-
1
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Mar
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J. vol. 40, no. 3, pp. 614-634, Mar. 2001.
-
(2001)
IBM Syst. J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
2
-
-
0036887662
-
Biometrics perils and patches
-
Dec
-
R. M. Bolle, J. H. Connel, and N. K. Ratha, "Biometrics perils and patches," Pattern Recognit., vol. 35, no. 12, pp. 2727-2738, Dec. 2002.
-
(2002)
Pattern Recognit
, vol.35
, Issue.12
, pp. 2727-2738
-
-
Bolle, R.M.1
Connel, J.H.2
Ratha, N.K.3
-
3
-
-
26444448320
-
Cancelable key-based fingerprint templates
-
R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable key-based fingerprint templates," in Proc. 10th ACISP, 2005, pp. 242-252.
-
(2005)
Proc. 10th ACISP
, pp. 242-252
-
-
Ang, R.1
Safavi-Naini, R.2
McAven, L.3
-
4
-
-
34547093749
-
Symmetric hash functions for fingerprint minutiae
-
Bath, U.K
-
S. Tulyakov, V. S. Chavan, and V. Govindaraju, "Symmetric hash functions for fingerprint minutiae," in Proc. Int. Workshop Pattern Recog. for Crime Prevention, Security and Surveillance, Bath, U.K., 2005.
-
(2005)
Proc. Int. Workshop Pattern Recog. for Crime Prevention, Security and Surveillance
-
-
Tulyakov, S.1
Chavan, V.S.2
Govindaraju, V.3
-
5
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
M. Savvides, B. V. K. V. Kumar, and P. K. Khosla, "Cancelable biometric filters for face recognition," in Proc. 17th ICPR, 2004, vol. 3, pp. 922-925.
-
(2004)
Proc. 17th ICPR
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.V.K.V.2
Khosla, P.K.3
-
6
-
-
12344259813
-
BioHashing: Two factor authentication featuring fingerprint data and tokenised random number
-
Nov
-
A. B. J. Teoh, D. C. L. Ngo, and A. Goh, "BioHashing: Two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognit., vol. 37, no. 11, pp. 2245-2255, Nov. 2004.
-
(2004)
Pattern Recognit
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
7
-
-
12844255931
-
PalmHashing: A novel approach for dual-factor authentication
-
T. Connie, A. Teoh, M. Goh, and D. Ngo, "PalmHashing: A novel approach for dual-factor authentication," Pattern Anal. Appl., vol. 7, no. 3, pp. 255-268, 2004.
-
(2004)
Pattern Anal. Appl
, vol.7
, Issue.3
, pp. 255-268
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
8
-
-
33646096928
-
Palmprint based cancelable biometric authentication system
-
Y. H. Pang, A. B. J. Teoh, and D. C. L. Ngo, "Palmprint based cancelable biometric authentication system," Int. J. Signal Process. vol. 1, no. 2, pp. 98-104, 2004.
-
(2004)
Int. J. Signal Process
, vol.1
, Issue.2
, pp. 98-104
-
-
Pang, Y.H.1
Teoh, A.B.J.2
Ngo, D.C.L.3
-
9
-
-
9944223229
-
PalmHashing: A novel approach to cancelable biometrics
-
T. Connie, A. Teoh, M. Goh, and D. Ngo, "PalmHashing: A novel approach to cancelable biometrics," Inf. Process. Lett., vol. 93, no. 1, pp. 1-5, 2005.
-
(2005)
Inf. Process. Lett
, vol.93
, Issue.1
, pp. 1-5
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
10
-
-
8344273612
-
Personalised cryptographic key generation based on FaceHashing
-
Oct
-
A. B. J. Teoh, D. C. L. Ngo, and A. Goh, "Personalised cryptographic key generation based on FaceHashing," Comput. Security, vol. 23, no. 7, pp. 606-614, Oct. 2004.
