-
1
-
-
48649102434
-
Optimal iris fuzzy sketches
-
Sep
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor, "Optimal iris fuzzy sketches," in Proc. 1st IEEE Int. Conf. Biometrics: Theory, Applications, and Systems., Sep. 2007, pp. 1-6.
-
(2007)
Proc. 1st IEEE Int. Conf. Biometrics: Theory, Applications, and Systems
, pp. 1-6
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
3
-
-
33646034883
-
A fuzzy sketch with trapdoor
-
May
-
J. Bringer, H. Chabanne, and Q. D. Do, "A fuzzy sketch with trapdoor," IEEE Trans. Inf. Theory, vol. 52, no. 5, pp. 2266-2269, May 2006.
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, Issue.5
, pp. 2266-2269
-
-
Bringer, J.1
Chabanne, H.2
Do, Q.D.3
-
4
-
-
45449114377
-
-
J. Bringer and H. Chabanne, An authentication protocol with encrypted biometric data, in AFRICACRYPT, 2008, Lect. Notes Comput. Sci., pp. 109-124.
-
J. Bringer and H. Chabanne, "An authentication protocol with encrypted biometric data," in AFRICACRYPT, 2008, vol. Lect. Notes Comput. Sci., pp. 109-124.
-
-
-
-
5
-
-
38149070898
-
-
J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang, and S. Zimmer, An application of the Goldwasser-Micali cryptosystem to biometric authentication, in ACISP, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., 2007, 4586, pp. 96-106, ser. Lect. Notes Comput. Sci.
-
J. Bringer, H. Chabanne, M. Izabachène, D. Pointcheval, Q. Tang, and S. Zimmer, "An application of the Goldwasser-Micali cryptosystem to biometric authentication," in ACISP, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., 2007, vol. 4586, pp. 96-106, ser. Lect. Notes Comput. Sci.
-
-
-
-
6
-
-
5044245853
-
Generalized coset schemes for the wire-tap channel: Application to biometrics
-
Chicago, IL
-
G. Cohen and G. Zémor, "Generalized coset schemes for the wire-tap channel: Application to biometrics," in Proc. IEEE Int. Symp. Information Theory, Chicago, IL, 2004, p. 46.
-
(2004)
Proc. IEEE Int. Symp. Information Theory
, pp. 46
-
-
Cohen, G.1
Zémor, G.2
-
7
-
-
33646061716
-
The wire-tap channel applied to biometrics
-
presented at the, Information Theory and Applications, Parma, Italy
-
G. Cohen and G. Zémor, "The wire-tap channel applied to biometrics," presented at the Int. Symp. Information Theory and Applications, Parma, Italy, 2004.
-
(2004)
Int. Symp
-
-
Cohen, G.1
Zémor, G.2
-
8
-
-
48649107830
-
Syndrome-coding for the wiretap channel revisited
-
Chengdu, China
-
G. Cohen and G. Zémor, "Syndrome-coding for the wiretap channel revisited," in Proc. IEEE Information Theory Workshop, Chengdu, China, 2006, pp. 33-36.
-
(2006)
Proc. IEEE Information Theory Workshop
, pp. 33-36
-
-
Cohen, G.1
Zémor, G.2
-
9
-
-
24944501364
-
Secure remote authentication using biometric data
-
Proc. EUROCRYPT, R. Cramer, Ed, Notes Comput. Sci
-
X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, "Secure remote authentication using biometric data," in Proc. EUROCRYPT, R. Cramer, Ed., 2005, vol. 3494, pp. 147-163, ser. Lect. Notes Comput. Sci.
-
(2005)
ser. Lect
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
10
-
-
54049123956
-
Perfectly secure authorization and passive identification for an error tolerant biometric system
-
Proc. IMA Int. Conf, M. Walker, Ed, Notes Comput. Sci
-
G. I. Davida and Y. Frankel, "Perfectly secure authorization and passive identification for an error tolerant biometric system," in Proc. IMA Int. Conf., M. Walker, Ed., 1999, vol. .1746, pp. 104-113, ser. Lect. Notes Comput. Sci.
-
(1999)
ser. Lect
, vol.1746
, pp. 104-113
-
-
Davida, G.I.1
Frankel, Y.2
-
11
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Proc. EUROCRYPT, C. Cachin and J. Camenisch, Eds, Notes Comput. Sci
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. EUROCRYPT, C. Cachin and J. Camenisch, Eds., 2004, vol. 3027, pp. 523-540, ser. Lect. Notes Comput. Sci.
-
(2004)
ser. Lect
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
12
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
Proc. ECCV Workshop BioAW, D. Maltoni and A. K. Jain, Eds, Notes Comput. Sci
-
P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in Proc. ECCV Workshop BioAW, D. Maltoni and A. K. Jain, Eds., 2004, vol. 3087, pp. 158-170, ser. Lect. Notes Comput. Sci.
