-
2
-
-
10044297649
-
-
Springer, New York, USA
-
R.M. Bolle, J.H. Connell, S.Pankati, N.K. Ratha, A.W. Senior, Guide to Biometrics, Springer, New York, USA, 2004.
-
(2004)
Guide to Biometrics
-
-
Bolle, R.M.1
Connell, J.H.2
Pankati, S.3
Ratha, N.K.4
Senior, A.W.5
-
3
-
-
0742302036
-
Biometric Recognition: Security and Privacy Concerns
-
S. Prabhakar, S. Pankanti, A.K. Jain, Biometric Recognition: Security and Privacy Concerns, IEEE Security & Privacy Magazine 1 (2003), pp: 33-42, 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
4
-
-
0442319139
-
An analysis of minutiae matching strength
-
Sweden, Jun
-
N. Ratha, J. H. Connell, and R. M. Bolle, An analysis of minutiae matching strength, in Proc. Int. Conf. Audio and Video-based Biometric Person Authentication, Halmstad, Sweden, Jun. 2001, pp. 223228.
-
(2001)
Proc. Int. Conf. Audio and Video-based Biometric Person Authentication, Halmstad
, pp. 223228
-
-
Ratha, N.1
Connell, J.H.2
Bolle, R.M.3
-
5
-
-
34548291920
-
-
A. Adler, Can images be regenerated from biometric templates?, Proc. Biometrics Consortium Conf., Washington, D.C., Sep. 2224, 2003.
-
A. Adler, Can images be regenerated from biometric templates?, Proc. Biometrics Consortium Conf., Washington, D.C., Sep. 2224, 2003.
-
-
-
-
6
-
-
84901788767
-
Attacks on biometric systems: A case study in fingerprints
-
San Jose, CA, Jan
-
U. Uludag and A. K. Jain, Attacks on biometric systems: a case study in fingerprints, in Proc. SPIEEI Security, Steganography and Watermarking of Multimedia Contents VI, San Jose, CA, Jan. 2004, pp. 622633.
-
(2004)
Proc. SPIEEI Security, Steganography and Watermarking of Multimedia Contents
, vol.6
, pp. 622633
-
-
Uludag, U.1
Jain, A.K.2
-
8
-
-
0038363245
-
A biometrics-based secure authentication system
-
N.K. Ratha, J.H. Connell, R.M. Bolle, A biometrics-based secure authentication system, Proc. of IEEE Workshop on Automatic Identification Advanced Technologies, pp: 70-73, 1999.
-
(1999)
Proc. of IEEE Workshop on Automatic Identification Advanced Technologies
, pp. 70-73
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
9
-
-
85019343450
-
Secure data hiding in wavelet compressed fingerprint images
-
N.K. Ratha, J.H. Connell, R. Bolle, Secure data hiding in wavelet compressed fingerprint images, ACM Multimedia 2000 Workshops Proc., pp: 127-130, 2000.
-
(2000)
ACM Multimedia 2000 Workshops Proc
, pp. 127-130
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.3
-
10
-
-
0442296538
-
Hiding Biometric Data
-
A.K. Jain, U. Uludag, Hiding Biometric Data, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 25, No. 11, pp: 1494-1498, 2003.
-
(2003)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.25
, Issue.11
, pp. 1494-1498
-
-
Jain, A.K.1
Uludag, U.2
-
11
-
-
0033601655
-
Verification Watermarks on Fingerprint Recognition and Retrieval
-
S. Pankanti, M.M. Yeung, Verification Watermarks on Fingerprint Recognition and Retrieval, Proc. SPIE, Vol. 3657, 1999, pp: 66-78.
-
(1999)
Proc. SPIE
, vol.3657
, pp. 66-78
-
-
Pankanti, S.1
Yeung, M.M.2
-
12
-
-
84962074661
-
Secure Biometrics Via Syndromes
-
E. Martinian, S. Yekhanin, J. Yedidia, Secure Biometrics Via Syndromes, Allerton Conference on Communications, Control and Computing, 2005
-
(2005)
Allerton Conference on Communications, Control and Computing
-
-
Martinian, E.1
Yekhanin, S.2
Yedidia, J.3
-
14
-
-
33645656960
-
Safety of templates in biometric person authentication using error-correcting code
-
T. Ohki, S. Akatsuka, N. Komatsu, Safety of templates in biometric person authentication using error-correcting code, Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents VIII, 2006.
