메뉴 건너뛰기




Volumn 1, Issue , 2008, Pages

Biometric template protection using watermarking with hidden password encryption

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CRYPTOGRAPHY; INFORMATION TECHNOLOGY;

EID: 57349130686     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITSIM.2008.4631572     Document Type: Conference Paper
Times cited : (19)

References (16)
  • 1
    • 4544365541 scopus 로고    scopus 로고
    • Palmprint classification using principle lines
    • X. Wu, D. Zhang, K. Wang and B. Huang, "Palmprint classification using principle lines," Pattern Recognition, Vol. 37, No. 10, pp 1987-1998, 2004.
    • (2004) Pattern Recognition , vol.37 , Issue.10 , pp. 1987-1998
    • Wu, X.1    Zhang, D.2    Wang, K.3    Huang, B.4
  • 2
    • 34547230779 scopus 로고    scopus 로고
    • Palmprint database from Biometric Research Center, Polytechnic University. Available
    • Palmprint database from Biometric Research Center, The Hong Kong Polytechnic University. Available:http://www4.comp.polyu.edu.hk/~biometrics/
    • The Hong Kong
  • 4
    • 0003437939 scopus 로고    scopus 로고
    • Verification Watermarks on Fingerprint Recognition and Retrieval
    • Yeung M. and Pankanti S., "Verification Watermarks on Fingerprint Recognition and Retrieval," Journal of Electronic Imaging, vol. 9, no. 4, pp.468-476, 2000.
    • (2000) Journal of Electronic Imaging , vol.9 , Issue.4 , pp. 468-476
    • Yeung, M.1    Pankanti, S.2
  • 5
    • 0032117545 scopus 로고    scopus 로고
    • Invisible watermarking for image verification
    • M.M. Yeung and F.C. Mintzer, "Invisible watermarking for image verification," Journal of Electronic Imaging, Vol. 7(03), pp. 578-591, 1998.
    • (1998) Journal of Electronic Imaging , vol.7 , Issue.3 , pp. 578-591
    • Yeung, M.M.1    Mintzer, F.C.2
  • 9
    • 8844269323 scopus 로고    scopus 로고
    • Biometric System Security
    • Available
    • Soutar, "Biometric System Security," Secure No. 5, pp. 46-49, 2002. Available: http://www.silicontrust.com/pdf/secure_5/46_techno_4.pdf
    • (2002) Secure , Issue.5 , pp. 46-49
    • Soutar1
  • 13
    • 34548022830 scopus 로고    scopus 로고
    • S.W. Sun, C.S. Lu, and P.C. Chang, Biometric Template Protection: a Key-Mixed Template Approach, Proc. IEEE Intl. Conf. Consumer Electronics 2007, pp. 1-2, Las Vegas, NV, 2007.
    • S.W. Sun, C.S. Lu, and P.C. Chang, "Biometric Template Protection: a Key-Mixed Template Approach," Proc. IEEE Intl. Conf. Consumer Electronics 2007, pp. 1-2, Las Vegas, NV, 2007.
  • 14
    • 57349135860 scopus 로고    scopus 로고
    • Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, and B.V.K. Vijaya Kumar Biometric Encryption™, Bioscrypt Inc. , ICSA Guide to Cryptography, edited by Randall K. Nichols, McGraw-Hill (1999), chapter 22.
    • Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, and B.V.K. Vijaya Kumar "Biometric Encryption™," Bioscrypt Inc. , ICSA Guide to Cryptography, edited by Randall K. Nichols, McGraw-Hill (1999), chapter 22.
  • 16
    • 33947177191 scopus 로고    scopus 로고
    • Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
    • A.B.J. Teoh, A. Goh and D.C.L. Ngo, "Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs," IEEE Trans. on PAMI, Vol. 28, No. 12, pp. 1892-1901, 2006.
    • (2006) IEEE Trans. on PAMI , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.B.J.1    Goh, A.2    Ngo, D.C.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.