-
1
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Springer-Verlag
-
Dodis, Y., Reyzin, L., and Smith, A., "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, " in [Eurocrypt, 04], LNCS 3027, 523-540, Springer-Verlag (2004).
-
(2004)
Eurocrypt, 04, LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
2
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
September
-
Sutcu, Y., Li, Q., and Memon, N., "Protecting biometric templates with sketch: Theory and practice, " IEEE Transactions on Information Forensics and Security 2, 503-512 (September 2007)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
4
-
-
77649250983
-
Secure sketch for biometric templates
-
Springer-Verlag, Shanghai, China, December
-
Li, Q., Sutcu, Y., and Memon, N., "Secure sketch for biometric templates, " in [Asiacrypt'06, Shanghai, China], LNCS 4284, Springer-Verlag, Shanghai, China (December 2006).
-
(2006)
Asiacrypt'06, Shanghai, China, LNCS
, vol.4284
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
5
-
-
69949163121
-
Biometric system security
-
Las Vegas, Nevada, USA, April
-
Vetro, A. and Memon, N., "Biometric system security." Tutorial presented at IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, Nevada, USA, April 2008.
-
(2008)
Tutorial presented at IEEE International Conference on Acoustics Speech and Signal Processing
-
-
Vetro, A.1
Memon, N.2
-
6
-
-
43949116287
-
Biometric template security
-
Jain, A. K., Nandakumar, K., and Nagar, A., "Biometric template security, " EURASIP Journal on Advances in Signal Processing, Special Issue on Pattern Recognition Methods for Biometrics (2008).
-
(2008)
EURASIP Journal on Advances in Signal Processing, Special Issue on Pattern Recognition Methods for Biometrics
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
7
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha, N., Connell, J., and Bolle, R., "Enhancing security and privacy in biometrics-based authentication systems, " IBM Systems Journal 40(3), 614-634 (2001).
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
8
-
-
0032224440
-
Biometric encryption using image processing
-
Soutar, C., Roberge, D., Stojanov, S., Gilroy, R., and Kumar, B. V., "Biometric encryption using image processing, " in [SPIE, Optical Security and Counterfeit Deterrence Techniques II], 3314 (1998).
-
(1998)
SPIE, Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.3
Gilroy, R.4
Kumar, B.V.5
-
9
-
-
26444448320
-
Cancelable key-based fingerprint templates
-
Ang, R., Safavi-Naini, R., and McAven, L., "Cancelable key-based fingerprint templates, " in [ACISP], LNCS 3574, 242-252 (2005).
-
(2005)
ACISP, LNCS
, vol.3574
, pp. 242-252
-
-
Ang, R.1
Safavi-Naini, R.2
McAven, L.3
-
10
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
Teoh, A., Gho, A., and Ngo, D., "Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs, " IEEE Transactions on Pattern Analysis and Machine Intelligence 28(12), 1892-1901 (2006).
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.1
Gho, A.2
Ngo, D.3
-
11
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
Savvides, M., Kumar, B. V., and Khosla, P., "Cancelable biometric filters for face recognition, " Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004 3, 922-925 (2004).
-
(2004)
Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.V.2
Khosla, P.3
-
12
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Ratha, N. K., Chikkerur, S., Connell, J. H., and Bolle, R. M., "Generating cancelable fingerprint templates, " IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 561-572 (2007).
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
13
-
-
67549140582
-
Cancelable biometrics for hmm based signature recognition
-
October
-
Maiorana, E., Campisi, P., Ortega-Garcia, J., and Neri, A., "Cancelable biometrics for hmm based signature recognition, " in [Proceedings of the IEEE Second International Conference on Biometrics: Theory, Applications and Systems, (BTAS 2008)], (October 2008).
-
(2008)
Proceedings of the IEEE Second International Conference on Biometrics: Theory, Applications and Systems, (BTAS 2008)
-
-
Maiorana, E.1
Campisi, P.2
Ortega-Garcia, J.3
Neri, A.4
-
14
-
-
34948865766
-
Revocable fingerprint biotokens: Accuracy and security analysis
-
Boult, T., Scheirer, W., and Woodwork, R., "Revocable fingerprint biotokens: Accuracy and security analysis, " in [IEEE Conf. Computer Vison and Pattern Recognition (CVPR)], (2007).
-
(2007)
IEEE Conf., Computer Vison and Pattern Recognition (CVPR)
-
-
Boult, T.1
Scheirer, W.2
Woodwork, R.3
-
15
-
-
26444507172
-
Practical biometric authentication with template protection
-
Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A., and Veldhuis, R., "Practical biometric authentication with template protection, " in [AVBPA], 436-446 (2005).