-
(2004)
ser. Lect
, vol.3087
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
13
-
-
84892356135
-
Computationally secure authentication with noisy data
-
Berlin, Germany: Springer-Verlag
-
B. Schoenmakers and P. Tuyls, "Computationally secure authentication with noisy data," in Security With Noisy Data. Berlin, Germany: Springer-Verlag, 2007, pp. 141-152.
-
(2007)
Security With Noisy Data
, pp. 141-152
-
-
Schoenmakers, B.1
Tuyls, P.2
-
14
-
-
33750954911
-
-
T. A. M. Kevenaar, G. J. Schrijen, M. van der Veen, A. H. M. Akkermans, and F. Zuo, Face recognition with renewable and privacy preserving binary templates, in Proc. AutoID, Buffalo, NY, Oct. 17-18, 2005, pp. 21-26.
-
T. A. M. Kevenaar, G. J. Schrijen, M. van der Veen, A. H. M. Akkermans, and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in Proc. AutoID, Buffalo, NY, Oct. 17-18, 2005, pp. 21-26.
-
-
-
-
15
-
-
26444507172
-
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, Practical biometric authentication with template protection, in Proc. Audio-and Video-Based Biometrie Person Authentication, T. Kanade, A. K. Jain, and N. K. Ratha, Eds., 2005, 3546, pp. 436-446.
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G. J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, "Practical biometric authentication with template protection," in Proc. Audio-and Video-Based Biometrie Person Authentication, T. Kanade, A. K. Jain, and N. K. Ratha, Eds., 2005, vol. 3546, pp. 436-446.
-
-
-
-
16
-
-
33747624401
-
Combining crypto with biometrics effectively
-
Sep
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Comput., vol. 55, no. 9, pp. 1081-1088, Sep. 2006.
-
(2006)
IEEE Trans. Comput
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
17
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
J. Daugman, "The importance of being random: Statistical principles of iris recognition," Pattern Recognit., vol. 36, no. 2, pp. 279-291, 2003.
-
(2003)
Pattern Recognit
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
-
18
-
-
48649100277
-
Iris Recognition
-
Berlin, Germany: Springer, ch. 3
-
R. Wildes, "Iris Recognition," in Biometric Authentication: Technologies, Systems, Evaluations and Legal Issues. Berlin, Germany: Springer, 2005, ch. 3.
-
(2005)
Biometric Authentication: Technologies, Systems, Evaluations and Legal Issues
-
-
Wildes, R.1
-
21
-
-
84940644968
-
-
C. E. Shannon, A mathematical theory of communication, Bell Syst. Tech. J., 27, pp. 379-423, 1948, 623-656.
-
C. E. Shannon, "A mathematical theory of communication," Bell Syst. Tech. J., vol. 27, pp. 379-423, 1948, 623-656.
-
-
-
-
22
-
-
33750963269
-
Iris recognition and verification experiments with improved segmentation method
-
Buffalo, NY, Oct. 17-18
-
X. Liu, K. W. Bowyer, and P. J. Flynn, "Iris recognition and verification experiments with improved segmentation method," in Proc. AutoID, Buffalo, NY, Oct. 17-18, 2005, pp. 118-123.
-
(2005)
Proc. AutoID
, pp. 118-123
-
-
Liu, X.1
Bowyer, K.W.2
Flynn, P.J.3
-
24
-
-
56749084112
-
-
CASIA, Chinese Academy of Science, Inst. Automation. [Online], Available: http://www.sinobiometrics.com/Database.htm.
-
CASIA, Chinese Academy of Science, Inst. Automation. [Online], Available: http://www.sinobiometrics.com/Database.htm.
-
-
-
-
25
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
Nov
-
J. Daugman, "High confidence visual recognition of persons by a test of statistical independence," IEEE Trans. Pattern Anal. Mach. Intell., vol. 15, no. 11, pp. 1148-1161, Nov. 1993.
-
(1993)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.1
-
26
-
-
0031236835
-
Automated iris recognition: An emerging biometric technology
-
Sep
-
R. Wildes, "Automated iris recognition: An emerging biometric technology," Proc. IEEE, vol. 85, no. 9, pp. 1348-1363, Sep. 1997.
-
(1997)
Proc. IEEE
, vol.85
, Issue.9
, pp. 1348-1363
-
-
Wildes, R.1
-
27
-
-
48649103747
-
All iris code bits are not created equal
-
Sep
-
K. Hollingsworth, K. W. Bowyer, and P. J. Flynn, "All iris code bits are not created equal," in Proc. 1st IEEE Int. Conf. Biometrics: Theory, Applications, and Systems, Sep. 2007, pp. 1-6.
-
(2007)
Proc. 1st IEEE Int. Conf. Biometrics: Theory, Applications, and Systems
, pp. 1-6
-
-
Hollingsworth, K.1
Bowyer, K.W.2
Flynn, P.J.3
-
29
-
-
56749111051
-
Using distributed source coding to secure fingerprint biometrics
-
Mitsubishi Elect. Res. Labs, Tech. Rep. TR 2007-005, Jan
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia, "Using distributed source coding to secure fingerprint biometrics," Mitsubishi Elect. Res. Labs, Tech. Rep. TR 2007-005, Jan. 2007.
