-
1
-
-
0742290133
-
An introduction to biometric recognition
-
A. K. Jain, "An introduction to biometric recognition," IEEE Trans. Circuits Syst. Video Technol. 14(1), 4-20 (2004).
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.K.1
-
2
-
-
10044297649
-
-
Springer, New York (2004)
-
R. M. Bolle, J. H. Connell, S. Pankati, N. K. Ratha, and A. W. Senior, "Guide to Biometrics," Springer, New York (2004).
-
Guide to Biometrics
-
-
Bolle, R.M.1
Connell, J.H.2
Pankati, S.3
Ratha, N.K.4
Senior, A.W.5
-
3
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: Security and privacy concerns," IEEE Security & Privacy Magazine 1, 33-42 (2003).
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
5
-
-
82055208335
-
An analysis of minutiae matching strength
-
Audio- and Video-Based Biometric Person Authentication Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6-8, 2001 Proceedings
-
N. Ratha, J. H. Connell, and R. M. Bolle, "An analysis of minutiae matching strength," in Proc. Int. Conf. Audio and Video-Based Biometric Person Authentication, pp. 223-228 (2001). (Pubitemid 33292009)
-
(2001)
Lecture Notes in Computer Science
, Issue.2091
, pp. 223-228
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
6
-
-
33744742101
-
Can images be regenerated from biometric templates?
-
A. Adler, "Can images be regenerated from biometric templates?," in Proc. Biometrics Consortium Conf. (2003).
-
(2003)
Proc. Biometrics Consortium Conf.
-
-
Adler, A.1
-
7
-
-
8844228915
-
Attacks on biometric systems: A case study in fingerprints
-
U. Uludag and A. K. Jain, "Attacks on biometric systems: A case study in fingerprints," in EI Security, Steganography and Watermarking of Multimedia Contents VI, Proc. SPIE 5306, 622-633 (2004).
-
(2004)
EI Security, Steganography and Watermarking of Multimedia Contents VI Proc. SPIE
, vol.5306
, pp. 622-633
-
-
Uludag, U.1
Jain, A.K.2
-
8
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. Bolle, "Enhancing security and privacy of biometric-based authentication systems," IBM Syst. J. 40(3), 614-634 (2002). (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
9
-
-
8844234621
-
On the relation of error correction and cryptography to an off line biometric based identification scheme
-
G. Davida, Y. Frankel, B. J. Matt, and R. Peralta, "On the relation of error correction and cryptography to an off line biometric based identification scheme," in Proc. WCC99, Workshop on Coding and Cryptography (1999).
-
(1999)
Proc. WCC99, Workshop on Coding and Cryptography
-
-
Davida, G.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
11
-
-
0032224440
-
Biometric encryption™ using image processing
-
DOI 10.1117/12.304705
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, "Biometric encryption using image processing," in Proc. SPIE 3314, 178-188 (1998). (Pubitemid 35004219)
-
(1998)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
12
-
-
34547864313
-
Computation of cryptographic keys from face biometrics
-
A. Goh and D. C. L. Ngo, "Computation of cryptographic keys from face biometrics," in Proc. 7th IFIP CMS 2003 (2003).
-
Proc. 7th IFIP CMS
, vol.2003
, pp. 2003
-
-
Goh, A.1
Ngo, D.C.L.2
-
15
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication," in Proc. ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, pp. 45-52 (2003).
-
(2003)
Proc. ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
18
-
-
33645656960
-
Safety of templates in biometric person authentication using error-correcting code," in Security, Steganography, and Watermarking of Multimedia Contents VIII
-
T. Ohki, S. Akatsuka, and N. Komatsu, "Safety of templates in biometric person authentication using error-correcting code," in Security, Steganography, and Watermarking of Multimedia Contents VIII, Proc. SPIE, (2006).
-
(2006)
Proc. SPIE
-
-
Ohki, T.1
Akatsuka, S.2
Komatsu, N.3
-
19
-
-
8844277754
-
Privacy protected biometric templates: Acoustic ear identification
-
P. Tuyls, E. Verbitsky, T. Ignatenko, D. Schobben, and T. H. Akkermans, "Privacy protected biometric templates: Acoustic ear identification," in Proc. SPIE 5404, 176-182 (2004).
-
(2004)
Proc. SPIE
, vol.5404
, pp. 176-182
-
-
Tuyls, P.1
Verbitsky, E.2
Ignatenko, T.3
Schobben, D.4
Akkermans, T.H.5
-
20
-
-
33947536487
-
Practical biometric template protection system based on reliable components
-
P. Tuyls, A. Akkermans, T. Kevenaar, G. J. Schrijen, A. Bazen, and R. Veldhuis, "Practical biometric template protection system based on reliable components," in Proc. AVBPA (2005).
