-
1
-
-
0003357703
-
Fingerprint classification and matching
-
A. Bovic Ed, Academic Press, New York, April
-
A.K. Jain, S. Pankanti, Fingerprint classification and matching, in: A. Bovic (Ed.), Image and Video Processing Handbook, Academic Press, New York, April 2000.
-
(2000)
Image and Video Processing Handbook
-
-
Jain, A.K.1
Pankanti, S.2
-
2
-
-
43949116287
-
-
A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security, EURASIP Journal on Advances in Signal Processing, January 2008 (special issue on Advanced Signal Processing and Pattern Recognition Methods for Biometrics).
-
A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security, EURASIP Journal on Advances in Signal Processing, January 2008 (special issue on Advanced Signal Processing and Pattern Recognition Methods for Biometrics).
-
-
-
-
3
-
-
33751571930
-
Hiding a face in a fingerprint image
-
A. Jain, U. Uludag, R. Hsu, Hiding a face in a fingerprint image, in: Proceedings of International Conference on Pattern Recognition, 2002, pp. 52-54.
-
(2002)
Proceedings of International Conference on Pattern Recognition
, pp. 52-54
-
-
Jain, A.1
Uludag, U.2
Hsu, R.3
-
4
-
-
36849070972
-
Three measures for secure palmprint identification
-
Kong A., Zhang D., and Kamel M. Three measures for secure palmprint identification. Pattern Recognition 41 (2008) 1329-1337
-
(2008)
Pattern Recognition
, vol.41
, pp. 1329-1337
-
-
Kong, A.1
Zhang, D.2
Kamel, M.3
-
5
-
-
85024264226
-
The uses and abuses of biometrics
-
Schneier B. The uses and abuses of biometrics. Communications of the ACM 42 8 (August 1999) 136
-
(1999)
Communications of the ACM
, vol.42
, Issue.8
, pp. 136
-
-
Schneier, B.1
-
6
-
-
0036887598
-
Robust watermarking of fingerprint images
-
Gunsel B., Uludag U., and Tekalp A.M. Robust watermarking of fingerprint images. Pattern Recognition 35 12 (December 2002) 2739-2747
-
(2002)
Pattern Recognition
, vol.35
, Issue.12
, pp. 2739-2747
-
-
Gunsel, B.1
Uludag, U.2
Tekalp, A.M.3
-
7
-
-
48349110192
-
A preliminary study on biometric watermarking for offline handwritten signature
-
C.Y. Low, A.B.J. Teoh, C. Tee, A preliminary study on biometric watermarking for offline handwritten signature, in: Proceedings of IEEE International Conference on Telecommunications, 2007, pp. 691-695.
-
(2007)
Proceedings of IEEE International Conference on Telecommunications
, pp. 691-695
-
-
Low, C.Y.1
Teoh, A.B.J.2
Tee, C.3
-
8
-
-
33646838963
-
Performance evaluation of watermarking techniques for secure multimodal biometric systems
-
Proceedings of CIS
-
D. Moon, T. Kim, S. Juug, Y. Chung, K. Moon, D. Ahn, S. Kim, Performance evaluation of watermarking techniques for secure multimodal biometric systems, in: Proceedings of CIS 2005, Lecture Notes in Artificial Intelligence, vol. 3802, 2005, pp. 635-642.
-
(2005)
Lecture Notes in Artificial Intelligence
, vol.3802
, pp. 635-642
-
-
Moon, D.1
Kim, T.2
Juug, S.3
Chung, Y.4
Moon, K.5
Ahn, D.6
Kim, S.7
-
9
-
-
33646721153
-
A secure biometric verification scheme
-
Proceedings of International Workshop on Biometric Recognition Systems IWBRC
-
D. Sun, Q. Li, T. Liu, B. He, Z. Qie, A secure biometric verification scheme, in: Proceedings of International Workshop on Biometric Recognition Systems IWBRC' 2005, Lecture Notes in Computer Science, vol. 3781, 2005, pp. 233-240.
-
(2005)
Lecture Notes in Computer Science
, vol.3781
, pp. 233-240
-
-
Sun, D.1
Li, Q.2
Liu, T.3
He, B.4
Qie, Z.5
-
10
-
-
50249183581
-
Biometric signature authentication using radon transform based watermarking techniques
-
E. Maiorana, P. Campisi, A. Neri, Biometric signature authentication using radon transform based watermarking techniques, in: IEEE Conference, 2007.
-
(2007)
IEEE Conference
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
11
-
-
34548561714
-
Human visual system based adaptive digital image watermarking
-
Qi H., Zheng D., and Zhao J. Human visual system based adaptive digital image watermarking. Signal Processing 88 (2008) 174-188
-
(2008)
Signal Processing
, vol.88
, pp. 174-188
-
-
Qi, H.1
Zheng, D.2
Zhao, J.3
-
12
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Cox I.J., Killian J., Leighton T., and Shamoon T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6 12 (December 1997) 1673-1687
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Killian, J.2
Leighton, T.3
Shamoon, T.4
-
14
-
-
33744956790
-
Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication
-
International Conference on Biometrics ICB
-
J. Lim, H. Lee, S. Lee, J. Kim, Invertible watermarking algorithm with detecting locations of malicious manipulation for biometric image authentication, in: International Conference on Biometrics ICB'2006, Lecture Notes in Computer Science, vol. 3832, 2005, pp.763-769.
