-
1
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948-960 (2004)
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
3
-
-
41949091158
-
Image understanding for iris biometrics: A survey
-
Bowyer, K., Hollingsworth, K., Flynn, P.: Image understanding for iris biometrics: a survey. Computer Vision and Image Understanding 110, 281-307 (2008)
-
(2008)
Computer Vision and Image Understanding
, vol.110
, pp. 281-307
-
-
Bowyer, K.1
Hollingsworth, K.2
Flynn, P.3
-
4
-
-
0742290132
-
How iris recognition works
-
Daugman, J.: How Iris Recognition Works. IEEE Trans. CSVT 14(1), 21-30 (2004)
-
(2004)
IEEE Trans. CSVT
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
5
-
-
2942628075
-
Efficient iris recogntion by characterizing key local variations
-
Ma, L., Tan, T., Wang, Y., Zhang, D.: Efficient Iris Recogntion by Characterizing Key Local Variations. IEEE Transactions on Image Processing 13(6), 739-750 (2004)
-
(2004)
IEEE Transactions on Image Processing
, vol.13
, Issue.6
, pp. 739-750
-
-
Ma, L.1
Tan, T.2
Wang, Y.3
Zhang, D.4
-
6
-
-
34250159054
-
A novel and efficient feature extraction method for iris recognition
-
Ko, J.-G., Gil, Y.-H., Yoo, J.-H., Chung, K.-I.: A Novel and Efficient Feature Extraction Method for Iris Recognition. ETRI Journal 29(3), 399-401 (2007)
-
(2007)
ETRI Journal
, vol.29
, Issue.3
, pp. 399-401
-
-
Ko, J.-G.1
Gil, Y.-H.2
Yoo, J.-H.3
Chung, K.-I.4
-
7
-
-
19444368925
-
Biometric encryption - Enrollment and verification procedures
-
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Kumar, B.V.: Biometric Encryption - Enrollment and Verification Procedures. In: Proc. SPIE, Optical Pattern Recognition IX, vol.3386, pp. 24-35 (1998)
-
(1998)
Proc. SPIE, Optical Pattern Recognition IX
, vol.3386
, pp. 24-35
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
8
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: Proc. of IEEE Symp. on Security and Privacy, pp. 148-157 (1998)
-
(1998)
Proc. of IEEE Symp. on Security and Privacy
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
9
-
-
8844234621
-
On the relation of error correction and cryptography to an off line biometric based identication scheme
-
Davida, G., Frankel, Y., Matt, B.: On the relation of error correction and cryptography to an off line biometric based identication scheme. In: Proc. of WCC 1999, Workshop on Coding and Cryptography, pp. 129-138 (1999)
-
(1999)
Proc. of WCC 1999 Workshop on Coding and Cryptography
, pp. 129-138
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
10
-
-
33747624401
-
Combining cryptography with biometrics effectively
-
Hao, F., Anderson, R., Daugman, J.: Combining Cryptography with Biometrics Effectively. IEEE Transactions on Computers 55(9), 1081-1088 (2006)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
11
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
Monrose, F., Reiter, M.K., Wetzel, S.: Password hardening based on keystroke dynamics. In: Proceedings of sixth ACM Conference on Computer and Communications Security, CCCS, pp. 73-82 (1999)
-
(1999)
Proceedings of Sixth ACM Conference on Computer and Communications Security, CCCS
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
12
-
-
0034829626
-
Cryptographic key Generation from voice
-
Monrose, F., Li, Q., Reiter, M.K., Wetzel, S.: Cryptographic Key Generation from Voice. In: SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy, 12 pages (2001)
-
(2001)
SP 2001: Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 12
-
-
Monrose, F.1
Li, Q.2
Reiter, M.K.3
Wetzel, S.4
-
13
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C., Camenisch, J.L. (eds). Springer, Heidelberg
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
14
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 614-634 (2001)
-
(2001)
IBM Systems Journal
, vol.40
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
15
-
-
33751585800
-
Biometric hash based on statistical features of online signatures
-
Vielhauer, C., Steinmetz, R., Mayerhofer, A.: Biometric hash based on statistical features of online signatures. In: ICPR 2002: Proceedings of the 16th International Conference on Pattern Recognition (ICPR 2002), vol.1, p. 10123 (2002)
-
(2002)
ICPR 2002: Proceedings of the 16th International Conference on Pattern Recognition (ICPR 2002)
, vol.1
, pp. 10123
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhofer, A.3
-
16
-
-
57649126466
-
A novel cryptosystem based on iris key generation
-
Wu, X., Qi, N., Wang, K., Zhang, D.: A Novel Cryptosystem based on Iris Key Generation. In: Fourth International Conference on Natural Computation (ICNC 2008), pp. 53-56 (2008)
-
(2008)
Fourth International Conference on Natural Computation (ICNC 2008)
, pp. 53-56
-
-
Wu, X.1
Qi, N.2
Wang, K.3
Zhang, D.4
-
17
-
-
0002064187
-
Hadamard matrix and their applications
-
Springer, Heidelberg
-
Agaian, S.S.: Hadamard Matrix and Their Applications. Lect. notes in math., vol.1168. Springer, Heidelberg (1985)
-
(1985)
Lect. Notes in Math.
, vol.1168
-
-
Agaian, S.S.1
-
19
-
-
84944812247
-
Factoring polynomials over finite fields
-
Berlekamp, E.: Factoring Polynomials Over Finite Fields. Bell Systems Technical Journal 46, 1853-1859 (1967)
-
(1967)
Bell Systems Technical Journal
, vol.46
, pp. 1853-1859
-
-
Berlekamp, E.1
-
20
-
-
24944579285
-
-
The Center of Biometrics and Security Research
-
The Center of Biometrics and Security Research, CASIA Iris Image Database, http://www.sinobiometrics.com
-
CASIA Iris Image Database
-
-
|