-
1
-
-
43949116287
-
Biometric Template Security
-
Article ID 579416 17 pages
-
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric Template Security. EURASIP Journal on Advances in Signal Processing 2008, Article ID 579416, 17 pages (2008)
-
(2008)
EURASIP Journal on Advances in Signal Processing 2008
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
2
-
-
8344236959
-
-
McGraw-Hill New York
-
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.K.V.: Biometric Encryption, ICSA Guide to Cryptography. McGraw-Hill, New York (1999), http://www.bioscrypt.com/assets/Biometric-Encryption.pdf
-
(1999)
Biometric Encryption ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
3
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number. Pattern Recognition 37, 2245-2255 (2004)
-
(2004)
Pattern Recognition
, vol.37
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
4
-
-
33750533142
-
An improved biohashing for human authentication
-
Lumini, A., Nanni, L.: An Improved BioHashing for Human Authentication. Pattern Recognition 40, 1057-1065 (2007)
-
(2007)
Pattern Recognition
, vol.40
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
5
-
-
0036350106
-
A Fuzzy Vault Scheme
-
Lapidoth, A., Teletar, E. (eds.)
-
Juels, A., Sudan, M.: A Fuzzy Vault Scheme. In: Lapidoth, A., Teletar, E. (eds.) Proceeding of IEEE Int. Symp. Information Theory, p. 408 (2002)
-
(2002)
Proceeding of IEEE Int. Symp. Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
6
-
-
34547103253
-
Alignment-Free cancelable fingerprint templates based on local minutiae information
-
Lee, C., Choi, J.Y., Toh, K.A., Lee, S.: Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information. IEEE Transactions on Systems, Man, and Cybernetics, Part B 37(4), 980-992 (2007)
-
(2007)
IEEE Transactions on Systems Man and Cybernetics Part B.
, vol.37
, Issue.4
, pp. 980-992
-
-
Lee, C.1
Choi, J.Y.2
Toh, K.A.3
Lee, S.4
-
7
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure Smartcard-based Fingerprint Authentication. In: Proceeding of ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, pp. 45-52 (2003)
-
(2003)
Proceeding of ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
8
-
-
26444525625
-
Fuzzy vault for fingerprints
-
Rye Town, USA
-
Uludag, U., Pankanti, S., Jain, A.K.: Fuzzy Vault for Fingerprints. In: Proceedings of Fifth International Conference on AVBPA, Rye Town, USA, pp. 310-319 (2005)
-
(2005)
Proceedings of Fifth International Conference on AVBPA
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
10
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
Nandakumar, K., Jain, A.K., Pankanti, S.: Fingerprint-Based Fuzzy Vault: Implementation and Performance. IEEE Transactions on Information Forensics and Security 2(4), 744-757 (2007)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
11
-
-
37849009414
-
Hardening fingerprint fuzzy vault using password
-
Lee, S.-W., Li, S.Z. (eds.), Springer, Heidelberg
-
Nandakumar, K., Nagar, A., Jain, A.K.: Hardening Fingerprint Fuzzy Vault Using Password. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol.4642, pp. 927-937. Springer, Heidelberg (2007)
-
(2007)
ICB 2007. LNCS
, vol.4642
, pp. 927-937
-
-
Nandakumar, K.1
Nagar, A.2
Jain, A.K.3
-
12
-
-
34247366845
-
Finding the original point set hidden among chaff
-
ACM Press, New York
-
Chang, E.C., Shen, R., Teo, F.W.: Finding the Original Point Set Hidden among Chaff. In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pp. 182-188. ACM Press, New York (2006)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 182-188
-
-
Chang, E.C.1
Shen, R.2
Teo, F.W.3
-
13
-
-
42949167255
-
Realization of correlation attack against the fuzzy vault scheme
-
Kholmatov, A., Yanikoglu, B.: Realization of Correlation Attack Against the Fuzzy Vault Scheme. In: Proceedings of 2008 SPIE / Biometrics, Security, Forensics, Steganography, and Watermarking of Multimedia Contents, vol.7, pp. 68190O-68190O-7 (2008)
-
(2008)
Proceedings of 2008 SPIE / Biometrics, Security, Forensics, Steganography, and Watermarking of Multimedia Contents
, vol.7
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
14
-
-
40349095012
-
Analysis and problems on fuzzy vault scheme
-
Li, Q., Liu, Z., Niu, X.: Analysis and Problems on Fuzzy Vault Scheme. In: Proceedings of 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp. 244-250 (2006)
-
(2006)
Proceedings of 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 244-250
-
-
Li, Q.1
Liu, Z.2
Niu, X.3
-
17
-
-
69949147247
-
Topological structrue based fuzzy vault alignment method
-
(to appear)
-
Li, J., Tian, J., Yang, X., Shi, P., Li, P.: Topological Structrue based Fuzzy Vault Alignment Method. In: International Conference of Pattern Recognition (to appear) (2008)
-
(2008)
International Conference of Pattern Recognition
-
-
Li, J.1
Tian, J.2
Yang, X.3
Shi, P.4
Li, P.5
|