-
(2005)
Proc. AVBPA
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.J.4
Bazen, A.5
Veldhuis, R.6
-
21
-
-
33645656961
-
Face biometrics with renewable templates
-
M. Van der Veen, T. Kevenaar, G.-J. Schrijen, T. H. Akkermans, and F. Zuo, "Face biometrics with renewable templates," in Security, Steganography, and Watermarking of Multimedia Contents, Proc. SPIE, 6072 (2006).
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents Proc. SPIE
, vol.6072
-
-
Van Der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.H.4
Zuo, F.5
-
22
-
-
33751585800
-
Biometric hash based on statistical features of online signatures
-
C. Vielhauer, R. Steinmetz, and A. Mayerhöfer, "Biometric hash based on statistical features of online signatures," Int. Conf. Pattern Recog. (ICPR), IEEE Proc. 1, 123-126 (2002). (Pubitemid 44844957)
-
(2002)
Proceedings - International Conference on Pattern Recognition
, vol.16
, Issue.1
, pp. 123-126
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhofer, A.3
-
23
-
-
2942592700
-
Handwriting: Feature correlation analysis for biometric hashes
-
Special issue on Biometric Signal Process.
-
C. Vielhauer and R. Steinmetz, "Handwriting: Feature correlation analysis for biometric hashes," EURASIP J. Appl. Signal Process. 2004(4), Special issue on Biometric Signal Process., 542-558 (2004).
-
(2004)
EURASIP J. Appl. Signal Process
, vol.2004
, Issue.4
, pp. 542-558
-
-
Vielhauer, C.1
Steinmetz, R.2
-
24
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
DOI 10.1108/09685220210436949
-
H. Feng and C. W. Chan, "Private key generation from on-line handwritten signatures," Infor. Management and Computer Security, pp. 159-164 (2002). (Pubitemid 35010220)
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.4
, pp. 159-164
-
-
Feng, H.1
Wah, C.C.2
-
25
-
-
33750947671
-
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
-
DOI 10.1109/AUTOID.2005.17, 1544396, Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
-
Y. W. Kuan, A. Goh, D. Ngo, and A. Teoh, "Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability," in Proc. 4th IEEE Workshop on Automatic Identification Advanced Technologies, pp. 27-32 (2005). (Pubitemid 44733945)
-
(2005)
Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
, vol.2005
, pp. 27-32
-
-
Kuan, Y.W.1
Goh, A.2
David Ngo, C.L.3
Andrew Teoh, B.J.4
-
26
-
-
33747674301
-
Cryptographic key generation using handwritten signature
-
M. Freire-Santos, J. Fierrez-Aguilar, and J. Ortega-Garcia, "Cryptographic key generation using handwritten signature," Defense and Security Symposium, Biometric Technologies for Human Identification, SPIE Proc. 6202, pp. 225-231 (2006).
-
(2006)
Defense and Security Symposium, Biometric Technologies for Human Identification, SPIE Proc.
, vol.6202
, pp. 225-231
-
-
Freire-Santos, M.1
Fierrez-Aguilar, J.2
Ortega-Garcia, J.3
-
29
-
-
36049036567
-
Multi-level signature based biometric authentication using watermarking
-
E. Maiorana, P. Campisi, and A. Neri, "Multi-level signature based biometric authentication using watermarking," in Proc. SPIE Defense and Security, Mobile Multimedia/Image Processing for Military and Security Applications, 6579 (2007).
-
(2007)
Proc. SPIE Defense and Security, Mobile Multimedia/Image Processing for Military and Security Applications
, vol.6579
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
30
-
-
50249183581
-
Biometric signature authentication using radon transform-based watermarking techniques
-
E. Maiorana, P. Campisi, and A. Neri, "Biometric signature authentication using radon transform-based watermarking techniques," in Proc. IEEE Biometric Symposium (2007).
-
(2007)
Proc. IEEE Biometric Symposium
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
31
-
-
0033601655
-
Verification watermarks on fingerprint recognition and retrieval
-
S. Pankanti and M. M. Yeung, "Verification watermarks on fingerprint recognition and retrieval," in Proc. SPIE 3657, 66-78 (1999).
-
(1999)
Proc. SPIE
, vol.3657
, pp. 66-78
-
-
Pankanti, S.1
Yeung, M.M.2
-
32
-
-
24144502913
-
Signature recognition state-of-the-art
-
DOI 10.1109/MAES.2005.1499249
-
M. Faundez-Zanuy, "Signature recognition state-of-the-art," IEEE Aerosp. Electron. Syst. Mag. 20(7), 28-32 (2005). (Pubitemid 41238710)
-
(2005)
IEEE Aerospace and Electronic Systems Magazine
, vol.20
, Issue.7
, pp. 28-32
-
-
Faundez-Zanuy, M.1
-
33
-
-
18044370447
-
Recent advancements in automatic signature verification
-
G. Dimauro, S. Impedovo, M. G. Lucchese, R. Modugno, and G. Pirlo, "Recent advancements in automatic signature verification," Proc. 9th Int. Workshop on Frontiers in Handwriting Recognition (2004).
