16] Shengcai Liao,et al. Learning Face Representation from Scratch , 2014, ArXiv.
[17] Haiping Lu,et al. Face recognition with biometric encryption for privacy-enhancing self-exclusion , 2009, 2009 16th International Conference on Digital Signal Processing.
[18] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[19] Yu Qiao,et al. Joint Face Detection and Alignment Using Multitask Cascaded Convolutional Networks , 2016, IEEE Signal Processing Letters.
[20] Neil A. Macmillan,et al. Detection Theory , 2021 .
[21] Jung Yeon Hwang,et al. Secure Secret Sharing Enabled b-band Mini Vaults Bio-Cryptosystem for Vectorial Biometrics , 2018, IEEE Transactions on Dependable and Secure Computing.
[22] Sharath Pankanti,et al. Fingerprint-Based Fuzzy Vault: Implementation and Performance , 2007, IEEE Transactions on Information Forensics and Security.
[23] KyungHee Lee,et al. Fuzzy Face Vault: How to Implement Fuzzy Vault with Weighted Features , 2007, HCI.
[24] Ann Cavoukian,et al. Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment , 2012 .
[25] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[26] Venkatesan Guruswami,et al. List decoding of error correcting codes , 2001 .
[27] Jiankun Hu,et al. A survey: Error control methods used in bio-cryptography , 2014, 2014 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD).
[28] Yuxiao Hu,et al. MS-Celeb-1M: A Dataset and Benchmark for Large-Scale Face Recognition , 2016, ECCV.
[29] Neil A. Macmillan,et al. Detection Theory: A User's Guide , 1991 .
[30] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[31] Andrew Beng Jin Teoh,et al. A secure biometric discretization scheme for face template protection , 2012, Future Gener. Comput. Syst..
[32] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[33] Margarita Osadchy,et al. It is All in the System's Parameters: Privacy and Security Issues in Transforming Biometric Raw Data into Binary Strings , 2019, IEEE Transactions on Dependable and Secure Computing.
[34] Omkar M. Parkhi,et al. VGGFace2: A Dataset for Recognising Faces across Pose and Age , 2017, 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018).
[35] Khalil El-Khatib,et al. A Privacy Enhanced Facial Recognition Access Control System Using Biometric Encryption , 2017, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS).
[36] Jiankun Hu,et al. FE-SViT , 2016, ACM Trans. Embed. Comput. Syst..
[37] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[38] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[39] Carlos D. Castillo,et al. Fuzzy Vault , 2009, Encyclopedia of Biometrics.
[40] Stefanos Zafeiriou,et al. ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[41] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[42] Jiankun Hu,et al. A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement , 2014, IEEE Transactions on Information Forensics and Security.
[43] Anton H. M. Akkermans,et al. Face recognition with renewable and privacy preserving binary templates , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).
[44] Axel Munk,et al. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack , 2007, BIOSIG.
[45] Muhammad N. Marsono,et al. Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm , 2013, Future Gener. Comput. Syst..
[46] Lei Zhang,et al. TypicFace: Dynamic Margin Cosine Loss for Deep Face Recognition , 2018, PRICAI.
[47] Andrew Beng Jin Teoh,et al. Biometric Feature-Type Transformation: Making templates compatible for secret protection , 2015, IEEE Signal Processing Magazine.
[48] Shengcai Liao,et al. A benchmark study of large-scale unconstrained face recognition , 2014, IEEE International Joint Conference on Biometrics.
[49] Peng Li,et al. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme , 2010, J. Netw. Comput. Appl..
[50] Christoph Busch,et al. Fuzzy Vault for 3D Face Recognition Systems , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.
[51] Zhe Jin,et al. A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems , 2018, Inf. Sci..
[52] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[53] Andreas Uhl,et al. Statistical attack against iris-biometric fuzzy commitment schemes , 2011, CVPR 2011 WORKSHOPS.
[54] Heinrich Ihmor,et al. Performance of the Fuzzy Vault for Multiple Fingerprints , 2010, BIOSIG.
[55] Anil K. Jain,et al. Face Search at Scale , 2017, IEEE Transactions on Pattern Analysis and Machine Intelligence.