메뉴 건너뛰기




Volumn 41, Issue 6, 2008, Pages 2034-2044

Cancellable biometrics and annotations on BioHash

Author keywords

BioHash; Cancellable biometrics; Johnson Lindenstrauss lemma; Random projection

Indexed keywords

AUTHENTICATION; ERROR ANALYSIS; FEATURE EXTRACTION; PATTERN MATCHING; PROBLEM SOLVING;

EID: 38949203738     PISSN: 00313203     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patcog.2007.12.002     Document Type: Article
Times cited : (174)

References (35)
  • 1
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • Ratha N., Connell J., and Bolle R.M. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40 3 (2001) 614-634
    • (2001) IBM Syst. J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.1    Connell, J.2    Bolle, R.M.3
  • 3
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs
    • Andrew Teoh B.J., Goh A., and David Ngo C.L. Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28 12 (2006) 1892-1901
    • (2006) IEEE Trans. Pattern Anal. Mach. Intell. , vol.28 , Issue.12 , pp. 1892-1901
    • Andrew Teoh, B.J.1    Goh, A.2    David Ngo, C.L.3
  • 4
    • 19744373363 scopus 로고    scopus 로고
    • Cancellable biometrics featuring with tokenised random number
    • Andrew Teoh B.J., and David Ngo C.L. Cancellable biometrics featuring with tokenised random number. Pattern Recognition Letter 26 10 (2005) 1454-1460
    • (2005) Pattern Recognition Letter , vol.26 , Issue.10 , pp. 1454-1460
    • Andrew Teoh, B.J.1    David Ngo, C.L.2
  • 6
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: two factor authentication featuring fingerprint data and tokenised random number
    • Andrew Teoh B.J., David Ngo C.L., and Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37 11 (2004) 2245-2255
    • (2004) Pattern Recognition , vol.37 , Issue.11 , pp. 2245-2255
    • Andrew Teoh, B.J.1    David Ngo, C.L.2    Goh, A.3
  • 7
    • 12844255931 scopus 로고    scopus 로고
    • PalmHashing: A novel approach for dual factor authentication
    • Tee C., Andrew Teoh B.J., Goh A., and David Ngo C.L. PalmHashing: A novel approach for dual factor authentication. Pattern Anal. Appl. 7 3 (2004) 255-268
    • (2004) Pattern Anal. Appl. , vol.7 , Issue.3 , pp. 255-268
    • Tee, C.1    Andrew Teoh, B.J.2    Goh, A.3    David Ngo, C.L.4
  • 8
    • 33745315642 scopus 로고    scopus 로고
    • K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, H.W. Lam, An analysis on accuracy of cancellable biometrics based on BioHashing. KES 2005, Lecture Notes on Aritificial Intelligence, vol. 3683, pp. 1168-1172.
    • K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, H.W. Lam, An analysis on accuracy of cancellable biometrics based on BioHashing. KES 2005, Lecture Notes on Aritificial Intelligence, vol. 3683, pp. 1168-1172.
  • 9
    • 33744964477 scopus 로고    scopus 로고
    • K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, Revealing the secret of FaceHashing, ICB 2006, Lecture Notes on Computer Science, vol. 3832, Springer, Berlin. pp. 106-112.
    • K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, Revealing the secret of FaceHashing, ICB 2006, Lecture Notes on Computer Science, vol. 3832, Springer, Berlin. pp. 106-112.
  • 11
    • 0031651014 scopus 로고    scopus 로고
    • G. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometrics identification, in: Proceeding Symposium on Privacy and Security, 1998, pp. 148-157.
    • G. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometrics identification, in: Proceeding Symposium on Privacy and Security, 1998, pp. 148-157.
  • 12
    • 0033281339 scopus 로고    scopus 로고
    • A. Juels, M.A. Wattenberg, Fuzzy commitment scheme, in: ACM Conference on Computer and Communications Security, 1999, pp. 28-36.
    • A. Juels, M.A. Wattenberg, Fuzzy commitment scheme, in: ACM Conference on Computer and Communications Security, 1999, pp. 28-36.
