-
2
-
-
26444525625
-
Fuzzy vault for fingerprints
-
U. Uludag, S. Pankanti, and A. K. Jaan, "Fuzzy vault for fingerprints," in Proc. Audio-Video- Based Biom. Person Authentication, 2005, vol. 3546, pp. 310-319.
-
(2005)
Proc. Audio-Video- Based Biom. Person Authentication
, vol.3546
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jaan, A.K.3
-
3
-
-
0742290133
-
An introduction to biometric recognition
-
Jan
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4-20, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
4
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
Dec
-
K. Nandakumar, A. K. Jain, and A. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Secur., vol. 2, no. 4, pp. 744-757, Dec. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Secur
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, A.3
-
5
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Mar
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J. vol. 40, no. 3, pp. 614-634, Mar. 2001.
-
(2001)
IBM Syst. J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
7
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication," in Proc. ACM SIGMM WBMA, 2003, pp. 45-52.
-
(2003)
Proc. ACM SIGMM WBMA
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
8
-
-
33845532978
-
Securing fingerprint template: Fuzzy vault with helper data
-
New York
-
U. Uludag and A. K. Jain, "Securing fingerprint template: Fuzzy vault with helper data," in Proc. CVPR Workshop Privacy Res. Vis., New York, 2006, pp. 163-170.
-
(2006)
Proc. CVPR Workshop Privacy Res. Vis
, pp. 163-170
-
-
Uludag, U.1
Jain, A.K.2
-
10
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
Philadelphia, PA
-
S. Yang and I. Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," in Proc. IEEE ICASSP, Philadelphia, PA, 2005, vol. 5, pp. 609-612.
-
(2005)
Proc. IEEE ICASSP
, vol.5
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
11
-
-
34548225406
-
Cryptographic key generation using handwritten signature
-
M. Freire-Santos, J. Fierrez-Aguilar, and J. Ortega-Garcia, "Cryptographic key generation using handwritten signature," in Proc. Def. Secur. Symp., Biom. Technol. Human Identification, 2006, vol. 6202, pp. 225-231.
-
(2006)
Proc. Def. Secur. Symp., Biom. Technol. Human Identification
, vol.6202
, pp. 225-231
-
-
Freire-Santos, M.1
Fierrez-Aguilar, J.2
Ortega-Garcia, J.3
-
12
-
-
33845514726
-
Protecting face biometric data on smartcard with Reed-Solomon code
-
New York, Jun
-
Y. C. Feng and P. C. Yuen, "Protecting face biometric data on smartcard with Reed-Solomon code," in Proc. CVPR Workshop Privacy Res. Vis. New York, Jun. 2006.
-
(2006)
Proc. CVPR Workshop Privacy Res. Vis
-
-
Feng, Y.C.1
Yuen, P.C.2
-
13
-
-
52349114534
-
-
Department Elect. Electron. Eng, Grad. Sch. Yonsei Univ, Seoul, Korea
-
S. I. Noh, "Iris recognition system based on independent component analysis," Department Elect. Electron. Eng., Grad. Sch. Yonsei Univ., Seoul, Korea, 2005.
-
(2005)
Iris recognition system based on independent component analysis
-
-
Noh, S.I.1
-
14
-
-
29144501251
-
A new iris recognition method using independent component analysis
-
Nov
-
S. I. Noh, K. H. Bae, K. R. Park, and J. Kim, "A new iris recognition method using independent component analysis," IEICE Trans. Inf. Syst., vol. E88-D, no. 11, pp. 2573-2581, Nov. 2005.
-
(2005)
IEICE Trans. Inf. Syst
, vol.E88-D
, Issue.11
, pp. 2573-2581
-
-
Noh, S.I.1
Bae, K.H.2
Park, K.R.3
Kim, J.4
-
15
-
-
52349100661
-
Invariant biometric key extraction based on iris code
-
Seoul, Korea
-
Y. J. Lee, H. G. Lee, K. R. Park, and J. Kim, "Invariant biometric key extraction based on iris code," in Proc. IEEK Fall Conf., Seoul, Korea, 2005, vol. 28. no. 2.
-
(2005)
Proc. IEEK Fall Conf
, vol.28
, Issue.2
-
-
Lee, Y.J.1
Lee, H.G.2
Park, K.R.3
Kim, J.4
-
16
-
-
52349101813
-
Invariant iris code extraction for generating cryptographic key based on fuzzy vault
-
Seoul, Korea
-
Y. J. Lee, K. R. Park, and J. Kim, "Invariant iris code extraction for generating cryptographic key based on fuzzy vault," in Proc. IEEK Summer Conf., Seoul, Korea, 2006, vol. 29. no. 1.