-
(2005)
Lecture Notes in Computer Science
, vol.3832
, pp. 763-769
-
-
Lim, J.1
Lee, H.2
Lee, S.3
Kim, J.4
-
16
-
-
0034443602
-
New fragile authentication watermark for Images
-
Vancouver, September
-
J. Fridrich, M. Goljan, A.C. Baldoza, New fragile authentication watermark for Images, in: Proceedings of the International Conference on Image Processing ICIP'2000, Vancouver, September 2000.
-
(2000)
Proceedings of the International Conference on Image Processing ICIP
-
-
Fridrich, J.1
Goljan, M.2
Baldoza, A.C.3
-
17
-
-
0036030626
-
-
J. Fridrich, Security of fragile authentication watermarks with localization, in: Proceedings SPIE Photonic West, 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, January 2002, pp. 691-700
-
J. Fridrich, Security of fragile authentication watermarks with localization, in: Proceedings SPIE Photonic West, vol. 4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents, January 2002, pp. 691-700
-
-
-
-
18
-
-
38049093452
-
A study on iris feature watermarking on face data
-
Proceedings of the ICANNGA
-
K.R. Park, D.S. Jeong, B. J. Kang, E. C. Lee, A study on iris feature watermarking on face data, in: Proceedings of the ICANNGA 2007, Lecture Notes in Computer Science, vol. 4432, 2007, pp. 415-423.
-
(2007)
Lecture Notes in Computer Science
, vol.4432
, pp. 415-423
-
-
Park, K.R.1
Jeong, D.S.2
Kang, B.J.3
Lee, E.C.4
-
19
-
-
33845586417
-
Protecting fingerprint data using watermarking
-
K. Zebbiche, L. Ghouti, F. Khelifi, A. Bouridane, Protecting fingerprint data using watermarking, in: Proceedings of First NASA/ESA Conference on Adaptive Hardware and Systems, 2006.
-
(2006)
Proceedings of First NASA/ESA Conference on Adaptive Hardware and Systems
-
-
Zebbiche, K.1
Ghouti, L.2
Khelifi, F.3
Bouridane, A.4
-
20
-
-
48149100935
-
Dual watermark for image tamper detection and recovery
-
Lee T.-Y., and Lin S.D. Dual watermark for image tamper detection and recovery. Pattern Recognition 41 (2008) 3497-3506
-
(2008)
Pattern Recognition
, vol.41
, pp. 3497-3506
-
-
Lee, T.-Y.1
Lin, S.D.2
-
21
-
-
0036031504
-
Biometric Authentication for ID cards with hologram watermarks
-
SPIE
-
C.F. Lucilla, M. Astrid, F. Markus, V. Claus, S. Ralf, D.J. Edward, Biometric Authentication for ID cards with hologram watermarks, in: Proceedings of Security and Watermarking of Multimedia Contents, SPIE, vol. 4675, 2002, pp. 629-640.
-
(2002)
Proceedings of Security and Watermarking of Multimedia Contents
, vol.4675
, pp. 629-640
-
-
Lucilla, C.F.1
Astrid, M.2
Markus, F.3
Claus, V.4
Ralf, S.5
Edward, D.J.6
-
22
-
-
0033701078
-
The watermark copy attack
-
January
-
M. Kutter, S. Voloshynovskiy, A. Herrigel, The watermark copy attack, in: Proceedings of SPIE: Security and Watermarking of Mutimedia Content II, Vol. 3971, January 2000.
-
(2000)
Proceedings of SPIE: Security and Watermarking of Mutimedia Content II
, vol.3971
-
-
Kutter, M.1
Voloshynovskiy, S.2
Herrigel, A.3
-
25
-
-
33947355400
-
Robust biometric image watermarking for fingerprint and face template protection
-
Vatsa M., Singh R., Noore A., Houck M.M., and Morris K. Robust biometric image watermarking for fingerprint and face template protection. IEICE Electronics Express 3 2 (2006) 23-28
-
(2006)
IEICE Electronics Express
, vol.3
, Issue.2
, pp. 23-28
-
-
Vatsa, M.1
Singh, R.2
Noore, A.3
Houck, M.M.4
Morris, K.5
-
26
-
-
15744406086
-
Digital watermarking based secure multimodal biometric system
-
M. Vatsa, R. Singh, P. Mitra, A. Noore, Digital watermarking based secure multimodal biometric system, in: Proceedings of IEEE International Conference on Systems, Man, and Cynernetics, 2004.
-
(2004)
Proceedings of IEEE International Conference on Systems, Man, and Cynernetics
-
-
Vatsa, M.1
Singh, R.2
Mitra, P.3
Noore, A.4
-
27
-
-
33745290530
-
A robust-fragile dual watermarking system in the DCT domain
-
Proceedings of the Knowledge based Intelligent Information and Engineering Systems KES
-
M. Habib, S. Sarhan, L. Rajab, A robust-fragile dual watermarking system in the DCT domain, in: Proceedings of the Knowledge based Intelligent Information and Engineering Systems KES 2005, Lecture Notes in Artificial Intelligence, vol. 3682, 2005, pp. 548-553.
