-
1
-
-
0034780035
-
Approaches to biometric watermarks for owner authentification
-
Vielhauer, C., Steinmetz, R., "Approaches to biometric watermarks for owner authentification", Proc. SPIE Security and Watermarking of Multimedia Contents III, Vol. 4314,209-219 (2001).
-
(2001)
Proc. SPIE Security and Watermarking of Multimedia Contents III
, vol.4314
, pp. 209-219
-
-
Vielhauer, C.1
Steinmetz, R.2
-
2
-
-
8844253949
-
Towards Fraud-Proof ID Documents using Multiple Data Hiding Technologies and Biometrics
-
Picard, J., Vielhauer, C., Torwirth, N., "Towards Fraud-Proof ID Documents using Multiple Data Hiding Technologies and Biometrics", Proc. SPIE - Electronic Imaging, Security and Watermarking of Multimedia Contents VI, Vol. 5306, 416 - 427 (2004).
-
(2004)
Proc. SPIE - Electronic Imaging, Security and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 416-427
-
-
Picard, J.1
Vielhauer, C.2
Torwirth, N.3
-
3
-
-
8844258030
-
Security for Biometric Data
-
Vielhauer, C., Kalker, T., "Security for Biometric Data", Proc. SPIE - Security and Watermarking of Multimedia Contents VI, Vol. 5306, 642 - 652 (2004).
-
(2004)
Proc. SPIE - Security and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 642-652
-
-
Vielhauer, C.1
Kalker, T.2
-
4
-
-
84894038661
-
Using Voice to Generate Cryptographic Keys
-
Crete, Greece
-
Monrose, F., Reiter, M. K., Li, Q., Wetzel, S., "Using Voice to Generate Cryptographic Keys", A Speaker Odyssey, The Speech Recognition Workshop, Crete, Greece (2001).
-
(2001)
A Speaker Odyssey, The Speech Recognition Workshop
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
5
-
-
33751585800
-
Biometric Hash based on Statistical Features of Online Signature
-
ICPR, Quebec City, Canada
-
Vielhauer, C., Steinmetz, R., Mayerhöfer, A., "Biometric Hash based on Statistical Features of Online Signature", Proc. of the Intern. Conf. on Pattern Recognition (ICPR), Quebec City, Canada, Vol. 1 (2002).
-
(2002)
Proc. of the Intern. Conf. on Pattern Recognition
, vol.1
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhöfer, A.3
-
6
-
-
33748076787
-
A Secure Biometric Authentication Scheme Based on Robust Hashing
-
ACM Press, New York, U.S.A
-
Sutcu, Y., Sencar, H. T., Memon, N., "A Secure Biometric Authentication Scheme Based on Robust Hashing", Proc. of the 7th workshop on Multimedia and security, ACM Press, New York, U.S.A. (2005).
-
(2005)
Proc. of the 7th workshop on Multimedia and security
-
-
Sutcu, Y.1
Sencar, H.T.2
Memon, N.3
-
7
-
-
34547093749
-
Symmetric Hash Functions for Fingerprint Minutiae
-
Bath, UK
-
Tulyakov, S., Farooq, F., Govindaraju, V., "Symmetric Hash Functions for Fingerprint Minutiae", International Workshop on Pattern Recognition for Crime Prevention, Security and Surveillance, Bath, UK (2005).
-
(2005)
International Workshop on Pattern Recognition for Crime Prevention, Security and Surveillance
-
-
Tulyakov, S.1
Farooq, F.2
Govindaraju, V.3
-
8
-
-
33846224825
-
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization
-
Article ID
-
Kuan, Y.W., Teoh, A.B.J., Ngo, D.C.L., "Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization", EURASIP Journal on Advances in Signal Processing, vol. 2007, Article ID 59125 (2007).
-
(2007)
EURASIP Journal on Advances in Signal Processing
, vol.2007
, pp. 59125
-
-
Kuan, Y.W.1
Teoh, A.B.J.2
Ngo, D.C.L.3
-
9
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C. E., "A mathematical theory of communication", Bell System Tech. J. 27, 379-423, 623-656 (1948).
-
(1948)
Bell System Tech. J
, vol.27
, Issue.379-423
, pp. 623-656
-
-
Shannon, C.E.1
-
10
-
-
2942592700
-
Handwriting: Feature Correlation Analysis for Biometric Hashes
-
Bourlard, H, Pitas, I, Lam, K, Wang, Y, Eds, OH, U.S.A
-
Vielhauer, C., Steinmetz, R., "Handwriting: Feature Correlation Analysis for Biometric Hashes", In: Bourlard, H., Pitas, I., Lam, K., Wang, Y. (Eds.), EURASIP Journal on Applied Signal Processing, Special Issue on Biometric Signal Processing, Hindawi Publishing Corporation, Sylvania, OH, U.S.A. (2004).
-
(2004)
EURASIP Journal on Applied Signal Processing, Special Issue on Biometric Signal Processing, Hindawi Publishing Corporation, Sylvania
-
-
Vielhauer, C.1
Steinmetz, R.2
-
11
-
-
42949113453
-
-
Vielhauer, C., [Biometric User Authentication for IT Security: From Fundamentals to Handwriting], Springer, New York (2006).
-
Vielhauer, C., [Biometric User Authentication for IT Security: From Fundamentals to Handwriting], Springer, New York (2006).
-
-
-
-
12
-
-
84979911620
-
Multimodal biometrics: An overview
-
Vienna, Austria
-
Ross, A., Jain, A.K., "Multimodal biometrics: an overview", Proc. 12th European Signal Processing Conference (EUSIPCO), Vienna, Austria, 1221-1224 (2004).
-
(2004)
Proc. 12th European Signal Processing Conference (EUSIPCO)
, pp. 1221-1224
-
-
Ross, A.1
Jain, A.K.2
-
13
-
-
84943817322
-
Error-detecting and error-correcting codes
-
Hamming, R.W., "Error-detecting and error-correcting codes", Bell System Technical Journal XXVI (2): 147-160 (1950).
-
(1950)
Bell System Technical Journal
, vol.26
, Issue.2
, pp. 147-160
-
-
Hamming, R.W.1
|