-
(2006)
Proc. IEEK Summer Conf
, vol.29
, Issue.1
-
-
Lee, Y.J.1
Park, K.R.2
Kim, J.3
-
17
-
-
37849013877
-
Biometric key binding: Fuzzy vault based on iris images
-
Y. J. Lee, K. H. Bae, S. J. Lee, K. R. Park, and J. Kim, "Biometric key binding: Fuzzy vault based on iris images," in Proc. 2nd Int. Conf. Biom., 2007, vol. 4642, pp. 800-808.
-
(2007)
Proc. 2nd Int. Conf. Biom
, vol.4642
, pp. 800-808
-
-
Lee, Y.J.1
Bae, K.H.2
Lee, S.J.3
Park, K.R.4
Kim, J.5
-
18
-
-
0032224440
-
Biometric encryption using image processing
-
C. Soutar, D. Roverge, S. A. Stojanov, R. Gilroy, and B. V. K. V. Kumar, "Biometric encryption using image processing," in Proc. SPIE - Optical Security and Counterfeit Deterrence Techniques, 1998, vol. 3314, pp. 178-188.
-
(1998)
Proc. SPIE - Optical Security and Counterfeit Deterrence Techniques
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roverge, D.2
Stojanov, S.A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
20
-
-
84894038661
-
Using voice to generate cryptographic keys
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Using voice to generate cryptographic keys," in Proc. A Speaker Odyssey, Speaker Recog. Workshop, 2001, pp. 237-242.
-
(2001)
Proc. A Speaker Odyssey, Speaker Recog. Workshop
, pp. 237-242
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
21
-
-
0034829626
-
Cryptographic key generation from voice
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, "Cryptographic key generation from voice," in Proc. IEEE Symp. Secur. Privacy, 2001, pp. 202-213.
-
(2001)
Proc. IEEE Symp. Secur. Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
22
-
-
11244340682
-
Biometric-based cryptographic key generation
-
Y. Chang, W. Zhang, and T. Chen, "Biometric-based cryptographic key generation," in Proc. IEEE Int. Conf. Multimedia Expo., 2004, pp. 2203-2206.
-
(2004)
Proc. IEEE Int. Conf. Multimedia Expo
, pp. 2203-2206
-
-
Chang, Y.1
Zhang, W.2
Chen, T.3
-
23
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
F. Hao and C. W. Chan, "Private key generation from on-line handwritten signatures," Inf. Manag. Comput. Secur., vol. 10, no. 4, pp. 159-164, 2002.
-
(2002)
Inf. Manag. Comput. Secur
, vol.10
, Issue.4
, pp. 159-164
-
-
Hao, F.1
Chan, C.W.2
-
24
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Privacy Secur., 1998, pp. 148-157.
-
(1998)
Proc. IEEE Symp. Privacy Secur
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
25
-
-
8844234621
-
On the relation of error correction and cryptography to an offline biometric based identification scheme
-
G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta, "On the relation of error correction and cryptography to an offline biometric based identification scheme," in Proc. WCC, 1999, pp. 129-138.
-
(1999)
Proc. WCC
, pp. 129-138
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
27
-
-
34147129600
-
Cryptographic key generation from biometric data using lattice mapping
-
G. Zhang, W. Li, and C. Zhan, "Cryptographic key generation from biometric data using lattice mapping," in Proc. 18th ICPR, 2006, pp. 513-516.
-
(2006)
Proc. 18th ICPR
, pp. 513-516
-
-
Zhang, G.1
Li, W.2
Zhan, C.3
-
28
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noise data
-
New York: Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noise data," in Advances in Cryptology-Eurocrypt, vol. 3027. New York: Springer-Verlag, 2004, pp. 523-540.
-
(2004)
Advances in Cryptology-Eurocrypt
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
29
-
-
0003644836
-
-
Nat. Phys. Lab. U.K, Teddington, Middlesex, Issue. 1.0
-
T. Mansfield, G. Kelly, D. Chandler, and J. Kane, "Biometric product testing final report," Nat. Phys. Lab. U.K., Teddington, Middlesex, Issue. 1.0, 2001.