-
(2005)
Lecture Notes in Artificial Intelligence
, vol.3682
, pp. 548-553
-
-
Habib, M.1
Sarhan, S.2
Rajab, L.3
-
28
-
-
27144539209
-
Protecting biometric data for personal identification
-
M. K. Khan, J. Zhang, L. Tian, Protecting biometric data for personal identification, in: Lecture Notes in Computer Science, vol. 3338, 2004, pp. 629-638.
-
(2004)
Lecture Notes in Computer Science
, vol.3338
, pp. 629-638
-
-
Khan, M.K.1
Zhang, J.2
Tian, L.3
-
29
-
-
34250863233
-
Speaker identification security improvement by means of speech watermarking
-
Zanuy M.F., hagmuller M., and Kubin G. Speaker identification security improvement by means of speech watermarking. Pattern Recognition 40 (2007) 3027-3034
-
(2007)
Pattern Recognition
, vol.40
, pp. 3027-3034
-
-
Zanuy, M.F.1
hagmuller, M.2
Kubin, G.3
-
31
-
-
0032117545
-
Invisible watermarking for image verification
-
Yeung M., and Mintzer F. Invisible watermarking for image verification. Journal of Electronic Imaging 7 3 (July 1998) 578-591
-
(1998)
Journal of Electronic Imaging
, vol.7
, Issue.3
, pp. 578-591
-
-
Yeung, M.1
Mintzer, F.2
-
32
-
-
82055208335
-
-
N.K. Ratha, J.H. Connell, R.M. Bolle, An analysis of minutiae matching strength, in: Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication, June 2001, pp. 223-228.
-
N.K. Ratha, J.H. Connell, R.M. Bolle, An analysis of minutiae matching strength, in: Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication, June 2001, pp. 223-228.
-
-
-
-
33
-
-
37849021059
-
Protecting biometric templates with image watermarking techniques
-
Proceedings of International Conference on Biometrics ICB
-
N. Komninos, T. Dimitriou, Protecting biometric templates with image watermarking techniques, in: Proceedings of International Conference on Biometrics ICB'2007, Lecture Notes in Computer Science, vol. 4642, 2007, pp. 114-123.
-
(2007)
Lecture Notes in Computer Science
, vol.4642
, pp. 114-123
-
-
Komninos, N.1
Dimitriou, T.2
-
35
-
-
85019343450
-
Secure data hiding in wavelet compressed fingerprint images
-
N.K. Ratha, J.H. Connell, R.M. Bolle, 2000. Secure data hiding in wavelet compressed fingerprint images, in: Proceedings of ACM Multimedia, October 2007, pp. 127-130.
-
(2000)
Proceedings of ACM Multimedia, October 2007
, pp. 127-130
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
36
-
-
52249112865
-
A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security Applications
-
S. Ahmad, Z. M. Lu, A joint biometrics and watermarking based framework for fingerprinting, copyright protection, proof of ownership, and security Applications, in: IEEE International Conference of Computational Intelligence and Security Workshops, 2007.
-
(2007)
IEEE International Conference of Computational Intelligence and Security Workshops
-
-
Ahmad, S.1
Lu, Z.M.2
-
37
-
-
0033601655
-
Verification watermarks on fingerprint recognition and retrieval
-
S. Pankanti, M.M. Yeung, Verification watermarks on fingerprint recognition and retrieval, in: Proceedings of SPIE, vol. 3657, 1999, pp. 66-78.
-
(1999)
Proceedings of SPIE
, vol.3657
, pp. 66-78
-
-
Pankanti, S.1
Yeung, M.M.2
-
38
-
-
84947911018
-
A stochastic approach to content adaptive digital image watermarking
-
Proceedings of International Workshop on Information Hiding
-
S. Voloshynovskiy, A. Herrigel, N. Baumgaertner, T. Pun, A stochastic approach to content adaptive digital image watermarking, in: Proceedings of International Workshop on Information Hiding, Lecture Notes in Computer Science, vol. 1768, 1999, pp. 212-236.
-
(1999)
Lecture Notes in Computer Science
, vol.1768
, pp. 212-236
-
-
Voloshynovskiy, S.1
Herrigel, A.2
Baumgaertner, N.3
Pun, T.4
-
39
-
-
67651101450
-
Biometric watermarking authentication with multiple verification rule
-
T. Satonaka, Biometric watermarking authentication with multiple verification rule, in: IEEE Proceedings, 2002.
-
(2002)
IEEE Proceedings
-
-
Satonaka, T.1
-
40
-
-
0003437939
-
Verification watermarks on fingerprint recognition and retrieval
-
Yeung M., and Pankanti S. Verification watermarks on fingerprint recognition and retrieval. Journal of Electronic Imaging 9 4 (2000) 468-476
-
(2000)
Journal of Electronic Imaging
, vol.9
, Issue.4
, pp. 468-476
-
-
Yeung, M.1
Pankanti, S.2
|