-
4
-
-
24244467065
-
-
December 1993 Included in Technical Report SRI-CSL-94-08, Computer Science Laboratory, SRI International, Menlo Park, California
-
Berson, T., Gong, L., Lomas, T.: Secure, keyed, and collisionful hash functions. December 1993. Included in Technical Report SRI-CSL-94-08, Computer Science Laboratory, SRI International, Menlo Park, California (May 1994
-
(1994)
Secure, Keyed, and Collisionful Hash Functions
-
-
Berson, T.1
Gong, L.2
Lomas, T.3
-
6
-
-
33744964477
-
-
Zhang, D., Jain, A.K. (eds. ICB 2006. LNCS Springer, Heidelberg
-
Cheung, K.H., Kong, A.W.-K., Zhang, D., Kamel, M., You, J.: Revealing the secret of facehashing. In: Zhang, D., Jain, A.K. (eds.) ICB 2006. LNCS, vol.3832, pp. 106-112. Springer, Heidelberg (2006)
-
(2006)
Revealing the Secret of Facehashing
, vol.3832
, pp. 106-112
-
-
Cheung, K.H.1
Kong, A.W.-K.2
Zhang, D.3
Kamel, M.4
You, J.5
-
10
-
-
0031651014
-
On enabling secure applications through offline biometric identification
-
Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through offline biometric identification. In: 1998 IEEE Symposium on Security and Privacy, Proceedings, May 1998, pp. 148-157 (1998)
-
(1998)
IEEE Symposium on Security and Privacy, Proceedings
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
11
-
-
8844234621
-
-
Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the relation of error correction and cryptography to an offline biometric based identification scheme (1999)
-
(1999)
On the Relation of Error Correction and Cryptography to an Offline Biometric Based Identification Scheme
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
12
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008)
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
14
-
-
69949184701
-
Making breaking codes: Introduction to cryptology
-
Upper Saddle River
-
Garrett, P.B.: Making, Breaking Codes: Introduction to Cryptology. Prentice Hall PTR, Upper Saddle River (2000)
-
(2000)
Prentice Hall PTR.
-
-
Garrett, P.B.1
-
15
-
-
35248868841
-
-
Lioy, A., Mazzocchi, D. (eds. CMS 2003. LNCS. Springer, Heidelberg
-
Goh, A., Ling, D.N.C., Goh, A.: Computation of cryptographic keys from face biometrics. In: Lioy, A., Mazzocchi, D. (eds.) CMS 2003. LNCS, vol.2828, pp. 1-13. Springer, Heidelberg (2003)
-
(2003)
Computation of Cryptographic Keys from Face Biometrics
, vol.2828
, pp. 1-13
-
-
Goh, A.1
Ling, D.N.C.2
Goh, A.3
-
16
-
-
28144460500
-
Collisionful keyed hash functions with selectable collisions
-
Gong, L.: Collisionful keyed hash functions with selectable collisions. Inf. Process. Lett. 55(3), 167-170 (1995)
-
(1995)
Inf. Process. Lett.
, vol.55
, Issue.3
, pp. 167-170
-
-
Gong, L.1
-
17
-
-
8344273612
-
Personalised cryptographic key generation based on facehashing
-
Jin, A.T.B., Ling, D.N.C., Goh, A.: Personalised cryptographic key generation based on facehashing. Computers & Security 23(7), 606-614 (2004)
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 606-614
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
21
-
-
33947510451
-
Illumination invariant face recognition using near-infrared images
-
DOI 10.1109/TPAMI.2007.1014, Special issue on Biometrics: Progress and Directions
-
Li, S., Chu, R., Liao, S., Zhang, L.: Illumination invariant face recognition using near-infrared images. IEEE Transactions on Pattern Analysis and Machine Intelligence 29(4), 627-639 (2007) (Pubitemid 46464403)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 627-639
-
-
Li, S.Z.1
Chu, R.F.2
Liao, S.C.3
Zhang, L.4
-
22
-
-
37849037421
-
-
Lee, S.-W., Li, S.Z. (eds. ICB 2007. LNCS, vol. Springer, Heidelberg
-
Liao, S., Zhu, X., Lei, Z., Zhang, L., Li, S.Z.: Learning multi-scale block local binary patterns for face recognition. In: Lee, S.-W., Li, S.Z. (eds.) ICB 2007. LNCS, vol.4642, pp. 828-837. Springer, Heidelberg (2007)
-
(2007)
Learning Multi - Scale Block Local Binary patterns for Face Recognition
, vol.4642
, pp. 828-837
-
-
Liao, S.1
Zhu, X.2
Lei, Z.3
Zhang, L.4
Li, S.Z.5
-
23
-
-
33750533142
-
An improved biohashing for human authentication
-
Lumini, A., Nanni, L.: An improved biohashing for human authentication. Pattern Recogn. 40(3), 1057-1065 (2007)
-
(2007)
Pattern Recogn.
