-
1
-
-
10044222391
-
Biometric Cryptosystems: Issues and Challenges
-
U. Uludag, S. Pankanti, S. Prabhakar and A. Jain, "Biometric Cryptosystems: Issues and Challenges", Proc. IEEE, vol. 92, no. 6, pp. 948-960, 2004..
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.4
-
2
-
-
84937704662
-
Secure smartcardbased fingerprint authentication
-
T. Clancy, N. Kiyavash and D. Lin, "Secure smartcardbased fingerprint authentication", Proc. ACM SIGMM Multimedia, Biometrics Methods and Applications Workshop, pp. 45-52, 2003
-
(2003)
Proc. ACM SIGMM Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.1
Kiyavash, N.2
Lin, D.3
-
3
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
S. Yang and I. Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme", Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 609-612, 2005
-
(2005)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
6
-
-
8844234621
-
On the Relation of Error Correction and Cryptography to an Off Line Biometrics Based Identification Scheme
-
G.I. Davida, Y. Frankel, B.J. Matt and R. Peralta, "On the Relation of Error Correction and Cryptography to an Off Line Biometrics Based Identification Scheme", Proc. Workshop Coding and Cryptography, pp. 129-138, 1999
-
(1999)
Proc. Workshop Coding and Cryptography
, pp. 129-138
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
9
-
-
0034829626
-
Cryptographic Key Generation from Voice
-
F. Monrose, M. Reiter, Q. Li, and S. Wetzel, "Cryptographic Key Generation from Voice", Proc. 2001 IEEE Symp. Security and Privacy, pp. 202-213, 2001
-
(2001)
Proc. 2001 IEEE Symp. Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.2
Li, Q.3
Wetzel, S.4
-
10
-
-
0036037919
-
Private Key Generation from On-Line Handwritten Signatures
-
F. Hao and C. Chan, "Private Key Generation from On-Line Handwritten Signatures," Information Management & Computer Security, vol. 10, no. 2, pp. 159-164, 2002
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 159-164
-
-
Hao, F.1
Chan, C.2
-
14
-
-
0027700869
-
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
-
J. Daugman, "High Confidence Visual Recognition of Persons by a Test of Statistical Independence", IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 15, no. 11, pp. 1148-1161, 1993
-
(1993)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.1
-
15
-
-
33750318668
-
The relative distance of key point based iris recognition
-
L. Yu, D. Zhang and K. Wang, "The relative distance of key point based iris recognition", Pattern Recognition, pp. 423-430, 2007
-
(2007)
Pattern Recognition
, pp. 423-430
-
-
Yu, L.1
Zhang, D.2
Wang, K.3
-
16
-
-
54049143526
-
-
CASIA Iris Image Database. {http://www.sinobiometrics.com}
-
CASIA Iris Image Database. {http://www.sinobiometrics.com}
-
-
-
|