-
1
-
-
0036350106
-
A Fuzzy Vault Scheme
-
Lausanne, Switzerland, p
-
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Proceedings of IEEE International Symposium on Information Theory, Lausanne, Switzerland, p. 408 (2002)
-
(2002)
Proceedings of IEEE International Symposium on Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
2
-
-
33947530278
-
Generating Cancelable Fingerprint Templates
-
Ratha, N., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating Cancelable Fingerprint Templates. IEEE Trans. on PAMI 29(4), 561-572 (2007)
-
(2007)
IEEE Trans. on PAMI
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
3
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
Cambridge, UK, August
-
Savvides, M., Kumar, B.V.K.V., Khosla, P.K.: Cancelable biometric filters for face recognition. In: Proceedings of ICPR, Cambridge, UK, August 2004, vol. 3, pp. 922-925 (2004)
-
(2004)
Proceedings of ICPR
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.V.K.V.2
Khosla, P.K.3
-
4
-
-
33947177191
-
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
-
Teoh, A.B.J., Goh, A., Ngo, D.C.L.: Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. IEEE Trans. on PAMI 28(12), 1892-1901 (2006)
-
(2006)
IEEE Trans. on PAMI
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.B.J.1
Goh, A.2
Ngo, D.C.L.3
-
5
-
-
0034829626
-
Cryptographic Key Generation from Voice
-
Oakland, May
-
Monrose, F., Reiter, M.K., Li, Q., Wetzel, S.: Cryptographic Key Generation from Voice. In: Proc. IEEE Symp. Security and Privacy, Oakland, May 2001, pp. 202-213 (2001)
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
6
-
-
35048865463
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Proceedings of International Conference on Theory and Applications of Cryptographic Techniques, May 2004, pp. 523-540 (2004)
-
(2004)
Proceedings of International Conference on Theory and Applications of Cryptographic Techniques, May
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
7
-
-
33747624401
-
Combining Crypto with Biometrics Effectively
-
Hao, F., Anderson, R., Daugman, J.: Combining Crypto with Biometrics Effectively. IEEE Trans, on Computers 55(9), 1081-1088 (2006)
-
(2006)
IEEE Trans, on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
9
-
-
34547512147
-
Using Distributed Source Coding to Secure Fingerprint Biometrics
-
Hawaii, April
-
Draper, S.C., Khisti, A., Martinian, E., Vetro, A., Yedidia, J.S.: Using Distributed Source Coding to Secure Fingerprint Biometrics. In: Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing, Hawaii, vol. 2, pp. 129-132 (April 2007)
-
(2007)
Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing
, vol.2
, pp. 129-132
-
-
Draper, S.C.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
10
-
-
56749125185
-
Fingerprint Revocable Biotokens: Accuracy and Security Analysis
-
Minneapolis June
-
Boult, T.E., Scheirer, W.J., Woodworth, R.: Fingerprint Revocable Biotokens: Accuracy and Security Analysis. In: Proc. of CVPR, Minneapolis (June 2007)
-
(2007)
Proc. of CVPR
-
-
Boult, T.E.1
Scheirer, W.J.2
Woodworth, R.3
-
11
-
-
50249107013
-
Cracking Fuzzy Vaults and Biometric Encryption, Univ. of Colorado at Colorado Springs
-
Tech. Rep, February
-
Scheirer, W.J., Boult, T.E.: Cracking Fuzzy Vaults and Biometric Encryption, Univ. of Colorado at Colorado Springs, Tech. Rep. (February 2007)
-
(2007)
-
-
Scheirer, W.J.1
Boult, T.E.2
-
12
-
-
37849037325
-
Fingerprint-based Fuzzy Vault: Implementation and Performance, Michigan State Univ
-
Tech. Rep. TR-06-31
-
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-based Fuzzy Vault: Implementation and Performance, Michigan State Univ. Tech. Rep. TR-06-31 (2006)
-
(2006)
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
13
-
-
27644521507
-
Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme
-
Philadelphia, USA, March
-
Yang, S., Verbauwhede, I.: Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme. In: Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Philadelphia, USA, March 2005, vol. 5, pp. 609-612 (2005)
-
(2005)
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing
, vol.5
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
14
-
-
26444525625
-
Fuzzy Vault for Fingerprints
-
USA, July
-
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Proceedings of Fifth International Conference on AVBPA, Rye Town, USA, July 2005, pp. 310-319 (2005)
-
(2005)
Proceedings of Fifth International Conference on AVBPA, Rye Town
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
15
-
-
33751562427
-
The Trimmed Iterative Closest Point Algorithm
-
Quebec City, Canada, August
-
Chetverikov, D., Svirko, D., Stepanov, D., Krsek, P.: The Trimmed Iterative Closest Point Algorithm. In: Proc. of ICPR, Quebec City, Canada, August 2002, pp. 545-548 (2002)
-
(2002)
Proc. of ICPR
, pp. 545-548
-
-
Chetverikov, D.1
Svirko, D.2
Stepanov, D.3
Krsek, P.4
-
16
-
-
0031122443
-
On-line Fingerprint Verification
-
Jain, A.K., Hong, L., Bolle, R.: On-line Fingerprint Verification. IEEE Trans. on PAMI 19(4), 302-314 (1997)
-
(1997)
IEEE Trans. on PAMI
, vol.19
, Issue.4
, pp. 302-314
-
-
Jain, A.K.1
Hong, L.2
Bolle, R.3
-
17
-
-
33751580079
-
Second Fingerprint Verification Competition
-
Quebec City, August, 2002
-
Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: FVC2002: Second Fingerprint Verification Competition. In: Proc. of ICPR, Quebec City, August 2002, pp. 811-814 (2002)
-
(2002)
Proc. of ICPR
, pp. 811-814
-
-
Maio, D.1
Maltoni, D.2
Wayman, J.L.3
Jain, A.K.4
FVC5
-
18
-
-
0003904755
-
Fingerprint Matching: Data Acquisition and Performance Evaluation. Michigan State Univ
-
Tech. Rep. TR99-14
-
Jain, A.K., Prabhakar, S., Ross, A.: Fingerprint Matching: Data Acquisition and Performance Evaluation. Michigan State Univ. Tech. Rep. TR99-14 (1999)
-
(1999)
-
-
Jain, A.K.1
Prabhakar, S.2
Ross, A.3
-
19
-
-
77950407265
-
Information Security: Electronic Authentication Guideline
-
800-63 April
-
Burr, W.E., Dodson, D.F., Polk, W.T.: Information Security: Electronic Authentication Guideline. NIST Special Report 800-63 (April 2006)
-
(2006)
NIST Special Report
-
-
Burr, W.E.1
Dodson, D.F.2
Polk, W.T.3
|