-
1
-
-
0442296538
-
Hiding biometric data
-
A. K. Jain and U. Uludag, "Hiding biometric data," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 1494-1498, 2003.
-
(2003)
IEEE Trans. on Pattern Analysis and Machine Intelligence
, vol.25
, Issue.11
, pp. 1494-1498
-
-
Jain, A.K.1
Uludag, U.2
-
2
-
-
84863702244
-
Biometric template security: Challenges and solutions
-
Antalya, Turkey
-
A. K. Jain, A. Ross, and U. Uludag, "Biometric template security: Challenges and solutions," in Proc. of 13th European Signal Processing Conference (EUSIPCO'2005), (Antalya, Turkey), 2005.
-
(2005)
Proc. of 13th European Signal Processing Conference (EUSIPCO'2005)
-
-
Jain, A.K.1
Ross, A.2
Uludag, U.3
-
3
-
-
33744779400
-
Biometrics: A tool for information security
-
A. K. Jain, A. Ross, and S. Pankanti, "Biometrics: A tool for information security," IEEE Trans. on Information Forensics and Security, vol. 1, no. 2, pp. 125-143, 2006.
-
(2006)
IEEE Trans. on Information Forensics and Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
4
-
-
8844235142
-
Hiding fingerprint minutiae in images
-
Tarrytown, New York, pp
-
A. K. Jain and U. Uludag, "Hiding fingerprint minutiae in images," in Proc. of Third Workshop on Automatic Identification Advanced Technologies (AutoID'2002), (Tarrytown, New York), pp. 97-102, 2002.
-
(2002)
Proc. of Third Workshop on Automatic Identification Advanced Technologies (AutoID'2002)
, pp. 97-102
-
-
Jain, A.K.1
Uludag, U.2
-
5
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
6
-
-
0036887662
-
Biometric perils and patches
-
R. M.Bolle, J. H. Connell, and N. Ratha, "Biometric perils and patches," Pattern Recognition, vol. 35, pp. 2727-2738, 2002.
-
(2002)
Pattern Recognition
, vol.35
, pp. 2727-2738
-
-
Bolle, R.M.1
Connell, J.H.2
Ratha, N.3
-
7
-
-
34547096126
-
System and method for distorting a biometric for transactions with enhanced security and privacy,
-
US Patent 6,836,554 B1
-
R. M.Bolle, J. H. Connell, and N. Ratha, "System and method for distorting a biometric for transactions with enhanced security and privacy," US Patent 6,836,554 B1.
-
-
-
Bolle, R.M.1
Connell, J.H.2
Ratha, N.3
-
8
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
A. B. Teoh, D. C. Ngo, and A. Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognition, vol. 37, pp. 2245-2255, 2004.
-
(2004)
Pattern Recognition
, vol.37
, pp. 2245-2255
-
-
Teoh, A.B.1
Ngo, D.C.2
Goh, A.3
-
9
-
-
26444525625
-
Fuzzy vault for fingerprints
-
New York, USA, pp, July
-
U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy vault for fingerprints," in Proc. 5th International Conference on Audio-and Video-Based Person Authentication (AVBPA), (New York, USA), pp. 310-319, July 2005.
-
(2005)
Proc. 5th International Conference on Audio-and Video-Based Person Authentication (AVBPA)
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
11
-
-
33744911734
-
Automatic alignment of fingerprint features for fuzzy finger-print vault
-
Proc. First SKLOIS Conference CISC 2005, Beijing, China, pp
-
Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim, and D. Ahn, "Automatic alignment of fingerprint features for fuzzy finger-print vault," in Proc. First SKLOIS Conference (CISC 2005), (Beijing, China), pp. 358-369, 2005. (LNCS 3822).
-
(2005)
LNCS
, vol.3822
, pp. 358-369
-
-
Chung, Y.1
Moon, D.2
Lee, S.3
Jung, S.4
Kim, T.5
Ahn, D.6
-
12
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
S. Yang and I. Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP 2005), pp. 609-612, 2005.
-
(2005)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP 2005)
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
13
-
-
0036350106
-
A fuzzy vault scheme
-
Lausanne, Switzerland, p
-
A. Juels and M. Sundan, "A fuzzy vault scheme," in Proceedings of IEEE International Symposium on Information Theory, (Lausanne, Switzerland), p. 408, 2002.
-
(2002)
Proceedings of IEEE International Symposium on Information Theory
, pp. 408
-
-
Juels, A.1
Sundan, M.2
-
14
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication," in Proc. 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, pp. 45-52, 2003.
