-
1
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha N., Connell J., and Bolle R.M. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40 3 (2001) 614-634
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.M.3
-
3
-
-
33947177191
-
Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs
-
Andrew Teoh B.J., Goh A., and David Ngo C.L. Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28 12 (2006) 1892-1901
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Andrew Teoh, B.J.1
Goh, A.2
David Ngo, C.L.3
-
4
-
-
19744373363
-
Cancellable biometrics featuring with tokenised random number
-
Andrew Teoh B.J., and David Ngo C.L. Cancellable biometrics featuring with tokenised random number. Pattern Recognition Letter 26 10 (2005) 1454-1460
-
(2005)
Pattern Recognition Letter
, vol.26
, Issue.10
, pp. 1454-1460
-
-
Andrew Teoh, B.J.1
David Ngo, C.L.2
-
6
-
-
12344259813
-
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
-
Andrew Teoh B.J., David Ngo C.L., and Goh A. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37 11 (2004) 2245-2255
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Andrew Teoh, B.J.1
David Ngo, C.L.2
Goh, A.3
-
7
-
-
12844255931
-
PalmHashing: A novel approach for dual factor authentication
-
Tee C., Andrew Teoh B.J., Goh A., and David Ngo C.L. PalmHashing: A novel approach for dual factor authentication. Pattern Anal. Appl. 7 3 (2004) 255-268
-
(2004)
Pattern Anal. Appl.
, vol.7
, Issue.3
, pp. 255-268
-
-
Tee, C.1
Andrew Teoh, B.J.2
Goh, A.3
David Ngo, C.L.4
-
8
-
-
33745315642
-
-
K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, H.W. Lam, An analysis on accuracy of cancellable biometrics based on BioHashing. KES 2005, Lecture Notes on Aritificial Intelligence, vol. 3683, pp. 1168-1172.
-
K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, H.W. Lam, An analysis on accuracy of cancellable biometrics based on BioHashing. KES 2005, Lecture Notes on Aritificial Intelligence, vol. 3683, pp. 1168-1172.
-
-
-
-
9
-
-
33744964477
-
-
K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, Revealing the secret of FaceHashing, ICB 2006, Lecture Notes on Computer Science, vol. 3832, Springer, Berlin. pp. 106-112.
-
K.H. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, Revealing the secret of FaceHashing, ICB 2006, Lecture Notes on Computer Science, vol. 3832, Springer, Berlin. pp. 106-112.
-
-
-
-
10
-
-
33646095185
-
An analysis of BioHashing and its variants
-
Kong A., Cheung K.H., Zhang D., Kamel M., and You J. An analysis of BioHashing and its variants. Pattern Recognition 39 7 (2005) 1359-1368
-
(2005)
Pattern Recognition
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
11
-
-
0031651014
-
-
G. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometrics identification, in: Proceeding Symposium on Privacy and Security, 1998, pp. 148-157.
-
G. Davida, Y. Frankel, B.J. Matt, On enabling secure applications through off-line biometrics identification, in: Proceeding Symposium on Privacy and Security, 1998, pp. 148-157.
-
-
-
-
12
-
-
0033281339
-
-
A. Juels, M.A. Wattenberg, Fuzzy commitment scheme, in: ACM Conference on Computer and Communications Security, 1999, pp. 28-36.
-
A. Juels, M.A. Wattenberg, Fuzzy commitment scheme, in: ACM Conference on Computer and Communications Security, 1999, pp. 28-36.
-
-
-
-
13
-
-
0036350106
-
-
A. Juels, M. Sudan, A fuzzy vault scheme, in: ACM Conference on Computer and Communications Security, 2002, pp. 408.
-
A. Juels, M. Sudan, A fuzzy vault scheme, in: ACM Conference on Computer and Communications Security, 2002, pp. 408.
-
-
-
-
14
-
-
84937704662
-
-
T.C. Clancy, N. Kiyavashand, D.J. Lin, Secure smartcard-based fingerprint authentication, in: ACM SIGMM 2993 Multimedia, Biometrics Methods and Applications Workshop, 2003, pp. 45-52.
-
T.C. Clancy, N. Kiyavashand, D.J. Lin, Secure smartcard-based fingerprint authentication, in: ACM SIGMM 2993 Multimedia, Biometrics Methods and Applications Workshop, 2003, pp. 45-52.
