메뉴 건너뛰기




Volumn 6579, Issue , 2007, Pages

Secure access control to hidden data by biometric features

Author keywords

Biometric cryptosystems; Data hiding; Security; Tree structure haar transform

Indexed keywords

ACCESS CONTROL; BIOMETRICS; CRYPTOGRAPHY; EMBEDDED SYSTEMS; INFORMATION ANALYSIS; USER INTERFACES;

EID: 36049006182     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.720904     Document Type: Conference Paper
Times cited : (2)

References (18)
  • 2
    • 84957892352 scopus 로고    scopus 로고
    • Robust digital watermarking based on key-dependent basis function
    • Information hiding: second international workshop
    • J. Fridrich, A. Baldoza, and R.J.Simard, "Robust digital watermarking based on key-dependent basis function," Information hiding: second international workshop, Lecture notes in computer science 1525.
    • Lecture notes in computer science , vol.1525
    • Fridrich, J.1    Baldoza, A.2    Simard, R.J.3
  • 5
    • 36048934579 scopus 로고    scopus 로고
    • Advanced encryption standard, federal information processing standard publication 197, nationale institute of standard and technology
    • "Advanced encryption standard, federal information processing standard publication 197, nationale institute of standard and technology," 2001.
    • (2001)
  • 7
    • 36049050921 scopus 로고    scopus 로고
    • C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, Biometric encryption using image processing, in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, Rudolf L. Van Renesse, 3314.
    • C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, "Biometric encryption using image processing," in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, Rudolf L. Van Renesse, 3314.
  • 8
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • A. Juels and M. Sudan, "A fuzzy vault scheme," Des. Codes Cryptography 38(2), pp. 237-257, 2006.
    • (2006) Des. Codes Cryptography , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2
  • 9
    • 26444525625 scopus 로고    scopus 로고
    • Fuzzy vault for fingerprints
    • U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy vault for fingerprints," in AVBPA, pp. 310-319, 2005.
    • (2005) AVBPA , pp. 310-319
    • Uludag, U.1    Pankanti, S.2    Jain, A.K.3
  • 11
    • 27244453175 scopus 로고    scopus 로고
    • Symmetric hash functions for fingerprint minutiae
    • S. Tulyakov, F. Farooq, and V. Govindaraju, "Symmetric hash functions for fingerprint minutiae," in ICAPR, pp. 30-38, 2005.
    • (2005) ICAPR , pp. 30-38
    • Tulyakov, S.1    Farooq, F.2    Govindaraju, V.3
  • 12
    • 36049017629 scopus 로고    scopus 로고
    • Data hiding for multimodal biometric recognition
    • A. Giannoula and D. Hatzinakos, "Data hiding for multimodal biometric recognition," in ISCAS(Z), pp. 165-168, 2004.
    • (2004) ISCAS(Z) , pp. 165-168
    • Giannoula, A.1    Hatzinakos, D.2
  • 14
    • 33845303553 scopus 로고    scopus 로고
    • Hiding iris data for authentication of digital images using wavelet theory
    • A. Hassanien, "Hiding iris data for authentication of digital images using wavelet theory," Pattern Recognition and Image Analysis 16(4), pp. 637-643, 2006.
    • (2006) Pattern Recognition and Image Analysis , vol.16 , Issue.4 , pp. 637-643
    • Hassanien, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.