-
(2001)
Biometric product testing final report
-
-
Mansfield, T.1
Kelly, G.2
Chandler, D.3
Kane, J.4
-
30
-
-
52349124522
-
-
F. Hao, R. Anderson, and J. Daugman, Combining cryptography with biometrics effectively, Comput. Lab., Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-640, 2005.
-
F. Hao, R. Anderson, and J. Daugman, "Combining cryptography with biometrics effectively," Comput. Lab., Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-640, 2005.
-
-
-
-
31
-
-
0742290132
-
How iris recognition works
-
Jan
-
J. Daugman, "How iris recognition works," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 21-30, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
32
-
-
35048893974
-
Multi-unit iris recognition by image checking algorithm
-
Jul
-
J. Jang, K. R. Park, J. Son, and Y. B. Lee, "Multi-unit iris recognition by image checking algorithm," in Proc. ICBA, Jul. 2004, vol. 3072, pp. 450-457.
-
(2004)
Proc. ICBA
, vol.3072
, pp. 450-457
-
-
Jang, J.1
Park, K.R.2
Son, J.3
Lee, Y.B.4
-
33
-
-
0003922190
-
-
2nd ed. Hoboken, NJ: Wiley-Interscience
-
R. O. Duda, P. E. Har, and D. G. Stork, Pattern Classification, 2nd ed. Hoboken, NJ: Wiley-Interscience, 2001.
-
(2001)
Pattern Classification
-
-
Duda, R.O.1
Har, P.E.2
Stork, D.G.3
-
34
-
-
78651243350
-
-
Jan, accessed on .5.21, Online, Available
-
J. Sylvester, Reed-Solomon Codes, Jan. 2001. (accessed on 2008.5.21). [Online]. Available: http://www.elektrobit.co.uk
-
(2001)
Reed-Solomon Codes
-
-
Sylvester, J.1
-
35
-
-
33846984345
-
-
accessed on .5.21, Online, Available
-
B. Sklar, Reed-Solomon Codes. (accessed on 2008.5.21). [Online]. Available: http://www.informit.com/content/images/art_sklar7_reedsolomon/ elementLinks/art_sklar7_reed-solomon.pdf
-
(2008)
Reed-Solomon Codes
-
-
Sklar, B.1
-
38
-
-
52349103831
-
-
Biometrics Engineering Research Center, Accessed on 2008.5.21, Online, Available
-
Biometrics Engineering Research Center, Iris database (version 1). Accessed on 2008.5.21. [Online]. Available: http://berc.yonsei.ac.kr
-
Iris database (version 1)
-
-
-
39
-
-
52349094288
-
-
Online, Available
-
Accessed on 2008.5.21. [Online]. Available: http://www.sinobiometrics.com
-
(2008)
Accessed on
, vol.5
, Issue.21
-
-
-
40
-
-
52349089753
-
-
Online, Available
-
Accessed on 2008.5.21. [Online]. Available: http://www.cbsr.ia.ac.cn/ IrisDatabase.htm
-
(2008)
Accessed on
, vol.5
, Issue.21
-
-
-
41
-
-
0036856989
-
Face recognition by independent component analysis
-
Nov
-
M. S. Barlett, J. R. Movellan, and T. J. Sejnowski, "Face recognition by independent component analysis," IEEE Trans. Neural Netw., vol. 13, no. 6, pp. 1450-1454, Nov. 2002.
-
(2002)
IEEE Trans. Neural Netw
, vol.13
, Issue.6
, pp. 1450-1454
-
-
Barlett, M.S.1
Movellan, J.R.2
Sejnowski, T.J.3
-
42
-
-
52349100449
-
-
Y. K. Jang, B. J. Kang, and K. R. Park, Robust eyelid detection for iris recognition, J. IEEK, 44, no. SP 1, pp. 94-104, Jan. 2007.
-
Y. K. Jang, B. J. Kang, and K. R. Park, "Robust eyelid detection for iris recognition," J. IEEK, vol. 44, no. SP 1, pp. 94-104, Jan. 2007.
-
-
-
-
43
-
-
34447329266
-
A robust eyelash detection based on iris focus assessment
-
Oct
-
B. J. Kang and K. R. Park, "A robust eyelash detection based on iris focus assessment," Pattern Recognit. Lett., vol. 28, no. 13, pp. 1630-1639, Oct. 2007.
-
(2007)
Pattern Recognit. Lett
, vol.28
, Issue.13
, pp. 1630-1639
-
-
Kang, B.J.1
Park, K.R.2
|