-
-
-
-
15
-
-
33747624401
-
Combining crypto with biometrics effectively
-
Hao F., Anderson R., and Daugman J. Combining crypto with biometrics effectively. IEEE Trans. Comput. 55 9 (2006) 1081-1088
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
16
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Springer, Berlin
-
Linnartz J.P., and Tuyls P. New shielding functions to enhance privacy and prevent misuse of biometric templates. Proceedings of the 4th International Conference on Audio-and Video-Based Biometric Person Authentication, Lecture Notes on Computer Science vol. 2688 (2003), Springer, Berlin 393-402
-
(2003)
Proceedings of the 4th International Conference on Audio-and Video-Based Biometric Person Authentication, Lecture Notes on Computer Science
, vol.2688
, pp. 393-402
-
-
Linnartz, J.P.1
Tuyls, P.2
-
17
-
-
26444507172
-
Practical biometric template protection system based on reliable components
-
Springer, Berlin
-
Tuyls P., Akkermans A., Kevenaar T., Schrijen G.J., Bazen A., and Veldhuis R. Practical biometric template protection system based on reliable components. Proceedings of the 5th International Conference on Audio-and Video-Based Biometric Person Authentication, Lecture Notes on Computer Science vol. 3546 (2005), Springer, Berlin 436-446
-
(2005)
Proceedings of the 5th International Conference on Audio-and Video-Based Biometric Person Authentication, Lecture Notes on Computer Science
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.J.4
Bazen, A.5
Veldhuis, R.6
-
18
-
-
8344236959
-
Biometrics encryption
-
Nichols R.K. (Ed), McGraw-Hill, New York
-
Soutar C., Roberge D., Stoianov A.R., Gilroy, and Vijaya Kumar B.V.K. Biometrics encryption. In: Nichols R.K. (Ed). ICSA Guide to Cryptography (1999), McGraw-Hill, New York 649-675
-
(1999)
ICSA Guide to Cryptography
, pp. 649-675
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.R.3
Gilroy4
Vijaya Kumar, B.V.K.5
-
19
-
-
10044284550
-
-
M. Savvides, B.V.K. Vijaya Kumar, P.K. Khosla, Cancellable biometrics filters for face recognition, in: International Conference of Pattern Recognition, vol. 3, 2004, pp. 922-925.
-
M. Savvides, B.V.K. Vijaya Kumar, P.K. Khosla, Cancellable biometrics filters for face recognition, in: International Conference of Pattern Recognition, vol. 3, 2004, pp. 922-925.
-
-
-
-
20
-
-
33748076787
-
-
Y. Sutcu, H.T. Sencar, N. Memon, A secure biometric authentication scheme based on robust hashing, in: Proceedings of the 7th Workshop on Multimedia and Security, New York, USA, 2005, pp. 111-116.
-
Y. Sutcu, H.T. Sencar, N. Memon, A secure biometric authentication scheme based on robust hashing, in: Proceedings of the 7th Workshop on Multimedia and Security, New York, USA, 2005, pp. 111-116.
-
-
-
-
21
-
-
26444448320
-
-
R. Ang, S.N. Rei, L. McAven, Cancellable key-based fingerprint templates, in: Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, pp. 242-252.
-
R. Ang, S.N. Rei, L. McAven, Cancellable key-based fingerprint templates, in: Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, pp. 242-252.
-
-
-
-
22
-
-
0031625017
-
-
S. Kaski, Dimensionality reduction by random mapping: fast similarity computation for clustering, in: Proceedings of the International Joint Conference on Neural Networks, vol. 1, 1998, pp. 413-418.
-
S. Kaski, Dimensionality reduction by random mapping: fast similarity computation for clustering, in: Proceedings of the International Joint Conference on Neural Networks, vol. 1, 1998, pp. 413-418.
-
-
-
-
23
-
-
38949164584
-
-
S. Dasgupta, A. Gupta, An elementary proof of the Johnson-Lindenstrauss Lemma, UTechnical Report TR-99-006, International Computer Science Institute, Berkeley, CA, 1999.
-
S. Dasgupta, A. Gupta, An elementary proof of the Johnson-Lindenstrauss Lemma, UTechnical Report TR-99-006, International Computer Science Institute, Berkeley, CA, 1999.