-
(2004)
Comput. Security
, vol.23
, Issue.7
, pp. 606-614
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
11
-
-
19744373363
-
Cancellable biometrics featuring with tokenized random number
-
Jul
-
A. B. J. Teoh and D. C. L. Ngo, "Cancellable biometrics featuring with tokenized random number," Pattern Recognit. Lett., vol. 26, no. 10, pp. 1454-1460, Jul. 2005.
-
(2005)
Pattern Recognit. Lett
, vol.26
, Issue.10
, pp. 1454-1460
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
-
12
-
-
33646095185
-
An analysis of BioHashing and its variants
-
Jul. 27
-
A. Kong, K. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of BioHashing and its variants," Pattern Recognit., vol. 39, no. 7, pp. 1359-1368, Jul. 27, 2006.
-
(2006)
Pattern Recognit
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.2
Zhang, D.3
Kamel, M.4
You, J.5
-
13
-
-
33750799305
-
Robust distance measures for face-recognition supporting revocable biometrics token
-
Southampton, U.K, Apr. 10-12
-
T. Boult, "Robust distance measures for face-recognition supporting revocable biometrics token," in Proc. 7th Int. Conf. Autom. Face and Gesture Recog., Southampton, U.K., Apr. 10-12, 2006, pp. 560-566.
-
(2006)
Proc. 7th Int. Conf. Autom. Face and Gesture Recog
, pp. 560-566
-
-
Boult, T.1
-
14
-
-
84875113383
-
A changeable biometric system for appearance-based face recognition
-
Baltimore, MD, Sep. 19-21, CD-ROM
-
M. Jeong, C. Lee, J. Kim, J. Choi, K. Toh, and J. Kim, "A changeable biometric system for appearance-based face recognition," in Proc. BCC, Baltimore, MD, Sep. 19-21, 2006. CD-ROM.
-
(2006)
Proc. BCC
-
-
Jeong, M.1
Lee, C.2
Kim, J.3
Choi, J.4
Toh, K.5
Kim, J.6
-
15
-
-
0032224440
-
Biometric encryption using image processing
-
C. Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. Kumar, "Biometric encryption using image processing," in Proc. SPIE - Optical Security and Counterfeit Deterrence Techniques II, 1998, vol. 3314, pp. 178-188.
-
(1998)
Proc. SPIE - Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Kumar, B.V.5
-
16
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzel, "Password hardening based on keystroke dynamics," in Proc. 6th ACM Conf. Comput. and Commun. Security, 1999, pp. 73-82.
-
(1999)
Proc. 6th ACM Conf. Comput. and Commun. Security
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
17
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Guildford, U.K, Jun
-
J. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in Proc. AVBPA, Guildford, U.K., Jun. 2003, pp. 393-402.
-
(2003)
Proc. AVBPA
, pp. 393-402
-
-
Linnartz, J.1
Tuyls, P.2
-
18
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Jun
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
19
-
-
0036350106
-
A fuzzy vault scheme
-
Lausanne, Switzerland
-
A. Juels and M. Sundan, "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Inf. Theory, Lausanne, Switzerland, 2002, p. 408.
-
(2002)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 408
-
-
Juels, A.1
Sundan, M.2
-
20
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication," in Proc. ACM SIGMM Multimedia, Biometrics Methods and Applications Workshop, 2003, pp. 45-52.
-
(2003)
Proc. ACM SIGMM Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
21
-
-
26444525625
-
Fuzzy vault for fingerprints
-
Rye Brook, NY, Jul
-
U. Uludag, S. Pankanti, and A. Jain, "Fuzzy vault for fingerprints," in Proc. AVBPA, Rye Brook, NY, Jul. 2005, pp. 310-319.
-
(2005)
Proc. AVBPA
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.3
-
22
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
Mar
-
S. Yang and I. Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," in Proc. IEEE ICASSP, Mar. 2005, pp. 609-612.
-
(2005)
Proc. IEEE ICASSP
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
23
-
-
33845532978
-
Securing fingerprint template: Fuzzy vault with helper data
-
Jun. 22
-
U. Uludag and A. K. Jain, "Securing fingerprint template: Fuzzy vault with helper data," in Proc. IEEE Workshop Privacy Res. Vis., Jun. 22, 2006, pp. 163-170.
