A Finger-Vein Based Cancellable Bio-cryptosystem
暂无分享,去创建一个
[1] Yilong Yin,et al. SDUMLA-HMT: A Multimodal Biometric Database , 2011, CCBR.
[2] Jiankun Hu,et al. Global Ridge Orientation Modeling for Partial Fingerprint Identification , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[3] Andrew Beng Jin Teoh,et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..
[4] Nalini K. Ratha,et al. Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..
[5] Jiankun Hu,et al. A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[6] Frédéric Lehmann,et al. Turbo Segmentation of Textured Images , 2011, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[7] Jiankun Hu,et al. A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[8] D. Mulyono,et al. A study of finger vein biometric for personal identification , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[9] J. Hu. Mobile fingerprint template protection: Progress and open issues , 2008, 2008 3rd IEEE Conference on Industrial Electronics and Applications.
[10] Jiankun Hu,et al. Pair-polar coordinate-based cancelable fingerprint templates , 2011, Pattern Recognit..
[11] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[12] Jiankun Hu,et al. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach , 2012, Pattern Recognit..
[13] Peng Zhang,et al. A pitfall in fingerprint bio-cryptographic key generation , 2011, Comput. Secur..
[14] Jiankun Hu,et al. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment , 2011, Secur. Commun. Networks.
[15] Jiankun Hu,et al. Mobile device access control: an improved correlation based face authentication scheme and its Java ME application , 2012, Concurr. Comput. Pract. Exp..
[16] Vitomir Struc,et al. The Complete Gabor-Fisher Classifier for Robust Face Recognition , 2010, EURASIP J. Adv. Signal Process..
[17] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .