-
1
-
-
26444448320
-
"Cancelable Key-Based Fingerprint Templates"
-
July
-
R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable Key-Based Fingerprint Templates," Proc. 10th Australian Conf. Information Security and Privacy, pp. 242-252, July 2005.
-
(2005)
Proc. 10th Australian Conf. Information Security and Privacy
, pp. 242-252
-
-
Ang, R.1
Safavi-Naini, R.2
McAven, L.3
-
2
-
-
0036647191
-
"Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints"
-
July
-
A.M. Bazen and S.H. Gerez, "Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 7, pp. 905-919, July 2002.
-
(2002)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.24
, Issue.7
, pp. 905-919
-
-
Bazen, A.M.1
Gerez, S.H.2
-
3
-
-
33947506091
-
"Method for Producing a Digital Signature with Aid of Biometric Feature"
-
German Patent, DE 4243908A1
-
A. Bodo, "Method for Producing a Digital Signature with Aid of Biometric Feature," German Patent, DE 4243908A1, 1994.
-
(1994)
-
-
Bodo, A.1
-
4
-
-
10044297649
-
-
Springer Verlag
-
R.M. Bolle, J.H. Connell, S. Pankanti, N.K. Ratha, and A.W. Senior, Guide to Biometrics. Springer Verlag, 2003.
-
(2003)
Guide to Biometrics
-
-
Bolle, R.M.1
Connell, J.H.2
Pankanti, S.3
Ratha, N.K.4
Senior, A.W.5
-
6
-
-
0031651014
-
"On Enabling Secure Applications through Off-Line Biometric Identification"
-
G.I. Davida, Y. Frankel, and B. Matt, "On Enabling Secure Applications through Off-Line Biometric Identification," Proc. IEEE Symp. Security and Privacy, pp. 148-157, 1998.
-
(1998)
Proc. IEEE Symp. Security and Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.3
-
7
-
-
35048865463
-
"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data"
-
May
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques, pp. 523-540, May 2004.
-
(2004)
Proc. Int'l Conf. Theory and Applications of Cryptographic Techniques
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
9
-
-
33947529940
-
"Cancelable Biometrics: A Case Study in Fingerprints"
-
N. Ratha, J. Connell, R. Bolle, and S. Chikkerur, "Cancelable Biometrics: A Case Study in Fingerprints," Proc. Int'l Conf. Pattern Recognition, 2006.
-
(2006)
Proc. Int'l Conf. Pattern Recognition
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
Chikkerur, S.4
-
11
-
-
0036350106
-
"A Fuzzy Vault Scheme"
-
A. Lapidoth and E. Teletar, eds
-
A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Proc. IEEE Int'l Symp. Information Theory, A. Lapidoth and E. Teletar, eds., p. 408, 2002.
-
(2002)
Proc. IEEE Int'l Symp. Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
12
-
-
0021120530
-
"Fingerprint Pattern Classification"
-
M. Kawagoe and A. Tojo, "Fingerprint Pattern Classification," Pattern Recogntion, vol. 17, no. 3, pp. 295-303, 1987.
-
(1987)
Pattern Recogntion
, vol.17
, Issue.3
, pp. 295-303
-
-
Kawagoe, M.1
Tojo, A.2
-
14
-
-
0036030112
-
"Impact of Artificial Gummy Fingers on Fingerprint Systems"
-
Jan
-
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems," Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pp. 275-289, Jan. 2002.
-
(2002)
Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques IV
, vol.4677
, pp. 275-289
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
15
-
-
0033281372
-
"Password Hardening Based on Key Stroke Dynamics"
-
F. Monrose, M.K. Reiter, and S. Wetzel, "Password Hardening Based on Key Stroke Dynamics," Proc. ACM Conf. Computer and Comm. Security, pp. 73-82, 1999.
-
(1999)
Proc. ACM Conf. Computer and Comm. Security
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
16
-
-
0034829626
-
"Cryptographic Key Generation from Voice"
-
May
-
F. Monrose, M.K. Reiter, Q. Li, and S. Wetzel, "Cryptographic Key Generation from Voice," Proc. IEEE Symp. Security and Privacy, pp. 202-213, May 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
17
-
-
0038343928
-
"Localization of Corresponding Points in Fingerprints by Complex Filtering"
-
Sept
-
K. Nilsson and J. Bigun, "Localization of Corresponding Points in Fingerprints by Complex Filtering," Pattern Recognition Letters, vol. 24, no. 13, pp. 2135-2144, Sept. 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.13
, pp. 2135-2144
-
-
Nilsson, K.1
Bigun, J.2
-
18
-
-
33646728821
-
"Symmetry Filters Applied to Fingerprints"
-
PhD thesis, Chalmers Univ. of Technology, Sweden
-
K. Nilsson, "Symmetry Filters Applied to Fingerprints," PhD thesis, Chalmers Univ. of Technology, Sweden, 2005.
-
(2005)
-
-
Nilsson, K.1
-
20
-
-
0034809453
-
"Enhancing Security and Privacy in Biometrics-Based Authentication System"
-
N.K. Ratha, J.H. Connell, and R. Bolle, "Enhancing Security and Privacy in Biometrics-Based Authentication System," IBM Systems J., vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Systems J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.3
-
21
-
-
0030212761
-
"A Real-Time Matching System for Large Fingerprint Databases"
-
Aug
-
N.K. Ratha, K. Karu, S. Chen, and A.K. Jain, "A Real-Time Matching System for Large Fingerprint Databases," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 18, no. 8, pp. 799-813, Aug. 1996.