  • 13
    • 0036350106 scopus 로고    scopus 로고
    • A. Juels, M. Sudan, A fuzzy vault scheme, in: ACM Conference on Computer and Communications Security, 2002, pp. 408.
    • A. Juels, M. Sudan, A fuzzy vault scheme, in: ACM Conference on Computer and Communications Security, 2002, pp. 408.
  • 14
    • 84937704662 scopus 로고    scopus 로고
    • T.C. Clancy, N. Kiyavashand, D.J. Lin, Secure smartcard-based fingerprint authentication, in: ACM SIGMM 2993 Multimedia, Biometrics Methods and Applications Workshop, 2003, pp. 45-52.
    • T.C. Clancy, N. Kiyavashand, D.J. Lin, Secure smartcard-based fingerprint authentication, in: ACM SIGMM 2993 Multimedia, Biometrics Methods and Applications Workshop, 2003, pp. 45-52.
  • 15
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • Hao F., Anderson R., and Daugman J. Combining crypto with biometrics effectively. IEEE Trans. Comput. 55 9 (2006) 1081-1088
    • (2006) IEEE Trans. Comput. , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 19
    • 10044284550 scopus 로고    scopus 로고
    • M. Savvides, B.V.K. Vijaya Kumar, P.K. Khosla, Cancellable biometrics filters for face recognition, in: International Conference of Pattern Recognition, vol. 3, 2004, pp. 922-925.
    • M. Savvides, B.V.K. Vijaya Kumar, P.K. Khosla, Cancellable biometrics filters for face recognition, in: International Conference of Pattern Recognition, vol. 3, 2004, pp. 922-925.
  • 20
    • 33748076787 scopus 로고    scopus 로고
    • Y. Sutcu, H.T. Sencar, N. Memon, A secure biometric authentication scheme based on robust hashing, in: Proceedings of the 7th Workshop on Multimedia and Security, New York, USA, 2005, pp. 111-116.
    • Y. Sutcu, H.T. Sencar, N. Memon, A secure biometric authentication scheme based on robust hashing, in: Proceedings of the 7th Workshop on Multimedia and Security, New York, USA, 2005, pp. 111-116.
  • 21
    • 26444448320 scopus 로고    scopus 로고
    • R. Ang, S.N. Rei, L. McAven, Cancellable key-based fingerprint templates, in: Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, pp. 242-252.
    • R. Ang, S.N. Rei, L. McAven, Cancellable key-based fingerprint templates, in: Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, pp. 242-252.
  • 22
    • 0031625017 scopus 로고    scopus 로고
    • S. Kaski, Dimensionality reduction by random mapping: fast similarity computation for clustering, in: Proceedings of the International Joint Conference on Neural Networks, vol. 1, 1998, pp. 413-418.
    • S. Kaski, Dimensionality reduction by random mapping: fast similarity computation for clustering, in: Proceedings of the International Joint Conference on Neural Networks, vol. 1, 1998, pp. 413-418.
  • 23
    • 38949164584 scopus 로고    scopus 로고
    • S. Dasgupta, A. Gupta, An elementary proof of the Johnson-Lindenstrauss Lemma, UTechnical Report TR-99-006, International Computer Science Institute, Berkeley, CA, 1999.
    • S. Dasgupta, A. Gupta, An elementary proof of the Johnson-Lindenstrauss Lemma, UTechnical Report TR-99-006, International Computer Science Institute, Berkeley, CA, 1999.
  • 24
    • 0242501774 scopus 로고
    • The moments of the z and F distributions
    • David F.N. The moments of the z and F distributions. Biometrika 36 (1949) 394-403
    • (1949) Biometrika , vol.36 , pp. 394-403
    • David, F.N.1
  • 25
    • 0036487317 scopus 로고    scopus 로고
    • The important of being random: statistical principles of iris recognition
    • Daugman J. The important of being random: statistical principles of iris recognition. Pattern Recognition 36 (2003) 279-291
    • (2003) Pattern Recognition , vol.36 , pp. 279-291
    • Daugman, J.1
  • 26
  • 27
    • 0030689145 scopus 로고    scopus 로고
