-
1
-
-
0032224440
-
Biometric encryption using image processing
-
C. Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. K. Vijaya Kumar, "Biometric encryption using image processing", Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, vol. 3314, pp. 178-188, 1998.
-
(1998)
Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
2
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash and D. J. Lin, "Secure smartcard-based fingerprint authentication", Proc. ACM SIGMM Multimedia, Biometrics Methods and Applications Workshop, pp. 45-52, 2003
-
(2003)
Proc. ACM SIGMM Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
3
-
-
27644521507
-
Automatic secure fngerprint verification system based on fuzzy vault scheme
-
S. Yang, I. Verbauwhede, "Automatic secure fngerprint verification system based on fuzzy vault scheme", Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 609-612, 2005
-
(2005)
Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
6
-
-
8844234621
-
On the Relation of Error Correction and Cryptography to an Off Line Biometrics Based Identification Scheme
-
G.I. Davida, Y. Frankel, B.J. Matt, and R. Peralta, "On the Relation of Error Correction and Cryptography to an Off Line Biometrics Based Identification Scheme", Proc. Workshop Coding and Cryptography, pp. 129-138, 1999
-
(1999)
Proc. Workshop Coding and Cryptography
, pp. 129-138
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
9
-
-
0034829626
-
Cryptographic Key Generation from Voice
-
F. Monrose, M.K. Reiter, Q. Li, and S. Wetzel, "Cryptographic Key Generation from Voice", Proc. 2001 IEEE Symp. Security and Privacy, pp. 202-213, 2001
-
(2001)
Proc. 2001 IEEE Symp. Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
10
-
-
0036037919
-
Private Key Generation from On-Line Handwritten Signatures
-
F. Hao and C.W. Chan, "Private Key Generation from On-Line Handwritten Signatures," Information Management & Computer Security, vol. 10, no. 2, pp. 159-164, 2002
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.2
, pp. 159-164
-
-
Hao, F.1
Chan, C.W.2
-
11
-
-
37849010331
-
A Palmprint Cryptosystem
-
X. Wu, D. Zhang, and K. Wang, "A Palmprint Cryptosystem", International Conference on Biometrics, pp. 1035-1042, 2007
-
(2007)
International Conference on Biometrics
, pp. 1035-1042
-
-
Wu, X.1
Zhang, D.2
Wang, K.3
-
12
-
-
0027700869
-
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
-
J.G. Daugman, "High Confidence Visual Recognition of Persons by a Test of Statistical Independence", IEEE Trans. Pattern Analysis and Machine Intelligence, vol.15, no. 11, pp. 1148-1161, 1993
-
(1993)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.G.1
-
13
-
-
33750318668
-
The relative distance of key point based iris recognition
-
Li Yu, David Zhang and Kuanquan Wang, "The relative distance of key point based iris recognition", Pattern Recognition, pp. 423-430, 2007
-
(2007)
Pattern Recognition
, pp. 423-430
-
-
Yu, L.1
Zhang, D.2
Wang, K.3
-
14
-
-
57649121348
-
-
CASIA Iris Image Database. {http://www.cbsr.ia.ac.cn/IrisDatabase.htm}
-
CASIA Iris Image Database. {http://www.cbsr.ia.ac.cn/IrisDatabase.htm}
-
-
-
|