暂无分享,去创建一个
Andrew Beng Jin Teoh | KokSheik Wong | Massimo Tistarelli | Xingbo Dong | Zhe Jin | M. Tistarelli | A. Teoh | Zhe Jin | Xingbo Dong | Koksheik Wong
[1] Pong C. Yuen,et al. Masquerade attack on transform-based binary-template protection based on perceptron learning , 2014, Pattern Recognit..
[2] Nalini K. Ratha,et al. Cancelable Biometrics: A Case Study in Fingerprints , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[3] Christophe Rosenberger,et al. Preimage attack on BioHashing , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[4] John Daugman,et al. Probing the Uniqueness and Randomness of IrisCodes: Results From 200 Billion Iris Pair Comparisons , 2006, Proceedings of the IEEE.
[5] Andrew Beng Jin Teoh,et al. Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Davide Maltoni,et al. Minutia Cylinder-Code: A New Representation and Matching Technique for Fingerprint Recognition , 2010, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[7] Richard E. Blahut,et al. Computation of channel capacity and rate-distortion functions , 1972, IEEE Trans. Inf. Theory.
[8] Christos Dimitrakakis,et al. On the Leakage of Information in Biometric Authentication , 2014, INDOCRYPT.
[9] Zhe Jin,et al. A Cancellable Face Template Scheme Based on Nonlinear Multi-Dimension Spectral Hashing , 2019, 2019 7th International Workshop on Biometrics and Forensics (IWBF).
[10] Davide Maltoni,et al. A two-factor protection scheme for MCC fingerprint templates , 2014, 2014 International Conference of the Biometrics Special Interest Group (BIOSIG).
[11] Rama Chellappa,et al. Cancelable Biometrics: A review , 2015, IEEE Signal Processing Magazine.
[12] Masakazu Fujio,et al. Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification , 2019, IEEE Access.
[13] Zhe Jin,et al. Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing , 2017, IEEE Transactions on Information Forensics and Security.
[14] Pong C. Yuen,et al. Vulnerabilities in binary face template , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[15] Libor Masek,et al. MATLAB Source Code for a Biometric Identification System Based on Iris Patterns , 2003 .
[16] Kiyoung Moon,et al. Inverse operation and preimage attack on BioHashing , 2009, 2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications.
[17] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[18] Kenta Takahashi,et al. Parameter management schemes for cancelable biometrics , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).
[19] Stefanos Zafeiriou,et al. ArcFace: Additive Angular Margin Loss for Deep Face Recognition , 2018, 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR).
[20] Takashi Ito,et al. Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation , 2012, J. Inf. Process..
[21] Munaga V. N. K. Prasad,et al. Biometric Template Protection: A Systematic Literature Review of Approaches and Modalities , 2017 .
[22] Guoqiang Han,et al. Deep Secure Quantization: On secure biometric hashing against similarity-based attacks , 2019, Signal Process..
[23] Marwan Mattar,et al. Labeled Faces in the Wild: A Database forStudying Face Recognition in Unconstrained Environments , 2008 .
[24] Zhe Jin,et al. A Genetic Algorithm Enabled Similarity-Based Attack on Cancellable Biometrics , 2019, 2019 IEEE 10th International Conference on Biometrics Theory, Applications and Systems (BTAS).
[25] Anil K. Jain,et al. Fingerprint Reconstruction: From Minutiae to Phase , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[26] Zhe Jin,et al. A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template , 2014, Pattern Recognit. Lett..
[27] Geoffrey Smith,et al. On the Foundations of Quantitative Information Flow , 2009, FoSSaCS.
[28] K. Kanagalakshmi,et al. Cancelable biometric template generation and protection schemes: A review , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[29] Christoph Busch,et al. Alignment-free cancelable iris biometric templates based on adaptive bloom filters , 2013, 2013 International Conference on Biometrics (ICB).
[30] Anil K. Jain,et al. Biometric Template Protection: Bridging the performance gap between theory and practice , 2015, IEEE Signal Processing Magazine.
[31] Davide Maltoni,et al. Noninvertible Minutia Cylinder-Code Representation , 2012, IEEE Transactions on Information Forensics and Security.
[32] Yumi Sakemi,et al. A Spoofing Attack against a Cancelable Biometric Authentication Scheme , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[33] Suguru Arimoto,et al. An algorithm for computing the capacity of arbitrary discrete memoryless channels , 1972, IEEE Trans. Inf. Theory.
[34] Marta Gomez-Barrero,et al. General Framework to Evaluate Unlinkability in Biometric Template Protection Systems , 2018, IEEE Transactions on Information Forensics and Security.
[35] Nalini K. Ratha,et al. Generating Cancelable Fingerprint Templates , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[36] J. Wade Davis,et al. Statistical Pattern Recognition , 2003, Technometrics.