-
1
-
-
26444448320
-
-
R. Ang, R. Safavi-Naini, and L. McAven. Cancelable key-based fingerprint templates. In ACISP, 3574 of LNCS, pages 242-252, 2005. 1
-
R. Ang, R. Safavi-Naini, and L. McAven. Cancelable key-based fingerprint templates. In ACISP, volume 3574 of LNCS, pages 242-252, 2005. 1
-
-
-
-
3
-
-
33746049783
-
-
E.-C. Chang and Q. Li. Hiding secret points amidst chaff. In Eurocrypt, 4004 of LNCS, pages 59-72, St. Petersburg, Russia, May 2006. Springer Verlag. 1, 2
-
E.-C. Chang and Q. Li. Hiding secret points amidst chaff. In Eurocrypt, volume 4004 of LNCS, pages 59-72, St. Petersburg, Russia, May 2006. Springer Verlag. 1, 2
-
-
-
-
4
-
-
9944223229
-
Palmhashing: A novel approach for cancelable biometrics
-
T. Connie, A. Teoh, M. Goh, and D. Ngo. Palmhashing: a novel approach for cancelable biometrics. Information Processing Letters, 93:614-634, 2005. 1
-
(2005)
Information Processing Letters
, vol.93
, Issue.614-634
, pp. 1
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
5
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Eurocrypt, volume 3027 of LNCS, pages 523-540. Springer-Verlag, 2004. 1, 4
-
(2004)
Eurocrypt, volume 3027 of LNCS
, vol.1
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
6
-
-
25144471298
-
Score normalization in multimodal biometric systems
-
3812
-
A. Jain, K. Nandakumar, and A. Ross. Score normalization in multimodal biometric systems. Pattern Recognition, 38(12):2270-2285, 2005. 2
-
(2005)
Pattern Recognition
, vol.2270-2285
, pp. 2
-
-
Jain, A.1
Nandakumar, K.2
Ross, A.3
-
9
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
T. Kevenaar, G. Schrijen, M. V. der Veen, A. Akkermans, and F. Zuo. Face recognition with renewable and privacy preserving binary templates. Fourth IEEE Workshop on Automatic Identification Advanced Technologies, pages 21-26, 2005. 1
-
(2005)
Fourth IEEE Workshop on Automatic Identification Advanced Technologies
-
-
Kevenaar, T.1
Schrijen, G.2
der Veen, M.V.3
Akkermans, A.4
Zuo, F.5
-
10
-
-
34548057917
-
Secure sketch for biometric templates
-
Shanghai, China, December, 1
-
Q. Li, Y. Sutcu, and N. Memon. Secure sketch for biometric templates. In Asiacrypt, Shanghai, China, December 2006. 1, 2, 3, 4
-
(2006)
Asiacrypt
, vol.2
, Issue.3
, pp. 4
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
11
-
-
35148883178
-
-
NIST Speical Database 27: Fingerprint minutiae from, latent and matching tenprint images. http://www.nist.gov/srd/nistsd27.htm. 2, 4
-
NIST Speical Database 27: Fingerprint minutiae from, latent and matching tenprint images. http://www.nist.gov/srd/nistsd27.htm. 2, 4
-
-
-
-
12
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
403
-
N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614-634, 2001. 1
-
(2001)
IBM Systems Journal
, vol.614-634
, pp. 1
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
14
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine. Intelligence, 29(4):561-572, 2007. 1
-
(2007)
IEEE Transactions on Pattern Analysis and Machine. Intelligence
, vol.29
, Issue.4
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
17
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
To appear. 2
-
Y. Sutcu, Q. Li, and N. Memon. Protecting biometric templates with sketch: Theory and practice. IEEE Transactions on Information Forensics and Security, 2007. To appear. 2, 3, 4, 5
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 5
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
19
-
-
84874074770
-
A secure biometric authentication scheme based on robust hashing
-
Y. Sutcu, T. Sencar, and N. Memon. A secure biometric authentication scheme based on robust hashing. In ACM MM-SEC Workshop, 2005. 1
-
(2005)
ACM MM-SEC Workshop
, pp. 1
-
-
Sutcu, Y.1
Sencar, T.2
Memon, N.3
-
20
-
-
8344273612
-
Personalised cryptographic key generation based on facehashing
-
A. Teoh, D. Ngo, and A. Goh. Personalised cryptographic key generation based on facehashing. Computers and Security, 23:606-614, 2004. 1
-
(2004)
Computers and Security
, vol.23
, Issue.606-614
, pp. 1
-
-
Teoh, A.1
Ngo, D.2
Goh, A.3
|