메뉴 건너뛰기




Volumn 5558 LNCS, Issue , 2009, Pages 376-385

Near infrared face based biometric key binding

Author keywords

BioHash; Biometric encryption; ECC; Key Binding; NIR face

Indexed keywords

BIOHASH; BIOMETRIC ENCRYPTION; ECC; KEY BINDING; NIR FACE;

EID: 69949124290     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01793-3_39     Document Type: Conference Paper
Times cited : (39)

References (34)
  • 4
    • 24244467065 scopus 로고
    • December 1993 Included in Technical Report SRI-CSL-94-08, Computer Science Laboratory, SRI International, Menlo Park, California
    • Berson, T., Gong, L., Lomas, T.: Secure, keyed, and collisionful hash functions. December 1993. Included in Technical Report SRI-CSL-94-08, Computer Science Laboratory, SRI International, Menlo Park, California (May 1994
    • (1994) Secure, Keyed, and Collisionful Hash Functions
    • Berson, T.1    Gong, L.2    Lomas, T.3
  • 12
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008)
    • (2008) SIAM J. Comput. , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 14
    • 69949184701 scopus 로고    scopus 로고
    • Making breaking codes: Introduction to cryptology
    • Upper Saddle River
    • Garrett, P.B.: Making, Breaking Codes: Introduction to Cryptology. Prentice Hall PTR, Upper Saddle River (2000)
    • (2000) Prentice Hall PTR.
    • Garrett, P.B.1
  • 16
    • 28144460500 scopus 로고
    • Collisionful keyed hash functions with selectable collisions
    • Gong, L.: Collisionful keyed hash functions with selectable collisions. Inf. Process. Lett. 55(3), 167-170 (1995)
    • (1995) Inf. Process. Lett. , vol.55 , Issue.3 , pp. 167-170
    • Gong, L.1
  • 17
    • 8344273612 scopus 로고    scopus 로고
    • Personalised cryptographic key generation based on facehashing
    • Jin, A.T.B., Ling, D.N.C., Goh, A.: Personalised cryptographic key generation based on facehashing. Computers & Security 23(7), 606-614 (2004)
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 606-614
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 21
    • 33947510451 scopus 로고    scopus 로고
    • Illumination invariant face recognition using near-infrared images
    • DOI 10.1109/TPAMI.2007.1014, Special issue on Biometrics: Progress and Directions
    • Li, S., Chu, R., Liao, S., Zhang, L.: Illumination invariant face recognition using near-infrared images. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 627-639 (2007) (Pubitemid 46464403)
    • (2007) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.29 , Issue.4 , pp. 627-639
    • Li, S.Z.1    Chu, R.F.2    Liao, S.C.3    Zhang, L.4
  • 23
    • 33750533142 scopus 로고    scopus 로고
    • An improved biohashing for human authentication
    • Lumini, A., Nanni, L.: An improved biohashing for human authentication. Pattern Recogn. 40(3), 1057-1065 (2007)
    • (2007) Pattern Recogn. , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 24
    • 0002448405 scopus 로고
    • A public - Key cryptosystem based on algebraic coding theory
    • McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Progress Report 44, 114-116 (1978)
    • (1978) Deep Space Network Progress Report , vol.44 , pp. 114-116
    • McEliece, R.J.1
  • 25
    • 33748422480 scopus 로고    scopus 로고
    • Empirical tests on biohashing
    • Nanni, L., Lumini, A.: Empirical tests on biohashing. Neurocomputing 69(16-18), 2390-2395 (2006)
    • (2006) Neurocomputing , vol.69 , Issue.16-18 , pp. 2390-2395
    • Nanni, L.1    Lumini, A.2
  • 26
    • 37049035583 scopus 로고    scopus 로고
    • Random subspace for an improved biohashing for face authentication
    • Nanni, L., Lumini, A.: Random subspace for an improved biohashing for face authentication. Pattern Recogn. Lett. 29(3), 295-300 (2008)
    • (2008) Pattern Recogn. Lett. , vol.29 , Issue.3 , pp. 295-300
    • Nanni, L.1    Lumini, A.2
  • 31
    • 33747604157 scopus 로고    scopus 로고
    • Remarks on biohash and its mathematical foundation
    • Teoh, A., Jin, B., Connie, T., Ngo, D., Ling, C.: Remarks on biohash and its mathematical foundation. Inf. Process. Lett. 100(4), 145-150 (2006)
    • (2006) Inf. Process. Lett. , vol.100 , Issue.4 , pp. 145-150
    • Teoh, A.1    Jin, B.2    Connie, T.3    Ngo, D.4    Ling, C.5
  • 32
    • 38949203738 scopus 로고    scopus 로고
    • Cancellable biometrics and annotations on biohash
    • Teoh, A.B.J., Kuan, Y.W., Lee, S.: Cancellable biometrics and annotations on biohash. Pattern Recogn. 41(6), 2034-2044 (2008)
    • (2008) Pattern Recogn. , vol.41 , Issue.6 , pp. 2034-2044
    • Teoh, A.B.J.1    Kuan, Y.W.2    Lee, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.