-
-
-
-
24
-
-
0242501774
-
The moments of the z and F distributions
-
David F.N. The moments of the z and F distributions. Biometrika 36 (1949) 394-403
-
(1949)
Biometrika
, vol.36
, pp. 394-403
-
-
David, F.N.1
-
25
-
-
0036487317
-
The important of being random: statistical principles of iris recognition
-
Daugman J. The important of being random: statistical principles of iris recognition. Pattern Recognition 36 (2003) 279-291
-
(2003)
Pattern Recognition
, vol.36
, pp. 279-291
-
-
Daugman, J.1
-
27
-
-
0030689145
-
-
P. Phillips, H. Moon, P. Rauss, S. Rizvi, The FERET database and evaluation methodology for face recognition algorithms, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1997, pp. 137-143.
-
P. Phillips, H. Moon, P. Rauss, S. Rizvi, The FERET database and evaluation methodology for face recognition algorithms, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 1997, pp. 137-143.
-
-
-
-
28
-
-
0035200756
-
Face recognition using holistic Fourier invariant features
-
Lai H.L., Yuen P.C., and Feng G.C. Face recognition using holistic Fourier invariant features. Pattern Recognition 34 (2001) 95-109
-
(2001)
Pattern Recognition
, vol.34
, pp. 95-109
-
-
Lai, H.L.1
Yuen, P.C.2
Feng, G.C.3
-
29
-
-
27844503477
-
-
D. Maio, L. Nanni, MultiHashing, human authentication featuring biometrics data and tokenised random number: a case study FVC2004, Neurocomputing, 2005, to appear.
-
D. Maio, L. Nanni, MultiHashing, human authentication featuring biometrics data and tokenised random number: a case study FVC2004, Neurocomputing, 2005, to appear.
-
-
-
-
30
-
-
35248868841
-
-
A. Goh, C.L. David Ngo, Computation of cryptographic keys from face biometrics, Lecture Notes on Computer Science, vol. 2828, Springer, Berlin, 2003, pp. 1-13.
-
A. Goh, C.L. David Ngo, Computation of cryptographic keys from face biometrics, Lecture Notes on Computer Science, vol. 2828, Springer, Berlin, 2003, pp. 1-13.
-
-
-
-
31
-
-
8344273612
-
Personalised cryptographic key generation based on FaceHashing
-
Andrew Teoh B.J., David Ngo C.L., and Goh A. Personalised cryptographic key generation based on FaceHashing. Comput. Secur. J. 23 7 (2004) 606-614
-
(2004)
Comput. Secur. J.
, vol.23
, Issue.7
, pp. 606-614
-
-
Andrew Teoh, B.J.1
David Ngo, C.L.2
Goh, A.3
-
32
-
-
33744964385
-
-
W.K. Yip, A. Goh, C.L. David Ngo, B.J. Andrew Teoh, Generation of replaceable cryptographic keys from dynamic handwritten signatures, Lecture Notes on Computer Science, vol. 3832, Springer, Berlin, pp. 509-515.
-
W.K. Yip, A. Goh, C.L. David Ngo, B.J. Andrew Teoh, Generation of replaceable cryptographic keys from dynamic handwritten signatures, Lecture Notes on Computer Science, vol. 3832, Springer, Berlin, pp. 509-515.
-
-
-
-
33
-
-
33750947671
-
-
W.K. Yip, A. Goh, C.L. David Ngo, B.J. Andrew Teoh, Cryptographic keys from dynamic handsignatures with biometric secrecy preservation and replaceability, in: 4th IEEE Workshop On Automatic Identification Advanced Technologies (AutoID'05), October 17-18, 2005, Buffalo, New York, USA, 2005, pp. 27-32.
-
W.K. Yip, A. Goh, C.L. David Ngo, B.J. Andrew Teoh, Cryptographic keys from dynamic handsignatures with biometric secrecy preservation and replaceability, in: 4th IEEE Workshop On Automatic Identification Advanced Technologies (AutoID'05), October 17-18, 2005, Buffalo, New York, USA, 2005, pp. 27-32.
-
-
-
-
34
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Liu K., Kargupta H., and Ryan J. Random projection-based multiplicative data perturbation for privacy preserving distributed data mining. IEEE Trans. Knowl. Data Eng. 18 1 (2006) 92-106
-
(2006)
IEEE Trans. Knowl. Data Eng.
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
35
-
-
38949089845
-
-
J.W. Demmel, N.J. Higham, Improved error bounds for underdetermined system solvers, Computer Science Department, University of Tennessee, Knoxville, TN, Technical Report CS-90-113, August 1990.
-
J.W. Demmel, N.J. Higham, Improved error bounds for underdetermined system solvers, Computer Science Department, University of Tennessee, Knoxville, TN, Technical Report CS-90-113, August 1990.
-
-
-
|