-
(2007)
-
-
Draper, S.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
30
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Audio-and Video-Based Biometric Person Authentication, J. Kittler and M. S. Nixon, Eds, Notes Comput. Sci
-
J.-P. M. G. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in Audio-and Video-Based Biometric Person Authentication, J. Kittler and M. S. Nixon, Eds., 2003, vol. 2688, pp. 393-402, ser. Lect. Notes Comput. Sci.
-
(2003)
ser. Lect
, vol.2688
, pp. 393-402
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
31
-
-
56749099116
-
The best of both worlds: Applying secure sketches to cancelable biometrics
-
presented at the, Luxembourg
-
J. Bringer, H. Chabanne, and B. Kindarji, "The best of both worlds: Applying secure sketches to cancelable biometrics," presented at the WISSec, Luxembourg City, Luxembourg, 2007.
-
(2007)
WISSec, Luxembourg City
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
32
-
-
26444519630
-
Detection of cores in fingerprints with improved dimension reduction
-
Hilvarenbeek, The Netherlands
-
A. M. Bazen and R. N. J. Veldhuis, "Detection of cores in fingerprints with improved dimension reduction," in Proc. 4th IEEE Benelux Signal Processing Symp., Hilvarenbeek, The Netherlands, 2004, pp. 41-44.
-
(2004)
Proc. 4th IEEE Benelux Signal Processing Symp
, pp. 41-44
-
-
Bazen, A.M.1
Veldhuis, R.N.J.2
-
33
-
-
0036647191
-
Systematic methods for the computation of the directional fields and singular points of fingerprints
-
Jul
-
A. M. Bazen and S. H. Gerez, "Systematic methods for the computation of the directional fields and singular points of fingerprints," IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 7, pp. 905-919, Jul. 2002.
-
(2002)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.24
, Issue.7
, pp. 905-919
-
-
Bazen, A.M.1
Gerez, S.H.2
-
34
-
-
0742272658
-
Likelihood-ratio-based biometric verification
-
Jan
-
A. M. Bazen and R. N. J. Veldhuis, "Likelihood-ratio-based biometric verification," IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 86-94, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol
, vol.14
, Issue.1
, pp. 86-94
-
-
Bazen, A.M.1
Veldhuis, R.N.J.2
-
36
-
-
0034290919
-
The FERET evaluation methodology for face-recognition algorithms
-
Oct
-
P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss, "The FERET evaluation methodology for face-recognition algorithms," IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 10, pp. 1090-1104, Oct. 2000.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.22
, Issue.10
, pp. 1090-1104
-
-
Phillips, P.J.1
Moon, H.2
Rizvi, S.A.3
Rauss, P.J.4
-
37
-
-
33846223680
-
-
Pasadena, CA, Online, Available:, Calif. Inst. Technol
-
M. Weber, "Frontal face dataset" Pasadena, CA, 1999 [Online]. Available: http://www.vision.caltech.edu/html-files/archive, Calif. Inst. Technol.
-
(1999)
Frontal face dataset
-
-
Weber, M.1
-
38
-
-
0003846836
-
Codes and decoding on general graphs,
-
Ph.D. dissertation, Linkoping Univ, Linkoping, Sweden
-
N. Wiberg, "Codes and decoding on general graphs," Ph.D. dissertation, Linkoping Univ., Linkoping, Sweden, 1996.
-
(1996)
-
-
Wiberg, N.1
-
39
-
-
0019608335
-
A recursive approach to low-complexity codes
-
Sep
-
R. M. Tanner, "A recursive approach to low-complexity codes," IEEE Trans. Inf. Theory, vol. IT-27, no. 5, pp. 533-547, Sep. 1981.
-
(1981)
IEEE Trans. Inf. Theory
, vol.IT-27
, Issue.5
, pp. 533-547
-
-
Tanner, R.M.1
-
40
-
-
0002669842
-
Application of boolean algebra to switching circuit design and to error detection
-
D. E. Muller, "Application of boolean algebra to switching circuit design and to error detection," IEEE Trans. Electron. Comput., vol. 3, pp. 6-12, 1954.
-
(1954)
IEEE Trans. Electron. Comput
, vol.3
, pp. 6-12
-
-
Muller, D.E.1
-
41
-
-
9144245836
-
A class of multiple-error-correcting codes and their decoding scheme
-
Sep
-
I. S. Reed, "A class of multiple-error-correcting codes and their decoding scheme," IEEE Trans. Inf. Theory, vol. 4, no. 4, pp. 38-42, Sep. 1954.
-
(1954)
IEEE Trans. Inf. Theory
, vol.4
, Issue.4
, pp. 38-42
-
-
Reed, I.S.1
-
42
-
-
35148835074
-
New methods in iris recognition
-
Oct
-
J. Daugman, "New methods in iris recognition," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 5, pp. 1167-1175, Oct. 2007.
-
(2007)
IEEE Trans. Syst., Man, Cybern. B, Cybern
, vol.37
, Issue.5
, pp. 1167-1175
-
-
Daugman, J.1
|