-
(2005)
AVBPA
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.4
Bazen, A.5
Veldhuis, R.6
-
16
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
Kevenaar, T., Schrijen, G., der Veen, M. V., Akkermans, A., and Zuo, F., "Face recognition with renewable and privacy preserving binary templates, " Fourth IEEE Workshop on Automatic Identification Advanced Technologies, 21-26 (2005).
-
(2005)
Fourth IEEE Workshop on Automatic Identification Advanced Technologies
, pp. 21-26
-
-
Kevenaar, T.1
Schrijen, G.2
Der Veen, M.V.3
Akkermans, A.4
Zuo, F.5
-
17
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
Draper, S., Khisti, A., Martinian, E., Vetro, A., and Yedidia, J., "Using distributed source coding to secure fingerprint biometrics, " in [IEEE Conf. on Acoustics, Speech and Signal Processing (ICASSP)], (2007).
-
(2007)
IEEE Conf. on Acoustics, Speech and Signal Processing (ICASSP)
-
-
Draper, S.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.5
-
18
-
-
52349098088
-
Feature extraction for a slepian-wolf biometric system using ldpc codes
-
Sutcu, Y., Rane, S., Yedidia, J., Draper, S., and Vetro, A., "Feature extraction for a slepian-wolf biometric system using ldpc codes, " in [2007 IEEE International Symposium on Information Theory, 6-11 July 2008, Toronto, Ontario, CA]
-
2007 IEEE International Symposium on Information Theory 6-11 July 2008, Toronto, Ontario, CA
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.3
Draper, S.4
Vetro, A.5
-
19
-
-
34548066409
-
Hiding secret points amidst chaff
-
Chang, E.-C. and Li, Q., "Hiding secret points amidst chaff, " in [Eurocrypt], (2006).
-
(2006)
Eurocrypt
-
-
Chang, E.-C.1
Li, Q.2
-
22
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Linnartz, J.-P. M. G. and Tuyls, P., "New shielding functions to enhance privacy and prevent misuse of biometric templates, " in [AVBPA 2003], 393-402 (2003).
-
(2003)
AVBPA 2003
, pp. 393-402
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
23
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
Tuyls, P. and Goseling, J., "Capacity and examples of template-protecting biometric authentication systems, " in [ECCV Workshop BioAW], 158-170 (2004).
-
(2004)
ECCV Workshop BioAW
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
24
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
Buhan, I., Doumen, J., Hartel, P. H., and Veldhuis, R. N. J., "Fuzzy extractors for continuous distributions., " in [ASIACCS]
-
ASIACCS
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
26
-
-
34548064425
-
Secure remote authentication using biometric data
-
Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R., and Smith, A., "Secure remote authentication using biometric data, " in [Eurocrypt], (2005).
-
(2005)
Eurocrypt
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
27
-
-
51849101651
-
Fuzzy extractors for asymmetric biometric representations
-
June
-
Li, Q., Guo, M., and Chang, E.-C., "Fuzzy extractors for asymmetric biometric representations, " in [In IEEE Computer Society Workshop on Biometrics, June 2008], (2008).
-
(2008)
IEEE Computer Society Workshop on Biometrics 2008
-
-
Li, Q.1
Guo, M.2
Chang, E.-C.3
-
30
-
-
8344273612
-
Personalised cryptographic key generation based on facehashing
-
Teoh, A., Ngo, D., and Goh, A., "Personalised cryptographic key generation based on facehashing, " Computers and Security 23, 606-614 (2004).
-
(2004)
Computers and Security
, vol.23
, pp. 606-614
-
-
Teoh, A.1
Ngo, D.2
Goh, A.3
-
31
-
-
19744373363
-
Cancellable biometerics featuring with tokenized random number
-
Teoh, A. B. and Ngo, D. C., "Cancellable biometerics featuring with tokenized random number, " Pattern Recognition Letters 26, 1454-1460 (2005).
-
(2005)
Pattern Recognition Letters
, vol.26
, pp. 1454-1460
-
-
Teoh, A.B.1
Ngo, D.C.2
-
33
-
-
0026065565
-
Eigenfaces for recognition
-
Turk, M. and Pentland, A., "Eigenfaces for recognition, " J. Cogn. Neurosci. 3, 72-86 (1991).
-
(1991)
J. Cogn. Neurosci.
, vol.3
, pp. 72-86
-
-
Turk, M.1
Pentland, A.2
|