-
(2006)
Proc. SPIE, Security, Steganography, and Watermarking of Multimedia Contents
, vol.8
-
-
Ohki, T.1
Akatsuka, S.2
Komatsu, N.3
-
15
-
-
10044222391
-
Biometric Cryptosystems: Issues ans Challanges
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, A.K. Jain, Biometric Cryptosystems: Issues ans Challanges, Proc. of IEEE, vol. 92, no. 6, pp. 948-960, June 2004.
-
(2004)
Proc. of IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
16
-
-
0033281339
-
-
A. Juels, M. Wattenberg, A Fuzzy Commitment Scheme, 6th ACM Conf. Computer and Communication Security, pp: 28-36, 1999.
-
A. Juels, M. Wattenberg, A Fuzzy Commitment Scheme, 6th ACM Conf. Computer and Communication Security, pp: 28-36, 1999.
-
-
-
-
17
-
-
0034809453
-
Enhancing Security and Privacy of Biometric-based Authentication Systems
-
N.K. Ratha, J.H. Connell, R. Bolle, Enhancing Security and Privacy of Biometric-based Authentication Systems, IBM Systems Journal, Vol. 40, No. 3, 2002.
-
(2002)
IBM Systems Journal
, vol.40
, Issue.3
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.3
-
18
-
-
33750947671
-
Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability
-
Y.W. Kuan, A. Goh, D. Ngo, A. Teoh, Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability, Proc. Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pp: 27-32, 2005.
-
(2005)
Proc. Fourth IEEE Workshop on Automatic Identification Advanced Technologies
, pp. 27-32
-
-
Kuan, Y.W.1
Goh, A.2
Ngo, D.3
Teoh, A.4
-
19
-
-
8844277754
-
Privacy Protected Biometric Templates: Acoustic Ear Identification
-
P. Tuyls, E. Verbitsky, T. Ignatenko, D. Schobben, T.H. Akkermans, Privacy Protected Biometric Templates: Acoustic Ear Identification, SPIE Proc., Vol. 5404, pp: 176-182, 2004
-
(2004)
SPIE Proc
, vol.5404
, pp. 176-182
-
-
Tuyls, P.1
Verbitsky, E.2
Ignatenko, T.3
Schobben, D.4
Akkermans, T.H.5
-
20
-
-
33947536487
-
Practical biometric template protection system based on reliable components
-
P. Tuyls, A. Akkermans, T. Kevenaar, G.J. Schrijen, A. Bazen, R. Veldhuis, Practical biometric template protection system based on reliable components, AVBPA Proc., 2005
-
(2005)
AVBPA Proc
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.J.4
Bazen, A.5
Veldhuis, R.6
-
21
-
-
33645656961
-
Face biometrics with renewable templates
-
M. Van der Veen, T. Kevenaar, G.-J. Schrijen, T.H. Akkermans, F. Zuo, Face biometrics with renewable templates, Security, Steganography, and Watermarking of Multimedia Contents, SPIE Proc., Vol. 6072, 2006.
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents, SPIE Proc
, vol.6072
-
-
Van der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.H.4
Zuo, F.5
-
22
-
-
24144502913
-
Signature recognition state-of-the-art
-
M. Faundez-Zanuy, Signature recognition state-of-the-art, IEEE Aerospace and Electronic Systems Magazine, Vol. 20, Issue 7, pp: 28-32, 2005.
-
(2005)
IEEE Aerospace and Electronic Systems Magazine
, vol.20
, Issue.7
, pp. 28-32
-
-
Faundez-Zanuy, M.1
-
23
-
-
33751585800
-
Biometric Hash based on statistical Features of online Signatures
-
C. Vielhauer, R. Steinmetz, A. Mayerhöfer, Biometric Hash based on statistical Features of online Signatures, International Conference on Pattern Recognition (ICPR), IEEE Proc., Vol. 1, pp: 123-126, 2002.
-
(2002)
International Conference on Pattern Recognition (ICPR), IEEE Proc
, vol.1
, pp. 123-126
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhöfer, A.3
-
24
-
-
33747674301
-
Cryptographic key generation using handwritten signature
-
Biometric Technologies for Human Identification, SPIE Proc
-
M. Freire-Santos, J. Fierrez-Aguilar, J. Ortega-Garcia, Cryptographic key generation using handwritten signature, Defense and Security Symposium, Biometric Technologies for Human Identification, SPIE Proc., Vol. 6202, pp: 225-231, 2006.
