메뉴 건너뛰기




Volumn 6505, Issue , 2007, Pages

Adaptive and distributed cryptography for signature biometrics protection

Author keywords

[No Author keywords available]

Indexed keywords

ADAPTIVE SYSTEMS; BIOMETRICS; COMMUNICATION CHANNELS (INFORMATION THEORY); DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; IMAGE RECOGNITION;

EID: 34548214636     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (35)
  • 5
    • 34548291920 scopus 로고    scopus 로고
    • A. Adler, Can images be regenerated from biometric templates?, Proc. Biometrics Consortium Conf., Washington, D.C., Sep. 2224, 2003.
    • A. Adler, Can images be regenerated from biometric templates?, Proc. Biometrics Consortium Conf., Washington, D.C., Sep. 2224, 2003.
  • 11
    • 0033601655 scopus 로고    scopus 로고
    • Verification Watermarks on Fingerprint Recognition and Retrieval
    • S. Pankanti, M.M. Yeung, Verification Watermarks on Fingerprint Recognition and Retrieval, Proc. SPIE, Vol. 3657, 1999, pp: 66-78.
    • (1999) Proc. SPIE , vol.3657 , pp. 66-78
    • Pankanti, S.1    Yeung, M.M.2
  • 15
    • 10044222391 scopus 로고    scopus 로고
    • Biometric Cryptosystems: Issues ans Challanges
    • June
    • U. Uludag, S. Pankanti, S. Prabhakar, A.K. Jain, Biometric Cryptosystems: Issues ans Challanges, Proc. of IEEE, vol. 92, no. 6, pp. 948-960, June 2004.
    • (2004) Proc. of IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.K.4
  • 16
    • 0033281339 scopus 로고    scopus 로고
    • A. Juels, M. Wattenberg, A Fuzzy Commitment Scheme, 6th ACM Conf. Computer and Communication Security, pp: 28-36, 1999.
    • A. Juels, M. Wattenberg, A Fuzzy Commitment Scheme, 6th ACM Conf. Computer and Communication Security, pp: 28-36, 1999.
  • 17
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing Security and Privacy of Biometric-based Authentication Systems
    • N.K. Ratha, J.H. Connell, R. Bolle, Enhancing Security and Privacy of Biometric-based Authentication Systems, IBM Systems Journal, Vol. 40, No. 3, 2002.
    • (2002) IBM Systems Journal , vol.40 , Issue.3
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.3
  • 19
    • 8844277754 scopus 로고    scopus 로고
    • Privacy Protected Biometric Templates: Acoustic Ear Identification
    • P. Tuyls, E. Verbitsky, T. Ignatenko, D. Schobben, T.H. Akkermans, Privacy Protected Biometric Templates: Acoustic Ear Identification, SPIE Proc., Vol. 5404, pp: 176-182, 2004
    • (2004) SPIE Proc , vol.5404 , pp. 176-182
    • Tuyls, P.1    Verbitsky, E.2    Ignatenko, T.3    Schobben, D.4    Akkermans, T.H.5
  • 24
    • 33747674301 scopus 로고    scopus 로고
    • Cryptographic key generation using handwritten signature
    • Biometric Technologies for Human Identification, SPIE Proc
    • M. Freire-Santos, J. Fierrez-Aguilar, J. Ortega-Garcia, Cryptographic key generation using handwritten signature, Defense and Security Symposium, Biometric Technologies for Human Identification, SPIE Proc., Vol. 6202, pp: 225-231, 2006.
    • (2006) Defense and Security Symposium , vol.6202 , pp. 225-231
    • Freire-Santos, M.1    Fierrez-Aguilar, J.2    Ortega-Garcia, J.3
  • 25
    • 48149088108 scopus 로고
    • Parameter Reduction and Personalized Parameter Selection for Automatic Signature Verification
    • F. Bauer, B. Wirtz, Parameter Reduction and Personalized Parameter Selection for Automatic Signature Verification, International Conference on Document Analysis and Recognition, Vol. 1, pp: 183-186, 1995.
    • (1995) International Conference on Document Analysis and Recognition , vol.1 , pp. 183-186
    • Bauer, F.1    Wirtz, B.2
  • 26
    • 84951768835 scopus 로고    scopus 로고
    • On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries
    • T.H. Rhee, S.J. Cho, J.H. Kim, On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries, Sixth International Conference on Document Analysis and Recognition, pp: 645-649, 2001.
    • (2001) Sixth International Conference on Document Analysis and Recognition , pp. 645-649
    • Rhee, T.H.1    Cho, S.J.2    Kim, J.H.3
  • 31
    • 34548269515 scopus 로고
    • Federal Information Processing FIP, Standard, April
    • Federal Information Processing (FIP) Standards Publication 180-1, Security Hash Standard, http://www.itl.nist.gov/fipspubs/fip180-1.htm, April 1995
    • (1995) Standards Publication 180-1, Security Hash
  • 32
    • 85023809951 scopus 로고
    • Threshold cryptosystems, Advances in Cryptology-Crypto '89
    • Springer-Verlag, pp
    • Y. Desmedt,Y. Frankel, Threshold cryptosystems, Advances in Cryptology-Crypto '89, Lecture Notes in Computer Science 435, Springer-Verlag, pp: 307-315, 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 33
    • 84947931331 scopus 로고    scopus 로고
    • Some Recent Research Aspects of Threshold Cryptography
    • Information Security Proc, Springer-Verlag, pp
    • Y. Desmedt, Some Recent Research Aspects of Threshold Cryptography, Information Security Proc.(Lecture Notes in Computer Science 1396), Springer-Verlag, pp: 158-173, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1396 , pp. 158-173
    • Desmedt, Y.1
  • 34
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, How to share a secret, Communications of the ACM, 22, pp: 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 35
    • 0037952468 scopus 로고    scopus 로고
    • Ph.D. dissertation, Dept. of Computer Science, Cornell University, Ithaca, NY
    • L. Zhou, Towards Fault- Tolerant and Secure On-line Services, Ph.D. dissertation, Dept. of Computer Science, Cornell University, Ithaca, NY, 2001.
    • (2001) Towards Fault- Tolerant and Secure On-line Services
    • Zhou, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.