    • P. Phillips, H. Moon, P. Rauss, S. Rizvi, The FERET database and evaluation methodology for face recognition algorithms, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1997, pp. 137-143.
    • P. Phillips, H. Moon, P. Rauss, S. Rizvi, The FERET database and evaluation methodology for face recognition algorithms, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1997, pp. 137-143.
  • 28
    • 0035200756 scopus 로고    scopus 로고
    • Face recognition using holistic Fourier invariant features
    • Lai H.L., Yuen P.C., and Feng G.C. Face recognition using holistic Fourier invariant features. Pattern Recognition 34 (2001) 95-109
    • (2001) Pattern Recognition , vol.34 , pp. 95-109
    • Lai, H.L.1    Yuen, P.C.2    Feng, G.C.3
  • 29
    • 27844503477 scopus 로고    scopus 로고
    • D. Maio, L. Nanni, MultiHashing, human authentication featuring biometrics data and tokenised random number: a case study FVC2004, Neurocomputing, 2005, to appear.
    • D. Maio, L. Nanni, MultiHashing, human authentication featuring biometrics data and tokenised random number: a case study FVC2004, Neurocomputing, 2005, to appear.
  • 30
    • 35248868841 scopus 로고    scopus 로고
    • A. Goh, C.L. David Ngo, Computation of cryptographic keys from face biometrics, Lecture Notes on Computer Science, vol. 2828, Springer, Berlin, 2003, pp. 1-13.
    • A. Goh, C.L. David Ngo, Computation of cryptographic keys from face biometrics, Lecture Notes on Computer Science, vol. 2828, Springer, Berlin, 2003, pp. 1-13.
  • 31
    • 8344273612 scopus 로고    scopus 로고
    • Personalised cryptographic key generation based on FaceHashing
    • Andrew Teoh B.J., David Ngo C.L., and Goh A. Personalised cryptographic key generation based on FaceHashing. Comput. Secur. J. 23 7 (2004) 606-614
    • (2004) Comput. Secur. J. , vol.23 , Issue.7 , pp. 606-614
    • Andrew Teoh, B.J.1    David Ngo, C.L.2    Goh, A.3
  • 32
    • 33744964385 scopus 로고    scopus 로고
    • W.K. Yip, A. Goh, C.L. David Ngo, B.J. Andrew Teoh, Generation of replaceable cryptographic keys from dynamic handwritten signatures, Lecture Notes on Computer Science, vol. 3832, Springer, Berlin, pp. 509-515.
    • W.K. Yip, A. Goh, C.L. David Ngo, B.J. Andrew Teoh, Generation of replaceable cryptographic keys from dynamic handwritten signatures, Lecture Notes on Computer Science, vol. 3832, Springer, Berlin, pp. 509-515.
  • 33
    • 33750947671 scopus 로고    scopus 로고
    • W.K. Yip, A. Goh, C.L. David Ngo, B.J. Andrew Teoh, Cryptographic keys from dynamic handsignatures with biometric secrecy preservation and replaceability, in: 4th IEEE Workshop On Automatic Identification Advanced Technologies (AutoID'05), October 17-18, 2005, Buffalo, New York, USA, 2005, pp. 27-32.
    • W.K. Yip, A. Goh, C.L. David Ngo, B.J. Andrew Teoh, Cryptographic keys from dynamic handsignatures with biometric secrecy preservation and replaceability, in: 4th IEEE Workshop On Automatic Identification Advanced Technologies (AutoID'05), October 17-18, 2005, Buffalo, New York, USA, 2005, pp. 27-32.
  • 34
    • 31344447750 scopus 로고    scopus 로고
    • Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
    • Liu K., Kargupta H., and Ryan J. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18 1 (2006) 92-106
    • (2006) IEEE Trans. Knowl. Data Eng. , vol.18 , Issue.1 , pp. 92-106
    • Liu, K.1    Kargupta, H.2    Ryan, J.3
  • 35
    • 38949089845 scopus 로고    scopus 로고
    • J.W. Demmel, N.J. Higham, Improved error bounds for underdetermined system solvers, Computer Science Department, University of Tennessee, Knoxville, TN, Technical Report CS-90-113, August 1990.
    • J.W. Demmel, N.J. Higham, Improved error bounds for underdetermined system solvers, Computer Science Department, University of Tennessee, Knoxville, TN, Technical Report CS-90-113, August 1990.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.