Optimal sequential fusion for multibiometric cryptosystems
暂无分享,去创建一个
[1] Martin Wattenberg,et al. A fuzzy commitment scheme , 1999, CCS '99.
[2] Tom A. M. Kevenaar,et al. Multi-modal and multi-instance fusion for biometric cryptosystems , 2012, 2012 BIOSIG - Proceedings of the International Conference of Biometrics Special Interest Group (BIOSIG).
[3] M J Sold,et al. If nothing goes wrong—is everything alright? , 1987, Anaesthesia.
[4] Chris J. Hill,et al. Risk of Masquerade Arising from the Storage of Biometrics , 2001 .
[5] Ching Y. Suen,et al. Application of majority voting to pattern recognition: an analysis of its behavior and performance , 1997, IEEE Trans. Syst. Man Cybern. Part A.
[6] Raymond N. J. Veldhuis,et al. Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme , 2011, IEEE Transactions on Information Forensics and Security.
[7] Arun Ross,et al. Fusion in Multibiometric Identification Systems: What about the Missing Data? , 2009, ICB.
[8] A. Stoianov,et al. Security issues of Biometric Encryption , 2009, 2009 IEEE Toronto International Conference Science and Technology for Humanity (TIC-STH).
[9] Naoto Miura,et al. Feature Extraction of Finger-vein Patterns Based on Repeated Line Tracking and Its Application to Personal Identification , 2022 .
[10] Yilong Yin,et al. SDUMLA-HMT: A Multimodal Biometric Database , 2011, CCBR.
[11] Anil K. Jain,et al. Multibiometric Cryptosystems Based on Feature-Level Fusion , 2012, IEEE Transactions on Information Forensics and Security.
[12] Ajay Kumar,et al. Human Identification Using Finger Images , 2012, IEEE Transactions on Image Processing.
[13] Benjamin Tams,et al. Decodability Attack against the Fuzzy Commitment Scheme with Public Feature Transforms , 2014, ArXiv.
[14] Andreas Uhl,et al. Reliability-balanced feature level fusion for fuzzy commitment scheme , 2011, 2011 International Joint Conference on Biometrics (IJCB).
[15] Gian Luca Marcialis,et al. Serial Fusion of Fingerprint and Face Matchers , 2007, MCS.
[16] C. Rathgeb,et al. Statistical attack against fuzzy commitment scheme , 2012, IET Biom..
[17] Evangelos Eleftheriou,et al. On the computation of the minimum distance of low-density parity-check codes , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[18] Jiri Matas,et al. On Combining Classifiers , 1998, IEEE Trans. Pattern Anal. Mach. Intell..
[19] Anil K. Jain,et al. Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..
[20] J A Hanley,et al. If nothing goes wrong, is everything all right? Interpreting zero numerators. , 1983, JAMA.
[21] Yong Wang,et al. ISAR Imaging of Rotating Target with Equal Changing Acceleration Based on the Cubic Phase Function , 2008, EURASIP J. Adv. Signal Process..
[22] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[23] Alex Stoianov,et al. Security of Error Correcting Code for biometric Encryption , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.
[24] Madhu Sudan,et al. A Fuzzy Vault Scheme , 2006, Des. Codes Cryptogr..
[25] A. Ross,et al. Level Fusion Using Hand and Face Biometrics , 2005 .
[26] W. W. Peterson,et al. Error-Correcting Codes. , 1962 .
[27] Feng Hao,et al. Combining Crypto with Biometrics Effectively , 2006, IEEE Transactions on Computers.
[28] Venugopal V. Veeravalli,et al. Multihypothesis sequential probability ratio tests - Part I: Asymptotic optimality , 1999, IEEE Trans. Inf. Theory.
[29] C. Busch,et al. Multi-algorithm fusion with template protection , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.
[30] T. Lai. Asymptotic Optimality of Invariant Sequential Probability Ratio Tests , 1981 .
[31] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[32] Arun Ross,et al. Feature level fusion of hand and face biometrics , 2005, SPIE Defense + Commercial Sensing.
[33] John Daugman,et al. How iris recognition works , 2002, IEEE Transactions on Circuits and Systems for Video Technology.
[34] Anil K. Jain,et al. Biometric cryptosystems: issues and challenges , 2004, Proceedings of the IEEE.
[35] Kenta Takahashi,et al. Accuracy improvement with high convenience in biometric identification using multihypothesis sequential probability ratio test , 2009, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS).
[36] Kenta Takahashi,et al. A secure and user-friendly multimodal biometric system , 2004, SPIE Defense + Commercial Sensing.
[37] Takashi Yanagawa,et al. Kyushu University Institutional Repository DIVERSITY OF HUMAN FINGER VEIN PATTERNS AND ITS APPLICATION TO PERSONAL IDENTIFICATION , 2022 .
[38] E. Mayoraz,et al. Fusion of face and speech data for person identity verification , 1999, IEEE Trans. Neural Networks.
[39] Sharath Pankanti,et al. Guide to Biometrics , 2003, Springer Professional Computing.