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
24
-
-
0002448405
-
A public - Key cryptosystem based on algebraic coding theory
-
McEliece, R.J.: A public-key cryptosystem based on algebraic coding theory. Deep Space Network Progress Report 44, 114-116 (1978)
-
(1978)
Deep Space Network Progress Report
, vol.44
, pp. 114-116
-
-
McEliece, R.J.1
-
25
-
-
33748422480
-
Empirical tests on biohashing
-
Nanni, L., Lumini, A.: Empirical tests on biohashing. Neurocomputing 69(16-18), 2390-2395 (2006)
-
(2006)
Neurocomputing
, vol.69
, Issue.16-18
, pp. 2390-2395
-
-
Nanni, L.1
Lumini, A.2
-
26
-
-
37049035583
-
Random subspace for an improved biohashing for face authentication
-
Nanni, L., Lumini, A.: Random subspace for an improved biohashing for face authentication. Pattern Recogn. Lett. 29(3), 295-300 (2008)
-
(2008)
Pattern Recogn. Lett.
, vol.29
, Issue.3
, pp. 295-300
-
-
Nanni, L.1
Lumini, A.2
-
28
-
-
19444368925
-
-
SPIE
-
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biometric encryption: enrollment and verification procedures, vol.3386, pp. 24-35. SPIE (1998)
-
(1998)
Biometric Encryption: Enrollment and Verification Procedures
, vol.3386
, pp. 24-35
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
29
-
-
69949114980
-
-
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar, B.V.K.: Biometric Encryption using image processing (April 1998)
-
(1998)
B.V.K. Biometric Encryption Using Image Processing
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar5
-
31
-
-
33747604157
-
Remarks on biohash and its mathematical foundation
-
Teoh, A., Jin, B., Connie, T., Ngo, D., Ling, C.: Remarks on biohash and its mathematical foundation. Inf. Process. Lett. 100(4), 145-150 (2006)
-
(2006)
Inf. Process. Lett.
, vol.100
, Issue.4
, pp. 145-150
-
-
Teoh, A.1
Jin, B.2
Connie, T.3
Ngo, D.4
Ling, C.5
-
32
-
-
38949203738
-
Cancellable biometrics and annotations on biohash
-
Teoh, A.B.J., Kuan, Y.W., Lee, S.: Cancellable biometrics and annotations on biohash. Pattern Recogn. 41(6), 2034-2044 (2008)
-
(2008)
Pattern Recogn.
, vol.41
, Issue.6
, pp. 2034-2044
-
-
Teoh, A.B.J.1
Kuan, Y.W.2
Lee, S.3
-
34
-
-
1842499650
-
Face recognition: A literature survey
-
Zhao, W., Chellappa, R., Phillips, P., Rosenfeld, A.: Face recognition: A literature survey. ACM Computing Surveys, 399-458 (2003)
-
(2003)
ACM Computing Surveys
, pp. 399-458
-
-
Zhao, W.1
Chellappa, R.2
Phillips, P.3
Rosenfeld, A.4
|