Biometric Template Protection with Fuzzy Vault and Fuzzy Commitment
暂无分享,去创建一个
[1] Chulhan Lee,et al. Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[2] Nalini K. Ratha,et al. Anonymous and Revocable Fingerprint Recognition , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.
[3] Gian Luca Marcialis,et al. Robustness of multi-modal biometric systems under realistic spoof attacks against all traits , 2011, 2011 IEEE Workshop on Biometric Measurements and Systems for Security and Medical Applications (BIOMS).
[4] S. K. Singh,et al. Improved and innovative key generation algorithms for biometric cryptosystems , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[5] Peng Li,et al. An effective biometric cryptosystem combining fingerprints with error correction codes , 2012, Expert Syst. Appl..
[6] Anil K. Jain,et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors , 2008, 2008 19th International Conference on Pattern Recognition.
[7] Bo Fu,et al. Multibiometric Cryptosystem: Model Structure and Performance Analysis , 2009, IEEE Transactions on Information Forensics and Security.
[8] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[9] Sharath Pankanti,et al. BIOMETRIC IDENTIFICATION , 2000 .
[10] Hisham Al-Assam,et al. Robust Biometric Based Key Agreement and Remote Mutual Authentication , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[11] Anil K. Jain,et al. Encyclopedia of Biometrics , 2015, Springer US.
[12] Marina L. Gavrilova,et al. Multimodal Cancelable Biometrics , 2012, 2012 IEEE 11th International Conference on Cognitive Informatics and Cognitive Computing.
[13] Seira Hidano,et al. Evaluation of security for biometric guessing attacks in biometric cryptosystem using fuzzy commitment scheme , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[14] Ke Xiong,et al. Is Fuzzy Vault Scheme Very Effective for Key Binding in Biometric Cryptosystems? , 2011, 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
[15] Dario Maio,et al. Fake finger detection by skin distortion analysis , 2006, IEEE Transactions on Information Forensics and Security.
[16] Nalini K. Ratha,et al. Advances in Biometrics , 2008 .
[17] Benjamin Tams. Attacks and Countermeasures in Fingerprint Based Biometric Cryptosystems , 2013, ArXiv.
[18] Wang Yao,et al. A new fuzzy fingerprint vault using multivariable linear function based on Lorenz Chaotic System , 2012, 2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE).
[19] Anil K. Jain,et al. Handbook of Fingerprint Recognition , 2005, Springer Professional Computing.
[20] Tom A. M. Kevenaar,et al. Multi-modal and multi-instance fusion for biometric cryptosystems , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[21] Qinghai Gao. Secure Biometrics , 2009 .
[22] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[23] Julien Bringer,et al. A Framework for Analyzing Template Security and Privacy in Biometric Authentication Systems , 2012, IEEE Transactions on Information Forensics and Security.
[24] Andreas Uhl,et al. A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..
[25] Lahouari Ghouti,et al. Biometric Cryptosystem with Renewable Templates , 2012 .
[26] Masao Kasahara,et al. On biometric encryption using fingerprint and it's security evaluation , 2008, 2008 10th International Conference on Control, Automation, Robotics and Vision.
[27] Anil K. Jain,et al. Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.
[28] Venu Govindaraju,et al. Advances in Biometrics: Sensors, Algorithms and Systems , 2007 .
[29] Aboul Ella Hassanien,et al. A Hybrid Approach for Biometric Template Security , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.
[30] Bo Fu,et al. Analysis of multi-biometric encryption at feature-level fusion , 2012, Proceedings of the 10th World Congress on Intelligent Control and Automation.
[31] D. M. Hutton. Advances in Biometrics: Sensors, Algorithms and Systems , 2008 .
[32] Daesung Moon,et al. Biometrics Information Protection Using Fuzzy Vault Scheme , 2012, 2012 Eighth International Conference on Signal Image Technology and Internet Based Systems.
[33] Norimichi Tsumura,et al. Securing BioEncoded IrisCodes against Correlation Attacks , 2011, 2011 IEEE International Conference on Communications (ICC).
[34] Tom Gaertner,et al. Biometric Systems Technology Design And Performance Evaluation , 2016 .
[35] Anil K. Jain,et al. Securing Fingerprint Template: Fuzzy Vault with Helper Data , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).
[36] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[37] Yoshifumi Ueshige,et al. A proposal of efficient scheme of key management using ID-based encryption and Biometrics , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).