-
(2004)
Proc. 9th Int. Workshop on Frontiers in Handwriting Recognition
-
-
Dimauro, G.1
Impedovo, S.2
Lucchese, M.G.3
Modugno, R.4
Pirlo, G.5
-
35
-
-
33645005904
-
A Markov Chain Monte Carlo algorithm for Bayesian dynamic signature verification
-
D. Maramatsu, M. Kondo, M. Sasaki, S. Tachibana, and T. Matsumoto, "A Markov Chain Monte Carlo algorithm for Bayesian dynamic signature verification," IEEE Trans. Information Forensic and Security 1(1), 22-34 (2006).
-
(2006)
IEEE Trans. Information Forensic and Security
, vol.1
, Issue.1
, pp. 22-34
-
-
Maramatsu, D.1
Kondo, M.2
Sasaki, M.3
Tachibana, S.4
Matsumoto, T.5
-
36
-
-
0036833279
-
Off-line signature verification using structural feature correspondence
-
DOI 10.1016/S0031-3203(01)00222-9, PII S0031320301002229
-
K. Huang and H. Yan, "Off-line signature verification using structural feature correspondence," Pattern Recogn. 35, 2467-2477 (2002). (Pubitemid 34961617)
-
(2002)
Pattern Recognition
, vol.35
, Issue.11
, pp. 2467-2477
-
-
Huang, K.1
Yan, H.2
-
37
-
-
0021617121
-
On-line handwritten signature recognition based on data analysis and clustering
-
G. Lorette and R. Plamondon, "On-line handwritten signature recognition based on data analysis and clustering," in Proc. 7th ICPR (2), pp. 1284-1287 (1984). (Pubitemid 15516987)
-
(1984)
Proceedings - International Conference on Pattern Recognition
, vol.2
, pp. 1284-1287
-
-
Lorette, G.1
-
38
-
-
34548214636
-
Adaptive and distributed cryptography for signature biometrics protection
-
P. Campisi, E. Maiorana, M. Gonzalez, and A. Neri, "Adaptive and distributed cryptography for signature biometrics protection," SPIE Proc. Security, Steganography, and Watermarking of Multimedia Contents IX, 6505 (2007).
-
(2007)
SPIE Proc. Security, Steganography, and Watermarking of Multimedia Contents
, vol.9
, pp. 6505
-
-
Campisi, P.1
Maiorana, E.2
Gonzalez, M.3
Neri, A.4
-
39
-
-
8344234316
-
A goodness-of-fit statistical toolkit
-
G. A. P. Cirrone, S. Donadio, S. Guatelli, A. Mantero, B. Mascialino, S. Parlati, M. G. Pia, A. Pfeiffer, A. Ribon, and P. Viarengo, "A goodness-of-fit statistical toolkit," IEEE Trans. Nucl. Sci. 51, 2056-2063 (2004).
-
(2004)
IEEE Trans. Nucl. Sci.
, vol.51
, pp. 2056-2063
-
-
Cirrone, G.A.P.1
Donadio, S.2
Guatelli, S.3
Mantero, A.4
Mascialino, B.5
Parlati, S.6
Pia, M.G.7
Pfeiffer, A.8
Ribon, A.9
Viarengo, P.10
-
41
-
-
84875595066
-
-
Standards Publication 180-1, Security Hash Standard
-
Federal Information Processing (FIP) Standards Publication 180-1, Security Hash Standard (1995(; http://www.itl.nist.gov/fipspubs/fip180-1.htm.
-
(1995)
Federal Information Processing (FIP)
-
-
-
43
-
-
33646754186
-
Finding collisions in the full SHA-1
-
X. Wang, Y. L. Yin, and H. Yu, "Finding collisions in the full SHA-1," in Proc. CRYPTO (2005).
-
(2005)
Proc. CRYPTO
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
44
-
-
38049106551
-
Finding SHA-1 characteristics: General results and applications
-
Springer
-
C. De Cannire and C. Rechberger, "Finding SHA-1 characteristics: General results and applications," Advances in Cryptology, Proc. ASIACRYPT 2006, Springer, 4284 (2006).
-
(2006)
Advances in Cryptology, Proc. ASIACRYPT
, vol.2006
, pp. 4284
-
-
De Cannire, C.1
Rechberger, C.2
|