메뉴 건너뛰기




Volumn 2009, Issue , 2009, Pages

Biometric quantization through detection rate optimized bit allocation

Author keywords

[No Author keywords available]

Indexed keywords

BINARY STRING; BIOMETRIC TEMPLATE; BIT ALLOCATION; DATA SYSTEMS; DETECTION RATES; DISCRIMINATIVE FEATURES; FACE DATABASE; FINGERPRINT DATABASE; FUZZY COMMITMENT; FUZZY EXTRACTORS; GREEDY SEARCH; OPTIMAL QUANTIZATION; SECURE SKETCH; STORAGE CAPABILITY; TEMPLATE PROTECTION; UNIVERSAL METHOD;

EID: 68949091963     PISSN: 16876172     EISSN: 16876180     Source Type: Journal    
DOI: 10.1155/2009/784834     Document Type: Article
Times cited : (41)

References (21)
  • 2
    • 0033281339 scopus 로고    scopus 로고
    • Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS 99) November 1999 Singapore
    • Juels A., Wattenberg M., A fuzzy commitment scheme Proceedings of the 6th ACM Conference on Computer and Communications Security (CCS 99) November 1999 Singapore 28 36
    • A fuzzy commitment scheme , pp. 28-36
    • Juels, A.1    Wattenberg, M.2
  • 3
    • 35048865463 scopus 로고    scopus 로고
    • Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques May 2004 Interlaken, Switzerland Lecture Notes in Computer Science
    • Dodis Y., Reyzin L., Smith A., Fuzzy extractors: how to generate strong keys from biometrics and other noisy data 3027 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques May 2004 Interlaken, Switzerland 523 540 Lecture Notes in Computer Science
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 4
    • 34748924251 scopus 로고    scopus 로고
    • Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 07) March 2007 Singapore
    • Buhan I., Doumen J., Hartel P., Veldhuis R. N. J., Fuzzy extractors for continuous distributions Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS 07) March 2007 Singapore 353 355
    • Fuzzy extractors for continuous distributions , pp. 353-355
    • Buhan, I.1    Doumen, J.2    Hartel, P.3    Veldhuis, R.N.J.4
  • 5
    • 37849020496 scopus 로고    scopus 로고
    • Proceedings of the 2nd International Conference on Advances in Biometrics (ICB 07) August 2007 Seoul, Korea
    • Chang E.-C., Roy S., Robust extraction of secret bits from minutiae Proceedings of the 2nd International Conference on Advances in Biometrics (ICB 07) August 2007 Seoul, Korea 750 759
    • Robust extraction of secret bits from minutiae , pp. 750-759
    • Chang, E.-C.1    Roy, S.2
  • 6
    • 35248839355 scopus 로고    scopus 로고
    • Proceedings of the 4th International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA 03) June 2003 Guildford, UK Lecture Notes in Computer Science
    • Linnartz J.-P., Tuyls P., New shielding functions to enhance privacy and prevent misuse of biometrie templates 2688 Proceedings of the 4th International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA 03) June 2003 Guildford, UK 393 402 Lecture Notes in Computer Science
    • New shielding functions to enhance privacy and prevent misuse of biometrie templates , vol.2688 , pp. 393-402
    • Linnartz, J.-P.1    Tuyls, P.2
  • 12
    • 33745164328 scopus 로고    scopus 로고
    • Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 05) June 2005 San Diego, Calif, USA
    • Phillips P. J., Flynn P. J., Scruggs T., Overview of the face recognition grand challenge 1 Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 05) June 2005 San Diego, Calif, USA 947 954
    • Overview of the face recognition grand challenge , vol.1 , pp. 947-954
    • Phillips, P.J.1    Flynn, P.J.2    Scruggs, T.3
  • 14
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • Feng H., Wah C. C., Private key generation from on-line handwritten signatures Information Management Computer Security 2002 10 4 159 164
    • (2002) Information Management Computer Security , vol.10 , Issue.4 , pp. 159-164
    • Feng, H.1    Wah, C.C.2
  • 15
    • 11244340682 scopus 로고    scopus 로고
    • Proceedings of IEEE International Conference on Multimedia and Expo (ICME 04) June 2004 Taipei, Taiwan
    • Chang Y.-J., Zhang W., Chen T., Biometrics-based cryptographic key generation 3 Proceedings of IEEE International Conference on Multimedia and Expo (ICME 04) June 2004 Taipei, Taiwan 2203 2206
    • Biometrics-based cryptographic key generation , vol.3 , pp. 2203-2206
    • Chang, Y.-J.1    Zhang, W.2    Chen, T.3
  • 17
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
    • Teoh A. B. J., Goh A., Ngo D. C. L., Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs IEEE Transactions on Pattern Analysis and Machine Intelligence 2006 28 12 1892 1901
    • (2006) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.B.J.1    Goh, A.2    Ngo, D.C.L.3
  • 20
    • 1842809903 scopus 로고    scopus 로고
    • Distance measures for PCA-based face recognition
    • Perlibakas V., Distance measures for PCA-based face recognition Pattern Recognition Letters 2004 25 6 711 724
    • (2004) Pattern Recognition Letters , vol.25 , Issue.6 , pp. 711-724
    • Perlibakas, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.