메뉴 건너뛰기




Volumn 6539, Issue , 2007, Pages

A geometric transformation to protect minutiae-based fingerprint templates

Author keywords

Biometrics; Fingerprints; Minutiae; Template security

Indexed keywords

IMAGE ANALYSIS; MATHEMATICAL TRANSFORMATIONS; PATTERN MATCHING; PROBLEM SOLVING; RISK MANAGEMENT;

EID: 35648943098     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.721058     Document Type: Conference Paper
Times cited : (26)

References (15)
  • 1
    • 35648964955 scopus 로고    scopus 로고
    • User authenticators: Comparing passwords, tokens and biometrics
    • 91, IEEE
    • L. O'Gorman, "User authenticators: Comparing passwords, tokens and biometrics," in Proceedings of the IEEE, 2 91, IEEE, 2003.
    • (2003) Proceedings of the IEEE
    • O'Gorman, L.1
  • 7
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. Ratha, J. Connell, and R. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal 40(3), pp. 614-634, 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.1    Connell, J.2    Bolle, R.3
  • 9
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Eurocrypt, Springer-Verlag
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Eurocrypt, LNCS 3027, pp. 523-540, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 10
    • 34548066409 scopus 로고    scopus 로고
    • Hiding secret points amidst chaff
    • E.-C. Chang and Q. Li, "Hiding secret points amidst chaff," in Eurocrypt 2006, 2006.
    • (2006) Eurocrypt 2006
    • Chang, E.-C.1    Li, Q.2
  • 13
    • 78149482494 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenized random number
    • A. B. Teoh, D. C. Ngo, and A. Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenized random number," Pattern Recognition Letters 37, 2004.
    • (2004) Pattern Recognition Letters , vol.37
    • Teoh, A.B.1    Ngo, D.C.2    Goh, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.