-
(1996)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.18
, Issue.8
, pp. 799-813
-
-
Ratha, N.K.1
Karu, K.2
Chen, S.3
Jain, A.K.4
-
22
-
-
10044284550
-
"Cancelable Biometric Filters for Face Recognition"
-
M. Savvides, B.V.K. Vijaya Kumar, and P.K. Khosla, "Cancelable Biometric Filters for Face Recognition," Proc. Int'l Conf. Pattern Recognition, pp. 922-925, 2004.
-
(2004)
Proc. Int'l Conf. Pattern Recognition
, pp. 922-925
-
-
Savvides, M.1
Vijaya Kumar, B.V.K.2
Khosla, P.K.3
-
23
-
-
0032224440
-
"Biometric Encryption Using Image Processing"
-
C. Soutar, D. Roberge, A. Stoinav, A. Gilroy, and B.V.K. Kumar, "Biometric Encryption Using Image Processing," Proc. SPIE, vol. 3314, pp. 174-188, 1998.
-
(1998)
Proc. SPIE
, vol.3314
, pp. 174-188
-
-
Soutar, C.1
Roberge, D.2
Stoinav, A.3
Gilroy, A.4
Kumar, B.V.K.5
-
24
-
-
33748076787
-
"A Secure Biometric Authentication Scheme Based on Robust Hashing"
-
Y. Sutcu, H.T. Sencar, and N. Nemon, "A Secure Biometric Authentication Scheme Based on Robust Hashing," Proc. Seventh Workshop Multimedia and Security, pp. 111-116, 2005.
-
(2005)
Proc. Seventh Workshop Multimedia and Security
, pp. 111-116
-
-
Sutcu, Y.1
Sencar, H.T.2
Nemon, N.3
-
25
-
-
9944223229
-
"PalmHashing: A Novel Approach for Cancelable Biometrics"
-
Jan
-
T. Connie, A.B.J. Teoh, M.K.O. Goh, and D.C.L. Ngo, "PalmHashing: A Novel Approach for Cancelable Biometrics," Information Processing Letters, vol. 93, no. 1, pp. 1-5, Jan. 2005.
-
(2005)
Information Processing Letters
, vol.93
, Issue.1
, pp. 1-5
-
-
Connie, T.1
Teoh, A.B.J.2
Goh, M.K.O.3
Ngo, D.C.L.4
-
26
-
-
12344259813
-
"Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number"
-
Nov
-
A.B.J. Teoh, D.C.L. Ngo, and A. Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number," Pattern Recognition, vol. 37, no. 11, pp. 2245-2255, Nov. 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
27
-
-
0035172554
-
"Optimized Singular Point Detection Algorithm for Fingerprint Images"
-
P. Ramo, M. Tico, V. Onnia, and J. Saarinen, "Optimized Singular Point Detection Algorithm for Fingerprint Images," IEEE Trans. Image Processing, vol. 3, pp. 242-245, 2001.
-
(2001)
IEEE Trans. Image Processing
, vol.3
, pp. 242-245
-
-
Ramo, P.1
Tico, M.2
Onnia, V.3
Saarinen, J.4
-
28
-
-
26444507172
-
"Practical Biometric Authentication with Template Protection"
-
P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.J. Schrijen, A.M. Bazen, and R.N.J. Veldhuis, "Practical Biometric Authentication with Template Protection," Proc. Sixth Int'l Conf. Audio and Video-Based Biometric Person Authentication, pp. 436-446, 2005.
-
(2005)
Proc. Sixth Int'l Conf. Audio and Video-Based Biometric Person Authentication
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
29
-
-
26444525625
-
"Fuzzy Vault for Fingerprints"
-
U. Uludag, S. Pankanti, and A.K. Jain, "Fuzzy Vault for Fingerprints," Proc. Sixth Int'l Conf. Audio and Video-Based Biometric Person Authentication, pp. 310-319, 2005.
-
(2005)
Proc. Sixth Int'l Conf. Audio and Video-Based Biometric Person Authentication
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
30
-
-
10044222391
-
"Biometric Cryptosystems: Issues and Challenges"
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain, "Biometric Cryptosystems: Issues and Challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, June 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
31
-
-
33751585800
-
"Biometric Hash Based on Statistical Features of Online Signatures"
-
C. Vielhauer, R. Steinmetz, and A. Mayerhoefer, "Biometric Hash Based on Statistical Features of Online Signatures," Proc. 16th Int'l Conf. Pattern Recognition, vol. 1, p. 10123, 2002.
-
(2002)
Proc. 16th Int'l Conf. Pattern Recognition
, vol.1
, pp. 10123
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhoefer, A.3
|