-
1
-
-
35148837452
-
-
Second International Fingerprint Verification Competition. http://bias.csr.unibo.it/fvc2002/, 2002. 5
-
Second International Fingerprint Verification Competition. http://bias.csr.unibo.it/fvc2002/, 2002. 5
-
-
-
-
2
-
-
35148877078
-
-
Third International Fingerprint Verification Competition. http://bias.csr.unibo.it/fvc2004/, 2004. 5
-
Third International Fingerprint Verification Competition. http://bias.csr.unibo.it/fvc2004/, 2004. 5
-
-
-
-
3
-
-
35148823468
-
-
NSF Workshop on Biometrics Research Agenda, April/May
-
NSF Workshop on Biometrics Research Agenda, April/May, 2003. 1
-
(2003)
, vol.1
-
-
-
4
-
-
26444448320
-
-
R. Ang, R. Safavi-Naini, and L. McAven. Cancelable key-based fingerprint templates. In 10th Australian Conf. on Information Security and Privacy, ACISP 2005, pages 242-252, Brisbane, Australia, July, 2005. 1
-
R. Ang, R. Safavi-Naini, and L. McAven. Cancelable key-based fingerprint templates. In 10th Australian Conf. on Information Security and Privacy, ACISP 2005, pages 242-252, Brisbane, Australia, July, 2005. 1
-
-
-
-
5
-
-
0037619129
-
Fingerprint indexing based on novel features of minutiae triplets
-
B. Bhanu and X. Tan. Fingerprint indexing based on novel features of minutiae triplets. IEEE Trans. Pattern Anal. Mach. Intell., 25(5):616-622, 2003. 3
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.25
, Issue.5
-
-
Bhanu, B.1
Tan, X.2
-
6
-
-
10044297649
-
-
Springer Verlag
-
R. M. Bolle, J. H. Connell, S. Pankanti, N. K. Ratha, and A. W. Senior. Guide to Biometrics. Springer Verlag, 2003. 1
-
(2003)
Guide to Biometrics
, pp. 1
-
-
Bolle, R.M.1
Connell, J.H.2
Pankanti, S.3
Ratha, N.K.4
Senior, A.W.5
-
7
-
-
9944223229
-
PalmHashing: A novel approach for cancelable biometrics
-
931, Jan
-
T. Connie, A. B. J. Teoh, M. K. O. Goh, and D. C. L. Ngo. PalmHashing: a novel approach for cancelable biometrics. Information Processing Letters, 93(1): 1-5, Jan., 2005. 1
-
(2005)
Information Processing Letters
, vol.1-5
, pp. 1
-
-
Connie, T.1
Teoh, A.B.J.2
Goh, M.K.O.3
Ngo, D.C.L.4
-
8
-
-
8844234621
-
On the relation of error correction and cryptography to an off line biometric based identification scheme
-
G. Davida, Y. Frankel, B. Matt, and R. Peralta. On the relation of error correction and cryptography to an off line biometric based identification scheme. In Proceedings of WCC99, Workshop on Coding and Cryptography, 1999. 1
-
(1999)
Proceedings of WCC99, Workshop on Coding and Cryptography
, pp. 1
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
Peralta, R.4
-
9
-
-
0031250434
-
Fingerprint matching using transformation parameter clustering
-
R. S. Germain, A. Califano, and S. Colville. Fingerprint matching using transformation parameter clustering. IEEE Camput. Sci. Eng., 4(4):42-49, 1997. 2
-
(1997)
IEEE Camput. Sci. Eng
, vol.4
, Issue.4
-
-
Germain, R.S.1
Califano, A.2
Colville, S.3
-
10
-
-
0034829626
-
Cryptographic key generation from voice
-
May
-
F. Monrose, M. K. Reiter, Q.Li, and S. Wetzel. Cryptographic key generation from voice. In Proc. IEEE Symp. On Security and Privacy, pages 202-213, May, 2001. 1
-
(2001)
Proc. IEEE Symp. On Security and Privacy
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
12
-
-
33947530278
-
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):561-572, 2007. 1, 6
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):561-572, 2007. 1, 6
-
-
-
-
13
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication system
-
403
-
N. K. Ratha, J. H. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication system. IBM Systems Journal, 40(3):614-634, 2001. 1
-
(2001)
IBM Systems Journal
, vol.614-634
, pp. 1
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.3
-
15
-
-
12344259813
-
-
A. Teoh, D. Ngo, and A. Goh. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37(11):2245-2255, Nov., 2004. 1, 3, 6
-
A. Teoh, D. Ngo, and A. Goh. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition, 37(11):2245-2255, Nov., 2004. 1, 3, 6
-
-
-
-
16
-
-
85126503449
-
-
S. Tulyakov, F. Farooq, and V. Govindaraju. Symmetric hash functions for fingerprint minutiae. In ICAPR (2), pages 30-38, Bath, UK, 2005. 1
-
S. Tulyakov, F. Farooq, and V. Govindaraju. Symmetric hash functions for fingerprint minutiae. In ICAPR (2), pages 30-38, Bath, UK, 2005. 1
-
-
-
-
17
-
-
26444507172
-
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis. Practical biometric authentication with template protection. In AVBPA, pages 436-446, 2005. 1
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis. Practical biometric authentication with template protection. In AVBPA, pages 436-446, 2005. 1
-
-
-
-
19
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain. Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE, 92(6):948-960, June, 2004. 1
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
|