-
(2006)
Proc. IEEE Workshop Privacy Res. Vis
, pp. 163-170
-
-
Uludag, U.1
Jain, A.K.2
-
24
-
-
33744911734
-
Automatic alignment of fingerprint features for fuzzy fingerprint vault
-
Beijing, China, Dec. 15-17
-
Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim, and D. Ahn, "Automatic alignment of fingerprint features for fuzzy fingerprint vault," in Proc. Inf. Security and Cryptology, 1st SKLOIS Conf., CISC, Beijing, China, Dec. 15-17, 2005, pp. 358-369.
-
(2005)
Proc. Inf. Security and Cryptology, 1st SKLOIS Conf., CISC
, pp. 358-369
-
-
Chung, Y.1
Moon, D.2
Lee, S.3
Jung, S.4
Kim, T.5
Ahn, D.6
-
25
-
-
50249097296
-
Minutiae-based structures for a fuzzy vault
-
Baltimore, MD, Sep. 19-21, CD-ROM
-
J. Jeffers and A. Arakala, "Minutiae-based structures for a fuzzy vault," in Proc. BCC, Baltimore, MD, Sep. 19-21, 2006. CD-ROM.
-
(2006)
Proc. BCC
-
-
Jeffers, J.1
Arakala, A.2
-
26
-
-
34547096126
-
System and method for distorting a biometric for transactions with enhanced security and privacy,
-
U.S. Patent 6,836,554 B1, U.S. Pat. Off, Washington, DC, Dec. 28, 2004
-
R. M. Bolle, J. H. Connell, and N. K. Ratha, "System and method for distorting a biometric for transactions with enhanced security and privacy," U.S. Patent 6,836,554 B1, U.S. Pat. Off., Washington, DC, Dec. 28, 2004.
-
-
-
Bolle, R.M.1
Connell, J.H.2
Ratha, N.K.3
-
28
-
-
25844442567
-
Fingerprint matching combining the global orientation field with minutia
-
Nov
-
J. Qi, S. Yang, and Y. Wang, "Fingerprint matching combining the global orientation field with minutia," Pattern Recognit. Lett., vol. 26, no. 15, pp. 2424-2430, Nov. 2005.
-
(2005)
Pattern Recognit. Lett
, vol.26
, Issue.15
, pp. 2424-2430
-
-
Qi, J.1
Yang, S.2
Wang, Y.3
-
29
-
-
0042973959
-
Fingerprint matching using an orientation-based minutia descriptor
-
Aug
-
M. Tico and P. Kuosmanen, "Fingerprint matching using an orientation-based minutia descriptor," IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 8, pp. 1009-1014, Aug. 2003.
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.25
, Issue.8
, pp. 1009-1014
-
-
Tico, M.1
Kuosmanen, P.2
-
30
-
-
0032142349
-
Fingerprint image enhancement: Algorithms and performance evaluation
-
Aug
-
L. Hong, Y. Wan, and A. K. Jain, "Fingerprint image enhancement: Algorithms and performance evaluation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 8, pp. 777-789, Aug. 1998.
-
(1998)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.20
, Issue.8
, pp. 777-789
-
-
Hong, L.1
Wan, Y.2
Jain, A.K.3
-
31
-
-
33751573265
-
A robust fingerprint matching algorithm using local alignment
-
Quebec, Canada, Aug
-
D. Lee, K. Choi, and J. Kim, "A robust fingerprint matching algorithm using local alignment," in Proc. Int. Conf. Pattern Recog., Quebec, Canada, Aug. 2002, pp. 803-806.
-
(2002)
Proc. Int. Conf. Pattern Recog
, pp. 803-806
-
-
Lee, D.1
Choi, K.2
Kim, J.3
|