An Encryption Approach Using Information Fusion Techniques Involving Prime Numbers and Face Biometrics
暂无分享,去创建一个
Gerardo Iovane | Michele Nappi | Carmen Bisogni | Luigi De Maio | M. Nappi | G. Iovane | Carmen Bisogni | Luigi De Maio | C. Bisogni | Luigi De Maio
[1] Lucien Wald,et al. Some terms of reference in data fusion , 1999, IEEE Trans. Geosci. Remote. Sens..
[2] Ren C. Luo,et al. Multisensor fusion and integration: approaches, applications, and future research directions , 2002 .
[3] Elmo Benedetto,et al. An Information Fusion approach based on prime numbers coming from RSA algorithm and Fractals for secure coding , 2015 .
[4] David Chek Ling Ngo,et al. PalmHashing: A novel approach for dual-factor authentication , 2004, Pattern Analysis and Applications.
[5] Alan N. Steinberg,et al. Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.
[6] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[7] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[8] Norman Poh,et al. Hybrid Biometric Person Authentication Using Face and Voice Features , 2001, AVBPA.
[9] David Zhang,et al. When Faces Are Combined with Palmprints: A Novel Biometric Fusion Strategy , 2004, ICBA.
[10] Anil K. Jain,et al. Combining multiple matchers for a high security fingerprint verification system , 1999, Pattern Recognit. Lett..
[11] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[12] Ching-Han Chen,et al. Fusion of Face and Iris Features for Multimodal Biometrics , 2006, ICB.
[13] Raymond N. J. Veldhuis,et al. Hybrid fusion for biometrics: Combining score-level and decision-level fusion , 2008, 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.
[14] Loris Nanni,et al. An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers , 2006, Neurocomputing.
[15] Neyire Deniz Sarier. Multimodal biometric Identity Based Encryption , 2018, Future Gener. Comput. Syst..
[16] James Llinas,et al. Multisensor Data Fusion , 1990 .
[17] Pramod K. Varshney,et al. Multisensor Data Fusion , 1997, IEA/AIE.
[18] Alan N. Steinberg,et al. Rethinking the JDL Data Fusion Levels , 2005 .
[19] Wei-Yun Yau,et al. Fusion of Auxiliary Information for Multi-modal Biometrics Authentication , 2004, ICBA.
[20] Tom Ziemke,et al. An information fusion approach to controlling complexity in bioinformatics research , 2005, 2005 IEEE Computational Systems Bioinformatics Conference - Workshops (CSBW'05).
[21] Sudeep Sarkar,et al. Comparison and Combination of Ear and Face Images in Appearance-Based Biometrics , 2003, IEEE Trans. Pattern Anal. Mach. Intell..
[22] Anil K. Jain,et al. Integrating Faces and Fingerprints for Personal Identification , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[23] Jiankun Hu,et al. A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion , 2015, IEEE Transactions on Information Forensics and Security.
[24] Federico Castanedo,et al. A Review of Data Fusion Techniques , 2013, TheScientificWorldJournal.
[25] Alexander Karlsson,et al. Dependable and generic high-level information fusion methods and algorithms for uncertainty management , 2007 .
[26] Dharmendra Sharma,et al. An Agent Based Multifactor Biometric Security System , 2008, KES.
[27] Loris Nanni,et al. A multi-modal method based on the competitors of FVC2004 and on palm data combined with tokenised random numbers , 2008, Pattern Recognit. Lett..
[28] James Llinas,et al. Revisiting the JDL Data Fusion Model II , 2004 .
[29] Erik Blasch,et al. JDL level 5 fusion model: user refinement issues and applications in group tracking , 2002, SPIE Defense + Commercial Sensing.
[30] Belur V. Dasarathy,et al. Information Fusion - what, where, why, when, and how? Editorial , 2001, Inf. Fusion.
[31] Michele Nappi,et al. Robust face recognition after plastic surgery using region-based approaches , 2015, Pattern Recognit..
[32] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[33] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[34] Kim-Kwang Raymond Choo,et al. Biometrics in the Cloud: Challenges and Research Opportunities , 2017, IEEE Cloud Computing.
[35] Oleg Ushmaev,et al. Biometric Fusion : Robust Approach , 2006 .
[36] Arun Ross,et al. Information fusion in biometrics , 2003, Pattern Recognit. Lett..
[37] David Zhang,et al. An analysis of BioHashing and its variants , 2006, Pattern Recognit..
[38] Gerardo Iovane,et al. Face recognition using SIFT features and a region-based ranking , 2010 .