-
2
-
-
34548118752
-
Fingerprint Image Reconstruction From Standard Templates
-
R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, "Fingerprint Image Reconstruction From Standard Templates," IEEE Trans, on PAMI, vol. 29, no. 9, pp. 1489-1503, 2007.
-
(2007)
IEEE Trans, on PAMI
, vol.29
, Issue.9
, pp. 1489-1503
-
-
Cappelli, R.1
Lumini, A.2
Maio, D.3
Maltoni, D.4
-
4
-
-
35148846059
-
Secure Biometric Templates from Fingerprint-Face Features
-
Minneapolis, USA, June
-
Y. Sutcu, Q. Li, and N. Memon, "Secure Biometric Templates from Fingerprint-Face Features," in Proceedings of CVPR Workshop on Biometrics, Minneapolis, USA, June 2007.
-
(2007)
Proceedings of CVPR Workshop on Biometrics
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
5
-
-
0036350106
-
A Fuzzy Vault Scheme
-
Lausanne, Switzerland
-
A. Juels and M. Sudan, "A Fuzzy Vault Scheme," in Proc. of IEEE Intl. Symp. on Info. Theory, Lausanne, Switzerland, 2002, p. 408.
-
(2002)
Proc. of IEEE Intl. Symp. on Info. Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
6
-
-
26444507172
-
Practical Biometric Authentication with Template Protection
-
Rye Town, USA, July
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G.-J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, "Practical Biometric Authentication with Template Protection," in Proceedings of Fifth Intl. Conf. on AVBPA, Rye Town, USA, July 2005, pp. 436-446.
-
(2005)
Proceedings of Fifth Intl. Conf. on AVBPA
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
7
-
-
34547512147
-
Using Distributed Source Coding to Secure Fingerprint Biometrics
-
Hawaii, April
-
S. C. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia, "Using Distributed Source Coding to Secure Fingerprint Biometrics," in Proceedings of ICASSP, vol. 2, Hawaii, April 2007, pp. 129-132.
-
(2007)
Proceedings of ICASSP
, vol.2
, pp. 129-132
-
-
Draper, S.C.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
8
-
-
67549127585
-
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, Cryptology ePrint Archive, Tech. Rep. 235, February 2006, A preliminary version of this work appeared in EUROCRYPT 2004.
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Cryptology ePrint Archive, Tech. Rep. 235, February 2006, A preliminary version of this work appeared in EUROCRYPT 2004.
-
-
-
-
9
-
-
34548074162
-
Protecting Biometric Templates with Sketch: Theory and Practice
-
September
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting Biometric Templates with Sketch: Theory and Practice," IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 503-512, September 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
10
-
-
34748924251
-
Fuzzy Extractors for Continuous Distributions
-
Singapore, March
-
I. R. Buhan, J. M. Doumen, P. H. Hartel, and R. N. J. Veldhuis, "Fuzzy Extractors for Continuous Distributions," in Proceedings of ACM Symposium on Information, Computer and Communications Security, Singapore, March 2007, pp. 353-355.
-
(2007)
Proceedings of ACM Symposium on Information, Computer and Communications Security
, pp. 353-355
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
12
-
-
42949167255
-
Realization of Correlation Attack Against the Fuzzy Vault Scheme
-
San Jose, USA, January
-
A. Kholmatov and B. Yanikoglu, "Realization of Correlation Attack Against the Fuzzy Vault Scheme," in Proc. of SPIE Symposium on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, San Jose, USA, January 2008.
-
(2008)
Proc. of SPIE Symposium on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X
, vol.6819
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
13
-
-
36348986198
-
Fingerprint-based Fuzzy Vault: Implementation and Performance
-
December
-
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based Fuzzy Vault: Implementation and Performance," IEEE Trans, on Info. Forensics and Security, vol. 2, no. 4, pp. 744-757, December 2007.
-
(2007)
IEEE Trans, on Info. Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
14
-
-
0742290132
-
How Iris Recognition Works?
-
J. Daugman, "How Iris Recognition Works?" IEEE Trans, on Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, 2004.
-
(2004)
IEEE Trans, on Circuits and Systems for Video Technology
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
15
-
-
33747742511
-
Image Versus Feature Mosaicing: A Case Study in Fingerprints
-
Orlando, USA, April
-
A. Ross, S. Shah, and J. Shah, "Image Versus Feature Mosaicing: A Case Study in Fingerprints," in Proceedings of SPIE Conference on Biometric Technology for Human Identification, vol. 6202, Orlando, USA, April 2006, pp. 1-12.
-
(2006)
Proceedings of SPIE Conference on Biometric Technology for Human Identification
, vol.6202
, pp. 1-12
-
-
Ross, A.1
Shah, S.2
Shah, J.3
-
16
-
-
0347380865
-
Personal Identification Based on Iris Texture Analysis
-
December
-
L. Ma, T. Tan, Y. Wang, and D. Zhang, "Personal Identification Based on Iris Texture Analysis," IEEE Trans, on PAMI, vol. 25, no. 12, pp. 1519-1533, December 2003.
-
(2003)
IEEE Trans, on PAMI
, vol.25
, Issue.12
, pp. 1519-1533
-
-
Ma, L.1
Tan, T.2
Wang, Y.3
Zhang, D.4
-
17
-
-
52949099082
-
Enhanced Iris Recognition: Algorithms for Segmentation, Matching and Synthesis,
-
Master's thesis, Department of Computer Science and Electrical Engineering, West Virginia University
-
S. Shah, "Enhanced Iris Recognition: Algorithms for Segmentation, Matching and Synthesis," Master's thesis, Department of Computer Science and Electrical Engineering, West Virginia University, 2006.
-
(2006)
-
-
Shah, S.1
-
18
-
-
34548067136
-
Statistical Models for Assessing the Individuality of Fingerprints
-
September
-
Y. Zhu, S. C. Dass, and Jain, "Statistical Models for Assessing the Individuality of Fingerprints," IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 391-401, September 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 391-401
-
-
Zhu, Y.1
Dass, S.C.2
Jain3
-
19
-
-
33747624401
-
Combining Crypto with Biometrics Effectively
-
September
-
F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometrics Effectively," IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081-1088, September 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
|