-
(2006)
Defense and Security Symposium
, vol.6202
, pp. 225-231
-
-
Freire-Santos, M.1
Fierrez-Aguilar, J.2
Ortega-Garcia, J.3
-
25
-
-
48149088108
-
Parameter Reduction and Personalized Parameter Selection for Automatic Signature Verification
-
F. Bauer, B. Wirtz, Parameter Reduction and Personalized Parameter Selection for Automatic Signature Verification, International Conference on Document Analysis and Recognition, Vol. 1, pp: 183-186, 1995.
-
(1995)
International Conference on Document Analysis and Recognition
, vol.1
, pp. 183-186
-
-
Bauer, F.1
Wirtz, B.2
-
26
-
-
84951768835
-
On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries
-
T.H. Rhee, S.J. Cho, J.H. Kim, On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries, Sixth International Conference on Document Analysis and Recognition, pp: 645-649, 2001.
-
(2001)
Sixth International Conference on Document Analysis and Recognition
, pp. 645-649
-
-
Rhee, T.H.1
Cho, S.J.2
Kim, J.H.3
-
28
-
-
3042523474
-
Dynamic features Extraction for on-Line Signature verification
-
F. Ramirez Rioja, M.N. Miyatake, H. Prez Meana, K. Toscano, Dynamic features Extraction for on-Line Signature verification, 14th International Conference on Electronics, Communications and Computers, pp: 156-161, 2004.
-
(2004)
14th International Conference on Electronics, Communications and Computers
, pp. 156-161
-
-
Ramirez Rioja, F.1
Miyatake, M.N.2
Prez Meana, H.3
Toscano, K.4
-
29
-
-
8344234316
-
A Goodness-of-Fit Statistical Toolkit
-
G.A.P. Cirrone, S. Donadio, S. Guatelli, A. Mantero, B. Mascialino, S. Parlati, M.G. Pia, A. Pfeiffer, A. Ribon, P. Viarengo,A Goodness-of-Fit Statistical Toolkit, IEEE Transactions on Nuclear Science, Vol. 51, No. 5, 2004
-
(2004)
IEEE Transactions on Nuclear Science
, vol.51
, Issue.5
-
-
Cirrone, G.A.P.1
Donadio, S.2
Guatelli, S.3
Mantero, A.4
Mascialino, B.5
Parlati, S.6
Pia, M.G.7
Pfeiffer, A.8
Ribon, A.9
Viarengo, P.10
-
31
-
-
34548269515
-
-
Federal Information Processing FIP, Standard, April
-
Federal Information Processing (FIP) Standards Publication 180-1, Security Hash Standard, http://www.itl.nist.gov/fipspubs/fip180-1.htm, April 1995
-
(1995)
Standards Publication 180-1, Security Hash
-
-
-
32
-
-
85023809951
-
Threshold cryptosystems, Advances in Cryptology-Crypto '89
-
Springer-Verlag, pp
-
Y. Desmedt,Y. Frankel, Threshold cryptosystems, Advances in Cryptology-Crypto '89, Lecture Notes in Computer Science 435, Springer-Verlag, pp: 307-315, 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
33
-
-
84947931331
-
Some Recent Research Aspects of Threshold Cryptography
-
Information Security Proc, Springer-Verlag, pp
-
Y. Desmedt, Some Recent Research Aspects of Threshold Cryptography, Information Security Proc.(Lecture Notes in Computer Science 1396), Springer-Verlag, pp: 158-173, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1396
, pp. 158-173
-
-
Desmedt, Y.1
-
34
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Communications of the ACM, 22, pp: 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
35
-
-
0037952468
-
-
Ph.D. dissertation, Dept. of Computer Science, Cornell University, Ithaca, NY
-
L. Zhou, Towards Fault- Tolerant and Secure On-line Services, Ph.D. dissertation, Dept. of Computer Science, Cornell University, Ithaca, NY, 2001.
-
(2001)
Towards Fault- Tolerant and Secure On-line Services
-
-
Zhou, L.1
|