-
1
-
-
35148888299
-
-
ANSI/INCITS 378-2004, 2004. Information Technology - Finger Minutiae Format for Data. Interchange, InterNational Committee for Information Technology Standards.
-
-
-
-
2
-
-
84937704662
-
-
Clancy, T., Lin, D., Kiyavash, N., 2003. Secure smartcard-based fingerprint authentication. In: ACM Workshop on Biometric Methods and Applications (WBMA 2003).
-
-
-
-
3
-
-
0031651014
-
-
Davida, G., Frankel, Y., Matt, B., 1998. On enabling secure applications through on-line biometric identification. In: Proc. IEEE 1998 Symp. on Security and Privacy, Oakland, CA.
-
-
-
-
4
-
-
0031250434
-
Fingerprint matching using transformation parameter clustering
-
Germain R., Califano A., and Colville S. Fingerprint matching using transformation parameter clustering. IEEE Comput. Sci. Eng. 4 4 (1997) 42-49
-
(1997)
IEEE Comput. Sci. Eng.
, vol.4
, Issue.4
, pp. 42-49
-
-
Germain, R.1
Califano, A.2
Colville, S.3
-
5
-
-
8844254070
-
-
Jea, T.-Y., Chavan, V.S., Govindaraju, V., Schneider, J.K., 2004. Security and matching of partial fingerprint recognition systems. In: SPIE Defense and Security Symposium.
-
-
-
-
6
-
-
0036350106
-
-
Juels, A., Sudan, M., 2002. A fuzzy vault scheme. In: IEEE Internat. Symposium on Information Theory.
-
-
-
-
7
-
-
0033281339
-
-
Juels, A., Wattenberg, M., 1999. A fuzzy commitment scheme. In: ACM Conf. on Computer and Communications Security.
-
-
-
-
8
-
-
33750954911
-
-
Kevenaar, T., Schrijen, G., Veen, M., Akkermans, A., Zuo, F., 2005. Face recognition with renewable and privacy preserving binary templates. In: Auto ID 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies.
-
-
-
-
9
-
-
33750947671
-
-
Kuan, Y., Goh, A., Ngo, D., Teoh, A., 2005. Cryptogrpahic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability. In: Auto ID 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies.
-
-
-
-
10
-
-
35148818054
-
-
Linnartz, J., Tuyls, P., 2003. New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proc. of the 4th Internat. Conference on Audio and Video-based Biometric Person Authentication, Guildford, UK.
-
-
-
-
12
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication system
-
Ratha N.K., Connell J.H., and Bolle R. Enhancing security and privacy in biometrics-based authentication system. IBM Systems J. 40 3 (2001) 614-634
-
(2001)
IBM Systems J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.3
-
13
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Ratha N.K., Chikkerur S., Connell J.H., and Bolle R.M. Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Machine Intell. 29 4 (2007) 561-572
-
(2007)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
15
-
-
35148884880
-
-
Second International Fingerprint Verification Competition. .
-
-
-
-
16
-
-
8344236959
-
Biometric encryption
-
Nichols R. (Ed), McGraw-Hill
-
Soutar C., Roberge D., Stoianov A., Gilroy R., and Kumar V. Biometric encryption. In: Nichols R. (Ed). ICSA Guide to Cryptography (1999), McGraw-Hill
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, V.5
-
17
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
Teoh A., Ngo D., and Goh A. Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37 11 (2004) 2245-2255
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Teoh, A.1
Ngo, D.2
Goh, A.3
-
18
-
-
35148870213
-
-
Tulyakov, S., Farooq, F., Govindaraju, V., 2005. Symmetric hash functions for fingerprint minutiae. In: Internat. Workshop on Pattern Recognition for Crime Prevention, Security and Surveillance, Bath, UK.
-
-
-
-
19
-
-
35148896004
-
-
Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.J., Bazen, A.M., Veldhuis, R.N.J., 2005. Practical biometric authentication with template protection. In: Proc. 5th Internat. Conf. on Audio and Video-based Biometric Person Authentication, Rye Town, NY.
-
-
-
-
20
-
-
8844228915
-
-
Uludag, U., Jain, A., 2004. Attacks on biometric systems: A case study in fingerprints. In: SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI.
-
-
-
-
21
-
-
33845532978
-
-
Uludag, U., Jain, A., 2006. Securing fingerprint template: Fuzzy vault with helper data. In: Proc. IEEE Workshop on Privacy Research In Vision, New York.
-
-
-
-
22
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Uludag U., Pankanti S., Prabhakar S., and Jain A.K. Biometric cryptosystems: Issues and challenges. Proc. IEEE 92 6 (2004) 948-960
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
23
-
-
35148890432
-
-
Uludag, U., Pankanthi, S., Jain, A., 2005. Fuzzy vault for fingerprints. In: Proc. 5th Internat. Conf. on Audio and Video-based Biometric Person Authentication, Rye Town, NY.
-
-
-
|