-
1
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Umut Uludag, Sharath Pankanti, Salil Prabhakar, and Anil K. Jain. Biometric cryptosystems: Issues and challenges. Proceedings of the IEEE, 92(6):948-960, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
2
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Nalini K. Ratha, Jonathan H. Connell, and Ruud M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
3
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, and Ruud M. Bolle. Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell., 29(4):561-572, 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
5
-
-
26444525625
-
Fuzzy vault for fingerprints
-
Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, Fifth Int. Conf: on Audio- and Video-Based Biometric Person Authentication AVBPA 2005, of, Springer-Verlag
-
Umut Uludag, Sharath Pankanti, and Anil K. Jain. Fuzzy vault for fingerprints. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, Fifth Int. Conf: on Audio- and Video-Based Biometric Person Authentication (AVBPA 2005), volume 3546 of Lecture Notes in Computer Science, pages 310-319. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
7
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
C. Cachin and J. Camenisch, editors, Advances in Cryptology, Eurocrypt 2004, of, Springer-Verlag
-
Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - Eurocrypt 2004, volume 3027 of Lecture Notes in Computer Science, pages 523-540. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
8
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J. Kittler and M. Nixon, editors, Conference on Audio and Video Based Person Authentication, of, Springer-Verlag
-
Jean-Paul M. G. Linnartz and Pim Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In J. Kittler and M. Nixon, editors, Conference on Audio and Video Based Person Authentication, volume 2688 of Lecture Notes in Computer Science, pages 238-250. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2688
, pp. 238-250
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
9
-
-
33750954911
-
-
Tom A. M. Kevenaar, Geert Jan Schrijen, Michiel van der Veen, Anton H. M. Akkermans, and Fei Zuo. Face recognition with renewable and privacy preserving binary templates. In IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), pages 21-26. IEEE Computer Society, 2005.
-
Tom A. M. Kevenaar, Geert Jan Schrijen, Michiel van der Veen, Anton H. M. Akkermans, and Fei Zuo. Face recognition with renewable and privacy preserving binary templates. In IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), pages 21-26. IEEE Computer Society, 2005.
-
-
-
-
10
-
-
26444507172
-
Practical biometric authentication with template protection
-
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis. Practical biometric authentication with template protection. In AVBPA, pages 436-446, 2005.
-
(2005)
AVBPA
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Jan Schrijen, G.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
11
-
-
11244340682
-
Biometrics-based cryptographic key generation
-
Yao-Jen Chang, Wende Zhang, and Tsuhan Chen. Biometrics-based cryptographic key generation. In ICME, pages 2203-2206, 2004.
-
(2004)
ICME
, pp. 2203-2206
-
-
Chang, Y.-J.1
Zhang, W.2
Chen, T.3
-
12
-
-
0038797944
-
Feature selection and extraction
-
chapter 9. John Wiley & Sons, LTD, second edition
-
Andrew R. Webb. Feature selection and extraction. In Statistical Pattern Recognition, chapter 9. John Wiley & Sons, LTD, second edition, 2002.
-
(2002)
Statistical Pattern Recognition
-
-
Webb, A.R.1
-
13
-
-
8844254687
-
Biometric verification based on grip-pattern recognition
-
Raymond N. J. Veldhuis, Asker M. Bazen, Joost A. Kauffman, and Pieter H. Hartel. Biometric verification based on grip-pattern recognition. In Security, Steganography, and Watermarking of Multimedia Contents, pages 634-641, 2004.
-
(2004)
Security, Steganography, and Watermarking of Multimedia Contents
, pp. 634-641
-
-
Veldhuis, R.N.J.1
Bazen, A.M.2
Kauffman, J.A.3
Hartel, P.H.4
-
16
-
-
0036522407
-
FVC2000: Fingerprint verification competition
-
Dario Maio, Davide Maltoni, Raffaele Cappelli, James L. Wayman, and Anil K. Jain. FVC2000: Fingerprint verification competition. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 24(3):402-412, 2002.
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI)
, vol.24
, Issue.3
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
|