메뉴 건너뛰기




Volumn 17, Issue 1, 2008, Pages

User adaptive fuzzy commitment for signature template protection and renewability

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION SCHEME; BIOMETRIC DATA; BIOMETRIC TEMPLATE; CRYPTOGRAPHIC TECHNIQUES; DYNAMIC SIGNATURE; ENHANCED PERFORMANCE; PROTECTION SCHEMES; RECOGNITION PERFORMANCE; TEMPLATE PROTECTION; USER-ADAPTIVE; USER-ADAPTIVE SYSTEMS;

EID: 67549130623     PISSN: 10179909     EISSN: 1560229X     Source Type: Journal    
DOI: 10.1117/1.2885239     Document Type: Article
Times cited : (30)

References (44)
  • 1
  • 5
    • 82055208335 scopus 로고    scopus 로고
    • An analysis of minutiae matching strength
    • Audio- and Video-Based Biometric Person Authentication Third International Conference, AVBPA 2001 Halmstad, Sweden, June 6-8, 2001 Proceedings
    • N. Ratha, J. H. Connell, and R. M. Bolle, "An analysis of minutiae matching strength," in Proc. Int. Conf. Audio and Video-Based Biometric Person Authentication, pp. 223-228 (2001). (Pubitemid 33292009)
    • (2001) Lecture Notes in Computer Science , Issue.2091 , pp. 223-228
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 6
    • 33744742101 scopus 로고    scopus 로고
    • Can images be regenerated from biometric templates?
    • A. Adler, "Can images be regenerated from biometric templates?," in Proc. Biometrics Consortium Conf. (2003).
    • (2003) Proc. Biometrics Consortium Conf.
    • Adler, A.1
  • 8
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. Bolle, "Enhancing security and privacy of biometric-based authentication systems," IBM Syst. J. 40(3), 614-634 (2002). (Pubitemid 32933421)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 12
    • 34547864313 scopus 로고    scopus 로고
    • Computation of cryptographic keys from face biometrics
    • A. Goh and D. C. L. Ngo, "Computation of cryptographic keys from face biometrics," in Proc. 7th IFIP CMS 2003 (2003).
    • Proc. 7th IFIP CMS , vol.2003 , pp. 2003
    • Goh, A.1    Ngo, D.C.L.2
  • 18
    • 33645656960 scopus 로고    scopus 로고
    • Safety of templates in biometric person authentication using error-correcting code," in Security, Steganography, and Watermarking of Multimedia Contents VIII
    • T. Ohki, S. Akatsuka, and N. Komatsu, "Safety of templates in biometric person authentication using error-correcting code," in Security, Steganography, and Watermarking of Multimedia Contents VIII, Proc. SPIE, (2006).
    • (2006) Proc. SPIE
    • Ohki, T.1    Akatsuka, S.2    Komatsu, N.3
  • 19
    • 8844277754 scopus 로고    scopus 로고
    • Privacy protected biometric templates: Acoustic ear identification
    • P. Tuyls, E. Verbitsky, T. Ignatenko, D. Schobben, and T. H. Akkermans, "Privacy protected biometric templates: Acoustic ear identification," in Proc. SPIE 5404, 176-182 (2004).
    • (2004) Proc. SPIE , vol.5404 , pp. 176-182
    • Tuyls, P.1    Verbitsky, E.2    Ignatenko, T.3    Schobben, D.4    Akkermans, T.H.5
  • 23
    • 2942592700 scopus 로고    scopus 로고
    • Handwriting: Feature correlation analysis for biometric hashes
    • Special issue on Biometric Signal Process.
    • C. Vielhauer and R. Steinmetz, "Handwriting: Feature correlation analysis for biometric hashes," EURASIP J. Appl. Signal Process. 2004(4), Special issue on Biometric Signal Process., 542-558 (2004).
    • (2004) EURASIP J. Appl. Signal Process , vol.2004 , Issue.4 , pp. 542-558
    • Vielhauer, C.1    Steinmetz, R.2
  • 24
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • DOI 10.1108/09685220210436949
    • H. Feng and C. W. Chan, "Private key generation from on-line handwritten signatures," Infor. Management and Computer Security, pp. 159-164 (2002). (Pubitemid 35010220)
    • (2002) Information Management and Computer Security , vol.10 , Issue.4 , pp. 159-164
    • Feng, H.1    Wah, C.C.2
  • 30
    • 50249183581 scopus 로고    scopus 로고
    • Biometric signature authentication using radon transform-based watermarking techniques
    • E. Maiorana, P. Campisi, and A. Neri, "Biometric signature authentication using radon transform-based watermarking techniques," in Proc. IEEE Biometric Symposium (2007).
    • (2007) Proc. IEEE Biometric Symposium
    • Maiorana, E.1    Campisi, P.2    Neri, A.3
  • 31
    • 0033601655 scopus 로고    scopus 로고
    • Verification watermarks on fingerprint recognition and retrieval
    • S. Pankanti and M. M. Yeung, "Verification watermarks on fingerprint recognition and retrieval," in Proc. SPIE 3657, 66-78 (1999).
    • (1999) Proc. SPIE , vol.3657 , pp. 66-78
    • Pankanti, S.1    Yeung, M.M.2
  • 32
  • 36
    • 0036833279 scopus 로고    scopus 로고
    • Off-line signature verification using structural feature correspondence
    • DOI 10.1016/S0031-3203(01)00222-9, PII S0031320301002229
    • K. Huang and H. Yan, "Off-line signature verification using structural feature correspondence," Pattern Recogn. 35, 2467-2477 (2002). (Pubitemid 34961617)
    • (2002) Pattern Recognition , vol.35 , Issue.11 , pp. 2467-2477
    • Huang, K.1    Yan, H.2
  • 37
    • 0021617121 scopus 로고
    • On-line handwritten signature recognition based on data analysis and clustering
    • G. Lorette and R. Plamondon, "On-line handwritten signature recognition based on data analysis and clustering," in Proc. 7th ICPR (2), pp. 1284-1287 (1984). (Pubitemid 15516987)
    • (1984) Proceedings - International Conference on Pattern Recognition , vol.2 , pp. 1284-1287
    • Lorette, G.1
  • 41
    • 84875595066 scopus 로고
    • Standards Publication 180-1, Security Hash Standard
    • Federal Information Processing (FIP) Standards Publication 180-1, Security Hash Standard (1995(; http://www.itl.nist.gov/fipspubs/fip180-1.htm.
    • (1995) Federal Information Processing (FIP)
  • 43
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • X. Wang, Y. L. Yin, and H. Yu, "Finding collisions in the full SHA-1," in Proc. CRYPTO (2005).
    • (2005) Proc. CRYPTO
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 44
    • 38049106551 scopus 로고    scopus 로고
    • Finding SHA-1 characteristics: General results and applications
    • Springer
    • C. De Cannire and C. Rechberger, "Finding SHA-1 characteristics: General results and applications," Advances in Cryptology, Proc. ASIACRYPT 2006, Springer, 4284 (2006).
    • (2006) Advances in Cryptology, Proc. ASIACRYPT , vol.2006 , pp. 4284
    • De Cannire, C.1    Rechberger, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.