-
(2003)
Proc. 2003 ACM SIGMM Workshop on Biometrics Methods and Applications
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
15
-
-
33750799305
-
Robust distance measures for face-recognition supporting revocable biometric tokens
-
Southampton, UK, pp
-
T. Boult, "Robust distance measures for face-recognition supporting revocable biometric tokens," in Proc. 7th Int. Conf. on Automatic Face and Gesture Recognition (FGR06), (Southampton, UK), pp. 560-566, 2006.
-
(2006)
Proc. 7th Int. Conf. on Automatic Face and Gesture Recognition (FGR06)
, pp. 560-566
-
-
Boult, T.1
-
16
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
M. Savvides, B. V. Kumar, and P. K. Khosla, "Cancelable biometric filters for face recognition," in Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004), vol. 3, pp. 922-925, 2004.
-
(2004)
Proceedings of the 17th International Conference on Pattern Recognition (ICPR 2004)
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.V.2
Khosla, P.K.3
-
17
-
-
33646756574
-
Two factor face authentication scheme with cancelable feature
-
Proc. International Workshop on Biometric Recognition Systems IWBRS2005, pp, October
-
J. Kang, D. Nyang, and K. Lee, "Two factor face authentication scheme with cancelable feature," in Proc. International Workshop on Biometric Recognition Systems (IWBRS2005), pp. 67-76, October 2003. (LNCS 3781).
-
(2003)
LNCS
, vol.3781
, pp. 67-76
-
-
Kang, J.1
Nyang, D.2
Lee, K.3
-
18
-
-
26444448320
-
Cancelable key-based fingerprint templates
-
R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable key-based fingerprint templates," in Proceedings of the Information Security and Privacy: 10th Australasian Conference, pp. 242-252, 2005.
-
(2005)
Proceedings of the Information Security and Privacy: 10th Australasian Conference
, pp. 242-252
-
-
Ang, R.1
Safavi-Naini, R.2
McAven, L.3
-
19
-
-
9944223229
-
Palmhashing: A novel approach to cancelable biometrics
-
T. Connie, A. Teoh, M. Goh, and D. Ngo, "Palmhashing: a novel approach to cancelable biometrics," Information Processing Letter, vol. 93, no. 1, pp. 1-5, 2005.
-
(2005)
Information Processing Letter
, vol.93
, Issue.1
, pp. 1-5
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
20
-
-
19744373363
-
Cancellable biometrics featuring with tokenized random number
-
A. Teoh and D. Ngo, "Cancellable biometrics featuring with tokenized random number," Pattern Recognition Letter, vol. 26, no. 10, pp. 1454-1460, 2005.
-
(2005)
Pattern Recognition Letter
, vol.26
, Issue.10
, pp. 1454-1460
-
-
Teoh, A.1
Ngo, D.2
-
21
-
-
33646095185
-
An analysis of biohashing and its variants
-
In Press, Corrected Proof, Available online, 27 December
-
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of biohashing and its variants," Pattern Recognition, 2006. (In Press, Corrected Proof, Available online, 27 December 2005).
-
(2005)
Pattern Recognition
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
22
-
-
27244453175
-
Symmetric hash functions for fingerprint minutiae
-
Proc. Int. Conf. Pattern Recogition and Image Analysis, Bath, UK, pp
-
S. Tulyakov, F. Farooq, and V. Govindaraju, "Symmetric hash functions for fingerprint minutiae," in Proc. Int. Conf. Pattern Recogition and Image Analysis, (Bath, UK), pp. 30-38, 2005. (LNCS 3687).
-
(2005)
LNCS
, vol.3687
, pp. 30-38
-
-
Tulyakov, S.1
Farooq, F.2
Govindaraju, V.3
-
23
-
-
0003922190
-
-
New York: John Wiley & Sons, Inc, 2nd ed
-
R. O. Duda, P. E. Hart, and D. G. Stork, Pattern Classification. New York: John Wiley & Sons, Inc, 2nd ed., 2001.
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
24
-
-
0026065565
-
Eigenfaces for recognition
-
M. A. Turk and A. P. Pentland, "Eigenfaces for recognition," Journal of Cognitive Neuroscience, vol. 3, no. 1, pp. 71-86, 1991.
-
(1991)
Journal of Cognitive Neuroscience
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.A.1
Pentland, A.P.2
-
26
-
-
42749104385
-
Robust face recognition by fusion of visual and infrared cues
-
Singapore, pp, May
-
S.-K. Kim, H. Lee, S. Yu, and S. Lee, "Robust face recognition by fusion of visual and infrared cues," in Proceedings of the First IEEE Conference on Industrial Electronics and Applications, (Singapore), pp. 804-808, May 2006.
-
(2006)
Proceedings of the First IEEE Conference on Industrial Electronics and Applications
, pp. 804-808
-
-
Kim, S.-K.1
Lee, H.2
Yu, S.3
Lee, S.4
|