-
1
-
-
0034809453
-
Enhancing Security and Privacy in Biometrics-Based Authentication System
-
Mar, doi: 10.1147/sj.403.0614
-
N. K. Ratha, J. H. Connell, and R. Bolle, "Enhancing Security and Privacy in Biometrics-Based Authentication System," IBM Systems J., vol. 40, no. 3, Mar. 2001, pp. 614-634, doi: 10.1147/sj.403.0614.
-
(2001)
IBM Systems J
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.3
-
2
-
-
33947530278
-
Generating Cancelable Fingerprint Templates
-
Apr, doi: 10.1109/TPAMI.2007.1004
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating Cancelable Fingerprint Templates," IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, vol. 29, no. 4, Apr. 2007, pp. 561-572, doi: 10.1109/TPAMI.2007.1004.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
3
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
Nov, doi: 10.1109/ICPR.2004.1334679
-
M. Savvides, B. V. K. V. Kumar, and P. K. Khosla, "Cancelable biometric filters for face recognition," in Proc. 17th ICPR, vol. 3, Nov. 2004, pp. 922-925, doi: 10.1109/ICPR.2004.1334679.
-
(2004)
Proc. 17th ICPR
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.V.K.V.2
Khosla, P.K.3
-
4
-
-
12344259813
-
BioHashing: Two factor authentication featuring fingerprint data and tokenised random number
-
doi:10.1016/j.patcog.2004.04.011
-
A. Teoh, D. Ngo, and A. Goh, "BioHashing: Two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognit., vol. 37, no. 11, 2004, pp. 2245-2255, doi:10.1016/j.patcog.2004.04.011.
-
(2004)
Pattern Recognit
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Teoh, A.1
Ngo, D.2
Goh, A.3
-
5
-
-
33947177191
-
Random Multispace Quantization As an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs
-
Dec, doi: 10.1109/TPAMI.2006.250
-
A. Teoh, M. Goh, D. Ngo, "Random Multispace Quantization As an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, no. 12, Dec. 2006, pp. 1892-1901, doi: 10.1109/TPAMI.2006.250.
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.1
Goh, M.2
Ngo, D.3
-
6
-
-
8344273612
-
Personalised cryptographic key generation based on FaceHashing
-
Oct
-
A. B. J. Teoh, D. C. L. Ngo, and A. Goh, "Personalised cryptographic key generation based on FaceHashing," Comput. Security, vol. 23, no. 7, Oct. 2004, pp. 606-614.
-
(2004)
Comput. Security
, vol.23
, Issue.7
, pp. 606-614
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
7
-
-
12844255931
-
PalmHashing: A novel approach for dual-factor authentication
-
doi:10.1016/j.cose.2004.06.002
-
T. Connie, A. Teoh, M. Goh, and D. Ngo, "PalmHashing: A novel approach for dual-factor authentication," Pattern Anal. Appl., vol. 7, no. 3, 2004, pp. 255-268, doi:10.1016/j.cose.2004.06.002.
-
(2004)
Pattern Anal. Appl
, vol.7
, Issue.3
, pp. 255-268
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
8
-
-
33947529940
-
Cancelable Biometrics: A Case Study in Fingerprints
-
Jul, doi: 10.1109/ICPR.2006.353
-
N. Ratha, J. Connell, R. Bolle, and S. Chikkerur, "Cancelable Biometrics: A Case Study in Fingerprints," Proc. Int'l Conf. Pattern Recognition, Jul. 2006, pp. 370-373, doi: 10.1109/ICPR.2006.353.
-
(2006)
Proc. Int'l Conf. Pattern Recognition
, pp. 370-373
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
Chikkerur, S.4
-
9
-
-
34547103253
-
Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information
-
Aug, doi: 10.1109/TSMCB.2007.896999
-
C. Lee, J.-Y. Choi, K.-A Toh, S. Lee, and J. Kim, "Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information," IEEE Transactions on Systems, Man and Cybernetics, Part B, Vol. 37, no. 4, Aug. 2007, pp. 980-992, doi: 10.1109/TSMCB.2007.896999.
-
(2007)
IEEE Transactions on Systems, Man and Cybernetics, Part B
, vol.37
, Issue.4
, pp. 980-992
-
-
Lee, C.1
Choi, J.-Y.2
Toh, K.-A.3
Lee, S.4
Kim, J.5
-
10
-
-
33744964477
-
-
ICB, doi: 10.1007/11608288
-
K. Cheung, A. Kong, D. Zhang, M. Kamel, and J. You, "Revealing the Secret of FaceHashing," ICB 2006, 2006, pp. 106-112, doi: 10.1007/11608288.
-
(2006)
Revealing the Secret of FaceHashing
, pp. 106-112
-
-
Cheung, K.1
Kong, A.2
Zhang, D.3
Kamel, M.4
You, J.5
-
11
-
-
33646095185
-
An analysis of BioHashing and its variants
-
Jul. 27, doi:10.1016/j.patcog.2005.10.025
-
A. Kong, K. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of BioHashing and its variants," Pattern Recognit., vol. 39, no. 7, Jul. 27, 2006, pp. 1359-1368, doi:10.1016/j.patcog.2005.10.025.
-
(2006)
Pattern Recognit
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.2
Zhang, D.3
Kamel, M.4
You, J.5
-
12
-
-
14844335721
-
Reusable Cryptographic Fuzzy Extractors
-
doi: 10.1145/1030083.1030096
-
X. Boyen, "Reusable Cryptographic Fuzzy Extractors," in ACM Conf. on Computer and Communications Security, 2004, pp. 82-91, doi: 10.1145/1030083.1030096.
-
(2004)
ACM Conf. on Computer and Communications Security
, pp. 82-91
-
-
Boyen, X.1
-
13
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
doi: 10.1007/b97182
-
Y. Dodis, L. Reyzin, A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," Eurocrypt2004, 2004, pp. 523-540, doi: 10.1007/b97182.
-
(2004)
Eurocrypt
, vol.2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
16
-
-
8344236959
-
Biometric encrpytion
-
R. K. Nichols, Ed. New York: McGraw-Hill
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, "Biometric encrpytion," in ICSA Guide Cryptograp., R. K. Nichols, Ed. New York: McGraw-Hill, 1999.
-
(1999)
ICSA Guide Cryptograp
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
18
-
-
33751580079
-
FVC2002: Second fingerprint verification competition
-
Aug, doi: doi/10.1109/ICPR.2002.1048144
-
D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, "FVC2002: Second fingerprint verification competition," in Proc. Int. Conf. Pattern Recognition, Aug. 2002, pp. 811-814, doi: doi/10.1109/ICPR.2002.1048144.
-
(2002)
Proc. Int. Conf. Pattern Recognition
, pp. 811-814
-
-
Maio, D.1
Maltoni, D.2
Wayman, J.L.3
Jain, A.K.4
-
19
-
-
35048881611
-
A Robust Fingerprint Minutiae Matching Algorithm Based on the Support Model
-
July, doi: 10.1007/b98225
-
Xiaohui Xie, Fei Su, Anni Cai. "A Robust Fingerprint Minutiae Matching Algorithm Based on the Support Model," International Conference on Biometric Authentication, ICBA2004, July, 2004, pp. 316-323, doi: 10.1007/b98225.
-
(2004)
International Conference on Biometric Authentication, ICBA2004
, pp. 316-323
-
-
Xie, X.1
Su, F.2
Cai, A.3
|